@unwanted/matrix-sdk-mini 34.12.0-2 → 34.12.0-4

Sign up to get free protection for your applications and to get access to all the features.
Files changed (492) hide show
  1. package/git-revision.txt +1 -1
  2. package/lib/@types/global.d.js +0 -2
  3. package/lib/@types/global.d.js.map +1 -1
  4. package/lib/browser-index.d.ts.map +1 -1
  5. package/lib/browser-index.js +0 -11
  6. package/lib/browser-index.js.map +1 -1
  7. package/lib/client.d.ts +2 -1221
  8. package/lib/client.d.ts.map +1 -1
  9. package/lib/client.js +331 -2821
  10. package/lib/client.js.map +1 -1
  11. package/lib/embedded.d.ts +0 -22
  12. package/lib/embedded.d.ts.map +1 -1
  13. package/lib/embedded.js +24 -166
  14. package/lib/embedded.js.map +1 -1
  15. package/lib/event-mapper.d.ts.map +1 -1
  16. package/lib/event-mapper.js +0 -4
  17. package/lib/event-mapper.js.map +1 -1
  18. package/lib/matrix.d.ts +0 -19
  19. package/lib/matrix.d.ts.map +1 -1
  20. package/lib/matrix.js +1 -26
  21. package/lib/matrix.js.map +1 -1
  22. package/lib/models/MSC3089Branch.d.ts.map +1 -1
  23. package/lib/models/MSC3089Branch.js +0 -3
  24. package/lib/models/MSC3089Branch.js.map +1 -1
  25. package/lib/models/event.d.ts +0 -94
  26. package/lib/models/event.d.ts.map +1 -1
  27. package/lib/models/event.js +0 -274
  28. package/lib/models/event.js.map +1 -1
  29. package/lib/models/poll.d.ts.map +1 -1
  30. package/lib/models/poll.js +1 -5
  31. package/lib/models/poll.js.map +1 -1
  32. package/lib/models/relations-container.d.ts.map +1 -1
  33. package/lib/models/relations-container.js +1 -7
  34. package/lib/models/relations-container.js.map +1 -1
  35. package/lib/models/relations.d.ts +0 -1
  36. package/lib/models/relations.d.ts.map +1 -1
  37. package/lib/models/relations.js +0 -8
  38. package/lib/models/relations.js.map +1 -1
  39. package/lib/models/room-state.d.ts.map +1 -1
  40. package/lib/models/room-state.js +10 -26
  41. package/lib/models/room-state.js.map +1 -1
  42. package/lib/models/room.d.ts +0 -18
  43. package/lib/models/room.d.ts.map +1 -1
  44. package/lib/models/room.js +94 -148
  45. package/lib/models/room.js.map +1 -1
  46. package/lib/models/thread.d.ts.map +1 -1
  47. package/lib/models/thread.js +0 -1
  48. package/lib/models/thread.js.map +1 -1
  49. package/lib/sliding-sync-sdk.d.ts +2 -3
  50. package/lib/sliding-sync-sdk.d.ts.map +1 -1
  51. package/lib/sliding-sync-sdk.js +41 -90
  52. package/lib/sliding-sync-sdk.js.map +1 -1
  53. package/lib/sync.d.ts +0 -12
  54. package/lib/sync.d.ts.map +1 -1
  55. package/lib/sync.js +1 -73
  56. package/lib/sync.js.map +1 -1
  57. package/lib/testing.d.ts +0 -48
  58. package/lib/testing.d.ts.map +1 -1
  59. package/lib/testing.js +0 -105
  60. package/lib/testing.js.map +1 -1
  61. package/lib/types.d.ts +0 -1
  62. package/lib/types.d.ts.map +1 -1
  63. package/lib/types.js.map +1 -1
  64. package/package.json +1 -3
  65. package/src/@types/global.d.ts +0 -3
  66. package/src/browser-index.ts +0 -11
  67. package/src/client.ts +60 -2882
  68. package/src/embedded.ts +3 -130
  69. package/src/event-mapper.ts +0 -4
  70. package/src/matrix.ts +0 -28
  71. package/src/models/MSC3089Branch.ts +0 -3
  72. package/src/models/event.ts +0 -289
  73. package/src/models/poll.ts +0 -6
  74. package/src/models/relations-container.ts +1 -8
  75. package/src/models/relations.ts +0 -8
  76. package/src/models/room-state.ts +2 -8
  77. package/src/models/room.ts +0 -62
  78. package/src/models/thread.ts +0 -1
  79. package/src/sliding-sync-sdk.ts +2 -72
  80. package/src/sync.ts +1 -98
  81. package/src/testing.ts +0 -108
  82. package/src/types.ts +0 -1
  83. package/CHANGELOG.md +0 -5910
  84. package/lib/@types/AESEncryptedSecretStoragePayload.d.ts +0 -14
  85. package/lib/@types/AESEncryptedSecretStoragePayload.d.ts.map +0 -1
  86. package/lib/@types/AESEncryptedSecretStoragePayload.js +0 -1
  87. package/lib/@types/AESEncryptedSecretStoragePayload.js.map +0 -1
  88. package/lib/@types/crypto.d.ts +0 -47
  89. package/lib/@types/crypto.d.ts.map +0 -1
  90. package/lib/@types/crypto.js +0 -1
  91. package/lib/@types/crypto.js.map +0 -1
  92. package/lib/@types/matrix-sdk-crypto-wasm.d.js +0 -1
  93. package/lib/@types/matrix-sdk-crypto-wasm.d.js.map +0 -1
  94. package/lib/common-crypto/CryptoBackend.d.ts +0 -240
  95. package/lib/common-crypto/CryptoBackend.d.ts.map +0 -1
  96. package/lib/common-crypto/CryptoBackend.js +0 -73
  97. package/lib/common-crypto/CryptoBackend.js.map +0 -1
  98. package/lib/common-crypto/key-passphrase.d.ts +0 -14
  99. package/lib/common-crypto/key-passphrase.d.ts.map +0 -1
  100. package/lib/common-crypto/key-passphrase.js +0 -33
  101. package/lib/common-crypto/key-passphrase.js.map +0 -1
  102. package/lib/crypto/CrossSigning.d.ts +0 -184
  103. package/lib/crypto/CrossSigning.d.ts.map +0 -1
  104. package/lib/crypto/CrossSigning.js +0 -718
  105. package/lib/crypto/CrossSigning.js.map +0 -1
  106. package/lib/crypto/DeviceList.d.ts +0 -216
  107. package/lib/crypto/DeviceList.d.ts.map +0 -1
  108. package/lib/crypto/DeviceList.js +0 -892
  109. package/lib/crypto/DeviceList.js.map +0 -1
  110. package/lib/crypto/EncryptionSetup.d.ts +0 -152
  111. package/lib/crypto/EncryptionSetup.d.ts.map +0 -1
  112. package/lib/crypto/EncryptionSetup.js +0 -356
  113. package/lib/crypto/EncryptionSetup.js.map +0 -1
  114. package/lib/crypto/OlmDevice.d.ts +0 -457
  115. package/lib/crypto/OlmDevice.d.ts.map +0 -1
  116. package/lib/crypto/OlmDevice.js +0 -1241
  117. package/lib/crypto/OlmDevice.js.map +0 -1
  118. package/lib/crypto/OutgoingRoomKeyRequestManager.d.ts +0 -109
  119. package/lib/crypto/OutgoingRoomKeyRequestManager.d.ts.map +0 -1
  120. package/lib/crypto/OutgoingRoomKeyRequestManager.js +0 -415
  121. package/lib/crypto/OutgoingRoomKeyRequestManager.js.map +0 -1
  122. package/lib/crypto/RoomList.d.ts +0 -26
  123. package/lib/crypto/RoomList.d.ts.map +0 -1
  124. package/lib/crypto/RoomList.js +0 -71
  125. package/lib/crypto/RoomList.js.map +0 -1
  126. package/lib/crypto/SecretSharing.d.ts +0 -24
  127. package/lib/crypto/SecretSharing.d.ts.map +0 -1
  128. package/lib/crypto/SecretSharing.js +0 -194
  129. package/lib/crypto/SecretSharing.js.map +0 -1
  130. package/lib/crypto/SecretStorage.d.ts +0 -55
  131. package/lib/crypto/SecretStorage.d.ts.map +0 -1
  132. package/lib/crypto/SecretStorage.js +0 -118
  133. package/lib/crypto/SecretStorage.js.map +0 -1
  134. package/lib/crypto/aes.d.ts +0 -6
  135. package/lib/crypto/aes.d.ts.map +0 -1
  136. package/lib/crypto/aes.js +0 -24
  137. package/lib/crypto/aes.js.map +0 -1
  138. package/lib/crypto/algorithms/base.d.ts +0 -156
  139. package/lib/crypto/algorithms/base.d.ts.map +0 -1
  140. package/lib/crypto/algorithms/base.js +0 -187
  141. package/lib/crypto/algorithms/base.js.map +0 -1
  142. package/lib/crypto/algorithms/index.d.ts +0 -4
  143. package/lib/crypto/algorithms/index.d.ts.map +0 -1
  144. package/lib/crypto/algorithms/index.js +0 -20
  145. package/lib/crypto/algorithms/index.js.map +0 -1
  146. package/lib/crypto/algorithms/megolm.d.ts +0 -385
  147. package/lib/crypto/algorithms/megolm.d.ts.map +0 -1
  148. package/lib/crypto/algorithms/megolm.js +0 -1822
  149. package/lib/crypto/algorithms/megolm.js.map +0 -1
  150. package/lib/crypto/algorithms/olm.d.ts +0 -5
  151. package/lib/crypto/algorithms/olm.d.ts.map +0 -1
  152. package/lib/crypto/algorithms/olm.js +0 -299
  153. package/lib/crypto/algorithms/olm.js.map +0 -1
  154. package/lib/crypto/api.d.ts +0 -32
  155. package/lib/crypto/api.d.ts.map +0 -1
  156. package/lib/crypto/api.js +0 -22
  157. package/lib/crypto/api.js.map +0 -1
  158. package/lib/crypto/backup.d.ts +0 -227
  159. package/lib/crypto/backup.d.ts.map +0 -1
  160. package/lib/crypto/backup.js +0 -824
  161. package/lib/crypto/backup.js.map +0 -1
  162. package/lib/crypto/crypto.d.ts +0 -3
  163. package/lib/crypto/crypto.d.ts.map +0 -1
  164. package/lib/crypto/crypto.js +0 -19
  165. package/lib/crypto/crypto.js.map +0 -1
  166. package/lib/crypto/dehydration.d.ts +0 -34
  167. package/lib/crypto/dehydration.d.ts.map +0 -1
  168. package/lib/crypto/dehydration.js +0 -252
  169. package/lib/crypto/dehydration.js.map +0 -1
  170. package/lib/crypto/device-converter.d.ts +0 -9
  171. package/lib/crypto/device-converter.d.ts.map +0 -1
  172. package/lib/crypto/device-converter.js +0 -42
  173. package/lib/crypto/device-converter.js.map +0 -1
  174. package/lib/crypto/deviceinfo.d.ts +0 -99
  175. package/lib/crypto/deviceinfo.d.ts.map +0 -1
  176. package/lib/crypto/deviceinfo.js +0 -148
  177. package/lib/crypto/deviceinfo.js.map +0 -1
  178. package/lib/crypto/index.d.ts +0 -1209
  179. package/lib/crypto/index.d.ts.map +0 -1
  180. package/lib/crypto/index.js +0 -4097
  181. package/lib/crypto/index.js.map +0 -1
  182. package/lib/crypto/key_passphrase.d.ts +0 -14
  183. package/lib/crypto/key_passphrase.d.ts.map +0 -1
  184. package/lib/crypto/key_passphrase.js +0 -44
  185. package/lib/crypto/key_passphrase.js.map +0 -1
  186. package/lib/crypto/keybackup.d.ts +0 -18
  187. package/lib/crypto/keybackup.d.ts.map +0 -1
  188. package/lib/crypto/keybackup.js +0 -1
  189. package/lib/crypto/keybackup.js.map +0 -1
  190. package/lib/crypto/olmlib.d.ts +0 -129
  191. package/lib/crypto/olmlib.d.ts.map +0 -1
  192. package/lib/crypto/olmlib.js +0 -492
  193. package/lib/crypto/olmlib.js.map +0 -1
  194. package/lib/crypto/recoverykey.d.ts +0 -2
  195. package/lib/crypto/recoverykey.d.ts.map +0 -1
  196. package/lib/crypto/recoverykey.js +0 -19
  197. package/lib/crypto/recoverykey.js.map +0 -1
  198. package/lib/crypto/store/base.d.ts +0 -252
  199. package/lib/crypto/store/base.d.ts.map +0 -1
  200. package/lib/crypto/store/base.js +0 -64
  201. package/lib/crypto/store/base.js.map +0 -1
  202. package/lib/crypto/store/indexeddb-crypto-store-backend.d.ts +0 -187
  203. package/lib/crypto/store/indexeddb-crypto-store-backend.d.ts.map +0 -1
  204. package/lib/crypto/store/indexeddb-crypto-store-backend.js +0 -1145
  205. package/lib/crypto/store/indexeddb-crypto-store-backend.js.map +0 -1
  206. package/lib/crypto/store/indexeddb-crypto-store.d.ts +0 -432
  207. package/lib/crypto/store/indexeddb-crypto-store.d.ts.map +0 -1
  208. package/lib/crypto/store/indexeddb-crypto-store.js +0 -728
  209. package/lib/crypto/store/indexeddb-crypto-store.js.map +0 -1
  210. package/lib/crypto/store/localStorage-crypto-store.d.ts +0 -119
  211. package/lib/crypto/store/localStorage-crypto-store.d.ts.map +0 -1
  212. package/lib/crypto/store/localStorage-crypto-store.js +0 -531
  213. package/lib/crypto/store/localStorage-crypto-store.js.map +0 -1
  214. package/lib/crypto/store/memory-crypto-store.d.ts +0 -215
  215. package/lib/crypto/store/memory-crypto-store.d.ts.map +0 -1
  216. package/lib/crypto/store/memory-crypto-store.js +0 -622
  217. package/lib/crypto/store/memory-crypto-store.js.map +0 -1
  218. package/lib/crypto/verification/Base.d.ts +0 -105
  219. package/lib/crypto/verification/Base.d.ts.map +0 -1
  220. package/lib/crypto/verification/Base.js +0 -372
