@unwanted/matrix-sdk-mini 34.12.0 → 36.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (759) hide show
  1. package/git-revision.txt +1 -1
  2. package/lib/@types/event.d.ts +25 -19
  3. package/lib/@types/event.d.ts.map +1 -1
  4. package/lib/@types/event.js +5 -0
  5. package/lib/@types/event.js.map +1 -1
  6. package/lib/@types/global.d.js +0 -2
  7. package/lib/@types/global.d.js.map +1 -1
  8. package/lib/autodiscovery.d.ts +1 -1
  9. package/lib/autodiscovery.d.ts.map +1 -1
  10. package/lib/autodiscovery.js.map +1 -1
  11. package/lib/base64.d.ts +3 -6
  12. package/lib/base64.d.ts.map +1 -1
  13. package/lib/base64.js +43 -36
  14. package/lib/base64.js.map +1 -1
  15. package/lib/browser-index.d.ts.map +1 -1
  16. package/lib/browser-index.js +0 -11
  17. package/lib/browser-index.js.map +1 -1
  18. package/lib/client.d.ts +45 -1306
  19. package/lib/client.d.ts.map +1 -1
  20. package/lib/client.js +406 -2963
  21. package/lib/client.js.map +1 -1
  22. package/lib/digest.d.ts +2 -2
  23. package/lib/digest.d.ts.map +1 -1
  24. package/lib/digest.js +2 -2
  25. package/lib/digest.js.map +1 -1
  26. package/lib/embedded.d.ts +2 -23
  27. package/lib/embedded.d.ts.map +1 -1
  28. package/lib/embedded.js +82 -209
  29. package/lib/embedded.js.map +1 -1
  30. package/lib/event-mapper.d.ts.map +1 -1
  31. package/lib/event-mapper.js +0 -4
  32. package/lib/event-mapper.js.map +1 -1
  33. package/lib/feature.d.ts.map +1 -1
  34. package/lib/feature.js +2 -1
  35. package/lib/feature.js.map +1 -1
  36. package/lib/http-api/errors.d.ts +3 -3
  37. package/lib/http-api/errors.js +3 -3
  38. package/lib/http-api/errors.js.map +1 -1
  39. package/lib/http-api/utils.js +2 -2
  40. package/lib/http-api/utils.js.map +1 -1
  41. package/lib/matrix.d.ts +0 -25
  42. package/lib/matrix.d.ts.map +1 -1
  43. package/lib/matrix.js +1 -30
  44. package/lib/matrix.js.map +1 -1
  45. package/lib/models/MSC3089Branch.d.ts.map +1 -1
  46. package/lib/models/MSC3089Branch.js +0 -3
  47. package/lib/models/MSC3089Branch.js.map +1 -1
  48. package/lib/models/event-timeline-set.d.ts +6 -10
  49. package/lib/models/event-timeline-set.d.ts.map +1 -1
  50. package/lib/models/event-timeline-set.js +28 -36
  51. package/lib/models/event-timeline-set.js.map +1 -1
  52. package/lib/models/event-timeline.d.ts +7 -2
  53. package/lib/models/event-timeline.d.ts.map +1 -1
  54. package/lib/models/event-timeline.js +9 -30
  55. package/lib/models/event-timeline.js.map +1 -1
  56. package/lib/models/event.d.ts +12 -96
  57. package/lib/models/event.d.ts.map +1 -1
  58. package/lib/models/event.js +59 -286
  59. package/lib/models/event.js.map +1 -1
  60. package/lib/models/invites-ignorer-types.d.ts +27 -0
  61. package/lib/models/invites-ignorer-types.d.ts.map +1 -0
  62. package/lib/models/invites-ignorer-types.js +36 -0
  63. package/lib/models/invites-ignorer-types.js.map +1 -0
  64. package/lib/models/invites-ignorer.d.ts +2 -26
  65. package/lib/models/invites-ignorer.d.ts.map +1 -1
  66. package/lib/models/invites-ignorer.js +2 -27
  67. package/lib/models/invites-ignorer.js.map +1 -1
  68. package/lib/models/poll.d.ts.map +1 -1
  69. package/lib/models/poll.js +1 -5
  70. package/lib/models/poll.js.map +1 -1
  71. package/lib/models/relations-container.d.ts.map +1 -1
  72. package/lib/models/relations-container.js +1 -7
  73. package/lib/models/relations-container.js.map +1 -1
  74. package/lib/models/relations.d.ts +0 -1
  75. package/lib/models/relations.d.ts.map +1 -1
  76. package/lib/models/relations.js +0 -8
  77. package/lib/models/relations.js.map +1 -1
  78. package/lib/models/room-member.d.ts +6 -1
  79. package/lib/models/room-member.d.ts.map +1 -1
  80. package/lib/models/room-member.js +7 -1
  81. package/lib/models/room-member.js.map +1 -1
  82. package/lib/models/room-state.d.ts +2 -13
  83. package/lib/models/room-state.d.ts.map +1 -1
  84. package/lib/models/room-state.js +12 -56
  85. package/lib/models/room-state.js.map +1 -1
  86. package/lib/models/room.d.ts +8 -21
  87. package/lib/models/room.d.ts.map +1 -1
  88. package/lib/models/room.js +128 -163
  89. package/lib/models/room.js.map +1 -1
  90. package/lib/models/thread.d.ts.map +1 -1
  91. package/lib/models/thread.js +5 -4
  92. package/lib/models/thread.js.map +1 -1
  93. package/lib/oidc/authorize.d.ts +2 -2
  94. package/lib/oidc/authorize.d.ts.map +1 -1
  95. package/lib/oidc/authorize.js +5 -5
  96. package/lib/oidc/authorize.js.map +1 -1
  97. package/lib/oidc/discovery.d.ts +8 -0
  98. package/lib/oidc/discovery.d.ts.map +1 -1
  99. package/lib/oidc/discovery.js +22 -11
  100. package/lib/oidc/discovery.js.map +1 -1
  101. package/lib/oidc/index.d.ts +3 -4
  102. package/lib/oidc/index.d.ts.map +1 -1
  103. package/lib/oidc/index.js.map +1 -1
  104. package/lib/oidc/register.js +3 -3
  105. package/lib/oidc/register.js.map +1 -1
  106. package/lib/oidc/tokenRefresher.d.ts.map +1 -1
  107. package/lib/oidc/tokenRefresher.js +6 -5
  108. package/lib/oidc/tokenRefresher.js.map +1 -1
  109. package/lib/oidc/validate.d.ts +9 -23
  110. package/lib/oidc/validate.d.ts.map +1 -1
  111. package/lib/oidc/validate.js +13 -28
  112. package/lib/oidc/validate.js.map +1 -1
  113. package/lib/randomstring.d.ts +30 -3
  114. package/lib/randomstring.d.ts.map +1 -1
  115. package/lib/randomstring.js +68 -16
  116. package/lib/randomstring.js.map +1 -1
  117. package/lib/sliding-sync-sdk.d.ts +3 -4
  118. package/lib/sliding-sync-sdk.d.ts.map +1 -1
  119. package/lib/sliding-sync-sdk.js +55 -102
  120. package/lib/sliding-sync-sdk.js.map +1 -1
  121. package/lib/sliding-sync.js +9 -6
  122. package/lib/sliding-sync.js.map +1 -1
  123. package/lib/store/indexeddb-local-backend.js +4 -2
  124. package/lib/store/indexeddb-local-backend.js.map +1 -1
  125. package/lib/store/indexeddb.d.ts +1 -1
  126. package/lib/store/indexeddb.d.ts.map +1 -1
  127. package/lib/store/indexeddb.js.map +1 -1
  128. package/lib/sync-accumulator.d.ts +6 -4
  129. package/lib/sync-accumulator.d.ts.map +1 -1
  130. package/lib/sync-accumulator.js +23 -12
  131. package/lib/sync-accumulator.js.map +1 -1
  132. package/lib/sync.d.ts +10 -13
  133. package/lib/sync.d.ts.map +1 -1
  134. package/lib/sync.js +94 -115
  135. package/lib/sync.js.map +1 -1
  136. package/lib/testing.d.ts +13 -44
  137. package/lib/testing.d.ts.map +1 -1
  138. package/lib/testing.js +36 -99
  139. package/lib/testing.js.map +1 -1
  140. package/lib/types.d.ts +0 -1
  141. package/lib/types.d.ts.map +1 -1
  142. package/lib/types.js.map +1 -1
  143. package/package.json +14 -15
  144. package/src/@types/event.ts +19 -36
