@unwanted/matrix-sdk-mini 34.12.0 → 34.13.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (698) hide show
  1. package/git-revision.txt +1 -1
  2. package/lib/@types/event.d.ts +0 -19
  3. package/lib/@types/event.d.ts.map +1 -1
  4. package/lib/@types/event.js.map +1 -1
  5. package/lib/@types/global.d.js +0 -2
  6. package/lib/@types/global.d.js.map +1 -1
  7. package/lib/autodiscovery.d.ts +1 -1
  8. package/lib/autodiscovery.d.ts.map +1 -1
  9. package/lib/autodiscovery.js.map +1 -1
  10. package/lib/base64.d.ts +3 -6
  11. package/lib/base64.d.ts.map +1 -1
  12. package/lib/base64.js +43 -36
  13. package/lib/base64.js.map +1 -1
  14. package/lib/browser-index.d.ts.map +1 -1
  15. package/lib/browser-index.js +0 -11
  16. package/lib/browser-index.js.map +1 -1
  17. package/lib/client.d.ts +2 -1298
  18. package/lib/client.d.ts.map +1 -1
  19. package/lib/client.js +348 -2967
  20. package/lib/client.js.map +1 -1
  21. package/lib/digest.d.ts +2 -2
  22. package/lib/digest.d.ts.map +1 -1
  23. package/lib/digest.js +2 -2
  24. package/lib/digest.js.map +1 -1
  25. package/lib/embedded.d.ts +0 -22
  26. package/lib/embedded.d.ts.map +1 -1
  27. package/lib/embedded.js +58 -168
  28. package/lib/embedded.js.map +1 -1
  29. package/lib/event-mapper.d.ts.map +1 -1
  30. package/lib/event-mapper.js +0 -4
  31. package/lib/event-mapper.js.map +1 -1
  32. package/lib/matrix.d.ts +0 -25
  33. package/lib/matrix.d.ts.map +1 -1
  34. package/lib/matrix.js +1 -30
  35. package/lib/matrix.js.map +1 -1
  36. package/lib/models/MSC3089Branch.d.ts.map +1 -1
  37. package/lib/models/MSC3089Branch.js +0 -3
  38. package/lib/models/MSC3089Branch.js.map +1 -1
  39. package/lib/models/event-timeline-set.d.ts +6 -10
  40. package/lib/models/event-timeline-set.d.ts.map +1 -1
  41. package/lib/models/event-timeline-set.js +28 -36
  42. package/lib/models/event-timeline-set.js.map +1 -1
  43. package/lib/models/event-timeline.d.ts +7 -2
  44. package/lib/models/event-timeline.d.ts.map +1 -1
  45. package/lib/models/event-timeline.js +8 -9
  46. package/lib/models/event-timeline.js.map +1 -1
  47. package/lib/models/event.d.ts +1 -95
  48. package/lib/models/event.d.ts.map +1 -1
  49. package/lib/models/event.js +11 -281
  50. package/lib/models/event.js.map +1 -1
  51. package/lib/models/poll.d.ts.map +1 -1
  52. package/lib/models/poll.js +1 -5
  53. package/lib/models/poll.js.map +1 -1
  54. package/lib/models/relations-container.d.ts.map +1 -1
  55. package/lib/models/relations-container.js +1 -7
  56. package/lib/models/relations-container.js.map +1 -1
  57. package/lib/models/relations.d.ts +0 -1
  58. package/lib/models/relations.d.ts.map +1 -1
  59. package/lib/models/relations.js +0 -8
  60. package/lib/models/relations.js.map +1 -1
  61. package/lib/models/room-state.d.ts +2 -13
  62. package/lib/models/room-state.d.ts.map +1 -1
  63. package/lib/models/room-state.js +12 -56
  64. package/lib/models/room-state.js.map +1 -1
  65. package/lib/models/room.d.ts +2 -20
  66. package/lib/models/room.d.ts.map +1 -1
  67. package/lib/models/room.js +121 -162
  68. package/lib/models/room.js.map +1 -1
  69. package/lib/models/thread.d.ts.map +1 -1
  70. package/lib/models/thread.js +5 -4
  71. package/lib/models/thread.js.map +1 -1
  72. package/lib/sliding-sync-sdk.d.ts +3 -4
  73. package/lib/sliding-sync-sdk.d.ts.map +1 -1
  74. package/lib/sliding-sync-sdk.js +55 -102
  75. package/lib/sliding-sync-sdk.js.map +1 -1
  76. package/lib/sliding-sync.js +9 -6
  77. package/lib/sliding-sync.js.map +1 -1
  78. package/lib/store/indexeddb.d.ts +1 -1
  79. package/lib/store/indexeddb.d.ts.map +1 -1
  80. package/lib/store/indexeddb.js.map +1 -1
  81. package/lib/sync-accumulator.d.ts +6 -4
  82. package/lib/sync-accumulator.d.ts.map +1 -1
  83. package/lib/sync-accumulator.js +23 -12
  84. package/lib/sync-accumulator.js.map +1 -1
  85. package/lib/sync.d.ts +10 -13
  86. package/lib/sync.d.ts.map +1 -1
  87. package/lib/sync.js +94 -115
  88. package/lib/sync.js.map +1 -1
  89. package/lib/testing.d.ts +0 -48
  90. package/lib/testing.d.ts.map +1 -1
  91. package/lib/testing.js +0 -105
  92. package/lib/testing.js.map +1 -1
  93. package/lib/types.d.ts +0 -1
  94. package/lib/types.d.ts.map +1 -1
  95. package/lib/types.js.map +1 -1
  96. package/package.json +10 -11
  97. package/src/@types/event.ts +2 -36
  98. package/src/@types/global.d.ts +21 -4
  99. package/src/autodiscovery.ts +1 -1
  100. package/src/base64.ts +38 -40
  101. package/src/browser-index.ts +0 -11
  102. package/src/client.ts +68 -3087
  103. package/src/digest.ts +3 -3
  104. package/src/embedded.ts +38 -134
  105. package/src/event-mapper.ts +0 -4
  106. package/src/matrix.ts +0 -41
  107. package/src/models/MSC3089Branch.ts +0 -3
  108. package/src/models/event-timeline-set.ts +17 -38
  109. package/src/models/event-timeline.ts +10 -5
  110. package/src/models/event.ts +8 -295
  111. package/src/models/poll.ts +0 -6
  112. package/src/models/relations-container.ts +1 -8
  113. package/src/models/relations.ts +0 -8
  114. package/src/models/room-state.ts +4 -37
  115. package/src/models/room.ts +18 -68
  116. package/src/models/thread.ts +4 -3
  117. package/src/sliding-sync-sdk.ts +10 -83
  118. package/src/sliding-sync.ts +6 -6
  119. package/src/store/indexeddb.ts +1 -1
  120. package/src/sync-accumulator.ts +33 -16
  121. package/src/sync.ts +112 -143
  122. package/src/testing.ts +0 -108
  123. package/src/types.ts +0 -1
  124. package/CHANGELOG.md +0 -5910
  125. package/lib/@types/AESEncryptedSecretStoragePayload.d.ts +0 -14
  126. package/lib/@types/AESEncryptedSecretStoragePayload.d.ts.map +0 -1
  127. package/lib/@types/AESEncryptedSecretStoragePayload.js +0 -1
  128. package/lib/@types/AESEncryptedSecretStoragePayload.js.map +0 -1
  129. package/lib/@types/crypto.d.ts +0 -47
  130. package/lib/@types/crypto.d.ts.map +0 -1
  131. package/lib/@types/crypto.js +0 -1
  132. package/lib/@types/crypto.js.map +0 -1
  133. package/lib/@types/matrix-sdk-crypto-wasm.d.js +0 -1
  134. package/lib/@types/matrix-sdk-crypto-wasm.d.js.map +0 -1
  135. package/lib/common-crypto/CryptoBackend.d.ts +0 -240
  136. package/lib/common-crypto/CryptoBackend.d.ts.map +0 -1
  137. package/lib/common-crypto/CryptoBackend.js +0 -73
  138. package/lib/common-crypto/CryptoBackend.js.map +0 -1
  139. package/lib/common-crypto/key-passphrase.d.ts +0 -14
  140. package/lib/common-crypto/key-passphrase.d.ts.map +0 -1
  141. package/lib/common-crypto/key-passphrase.js +0 -33
  142. package/lib/common-crypto/key-passphrase.js.map +0 -1
  143. package/lib/crypto/CrossSigning.d.ts +0 -184
  144. package/lib/crypto/CrossSigning.d.ts.map +0 -1
  145. package/lib/crypto/CrossSigning.js +0 -718
  146. package/lib/crypto/CrossSigning.js.map +0 -1
  147. package/lib/crypto/DeviceList.d.ts +0 -216
  148. package/lib/crypto/DeviceList.d.ts.map +0 -1
  149. package/lib/crypto/DeviceList.js +0 -892
  150. package/lib/crypto/DeviceList.js.map +0 -1
  151. package/lib/crypto/EncryptionSetup.d.ts +0 -152
  152. package/lib/crypto/EncryptionSetup.d.ts.map +0 -1
  153. package/lib/crypto/EncryptionSetup.js +0 -356
  154. package/lib/crypto/EncryptionSetup.js.map +0 -1
  155. package/lib/crypto/OlmDevice.d.ts +0 -457
  156. package/lib/crypto/OlmDevice.d.ts.map +0 -1
  157. package/lib/crypto/OlmDevice.js +0 -1241
  158. package/lib/crypto/OlmDevice.js.map +0 -1
  159. package/lib/crypto/OutgoingRoomKeyRequestManager.d.ts +0 -109
  160. package/lib/crypto/OutgoingRoomKeyRequestManager.d.ts.map +0 -1
  161. package/lib/crypto/OutgoingRoomKeyRequestManager.js +0 -415
  162. package/lib/crypto/OutgoingRoomKeyRequestManager.js.map +0 -1
  163. package/lib/crypto/RoomList.d.ts +0 -26
  164. package/lib/crypto/RoomList.d.ts.map +0 -1
  165. package/lib/crypto/RoomList.js +0 -71
  166. package/lib/crypto/RoomList.js.map +0 -1
  167. package/lib/crypto/SecretSharing.d.ts +0 -24
  168. package/lib/crypto/SecretSharing.d.ts.map +0 -1
  169. package/lib/crypto/SecretSharing.js +0 -194
  170. package/lib/crypto/SecretSharing.js.map +0 -1
  171. package/lib/crypto/SecretStorage.d.ts +0 -55
  172. package/lib/crypto/SecretStorage.d.ts.map +0 -1
  173. package/lib/crypto/SecretStorage.js +0 -118
  174. package/lib/crypto/SecretStorage.js.map +0 -1
  175. package/lib/crypto/aes.d.ts +0 -6
  176. package/lib/crypto/aes.d.ts.map +0 -1
  177. package/lib/crypto/aes.js +0 -24
  178. package/lib/crypto/aes.js.map +0 -1
  179. package/lib/crypto/algorithms/base.d.ts +0 -156
  180. package/lib/crypto/algorithms/base.d.ts.map +0 -1
  181. package/lib/crypto/algorithms/base.js +0 -187
  182. package/lib/crypto/algorithms/base.js.map +0 -1
  183. package/lib/crypto/algorithms/index.d.ts +0 -4
  184. package/lib/crypto/algorithms/index.d.ts.map +0 -1
  185. package/lib/crypto/algorithms/index.js +0 -20
  186. package/lib/crypto/algorithms/index.js.map +0 -1
  187. package/lib/crypto/algorithms/megolm.d.ts +0 -385
  188. package/lib/crypto/algorithms/megolm.d.ts.map +0 -1
  189. package/lib/crypto/algorithms/megolm.js +0 -1822
  190. package/lib/crypto/algorithms/megolm.js.map +0 -1
  191. package/lib/crypto/algorithms/olm.d.ts +0 -5
  192. package/lib/crypto/algorithms/olm.d.ts.map +0 -1
  193. package/lib/crypto/algorithms/olm.js +0 -299
  194. package/lib/crypto/algorithms/olm.js.map +0 -1
  195. package/lib/crypto/api.d.ts +0 -32
  196. package/lib/crypto/api.d.ts.map +0 -1
  197. package/lib/crypto/api.js +0 -22
  198. package/lib/crypto/api.js.map +0 -1
  199. package/lib/crypto/backup.d.ts +0 -227
  200. package/lib/crypto/backup.d.ts.map +0 -1
  201. package/lib/crypto/backup.js +0 -824
  202. package/lib/crypto/backup.js.map +0 -1
  203. package/lib/crypto/crypto.d.ts +0 -3
  204. package/lib/crypto/crypto.d.ts.map +0 -1
  205. package/lib/crypto/crypto.js +0 -19
  206. package/lib/crypto/crypto.js.map +0 -1
  207. package/lib/crypto/dehydration.d.ts +0 -34
  208. package/lib/crypto/dehydration.d.ts.map +0 -1
  209. package/lib/crypto/dehydration.js +0 -252