  221. package/lib/crypto/verification/Base.js.map +0 -1
  222. package/lib/crypto/verification/Error.d.ts +0 -35
  223. package/lib/crypto/verification/Error.d.ts.map +0 -1
  224. package/lib/crypto/verification/Error.js +0 -86
  225. package/lib/crypto/verification/Error.js.map +0 -1
  226. package/lib/crypto/verification/IllegalMethod.d.ts +0 -15
  227. package/lib/crypto/verification/IllegalMethod.d.ts.map +0 -1
  228. package/lib/crypto/verification/IllegalMethod.js +0 -43
  229. package/lib/crypto/verification/IllegalMethod.js.map +0 -1
  230. package/lib/crypto/verification/QRCode.d.ts +0 -51
  231. package/lib/crypto/verification/QRCode.d.ts.map +0 -1
  232. package/lib/crypto/verification/QRCode.js +0 -277
  233. package/lib/crypto/verification/QRCode.js.map +0 -1
  234. package/lib/crypto/verification/SAS.d.ts +0 -27
  235. package/lib/crypto/verification/SAS.d.ts.map +0 -1
  236. package/lib/crypto/verification/SAS.js +0 -485
  237. package/lib/crypto/verification/SAS.js.map +0 -1
  238. package/lib/crypto/verification/SASDecimal.d.ts +0 -8
  239. package/lib/crypto/verification/SASDecimal.d.ts.map +0 -1
  240. package/lib/crypto/verification/SASDecimal.js +0 -34
  241. package/lib/crypto/verification/SASDecimal.js.map +0 -1
  242. package/lib/crypto/verification/request/Channel.d.ts +0 -18
  243. package/lib/crypto/verification/request/Channel.d.ts.map +0 -1
  244. package/lib/crypto/verification/request/Channel.js +0 -1
  245. package/lib/crypto/verification/request/Channel.js.map +0 -1
  246. package/lib/crypto/verification/request/InRoomChannel.d.ts +0 -113
  247. package/lib/crypto/verification/request/InRoomChannel.d.ts.map +0 -1
  248. package/lib/crypto/verification/request/InRoomChannel.js +0 -351
  249. package/lib/crypto/verification/request/InRoomChannel.js.map +0 -1
  250. package/lib/crypto/verification/request/ToDeviceChannel.d.ts +0 -105
  251. package/lib/crypto/verification/request/ToDeviceChannel.d.ts.map +0 -1
  252. package/lib/crypto/verification/request/ToDeviceChannel.js +0 -328
  253. package/lib/crypto/verification/request/ToDeviceChannel.js.map +0 -1
  254. package/lib/crypto/verification/request/VerificationRequest.d.ts +0 -227
  255. package/lib/crypto/verification/request/VerificationRequest.d.ts.map +0 -1
  256. package/lib/crypto/verification/request/VerificationRequest.js +0 -937
  257. package/lib/crypto/verification/request/VerificationRequest.js.map +0 -1
  258. package/lib/crypto-api/CryptoEvent.d.ts +0 -69
  259. package/lib/crypto-api/CryptoEvent.d.ts.map +0 -1
  260. package/lib/crypto-api/CryptoEvent.js +0 -33
  261. package/lib/crypto-api/CryptoEvent.js.map +0 -1
  262. package/lib/crypto-api/CryptoEventHandlerMap.d.ts +0 -16
  263. package/lib/crypto-api/CryptoEventHandlerMap.d.ts.map +0 -1
  264. package/lib/crypto-api/CryptoEventHandlerMap.js +0 -22
  265. package/lib/crypto-api/CryptoEventHandlerMap.js.map +0 -1
  266. package/lib/crypto-api/index.d.ts +0 -978
  267. package/lib/crypto-api/index.d.ts.map +0 -1
  268. package/lib/crypto-api/index.js +0 -304
  269. package/lib/crypto-api/index.js.map +0 -1
  270. package/lib/crypto-api/key-passphrase.d.ts +0 -11
  271. package/lib/crypto-api/key-passphrase.d.ts.map +0 -1
  272. package/lib/crypto-api/key-passphrase.js +0 -51
  273. package/lib/crypto-api/key-passphrase.js.map +0 -1
  274. package/lib/crypto-api/keybackup.d.ts +0 -88
  275. package/lib/crypto-api/keybackup.d.ts.map +0 -1
  276. package/lib/crypto-api/keybackup.js +0 -1
  277. package/lib/crypto-api/keybackup.js.map +0 -1
  278. package/lib/crypto-api/recovery-key.d.ts +0 -11
  279. package/lib/crypto-api/recovery-key.d.ts.map +0 -1
  280. package/lib/crypto-api/recovery-key.js +0 -65
  281. package/lib/crypto-api/recovery-key.js.map +0 -1
  282. package/lib/crypto-api/verification.d.ts +0 -344
  283. package/lib/crypto-api/verification.d.ts.map +0 -1
  284. package/lib/crypto-api/verification.js +0 -91
  285. package/lib/crypto-api/verification.js.map +0 -1
  286. package/lib/rendezvous/MSC4108SignInWithQR.d.ts +0 -112
  287. package/lib/rendezvous/MSC4108SignInWithQR.d.ts.map +0 -1
  288. package/lib/rendezvous/MSC4108SignInWithQR.js +0 -392
  289. package/lib/rendezvous/MSC4108SignInWithQR.js.map +0 -1
  290. package/lib/rendezvous/RendezvousChannel.d.ts +0 -27
  291. package/lib/rendezvous/RendezvousChannel.d.ts.map +0 -1
  292. package/lib/rendezvous/RendezvousChannel.js +0 -1
  293. package/lib/rendezvous/RendezvousChannel.js.map +0 -1
  294. package/lib/rendezvous/RendezvousCode.d.ts +0 -9
  295. package/lib/rendezvous/RendezvousCode.d.ts.map +0 -1
  296. package/lib/rendezvous/RendezvousCode.js +0 -1
  297. package/lib/rendezvous/RendezvousCode.js.map +0 -1
  298. package/lib/rendezvous/RendezvousError.d.ts +0 -6
  299. package/lib/rendezvous/RendezvousError.d.ts.map +0 -1
  300. package/lib/rendezvous/RendezvousError.js +0 -23
  301. package/lib/rendezvous/RendezvousError.js.map +0 -1
  302. package/lib/rendezvous/RendezvousFailureReason.d.ts +0 -31
  303. package/lib/rendezvous/RendezvousFailureReason.d.ts.map +0 -1
  304. package/lib/rendezvous/RendezvousFailureReason.js +0 -38
  305. package/lib/rendezvous/RendezvousFailureReason.js.map +0 -1
  306. package/lib/rendezvous/RendezvousIntent.d.ts +0 -5
  307. package/lib/rendezvous/RendezvousIntent.d.ts.map +0 -1
  308. package/lib/rendezvous/RendezvousIntent.js +0 -22
  309. package/lib/rendezvous/RendezvousIntent.js.map +0 -1
  310. package/lib/rendezvous/RendezvousTransport.d.ts +0 -36
  311. package/lib/rendezvous/RendezvousTransport.d.ts.map +0 -1
  312. package/lib/rendezvous/RendezvousTransport.js +0 -1
  313. package/lib/rendezvous/RendezvousTransport.js.map +0 -1
  314. package/lib/rendezvous/channels/MSC4108SecureChannel.d.ts +0 -58
  315. package/lib/rendezvous/channels/MSC4108SecureChannel.d.ts.map +0 -1
  316. package/lib/rendezvous/channels/MSC4108SecureChannel.js +0 -246
  317. package/lib/rendezvous/channels/MSC4108SecureChannel.js.map +0 -1
  318. package/lib/rendezvous/channels/index.d.ts +0 -2
  319. package/lib/rendezvous/channels/index.d.ts.map +0 -1
  320. package/lib/rendezvous/channels/index.js +0 -18
  321. package/lib/rendezvous/channels/index.js.map +0 -1
  322. package/lib/rendezvous/index.d.ts +0 -10
  323. package/lib/rendezvous/index.d.ts.map +0 -1
  324. package/lib/rendezvous/index.js +0 -23
  325. package/lib/rendezvous/index.js.map +0 -1
  326. package/lib/rendezvous/transports/MSC4108RendezvousSession.d.ts +0 -61
  327. package/lib/rendezvous/transports/MSC4108RendezvousSession.d.ts.map +0 -1
  328. package/lib/rendezvous/transports/MSC4108RendezvousSession.js +0 -253
  329. package/lib/rendezvous/transports/MSC4108RendezvousSession.js.map +0 -1
  330. package/lib/rendezvous/transports/index.d.ts +0 -2
  331. package/lib/rendezvous/transports/index.d.ts.map +0 -1
  332. package/lib/rendezvous/transports/index.js +0 -18
  333. package/lib/rendezvous/transports/index.js.map +0 -1
  334. package/lib/rust-crypto/CrossSigningIdentity.d.ts +0 -33
  335. package/lib/rust-crypto/CrossSigningIdentity.d.ts.map +0 -1
  336. package/lib/rust-crypto/CrossSigningIdentity.js +0 -157
  337. package/lib/rust-crypto/CrossSigningIdentity.js.map +0 -1
  338. package/lib/rust-crypto/DehydratedDeviceManager.d.ts +0 -98
  339. package/lib/rust-crypto/DehydratedDeviceManager.d.ts.map +0 -1
  340. package/lib/rust-crypto/DehydratedDeviceManager.js +0 -285
  341. package/lib/rust-crypto/DehydratedDeviceManager.js.map +0 -1
  342. package/lib/rust-crypto/KeyClaimManager.d.ts +0 -33
  343. package/lib/rust-crypto/KeyClaimManager.d.ts.map +0 -1
  344. package/lib/rust-crypto/KeyClaimManager.js +0 -82
  345. package/lib/rust-crypto/KeyClaimManager.js.map +0 -1
  346. package/lib/rust-crypto/OutgoingRequestProcessor.d.ts +0 -43
  347. package/lib/rust-crypto/OutgoingRequestProcessor.d.ts.map +0 -1
  348. package/lib/rust-crypto/OutgoingRequestProcessor.js +0 -195
  349. package/lib/rust-crypto/OutgoingRequestProcessor.js.map +0 -1
  350. package/lib/rust-crypto/OutgoingRequestsManager.d.ts +0 -47
  351. package/lib/rust-crypto/OutgoingRequestsManager.d.ts.map +0 -1
  352. package/lib/rust-crypto/OutgoingRequestsManager.js +0 -148
  353. package/lib/rust-crypto/OutgoingRequestsManager.js.map +0 -1
  354. package/lib/rust-crypto/PerSessionKeyBackupDownloader.d.ts +0 -120
  355. package/lib/rust-crypto/PerSessionKeyBackupDownloader.d.ts.map +0 -1
  356. package/lib/rust-crypto/PerSessionKeyBackupDownloader.js +0 -467
  357. package/lib/rust-crypto/PerSessionKeyBackupDownloader.js.map +0 -1
  358. package/lib/rust-crypto/RoomEncryptor.d.ts +0 -98
  359. package/lib/rust-crypto/RoomEncryptor.d.ts.map +0 -1
  360. package/lib/rust-crypto/RoomEncryptor.js +0 -299
  361. package/lib/rust-crypto/RoomEncryptor.js.map +0 -1
  362. package/lib/rust-crypto/backup.d.ts +0 -254
  363. package/lib/rust-crypto/backup.d.ts.map +0 -1
  364. package/lib/rust-crypto/backup.js +0 -837
  365. package/lib/rust-crypto/backup.js.map +0 -1
  366. package/lib/rust-crypto/constants.d.ts +0 -3
  367. package/lib/rust-crypto/constants.d.ts.map +0 -1
  368. package/lib/rust-crypto/constants.js +0 -19
  369. package/lib/rust-crypto/constants.js.map +0 -1
  370. package/lib/rust-crypto/device-converter.d.ts +0 -28
  371. package/lib/rust-crypto/device-converter.d.ts.map +0 -1
  372. package/lib/rust-crypto/device-converter.js +0 -123
  373. package/lib/rust-crypto/device-converter.js.map +0 -1
  374. package/lib/rust-crypto/index.d.ts +0 -61
  375. package/lib/rust-crypto/index.d.ts.map +0 -1
  376. package/lib/rust-crypto/index.js +0 -152
  377. package/lib/rust-crypto/index.js.map +0 -1
  378. package/lib/rust-crypto/libolm_migration.d.ts +0 -81
  379. package/lib/rust-crypto/libolm_migration.d.ts.map +0 -1
  380. package/lib/rust-crypto/libolm_migration.js +0 -459
  381. package/lib/rust-crypto/libolm_migration.js.map +0 -1
  382. package/lib/rust-crypto/rust-crypto.d.ts +0 -556
  383. package/lib/rust-crypto/rust-crypto.d.ts.map +0 -1
  384. package/lib/rust-crypto/rust-crypto.js +0 -2016
  385. package/lib/rust-crypto/rust-crypto.js.map +0 -1
  386. package/lib/rust-crypto/secret-storage.d.ts +0 -22
  387. package/lib/rust-crypto/secret-storage.d.ts.map +0 -1
  388. package/lib/rust-crypto/secret-storage.js +0 -63
  389. package/lib/rust-crypto/secret-storage.js.map +0 -1
  390. package/lib/rust-crypto/verification.d.ts +0 -319
  391. package/lib/rust-crypto/verification.d.ts.map +0 -1
  392. package/lib/rust-crypto/verification.js +0 -816
  393. package/lib/rust-crypto/verification.js.map +0 -1
  394. package/lib/secret-storage.d.ts +0 -370
  395. package/lib/secret-storage.d.ts.map +0 -1
  396. package/lib/secret-storage.js +0 -466
  397. package/lib/secret-storage.js.map +0 -1
  398. package/lib/utils/decryptAESSecretStorageItem.d.ts +0 -12
  399. package/lib/utils/decryptAESSecretStorageItem.d.ts.map +0 -1
  400. package/lib/utils/decryptAESSecretStorageItem.js +0 -50
  401. package/lib/utils/decryptAESSecretStorageItem.js.map +0 -1
  402. package/lib/utils/encryptAESSecretStorageItem.d.ts +0 -16