  145. package/src/@types/global.d.ts +21 -4
  146. package/src/autodiscovery.ts +1 -1
  147. package/src/base64.ts +38 -40
  148. package/src/browser-index.ts +0 -11
  149. package/src/client.ts +175 -3136
  150. package/src/digest.ts +3 -3
  151. package/src/embedded.ts +43 -149
  152. package/src/event-mapper.ts +0 -4
  153. package/src/feature.ts +1 -0
  154. package/src/http-api/errors.ts +3 -3
  155. package/src/http-api/utils.ts +2 -2
  156. package/src/matrix.ts +0 -41
  157. package/src/models/MSC3089Branch.ts +0 -3
  158. package/src/models/event-timeline-set.ts +17 -38
  159. package/src/models/event-timeline.ts +11 -26
  160. package/src/models/event.ts +54 -295
  161. package/src/models/invites-ignorer-types.ts +48 -0
  162. package/src/models/invites-ignorer.ts +7 -42
  163. package/src/models/poll.ts +0 -6
  164. package/src/models/relations-container.ts +1 -8
  165. package/src/models/relations.ts +0 -8
  166. package/src/models/room-member.ts +16 -1
  167. package/src/models/room-state.ts +4 -37
  168. package/src/models/room.ts +34 -69
  169. package/src/models/thread.ts +4 -3
  170. package/src/oidc/authorize.ts +7 -7
  171. package/src/oidc/discovery.ts +16 -10
  172. package/src/oidc/index.ts +3 -4
  173. package/src/oidc/register.ts +3 -3
  174. package/src/oidc/tokenRefresher.ts +3 -2
  175. package/src/oidc/validate.ts +40 -63
  176. package/src/randomstring.ts +65 -19
  177. package/src/sliding-sync-sdk.ts +10 -83
  178. package/src/sliding-sync.ts +6 -6
  179. package/src/store/indexeddb-local-backend.ts +2 -2
  180. package/src/store/indexeddb.ts +1 -1
  181. package/src/sync-accumulator.ts +33 -16
  182. package/src/sync.ts +112 -143
  183. package/src/testing.ts +36 -103
  184. package/src/types.ts +0 -1
  185. package/CHANGELOG.md +0 -5910
  186. package/lib/@types/AESEncryptedSecretStoragePayload.d.ts +0 -14
  187. package/lib/@types/AESEncryptedSecretStoragePayload.d.ts.map +0 -1
  188. package/lib/@types/AESEncryptedSecretStoragePayload.js +0 -1
  189. package/lib/@types/AESEncryptedSecretStoragePayload.js.map +0 -1
  190. package/lib/@types/crypto.d.ts +0 -47
  191. package/lib/@types/crypto.d.ts.map +0 -1
  192. package/lib/@types/crypto.js +0 -1
  193. package/lib/@types/crypto.js.map +0 -1
  194. package/lib/@types/matrix-sdk-crypto-wasm.d.js +0 -1
  195. package/lib/@types/matrix-sdk-crypto-wasm.d.js.map +0 -1
  196. package/lib/common-crypto/CryptoBackend.d.ts +0 -240
  197. package/lib/common-crypto/CryptoBackend.d.ts.map +0 -1
  198. package/lib/common-crypto/CryptoBackend.js +0 -73
  199. package/lib/common-crypto/CryptoBackend.js.map +0 -1
  200. package/lib/common-crypto/key-passphrase.d.ts +0 -14
  201. package/lib/common-crypto/key-passphrase.d.ts.map +0 -1
  202. package/lib/common-crypto/key-passphrase.js +0 -33
  203. package/lib/common-crypto/key-passphrase.js.map +0 -1
  204. package/lib/crypto/CrossSigning.d.ts +0 -184
  205. package/lib/crypto/CrossSigning.d.ts.map +0 -1
  206. package/lib/crypto/CrossSigning.js +0 -718
  207. package/lib/crypto/CrossSigning.js.map +0 -1
  208. package/lib/crypto/DeviceList.d.ts +0 -216
  209. package/lib/crypto/DeviceList.d.ts.map +0 -1
  210. package/lib/crypto/DeviceList.js +0 -892
  211. package/lib/crypto/DeviceList.js.map +0 -1
  212. package/lib/crypto/EncryptionSetup.d.ts +0 -152
  213. package/lib/crypto/EncryptionSetup.d.ts.map +0 -1
  214. package/lib/crypto/EncryptionSetup.js +0 -356
  215. package/lib/crypto/EncryptionSetup.js.map +0 -1
  216. package/lib/crypto/OlmDevice.d.ts +0 -457
  217. package/lib/crypto/OlmDevice.d.ts.map +0 -1
  218. package/lib/crypto/OlmDevice.js +0 -1241
  219. package/lib/crypto/OlmDevice.js.map +0 -1
  220. package/lib/crypto/OutgoingRoomKeyRequestManager.d.ts +0 -109
  221. package/lib/crypto/OutgoingRoomKeyRequestManager.d.ts.map +0 -1
  222. package/lib/crypto/OutgoingRoomKeyRequestManager.js +0 -415
  223. package/lib/crypto/OutgoingRoomKeyRequestManager.js.map +0 -1
  224. package/lib/crypto/RoomList.d.ts +0 -26
  225. package/lib/crypto/RoomList.d.ts.map +0 -1
  226. package/lib/crypto/RoomList.js +0 -71
  227. package/lib/crypto/RoomList.js.map +0 -1
  228. package/lib/crypto/SecretSharing.d.ts +0 -24
  229. package/lib/crypto/SecretSharing.d.ts.map +0 -1
  230. package/lib/crypto/SecretSharing.js +0 -194
  231. package/lib/crypto/SecretSharing.js.map +0 -1
  232. package/lib/crypto/SecretStorage.d.ts +0 -55
  233. package/lib/crypto/SecretStorage.d.ts.map +0 -1
  234. package/lib/crypto/SecretStorage.js +0 -118
  235. package/lib/crypto/SecretStorage.js.map +0 -1
  236. package/lib/crypto/aes.d.ts +0 -6
  237. package/lib/crypto/aes.d.ts.map +0 -1
  238. package/lib/crypto/aes.js +0 -24
  239. package/lib/crypto/aes.js.map +0 -1
  240. package/lib/crypto/algorithms/base.d.ts +0 -156
  241. package/lib/crypto/algorithms/base.d.ts.map +0 -1
  242. package/lib/crypto/algorithms/base.js +0 -187
  243. package/lib/crypto/algorithms/base.js.map +0 -1
  244. package/lib/crypto/algorithms/index.d.ts +0 -4
  245. package/lib/crypto/algorithms/index.d.ts.map +0 -1
  246. package/lib/crypto/algorithms/index.js +0 -20
  247. package/lib/crypto/algorithms/index.js.map +0 -1
  248. package/lib/crypto/algorithms/megolm.d.ts +0 -385
  249. package/lib/crypto/algorithms/megolm.d.ts.map +0 -1
  250. package/lib/crypto/algorithms/megolm.js +0 -1822
  251. package/lib/crypto/algorithms/megolm.js.map +0 -1
  252. package/lib/crypto/algorithms/olm.d.ts +0 -5
  253. package/lib/crypto/algorithms/olm.d.ts.map +0 -1
  254. package/lib/crypto/algorithms/olm.js +0 -299
  255. package/lib/crypto/algorithms/olm.js.map +0 -1
  256. package/lib/crypto/api.d.ts +0 -32
  257. package/lib/crypto/api.d.ts.map +0 -1
  258. package/lib/crypto/api.js +0 -22
  259. package/lib/crypto/api.js.map +0 -1
  260. package/lib/crypto/backup.d.ts +0 -227
  261. package/lib/crypto/backup.d.ts.map +0 -1
  262. package/lib/crypto/backup.js +0 -824
  263. package/lib/crypto/backup.js.map +0 -1
  264. package/lib/crypto/crypto.d.ts +0 -3
  265. package/lib/crypto/crypto.d.ts.map +0 -1
  266. package/lib/crypto/crypto.js +0 -19
  267. package/lib/crypto/crypto.js.map +0 -1
  268. package/lib/crypto/dehydration.d.ts +0 -34
  269. package/lib/crypto/dehydration.d.ts.map +0 -1
  270. package/lib/crypto/dehydration.js +0 -252
  271. package/lib/crypto/dehydration.js.map +0 -1
  272. package/lib/crypto/device-converter.d.ts +0 -9
  273. package/lib/crypto/device-converter.d.ts.map +0 -1
  274. package/lib/crypto/device-converter.js +0 -42
  275. package/lib/crypto/device-converter.js.map +0 -1
  276. package/lib/crypto/deviceinfo.d.ts +0 -99
  277. package/lib/crypto/deviceinfo.d.ts.map +0 -1