  210. package/lib/crypto/dehydration.js.map +0 -1
  211. package/lib/crypto/device-converter.d.ts +0 -9
  212. package/lib/crypto/device-converter.d.ts.map +0 -1
  213. package/lib/crypto/device-converter.js +0 -42
  214. package/lib/crypto/device-converter.js.map +0 -1
  215. package/lib/crypto/deviceinfo.d.ts +0 -99
  216. package/lib/crypto/deviceinfo.d.ts.map +0 -1
  217. package/lib/crypto/deviceinfo.js +0 -148
  218. package/lib/crypto/deviceinfo.js.map +0 -1
  219. package/lib/crypto/index.d.ts +0 -1210
  220. package/lib/crypto/index.d.ts.map +0 -1
  221. package/lib/crypto/index.js +0 -4101
  222. package/lib/crypto/index.js.map +0 -1
  223. package/lib/crypto/key_passphrase.d.ts +0 -14
  224. package/lib/crypto/key_passphrase.d.ts.map +0 -1
  225. package/lib/crypto/key_passphrase.js +0 -44
  226. package/lib/crypto/key_passphrase.js.map +0 -1
  227. package/lib/crypto/keybackup.d.ts +0 -18
  228. package/lib/crypto/keybackup.d.ts.map +0 -1
  229. package/lib/crypto/keybackup.js +0 -1
  230. package/lib/crypto/keybackup.js.map +0 -1
  231. package/lib/crypto/olmlib.d.ts +0 -129
  232. package/lib/crypto/olmlib.d.ts.map +0 -1
  233. package/lib/crypto/olmlib.js +0 -492
  234. package/lib/crypto/olmlib.js.map +0 -1
  235. package/lib/crypto/recoverykey.d.ts +0 -2
  236. package/lib/crypto/recoverykey.d.ts.map +0 -1
  237. package/lib/crypto/recoverykey.js +0 -19
  238. package/lib/crypto/recoverykey.js.map +0 -1
  239. package/lib/crypto/store/base.d.ts +0 -252
  240. package/lib/crypto/store/base.d.ts.map +0 -1
  241. package/lib/crypto/store/base.js +0 -64
  242. package/lib/crypto/store/base.js.map +0 -1
  243. package/lib/crypto/store/indexeddb-crypto-store-backend.d.ts +0 -187
  244. package/lib/crypto/store/indexeddb-crypto-store-backend.d.ts.map +0 -1
  245. package/lib/crypto/store/indexeddb-crypto-store-backend.js +0 -1145
  246. package/lib/crypto/store/indexeddb-crypto-store-backend.js.map +0 -1
  247. package/lib/crypto/store/indexeddb-crypto-store.d.ts +0 -432
  248. package/lib/crypto/store/indexeddb-crypto-store.d.ts.map +0 -1
  249. package/lib/crypto/store/indexeddb-crypto-store.js +0 -728
  250. package/lib/crypto/store/indexeddb-crypto-store.js.map +0 -1
  251. package/lib/crypto/store/localStorage-crypto-store.d.ts +0 -119
  252. package/lib/crypto/store/localStorage-crypto-store.d.ts.map +0 -1
  253. package/lib/crypto/store/localStorage-crypto-store.js +0 -531
  254. package/lib/crypto/store/localStorage-crypto-store.js.map +0 -1
  255. package/lib/crypto/store/memory-crypto-store.d.ts +0 -215
  256. package/lib/crypto/store/memory-crypto-store.d.ts.map +0 -1
  257. package/lib/crypto/store/memory-crypto-store.js +0 -622
  258. package/lib/crypto/store/memory-crypto-store.js.map +0 -1
  259. package/lib/crypto/verification/Base.d.ts +0 -105
  260. package/lib/crypto/verification/Base.d.ts.map +0 -1
  261. package/lib/crypto/verification/Base.js +0 -372
  262. package/lib/crypto/verification/Base.js.map +0 -1
  263. package/lib/crypto/verification/Error.d.ts +0 -35
  264. package/lib/crypto/verification/Error.d.ts.map +0 -1
  265. package/lib/crypto/verification/Error.js +0 -86
  266. package/lib/crypto/verification/Error.js.map +0 -1
  267. package/lib/crypto/verification/IllegalMethod.d.ts +0 -15
  268. package/lib/crypto/verification/IllegalMethod.d.ts.map +0 -1
  269. package/lib/crypto/verification/IllegalMethod.js +0 -43
  270. package/lib/crypto/verification/IllegalMethod.js.map +0 -1
  271. package/lib/crypto/verification/QRCode.d.ts +0 -51
  272. package/lib/crypto/verification/QRCode.d.ts.map +0 -1
  273. package/lib/crypto/verification/QRCode.js +0 -277
  274. package/lib/crypto/verification/QRCode.js.map +0 -1
  275. package/lib/crypto/verification/SAS.d.ts +0 -27
  276. package/lib/crypto/verification/SAS.d.ts.map +0 -1
  277. package/lib/crypto/verification/SAS.js +0 -485
  278. package/lib/crypto/verification/SAS.js.map +0 -1
  279. package/lib/crypto/verification/SASDecimal.d.ts +0 -8
  280. package/lib/crypto/verification/SASDecimal.d.ts.map +0 -1
  281. package/lib/crypto/verification/SASDecimal.js +0 -34
  282. package/lib/crypto/verification/SASDecimal.js.map +0 -1
  283. package/lib/crypto/verification/request/Channel.d.ts +0 -18
  284. package/lib/crypto/verification/request/Channel.d.ts.map +0 -1
  285. package/lib/crypto/verification/request/Channel.js +0 -1
  286. package/lib/crypto/verification/request/Channel.js.map +0 -1
  287. package/lib/crypto/verification/request/InRoomChannel.d.ts +0 -113
  288. package/lib/crypto/verification/request/InRoomChannel.d.ts.map +0 -1
  289. package/lib/crypto/verification/request/InRoomChannel.js +0 -351
  290. package/lib/crypto/verification/request/InRoomChannel.js.map +0 -1
  291. package/lib/crypto/verification/request/ToDeviceChannel.d.ts +0 -105
  292. package/lib/crypto/verification/request/ToDeviceChannel.d.ts.map +0 -1
  293. package/lib/crypto/verification/request/ToDeviceChannel.js +0 -328
  294. package/lib/crypto/verification/request/ToDeviceChannel.js.map +0 -1
  295. package/lib/crypto/verification/request/VerificationRequest.d.ts +0 -227
  296. package/lib/crypto/verification/request/VerificationRequest.d.ts.map +0 -1
  297. package/lib/crypto/verification/request/VerificationRequest.js +0 -937
  298. package/lib/crypto/verification/request/VerificationRequest.js.map +0 -1
  299. package/lib/crypto-api/CryptoEvent.d.ts +0 -69
  300. package/lib/crypto-api/CryptoEvent.d.ts.map +0 -1
  301. package/lib/crypto-api/CryptoEvent.js +0 -33
  302. package/lib/crypto-api/CryptoEvent.js.map +0 -1
  303. package/lib/crypto-api/CryptoEventHandlerMap.d.ts +0 -16
  304. package/lib/crypto-api/CryptoEventHandlerMap.d.ts.map +0 -1
  305. package/lib/crypto-api/CryptoEventHandlerMap.js +0 -22
  306. package/lib/crypto-api/CryptoEventHandlerMap.js.map +0 -1
  307. package/lib/crypto-api/index.d.ts +0 -978
  308. package/lib/crypto-api/index.d.ts.map +0 -1
  309. package/lib/crypto-api/index.js +0 -304
  310. package/lib/crypto-api/index.js.map +0 -1
  311. package/lib/crypto-api/key-passphrase.d.ts +0 -11
  312. package/lib/crypto-api/key-passphrase.d.ts.map +0 -1
  313. package/lib/crypto-api/key-passphrase.js +0 -51
  314. package/lib/crypto-api/key-passphrase.js.map +0 -1
  315. package/lib/crypto-api/keybackup.d.ts +0 -88
  316. package/lib/crypto-api/keybackup.d.ts.map +0 -1
  317. package/lib/crypto-api/keybackup.js +0 -1
  318. package/lib/crypto-api/keybackup.js.map +0 -1
  319. package/lib/crypto-api/recovery-key.d.ts +0 -11
  320. package/lib/crypto-api/recovery-key.d.ts.map +0 -1
  321. package/lib/crypto-api/recovery-key.js +0 -65
  322. package/lib/crypto-api/recovery-key.js.map +0 -1
  323. package/lib/crypto-api/verification.d.ts +0 -344
  324. package/lib/crypto-api/verification.d.ts.map +0 -1
  325. package/lib/crypto-api/verification.js +0 -91
  326. package/lib/crypto-api/verification.js.map +0 -1
  327. package/lib/matrixrtc/CallMembership.d.ts +0 -66
  328. package/lib/matrixrtc/CallMembership.d.ts.map +0 -1
  329. package/lib/matrixrtc/CallMembership.js +0 -197
  330. package/lib/matrixrtc/CallMembership.js.map +0 -1
  331. package/lib/matrixrtc/LivekitFocus.d.ts +0 -16
  332. package/lib/matrixrtc/LivekitFocus.d.ts.map +0 -1
  333. package/lib/matrixrtc/LivekitFocus.js +0 -20
  334. package/lib/matrixrtc/LivekitFocus.js.map +0 -1
  335. package/lib/matrixrtc/MatrixRTCSession.d.ts +0 -295
  336. package/lib/matrixrtc/MatrixRTCSession.d.ts.map +0 -1
  337. package/lib/matrixrtc/MatrixRTCSession.js +0 -1043
  338. package/lib/matrixrtc/MatrixRTCSession.js.map +0 -1
  339. package/lib/matrixrtc/MatrixRTCSessionManager.d.ts +0 -40
  340. package/lib/matrixrtc/MatrixRTCSessionManager.d.ts.map +0 -1
  341. package/lib/matrixrtc/MatrixRTCSessionManager.js +0 -146
  342. package/lib/matrixrtc/MatrixRTCSessionManager.js.map +0 -1
  343. package/lib/matrixrtc/focus.d.ts +0 -10
  344. package/lib/matrixrtc/focus.d.ts.map +0 -1
  345. package/lib/matrixrtc/focus.js +0 -1
  346. package/lib/matrixrtc/focus.js.map +0 -1
  347. package/lib/matrixrtc/index.d.ts +0 -7
  348. package/lib/matrixrtc/index.d.ts.map +0 -1
  349. package/lib/matrixrtc/index.js +0 -21
  350. package/lib/matrixrtc/index.js.map +0 -1
  351. package/lib/matrixrtc/types.d.ts +0 -19
  352. package/lib/matrixrtc/types.d.ts.map +0 -1
  353. package/lib/matrixrtc/types.js +0 -1
  354. package/lib/matrixrtc/types.js.map +0 -1
  355. package/lib/rendezvous/MSC4108SignInWithQR.d.ts +0 -112
  356. package/lib/rendezvous/MSC4108SignInWithQR.d.ts.map +0 -1
  357. package/lib/rendezvous/MSC4108SignInWithQR.js +0 -392
  358. package/lib/rendezvous/MSC4108SignInWithQR.js.map +0 -1
  359. package/lib/rendezvous/RendezvousChannel.d.ts +0 -27
  360. package/lib/rendezvous/RendezvousChannel.d.ts.map +0 -1
  361. package/lib/rendezvous/RendezvousChannel.js +0 -1
  362. package/lib/rendezvous/RendezvousChannel.js.map +0 -1
  363. package/lib/rendezvous/RendezvousCode.d.ts +0 -9
  364. package/lib/rendezvous/RendezvousCode.d.ts.map +0 -1
  365. package/lib/rendezvous/RendezvousCode.js +0 -1
  366. package/lib/rendezvous/RendezvousCode.js.map +0 -1
  367. package/lib/rendezvous/RendezvousError.d.ts +0 -6
  368. package/lib/rendezvous/RendezvousError.d.ts.map +0 -1
  369. package/lib/rendezvous/RendezvousError.js +0 -23
  370. package/lib/rendezvous/RendezvousError.js.map +0 -1
  371. package/lib/rendezvous/RendezvousFailureReason.d.ts +0 -31
  372. package/lib/rendezvous/RendezvousFailureReason.d.ts.map +0 -1
  373. package/lib/rendezvous/RendezvousFailureReason.js +0 -38
  374. package/lib/rendezvous/RendezvousFailureReason.js.map +0 -1
  375. package/lib/rendezvous/RendezvousIntent.d.ts +0 -5
  376. package/lib/rendezvous/RendezvousIntent.d.ts.map +0 -1
  377. package/lib/rendezvous/RendezvousIntent.js +0 -22
  378. package/lib/rendezvous/RendezvousIntent.js.map +0 -1
  379. package/lib/rendezvous/RendezvousTransport.d.ts +0 -36
  380. package/lib/rendezvous/RendezvousTransport.d.ts.map +0 -1