  403. package/lib/utils/encryptAESSecretStorageItem.d.ts.map +0 -1
  404. package/lib/utils/encryptAESSecretStorageItem.js +0 -68
  405. package/lib/utils/encryptAESSecretStorageItem.js.map +0 -1
  406. package/lib/utils/internal/deriveKeys.d.ts +0 -10
  407. package/lib/utils/internal/deriveKeys.d.ts.map +0 -1
  408. package/lib/utils/internal/deriveKeys.js +0 -60
  409. package/lib/utils/internal/deriveKeys.js.map +0 -1
  410. package/src/@types/AESEncryptedSecretStoragePayload.ts +0 -29
  411. package/src/@types/crypto.ts +0 -73
  412. package/src/@types/matrix-sdk-crypto-wasm.d.ts +0 -44
  413. package/src/common-crypto/CryptoBackend.ts +0 -302
  414. package/src/common-crypto/README.md +0 -4
  415. package/src/common-crypto/key-passphrase.ts +0 -43
  416. package/src/crypto/CrossSigning.ts +0 -773
  417. package/src/crypto/DeviceList.ts +0 -989
  418. package/src/crypto/EncryptionSetup.ts +0 -351
  419. package/src/crypto/OlmDevice.ts +0 -1500
  420. package/src/crypto/OutgoingRoomKeyRequestManager.ts +0 -485
  421. package/src/crypto/RoomList.ts +0 -70
  422. package/src/crypto/SecretSharing.ts +0 -240
  423. package/src/crypto/SecretStorage.ts +0 -136
  424. package/src/crypto/aes.ts +0 -23
  425. package/src/crypto/algorithms/base.ts +0 -236
  426. package/src/crypto/algorithms/index.ts +0 -20
  427. package/src/crypto/algorithms/megolm.ts +0 -2216
  428. package/src/crypto/algorithms/olm.ts +0 -381
  429. package/src/crypto/api.ts +0 -70
  430. package/src/crypto/backup.ts +0 -922
  431. package/src/crypto/crypto.ts +0 -18
  432. package/src/crypto/dehydration.ts +0 -272
  433. package/src/crypto/device-converter.ts +0 -45
  434. package/src/crypto/deviceinfo.ts +0 -158
  435. package/src/crypto/index.ts +0 -4414
  436. package/src/crypto/key_passphrase.ts +0 -42
  437. package/src/crypto/keybackup.ts +0 -47
  438. package/src/crypto/olmlib.ts +0 -539
  439. package/src/crypto/recoverykey.ts +0 -18
  440. package/src/crypto/store/base.ts +0 -348
  441. package/src/crypto/store/indexeddb-crypto-store-backend.ts +0 -1250
  442. package/src/crypto/store/indexeddb-crypto-store.ts +0 -845
  443. package/src/crypto/store/localStorage-crypto-store.ts +0 -579
  444. package/src/crypto/store/memory-crypto-store.ts +0 -680
  445. package/src/crypto/verification/Base.ts +0 -409
  446. package/src/crypto/verification/Error.ts +0 -76
  447. package/src/crypto/verification/IllegalMethod.ts +0 -50
  448. package/src/crypto/verification/QRCode.ts +0 -310
  449. package/src/crypto/verification/SAS.ts +0 -494
  450. package/src/crypto/verification/SASDecimal.ts +0 -37
  451. package/src/crypto/verification/request/Channel.ts +0 -34
  452. package/src/crypto/verification/request/InRoomChannel.ts +0 -371
  453. package/src/crypto/verification/request/ToDeviceChannel.ts +0 -354
  454. package/src/crypto/verification/request/VerificationRequest.ts +0 -976
  455. package/src/crypto-api/CryptoEvent.ts +0 -93
  456. package/src/crypto-api/CryptoEventHandlerMap.ts +0 -32
  457. package/src/crypto-api/index.ts +0 -1175
  458. package/src/crypto-api/key-passphrase.ts +0 -58
  459. package/src/crypto-api/keybackup.ts +0 -115
  460. package/src/crypto-api/recovery-key.ts +0 -69
  461. package/src/crypto-api/verification.ts +0 -408
  462. package/src/rendezvous/MSC4108SignInWithQR.ts +0 -444
  463. package/src/rendezvous/RendezvousChannel.ts +0 -48
  464. package/src/rendezvous/RendezvousCode.ts +0 -25
  465. package/src/rendezvous/RendezvousError.ts +0 -26
  466. package/src/rendezvous/RendezvousFailureReason.ts +0 -49
  467. package/src/rendezvous/RendezvousIntent.ts +0 -20
  468. package/src/rendezvous/RendezvousTransport.ts +0 -58
  469. package/src/rendezvous/channels/MSC4108SecureChannel.ts +0 -270
  470. package/src/rendezvous/channels/index.ts +0 -17
  471. package/src/rendezvous/index.ts +0 -25
  472. package/src/rendezvous/transports/MSC4108RendezvousSession.ts +0 -270
  473. package/src/rendezvous/transports/index.ts +0 -17
  474. package/src/rust-crypto/CrossSigningIdentity.ts +0 -183
  475. package/src/rust-crypto/DehydratedDeviceManager.ts +0 -306
  476. package/src/rust-crypto/KeyClaimManager.ts +0 -86
  477. package/src/rust-crypto/OutgoingRequestProcessor.ts +0 -236
  478. package/src/rust-crypto/OutgoingRequestsManager.ts +0 -143
  479. package/src/rust-crypto/PerSessionKeyBackupDownloader.ts +0 -501
  480. package/src/rust-crypto/RoomEncryptor.ts +0 -352
  481. package/src/rust-crypto/backup.ts +0 -881
  482. package/src/rust-crypto/constants.ts +0 -18
  483. package/src/rust-crypto/device-converter.ts +0 -128
  484. package/src/rust-crypto/index.ts +0 -237
  485. package/src/rust-crypto/libolm_migration.ts +0 -530
  486. package/src/rust-crypto/rust-crypto.ts +0 -2205
  487. package/src/rust-crypto/secret-storage.ts +0 -60
  488. package/src/rust-crypto/verification.ts +0 -830
  489. package/src/secret-storage.ts +0 -693
  490. package/src/utils/decryptAESSecretStorageItem.ts +0 -54
  491. package/src/utils/encryptAESSecretStorageItem.ts +0 -73
  492. package/src/utils/internal/deriveKeys.ts +0 -63
@@ -1,492 +0,0 @@
1
- import _defineProperty from "@babel/runtime/helpers/defineProperty";
2
- import _asyncToGenerator from "@babel/runtime/helpers/asyncToGenerator";
3
- function ownKeys(e, r) { var t = Object.keys(e); if (Object.getOwnPropertySymbols) { var o = Object.getOwnPropertySymbols(e); r && (o = o.filter(function (r) { return Object.getOwnPropertyDescriptor(e, r).enumerable; })), t.push.apply(t, o); } return t; }
4
- function _objectSpread(e) { for (var r = 1; r < arguments.length; r++) { var t = null != arguments[r] ? arguments[r] : {}; r % 2 ? ownKeys(Object(t), !0).forEach(function (r) { _defineProperty(e, r, t[r]); }) : Object.getOwnPropertyDescriptors ? Object.defineProperties(e, Object.getOwnPropertyDescriptors(t)) : ownKeys(Object(t)).forEach(function (r) { Object.defineProperty(e, r, Object.getOwnPropertyDescriptor(t, r)); }); } return e; }
5
- /*
6
- Copyright 2016 - 2021 The Matrix.org Foundation C.I.C.
7
-
8
- Licensed under the Apache License, Version 2.0 (the "License");
9
- you may not use this file except in compliance with the License.
10
- You may obtain a copy of the License at
11
-
12
- http://www.apache.org/licenses/LICENSE-2.0
13
-
14
- Unless required by applicable law or agreed to in writing, software
15
- distributed under the License is distributed on an "AS IS" BASIS,
16
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
17
- See the License for the specific language governing permissions and
18
- limitations under the License.
19
- */
20
-
21
- /**
22
- * Utilities common to olm encryption algorithms
23
- */
24
-
25
- import anotherjson from "another-json";
26
- import { logger } from "../logger.js";
27
- import { EventType } from "../@types/event.js";
28
- import { MapWithDefault } from "../utils.js";
29
- var Algorithm = /*#__PURE__*/function (Algorithm) {
30
- Algorithm["Olm"] = "m.olm.v1.curve25519-aes-sha2";
31
- Algorithm["Megolm"] = "m.megolm.v1.aes-sha2";
32
- Algorithm["MegolmBackup"] = "m.megolm_backup.v1.curve25519-aes-sha2";
33
- return Algorithm;
34
- }(Algorithm || {});
35
- /**
36
- * matrix algorithm tag for olm
37
- */
38
- export var OLM_ALGORITHM = Algorithm.Olm;
39
-
40
- /**
41
- * matrix algorithm tag for megolm
42
- */
43
- export var MEGOLM_ALGORITHM = Algorithm.Megolm;
44
-
45
- /**
46
- * matrix algorithm tag for megolm backups
47
- */
48
- export var MEGOLM_BACKUP_ALGORITHM = Algorithm.MegolmBackup;
49
- /**
50
- * Encrypt an event payload for an Olm device
51
- *
52
- * @param resultsObject - The `ciphertext` property
53
- * of the m.room.encrypted event to which to add our result
54
- *
55
- * @param olmDevice - olm.js wrapper
56
- * @param payloadFields - fields to include in the encrypted payload
57
- *
58
- * Returns a promise which resolves (to undefined) when the payload
59
- * has been encrypted into `resultsObject`
60
- */
61
- export function encryptMessageForDevice(_x, _x2, _x3, _x4, _x5, _x6, _x7) {
62
- return _encryptMessageForDevice.apply(this, arguments);
63
- }
64
- function _encryptMessageForDevice() {
65
- _encryptMessageForDevice = _asyncToGenerator(function* (resultsObject, ourUserId, ourDeviceId, olmDevice, recipientUserId, recipientDevice, payloadFields) {
66
- var deviceKey = recipientDevice.getIdentityKey();
67
- var sessionId = yield olmDevice.getSessionIdForDevice(deviceKey);
68
- if (sessionId === null) {
69
- // If we don't have a session for a device then
70
- // we can't encrypt a message for it.
71
- logger.log("[olmlib.encryptMessageForDevice] Unable to find Olm session for device " + "".concat(recipientUserId, ":").concat(recipientDevice.deviceId));
72
- return;
73
- }
74
- logger.log("[olmlib.encryptMessageForDevice] Using Olm session ".concat(sessionId, " for device ") + "".concat(recipientUserId, ":").concat(recipientDevice.deviceId));
75
- var payload = _objectSpread({
76
- sender: ourUserId,
77
- // TODO this appears to no longer be used whatsoever
78
- sender_device: ourDeviceId,
79
- // Include the Ed25519 key so that the recipient knows what
80
- // device this message came from.
81
- // We don't need to include the curve25519 key since the
82
- // recipient will already know this from the olm headers.
83
- // When combined with the device keys retrieved from the
84
- // homeserver signed by the ed25519 key this proves that
85
- // the curve25519 key and the ed25519 key are owned by
86
- // the same device.
87
- keys: {
88
- ed25519: olmDevice.deviceEd25519Key
89
- },
90
- // include the recipient device details in the payload,
91
- // to avoid unknown key attacks, per
92
- // https://github.com/vector-im/vector-web/issues/2483
93
- recipient: recipientUserId,
94
- recipient_keys: {
95
- ed25519: recipientDevice.getFingerprint()
96
- }
97
- }, payloadFields);
98
-
99
- // TODO: technically, a bunch of that stuff only needs to be included for
100
- // pre-key messages: after that, both sides know exactly which devices are
101
- // involved in the session. If we're looking to reduce data transfer in the
102
- // future, we could elide them for subsequent messages.
103
-
104
- resultsObject[deviceKey] = yield olmDevice.encryptMessage(deviceKey, sessionId, JSON.stringify(payload));
105
- });
106
- return _encryptMessageForDevice.apply(this, arguments);
107
- }
108
- /**
109
- * Get the existing olm sessions for the given devices, and the devices that
110
- * don't have olm sessions.
111
- *
112
- *
113
- *
114
- * @param devicesByUser - map from userid to list of devices to ensure sessions for
115
- *
116
- * @returns resolves to an array. The first element of the array is a
117
- * a map of user IDs to arrays of deviceInfo, representing the devices that
118
- * don't have established olm sessions. The second element of the array is
119
- * a map from userId to deviceId to {@link OlmSessionResult}
120
- */
121
- export function getExistingOlmSessions(_x8, _x9, _x10) {
122
- return _getExistingOlmSessions.apply(this, arguments);
123
- }
124
-
125
- /**
126
- * Try to make sure we have established olm sessions for the given devices.