  278. package/lib/crypto/deviceinfo.js +0 -148
  279. package/lib/crypto/deviceinfo.js.map +0 -1
  280. package/lib/crypto/index.d.ts +0 -1210
  281. package/lib/crypto/index.d.ts.map +0 -1
  282. package/lib/crypto/index.js +0 -4101
  283. package/lib/crypto/index.js.map +0 -1
  284. package/lib/crypto/key_passphrase.d.ts +0 -14
  285. package/lib/crypto/key_passphrase.d.ts.map +0 -1
  286. package/lib/crypto/key_passphrase.js +0 -44
  287. package/lib/crypto/key_passphrase.js.map +0 -1
  288. package/lib/crypto/keybackup.d.ts +0 -18
  289. package/lib/crypto/keybackup.d.ts.map +0 -1
  290. package/lib/crypto/keybackup.js +0 -1
  291. package/lib/crypto/keybackup.js.map +0 -1
  292. package/lib/crypto/olmlib.d.ts +0 -129
  293. package/lib/crypto/olmlib.d.ts.map +0 -1
  294. package/lib/crypto/olmlib.js +0 -492
  295. package/lib/crypto/olmlib.js.map +0 -1
  296. package/lib/crypto/recoverykey.d.ts +0 -2
  297. package/lib/crypto/recoverykey.d.ts.map +0 -1
  298. package/lib/crypto/recoverykey.js +0 -19
  299. package/lib/crypto/recoverykey.js.map +0 -1
  300. package/lib/crypto/store/base.d.ts +0 -252
  301. package/lib/crypto/store/base.d.ts.map +0 -1
  302. package/lib/crypto/store/base.js +0 -64
  303. package/lib/crypto/store/base.js.map +0 -1
  304. package/lib/crypto/store/indexeddb-crypto-store-backend.d.ts +0 -187
  305. package/lib/crypto/store/indexeddb-crypto-store-backend.d.ts.map +0 -1
  306. package/lib/crypto/store/indexeddb-crypto-store-backend.js +0 -1145
  307. package/lib/crypto/store/indexeddb-crypto-store-backend.js.map +0 -1
  308. package/lib/crypto/store/indexeddb-crypto-store.d.ts +0 -432
  309. package/lib/crypto/store/indexeddb-crypto-store.d.ts.map +0 -1
  310. package/lib/crypto/store/indexeddb-crypto-store.js +0 -728
  311. package/lib/crypto/store/indexeddb-crypto-store.js.map +0 -1
  312. package/lib/crypto/store/localStorage-crypto-store.d.ts +0 -119
  313. package/lib/crypto/store/localStorage-crypto-store.d.ts.map +0 -1
  314. package/lib/crypto/store/localStorage-crypto-store.js +0 -531
  315. package/lib/crypto/store/localStorage-crypto-store.js.map +0 -1
  316. package/lib/crypto/store/memory-crypto-store.d.ts +0 -215
  317. package/lib/crypto/store/memory-crypto-store.d.ts.map +0 -1
  318. package/lib/crypto/store/memory-crypto-store.js +0 -622
  319. package/lib/crypto/store/memory-crypto-store.js.map +0 -1
  320. package/lib/crypto/verification/Base.d.ts +0 -105
  321. package/lib/crypto/verification/Base.d.ts.map +0 -1
  322. package/lib/crypto/verification/Base.js +0 -372
  323. package/lib/crypto/verification/Base.js.map +0 -1
  324. package/lib/crypto/verification/Error.d.ts +0 -35
  325. package/lib/crypto/verification/Error.d.ts.map +0 -1
  326. package/lib/crypto/verification/Error.js +0 -86
  327. package/lib/crypto/verification/Error.js.map +0 -1
  328. package/lib/crypto/verification/IllegalMethod.d.ts +0 -15
  329. package/lib/crypto/verification/IllegalMethod.d.ts.map +0 -1
  330. package/lib/crypto/verification/IllegalMethod.js +0 -43
  331. package/lib/crypto/verification/IllegalMethod.js.map +0 -1
  332. package/lib/crypto/verification/QRCode.d.ts +0 -51
  333. package/lib/crypto/verification/QRCode.d.ts.map +0 -1
  334. package/lib/crypto/verification/QRCode.js +0 -277
  335. package/lib/crypto/verification/QRCode.js.map +0 -1
  336. package/lib/crypto/verification/SAS.d.ts +0 -27
  337. package/lib/crypto/verification/SAS.d.ts.map +0 -1
  338. package/lib/crypto/verification/SAS.js +0 -485
  339. package/lib/crypto/verification/SAS.js.map +0 -1
  340. package/lib/crypto/verification/SASDecimal.d.ts +0 -8
  341. package/lib/crypto/verification/SASDecimal.d.ts.map +0 -1
  342. package/lib/crypto/verification/SASDecimal.js +0 -34
  343. package/lib/crypto/verification/SASDecimal.js.map +0 -1
  344. package/lib/crypto/verification/request/Channel.d.ts +0 -18
  345. package/lib/crypto/verification/request/Channel.d.ts.map +0 -1
  346. package/lib/crypto/verification/request/Channel.js +0 -1
  347. package/lib/crypto/verification/request/Channel.js.map +0 -1
  348. package/lib/crypto/verification/request/InRoomChannel.d.ts +0 -113
  349. package/lib/crypto/verification/request/InRoomChannel.d.ts.map +0 -1
  350. package/lib/crypto/verification/request/InRoomChannel.js +0 -351
  351. package/lib/crypto/verification/request/InRoomChannel.js.map +0 -1
  352. package/lib/crypto/verification/request/ToDeviceChannel.d.ts +0 -105
  353. package/lib/crypto/verification/request/ToDeviceChannel.d.ts.map +0 -1
  354. package/lib/crypto/verification/request/ToDeviceChannel.js +0 -328
  355. package/lib/crypto/verification/request/ToDeviceChannel.js.map +0 -1
  356. package/lib/crypto/verification/request/VerificationRequest.d.ts +0 -227
  357. package/lib/crypto/verification/request/VerificationRequest.d.ts.map +0 -1
  358. package/lib/crypto/verification/request/VerificationRequest.js +0 -937
  359. package/lib/crypto/verification/request/VerificationRequest.js.map +0 -1
  360. package/lib/crypto-api/CryptoEvent.d.ts +0 -69
  361. package/lib/crypto-api/CryptoEvent.d.ts.map +0 -1
  362. package/lib/crypto-api/CryptoEvent.js +0 -33
  363. package/lib/crypto-api/CryptoEvent.js.map +0 -1
  364. package/lib/crypto-api/CryptoEventHandlerMap.d.ts +0 -16
  365. package/lib/crypto-api/CryptoEventHandlerMap.d.ts.map +0 -1
  366. package/lib/crypto-api/CryptoEventHandlerMap.js +0 -22
  367. package/lib/crypto-api/CryptoEventHandlerMap.js.map +0 -1
  368. package/lib/crypto-api/index.d.ts +0 -978
  369. package/lib/crypto-api/index.d.ts.map +0 -1
  370. package/lib/crypto-api/index.js +0 -304
  371. package/lib/crypto-api/index.js.map +0 -1
  372. package/lib/crypto-api/key-passphrase.d.ts +0 -11
  373. package/lib/crypto-api/key-passphrase.d.ts.map +0 -1
  374. package/lib/crypto-api/key-passphrase.js +0 -51
  375. package/lib/crypto-api/key-passphrase.js.map +0 -1
  376. package/lib/crypto-api/keybackup.d.ts +0 -88
  377. package/lib/crypto-api/keybackup.d.ts.map +0 -1
  378. package/lib/crypto-api/keybackup.js +0 -1
  379. package/lib/crypto-api/keybackup.js.map +0 -1
  380. package/lib/crypto-api/recovery-key.d.ts +0 -11
  381. package/lib/crypto-api/recovery-key.d.ts.map +0 -1
  382. package/lib/crypto-api/recovery-key.js +0 -65
  383. package/lib/crypto-api/recovery-key.js.map +0 -1
  384. package/lib/crypto-api/verification.d.ts +0 -344
  385. package/lib/crypto-api/verification.d.ts.map +0 -1
  386. package/lib/crypto-api/verification.js +0 -91
  387. package/lib/crypto-api/verification.js.map +0 -1
  388. package/lib/matrixrtc/CallMembership.d.ts +0 -66