  381. package/lib/rendezvous/RendezvousTransport.js +0 -1
  382. package/lib/rendezvous/RendezvousTransport.js.map +0 -1
  383. package/lib/rendezvous/channels/MSC4108SecureChannel.d.ts +0 -58
  384. package/lib/rendezvous/channels/MSC4108SecureChannel.d.ts.map +0 -1
  385. package/lib/rendezvous/channels/MSC4108SecureChannel.js +0 -246
  386. package/lib/rendezvous/channels/MSC4108SecureChannel.js.map +0 -1
  387. package/lib/rendezvous/channels/index.d.ts +0 -2
  388. package/lib/rendezvous/channels/index.d.ts.map +0 -1
  389. package/lib/rendezvous/channels/index.js +0 -18
  390. package/lib/rendezvous/channels/index.js.map +0 -1
  391. package/lib/rendezvous/index.d.ts +0 -10
  392. package/lib/rendezvous/index.d.ts.map +0 -1
  393. package/lib/rendezvous/index.js +0 -23
  394. package/lib/rendezvous/index.js.map +0 -1
  395. package/lib/rendezvous/transports/MSC4108RendezvousSession.d.ts +0 -61
  396. package/lib/rendezvous/transports/MSC4108RendezvousSession.d.ts.map +0 -1
  397. package/lib/rendezvous/transports/MSC4108RendezvousSession.js +0 -253
  398. package/lib/rendezvous/transports/MSC4108RendezvousSession.js.map +0 -1
  399. package/lib/rendezvous/transports/index.d.ts +0 -2
  400. package/lib/rendezvous/transports/index.d.ts.map +0 -1
  401. package/lib/rendezvous/transports/index.js +0 -18
  402. package/lib/rendezvous/transports/index.js.map +0 -1
  403. package/lib/rust-crypto/CrossSigningIdentity.d.ts +0 -33
  404. package/lib/rust-crypto/CrossSigningIdentity.d.ts.map +0 -1
  405. package/lib/rust-crypto/CrossSigningIdentity.js +0 -157
  406. package/lib/rust-crypto/CrossSigningIdentity.js.map +0 -1
  407. package/lib/rust-crypto/DehydratedDeviceManager.d.ts +0 -98
  408. package/lib/rust-crypto/DehydratedDeviceManager.d.ts.map +0 -1
  409. package/lib/rust-crypto/DehydratedDeviceManager.js +0 -285
  410. package/lib/rust-crypto/DehydratedDeviceManager.js.map +0 -1
  411. package/lib/rust-crypto/KeyClaimManager.d.ts +0 -33
  412. package/lib/rust-crypto/KeyClaimManager.d.ts.map +0 -1
  413. package/lib/rust-crypto/KeyClaimManager.js +0 -82
  414. package/lib/rust-crypto/KeyClaimManager.js.map +0 -1
  415. package/lib/rust-crypto/OutgoingRequestProcessor.d.ts +0 -43
  416. package/lib/rust-crypto/OutgoingRequestProcessor.d.ts.map +0 -1
  417. package/lib/rust-crypto/OutgoingRequestProcessor.js +0 -195
  418. package/lib/rust-crypto/OutgoingRequestProcessor.js.map +0 -1
  419. package/lib/rust-crypto/OutgoingRequestsManager.d.ts +0 -47
  420. package/lib/rust-crypto/OutgoingRequestsManager.d.ts.map +0 -1
  421. package/lib/rust-crypto/OutgoingRequestsManager.js +0 -148
  422. package/lib/rust-crypto/OutgoingRequestsManager.js.map +0 -1
  423. package/lib/rust-crypto/PerSessionKeyBackupDownloader.d.ts +0 -120
  424. package/lib/rust-crypto/PerSessionKeyBackupDownloader.d.ts.map +0 -1
  425. package/lib/rust-crypto/PerSessionKeyBackupDownloader.js +0 -467
  426. package/lib/rust-crypto/PerSessionKeyBackupDownloader.js.map +0 -1
  427. package/lib/rust-crypto/RoomEncryptor.d.ts +0 -98
  428. package/lib/rust-crypto/RoomEncryptor.d.ts.map +0 -1
  429. package/lib/rust-crypto/RoomEncryptor.js +0 -299
  430. package/lib/rust-crypto/RoomEncryptor.js.map +0 -1
  431. package/lib/rust-crypto/backup.d.ts +0 -254
  432. package/lib/rust-crypto/backup.d.ts.map +0 -1
  433. package/lib/rust-crypto/backup.js +0 -837
  434. package/lib/rust-crypto/backup.js.map +0 -1
  435. package/lib/rust-crypto/constants.d.ts +0 -3
  436. package/lib/rust-crypto/constants.d.ts.map +0 -1
  437. package/lib/rust-crypto/constants.js +0 -19
  438. package/lib/rust-crypto/constants.js.map +0 -1
  439. package/lib/rust-crypto/device-converter.d.ts +0 -28
  440. package/lib/rust-crypto/device-converter.d.ts.map +0 -1
  441. package/lib/rust-crypto/device-converter.js +0 -123
  442. package/lib/rust-crypto/device-converter.js.map +0 -1
  443. package/lib/rust-crypto/index.d.ts +0 -61
  444. package/lib/rust-crypto/index.d.ts.map +0 -1
  445. package/lib/rust-crypto/index.js +0 -152
  446. package/lib/rust-crypto/index.js.map +0 -1
  447. package/lib/rust-crypto/libolm_migration.d.ts +0 -81
  448. package/lib/rust-crypto/libolm_migration.d.ts.map +0 -1
  449. package/lib/rust-crypto/libolm_migration.js +0 -459
  450. package/lib/rust-crypto/libolm_migration.js.map +0 -1
  451. package/lib/rust-crypto/rust-crypto.d.ts +0 -556
  452. package/lib/rust-crypto/rust-crypto.d.ts.map +0 -1
  453. package/lib/rust-crypto/rust-crypto.js +0 -2016
  454. package/lib/rust-crypto/rust-crypto.js.map +0 -1
  455. package/lib/rust-crypto/secret-storage.d.ts +0 -22
  456. package/lib/rust-crypto/secret-storage.d.ts.map +0 -1
  457. package/lib/rust-crypto/secret-storage.js +0 -63
  458. package/lib/rust-crypto/secret-storage.js.map +0 -1
  459. package/lib/rust-crypto/verification.d.ts +0 -319
  460. package/lib/rust-crypto/verification.d.ts.map +0 -1
  461. package/lib/rust-crypto/verification.js +0 -816
  462. package/lib/rust-crypto/verification.js.map +0 -1
  463. package/lib/secret-storage.d.ts +0 -370
  464. package/lib/secret-storage.d.ts.map +0 -1
  465. package/lib/secret-storage.js +0 -466
  466. package/lib/secret-storage.js.map +0 -1
  467. package/lib/utils/decryptAESSecretStorageItem.d.ts +0 -12
  468. package/lib/utils/decryptAESSecretStorageItem.d.ts.map +0 -1
  469. package/lib/utils/decryptAESSecretStorageItem.js +0 -50
  470. package/lib/utils/decryptAESSecretStorageItem.js.map +0 -1
  471. package/lib/utils/encryptAESSecretStorageItem.d.ts +0 -16
  472. package/lib/utils/encryptAESSecretStorageItem.d.ts.map +0 -1
  473. package/lib/utils/encryptAESSecretStorageItem.js +0 -68
  474. package/lib/utils/encryptAESSecretStorageItem.js.map +0 -1
  475. package/lib/utils/internal/deriveKeys.d.ts +0 -10
  476. package/lib/utils/internal/deriveKeys.d.ts.map +0 -1
  477. package/lib/utils/internal/deriveKeys.js +0 -60
  478. package/lib/utils/internal/deriveKeys.js.map +0 -1
  479. package/lib/webrtc/audioContext.d.ts +0 -15
  480. package/lib/webrtc/audioContext.d.ts.map +0 -1
  481. package/lib/webrtc/audioContext.js +0 -46
  482. package/lib/webrtc/audioContext.js.map +0 -1
  483. package/lib/webrtc/call.d.ts +0 -560
  484. package/lib/webrtc/call.d.ts.map +0 -1
  485. package/lib/webrtc/call.js +0 -2541
  486. package/lib/webrtc/call.js.map +0 -1
  487. package/lib/webrtc/callEventHandler.d.ts +0 -37
  488. package/lib/webrtc/callEventHandler.d.ts.map +0 -1
  489. package/lib/webrtc/callEventHandler.js +0 -344
  490. package/lib/webrtc/callEventHandler.js.map +0 -1
  491. package/lib/webrtc/callEventTypes.d.ts +0 -73
  492. package/lib/webrtc/callEventTypes.d.ts.map +0 -1
  493. package/lib/webrtc/callEventTypes.js +0 -13
  494. package/lib/webrtc/callEventTypes.js.map +0 -1
  495. package/lib/webrtc/callFeed.d.ts +0 -128
  496. package/lib/webrtc/callFeed.d.ts.map +0 -1
  497. package/lib/webrtc/callFeed.js +0 -289
  498. package/lib/webrtc/callFeed.js.map +0 -1
  499. package/lib/webrtc/groupCall.d.ts +0 -323
  500. package/lib/webrtc/groupCall.d.ts.map +0 -1
  501. package/lib/webrtc/groupCall.js +0 -1337
  502. package/lib/webrtc/groupCall.js.map +0 -1
  503. package/lib/webrtc/groupCallEventHandler.d.ts +0 -31
  504. package/lib/webrtc/groupCallEventHandler.d.ts.map +0 -1
  505. package/lib/webrtc/groupCallEventHandler.js +0 -178
  506. package/lib/webrtc/groupCallEventHandler.js.map +0 -1
  507. package/lib/webrtc/mediaHandler.d.ts +0 -89
  508. package/lib/webrtc/mediaHandler.d.ts.map +0 -1
  509. package/lib/webrtc/mediaHandler.js +0 -437
  510. package/lib/webrtc/mediaHandler.js.map +0 -1
  511. package/lib/webrtc/stats/callFeedStatsReporter.d.ts +0 -8
  512. package/lib/webrtc/stats/callFeedStatsReporter.d.ts.map +0 -1
  513. package/lib/webrtc/stats/callFeedStatsReporter.js +0 -82
  514. package/lib/webrtc/stats/callFeedStatsReporter.js.map +0 -1
  515. package/lib/webrtc/stats/callStatsReportGatherer.d.ts +0 -25
  516. package/lib/webrtc/stats/callStatsReportGatherer.d.ts.map +0 -1
  517. package/lib/webrtc/stats/callStatsReportGatherer.js +0 -199
  518. package/lib/webrtc/stats/callStatsReportGatherer.js.map +0 -1
  519. package/lib/webrtc/stats/callStatsReportSummary.d.ts +0 -17
  520. package/lib/webrtc/stats/callStatsReportSummary.d.ts.map +0 -1
  521. package/lib/webrtc/stats/callStatsReportSummary.js +0 -1
  522. package/lib/webrtc/stats/callStatsReportSummary.js.map +0 -1
  523. package/lib/webrtc/stats/connectionStats.d.ts +0 -28
  524. package/lib/webrtc/stats/connectionStats.d.ts.map +0 -1
  525. package/lib/webrtc/stats/connectionStats.js +0 -26
  526. package/lib/webrtc/stats/connectionStats.js.map +0 -1
  527. package/lib/webrtc/stats/connectionStatsBuilder.d.ts +0 -5
  528. package/lib/webrtc/stats/connectionStatsBuilder.d.ts.map +0 -1
  529. package/lib/webrtc/stats/connectionStatsBuilder.js +0 -27
  530. package/lib/webrtc/stats/connectionStatsBuilder.js.map +0 -1
  531. package/lib/webrtc/stats/connectionStatsReportBuilder.d.ts +0 -7
  532. package/lib/webrtc/stats/connectionStatsReportBuilder.d.ts.map +0 -1
  533. package/lib/webrtc/stats/connectionStatsReportBuilder.js +0 -121
  534. package/lib/webrtc/stats/connectionStatsReportBuilder.js.map +0 -1
  535. package/lib/webrtc/stats/groupCallStats.d.ts +0 -22
  536. package/lib/webrtc/stats/groupCallStats.d.ts.map +0 -1
  537. package/lib/webrtc/stats/groupCallStats.js +0 -78
  538. package/lib/webrtc/stats/groupCallStats.js.map +0 -1
  539. package/lib/webrtc/stats/media/mediaSsrcHandler.d.ts +0 -10
  540. package/lib/webrtc/stats/media/mediaSsrcHandler.d.ts.map +0 -1
  541. package/lib/webrtc/stats/media/mediaSsrcHandler.js +0 -57
  542. package/lib/webrtc/stats/media/mediaSsrcHandler.js.map +0 -1
  543. package/lib/webrtc/stats/media/mediaTrackHandler.d.ts +0 -12
  544. package/lib/webrtc/stats/media/mediaTrackHandler.d.ts.map +0 -1
  545. package/lib/webrtc/stats/media/mediaTrackHandler.js +0 -62
  546. package/lib/webrtc/stats/media/mediaTrackHandler.js.map +0 -1
  547. package/lib/webrtc/stats/media/mediaTrackStats.d.ts +0 -86