127
- *
128
- * @param devicesByUser - map from userid to list of devices to ensure sessions for
129
- *
130
- * @param force - If true, establish a new session even if one
131
- * already exists.
132
- *
133
- * @param otkTimeout - The timeout in milliseconds when requesting
134
- * one-time keys for establishing new olm sessions.
135
- *
136
- * @param failedServers - An array to fill with remote servers that
137
- * failed to respond to one-time-key requests.
138
- *
139
- * @param log - A possibly customised log
140
- *
141
- * @returns resolves once the sessions are complete, to
142
- * an Object mapping from userId to deviceId to
143
- * {@link OlmSessionResult}
144
- */
145
- function _getExistingOlmSessions() {
146
- _getExistingOlmSessions = _asyncToGenerator(function* (olmDevice, baseApis, devicesByUser) {
147
- // map user Id → DeviceInfo[]
148
- var devicesWithoutSession = new MapWithDefault(() => []);
149
- // map user Id → device Id → IExistingOlmSession
150
- var sessions = new MapWithDefault(() => new Map());
151
- var promises = [];
152
- var _loop = function* _loop(userId) {
153
- var _loop2 = function* _loop2(deviceInfo) {
154
- var deviceId = deviceInfo.deviceId;
155
- var key = deviceInfo.getIdentityKey();
156
- promises.push(_asyncToGenerator(function* () {
157
- var sessionId = yield olmDevice.getSessionIdForDevice(key, true);
158
- if (sessionId === null) {
159
- devicesWithoutSession.getOrCreate(userId).push(deviceInfo);
160
- } else {
161
- sessions.getOrCreate(userId).set(deviceId, {
162
- device: deviceInfo,
163
- sessionId: sessionId
164
- });
165
- }
166
- })());
167
- };
168
- for (var deviceInfo of devices) {
169
- yield* _loop2(deviceInfo);
170
- }
171
- };
172
- for (var [userId, devices] of Object.entries(devicesByUser)) {
173
- yield* _loop(userId);
174
- }
175
- yield Promise.all(promises);
176
- return [devicesWithoutSession, sessions];
177
- });
178
- return _getExistingOlmSessions.apply(this, arguments);
179
- }
180
- export function ensureOlmSessionsForDevices(_x11, _x12, _x13) {
181
- return _ensureOlmSessionsForDevices.apply(this, arguments);
182
- }
183
- function _ensureOlmSessionsForDevices() {
184
- _ensureOlmSessionsForDevices = _asyncToGenerator(function* (olmDevice, baseApis, devicesByUser) {
185
- var force = arguments.length > 3 && arguments[3] !== undefined ? arguments[3] : false;
186
- var otkTimeout = arguments.length > 4 ? arguments[4] : undefined;
187
- var failedServers = arguments.length > 5 ? arguments[5] : undefined;
188
- var log = arguments.length > 6 && arguments[6] !== undefined ? arguments[6] : logger;
189
- var devicesWithoutSession = [
190
- // [userId, deviceId], ...
191
- ];
192
- // map user Id → device Id → IExistingOlmSession
193
- var result = new Map();
194
- // map device key → resolve session fn
195
- var resolveSession = new Map();
196
-
197
- // Mark all sessions this task intends to update as in progress. It is
198
- // important to do this for all devices this task cares about in a single
199
- // synchronous operation, as otherwise it is possible to have deadlocks
200
- // where multiple tasks wait indefinitely on another task to update some set
201
- // of common devices.
202
- for (var devices of devicesByUser.values()) {
203
- var _loop3 = function* _loop3() {
204
- var key = deviceInfo.getIdentityKey();
205
- if (key === olmDevice.deviceCurve25519Key) {
206
- // We don't start sessions with ourself, so there's no need to
207
- // mark it in progress.
208
- return 1; // continue
209
- }
210
- if (!olmDevice.sessionsInProgress[key]) {
211
- // pre-emptively mark the session as in-progress to avoid race
212
- // conditions. If we find that we already have a session, then
213
- // we'll resolve
214
- olmDevice.sessionsInProgress[key] = new Promise(resolve => {
215
- resolveSession.set(key, v => {
216
- delete olmDevice.sessionsInProgress[key];
217
- resolve(v);
218
- });
219
- });
220
- }
221
- };
222
- for (var deviceInfo of devices) {
223
- if (yield* _loop3()) continue;
224
- }
225
- }
226
- for (var [userId, _devices] of devicesByUser) {
227
- var resultDevices = new Map();
228
- result.set(userId, resultDevices);
229
- for (var _deviceInfo of _devices) {
230
- var deviceId = _deviceInfo.deviceId;
231
- var key = _deviceInfo.getIdentityKey();
232
- if (key === olmDevice.deviceCurve25519Key) {
233
- // We should never be trying to start a session with ourself.
234
- // Apart from talking to yourself being the first sign of madness,
235
- // olm sessions can't do this because they get confused when
236
- // they get a message and see that the 'other side' has started a
237
- // new chain when this side has an active sender chain.
238
- // If you see this message being logged in the wild, we should find
239
- // the thing that is trying to send Olm messages to itself and fix it.
240
- log.info("Attempted to start session with ourself! Ignoring");
241
- // We must fill in the section in the return value though, as callers
242
- // expect it to be there.
243
- resultDevices.set(deviceId, {
244
- device: _deviceInfo,
245
- sessionId: null
246
- });
247
- continue;
248
- }
249
- var forWhom = "for ".concat(key, " (").concat(userId, ":").concat(deviceId, ")");
250
- var sessionId = yield olmDevice.getSessionIdForDevice(key, !!resolveSession.get(key), log);
251
- var resolveSessionFn = resolveSession.get(key);
252
- if (sessionId !== null && resolveSessionFn) {
253
- // we found a session, but we had marked the session as
254
- // in-progress, so resolve it now, which will unmark it and
255
- // unblock anything that was waiting
256
- resolveSessionFn();
257
- }
258
- if (sessionId === null || force) {
259
- if (force) {
260
- log.info("Forcing new Olm session ".concat(forWhom));
261
- } else {
262
- log.info("Making new Olm session ".concat(forWhom));
263
- }
264
- devicesWithoutSession.push([userId, deviceId]);
265
- }
266
- resultDevices.set(deviceId, {
267
- device: _deviceInfo,
268
- sessionId: sessionId
269
- });
270
- }
271
- }
272
- if (devicesWithoutSession.length === 0) {
273
- return result;
274
- }
275
- var oneTimeKeyAlgorithm = "signed_curve25519";
276
- var res;
277
- var taskDetail = "one-time keys for ".concat(devicesWithoutSession.length, " devices");
278
- try {
279
- log.debug("Claiming ".concat(taskDetail));
280
- res = yield baseApis.claimOneTimeKeys(devicesWithoutSession, oneTimeKeyAlgorithm, otkTimeout);
281
- log.debug("Claimed ".concat(taskDetail));
282
- } catch (e) {
283
- for (var resolver of resolveSession.values()) {
284
- resolver();
285
- }
286
- log.debug("Failed to claim ".concat(taskDetail), e, devicesWithoutSession);
287
- throw e;
288
- }
289
- if (failedServers && "failures" in res) {
290
- failedServers.push(...Object.keys(res.failures));
291
- }
292
- var otkResult = res.one_time_keys || {};
293
- var promises = [];
294
- var _loop4 = function* _loop4(_userId) {
295
- var userRes = otkResult[_userId] || {};
296
- var _loop5 = function* _loop5() {
297
- var _result$get;
298
- var deviceId = _deviceInfo2.deviceId;
299
- var key = _deviceInfo2.getIdentityKey();
300
- if (key === olmDevice.deviceCurve25519Key) {
301
- // We've already logged about this above. Skip here too
302
- // otherwise we'll log saying there are no one-time keys
303
- // which will be confusing.
304
- return 0; // continue
305
- }
306
- if ((_result$get = result.get(_userId)) !== null && _result$get !== void 0 && (_result$get = _result$get.get(deviceId)) !== null && _result$get !== void 0 && _result$get.sessionId && !force) {
307
- // we already have a result for this device
308
- return 0; // continue
309
- }
310
- var deviceRes = userRes[deviceId] || {};
311
- var oneTimeKey = null;
312
- for (var keyId in deviceRes) {
313
- if (keyId.indexOf(oneTimeKeyAlgorithm + ":") === 0) {
314
- oneTimeKey = deviceRes[keyId];
315
- }
316
- }
317
- if (!oneTimeKey) {
318
- var _resolveSession$get;
319
- log.warn("No one-time keys (alg=".concat(oneTimeKeyAlgorithm, ") ") + "for device ".concat(_userId, ":").concat(deviceId));
320
- (_resolveSession$get = resolveSession.get(key)) === null || _resolveSession$get === void 0 || _resolveSession$get();
321
- return 0; // continue
322
- }
323
- promises.push(_verifyKeyAndStartSession(olmDevice, oneTimeKey, _userId, _deviceInfo2).then(sid => {
324
- var _resolveSession$get2, _result$get2;
325
- (_resolveSession$get2 = resolveSession.get(key)) === null || _resolveSession$get2 === void 0 || _resolveSession$get2(sid !== null && sid !== void 0 ? sid : undefined);
326
- var deviceInfo = (_result$get2 = result.get(_userId)) === null || _result$get2 === void 0 ? void 0 : _result$get2.get(deviceId);
327
- if (deviceInfo) deviceInfo.sessionId = sid;
328
- }, e => {
329
- var _resolveSession$get3;
330
- (_resolveSession$get3 = resolveSession.get(key)) === null || _resolveSession$get3 === void 0 || _resolveSession$get3();
331
- throw e;
332
- }));
333
- },
334
- _ret;
335
- for (var _deviceInfo2 of _devices2) {
336
- _ret = yield* _loop5();
337
- if (_ret === 0) continue;
338
- }
339
- };
340
- for (var [_userId, _devices2] of devicesByUser) {
341
- yield* _loop4(_userId);
342
- }
343
- taskDetail = "Olm sessions for ".concat(promises.length, " devices");
344
- log.debug("Starting ".concat(taskDetail));
345
- yield Promise.all(promises);
346
- log.debug("Started ".concat(taskDetail));
347
- return result;
348
- });
349
- return _ensureOlmSessionsForDevices.apply(this, arguments);
350
- }
351
- function _verifyKeyAndStartSession(_x14, _x15, _x16, _x17) {
352
- return _verifyKeyAndStartSession2.apply(this, arguments);
353
- }
354
- function _verifyKeyAndStartSession2() {
355
- _verifyKeyAndStartSession2 = _asyncToGenerator(function* (olmDevice, oneTimeKey, userId, deviceInfo) {
356
- var deviceId = deviceInfo.deviceId;
357
- try {
358
- yield verifySignature(olmDevice, oneTimeKey, userId, deviceId, deviceInfo.getFingerprint());
359
- } catch (e) {
360
- logger.error("Unable to verify signature on one-time key for device " + userId + ":" + deviceId + ":", e);
361
- return null;
362
- }
363
- var sid;
364
- try {
365
- sid = yield olmDevice.createOutboundSession(deviceInfo.getIdentityKey(), oneTimeKey.key);
366
- } catch (e) {
367
- // possibly a bad key
368
- logger.error("Error starting olm session with device " + userId + ":" + deviceId + ": " + e);
369
- return null;
370
- }
371
- logger.log("Started new olm sessionid " + sid + " for device " + userId + ":" + deviceId);
372
- return sid;
373
- });
374
- return _verifyKeyAndStartSession2.apply(this, arguments);
375
- }
376
- /**
377
- * Verify the signature on an object
378
- *
379
- * @param olmDevice - olm wrapper to use for verify op
380
- *
381
- * @param obj - object to check signature on.
382
- *
383
- * @param signingUserId - ID of the user whose signature should be checked
384
- *
385
- * @param signingDeviceId - ID of the device whose signature should be checked
386
- *
387
- * @param signingKey - base64-ed ed25519 public key
388
- *
389
- * Returns a promise which resolves (to undefined) if the the signature is good,
390
- * or rejects with an Error if it is bad.