  389. package/lib/matrixrtc/CallMembership.d.ts.map +0 -1
  390. package/lib/matrixrtc/CallMembership.js +0 -197
  391. package/lib/matrixrtc/CallMembership.js.map +0 -1
  392. package/lib/matrixrtc/LivekitFocus.d.ts +0 -16
  393. package/lib/matrixrtc/LivekitFocus.d.ts.map +0 -1
  394. package/lib/matrixrtc/LivekitFocus.js +0 -20
  395. package/lib/matrixrtc/LivekitFocus.js.map +0 -1
  396. package/lib/matrixrtc/MatrixRTCSession.d.ts +0 -295
  397. package/lib/matrixrtc/MatrixRTCSession.d.ts.map +0 -1
  398. package/lib/matrixrtc/MatrixRTCSession.js +0 -1043
  399. package/lib/matrixrtc/MatrixRTCSession.js.map +0 -1
  400. package/lib/matrixrtc/MatrixRTCSessionManager.d.ts +0 -40
  401. package/lib/matrixrtc/MatrixRTCSessionManager.d.ts.map +0 -1
  402. package/lib/matrixrtc/MatrixRTCSessionManager.js +0 -146
  403. package/lib/matrixrtc/MatrixRTCSessionManager.js.map +0 -1
  404. package/lib/matrixrtc/focus.d.ts +0 -10
  405. package/lib/matrixrtc/focus.d.ts.map +0 -1
  406. package/lib/matrixrtc/focus.js +0 -1
  407. package/lib/matrixrtc/focus.js.map +0 -1
  408. package/lib/matrixrtc/index.d.ts +0 -7
  409. package/lib/matrixrtc/index.d.ts.map +0 -1
  410. package/lib/matrixrtc/index.js +0 -21
  411. package/lib/matrixrtc/index.js.map +0 -1
  412. package/lib/matrixrtc/types.d.ts +0 -19
  413. package/lib/matrixrtc/types.d.ts.map +0 -1
  414. package/lib/matrixrtc/types.js +0 -1
  415. package/lib/matrixrtc/types.js.map +0 -1
  416. package/lib/rendezvous/MSC4108SignInWithQR.d.ts +0 -112
  417. package/lib/rendezvous/MSC4108SignInWithQR.d.ts.map +0 -1
  418. package/lib/rendezvous/MSC4108SignInWithQR.js +0 -392
  419. package/lib/rendezvous/MSC4108SignInWithQR.js.map +0 -1
  420. package/lib/rendezvous/RendezvousChannel.d.ts +0 -27
  421. package/lib/rendezvous/RendezvousChannel.d.ts.map +0 -1
  422. package/lib/rendezvous/RendezvousChannel.js +0 -1
  423. package/lib/rendezvous/RendezvousChannel.js.map +0 -1
  424. package/lib/rendezvous/RendezvousCode.d.ts +0 -9
  425. package/lib/rendezvous/RendezvousCode.d.ts.map +0 -1
  426. package/lib/rendezvous/RendezvousCode.js +0 -1
  427. package/lib/rendezvous/RendezvousCode.js.map +0 -1
  428. package/lib/rendezvous/RendezvousError.d.ts +0 -6
  429. package/lib/rendezvous/RendezvousError.d.ts.map +0 -1
  430. package/lib/rendezvous/RendezvousError.js +0 -23
  431. package/lib/rendezvous/RendezvousError.js.map +0 -1
  432. package/lib/rendezvous/RendezvousFailureReason.d.ts +0 -31
  433. package/lib/rendezvous/RendezvousFailureReason.d.ts.map +0 -1
  434. package/lib/rendezvous/RendezvousFailureReason.js +0 -38
  435. package/lib/rendezvous/RendezvousFailureReason.js.map +0 -1
  436. package/lib/rendezvous/RendezvousIntent.d.ts +0 -5
  437. package/lib/rendezvous/RendezvousIntent.d.ts.map +0 -1
  438. package/lib/rendezvous/RendezvousIntent.js +0 -22
  439. package/lib/rendezvous/RendezvousIntent.js.map +0 -1
  440. package/lib/rendezvous/RendezvousTransport.d.ts +0 -36
  441. package/lib/rendezvous/RendezvousTransport.d.ts.map +0 -1
  442. package/lib/rendezvous/RendezvousTransport.js +0 -1
  443. package/lib/rendezvous/RendezvousTransport.js.map +0 -1
  444. package/lib/rendezvous/channels/MSC4108SecureChannel.d.ts +0 -58
  445. package/lib/rendezvous/channels/MSC4108SecureChannel.d.ts.map +0 -1
  446. package/lib/rendezvous/channels/MSC4108SecureChannel.js +0 -246
  447. package/lib/rendezvous/channels/MSC4108SecureChannel.js.map +0 -1
  448. package/lib/rendezvous/channels/index.d.ts +0 -2
  449. package/lib/rendezvous/channels/index.d.ts.map +0 -1
  450. package/lib/rendezvous/channels/index.js +0 -18
  451. package/lib/rendezvous/channels/index.js.map +0 -1
  452. package/lib/rendezvous/index.d.ts +0 -10
  453. package/lib/rendezvous/index.d.ts.map +0 -1
  454. package/lib/rendezvous/index.js +0 -23
  455. package/lib/rendezvous/index.js.map +0 -1
  456. package/lib/rendezvous/transports/MSC4108RendezvousSession.d.ts +0 -61
  457. package/lib/rendezvous/transports/MSC4108RendezvousSession.d.ts.map +0 -1
  458. package/lib/rendezvous/transports/MSC4108RendezvousSession.js +0 -253
  459. package/lib/rendezvous/transports/MSC4108RendezvousSession.js.map +0 -1
  460. package/lib/rendezvous/transports/index.d.ts +0 -2
  461. package/lib/rendezvous/transports/index.d.ts.map +0 -1
  462. package/lib/rendezvous/transports/index.js +0 -18
  463. package/lib/rendezvous/transports/index.js.map +0 -1
  464. package/lib/rust-crypto/CrossSigningIdentity.d.ts +0 -33
  465. package/lib/rust-crypto/CrossSigningIdentity.d.ts.map +0 -1
  466. package/lib/rust-crypto/CrossSigningIdentity.js +0 -157
  467. package/lib/rust-crypto/CrossSigningIdentity.js.map +0 -1
  468. package/lib/rust-crypto/DehydratedDeviceManager.d.ts +0 -98
  469. package/lib/rust-crypto/DehydratedDeviceManager.d.ts.map +0 -1
  470. package/lib/rust-crypto/DehydratedDeviceManager.js +0 -285
  471. package/lib/rust-crypto/DehydratedDeviceManager.js.map +0 -1
  472. package/lib/rust-crypto/KeyClaimManager.d.ts +0 -33
  473. package/lib/rust-crypto/KeyClaimManager.d.ts.map +0 -1
  474. package/lib/rust-crypto/KeyClaimManager.js +0 -82
  475. package/lib/rust-crypto/KeyClaimManager.js.map +0 -1
  476. package/lib/rust-crypto/OutgoingRequestProcessor.d.ts +0 -43
  477. package/lib/rust-crypto/OutgoingRequestProcessor.d.ts.map +0 -1
  478. package/lib/rust-crypto/OutgoingRequestProcessor.js +0 -195
  479. package/lib/rust-crypto/OutgoingRequestProcessor.js.map +0 -1
  480. package/lib/rust-crypto/OutgoingRequestsManager.d.ts +0 -47
  481. package/lib/rust-crypto/OutgoingRequestsManager.d.ts.map +0 -1
  482. package/lib/rust-crypto/OutgoingRequestsManager.js +0 -148
  483. package/lib/rust-crypto/OutgoingRequestsManager.js.map +0 -1
  484. package/lib/rust-crypto/PerSessionKeyBackupDownloader.d.ts +0 -120
  485. package/lib/rust-crypto/PerSessionKeyBackupDownloader.d.ts.map +0 -1
  486. package/lib/rust-crypto/PerSessionKeyBackupDownloader.js +0 -467
  487. package/lib/rust-crypto/PerSessionKeyBackupDownloader.js.map +0 -1
  488. package/lib/rust-crypto/RoomEncryptor.d.ts +0 -98
  489. package/lib/rust-crypto/RoomEncryptor.d.ts.map +0 -1
  490. package/lib/rust-crypto/RoomEncryptor.js +0 -299
  491. package/lib/rust-crypto/RoomEncryptor.js.map +0 -1
  492. package/lib/rust-crypto/backup.d.ts +0 -254
  493. package/lib/rust-crypto/backup.d.ts.map +0 -1
  494. package/lib/rust-crypto/backup.js +0 -837
  495. package/lib/rust-crypto/backup.js.map +0 -1
  496. package/lib/rust-crypto/constants.d.ts +0 -3
  497. package/lib/rust-crypto/constants.d.ts.map +0 -1
  498. package/lib/rust-crypto/constants.js +0 -19
  499. package/lib/rust-crypto/constants.js.map +0 -1