  548. package/lib/webrtc/stats/media/mediaTrackStats.d.ts.map +0 -1
  549. package/lib/webrtc/stats/media/mediaTrackStats.js +0 -142
  550. package/lib/webrtc/stats/media/mediaTrackStats.js.map +0 -1
  551. package/lib/webrtc/stats/media/mediaTrackStatsHandler.d.ts +0 -22
  552. package/lib/webrtc/stats/media/mediaTrackStatsHandler.d.ts.map +0 -1
  553. package/lib/webrtc/stats/media/mediaTrackStatsHandler.js +0 -76
  554. package/lib/webrtc/stats/media/mediaTrackStatsHandler.js.map +0 -1
  555. package/lib/webrtc/stats/statsReport.d.ts +0 -99
  556. package/lib/webrtc/stats/statsReport.d.ts.map +0 -1
  557. package/lib/webrtc/stats/statsReport.js +0 -32
  558. package/lib/webrtc/stats/statsReport.js.map +0 -1
  559. package/lib/webrtc/stats/statsReportEmitter.d.ts +0 -15
  560. package/lib/webrtc/stats/statsReportEmitter.d.ts.map +0 -1
  561. package/lib/webrtc/stats/statsReportEmitter.js +0 -33
  562. package/lib/webrtc/stats/statsReportEmitter.js.map +0 -1
  563. package/lib/webrtc/stats/summaryStatsReportGatherer.d.ts +0 -16
  564. package/lib/webrtc/stats/summaryStatsReportGatherer.d.ts.map +0 -1
  565. package/lib/webrtc/stats/summaryStatsReportGatherer.js +0 -116
  566. package/lib/webrtc/stats/summaryStatsReportGatherer.js.map +0 -1
  567. package/lib/webrtc/stats/trackStatsBuilder.d.ts +0 -19
  568. package/lib/webrtc/stats/trackStatsBuilder.d.ts.map +0 -1
  569. package/lib/webrtc/stats/trackStatsBuilder.js +0 -168
  570. package/lib/webrtc/stats/trackStatsBuilder.js.map +0 -1
  571. package/lib/webrtc/stats/transportStats.d.ts +0 -11
  572. package/lib/webrtc/stats/transportStats.d.ts.map +0 -1
  573. package/lib/webrtc/stats/transportStats.js +0 -1
  574. package/lib/webrtc/stats/transportStats.js.map +0 -1
  575. package/lib/webrtc/stats/transportStatsBuilder.d.ts +0 -5
  576. package/lib/webrtc/stats/transportStatsBuilder.d.ts.map +0 -1
  577. package/lib/webrtc/stats/transportStatsBuilder.js +0 -34
  578. package/lib/webrtc/stats/transportStatsBuilder.js.map +0 -1
  579. package/lib/webrtc/stats/valueFormatter.d.ts +0 -4
  580. package/lib/webrtc/stats/valueFormatter.d.ts.map +0 -1
  581. package/lib/webrtc/stats/valueFormatter.js +0 -25
  582. package/lib/webrtc/stats/valueFormatter.js.map +0 -1
  583. package/src/@types/AESEncryptedSecretStoragePayload.ts +0 -29
  584. package/src/@types/crypto.ts +0 -73
  585. package/src/@types/matrix-sdk-crypto-wasm.d.ts +0 -44
  586. package/src/common-crypto/CryptoBackend.ts +0 -302
  587. package/src/common-crypto/README.md +0 -4
  588. package/src/common-crypto/key-passphrase.ts +0 -43
  589. package/src/crypto/CrossSigning.ts +0 -773
  590. package/src/crypto/DeviceList.ts +0 -989
  591. package/src/crypto/EncryptionSetup.ts +0 -351
  592. package/src/crypto/OlmDevice.ts +0 -1500
  593. package/src/crypto/OutgoingRoomKeyRequestManager.ts +0 -485
  594. package/src/crypto/RoomList.ts +0 -70
  595. package/src/crypto/SecretSharing.ts +0 -240
  596. package/src/crypto/SecretStorage.ts +0 -136
  597. package/src/crypto/aes.ts +0 -23
  598. package/src/crypto/algorithms/base.ts +0 -236
  599. package/src/crypto/algorithms/index.ts +0 -20
  600. package/src/crypto/algorithms/megolm.ts +0 -2216
  601. package/src/crypto/algorithms/olm.ts +0 -381
  602. package/src/crypto/api.ts +0 -70
  603. package/src/crypto/backup.ts +0 -922
  604. package/src/crypto/crypto.ts +0 -18
  605. package/src/crypto/dehydration.ts +0 -272
  606. package/src/crypto/device-converter.ts +0 -45
  607. package/src/crypto/deviceinfo.ts +0 -158
  608. package/src/crypto/index.ts +0 -4418
  609. package/src/crypto/key_passphrase.ts +0 -42
  610. package/src/crypto/keybackup.ts +0 -47
  611. package/src/crypto/olmlib.ts +0 -539
  612. package/src/crypto/recoverykey.ts +0 -18
  613. package/src/crypto/store/base.ts +0 -348
  614. package/src/crypto/store/indexeddb-crypto-store-backend.ts +0 -1250
  615. package/src/crypto/store/indexeddb-crypto-store.ts +0 -845
  616. package/src/crypto/store/localStorage-crypto-store.ts +0 -579
  617. package/src/crypto/store/memory-crypto-store.ts +0 -680
  618. package/src/crypto/verification/Base.ts +0 -409
  619. package/src/crypto/verification/Error.ts +0 -76
  620. package/src/crypto/verification/IllegalMethod.ts +0 -50
  621. package/src/crypto/verification/QRCode.ts +0 -310
  622. package/src/crypto/verification/SAS.ts +0 -494
  623. package/src/crypto/verification/SASDecimal.ts +0 -37
  624. package/src/crypto/verification/request/Channel.ts +0 -34
  625. package/src/crypto/verification/request/InRoomChannel.ts +0 -371
  626. package/src/crypto/verification/request/ToDeviceChannel.ts +0 -354
  627. package/src/crypto/verification/request/VerificationRequest.ts +0 -976
  628. package/src/crypto-api/CryptoEvent.ts +0 -93
  629. package/src/crypto-api/CryptoEventHandlerMap.ts +0 -32
  630. package/src/crypto-api/index.ts +0 -1175
  631. package/src/crypto-api/key-passphrase.ts +0 -58
  632. package/src/crypto-api/keybackup.ts +0 -115
  633. package/src/crypto-api/recovery-key.ts +0 -69
  634. package/src/crypto-api/verification.ts +0 -408
  635. package/src/matrixrtc/CallMembership.ts +0 -247
  636. package/src/matrixrtc/LivekitFocus.ts +0 -39
  637. package/src/matrixrtc/MatrixRTCSession.ts +0 -1319
  638. package/src/matrixrtc/MatrixRTCSessionManager.ts +0 -166
  639. package/src/matrixrtc/focus.ts +0 -25
  640. package/src/matrixrtc/index.ts +0 -22
  641. package/src/matrixrtc/types.ts +0 -36
  642. package/src/rendezvous/MSC4108SignInWithQR.ts +0 -444
  643. package/src/rendezvous/RendezvousChannel.ts +0 -48
  644. package/src/rendezvous/RendezvousCode.ts +0 -25
  645. package/src/rendezvous/RendezvousError.ts +0 -26
  646. package/src/rendezvous/RendezvousFailureReason.ts +0 -49
  647. package/src/rendezvous/RendezvousIntent.ts +0 -20
  648. package/src/rendezvous/RendezvousTransport.ts +0 -58
  649. package/src/rendezvous/channels/MSC4108SecureChannel.ts +0 -270
  650. package/src/rendezvous/channels/index.ts +0 -17
  651. package/src/rendezvous/index.ts +0 -25
  652. package/src/rendezvous/transports/MSC4108RendezvousSession.ts +0 -270
  653. package/src/rendezvous/transports/index.ts +0 -17
  654. package/src/rust-crypto/CrossSigningIdentity.ts +0 -183
  655. package/src/rust-crypto/DehydratedDeviceManager.ts +0 -306
  656. package/src/rust-crypto/KeyClaimManager.ts +0 -86
  657. package/src/rust-crypto/OutgoingRequestProcessor.ts +0 -236
  658. package/src/rust-crypto/OutgoingRequestsManager.ts +0 -143
  659. package/src/rust-crypto/PerSessionKeyBackupDownloader.ts +0 -501
  660. package/src/rust-crypto/RoomEncryptor.ts +0 -352
  661. package/src/rust-crypto/backup.ts +0 -881
  662. package/src/rust-crypto/constants.ts +0 -18
  663. package/src/rust-crypto/device-converter.ts +0 -128
  664. package/src/rust-crypto/index.ts +0 -237
  665. package/src/rust-crypto/libolm_migration.ts +0 -530
  666. package/src/rust-crypto/rust-crypto.ts +0 -2205
  667. package/src/rust-crypto/secret-storage.ts +0 -60
  668. package/src/rust-crypto/verification.ts +0 -830
  669. package/src/secret-storage.ts +0 -693
  670. package/src/utils/decryptAESSecretStorageItem.ts +0 -54
  671. package/src/utils/encryptAESSecretStorageItem.ts +0 -73
  672. package/src/utils/internal/deriveKeys.ts +0 -63
  673. package/src/webrtc/audioContext.ts +0 -44
  674. package/src/webrtc/call.ts +0 -3074
  675. package/src/webrtc/callEventHandler.ts +0 -425
  676. package/src/webrtc/callEventTypes.ts +0 -93
  677. package/src/webrtc/callFeed.ts +0 -364
  678. package/src/webrtc/groupCall.ts +0 -1735
  679. package/src/webrtc/groupCallEventHandler.ts +0 -234
  680. package/src/webrtc/mediaHandler.ts +0 -484
  681. package/src/webrtc/stats/callFeedStatsReporter.ts +0 -94
  682. package/src/webrtc/stats/callStatsReportGatherer.ts +0 -219
  683. package/src/webrtc/stats/callStatsReportSummary.ts +0 -30
  684. package/src/webrtc/stats/connectionStats.ts +0 -47
  685. package/src/webrtc/stats/connectionStatsBuilder.ts +0 -28
  686. package/src/webrtc/stats/connectionStatsReportBuilder.ts +0 -140
  687. package/src/webrtc/stats/groupCallStats.ts +0 -93
  688. package/src/webrtc/stats/media/mediaSsrcHandler.ts +0 -57
  689. package/src/webrtc/stats/media/mediaTrackHandler.ts +0 -76
  690. package/src/webrtc/stats/media/mediaTrackStats.ts +0 -176
  691. package/src/webrtc/stats/media/mediaTrackStatsHandler.ts +0 -90
  692. package/src/webrtc/stats/statsReport.ts +0 -133
  693. package/src/webrtc/stats/statsReportEmitter.ts +0 -49
  694. package/src/webrtc/stats/summaryStatsReportGatherer.ts +0 -148
  695. package/src/webrtc/stats/trackStatsBuilder.ts +0 -207
  696. package/src/webrtc/stats/transportStats.ts +0 -26
  697. package/src/webrtc/stats/transportStatsBuilder.ts +0 -48
  698. package/src/webrtc/stats/valueFormatter.ts +0 -27
@@ -1,1241 +0,0 @@
1
- import _asyncToGenerator from "@babel/runtime/helpers/asyncToGenerator";
2
- import _defineProperty from "@babel/runtime/helpers/defineProperty";
3
- /*
4
- Copyright 2016 - 2021 The Matrix.org Foundation C.I.C.
5
-
6
- Licensed under the Apache License, Version 2.0 (the "License");
7
- you may not use this file except in compliance with the License.
8
- You may obtain a copy of the License at
9
-
10
- http://www.apache.org/licenses/LICENSE-2.0
11
-
12
- Unless required by applicable law or agreed to in writing, software
13
- distributed under the License is distributed on an "AS IS" BASIS,
14
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15
- See the License for the specific language governing permissions and
16
- limitations under the License.
17
- */
18
-
19
- import { logger } from "../logger.js";
20
- import { IndexedDBCryptoStore } from "./store/indexeddb-crypto-store.js";
21
- import { DecryptionFailureCode } from "../crypto-api/index.js";
22
- import { DecryptionError } from "../common-crypto/CryptoBackend.js";
23
-
24
- // The maximum size of an event is 65K, and we base64 the content, so this is a
25
- // reasonable approximation to the biggest plaintext we can encrypt.