391
- */
392
- export function verifySignature(_x18, _x19, _x20, _x21, _x22) {
393
- return _verifySignature.apply(this, arguments);
394
- }
395
-
396
- /**
397
- * Sign a JSON object using public key cryptography
398
- * @param obj - Object to sign. The object will be modified to include
399
- * the new signature
400
- * @param key - the signing object or the private key
401
- * seed
402
- * @param userId - The user ID who owns the signing key
403
- * @param pubKey - The public key (ignored if key is a seed)
404
- * @returns the signature for the object
405
- */
406
- function _verifySignature() {
407
- _verifySignature = _asyncToGenerator(function* (olmDevice, obj, signingUserId, signingDeviceId, signingKey) {
408
- var signKeyId = "ed25519:" + signingDeviceId;
409
- var signatures = obj.signatures || {};
410
- var userSigs = signatures[signingUserId] || {};
411
- var signature = userSigs[signKeyId];
412
- if (!signature) {
413
- throw Error("No signature");
414
- }
415
-
416
- // prepare the canonical json: remove unsigned and signatures, and stringify with anotherjson
417
- var mangledObj = Object.assign({}, obj);
418
- if ("unsigned" in mangledObj) {
419
- delete mangledObj.unsigned;
420
- }
421
- delete mangledObj.signatures;
422
- var json = anotherjson.stringify(mangledObj);
423
- olmDevice.verifySignature(signingKey, json, signature);
424
- });
425
- return _verifySignature.apply(this, arguments);
426
- }
427
- export function pkSign(obj, key, userId, pubKey) {
428
- var createdKey = false;
429
- if (key instanceof Uint8Array) {
430
- var keyObj = new globalThis.Olm.PkSigning();
431
- pubKey = keyObj.init_with_seed(key);
432
- key = keyObj;
433
- createdKey = true;
434
- }
435
- var sigs = obj.signatures || {};
436
- delete obj.signatures;
437
- var unsigned = obj.unsigned;
438
- if (obj.unsigned) delete obj.unsigned;
439
- try {
440
- var mysigs = sigs[userId] || {};
441
- sigs[userId] = mysigs;
442
- return mysigs["ed25519:" + pubKey] = key.sign(anotherjson.stringify(obj));
443
- } finally {
444
- obj.signatures = sigs;
445
- if (unsigned) obj.unsigned = unsigned;
446
- if (createdKey) {
447
- key.free();
448
- }
449
- }
450
- }
451
-
452
- /**
453
- * Verify a signed JSON object
454
- * @param obj - Object to verify
455
- * @param pubKey - The public key to use to verify
456
- * @param userId - The user ID who signed the object
457
- */
458
- export function pkVerify(obj, pubKey, userId) {
459
- var keyId = "ed25519:" + pubKey;
460
- if (!(obj.signatures && obj.signatures[userId] && obj.signatures[userId][keyId])) {
461
- throw new Error("No signature");
462
- }
463
- var signature = obj.signatures[userId][keyId];
464
- var util = new globalThis.Olm.Utility();
465
- var sigs = obj.signatures;
466
- delete obj.signatures;
467
- var unsigned = obj.unsigned;
468
- if (obj.unsigned) delete obj.unsigned;
469
- try {
470
- util.ed25519_verify(pubKey, anotherjson.stringify(obj), signature);
471
- } finally {
472
- obj.signatures = sigs;
473
- if (unsigned) obj.unsigned = unsigned;
474
- util.free();
475
- }
476
- }
477
-
478
- /**
479
- * Check that an event was encrypted using olm.
480
- */
481
- export function isOlmEncrypted(event) {
482
- if (!event.getSenderKey()) {
483
- logger.error("Event has no sender key (not encrypted?)");
484
- return false;
485
- }
486
- if (event.getWireType() !== EventType.RoomMessageEncrypted || !["m.olm.v1.curve25519-aes-sha2"].includes(event.getWireContent().algorithm)) {
487
- logger.error("Event was not encrypted using an appropriate algorithm");
488
- return false;
489
- }
490
- return true;
491
- }
492
- //# sourceMappingURL=olmlib.js.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"olmlib.js","names":["anotherjson","logger","EventType","MapWithDefault","Algorithm","OLM_ALGORITHM","Olm","MEGOLM_ALGORITHM","Megolm","MEGOLM_BACKUP_ALGORITHM","MegolmBackup","encryptMessageForDevice","_x","_x2","_x3","_x4","_x5","_x6","_x7","_encryptMessageForDevice","apply","arguments","_asyncToGenerator","resultsObject","ourUserId","ourDeviceId","olmDevice","recipientUserId","recipientDevice","payloadFields","deviceKey","getIdentityKey","sessionId","getSessionIdForDevice","log","concat","deviceId","payload","_objectSpread","sender","sender_device","keys","ed25519","deviceEd25519Key","recipient","recipient_keys","getFingerprint","encryptMessage","JSON","stringify","getExistingOlmSessions","_x8","_x9","_x10","_getExistingOlmSessions","baseApis","devicesByUser","devicesWithoutSession","sessions","Map","promises","_loop","userId","_loop2","deviceInfo","key","push","getOrCreate","set","device","devices","Object","entries","Promise","all","ensureOlmSessionsForDevices","_x11","_x12","_x13","_ensureOlmSessionsForDevices","force","length","undefined","otkTimeout","failedServers","result","resolveSession","values","_loop3","deviceCurve25519Key","sessionsInProgress","resolve","v","resultDevices","info","forWhom","get","resolveSessionFn","oneTimeKeyAlgorithm","res","taskDetail","debug","claimOneTimeKeys","e","resolver","failures","otkResult","one_time_keys","_loop4","_userId","userRes","_loop5","_result$get","deviceRes","oneTimeKey","keyId","indexOf","_resolveSession$get","warn","_verifyKeyAndStartSession","then","sid","_resolveSession$get2","_result$get2","_resolveSession$get3","_ret","_x14","_x15","_x16","_x17","_verifyKeyAndStartSession2","verifySignature","error","createOutboundSession","_x18","_x19","_x20","_x21","_x22","_verifySignature","obj","signingUserId","signingDeviceId","signingKey","signKeyId","signatures","userSigs","signature","Error","mangledObj","assign","unsigned","json","pkSign","pubKey","createdKey","Uint8Array","keyObj","globalThis","PkSigning","init_with_seed","sigs","mysigs","sign","free","pkVerify","util","Utility","ed25519_verify","isOlmEncrypted","event","getSenderKey","getWireType","RoomMessageEncrypted","includes","getWireContent","algorithm"],"sources":["../../src/crypto/olmlib.ts"],"sourcesContent":["/*\nCopyright 2016 - 2021 The Matrix.org Foundation C.I.C.\n\nLicensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at\n\n http://www.apache.org/licenses/LICENSE-2.0\n\nUnless required by applicable law or agreed to in writing, software\ndistributed under the License is distributed on an \"AS IS\" BASIS,\nWITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\nSee the License for the specific language governing permissions and\nlimitations under the License.\n*/\n\n/**\n * Utilities common to olm encryption algorithms\n */\n\nimport anotherjson from \"another-json\";\n\nimport type { PkSigning } from \"@matrix-org/olm\";\nimport type { IOneTimeKey } from \"../@types/crypto.ts\";\nimport { OlmDevice } from \"./OlmDevice.ts\";\nimport { DeviceInfo } from \"./deviceinfo.ts\";\nimport { Logger, logger } from \"../logger.ts\";\nimport { IClaimOTKsResult, MatrixClient } from \"../client.ts\";\nimport { ISignatures } from \"../@types/signed.ts\";\nimport { MatrixEvent } from \"../models/event.ts\";\nimport { EventType } from \"../@types/event.ts\";\nimport { IMessage } from \"./algorithms/olm.ts\";\nimport { MapWithDefault } from \"../utils.ts\";\n\nenum Algorithm {\n Olm = \"m.olm.v1.curve25519-aes-sha2\",\n Megolm = \"m.megolm.v1.aes-sha2\",\n MegolmBackup = \"m.megolm_backup.v1.curve25519-aes-sha2\",\n}\n\n/**\n * matrix algorithm tag for olm\n */\nexport const OLM_ALGORITHM = Algorithm.Olm;\n\n/**\n * matrix algorithm tag for megolm\n */\nexport const MEGOLM_ALGORITHM = Algorithm.Megolm;\n\n/**\n * matrix algorithm tag for megolm backups\n */\nexport const MEGOLM_BACKUP_ALGORITHM = Algorithm.MegolmBackup;\n\nexport interface IOlmSessionResult {\n /** device info */\n device: DeviceInfo;\n /** base64 olm session id; null if no session could be established */\n sessionId: string | null;\n}\n\n/**\n * Encrypt an event payload for an Olm device\n *\n * @param resultsObject - The `ciphertext` property\n * of the m.room.encrypted event to which to add our result\n *\n * @param olmDevice - olm.js wrapper\n * @param payloadFields - fields to include in the encrypted payload\n *\n * Returns a promise which resolves (to undefined) when the payload\n * has been encrypted into `resultsObject`\n */\nexport async function encryptMessageForDevice(\n resultsObject: Record<string, IMessage>,\n ourUserId: string,\n ourDeviceId: string | undefined,\n olmDevice: OlmDevice,\n recipientUserId: string,\n recipientDevice: DeviceInfo,\n payloadFields: Record<string, any>,\n): Promise<void> {\n const deviceKey = recipientDevice.getIdentityKey();\n const sessionId = await olmDevice.getSessionIdForDevice(deviceKey);\n if (sessionId === null) {\n // If we don't have a session for a device then\n // we can't encrypt a message for it.\n logger.log(\n `[olmlib.encryptMessageForDevice] Unable to find Olm session for device ` +\n `${recipientUserId}:${recipientDevice.deviceId}`,\n );\n return;\n }\n\n logger.log(\n `[olmlib.encryptMessageForDevice] Using Olm session ${sessionId} for device ` +\n `${recipientUserId}:${recipientDevice.deviceId}`,\n );\n\n const payload = {\n sender: ourUserId,\n // TODO this appears to no longer be used whatsoever\n sender_device: ourDeviceId,\n\n // Include the Ed25519 key so that the recipient knows what\n // device this message came from.\n // We don't need to include the curve25519 key since the\n // recipient will already know this from the olm headers.