  500. package/lib/rust-crypto/device-converter.d.ts +0 -28
  501. package/lib/rust-crypto/device-converter.d.ts.map +0 -1
  502. package/lib/rust-crypto/device-converter.js +0 -123
  503. package/lib/rust-crypto/device-converter.js.map +0 -1
  504. package/lib/rust-crypto/index.d.ts +0 -61
  505. package/lib/rust-crypto/index.d.ts.map +0 -1
  506. package/lib/rust-crypto/index.js +0 -152
  507. package/lib/rust-crypto/index.js.map +0 -1
  508. package/lib/rust-crypto/libolm_migration.d.ts +0 -81
  509. package/lib/rust-crypto/libolm_migration.d.ts.map +0 -1
  510. package/lib/rust-crypto/libolm_migration.js +0 -459
  511. package/lib/rust-crypto/libolm_migration.js.map +0 -1
  512. package/lib/rust-crypto/rust-crypto.d.ts +0 -556
  513. package/lib/rust-crypto/rust-crypto.d.ts.map +0 -1
  514. package/lib/rust-crypto/rust-crypto.js +0 -2016
  515. package/lib/rust-crypto/rust-crypto.js.map +0 -1
  516. package/lib/rust-crypto/secret-storage.d.ts +0 -22
  517. package/lib/rust-crypto/secret-storage.d.ts.map +0 -1
  518. package/lib/rust-crypto/secret-storage.js +0 -63
  519. package/lib/rust-crypto/secret-storage.js.map +0 -1
  520. package/lib/rust-crypto/verification.d.ts +0 -319
  521. package/lib/rust-crypto/verification.d.ts.map +0 -1
  522. package/lib/rust-crypto/verification.js +0 -816
  523. package/lib/rust-crypto/verification.js.map +0 -1
  524. package/lib/secret-storage.d.ts +0 -370
  525. package/lib/secret-storage.d.ts.map +0 -1
  526. package/lib/secret-storage.js +0 -466
  527. package/lib/secret-storage.js.map +0 -1
  528. package/lib/utils/decryptAESSecretStorageItem.d.ts +0 -12
  529. package/lib/utils/decryptAESSecretStorageItem.d.ts.map +0 -1
  530. package/lib/utils/decryptAESSecretStorageItem.js +0 -50
  531. package/lib/utils/decryptAESSecretStorageItem.js.map +0 -1
  532. package/lib/utils/encryptAESSecretStorageItem.d.ts +0 -16
  533. package/lib/utils/encryptAESSecretStorageItem.d.ts.map +0 -1
  534. package/lib/utils/encryptAESSecretStorageItem.js +0 -68
  535. package/lib/utils/encryptAESSecretStorageItem.js.map +0 -1
  536. package/lib/utils/internal/deriveKeys.d.ts +0 -10
  537. package/lib/utils/internal/deriveKeys.d.ts.map +0 -1
  538. package/lib/utils/internal/deriveKeys.js +0 -60
  539. package/lib/utils/internal/deriveKeys.js.map +0 -1
  540. package/lib/webrtc/audioContext.d.ts +0 -15
  541. package/lib/webrtc/audioContext.d.ts.map +0 -1
  542. package/lib/webrtc/audioContext.js +0 -46
  543. package/lib/webrtc/audioContext.js.map +0 -1
  544. package/lib/webrtc/call.d.ts +0 -560
  545. package/lib/webrtc/call.d.ts.map +0 -1
  546. package/lib/webrtc/call.js +0 -2541
  547. package/lib/webrtc/call.js.map +0 -1
  548. package/lib/webrtc/callEventHandler.d.ts +0 -37
  549. package/lib/webrtc/callEventHandler.d.ts.map +0 -1
  550. package/lib/webrtc/callEventHandler.js +0 -344
  551. package/lib/webrtc/callEventHandler.js.map +0 -1
  552. package/lib/webrtc/callEventTypes.d.ts +0 -73
  553. package/lib/webrtc/callEventTypes.d.ts.map +0 -1
  554. package/lib/webrtc/callEventTypes.js +0 -13
  555. package/lib/webrtc/callEventTypes.js.map +0 -1
  556. package/lib/webrtc/callFeed.d.ts +0 -128
  557. package/lib/webrtc/callFeed.d.ts.map +0 -1
  558. package/lib/webrtc/callFeed.js +0 -289
  559. package/lib/webrtc/callFeed.js.map +0 -1
  560. package/lib/webrtc/groupCall.d.ts +0 -323
  561. package/lib/webrtc/groupCall.d.ts.map +0 -1
  562. package/lib/webrtc/groupCall.js +0 -1337
  563. package/lib/webrtc/groupCall.js.map +0 -1
  564. package/lib/webrtc/groupCallEventHandler.d.ts +0 -31
  565. package/lib/webrtc/groupCallEventHandler.d.ts.map +0 -1
  566. package/lib/webrtc/groupCallEventHandler.js +0 -178
  567. package/lib/webrtc/groupCallEventHandler.js.map +0 -1
  568. package/lib/webrtc/mediaHandler.d.ts +0 -89
  569. package/lib/webrtc/mediaHandler.d.ts.map +0 -1
  570. package/lib/webrtc/mediaHandler.js +0 -437
  571. package/lib/webrtc/mediaHandler.js.map +0 -1
  572. package/lib/webrtc/stats/callFeedStatsReporter.d.ts +0 -8
  573. package/lib/webrtc/stats/callFeedStatsReporter.d.ts.map +0 -1
  574. package/lib/webrtc/stats/callFeedStatsReporter.js +0 -82
  575. package/lib/webrtc/stats/callFeedStatsReporter.js.map +0 -1
  576. package/lib/webrtc/stats/callStatsReportGatherer.d.ts +0 -25
  577. package/lib/webrtc/stats/callStatsReportGatherer.d.ts.map +0 -1
  578. package/lib/webrtc/stats/callStatsReportGatherer.js +0 -199
  579. package/lib/webrtc/stats/callStatsReportGatherer.js.map +0 -1
  580. package/lib/webrtc/stats/callStatsReportSummary.d.ts +0 -17
  581. package/lib/webrtc/stats/callStatsReportSummary.d.ts.map +0 -1
  582. package/lib/webrtc/stats/callStatsReportSummary.js +0 -1
  583. package/lib/webrtc/stats/callStatsReportSummary.js.map +0 -1
  584. package/lib/webrtc/stats/connectionStats.d.ts +0 -28
  585. package/lib/webrtc/stats/connectionStats.d.ts.map +0 -1
  586. package/lib/webrtc/stats/connectionStats.js +0 -26
  587. package/lib/webrtc/stats/connectionStats.js.map +0 -1
  588. package/lib/webrtc/stats/connectionStatsBuilder.d.ts +0 -5
  589. package/lib/webrtc/stats/connectionStatsBuilder.d.ts.map +0 -1
  590. package/lib/webrtc/stats/connectionStatsBuilder.js +0 -27
  591. package/lib/webrtc/stats/connectionStatsBuilder.js.map +0 -1
  592. package/lib/webrtc/stats/connectionStatsReportBuilder.d.ts +0 -7
  593. package/lib/webrtc/stats/connectionStatsReportBuilder.d.ts.map +0 -1
  594. package/lib/webrtc/stats/connectionStatsReportBuilder.js +0 -121
  595. package/lib/webrtc/stats/connectionStatsReportBuilder.js.map +0 -1
  596. package/lib/webrtc/stats/groupCallStats.d.ts +0 -22
  597. package/lib/webrtc/stats/groupCallStats.d.ts.map +0 -1
  598. package/lib/webrtc/stats/groupCallStats.js +0 -78
  599. package/lib/webrtc/stats/groupCallStats.js.map +0 -1
  600. package/lib/webrtc/stats/media/mediaSsrcHandler.d.ts +0 -10
  601. package/lib/webrtc/stats/media/mediaSsrcHandler.d.ts.map +0 -1
  602. package/lib/webrtc/stats/media/mediaSsrcHandler.js +0 -57
  603. package/lib/webrtc/stats/media/mediaSsrcHandler.js.map +0 -1
  604. package/lib/webrtc/stats/media/mediaTrackHandler.d.ts +0 -12
  605. package/lib/webrtc/stats/media/mediaTrackHandler.d.ts.map +0 -1
  606. package/lib/webrtc/stats/media/mediaTrackHandler.js +0 -62
  607. package/lib/webrtc/stats/media/mediaTrackHandler.js.map +0 -1
  608. package/lib/webrtc/stats/media/mediaTrackStats.d.ts +0 -86
  609. package/lib/webrtc/stats/media/mediaTrackStats.d.ts.map +0 -1
  610. package/lib/webrtc/stats/media/mediaTrackStats.js +0 -142
  611. package/lib/webrtc/stats/media/mediaTrackStats.js.map +0 -1