26
- var MAX_PLAINTEXT_LENGTH = 65536 * 3 / 4;
27
- export class PayloadTooLargeError extends Error {
28
- constructor() {
29
- super(...arguments);
30
- _defineProperty(this, "data", {
31
- errcode: "M_TOO_LARGE",
32
- error: "Payload too large for encrypted message"
33
- });
34
- }
35
- }
36
- function checkPayloadLength(payloadString) {
37
- if (payloadString === undefined) {
38
- throw new Error("payloadString undefined");
39
- }
40
- if (payloadString.length > MAX_PLAINTEXT_LENGTH) {
41
- // might as well fail early here rather than letting the olm library throw
42
- // a cryptic memory allocation error.
43
- //
44
- // Note that even if we manage to do the encryption, the message send may fail,
45
- // because by the time we've wrapped the ciphertext in the event object, it may
46
- // exceed 65K. But at least we won't just fail with "abort()" in that case.
47
- throw new PayloadTooLargeError("Message too long (".concat(payloadString.length, " bytes). ") + "The maximum for an encrypted message is ".concat(MAX_PLAINTEXT_LENGTH, " bytes."));
48
- }
49
- }
50
-
51
- /** data stored in the session store about an inbound group session */
52
-
53
- /* eslint-disable camelcase */
54
-
55
- /* eslint-enable camelcase */
56
-
57
- /**
58
- * Manages the olm cryptography functions. Each OlmDevice has a single
59
- * OlmAccount and a number of OlmSessions.
60
- *
61
- * Accounts and sessions are kept pickled in the cryptoStore.
62
- */
63
- export class OlmDevice {
64
- // set by consumers
65
-
66
- constructor(cryptoStore) {
67
- this.cryptoStore = cryptoStore;
68
- _defineProperty(this, "pickleKey", "DEFAULT_KEY");
69
- // set by consumers
70
- /** Curve25519 key for the account, unknown until we load the account from storage in init() */
71
- _defineProperty(this, "deviceCurve25519Key", null);
72
- /** Ed25519 key for the account, unknown until we load the account from storage in init() */
73
- _defineProperty(this, "deviceEd25519Key", null);
74
- _defineProperty(this, "maxOneTimeKeys", null);
75
- // we don't bother stashing outboundgroupsessions in the cryptoStore -
76
- // instead we keep them here.
77
- _defineProperty(this, "outboundGroupSessionStore", {});
78
- // Store a set of decrypted message indexes for each group session.
79
- // This partially mitigates a replay attack where a MITM resends a group
80
- // message into the room.
81
- //
82
- // When we decrypt a message and the message index matches a previously
83
- // decrypted message, one possible cause of that is that we are decrypting
84
- // the same event, and may not indicate an actual replay attack. For
85
- // example, this could happen if we receive events, forget about them, and
86
- // then re-fetch them when we backfill. So we store the event ID and
87
- // timestamp corresponding to each message index when we first decrypt it,
88
- // and compare these against the event ID and timestamp every time we use
89
- // that same index. If they match, then we're probably decrypting the same
90
- // event and we don't consider it a replay attack.
91
- //
92
- // Keys are strings of form "<senderKey>|<session_id>|<message_index>"
93
- // Values are objects of the form "{id: <event id>, timestamp: <ts>}"
94
- _defineProperty(this, "inboundGroupSessionMessageIndexes", {});
95
- // Keep track of sessions that we're starting, so that we don't start
96
- // multiple sessions for the same device at the same time.
97
- _defineProperty(this, "sessionsInProgress", {});
98
- // set by consumers
99
- // Used by olm to serialise prekey message decryptions
100
- _defineProperty(this, "olmPrekeyPromise", Promise.resolve());
101
- }
102
-
103
- /**
104
- * @returns The version of Olm.
105
- */
106
- static getOlmVersion() {
107
- return globalThis.Olm.get_library_version();
108
- }
109
-
110
- /**
111
- * Initialise the OlmAccount. This must be called before any other operations
112
- * on the OlmDevice.
113
- *
114
- * Data from an exported Olm device can be provided
115
- * in order to re-create this device.
116
- *
117
- * Attempts to load the OlmAccount from the crypto store, or creates one if none is
118
- * found.
119
- *
120
- * Reads the device keys from the OlmAccount object.
121
- *
122
- * @param IInitOpts - opts to initialise the OlmAccount with
123
- */
124
- init() {
125
- var _arguments = arguments,
126
- _this = this;
127
- return _asyncToGenerator(function* () {
128
- var {
129
- pickleKey,
130
- fromExportedDevice
131
- } = _arguments.length > 0 && _arguments[0] !== undefined ? _arguments[0] : {};
132
- var e2eKeys;
133
- var account = new globalThis.Olm.Account();
134
- try {
135
- if (fromExportedDevice) {
136
- if (pickleKey) {
137
- logger.warn("ignoring opts.pickleKey" + " because opts.fromExportedDevice is present.");
138
- }
139
- _this.pickleKey = fromExportedDevice.pickleKey;
140
- yield _this.initialiseFromExportedDevice(fromExportedDevice, account);
141
- } else {
142
- if (pickleKey) {
143
- _this.pickleKey = pickleKey;
144
- }
145
- yield _this.initialiseAccount(account);
146
- }
147
- e2eKeys = JSON.parse(account.identity_keys());
148
- _this.maxOneTimeKeys = account.max_number_of_one_time_keys();
149
- } finally {
150
- account.free();
151
- }
152
- _this.deviceCurve25519Key = e2eKeys.curve25519;
153
- _this.deviceEd25519Key = e2eKeys.ed25519;
154
- })();
155
- }
156
-
157
- /**
158
- * Populates the crypto store using data that was exported from an existing device.
159
- * Note that for now only the “account” and “sessions” stores are populated;
160
- * Other stores will be as with a new device.
161
- *
162
- * @param exportedData - Data exported from another device
163
- * through the “export” method.
164
- * @param account - an olm account to initialize
165
- */
166
- initialiseFromExportedDevice(exportedData, account) {
167
- var _this2 = this;
168
- return _asyncToGenerator(function* () {
169
- yield _this2.cryptoStore.doTxn("readwrite", [IndexedDBCryptoStore.STORE_ACCOUNT, IndexedDBCryptoStore.STORE_SESSIONS], txn => {
170
- _this2.cryptoStore.storeAccount(txn, exportedData.pickledAccount);
171
- exportedData.sessions.forEach(session => {
172
- var {
173
- deviceKey,
174
- sessionId
175
- } = session;
176
- var sessionInfo = {
177
- session: session.session,
178
- lastReceivedMessageTs: session.lastReceivedMessageTs
179
- };
180
- _this2.cryptoStore.storeEndToEndSession(deviceKey, sessionId, sessionInfo, txn);
181
- });
182
- });
183
- account.unpickle(_this2.pickleKey, exportedData.pickledAccount);
184
- })();
185
- }
186
- initialiseAccount(account) {
187
- var _this3 = this;
188
- return _asyncToGenerator(function* () {
189
- yield _this3.cryptoStore.doTxn("readwrite", [IndexedDBCryptoStore.STORE_ACCOUNT], txn => {
190
- _this3.cryptoStore.getAccount(txn, pickledAccount => {
191
- if (pickledAccount !== null) {
192
- account.unpickle(_this3.pickleKey, pickledAccount);
193
- } else {
194
- account.create();
195
- pickledAccount = account.pickle(_this3.pickleKey);
196
- _this3.cryptoStore.storeAccount(txn, pickledAccount);
197
- }
198
- });
199
- });
200
- })();
201
- }
202
-
203
- /**
204
- * extract our OlmAccount from the crypto store and call the given function
205
- * with the account object
206
- * The `account` object is usable only within the callback passed to this
207
- * function and will be freed as soon the callback returns. It is *not*
208
- * usable for the rest of the lifetime of the transaction.
209
- * This function requires a live transaction object from cryptoStore.doTxn()
210
- * and therefore may only be called in a doTxn() callback.
211
- *
212
- * @param txn - Opaque transaction object from cryptoStore.doTxn()
213
- * @internal
214
- */
215
- getAccount(txn, func) {
216
- this.cryptoStore.getAccount(txn, pickledAccount => {
217
- var account = new globalThis.Olm.Account();
218
- try {
219
- account.unpickle(this.pickleKey, pickledAccount);
220
- func(account);
221
- } finally {
222
- account.free();
223
- }
224
- });
225
- }
226
-
227
- /*
228
- * Saves an account to the crypto store.
229
- * This function requires a live transaction object from cryptoStore.doTxn()
230
- * and therefore may only be called in a doTxn() callback.
231
- *
232
- * @param txn - Opaque transaction object from cryptoStore.doTxn()
233
- * @param Olm.Account object
234
- * @internal
235
- */
236
- storeAccount(txn, account) {
237
- this.cryptoStore.storeAccount(txn, account.pickle(this.pickleKey));
238
- }
239
-
240
- /**
241
- * Export data for re-creating the Olm device later.
242
- * TODO export data other than just account and (P2P) sessions.
243
- *
244
- * @returns The exported data
245
- */
246
- export() {
247
- var _this4 = this;
248
- return _asyncToGenerator(function* () {
249
- var result = {
250
- pickleKey: _this4.pickleKey
251
- };
252
- yield _this4.cryptoStore.doTxn("readonly", [IndexedDBCryptoStore.STORE_ACCOUNT, IndexedDBCryptoStore.STORE_SESSIONS], txn => {
253
- _this4.cryptoStore.getAccount(txn, pickledAccount => {
254
- result.pickledAccount = pickledAccount;
255
- });
256
- result.sessions = [];
257
- // Note that the pickledSession object we get in the callback
258
- // is not exactly the same thing you get in method _getSession
259
- // see documentation of IndexedDBCryptoStore.getAllEndToEndSessions
260
- _this4.cryptoStore.getAllEndToEndSessions(txn, pickledSession => {
261
- result.sessions.push(pickledSession);
262
- });
263
- });
264
- return result;
265
- })();
266
- }
267
-
268
- /**
269
- * extract an OlmSession from the session store and call the given function
270
- * The session is usable only within the callback passed to this
271
- * function and will be freed as soon the callback returns. It is *not*
272
- * usable for the rest of the lifetime of the transaction.
273
- *
274
- * @param txn - Opaque transaction object from cryptoStore.doTxn()
275
- * @internal
276
- */
277
- getSession(deviceKey, sessionId, txn, func) {
278
- this.cryptoStore.getEndToEndSession(deviceKey, sessionId, txn, sessionInfo => {
279
- this.unpickleSession(sessionInfo, func);
280
- });
281
- }
282
-
283
- /**
284
- * Creates a session object from a session pickle and executes the given
285
- * function with it. The session object is destroyed once the function
286
- * returns.
287
- *
288
- * @internal
289
- */
290
- unpickleSession(sessionInfo, func) {
291
- var session = new globalThis.Olm.Session();
292
- try {
293
- session.unpickle(this.pickleKey, sessionInfo.session);
294
- var unpickledSessInfo = Object.assign({}, sessionInfo, {
295
- session
296
- });
297
- func(unpickledSessInfo);
298
- } finally {
299
- session.free();
300
- }
301
- }
302
-
303
- /**
304
- * store our OlmSession in the session store
305
- *
306
- * @param sessionInfo - `{session: OlmSession, lastReceivedMessageTs: int}`
307
- * @param txn - Opaque transaction object from cryptoStore.doTxn()
308
- * @internal
309
- */
310
- saveSession(deviceKey, sessionInfo, txn) {
311
- var sessionId = sessionInfo.session.session_id();
312
- logger.debug("Saving Olm session ".concat(sessionId, " with device ").concat(deviceKey, ": ").concat(sessionInfo.session.describe()));
313
-
314
- // Why do we re-use the input object for this, overwriting the same key with a different
315
- // type? Is it because we want to erase the unpickled session to enforce that it's no longer
316
- // used? A comment would be great.
317
- var pickledSessionInfo = Object.assign(sessionInfo, {
318
- session: sessionInfo.session.pickle(this.pickleKey)
319
- });
320
- this.cryptoStore.storeEndToEndSession(deviceKey, sessionId, pickledSessionInfo, txn);
321
- }
322
-
323
- /**
324
- * get an OlmUtility and call the given function
325
- *
326
- * @returns result of func
327
- * @internal
328
- */
329
- getUtility(func) {
330
- var utility = new globalThis.Olm.Utility();
331
- try {
332
- return func(utility);
333
- } finally {
334
- utility.free();
335
- }
336
- }
337
-
338
- /**
339
- * Signs a message with the ed25519 key for this account.
340
- *
341
- * @param message - message to be signed
342
- * @returns base64-encoded signature
343
- */
344
- sign(message) {
345
- var _this5 = this;
346
- return _asyncToGenerator(function* () {
347
- var result;
348
- yield _this5.cryptoStore.doTxn("readonly", [IndexedDBCryptoStore.STORE_ACCOUNT], txn => {
349
- _this5.getAccount(txn, account => {
350
- result = account.sign(message);
351
- });
352
- });
353
- return result;
354
- })();
355
- }
356
-
357
- /**
358
- * Get the current (unused, unpublished) one-time keys for this account.