\n // When combined with the device keys retrieved from the\n // homeserver signed by the ed25519 key this proves that\n // the curve25519 key and the ed25519 key are owned by\n // the same device.\n keys: {\n ed25519: olmDevice.deviceEd25519Key,\n },\n\n // include the recipient device details in the payload,\n // to avoid unknown key attacks, per\n // https://github.com/vector-im/vector-web/issues/2483\n recipient: recipientUserId,\n recipient_keys: {\n ed25519: recipientDevice.getFingerprint(),\n },\n ...payloadFields,\n };\n\n // TODO: technically, a bunch of that stuff only needs to be included for\n // pre-key messages: after that, both sides know exactly which devices are\n // involved in the session. If we're looking to reduce data transfer in the\n // future, we could elide them for subsequent messages.\n\n resultsObject[deviceKey] = await olmDevice.encryptMessage(deviceKey, sessionId, JSON.stringify(payload));\n}\n\ninterface IExistingOlmSession {\n device: DeviceInfo;\n sessionId: string | null;\n}\n\n/**\n * Get the existing olm sessions for the given devices, and the devices that\n * don't have olm sessions.\n *\n *\n *\n * @param devicesByUser - map from userid to list of devices to ensure sessions for\n *\n * @returns resolves to an array. The first element of the array is a\n * a map of user IDs to arrays of deviceInfo, representing the devices that\n * don't have established olm sessions. The second element of the array is\n * a map from userId to deviceId to {@link OlmSessionResult}\n */\nexport async function getExistingOlmSessions(\n olmDevice: OlmDevice,\n baseApis: MatrixClient,\n devicesByUser: Record<string, DeviceInfo[]>,\n): Promise<[Map<string, DeviceInfo[]>, Map<string, Map<string, IExistingOlmSession>>]> {\n // map user Id → DeviceInfo[]\n const devicesWithoutSession: MapWithDefault<string, DeviceInfo[]> = new MapWithDefault(() => []);\n // map user Id → device Id → IExistingOlmSession\n const sessions: MapWithDefault<string, Map<string, IExistingOlmSession>> = new MapWithDefault(() => new Map());\n\n const promises: Promise<void>[] = [];\n\n for (const [userId, devices] of Object.entries(devicesByUser)) {\n for (const deviceInfo of devices) {\n const deviceId = deviceInfo.deviceId;\n const key = deviceInfo.getIdentityKey();\n promises.push(\n (async (): Promise<void> => {\n const sessionId = await olmDevice.getSessionIdForDevice(key, true);\n if (sessionId === null) {\n devicesWithoutSession.getOrCreate(userId).push(deviceInfo);\n } else {\n sessions.getOrCreate(userId).set(deviceId, {\n device: deviceInfo,\n sessionId: sessionId,\n });\n }\n })(),\n );\n }\n }\n\n await Promise.all(promises);\n\n return [devicesWithoutSession, sessions];\n}\n\n/**\n * Try to make sure we have established olm sessions for the given devices.\n *\n * @param devicesByUser - map from userid to list of devices to ensure sessions for\n *\n * @param force - If true, establish a new session even if one\n * already exists.\n *\n * @param otkTimeout - The timeout in milliseconds when requesting\n * one-time keys for establishing new olm sessions.\n *\n * @param failedServers - An array to fill with remote servers that\n * failed to respond to one-time-key requests.\n *\n * @param log - A possibly customised log\n *\n * @returns resolves once the sessions are complete, to\n * an Object mapping from userId to deviceId to\n * {@link OlmSessionResult}\n */\nexport async function ensureOlmSessionsForDevices(\n olmDevice: OlmDevice,\n baseApis: MatrixClient,\n devicesByUser: Map<string, DeviceInfo[]>,\n force = false,\n otkTimeout?: number,\n failedServers?: string[],\n log: Logger = logger,\n): Promise<Map<string, Map<string, IOlmSessionResult>>> {\n const devicesWithoutSession: [string, string][] = [\n // [userId, deviceId], ...\n ];\n // map user Id → device Id → IExistingOlmSession\n const result: Map<string, Map<string, IExistingOlmSession>> = new Map();\n // map device key → resolve session fn\n const resolveSession: Map<string, (sessionId?: string) => void> = new Map();\n\n // Mark all sessions this task intends to update as in progress. It is\n // important to do this for all devices this task cares about in a single\n // synchronous operation, as otherwise it is possible to have deadlocks\n // where multiple tasks wait indefinitely on another task to update some set\n // of common devices.\n for (const devices of devicesByUser.values()) {\n for (const deviceInfo of devices) {\n const key = deviceInfo.getIdentityKey();\n\n if (key === olmDevice.deviceCurve25519Key) {\n // We don't start sessions with ourself, so there's no need to\n // mark it in progress.\n continue;\n }\n\n if (!olmDevice.sessionsInProgress[key]) {\n // pre-emptively mark the session as in-progress to avoid race\n // conditions. If we find that we already have a session, then\n // we'll resolve\n olmDevice.sessionsInProgress[key] = new Promise((resolve) => {\n resolveSession.set(key, (v: any): void => {\n delete olmDevice.sessionsInProgress[key];\n resolve(v);\n });\n });\n }\n }\n }\n\n for (const [userId, devices] of devicesByUser) {\n const resultDevices = new Map();\n result.set(userId, resultDevices);\n\n for (const deviceInfo of devices) {\n const deviceId = deviceInfo.deviceId;\n const key = deviceInfo.getIdentityKey();\n\n if (key === olmDevice.deviceCurve25519Key) {\n // We should never be trying to start a session with ourself.\n // Apart from talking to yourself being the first sign of madness,\n // olm sessions can't do this because they get confused when\n // they get a message and see that the 'other side' has started a\n // new chain when this side has an active sender chain.\n // If you see this message being logged in the wild, we should find\n // the thing that is trying to send Olm messages to itself and fix it.\n log.info(\"Attempted to start session with ourself! Ignoring\");\n // We must fill in the section in the return value though, as callers\n // expect it to be there.\n resultDevices.set(deviceId, {\n device: deviceInfo,\n sessionId: null,\n });\n continue;\n }\n\n const forWhom = `for ${key} (${userId}:${deviceId})`;\n const sessionId = await olmDevice.getSessionIdForDevice(key, !!resolveSession.get(key), log);\n const resolveSessionFn = resolveSession.get(key);\n if (sessionId !== null && resolveSessionFn) {\n // we found a session, but we had marked the session as\n // in-progress, so resolve it now, which will unmark it and\n // unblock anything that was waiting\n resolveSessionFn();\n }\n if (sessionId === null || force) {\n if (force) {\n log.info(`Forcing new Olm session ${forWhom}`);\n } else {\n log.info(`Making new Olm session ${forWhom}`);\n }\n devicesWithoutSession.push([userId, deviceId]);\n }\n resultDevices.set(deviceId, {\n device: deviceInfo,\n sessionId: sessionId,\n });\n }\n }\n\n if (devicesWithoutSession.length === 0) {\n return result;\n }\n\n const oneTimeKeyAlgorithm = \"signed_curve25519\";\n let res: IClaimOTKsResult;\n let taskDetail = `one-time keys for ${devicesWithoutSession.length} devices`;\n try {\n log.debug(`Claiming ${taskDetail}`);\n res = await baseApis.claimOneTimeKeys(devicesWithoutSession, oneTimeKeyAlgorithm, otkTimeout);\n log.debug(`Claimed ${taskDetail}`);\n } catch (e) {\n for (const resolver of resolveSession.values()) {\n resolver();\n }\n log.debug(`Failed to claim ${taskDetail}`, e, devicesWithoutSession);\n throw e;\n }\n\n if (failedServers && \"failures\" in res) {\n failedServers.push(...Object.keys(res.failures));\n }\n\n const otkResult = res.one_time_keys || ({} as IClaimOTKsResult[\"one_time_keys\"]);\n const promises: Promise<void>[] = [];\n for (const [userId, devices] of devicesByUser) {\n const userRes = otkResult[userId] || {};\n for (const deviceInfo of devices) {\n const deviceId = deviceInfo.deviceId;\n const key = deviceInfo.getIdentityKey();\n\n if (key === olmDevice.deviceCurve25519Key) {\n // We've already logged about this above. Skip here too\n // otherwise we'll log saying there are no one-time keys\n // which will be confusing.\n continue;\n }\n\n if (result.get(userId)?.get(deviceId)?.sessionId && !force) {\n // we already have a result for this device\n continue;\n }\n\n const deviceRes = userRes[deviceId] || {};\n let oneTimeKey: IOneTimeKey | null = null;\n for (const keyId in deviceRes) {\n if (keyId.indexOf(oneTimeKeyAlgorithm + \":\") === 0) {\n oneTimeKey = deviceRes[keyId];\n }\n }\n\n if (!oneTimeKey) {\n log.warn(`No one-time keys (alg=${oneTimeKeyAlgorithm}) ` + `for device ${userId}:${deviceId}`);\n resolveSession.get(key)?.();\n continue;\n }\n\n promises.push(\n _verifyKeyAndStartSession(olmDevice, oneTimeKey, userId, deviceInfo).then(\n (sid) => {\n resolveSession.get(key)?.(sid ?? undefined);\n const deviceInfo = result.get(userId)?.get(deviceId);\n if (deviceInfo) deviceInfo.sessionId = sid;\n },\n (e) => {\n resolveSession.get(key)?.