  612. package/lib/webrtc/stats/media/mediaTrackStatsHandler.d.ts +0 -22
  613. package/lib/webrtc/stats/media/mediaTrackStatsHandler.d.ts.map +0 -1
  614. package/lib/webrtc/stats/media/mediaTrackStatsHandler.js +0 -76
  615. package/lib/webrtc/stats/media/mediaTrackStatsHandler.js.map +0 -1
  616. package/lib/webrtc/stats/statsReport.d.ts +0 -99
  617. package/lib/webrtc/stats/statsReport.d.ts.map +0 -1
  618. package/lib/webrtc/stats/statsReport.js +0 -32
  619. package/lib/webrtc/stats/statsReport.js.map +0 -1
  620. package/lib/webrtc/stats/statsReportEmitter.d.ts +0 -15
  621. package/lib/webrtc/stats/statsReportEmitter.d.ts.map +0 -1
  622. package/lib/webrtc/stats/statsReportEmitter.js +0 -33
  623. package/lib/webrtc/stats/statsReportEmitter.js.map +0 -1
  624. package/lib/webrtc/stats/summaryStatsReportGatherer.d.ts +0 -16
  625. package/lib/webrtc/stats/summaryStatsReportGatherer.d.ts.map +0 -1
  626. package/lib/webrtc/stats/summaryStatsReportGatherer.js +0 -116
  627. package/lib/webrtc/stats/summaryStatsReportGatherer.js.map +0 -1
  628. package/lib/webrtc/stats/trackStatsBuilder.d.ts +0 -19
  629. package/lib/webrtc/stats/trackStatsBuilder.d.ts.map +0 -1
  630. package/lib/webrtc/stats/trackStatsBuilder.js +0 -168
  631. package/lib/webrtc/stats/trackStatsBuilder.js.map +0 -1
  632. package/lib/webrtc/stats/transportStats.d.ts +0 -11
  633. package/lib/webrtc/stats/transportStats.d.ts.map +0 -1
  634. package/lib/webrtc/stats/transportStats.js +0 -1
  635. package/lib/webrtc/stats/transportStats.js.map +0 -1
  636. package/lib/webrtc/stats/transportStatsBuilder.d.ts +0 -5
  637. package/lib/webrtc/stats/transportStatsBuilder.d.ts.map +0 -1
  638. package/lib/webrtc/stats/transportStatsBuilder.js +0 -34
  639. package/lib/webrtc/stats/transportStatsBuilder.js.map +0 -1
  640. package/lib/webrtc/stats/valueFormatter.d.ts +0 -4
  641. package/lib/webrtc/stats/valueFormatter.d.ts.map +0 -1
  642. package/lib/webrtc/stats/valueFormatter.js +0 -25
  643. package/lib/webrtc/stats/valueFormatter.js.map +0 -1
  644. package/src/@types/AESEncryptedSecretStoragePayload.ts +0 -29
  645. package/src/@types/crypto.ts +0 -73
  646. package/src/@types/matrix-sdk-crypto-wasm.d.ts +0 -44
  647. package/src/common-crypto/CryptoBackend.ts +0 -302
  648. package/src/common-crypto/README.md +0 -4
  649. package/src/common-crypto/key-passphrase.ts +0 -43
  650. package/src/crypto/CrossSigning.ts +0 -773
  651. package/src/crypto/DeviceList.ts +0 -989
  652. package/src/crypto/EncryptionSetup.ts +0 -351
  653. package/src/crypto/OlmDevice.ts +0 -1500
  654. package/src/crypto/OutgoingRoomKeyRequestManager.ts +0 -485
  655. package/src/crypto/RoomList.ts +0 -70
  656. package/src/crypto/SecretSharing.ts +0 -240
  657. package/src/crypto/SecretStorage.ts +0 -136
  658. package/src/crypto/aes.ts +0 -23
  659. package/src/crypto/algorithms/base.ts +0 -236
  660. package/src/crypto/algorithms/index.ts +0 -20
  661. package/src/crypto/algorithms/megolm.ts +0 -2216
  662. package/src/crypto/algorithms/olm.ts +0 -381
  663. package/src/crypto/api.ts +0 -70
  664. package/src/crypto/backup.ts +0 -922
  665. package/src/crypto/crypto.ts +0 -18
  666. package/src/crypto/dehydration.ts +0 -272
  667. package/src/crypto/device-converter.ts +0 -45
  668. package/src/crypto/deviceinfo.ts +0 -158
  669. package/src/crypto/index.ts +0 -4418
  670. package/src/crypto/key_passphrase.ts +0 -42
  671. package/src/crypto/keybackup.ts +0 -47
  672. package/src/crypto/olmlib.ts +0 -539
  673. package/src/crypto/recoverykey.ts +0 -18
  674. package/src/crypto/store/base.ts +0 -348
  675. package/src/crypto/store/indexeddb-crypto-store-backend.ts +0 -1250
  676. package/src/crypto/store/indexeddb-crypto-store.ts +0 -845
  677. package/src/crypto/store/localStorage-crypto-store.ts +0 -579
  678. package/src/crypto/store/memory-crypto-store.ts +0 -680
  679. package/src/crypto/verification/Base.ts +0 -409
  680. package/src/crypto/verification/Error.ts +0 -76
  681. package/src/crypto/verification/IllegalMethod.ts +0 -50
  682. package/src/crypto/verification/QRCode.ts +0 -310
  683. package/src/crypto/verification/SAS.ts +0 -494
  684. package/src/crypto/verification/SASDecimal.ts +0 -37
  685. package/src/crypto/verification/request/Channel.ts +0 -34
  686. package/src/crypto/verification/request/InRoomChannel.ts +0 -371
  687. package/src/crypto/verification/request/ToDeviceChannel.ts +0 -354
  688. package/src/crypto/verification/request/VerificationRequest.ts +0 -976
  689. package/src/crypto-api/CryptoEvent.ts +0 -93
  690. package/src/crypto-api/CryptoEventHandlerMap.ts +0 -32
  691. package/src/crypto-api/index.ts +0 -1175
  692. package/src/crypto-api/key-passphrase.ts +0 -58
  693. package/src/crypto-api/keybackup.ts +0 -115
  694. package/src/crypto-api/recovery-key.ts +0 -69
  695. package/src/crypto-api/verification.ts +0 -408
  696. package/src/matrixrtc/CallMembership.ts +0 -247
  697. package/src/matrixrtc/LivekitFocus.ts +0 -39
  698. package/src/matrixrtc/MatrixRTCSession.ts +0 -1319
  699. package/src/matrixrtc/MatrixRTCSessionManager.ts +0 -166
  700. package/src/matrixrtc/focus.ts +0 -25
  701. package/src/matrixrtc/index.ts +0 -22
  702. package/src/matrixrtc/types.ts +0 -36
  703. package/src/rendezvous/MSC4108SignInWithQR.ts +0 -444
  704. package/src/rendezvous/RendezvousChannel.ts +0 -48
  705. package/src/rendezvous/RendezvousCode.ts +0 -25
  706. package/src/rendezvous/RendezvousError.ts +0 -26
  707. package/src/rendezvous/RendezvousFailureReason.ts +0 -49
  708. package/src/rendezvous/RendezvousIntent.ts +0 -20
  709. package/src/rendezvous/RendezvousTransport.ts +0 -58
  710. package/src/rendezvous/channels/MSC4108SecureChannel.ts +0 -270
  711. package/src/rendezvous/channels/index.ts +0 -17
  712. package/src/rendezvous/index.ts +0 -25
  713. package/src/rendezvous/transports/MSC4108RendezvousSession.ts +0 -270
  714. package/src/rendezvous/transports/index.ts +0 -17
  715. package/src/rust-crypto/CrossSigningIdentity.ts +0 -183
  716. package/src/rust-crypto/DehydratedDeviceManager.ts +0 -306
  717. package/src/rust-crypto/KeyClaimManager.ts +0 -86
  718. package/src/rust-crypto/OutgoingRequestProcessor.ts +0 -236
  719. package/src/rust-crypto/OutgoingRequestsManager.ts +0 -143
  720. package/src/rust-crypto/PerSessionKeyBackupDownloader.ts +0 -501
  721. package/src/rust-crypto/RoomEncryptor.ts +0 -352
  722. package/src/rust-crypto/backup.ts +0 -881
  723. package/src/rust-crypto/constants.ts +0 -18
  724. package/src/rust-crypto/device-converter.ts +0 -128
  725. package/src/rust-crypto/index.ts +0 -237
  726. package/src/rust-crypto/libolm_migration.ts +0 -530