359
- *
360
- * @returns one time keys; an object with the single property
361
- * <tt>curve25519</tt>, which is itself an object mapping key id to Curve25519
362
- * key.
363
- */
364
- getOneTimeKeys() {
365
- var _this6 = this;
366
- return _asyncToGenerator(function* () {
367
- var result;
368
- yield _this6.cryptoStore.doTxn("readonly", [IndexedDBCryptoStore.STORE_ACCOUNT], txn => {
369
- _this6.getAccount(txn, account => {
370
- result = JSON.parse(account.one_time_keys());
371
- });
372
- });
373
- return result;
374
- })();
375
- }
376
-
377
- /**
378
- * Get the maximum number of one-time keys we can store.
379
- *
380
- * @returns number of keys
381
- */
382
- maxNumberOfOneTimeKeys() {
383
- var _this$maxOneTimeKeys;
384
- return (_this$maxOneTimeKeys = this.maxOneTimeKeys) !== null && _this$maxOneTimeKeys !== void 0 ? _this$maxOneTimeKeys : -1;
385
- }
386
-
387
- /**
388
- * Marks all of the one-time keys as published.
389
- */
390
- markKeysAsPublished() {
391
- var _this7 = this;
392
- return _asyncToGenerator(function* () {
393
- yield _this7.cryptoStore.doTxn("readwrite", [IndexedDBCryptoStore.STORE_ACCOUNT], txn => {
394
- _this7.getAccount(txn, account => {
395
- account.mark_keys_as_published();
396
- _this7.storeAccount(txn, account);
397
- });
398
- });
399
- })();
400
- }
401
-
402
- /**
403
- * Generate some new one-time keys
404
- *
405
- * @param numKeys - number of keys to generate
406
- * @returns Resolved once the account is saved back having generated the keys
407
- */
408
- generateOneTimeKeys(numKeys) {
409
- return this.cryptoStore.doTxn("readwrite", [IndexedDBCryptoStore.STORE_ACCOUNT], txn => {
410
- this.getAccount(txn, account => {
411
- account.generate_one_time_keys(numKeys);
412
- this.storeAccount(txn, account);
413
- });
414
- });
415
- }
416
-
417
- /**
418
- * Generate a new fallback keys
419
- *
420
- * @returns Resolved once the account is saved back having generated the key
421
- */
422
- generateFallbackKey() {
423
- var _this8 = this;
424
- return _asyncToGenerator(function* () {
425
- yield _this8.cryptoStore.doTxn("readwrite", [IndexedDBCryptoStore.STORE_ACCOUNT], txn => {
426
- _this8.getAccount(txn, account => {
427
- account.generate_fallback_key();
428
- _this8.storeAccount(txn, account);
429
- });
430
- });
431
- })();
432
- }
433
- getFallbackKey() {
434
- var _this9 = this;
435
- return _asyncToGenerator(function* () {
436
- var result;
437
- yield _this9.cryptoStore.doTxn("readonly", [IndexedDBCryptoStore.STORE_ACCOUNT], txn => {
438
- _this9.getAccount(txn, account => {
439
- result = JSON.parse(account.unpublished_fallback_key());
440
- });
441
- });
442
- return result;
443
- })();
444
- }
445
- forgetOldFallbackKey() {
446
- var _this10 = this;
447
- return _asyncToGenerator(function* () {
448
- yield _this10.cryptoStore.doTxn("readwrite", [IndexedDBCryptoStore.STORE_ACCOUNT], txn => {
449
- _this10.getAccount(txn, account => {
450
- account.forget_old_fallback_key();
451
- _this10.storeAccount(txn, account);
452
- });
453
- });
454
- })();
455
- }
456
-
457
- /**
458
- * Generate a new outbound session
459
- *
460
- * The new session will be stored in the cryptoStore.
461
- *
462
- * @param theirIdentityKey - remote user's Curve25519 identity key
463
- * @param theirOneTimeKey - remote user's one-time Curve25519 key
464
- * @returns sessionId for the outbound session.
465
- */
466
- createOutboundSession(theirIdentityKey, theirOneTimeKey) {
467
- var _this11 = this;
468
- return _asyncToGenerator(function* () {
469
- var newSessionId;
470
- yield _this11.cryptoStore.doTxn("readwrite", [IndexedDBCryptoStore.STORE_ACCOUNT, IndexedDBCryptoStore.STORE_SESSIONS], txn => {
471
- _this11.getAccount(txn, account => {
472
- var session = new globalThis.Olm.Session();
473
- try {
474
- session.create_outbound(account, theirIdentityKey, theirOneTimeKey);
475
- newSessionId = session.session_id();
476
- _this11.storeAccount(txn, account);
477
- var sessionInfo = {
478
- session,
479
- // Pretend we've received a message at this point, otherwise
480
- // if we try to send a message to the device, it won't use
481
- // this session
482
- lastReceivedMessageTs: Date.now()
483
- };
484
- _this11.saveSession(theirIdentityKey, sessionInfo, txn);
485
- } finally {
486
- session.free();
487
- }
488
- });
489
- }, logger.getChild("[createOutboundSession]"));
490
- return newSessionId;
491
- })();
492
- }
493
-
494
- /**
495
- * Generate a new inbound session, given an incoming message
496
- *
497
- * @param theirDeviceIdentityKey - remote user's Curve25519 identity key
498
- * @param messageType - messageType field from the received message (must be 0)
499
- * @param ciphertext - base64-encoded body from the received message
500
- *
501
- * @returns decrypted payload, and
502
- * session id of new session
503
- *
504
- * @throws Error if the received message was not valid (for instance, it didn't use a valid one-time key).
505
- */
506
- createInboundSession(theirDeviceIdentityKey, messageType, ciphertext) {
507
- var _this12 = this;
508
- return _asyncToGenerator(function* () {
509
- if (messageType !== 0) {
510
- throw new Error("Need messageType == 0 to create inbound session");
511
- }
512
- var result; // eslint-disable-line camelcase
513
- yield _this12.cryptoStore.doTxn("readwrite", [IndexedDBCryptoStore.STORE_ACCOUNT, IndexedDBCryptoStore.STORE_SESSIONS], txn => {
514
- _this12.getAccount(txn, account => {
515
- var session = new globalThis.Olm.Session();
516
- try {
517
- session.create_inbound_from(account, theirDeviceIdentityKey, ciphertext);
518
- account.remove_one_time_keys(session);
519
- _this12.storeAccount(txn, account);
520
- var payloadString = session.decrypt(messageType, ciphertext);
521
- var sessionInfo = {
522
- session,
523
- // this counts as a received message: set last received message time
524
- // to now
525
- lastReceivedMessageTs: Date.now()
526
- };
527
- _this12.saveSession(theirDeviceIdentityKey, sessionInfo, txn);
528
- result = {
529
- payload: payloadString,
530
- session_id: session.session_id()
531
- };
532
- } finally {
533
- session.free();
534
- }
535
- });
536
- }, logger.getChild("[createInboundSession]"));
537
- return result;
538
- })();
539
- }
540
-
541
- /**
542
- * Get a list of known session IDs for the given device
543
- *
544
- * @param theirDeviceIdentityKey - Curve25519 identity key for the
545
- * remote device
546
- * @returns a list of known session ids for the device
547
- */
548
- getSessionIdsForDevice(theirDeviceIdentityKey) {
549
- var _this13 = this;
550
- return _asyncToGenerator(function* () {
551
- var log = logger.getChild("[getSessionIdsForDevice]");
552
- if (theirDeviceIdentityKey in _this13.sessionsInProgress) {
553
- log.debug("Waiting for Olm session for ".concat(theirDeviceIdentityKey, " to be created"));
554
- try {
555
- yield _this13.sessionsInProgress[theirDeviceIdentityKey];
556
- } catch (_unused) {
557
- // if the session failed to be created, just fall through and
558
- // return an empty result
559
- }
560
- }
561
- var sessionIds;
562
- yield _this13.cryptoStore.doTxn("readonly", [IndexedDBCryptoStore.STORE_SESSIONS], txn => {
563
- _this13.cryptoStore.getEndToEndSessions(theirDeviceIdentityKey, txn, sessions => {
564
- sessionIds = Object.keys(sessions);
565
- });
566
- }, log);
567
- return sessionIds;
568
- })();
569
- }
570
-
571
- /**
572
- * Get the right olm session id for encrypting messages to the given identity key
573
- *
574
- * @param theirDeviceIdentityKey - Curve25519 identity key for the
575
- * remote device
576
- * @param nowait - Don't wait for an in-progress session to complete.
577
- * This should only be set to true of the calling function is the function
578
- * that marked the session as being in-progress.
579
- * @param log - A possibly customised log
580
- * @returns session id, or null if no established session
581
- */
582
- getSessionIdForDevice(theirDeviceIdentityKey) {
583
- var _arguments2 = arguments,
584
- _this14 = this;
585
- return _asyncToGenerator(function* () {
586
- var nowait = _arguments2.length > 1 && _arguments2[1] !== undefined ? _arguments2[1] : false;
587
- var log = _arguments2.length > 2 ? _arguments2[2] : undefined;
588
- var sessionInfos = yield _this14.getSessionInfoForDevice(theirDeviceIdentityKey, nowait, log);
589
- if (sessionInfos.length === 0) {
590
- return null;
591
- }
592
- // Use the session that has most recently received a message
593
- var idxOfBest = 0;
594
- for (var i = 1; i < sessionInfos.length; i++) {
595
- var thisSessInfo = sessionInfos[i];
596
- var thisLastReceived = thisSessInfo.lastReceivedMessageTs === undefined ? 0 : thisSessInfo.lastReceivedMessageTs;
597
- var bestSessInfo = sessionInfos[idxOfBest];
598
- var bestLastReceived = bestSessInfo.lastReceivedMessageTs === undefined ? 0 : bestSessInfo.lastReceivedMessageTs;
599
- if (thisLastReceived > bestLastReceived || thisLastReceived === bestLastReceived && thisSessInfo.sessionId < bestSessInfo.sessionId) {
600
- idxOfBest = i;
601
- }
602
- }
603
- return sessionInfos[idxOfBest].sessionId;
604
- })();
605
- }
606
-
607
- /**
608
- * Get information on the active Olm sessions for a device.
609
- * <p>
610
- * Returns an array, with an entry for each active session. The first entry in
611
- * the result will be the one used for outgoing messages. Each entry contains
612
- * the keys 'hasReceivedMessage' (true if the session has received an incoming
613
- * message and is therefore past the pre-key stage), and 'sessionId'.
614
- *
615
- * @param deviceIdentityKey - Curve25519 identity key for the device
616
- * @param nowait - Don't wait for an in-progress session to complete.
617
- * This should only be set to true of the calling function is the function
618
- * that marked the session as being in-progress.
619
- * @param log - A possibly customised log
620
- */
621
- getSessionInfoForDevice(deviceIdentityKey) {
622
- var _arguments3 = arguments,
623
- _this15 = this;
624
- return _asyncToGenerator(function* () {
625
- var nowait = _arguments3.length > 1 && _arguments3[1] !== undefined ? _arguments3[1] : false;
626
- var log = _arguments3.length > 2 && _arguments3[2] !== undefined ? _arguments3[2] : logger;
627
- log = log.getChild("[getSessionInfoForDevice]");
628
- if (deviceIdentityKey in _this15.sessionsInProgress && !nowait) {
629
- log.debug("Waiting for Olm session for ".concat(deviceIdentityKey, " to be created"));
630
- try {
631
- yield _this15.sessionsInProgress[deviceIdentityKey];
632
- } catch (_unused2) {
633
- // if the session failed to be created, then just fall through and
634
- // return an empty result
635
- }
636
- }
637
- var info = [];
638
- yield _this15.cryptoStore.doTxn("readonly", [IndexedDBCryptoStore.STORE_SESSIONS], txn => {
639
- _this15.cryptoStore.getEndToEndSessions(deviceIdentityKey, txn, sessions => {
640
- var sessionIds = Object.keys(sessions).sort();
641
- var _loop = function _loop(sessionId) {
642
- _this15.unpickleSession(sessions[sessionId], sessInfo => {
643
- info.push({
644
- lastReceivedMessageTs: sessInfo.lastReceivedMessageTs,
645
- hasReceivedMessage: sessInfo.session.has_received_message(),
646
- sessionId
647
- });
648
- });
649
- };
650
- for (var sessionId of sessionIds) {
651
- _loop(sessionId);
652
- }
653
- });
654
- }, log);
655
- return info;
656
- })();
657
- }
658
-
659
- /**
660
- * Encrypt an outgoing message using an existing session
661
- *
662
- * @param theirDeviceIdentityKey - Curve25519 identity key for the
663
- * remote device
664
- * @param sessionId - the id of the active session
665
- * @param payloadString - payload to be encrypted and sent
666
- *
667
- * @returns ciphertext
668
- */
669
- encryptMessage(theirDeviceIdentityKey, sessionId, payloadString) {
670
- var _this16 = this;
671
- return _asyncToGenerator(function* () {
672
- checkPayloadLength(payloadString);
673
- var res;
674
- yield _this16.cryptoStore.doTxn("readwrite", [IndexedDBCryptoStore.STORE_SESSIONS], txn => {
675
- _this16.getSession(theirDeviceIdentityKey, sessionId, txn, sessionInfo => {
676
- var sessionDesc = sessionInfo.session.describe();
677
- logger.log("encryptMessage: Olm Session ID " + sessionId + " to " + theirDeviceIdentityKey + ": " + sessionDesc);
678
- res = sessionInfo.session.encrypt(payloadString);
679
- _this16.saveSession(theirDeviceIdentityKey, sessionInfo, txn);
680
- });
681
- }, logger.getChild("[encryptMessage]"));
682
- return res;
683
- })();
684
- }
685
-
686
- /**
687
- * Decrypt an incoming message using an existing session
688
- *
689
- * @param theirDeviceIdentityKey - Curve25519 identity key for the
690
- * remote device
691
- * @param sessionId - the id of the active session
692
- * @param messageType - messageType field from the received message
693
- * @param ciphertext - base64-encoded body from the received message
694
- *
695
- * @returns decrypted payload.