();\n throw e;\n },\n ),\n );\n }\n }\n\n taskDetail = `Olm sessions for ${promises.length} devices`;\n log.debug(`Starting ${taskDetail}`);\n await Promise.all(promises);\n log.debug(`Started ${taskDetail}`);\n return result;\n}\n\nasync function _verifyKeyAndStartSession(\n olmDevice: OlmDevice,\n oneTimeKey: IOneTimeKey,\n userId: string,\n deviceInfo: DeviceInfo,\n): Promise<string | null> {\n const deviceId = deviceInfo.deviceId;\n try {\n await verifySignature(olmDevice, oneTimeKey, userId, deviceId, deviceInfo.getFingerprint());\n } catch (e) {\n logger.error(\"Unable to verify signature on one-time key for device \" + userId + \":\" + deviceId + \":\", e);\n return null;\n }\n\n let sid;\n try {\n sid = await olmDevice.createOutboundSession(deviceInfo.getIdentityKey(), oneTimeKey.key);\n } catch (e) {\n // possibly a bad key\n logger.error(\"Error starting olm session with device \" + userId + \":\" + deviceId + \": \" + e);\n return null;\n }\n\n logger.log(\"Started new olm sessionid \" + sid + \" for device \" + userId + \":\" + deviceId);\n return sid;\n}\n\nexport interface IObject {\n unsigned?: object;\n signatures?: ISignatures;\n}\n\n/**\n * Verify the signature on an object\n *\n * @param olmDevice - olm wrapper to use for verify op\n *\n * @param obj - object to check signature on.\n *\n * @param signingUserId - ID of the user whose signature should be checked\n *\n * @param signingDeviceId - ID of the device whose signature should be checked\n *\n * @param signingKey - base64-ed ed25519 public key\n *\n * Returns a promise which resolves (to undefined) if the the signature is good,\n * or rejects with an Error if it is bad.\n */\nexport async function verifySignature(\n olmDevice: OlmDevice,\n obj: IOneTimeKey | IObject,\n signingUserId: string,\n signingDeviceId: string,\n signingKey: string,\n): Promise<void> {\n const signKeyId = \"ed25519:\" + signingDeviceId;\n const signatures = obj.signatures || {};\n const userSigs = signatures[signingUserId] || {};\n const signature = userSigs[signKeyId];\n if (!signature) {\n throw Error(\"No signature\");\n }\n\n // prepare the canonical json: remove unsigned and signatures, and stringify with anotherjson\n const mangledObj = Object.assign({}, obj);\n if (\"unsigned\" in mangledObj) {\n delete mangledObj.unsigned;\n }\n delete mangledObj.signatures;\n const json = anotherjson.stringify(mangledObj);\n\n olmDevice.verifySignature(signingKey, json, signature);\n}\n\n/**\n * Sign a JSON object using public key cryptography\n * @param obj - Object to sign. The object will be modified to include\n * the new signature\n * @param key - the signing object or the private key\n * seed\n * @param userId - The user ID who owns the signing key\n * @param pubKey - The public key (ignored if key is a seed)\n * @returns the signature for the object\n */\nexport function pkSign(obj: object & IObject, key: Uint8Array | PkSigning, userId: string, pubKey: string): string {\n let createdKey = false;\n if (key instanceof Uint8Array) {\n const keyObj = new globalThis.Olm.PkSigning();\n pubKey = keyObj.init_with_seed(key);\n key = keyObj;\n createdKey = true;\n }\n const sigs = obj.signatures || {};\n delete obj.signatures;\n const unsigned = obj.unsigned;\n if (obj.unsigned) delete obj.unsigned;\n try {\n const mysigs = sigs[userId] || {};\n sigs[userId] = mysigs;\n\n return (mysigs[\"ed25519:\" + pubKey] = key.sign(anotherjson.stringify(obj)));\n } finally {\n obj.signatures = sigs;\n if (unsigned) obj.unsigned = unsigned;\n if (createdKey) {\n key.free();\n }\n }\n}\n\n/**\n * Verify a signed JSON object\n * @param obj - Object to verify\n * @param pubKey - The public key to use to verify\n * @param userId - The user ID who signed the object\n */\nexport function pkVerify(obj: IObject, pubKey: string, userId: string): void {\n const keyId = \"ed25519:\" + pubKey;\n if (!(obj.signatures && obj.signatures[userId] && obj.signatures[userId][keyId])) {\n throw new Error(\"No signature\");\n }\n const signature = obj.signatures[userId][keyId];\n const util = new globalThis.Olm.Utility();\n const sigs = obj.signatures;\n delete obj.signatures;\n const unsigned = obj.unsigned;\n if (obj.unsigned) delete obj.unsigned;\n try {\n util.ed25519_verify(pubKey, anotherjson.stringify(obj), signature);\n } finally {\n obj.signatures = sigs;\n if (unsigned) obj.unsigned = unsigned;\n util.free();\n }\n}\n\n/**\n * Check that an event was encrypted using olm.\n */\nexport function isOlmEncrypted(event: MatrixEvent): boolean {\n if (!event.getSenderKey()) {\n logger.error(\"Event has no sender key (not encrypted?)\");\n return false;\n }\n if (\n event.getWireType() !== EventType.RoomMessageEncrypted ||\n ![\"m.olm.v1.curve25519-aes-sha2\"].includes(event.getWireContent().algorithm)\n ) {\n logger.error(\"Event was not encrypted using an appropriate algorithm\");\n return false;\n }\n return true;\n}\n"],"mappings":";;;;AAAA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;;AAEA;AACA;AACA;;AAEA,OAAOA,WAAW,MAAM,cAAc;AAMtC,SAAiBC,MAAM,QAAQ,cAAc;AAI7C,SAASC,SAAS,QAAQ,oBAAoB;AAE9C,SAASC,cAAc,QAAQ,aAAa;AAAC,IAExCC,SAAS,0BAATA,SAAS;EAATA,SAAS;EAATA,SAAS;EAATA,SAAS;EAAA,OAATA,SAAS;AAAA,EAATA,SAAS;AAMd;AACA;AACA;AACA,OAAO,IAAMC,aAAa,GAAGD,SAAS,CAACE,GAAG;;AAE1C;AACA;AACA;AACA,OAAO,IAAMC,gBAAgB,GAAGH,SAAS,CAACI,MAAM;;AAEhD;AACA;AACA;AACA,OAAO,IAAMC,uBAAuB,GAAGL,SAAS,CAACM,YAAY;AAS7D;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA,gBAAsBC,uBAAuBA,CAAAC,EAAA,EAAAC,GAAA,EAAAC,GAAA,EAAAC,GAAA,EAAAC,GAAA,EAAAC,GAAA,EAAAC,GAAA;EAAA,OAAAC,wBAAA,CAAAC,KAAA,OAAAC,SAAA;AAAA;AA2D5C,SAAAF,yBAAA;EAAAA,wBAAA,GAAAG,iBAAA,CA3DM,WACHC,aAAuC,EACvCC,SAAiB,EACjBC,WAA+B,EAC/BC,SAAoB,EACpBC,eAAuB,EACvBC,eAA2B,EAC3BC,aAAkC,EACrB;IACb,IAAMC,SAAS,GAAGF,eAAe,CAACG,cAAc,CAAC,CAAC;IAClD,IAAMC,SAAS,SAASN,SAAS,CAACO,qBAAqB,CAACH,SAAS,CAAC;IAClE,IAAIE,SAAS,KAAK,IAAI,EAAE;MACpB;MACA;MACA/B,MAAM,CAACiC,GAAG,CACN,+EAAAC,MAAA,CACOR,eAAe,OAAAQ,MAAA,CAAIP,eAAe,CAACQ,QAAQ,CACtD,CAAC;MACD;IACJ;IAEAnC,MAAM,CAACiC,GAAG,CACN,sDAAAC,MAAA,CAAsDH,SAAS,uBAAAG,MAAA,CACxDR,eAAe,OAAAQ,MAAA,CAAIP,eAAe,CAACQ,QAAQ,CACtD,CAAC;IAED,IAAMC,OAAO,GAAAC,aAAA;MACTC,MAAM,EAAEf,SAAS;MACjB;MACAgB,aAAa,EAAEf,WAAW;MAE1B;MACA;MACA;MACA;MACA;MACA;MACA;MACA;MACAgB,IAAI,EAAE;QACFC,OAAO,EAAEhB,SAAS,CAACiB;MACvB,CAAC;MAED;MACA;MACA;MACAC,SAAS,EAAEjB,eAAe;MAC1BkB,cAAc,EAAE;QACZH,OAAO,EAAEd,eAAe,CAACkB,cAAc,CAAC;MAC5C;IAAC,GACEjB,aAAa,CACnB;;IAED;IACA;IACA;IACA;;IAEAN,aAAa,CAACO,SAAS,CAAC,SAASJ,SAAS,CAACqB,cAAc,CAACjB,SAAS,EAAEE,SAAS,EAAEgB,IAAI,CAACC,SAAS,CAACZ,OAAO,CAAC,CAAC;EAC5G,CAAC;EAAA,OAAAlB,wBAAA,CAAAC,KAAA,OAAAC,SAAA;AAAA;AAOD;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA,gBAAsB6B,sBAAsBA,CAAAC,GAAA,EAAAC,GAAA,EAAAC,IAAA;EAAA,OAAAC,uBAAA,CAAAlC,KAAA,OAAAC,SAAA;AAAA;;AAqC5C;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AAnBA,SAAAiC,wBAAA;EAAAA,uBAAA,GAAAhC,iBAAA,CArCO,WACHI,SAAoB,EACpB6B,QAAsB,EACtBC,aAA2C,EACwC;IACnF;IACA,IAAMC,qBAA2D,GAAG,IAAItD,cAAc,CAAC,MAAM,EAAE,CAAC;IAChG;IACA,IAAMuD,QAAkE,GAAG,IAAIvD,cAAc,CAAC,MAAM,IAAIwD,GAAG,CAAC,CAAC,CAAC;IAE9G,IAAMC,QAAyB,GAAG,EAAE;IAAC,IAAAC,KAAA,aAAAA,MAAAC,MAAA,EAE0B;MAAA,IAAAC,MAAA,aAAAA,OAAAC,UAAA,EACzB;QAC9B,IAAM5B,QAAQ,GAAG4B,UAAU,CAAC5B,QAAQ;QACpC,IAAM6B,GAAG,GAAGD,UAAU,CAACjC,cAAc,CAAC,CAAC;QACvC6B,QAAQ,CAACM,IAAI,CACT5C,iBAAA,CAAC,aAA2B;UACxB,IAAMU,SAAS,SAASN,SAAS,CAACO,qBAAqB,CAACgC,GAAG,EAAE,IAAI,CAAC;UAClE,IAAIjC,SAAS,KAAK,IAAI,EAAE;YACpByB,qBAAqB,CAACU,WAAW,CAACL,MAAM,CAAC,CAACI,IAAI,CAACF,UAAU,CAAC;UAC9D,CAAC,MAAM;YACHN,QAAQ,CAACS,WAAW,CAACL,MAAM,CAAC,CAACM,GAAG,CAAChC,QAAQ,EAAE;cACvCiC,MAAM,EAAEL,UAAU;cAClBhC,SAAS,EAAEA;YACf,CAAC,CAAC;UACN;QACJ,CAAC,EAAE,CACP,CAAC;MACL,CAAC;MAhBD,KAAK,IAAMgC,UAAU,IAAIM,OAAO;QAAA,OAAAP,MAAA,CAAAC,UAAA;MAAA;IAiBpC,CAAC;IAlBD,KAAK,IAAM,CAACF,MAAM,EAAEQ,OAAO,CAAC,IAAIC,MAAM,CAACC,OAAO,CAAChB,aAAa,CAAC;MAAA,OAAAK,KAAA,CAAAC,MAAA;IAAA;IAoB7D,MAAMW,OAAO,CAACC,GAAG,CAACd,QAAQ,CAAC;IAE3B,OAAO,CAACH,qBAAqB,EAAEC,QAAQ,CAAC;EAC5C,CAAC;EAAA,OAAAJ,uBAAA,CAAAlC,KAAA,OAAAC,SAAA;AAAA;AAsBD,gBAAsBsD,2BAA2BA,CAAAC,IAAA,EAAAC,IAAA,EAAAC,IAAA;EAAA,OAAAC,4BAAA,CAAA3D,KAAA,OAAAC,SAAA;AAAA;AA8KhD,SAAA0D,6BAAA;EAAAA,4BAAA,GAAAzD,iBAAA,CA9KM,WACHI,SAAoB,EACpB6B,QAAsB,EACtBC,aAAwC,EAKY;IAAA,IAJpDwB,KAAK,GAAA3D,SAAA,CAAA4D,MAAA,QAAA5D,SAAA,QAAA6D,SAAA,GAAA7D,SAAA,MAAG,KAAK;IAAA,IACb8D,UAAmB,GAAA9D,SAAA,CAAA4D,MAAA,OAAA5D,SAAA,MAAA6D,SAAA;IAAA,IACnBE,aAAwB,GAAA/D,SAAA,CAAA4D,MAAA,OAAA5D,SAAA,MAAA6D,SAAA;IAAA,IACxBhD,GAAW,GAAAb,SAAA,CAAA4D,MAAA,QAAA5D,SAAA,QAAA6D,SAAA,GAAA7D,SAAA,MAAGpB,MAAM;IAEpB,IAAMwD,qBAAyC,GAAG;MAC9C;IAAA,CACH;IACD;IACA,IAAM4B,MAAqD,GAAG,IAAI1B,GAAG,CAAC,CAAC;IACvE;IACA,IAAM2B,cAAyD,GAAG,IAAI3B,GAAG,CAAC,CAAC;;IAE3E;IACA;IACA;IACA;IACA;IACA,KAAK,IAAMW,OAAO,IAAId,aAAa,CAAC+B,MAAM,CAAC,CAAC,EAAE;MAAA,IAAAC,MAAA,aAAAA,OAAA,EACR;QAC9B,IAAMvB,GAAG,GAAGD,UAAU,CAACjC,cAAc,CAAC,CAAC;QAEvC,IAAIkC,GAAG,KAAKvC,SAAS,CAAC+D,mBAAmB,EAAE;UACvC;UACA;UAAA;QAEJ;QAEA,IAAI,CAAC/D,SAAS,CAACgE,kBAAkB,CAACzB,GAAG,CAAC,EAAE;UACpC;UACA;UACA;UACAvC,SAAS,CAACgE,kBAAkB,CAACzB,GAAG,CAAC,GAAG,IAAIQ,OAAO,CAAEkB,OAAO,IAAK;YACzDL,cAAc,CAAClB,GAAG,CAACH,GAAG,EAAG2B,CAAM,IAAW;cACtC,OAAOlE,SAAS,CAACgE,kBAAkB,CAACzB,GAAG,CAAC;cACxC0B,OAAO,CAACC,CAAC,CAAC;YACd,CAAC,CAAC;UACN,CAAC,CAAC;QACN;MACJ,CAAC;MApBD,KAAK,IAAM5B,UAAU,IAAIM,OAAO;QAAA,WAAAkB,MAAA,IAMxB;MAAS;IAerB;IAEA,KAAK,IAAM,CAAC1B,MAAM,EAAEQ,QAAO,CAAC,IAAId,aAAa,EAAE;MAC3C,IAAMqC,aAAa,GAAG,IAAIlC,GAAG,CAAC,CAAC;MAC/B0B,MAAM,CAACjB,GAAG,CAACN,MAAM,EAAE+B,aAAa,CAAC;MAEjC,KAAK,IAAM7B,WAAU,IAAIM,QAAO,EAAE;QAC9B,IAAMlC,QAAQ,GAAG4B,WAAU,CAAC5B,QAAQ;QACpC,IAAM6B,GAAG,GAAGD,WAAU,CAACjC,cAAc,CAAC,CAAC;QAEvC,IAAIkC,GAAG,KAAKvC,SAAS,CAAC+D,mBAAmB,EAAE;UACvC;UACA;UACA;UACA;UACA;UACA;UACA;UACAvD,GAAG,CAAC4D,IAAI,CAAC,mDAAmD,CAAC;UAC7D;UACA;UACAD,aAAa,CAACzB,GAAG,CAAChC,QAAQ,EAAE;YACxBiC,MAAM,EAAEL,WAAU;YAClBhC,SAAS,EAAE;UACf,CAAC,CAAC;UACF;QACJ;QAEA,IAAM+D,OAAO,UAAA5D,MAAA,CAAU8B,GAAG,QAAA9B,MAAA,CAAK2B,MAAM,OAAA3B,MAAA,CAAIC,QAAQ,MAAG;QACpD,IAAMJ,SAAS,SAASN,SAAS,CAACO,qBAAqB,CAACgC,GAAG,EAAE,CAAC,CAACqB,cAAc,CAACU,GAAG,CAAC/B,GAAG,CAAC,EAAE/B,GAAG,CAAC;QAC5F,IAAM+D,gBAAgB,GAAGX,cAAc,CAACU