  727. package/src/rust-crypto/rust-crypto.ts +0 -2205
  728. package/src/rust-crypto/secret-storage.ts +0 -60
  729. package/src/rust-crypto/verification.ts +0 -830
  730. package/src/secret-storage.ts +0 -693
  731. package/src/utils/decryptAESSecretStorageItem.ts +0 -54
  732. package/src/utils/encryptAESSecretStorageItem.ts +0 -73
  733. package/src/utils/internal/deriveKeys.ts +0 -63
  734. package/src/webrtc/audioContext.ts +0 -44
  735. package/src/webrtc/call.ts +0 -3074
  736. package/src/webrtc/callEventHandler.ts +0 -425
  737. package/src/webrtc/callEventTypes.ts +0 -93
  738. package/src/webrtc/callFeed.ts +0 -364
  739. package/src/webrtc/groupCall.ts +0 -1735
  740. package/src/webrtc/groupCallEventHandler.ts +0 -234
  741. package/src/webrtc/mediaHandler.ts +0 -484
  742. package/src/webrtc/stats/callFeedStatsReporter.ts +0 -94
  743. package/src/webrtc/stats/callStatsReportGatherer.ts +0 -219
  744. package/src/webrtc/stats/callStatsReportSummary.ts +0 -30
  745. package/src/webrtc/stats/connectionStats.ts +0 -47
  746. package/src/webrtc/stats/connectionStatsBuilder.ts +0 -28
  747. package/src/webrtc/stats/connectionStatsReportBuilder.ts +0 -140
  748. package/src/webrtc/stats/groupCallStats.ts +0 -93
  749. package/src/webrtc/stats/media/mediaSsrcHandler.ts +0 -57
  750. package/src/webrtc/stats/media/mediaTrackHandler.ts +0 -76
  751. package/src/webrtc/stats/media/mediaTrackStats.ts +0 -176
  752. package/src/webrtc/stats/media/mediaTrackStatsHandler.ts +0 -90
  753. package/src/webrtc/stats/statsReport.ts +0 -133
  754. package/src/webrtc/stats/statsReportEmitter.ts +0 -49
  755. package/src/webrtc/stats/summaryStatsReportGatherer.ts +0 -148
  756. package/src/webrtc/stats/trackStatsBuilder.ts +0 -207
  757. package/src/webrtc/stats/transportStats.ts +0 -26
  758. package/src/webrtc/stats/transportStatsBuilder.ts +0 -48
  759. package/src/webrtc/stats/valueFormatter.ts +0 -27
@@ -1,1500 +0,0 @@
1
- /*
2
- Copyright 2016 - 2021 The Matrix.org Foundation C.I.C.
3
-
4
- Licensed under the Apache License, Version 2.0 (the "License");
5
- you may not use this file except in compliance with the License.
6
- You may obtain a copy of the License at
7
-
8
- http://www.apache.org/licenses/LICENSE-2.0
9
-
10
- Unless required by applicable law or agreed to in writing, software
11
- distributed under the License is distributed on an "AS IS" BASIS,
12
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13
- See the License for the specific language governing permissions and
14
- limitations under the License.
15
- */
16
-
17
- import { Account, InboundGroupSession, OutboundGroupSession, Session, Utility } from "@matrix-org/olm";
18
-
19
- import { logger, Logger } from "../logger.ts";
20
- import { IndexedDBCryptoStore } from "./store/indexeddb-crypto-store.ts";
21
- import { CryptoStore, IProblem, ISessionInfo, IWithheld } from "./store/base.ts";
22
- import { IOlmDevice, IOutboundGroupSessionKey } from "./algorithms/megolm.ts";
23
- import { IMegolmSessionData, OlmGroupSessionExtraData } from "../@types/crypto.ts";
24
- import { IMessage } from "./algorithms/olm.ts";
25
- import { DecryptionFailureCode } from "../crypto-api/index.ts";
26
- import { DecryptionError } from "../common-crypto/CryptoBackend.ts";
27
-
28
- // The maximum size of an event is 65K, and we base64 the content, so this is a
29
- // reasonable approximation to the biggest plaintext we can encrypt.
30
- const MAX_PLAINTEXT_LENGTH = (65536 * 3) / 4;
31
-
32
- export class PayloadTooLargeError extends Error {
33
- public readonly data = {
34
- errcode: "M_TOO_LARGE",
35
- error: "Payload too large for encrypted message",
36
- };
37
- }
38
-
39
- function checkPayloadLength(payloadString: string): void {
40
- if (payloadString === undefined) {
41
- throw new Error("payloadString undefined");
42
- }
43
-
44
- if (payloadString.length > MAX_PLAINTEXT_LENGTH) {
45
- // might as well fail early here rather than letting the olm library throw
46
- // a cryptic memory allocation error.
47
- //
48
- // Note that even if we manage to do the encryption, the message send may fail,
49
- // because by the time we've wrapped the ciphertext in the event object, it may
50
- // exceed 65K. But at least we won't just fail with "abort()" in that case.
51
- throw new PayloadTooLargeError(
52
- `Message too long (${payloadString.length} bytes). ` +
53
- `The maximum for an encrypted message is ${MAX_PLAINTEXT_LENGTH} bytes.`,
54
- );
55
- }
56
- }
57
-
58
- interface IInitOpts {
59
- /**
60
- * (Optional) data from exported device that must be re-created.
61
- * If present, opts.pickleKey is ignored (exported data already provides a pickle key)
62
- */
63
- fromExportedDevice?: IExportedDevice;
64
- /**
65
- * (Optional) pickle key to set instead of default one
66
- */
67
- pickleKey?: string;
68
- }
69
-
70
- /** data stored in the session store about an inbound group session */
71
- export interface InboundGroupSessionData {
72
- room_id: string; // eslint-disable-line camelcase
73
- /** pickled Olm.InboundGroupSession */
74
- session: string;
75
- keysClaimed?: Record<string, string>;
76
- /** Devices involved in forwarding this session to us (normally empty). */
77
- forwardingCurve25519KeyChain: string[];
78
- /** whether this session is untrusted. */
79
- untrusted?: boolean;
80
- /** whether this session exists during the room being set to shared history. */
81
- sharedHistory?: boolean;
82
- }
83
-
84
- export interface IDecryptedGroupMessage {
85
- result: string;
86
- keysClaimed: Record<string, string>;
87
- senderKey: string;
88
- forwardingCurve25519KeyChain: string[];
89
- untrusted: boolean;
90
- }
91
-
92
- export interface IInboundSession {
93
- payload: string;
94
- session_id: string;
95
- }
96
-
97
- export interface IExportedDevice {
98
- pickleKey: string;
99
- pickledAccount: string;
100
- sessions: ISessionInfo[];
101
- }
102
-
103
- interface IUnpickledSessionInfo extends Omit<ISessionInfo, "session"> {
104
- session: Session;
105
- }
106
-
107
- /* eslint-disable camelcase */
108
- interface IInboundGroupSessionKey {
109
- chain_index: number;
110
- key: string;
111
- forwarding_curve25519_key_chain: string[];
112
- sender_claimed_ed25519_key: string | null;
113
- shared_history: boolean;
114
- untrusted?: boolean;
115
- }
116
- /* eslint-enable camelcase */
117
-
118
- type OneTimeKeys = { curve25519: { [keyId: string]: string } };
119
-
120
- /**
121
- * Manages the olm cryptography functions. Each OlmDevice has a single
122
- * OlmAccount and a number of OlmSessions.
123
- *
124
- * Accounts and sessions are kept pickled in the cryptoStore.