696
- */
697
- decryptMessage(theirDeviceIdentityKey, sessionId, messageType, ciphertext) {
698
- var _this17 = this;
699
- return _asyncToGenerator(function* () {
700
- var payloadString;
701
- yield _this17.cryptoStore.doTxn("readwrite", [IndexedDBCryptoStore.STORE_SESSIONS], txn => {
702
- _this17.getSession(theirDeviceIdentityKey, sessionId, txn, sessionInfo => {
703
- var sessionDesc = sessionInfo.session.describe();
704
- logger.log("decryptMessage: Olm Session ID " + sessionId + " from " + theirDeviceIdentityKey + ": " + sessionDesc);
705
- payloadString = sessionInfo.session.decrypt(messageType, ciphertext);
706
- sessionInfo.lastReceivedMessageTs = Date.now();
707
- _this17.saveSession(theirDeviceIdentityKey, sessionInfo, txn);
708
- });
709
- }, logger.getChild("[decryptMessage]"));
710
- return payloadString;
711
- })();
712
- }
713
-
714
- /**
715
- * Determine if an incoming messages is a prekey message matching an existing session
716
- *
717
- * @param theirDeviceIdentityKey - Curve25519 identity key for the
718
- * remote device
719
- * @param sessionId - the id of the active session
720
- * @param messageType - messageType field from the received message
721
- * @param ciphertext - base64-encoded body from the received message
722
- *
723
- * @returns true if the received message is a prekey message which matches
724
- * the given session.
725
- */
726
- matchesSession(theirDeviceIdentityKey, sessionId, messageType, ciphertext) {
727
- var _this18 = this;
728
- return _asyncToGenerator(function* () {
729
- if (messageType !== 0) {
730
- return false;
731
- }
732
- var matches;
733
- yield _this18.cryptoStore.doTxn("readonly", [IndexedDBCryptoStore.STORE_SESSIONS], txn => {
734
- _this18.getSession(theirDeviceIdentityKey, sessionId, txn, sessionInfo => {
735
- matches = sessionInfo.session.matches_inbound(ciphertext);
736
- });
737
- }, logger.getChild("[matchesSession]"));
738
- return matches;
739
- })();
740
- }
741
- recordSessionProblem(deviceKey, type, fixed) {
742
- var _this19 = this;
743
- return _asyncToGenerator(function* () {
744
- logger.info("Recording problem on olm session with ".concat(deviceKey, " of type ").concat(type, ". Recreating: ").concat(fixed));
745
- yield _this19.cryptoStore.storeEndToEndSessionProblem(deviceKey, type, fixed);
746
- })();
747
- }
748
- sessionMayHaveProblems(deviceKey, timestamp) {
749
- return this.cryptoStore.getEndToEndSessionProblem(deviceKey, timestamp);
750
- }
751
- filterOutNotifiedErrorDevices(devices) {
752
- return this.cryptoStore.filterOutNotifiedErrorDevices(devices);
753
- }
754
-
755
- // Outbound group session
756
- // ======================
757
-
758
- /**
759
- * store an OutboundGroupSession in outboundGroupSessionStore
760
- *
761
- * @internal
762
- */
763
- saveOutboundGroupSession(session) {
764
- this.outboundGroupSessionStore[session.session_id()] = session.pickle(this.pickleKey);
765
- }
766
-
767
- /**
768
- * extract an OutboundGroupSession from outboundGroupSessionStore and call the
769
- * given function
770
- *
771
- * @returns result of func
772
- * @internal
773
- */
774
- getOutboundGroupSession(sessionId, func) {
775
- var pickled = this.outboundGroupSessionStore[sessionId];
776
- if (pickled === undefined) {
777
- throw new Error("Unknown outbound group session " + sessionId);
778
- }
779
- var session = new globalThis.Olm.OutboundGroupSession();
780
- try {
781
- session.unpickle(this.pickleKey, pickled);
782
- return func(session);
783
- } finally {
784
- session.free();
785
- }
786
- }
787
-
788
- /**
789
- * Generate a new outbound group session
790
- *
791
- * @returns sessionId for the outbound session.
792
- */
793
- createOutboundGroupSession() {
794
- var session = new globalThis.Olm.OutboundGroupSession();
795
- try {
796
- session.create();
797
- this.saveOutboundGroupSession(session);
798
- return session.session_id();
799
- } finally {
800
- session.free();
801
- }
802
- }
803
-
804
- /**
805
- * Encrypt an outgoing message with an outbound group session
806
- *
807
- * @param sessionId - the id of the outboundgroupsession
808
- * @param payloadString - payload to be encrypted and sent
809
- *
810
- * @returns ciphertext
811
- */
812
- encryptGroupMessage(sessionId, payloadString) {
813
- logger.log("encrypting msg with megolm session ".concat(sessionId));
814
- checkPayloadLength(payloadString);
815
- return this.getOutboundGroupSession(sessionId, session => {
816
- var res = session.encrypt(payloadString);
817
- this.saveOutboundGroupSession(session);
818
- return res;
819
- });
820
- }
821
-
822
- /**
823
- * Get the session keys for an outbound group session
824
- *
825
- * @param sessionId - the id of the outbound group session
826
- *
827
- * @returns current chain index, and
828
- * base64-encoded secret key.
829
- */
830
- getOutboundGroupSessionKey(sessionId) {
831
- return this.getOutboundGroupSession(sessionId, function (session) {
832
- return {
833
- chain_index: session.message_index(),
834
- key: session.session_key()
835
- };
836
- });
837
- }
838
-
839
- // Inbound group session
840
- // =====================
841
-
842
- /**
843
- * Unpickle a session from a sessionData object and invoke the given function.
844
- * The session is valid only until func returns.
845
- *
846
- * @param sessionData - Object describing the session.
847
- * @param func - Invoked with the unpickled session
848
- * @returns result of func
849
- */
850
- unpickleInboundGroupSession(sessionData, func) {
851
- var session = new globalThis.Olm.InboundGroupSession();
852
- try {
853
- session.unpickle(this.pickleKey, sessionData.session);
854
- return func(session);
855
- } finally {
856
- session.free();
857
- }
858
- }
859
-
860
- /**
861
- * extract an InboundGroupSession from the crypto store and call the given function
862
- *
863
- * @param roomId - The room ID to extract the session for, or null to fetch
864
- * sessions for any room.
865
- * @param txn - Opaque transaction object from cryptoStore.doTxn()
866
- * @param func - function to call.
867
- *
868
- * @internal
869
- */
870
- getInboundGroupSession(roomId, senderKey, sessionId, txn, func) {
871
- this.cryptoStore.getEndToEndInboundGroupSession(senderKey, sessionId, txn, (sessionData, withheld) => {
872
- if (sessionData === null) {
873
- func(null, null, withheld);
874
- return;
875
- }
876
-
877
- // if we were given a room ID, check that the it matches the original one for the session. This stops
878
- // the HS pretending a message was targeting a different room.
879
- if (roomId !== null && roomId !== sessionData.room_id) {
880
- throw new Error("Mismatched room_id for inbound group session (expected " + sessionData.room_id + ", was " + roomId + ")");
881
- }
882
- this.unpickleInboundGroupSession(sessionData, session => {
883
- func(session, sessionData, withheld);
884
- });
885
- });
886
- }
887
-
888
- /**
889
- * Add an inbound group session to the session store
890
- *
891
- * @param roomId - room in which this session will be used
892
- * @param senderKey - base64-encoded curve25519 key of the sender
893
- * @param forwardingCurve25519KeyChain - Devices involved in forwarding
894
- * this session to us.
895
- * @param sessionId - session identifier
896
- * @param sessionKey - base64-encoded secret key
897
- * @param keysClaimed - Other keys the sender claims.
898
- * @param exportFormat - true if the megolm keys are in export format
899
- * (ie, they lack an ed25519 signature)
900
- * @param extraSessionData - any other data to be include with the session
901
- */
902
- addInboundGroupSession(roomId, senderKey, forwardingCurve25519KeyChain, sessionId, sessionKey, keysClaimed, exportFormat) {
903
- var _arguments4 = arguments,
904
- _this20 = this;
905
- return _asyncToGenerator(function* () {
906
- var extraSessionData = _arguments4.length > 7 && _arguments4[7] !== undefined ? _arguments4[7] : {};
907
- yield _this20.cryptoStore.doTxn("readwrite", [IndexedDBCryptoStore.STORE_INBOUND_GROUP_SESSIONS, IndexedDBCryptoStore.STORE_INBOUND_GROUP_SESSIONS_WITHHELD, IndexedDBCryptoStore.STORE_SHARED_HISTORY_INBOUND_GROUP_SESSIONS], txn => {
908
- /* if we already have this session, consider updating it */
909
- _this20.getInboundGroupSession(roomId, senderKey, sessionId, txn, (existingSession, existingSessionData) => {
910
- // new session.
911
- var session = new globalThis.Olm.InboundGroupSession();
912
- try {
913
- if (exportFormat) {
914
- session.import_session(sessionKey);
915
- } else {
916
- session.create(sessionKey);
917
- }
918
- if (sessionId != session.session_id()) {
919
- throw new Error("Mismatched group session ID from senderKey: " + senderKey);
920
- }
921
- if (existingSession) {
922
- logger.log("Update for megolm session ".concat(senderKey, "|").concat(sessionId));
923
- if (existingSession.first_known_index() <= session.first_known_index()) {
924
- if (!existingSessionData.untrusted || extraSessionData.untrusted) {
925
- // existing session has less-than-or-equal index
926
- // (i.e. can decrypt at least as much), and the
927
- // new session's trust does not win over the old
928
- // session's trust, so keep it
929
- logger.log("Keeping existing megolm session ".concat(senderKey, "|").concat(sessionId));
930
- return;
931
- }
932
- if (existingSession.first_known_index() < session.first_known_index()) {
933
- // We want to upgrade the existing session's trust,
934
- // but we can't just use the new session because we'll
935
- // lose the lower index. Check that the sessions connect
936
- // properly, and then manually set the existing session
937
- // as trusted.
938
- if (existingSession.export_session(session.first_known_index()) === session.export_session(session.first_known_index())) {
939
- logger.info("Upgrading trust of existing megolm session " + "".concat(senderKey, "|").concat(sessionId, " based on newly-received trusted session"));
940
- existingSessionData.untrusted = false;
941
- _this20.cryptoStore.storeEndToEndInboundGroupSession(senderKey, sessionId, existingSessionData, txn);
942
- } else {
943
- logger.warn("Newly-received megolm session ".concat(senderKey, "|$sessionId}") + " does not match existing session! Keeping existing session");
944
- }
945
- return;
946
- }
947
- // If the sessions have the same index, go ahead and store the new trusted one.
948
- }
949
- }
950
- logger.debug("Storing megolm session ".concat(senderKey, "|").concat(sessionId, " with first index ") + session.first_known_index());
951
- var sessionData = Object.assign({}, extraSessionData, {
952
- room_id: roomId,
953
- session: session.pickle(_this20.pickleKey),
954
- keysClaimed: keysClaimed,
955
- forwardingCurve25519KeyChain: forwardingCurve25519KeyChain
956
- });
957
- _this20.cryptoStore.storeEndToEndInboundGroupSession(senderKey, sessionId, sessionData, txn);
958
- if (!existingSession && extraSessionData.sharedHistory) {
959
- _this20.cryptoStore.addSharedHistoryInboundGroupSession(roomId, senderKey, sessionId, txn);
960
- }
961
- } finally {
962
- session.free();
963
- }
964
- });
965
- }, logger.getChild("[addInboundGroupSession]"));
966
- })();
967
- }
968
-
969
- /**
970
- * Record in the data store why an inbound group session was withheld.