,GAAG,CAAC/B,GAAG,CAAC;QAChD,IAAIjC,SAAS,KAAK,IAAI,IAAIiE,gBAAgB,EAAE;UACxC;UACA;UACA;UACAA,gBAAgB,CAAC,CAAC;QACtB;QACA,IAAIjE,SAAS,KAAK,IAAI,IAAIgD,KAAK,EAAE;UAC7B,IAAIA,KAAK,EAAE;YACP9C,GAAG,CAAC4D,IAAI,4BAAA3D,MAAA,CAA4B4D,OAAO,CAAE,CAAC;UAClD,CAAC,MAAM;YACH7D,GAAG,CAAC4D,IAAI,2BAAA3D,MAAA,CAA2B4D,OAAO,CAAE,CAAC;UACjD;UACAtC,qBAAqB,CAACS,IAAI,CAAC,CAACJ,MAAM,EAAE1B,QAAQ,CAAC,CAAC;QAClD;QACAyD,aAAa,CAACzB,GAAG,CAAChC,QAAQ,EAAE;UACxBiC,MAAM,EAAEL,WAAU;UAClBhC,SAAS,EAAEA;QACf,CAAC,CAAC;MACN;IACJ;IAEA,IAAIyB,qBAAqB,CAACwB,MAAM,KAAK,CAAC,EAAE;MACpC,OAAOI,MAAM;IACjB;IAEA,IAAMa,mBAAmB,GAAG,mBAAmB;IAC/C,IAAIC,GAAqB;IACzB,IAAIC,UAAU,wBAAAjE,MAAA,CAAwBsB,qBAAqB,CAACwB,MAAM,aAAU;IAC5E,IAAI;MACA/C,GAAG,CAACmE,KAAK,aAAAlE,MAAA,CAAaiE,UAAU,CAAE,CAAC;MACnCD,GAAG,SAAS5C,QAAQ,CAAC+C,gBAAgB,CAAC7C,qBAAqB,EAAEyC,mBAAmB,EAAEf,UAAU,CAAC;MAC7FjD,GAAG,CAACmE,KAAK,YAAAlE,MAAA,CAAYiE,UAAU,CAAE,CAAC;IACtC,CAAC,CAAC,OAAOG,CAAC,EAAE;MACR,KAAK,IAAMC,QAAQ,IAAIlB,cAAc,CAACC,MAAM,CAAC,CAAC,EAAE;QAC5CiB,QAAQ,CAAC,CAAC;MACd;MACAtE,GAAG,CAACmE,KAAK,oBAAAlE,MAAA,CAAoBiE,UAAU,GAAIG,CAAC,EAAE9C,qBAAqB,CAAC;MACpE,MAAM8C,CAAC;IACX;IAEA,IAAInB,aAAa,IAAI,UAAU,IAAIe,GAAG,EAAE;MACpCf,aAAa,CAAClB,IAAI,CAAC,GAAGK,MAAM,CAAC9B,IAAI,CAAC0D,GAAG,CAACM,QAAQ,CAAC,CAAC;IACpD;IAEA,IAAMC,SAAS,GAAGP,GAAG,CAACQ,aAAa,IAAK,CAAC,CAAuC;IAChF,IAAM/C,QAAyB,GAAG,EAAE;IAAC,IAAAgD,MAAA,aAAAA,OAAAC,OAAA,EACU;MAC3C,IAAMC,OAAO,GAAGJ,SAAS,CAAC5C,OAAM,CAAC,IAAI,CAAC,CAAC;MAAC,IAAAiD,MAAA,aAAAA,OAAA,EACN;UAAA,IAAAC,WAAA;UAC9B,IAAM5E,QAAQ,GAAG4B,YAAU,CAAC5B,QAAQ;UACpC,IAAM6B,GAAG,GAAGD,YAAU,CAACjC,cAAc,CAAC,CAAC;UAEvC,IAAIkC,GAAG,KAAKvC,SAAS,CAAC+D,mBAAmB,EAAE;YACvC;YACA;YACA;YAAA;UAEJ;UAEA,IAAI,CAAAuB,WAAA,GAAA3B,MAAM,CAACW,GAAG,CAAClC,OAAM,CAAC,cAAAkD,WAAA,gBAAAA,WAAA,GAAlBA,WAAA,CAAoBhB,GAAG,CAAC5D,QAAQ,CAAC,cAAA4E,WAAA,eAAjCA,WAAA,CAAmChF,SAAS,IAAI,CAACgD,KAAK,EAAE;YACxD;YAAA;UAEJ;UAEA,IAAMiC,SAAS,GAAGH,OAAO,CAAC1E,QAAQ,CAAC,IAAI,CAAC,CAAC;UACzC,IAAI8E,UAA8B,GAAG,IAAI;UACzC,KAAK,IAAMC,KAAK,IAAIF,SAAS,EAAE;YAC3B,IAAIE,KAAK,CAACC,OAAO,CAAClB,mBAAmB,GAAG,GAAG,CAAC,KAAK,CAAC,EAAE;cAChDgB,UAAU,GAAGD,SAAS,CAACE,KAAK,CAAC;YACjC;UACJ;UAEA,IAAI,CAACD,UAAU,EAAE;YAAA,IAAAG,mBAAA;YACbnF,GAAG,CAACoF,IAAI,CAAC,yBAAAnF,MAAA,CAAyB+D,mBAAmB,wBAAA/D,MAAA,CAAqB2B,OAAM,OAAA3B,MAAA,CAAIC,QAAQ,CAAE,CAAC;YAC/F,CAAAiF,mBAAA,GAAA/B,cAAc,CAACU,GAAG,CAAC/B,GAAG,CAAC,cAAAoD,mBAAA,eAAvBA,mBAAA,CAA0B,CAAC;YAAC;UAEhC;UAEAzD,QAAQ,CAACM,IAAI,CACTqD,yBAAyB,CAAC7F,SAAS,EAAEwF,UAAU,EAAEpD,OAAM,EAAEE,YAAU,CAAC,CAACwD,IAAI,CACpEC,GAAG,IAAK;YAAA,IAAAC,oBAAA,EAAAC,YAAA;YACL,CAAAD,oBAAA,GAAApC,cAAc,CAACU,GAAG,CAAC/B,GAAG,CAAC,cAAAyD,oBAAA,eAAvBA,oBAAA,CAA0BD,GAAG,aAAHA,GAAG,cAAHA,GAAG,GAAIvC,SAAS,CAAC;YAC3C,IAAMlB,UAAU,IAAA2D,YAAA,GAAGtC,MAAM,CAACW,GAAG,CAAClC,OAAM,CAAC,cAAA6D,YAAA,uBAAlBA,YAAA,CAAoB3B,GAAG,CAAC5D,QAAQ,CAAC;YACpD,IAAI4B,UAAU,EAAEA,UAAU,CAAChC,SAAS,GAAGyF,GAAG;UAC9C,CAAC,EACAlB,CAAC,IAAK;YAAA,IAAAqB,oBAAA;YACH,CAAAA,oBAAA,GAAAtC,cAAc,CAACU,GAAG,CAAC/B,GAAG,CAAC,cAAA2D,oBAAA,eAAvBA,oBAAA,CAA0B,CAAC;YAC3B,MAAMrB,CAAC;UACX,CACJ,CACJ,CAAC;QACL,CAAC;QAAAsB,IAAA;MA3CD,KAAK,IAAM7D,YAAU,IAAIM,SAAO;QAAAuD,IAAA,UAAAd,MAAA;QAAA,IAAAc,IAAA,QAQxB;MAAS;IAoCrB,CAAC;IA9CD,KAAK,IAAM,CAAC/D,OAAM,EAAEQ,SAAO,CAAC,IAAId,aAAa;MAAA,OAAAoD,MAAA,CAAAC,OAAA;IAAA;IAgD7CT,UAAU,uBAAAjE,MAAA,CAAuByB,QAAQ,CAACqB,MAAM,aAAU;IAC1D/C,GAAG,CAACmE,KAAK,aAAAlE,MAAA,CAAaiE,UAAU,CAAE,CAAC;IACnC,MAAM3B,OAAO,CAACC,GAAG,CAACd,QAAQ,CAAC;IAC3B1B,GAAG,CAACmE,KAAK,YAAAlE,MAAA,CAAYiE,UAAU,CAAE,CAAC;IAClC,OAAOf,MAAM;EACjB,CAAC;EAAA,OAAAN,4BAAA,CAAA3D,KAAA,OAAAC,SAAA;AAAA;AAAA,SAEckG,yBAAyBA,CAAAO,IAAA,EAAAC,IAAA,EAAAC,IAAA,EAAAC,IAAA;EAAA,OAAAC,0BAAA,CAAA9G,KAAA,OAAAC,SAAA;AAAA;AAAA,SAAA6G,2BAAA;EAAAA,0BAAA,GAAA5G,iBAAA,CAAxC,WACII,SAAoB,EACpBwF,UAAuB,EACvBpD,MAAc,EACdE,UAAsB,EACA;IACtB,IAAM5B,QAAQ,GAAG4B,UAAU,CAAC5B,QAAQ;IACpC,IAAI;MACA,MAAM+F,eAAe,CAACzG,SAAS,EAAEwF,UAAU,EAAEpD,MAAM,EAAE1B,QAAQ,EAAE4B,UAAU,CAAClB,cAAc,CAAC,CAAC,CAAC;IAC/F,CAAC,CAAC,OAAOyD,CAAC,EAAE;MACRtG,MAAM,CAACmI,KAAK,CAAC,wDAAwD,GAAGtE,MAAM,GAAG,GAAG,GAAG1B,QAAQ,GAAG,GAAG,EAAEmE,CAAC,CAAC;MACzG,OAAO,IAAI;IACf;IAEA,IAAIkB,GAAG;IACP,IAAI;MACAA,GAAG,SAAS/F,SAAS,CAAC2G,qBAAqB,CAACrE,UAAU,CAACjC,cAAc,CAAC,CAAC,EAAEmF,UAAU,CAACjD,GAAG,CAAC;IAC5F,CAAC,CAAC,OAAOsC,CAAC,EAAE;MACR;MACAtG,MAAM,CAACmI,KAAK,CAAC,yCAAyC,GAAGtE,MAAM,GAAG,GAAG,GAAG1B,QAAQ,GAAG,IAAI,GAAGmE,CAAC,CAAC;MAC5F,OAAO,IAAI;IACf;IAEAtG,MAAM,CAACiC,GAAG,CAAC,4BAA4B,GAAGuF,GAAG,GAAG,cAAc,GAAG3D,MAAM,GAAG,GAAG,GAAG1B,QAAQ,CAAC;IACzF,OAAOqF,GAAG;EACd,CAAC;EAAA,OAAAS,0BAAA,CAAA9G,KAAA,OAAAC,SAAA;AAAA;AAOD;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA,gBAAsB8G,eAAeA,CAAAG,IAAA,EAAAC,IAAA,EAAAC,IAAA,EAAAC,IAAA,EAAAC,IAAA;EAAA,OAAAC,gBAAA,CAAAvH,KAAA,OAAAC,SAAA;AAAA;;AA0BrC;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AATA,SAAAsH,iBAAA;EAAAA,gBAAA,GAAArH,iBAAA,CA1BO,WACHI,SAAoB,EACpBkH,GAA0B,EAC1BC,aAAqB,EACrBC,eAAuB,EACvBC,UAAkB,EACL;IACb,IAAMC,SAAS,GAAG,UAAU,GAAGF,eAAe;IAC9C,IAAMG,UAAU,GAAGL,GAAG,CAACK,UAAU,IAAI,CAAC,CAAC;IACvC,IAAMC,QAAQ,GAAGD,UAAU,CAACJ,aAAa,CAAC,IAAI,CAAC,CAAC;IAChD,IAAMM,SAAS,GAAGD,QAAQ,CAACF,SAAS,CAAC;IACrC,IAAI,CAACG,SAAS,EAAE;MACZ,MAAMC,KAAK,CAAC,cAAc,CAAC;IAC/B;;IAEA;IACA,IAAMC,UAAU,GAAG9E,MAAM,CAAC+E,MAAM,CAAC,CAAC,CAAC,EAAEV,GAAG,CAAC;IACzC,IAAI,UAAU,IAAIS,UAAU,EAAE;MAC1B,OAAOA,UAAU,CAACE,QAAQ;IAC9B;IACA,OAAOF,UAAU,CAACJ,UAAU;IAC5B,IAAMO,IAAI,GAAGxJ,WAAW,CAACiD,SAAS,CAACoG,UAAU,CAAC;IAE9C3H,SAAS,CAACyG,eAAe,CAACY,UAAU,EAAES,IAAI,EAAEL,SAAS,CAAC;EAC1D,CAAC;EAAA,OAAAR,gBAAA,CAAAvH,KAAA,OAAAC,SAAA;AAAA;AAYD,OAAO,SAASoI,MAAMA,CAACb,GAAqB,EAAE3E,GAA2B,EAAEH,MAAc,EAAE4F,MAAc,EAAU;EAC/G,IAAIC,UAAU,GAAG,KAAK;EACtB,IAAI1F,GAAG,YAAY2F,UAAU,EAAE;IAC3B,IAAMC,MAAM,GAAG,IAAIC,UAAU,CAACxJ,GAAG,CAACyJ,SAAS,CAAC,CAAC;IAC7CL,MAAM,GAAGG,MAAM,CAACG,cAAc,CAAC/F,GAAG,CAAC;IACnCA,GAAG,GAAG4F,MAAM;IACZF,UAAU,GAAG,IAAI;EACrB;EACA,IAAMM,IAAI,GAAGrB,GAAG,CAACK,UAAU,IAAI,CAAC,CAAC;EACjC,OAAOL,GAAG,CAACK,UAAU;EACrB,IAAMM,QAAQ,GAAGX,GAAG,CAACW,QAAQ;EAC7B,IAAIX,GAAG,CAACW,QAAQ,EAAE,OAAOX,GAAG,CAACW,QAAQ;EACrC,IAAI;IACA,IAAMW,MAAM,GAAGD,IAAI,CAACnG,MAAM,CAAC,IAAI,CAAC,CAAC;IACjCmG,IAAI,CAACnG,MAAM,CAAC,GAAGoG,MAAM;IAErB,OAAQA,MAAM,CAAC,UAAU,GAAGR,MAAM,CAAC,GAAGzF,GAAG,CAACkG,IAAI,CAACnK,WAAW,CAACiD,SAAS,CAAC2F,GAAG,CAAC,CAAC;EAC9E,CAAC,SAAS;IACNA,GAAG,CAACK,UAAU,GAAGgB,IAAI;IACrB,IAAIV,QAAQ,EAAEX,GAAG,CAACW,QAAQ,GAAGA,QAAQ;IACrC,IAAII,UAAU,EAAE;MACZ1F,GAAG,CAACmG,IAAI,CAAC,CAAC;IACd;EACJ;AACJ;;AAEA;AACA;AACA;AACA;AACA;AACA;AACA,OAAO,SAASC,QAAQA,CAACzB,GAAY,EAAEc,MAAc,EAAE5F,MAAc,EAAQ;EACzE,IAAMqD,KAAK,GAAG,UAAU,GAAGuC,MAAM;EACjC,IAAI,EAAEd,GAAG,CAACK,UAAU,IAAIL,GAAG,CAACK,UAAU,CAACnF,MAAM,CAAC,IAAI8E,GAAG,CAACK,UAAU,CAACnF,MAAM,CAAC,CAACqD,KAAK,CAAC,CAAC,EAAE;IAC9E,MAAM,IAAIiC,KAAK,CAAC,cAAc,CAAC;EACnC;EACA,IAAMD,SAAS,GAAGP,GAAG,CAACK,UAAU,CAACnF,MAAM,CAAC,CAACqD,KAAK,CAAC;EAC/C,IAAMmD,IAAI,GAAG,IAAIR,UAAU,CAACxJ,GAAG,CAACiK,OAAO,CAAC,CAAC;EACzC,IAAMN,IAAI,GAAGrB,GAAG,CAACK,UAAU;EAC3B,OAAOL,GAAG,CAACK,UAAU;EACrB,IAAMM,QAAQ,GAAGX,GAAG,CAACW,QAAQ;EAC7B,IAAIX,GAAG,CAACW,QAAQ,EAAE,OAAOX,GAAG,CAACW,QAAQ;EACrC,IAAI;IACAe,IAAI,CAACE,cAAc,CAACd,MAAM,EAAE1J,WAAW,CAACiD,SAAS,CAAC2F,GAAG,CAAC,EAAEO,SAAS,CAAC;EACtE,CAAC,SAAS;IACNP,GAAG,CAACK,UAAU,GAAGgB,IAAI;IACrB,IAAIV,QAAQ,EAAEX,GAAG,CAACW,QAAQ,GAAGA,QAAQ;IACrCe,IAAI,CAACF,IAAI,CAAC,CAAC;EACf;AACJ;;AAEA;AACA;AACA;AACA,OAAO,SAASK,cAAcA,CAACC,KAAkB,EAAW;EACxD,IAAI,CAACA,KAAK,CAACC,YAAY,CAAC,CAAC,EAAE;IACvB1K,MAAM,CAACmI,KAAK,CAAC,0CAA0C,CAAC;IACxD,OAAO,KAAK;EAChB;EACA,IACIsC,KAAK,CAACE,WAAW,CAAC,CAAC,KAAK1K,SAAS,CAAC2K,oBAAoB,IACtD,CAAC,CAAC,8BAA8B,CAAC,CAACC,QAAQ,CAACJ,KAAK,CAACK,cAAc,CAAC,CAAC,CAACC,SAAS,CAAC,EAC9E;IACE/K,MAAM,CAACmI,KAAK,CAAC,wDAAwD,CAAC;IACtE,OAAO,KAAK;EAChB;EACA,OAAO,IAAI;AACf","ignoreList":[]}
@@ -1,2 +0,0 @@
1
- export * from "../crypto-api/recovery-key.ts";
2
- //# sourceMappingURL=recoverykey.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"recoverykey.d.ts","sourceRoot":"","sources":["../../src/crypto/recoverykey.ts"],"names":[],"mappings":"AAiBA,cAAc,+BAA+B,CAAC"}
@@ -1,19 +0,0 @@
1
- /*
2
- Copyright 2018 New Vector Ltd
3
-
4
- Licensed under the Apache License, Version 2.0 (the "License");
5
- you may not use this file except in compliance with the License.
6
- You may obtain a copy of the License at
7
-
8
- http://www.apache.org/licenses/LICENSE-2.0
9
-
10
- Unless required by applicable law or agreed to in writing, software
11
- distributed under the License is distributed on an "AS IS" BASIS,
12
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13
- See the License for the specific language governing permissions and
14
- limitations under the License.
15
- */
16
-
17
- // Re-export to avoid breaking changes
18
- export * from "../crypto-api/recovery-key.js";
19
- //# sourceMappingURL=recoverykey.js.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"recoverykey.js","names":[],"sources":["../../src/crypto/recoverykey.ts"],"sourcesContent":["/*\nCopyright 2018 New Vector Ltd\n\nLicensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at\n\n http://www.apache.org/licenses/LICENSE-2.0\n\nUnless required by applicable law or agreed to in writing, software\ndistributed under the License is distributed on an \"AS IS\" BASIS,\nWITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\nSee the License for the specific language governing permissions and\nlimitations under the License.\n*/\n\n// Re-export to avoid breaking changes\nexport * from \"../crypto-api/recovery-key.ts\";\n"],"mappings":"AAAA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;;AAEA;AACA,cAAc,+BAA+B","ignoreList":[]}