971
- *
972
- * @param roomId - room that the session belongs to
973
- * @param senderKey - base64-encoded curve25519 key of the sender
974
- * @param sessionId - session identifier
975
- * @param code - reason code
976
- * @param reason - human-readable version of `code`
977
- */
978
- addInboundGroupSessionWithheld(roomId, senderKey, sessionId, code, reason) {
979
- var _this21 = this;
980
- return _asyncToGenerator(function* () {
981
- yield _this21.cryptoStore.doTxn("readwrite", [IndexedDBCryptoStore.STORE_INBOUND_GROUP_SESSIONS_WITHHELD], txn => {
982
- _this21.cryptoStore.storeEndToEndInboundGroupSessionWithheld(senderKey, sessionId, {
983
- room_id: roomId,
984
- code: code,
985
- reason: reason
986
- }, txn);
987
- });
988
- })();
989
- }
990
-
991
- /**
992
- * Decrypt a received message with an inbound group session
993
- *
994
- * @param roomId - room in which the message was received
995
- * @param senderKey - base64-encoded curve25519 key of the sender
996
- * @param sessionId - session identifier
997
- * @param body - base64-encoded body of the encrypted message
998
- * @param eventId - ID of the event being decrypted
999
- * @param timestamp - timestamp of the event being decrypted
1000
- *
1001
- * @returns null if the sessionId is unknown
1002
- */
1003
- decryptGroupMessage(roomId, senderKey, sessionId, body, eventId, timestamp) {
1004
- var _this22 = this;
1005
- return _asyncToGenerator(function* () {
1006
- var result = null;
1007
- // when the localstorage crypto store is used as an indexeddb backend,
1008
- // exceptions thrown from within the inner function are not passed through
1009
- // to the top level, so we store exceptions in a variable and raise them at
1010
- // the end
1011
- var error;
1012
- yield _this22.cryptoStore.doTxn("readwrite", [IndexedDBCryptoStore.STORE_INBOUND_GROUP_SESSIONS, IndexedDBCryptoStore.STORE_INBOUND_GROUP_SESSIONS_WITHHELD], txn => {
1013
- _this22.getInboundGroupSession(roomId, senderKey, sessionId, txn, (session, sessionData, withheld) => {
1014
- if (session === null || sessionData === null) {
1015
- if (withheld) {
1016
- var failureCode = withheld.code === "m.unverified" ? DecryptionFailureCode.MEGOLM_KEY_WITHHELD_FOR_UNVERIFIED_DEVICE : DecryptionFailureCode.MEGOLM_KEY_WITHHELD;
1017
- error = new DecryptionError(failureCode, calculateWithheldMessage(withheld), {
1018
- session: senderKey + "|" + sessionId
1019
- });
1020
- }
1021
- result = null;
1022
- return;
1023
- }
1024
- var res;
1025
- try {
1026
- res = session.decrypt(body);
1027
- } catch (e) {
1028
- if ((e === null || e === void 0 ? void 0 : e.message) === "OLM.UNKNOWN_MESSAGE_INDEX" && withheld) {
1029
- var _failureCode = withheld.code === "m.unverified" ? DecryptionFailureCode.MEGOLM_KEY_WITHHELD_FOR_UNVERIFIED_DEVICE : DecryptionFailureCode.MEGOLM_KEY_WITHHELD;
1030
- error = new DecryptionError(_failureCode, calculateWithheldMessage(withheld), {
1031
- session: senderKey + "|" + sessionId
1032
- });
1033
- } else {
1034
- error = e;
1035
- }
1036
- return;
1037
- }
1038
- var plaintext = res.plaintext;
1039
- if (plaintext === undefined) {
1040
- // @ts-ignore - Compatibility for older olm versions.
1041
- plaintext = res;
1042
- } else {
1043
- // Check if we have seen this message index before to detect replay attacks.
1044
- // If the event ID and timestamp are specified, and the match the event ID
1045
- // and timestamp from the last time we used this message index, then we
1046
- // don't consider it a replay attack.
1047
- var messageIndexKey = senderKey + "|" + sessionId + "|" + res.message_index;
1048
- if (messageIndexKey in _this22.inboundGroupSessionMessageIndexes) {
1049
- var msgInfo = _this22.inboundGroupSessionMessageIndexes[messageIndexKey];
1050
- if (msgInfo.id !== eventId || msgInfo.timestamp !== timestamp) {
1051
- error = new Error("Duplicate message index, possible replay attack: " + messageIndexKey);
1052
- return;
1053
- }
1054
- }
1055
- _this22.inboundGroupSessionMessageIndexes[messageIndexKey] = {
1056
- id: eventId,
1057
- timestamp: timestamp
1058
- };
1059
- }
1060
- sessionData.session = session.pickle(_this22.pickleKey);
1061
- _this22.cryptoStore.storeEndToEndInboundGroupSession(senderKey, sessionId, sessionData, txn);
1062
- result = {
1063
- result: plaintext,
1064
- keysClaimed: sessionData.keysClaimed || {},
1065
- senderKey: senderKey,
1066
- forwardingCurve25519KeyChain: sessionData.forwardingCurve25519KeyChain || [],
1067
- untrusted: !!sessionData.untrusted
1068
- };
1069
- });
1070
- }, logger.getChild("[decryptGroupMessage]"));
1071
- if (error) {
1072
- throw error;
1073
- }
1074
- return result;
1075
- })();
1076
- }
1077
-
1078
- /**
1079
- * Determine if we have the keys for a given megolm session
1080
- *
1081
- * @param roomId - room in which the message was received
1082
- * @param senderKey - base64-encoded curve25519 key of the sender
1083
- * @param sessionId - session identifier
1084
- *
1085
- * @returns true if we have the keys to this session
1086
- */
1087
- hasInboundSessionKeys(roomId, senderKey, sessionId) {
1088
- var _this23 = this;
1089
- return _asyncToGenerator(function* () {
1090
- var result;
1091
- yield _this23.cryptoStore.doTxn("readonly", [IndexedDBCryptoStore.STORE_INBOUND_GROUP_SESSIONS, IndexedDBCryptoStore.STORE_INBOUND_GROUP_SESSIONS_WITHHELD], txn => {
1092
- _this23.cryptoStore.getEndToEndInboundGroupSession(senderKey, sessionId, txn, sessionData => {
1093
- if (sessionData === null) {
1094
- result = false;
1095
- return;
1096
- }
1097
- if (roomId !== sessionData.room_id) {
1098
- logger.warn("requested keys for inbound group session ".concat(senderKey, "|") + "".concat(sessionId, ", with incorrect room_id ") + "(expected ".concat(sessionData.room_id, ", ") + "was ".concat(roomId, ")"));
1099
- result = false;
1100
- } else {
1101
- result = true;
1102
- }
1103
- });
1104
- }, logger.getChild("[hasInboundSessionKeys]"));
1105
- return result;
1106
- })();
1107
- }
1108
-
1109
- /**
1110
- * Extract the keys to a given megolm session, for sharing
1111
- *
1112
- * @param roomId - room in which the message was received
1113
- * @param senderKey - base64-encoded curve25519 key of the sender
1114
- * @param sessionId - session identifier
1115
- * @param chainIndex - The chain index at which to export the session.
1116
- * If omitted, export at the first index we know about.
1117
- *
1118
- * @returns
1119
- * details of the session key. The key is a base64-encoded megolm key in
1120
- * export format.
1121
- *
1122
- * @throws Error If the given chain index could not be obtained from the known
1123
- * index (ie. the given chain index is before the first we have).
1124
- */
1125
- getInboundGroupSessionKey(roomId, senderKey, sessionId, chainIndex) {
1126
- var _this24 = this;
1127
- return _asyncToGenerator(function* () {
1128
- var result = null;
1129
- yield _this24.cryptoStore.doTxn("readonly", [IndexedDBCryptoStore.STORE_INBOUND_GROUP_SESSIONS, IndexedDBCryptoStore.STORE_INBOUND_GROUP_SESSIONS_WITHHELD], txn => {
1130
- _this24.getInboundGroupSession(roomId, senderKey, sessionId, txn, (session, sessionData) => {
1131
- if (session === null || sessionData === null) {
1132
- result = null;
1133
- return;
1134
- }
1135
- if (chainIndex === undefined) {
1136
- chainIndex = session.first_known_index();
1137
- }
1138
- var exportedSession = session.export_session(chainIndex);
1139
- var claimedKeys = sessionData.keysClaimed || {};
1140
- var senderEd25519Key = claimedKeys.ed25519 || null;
1141
- var forwardingKeyChain = sessionData.forwardingCurve25519KeyChain || [];
1142
- // older forwarded keys didn't set the "untrusted"
1143
- // property, but can be identified by having a
1144
- // non-empty forwarding key chain. These keys should
1145
- // be marked as untrusted since we don't know that they
1146
- // can be trusted
1147
- var untrusted = "untrusted" in sessionData ? sessionData.untrusted : forwardingKeyChain.length > 0;
1148
- result = {
1149
- chain_index: chainIndex,
1150
- key: exportedSession,
1151
- forwarding_curve25519_key_chain: forwardingKeyChain,
1152
- sender_claimed_ed25519_key: senderEd25519Key,
1153
- shared_history: sessionData.sharedHistory || false,
1154
- untrusted: untrusted
1155
- };
1156
- });
1157
- }, logger.getChild("[getInboundGroupSessionKey]"));
1158
- return result;
1159
- })();
1160
- }
1161
-
1162
- /**
1163
- * Export an inbound group session
1164
- *
1165
- * @param senderKey - base64-encoded curve25519 key of the sender
1166
- * @param sessionId - session identifier
1167
- * @param sessionData - The session object from the store
1168
- * @returns exported session data
1169
- */
1170
- exportInboundGroupSession(senderKey, sessionId, sessionData) {
1171
- return this.unpickleInboundGroupSession(sessionData, session => {
1172
- var messageIndex = session.first_known_index();
1173
- return {
1174
- "sender_key": senderKey,
1175
- "sender_claimed_keys": sessionData.keysClaimed,
1176
- "room_id": sessionData.room_id,
1177
- "session_id": sessionId,
1178
- "session_key": session.export_session(messageIndex),
1179
- "forwarding_curve25519_key_chain": sessionData.forwardingCurve25519KeyChain || [],
1180
- "first_known_index": session.first_known_index(),
1181
- "org.matrix.msc3061.shared_history": sessionData.sharedHistory || false
1182
- };
1183
- });
1184
- }
1185
- getSharedHistoryInboundGroupSessions(roomId) {
1186
- var _this25 = this;
1187
- return _asyncToGenerator(function* () {
1188
- var result;
1189
- yield _this25.cryptoStore.doTxn("readonly", [IndexedDBCryptoStore.STORE_SHARED_HISTORY_INBOUND_GROUP_SESSIONS], txn => {
1190
- result = _this25.cryptoStore.getSharedHistoryInboundGroupSessions(roomId, txn);
1191
- }, logger.getChild("[getSharedHistoryInboundGroupSessionsForRoom]"));
1192
- return result;
1193
- })();
1194
- }
1195
-
1196
- // Utilities
1197
- // =========
1198
-
1199
- /**
1200
- * Verify an ed25519 signature.
1201
- *
1202
- * @param key - ed25519 key
1203
- * @param message - message which was signed
1204
- * @param signature - base64-encoded signature to be checked
1205
- *
1206
- * @throws Error if there is a problem with the verification. If the key was
1207
- * too small then the message will be "OLM.INVALID_BASE64". If the signature
1208
- * was invalid then the message will be "OLM.BAD_MESSAGE_MAC".
1209
- */
1210
- verifySignature(key, message, signature) {
1211
- this.getUtility(function (util) {
1212
- util.ed25519_verify(key, message, signature);
1213
- });
1214
- }
1215
- }
1216
- export var WITHHELD_MESSAGES = {
1217
- "m.unverified": "The sender has disabled encrypting to unverified devices.",
1218
- "m.blacklisted": "The sender has blocked you.",
1219
- "m.unauthorised": "You are not authorised to read the message.",
1220
- "m.no_olm": "Unable to establish a secure channel."
1221
- };
1222
-
1223
- /**
1224
- * Calculate the message to use for the exception when a session key is withheld.
1225
- *
1226
- * @param withheld - An object that describes why the key was withheld.
1227
- *
1228
- * @returns the message
1229
- *
1230
- * @internal
1231
- */
1232
- function calculateWithheldMessage(withheld) {
1233
- if (withheld.code && withheld.code in WITHHELD_MESSAGES) {
1234
- return WITHHELD_MESSAGES[withheld.code];
1235
- } else if (withheld.reason) {
1236
- return withheld.reason;
1237
- } else {
1238
- return "decryption key withheld";
1239
- }
1240
- }
1241
- //# sourceMappingURL=OlmDevice.js.map