125
- */
126
- export class OlmDevice {
127
- public pickleKey = "DEFAULT_KEY"; // set by consumers
128
-
129
- /** Curve25519 key for the account, unknown until we load the account from storage in init() */
130
- public deviceCurve25519Key: string | null = null;
131
- /** Ed25519 key for the account, unknown until we load the account from storage in init() */
132
- public deviceEd25519Key: string | null = null;
133
- private maxOneTimeKeys: number | null = null;
134
-
135
- // we don't bother stashing outboundgroupsessions in the cryptoStore -
136
- // instead we keep them here.
137
- private outboundGroupSessionStore: Record<string, string> = {};
138
-
139
- // Store a set of decrypted message indexes for each group session.
140
- // This partially mitigates a replay attack where a MITM resends a group
141
- // message into the room.
142
- //
143
- // When we decrypt a message and the message index matches a previously
144
- // decrypted message, one possible cause of that is that we are decrypting
145
- // the same event, and may not indicate an actual replay attack. For
146
- // example, this could happen if we receive events, forget about them, and
147
- // then re-fetch them when we backfill. So we store the event ID and
148
- // timestamp corresponding to each message index when we first decrypt it,
149
- // and compare these against the event ID and timestamp every time we use
150
- // that same index. If they match, then we're probably decrypting the same
151
- // event and we don't consider it a replay attack.
152
- //
153
- // Keys are strings of form "<senderKey>|<session_id>|<message_index>"
154
- // Values are objects of the form "{id: <event id>, timestamp: <ts>}"
155
- private inboundGroupSessionMessageIndexes: Record<string, { id: string; timestamp: number }> = {};
156
-
157
- // Keep track of sessions that we're starting, so that we don't start
158
- // multiple sessions for the same device at the same time.
159
- public sessionsInProgress: Record<string, Promise<void>> = {}; // set by consumers
160
-
161
- // Used by olm to serialise prekey message decryptions
162
- public olmPrekeyPromise: Promise<any> = Promise.resolve(); // set by consumers
163
-
164
- public constructor(private readonly cryptoStore: CryptoStore) {}
165
-
166
- /**
167
- * @returns The version of Olm.
168
- */
169
- public static getOlmVersion(): [number, number, number] {
170
- return globalThis.Olm.get_library_version();
171
- }
172
-
173
- /**
174
- * Initialise the OlmAccount. This must be called before any other operations
175
- * on the OlmDevice.
176
- *
177
- * Data from an exported Olm device can be provided
178
- * in order to re-create this device.
179
- *
180
- * Attempts to load the OlmAccount from the crypto store, or creates one if none is
181
- * found.
182
- *
183
- * Reads the device keys from the OlmAccount object.
184
- *
185
- * @param IInitOpts - opts to initialise the OlmAccount with
186
- */
187
- public async init({ pickleKey, fromExportedDevice }: IInitOpts = {}): Promise<void> {
188
- let e2eKeys;
189
- const account = new globalThis.Olm.Account();
190
-
191
- try {
192
- if (fromExportedDevice) {
193
- if (pickleKey) {
194
- logger.warn("ignoring opts.pickleKey" + " because opts.fromExportedDevice is present.");
195
- }
196
- this.pickleKey = fromExportedDevice.pickleKey;
197
- await this.initialiseFromExportedDevice(fromExportedDevice, account);
198
- } else {
199
- if (pickleKey) {
200
- this.pickleKey = pickleKey;
201
- }
202
- await this.initialiseAccount(account);
203
- }
204
- e2eKeys = JSON.parse(account.identity_keys());
205
-
206
- this.maxOneTimeKeys = account.max_number_of_one_time_keys();
207
- } finally {
208
- account.free();
209
- }
210
-
211
- this.deviceCurve25519Key = e2eKeys.curve25519;
212
- this.deviceEd25519Key = e2eKeys.ed25519;
213
- }
214
-
215
- /**
216
- * Populates the crypto store using data that was exported from an existing device.
217
- * Note that for now only the “account” and “sessions” stores are populated;
218
- * Other stores will be as with a new device.
219
- *
220
- * @param exportedData - Data exported from another device
221
- * through the “export” method.
222
- * @param account - an olm account to initialize
223
- */
224
- private async initialiseFromExportedDevice(exportedData: IExportedDevice, account: Account): Promise<void> {
225
- await this.cryptoStore.doTxn(
226
- "readwrite",
227
- [IndexedDBCryptoStore.STORE_ACCOUNT, IndexedDBCryptoStore.STORE_SESSIONS],
228
- (txn) => {
229
- this.cryptoStore.storeAccount(txn, exportedData.pickledAccount);
230
- exportedData.sessions.forEach((session) => {
231
- const { deviceKey, sessionId } = session;
232
- const sessionInfo = {
233
- session: session.session,
234
- lastReceivedMessageTs: session.lastReceivedMessageTs,
235
- };
236
- this.cryptoStore.storeEndToEndSession(deviceKey!, sessionId!, sessionInfo, txn);
237
- });
238
- },
239
- );
240
- account.unpickle(this.pickleKey, exportedData.pickledAccount);
241
- }
242
-
243
- private async initialiseAccount(account: Account): Promise<void> {
244
- await this.cryptoStore.doTxn("readwrite", [IndexedDBCryptoStore.STORE_ACCOUNT], (txn) => {
245
- this.cryptoStore.getAccount(txn, (pickledAccount) => {
246
- if (pickledAccount !== null) {
247
- account.unpickle(this.pickleKey, pickledAccount);
248
- } else {
249
- account.create();
250
- pickledAccount = account.pickle(this.pickleKey);
251
- this.cryptoStore.storeAccount(txn, pickledAccount);
252
- }
253
- });
254
- });
255
- }
256
-
257
- /**
258
- * extract our OlmAccount from the crypto store and call the given function
259
- * with the account object
260
- * The `account` object is usable only within the callback passed to this
261
- * function and will be freed as soon the callback returns. It is *not*
262
- * usable for the rest of the lifetime of the transaction.
263
- * This function requires a live transaction object from cryptoStore.doTxn()
264
- * and therefore may only be called in a doTxn() callback.
265
- *
266
- * @param txn - Opaque transaction object from cryptoStore.doTxn()
267
- * @internal
268
- */
269
- private getAccount(txn: unknown, func: (account: Account) => void): void {
270
- this.cryptoStore.getAccount(txn, (pickledAccount: string | null) => {
271
- const account = new globalThis.Olm.Account();
272
- try {
273
- account.unpickle(this.pickleKey, pickledAccount!);
274
- func(account);
275
- } finally {
276
- account.free();
277
- }
278
- });
279
- }
280
-
281
- /*
282
- * Saves an account to the crypto store.
283
- * This function requires a live transaction object from cryptoStore.doTxn()
284
- * and therefore may only be called in a doTxn() callback.
285
- *
286
- * @param txn - Opaque transaction object from cryptoStore.doTxn()
287
- * @param Olm.Account object
288
- * @internal
289
- */
290
- private storeAccount(txn: unknown, account: Account): void {
291
- this.cryptoStore.storeAccount(txn, account.pickle(this.pickleKey));
292
- }
293
-
294
- /**
295
- * Export data for re-creating the Olm device later.
296
- * TODO export data other than just account and (P2P) sessions.
297
- *
298
- * @returns The exported data
299
- */
300
- public async export(): Promise<IExportedDevice> {
301
- const result: Partial<IExportedDevice> = {
302
- pickleKey: this.pickleKey,
303
- };
304
-
305
- await this.cryptoStore.doTxn(
306
- "readonly",
307
- [IndexedDBCryptoStore.STORE_ACCOUNT, IndexedDBCryptoStore.STORE_SESSIONS],
308
- (txn) => {
309
- this.cryptoStore.getAccount(txn, (pickledAccount: string | null) => {
310
- result.pickledAccount = pickledAccount!;
311
- });
312
- result.sessions = [];
313
- // Note that the pickledSession object we get in the callback
314
- // is not exactly the same thing you get in method _getSession
315
- // see documentation of IndexedDBCryptoStore.getAllEndToEndSessions
316
- this.cryptoStore.getAllEndToEndSessions(txn, (pickledSession) => {
317
- result.sessions!.push(pickledSession!);
318
- });
319
- },
320
- );
321
- return result as IExportedDevice;
322
- }
323
-
324
- /**
325
- * extract an OlmSession from the session store and call the given function
326
- * The session is usable only within the callback passed to this
327
- * function and will be freed as soon the callback returns. It is *not*
328
- * usable for the rest of the lifetime of the transaction.
329
- *
330
- * @param txn - Opaque transaction object from cryptoStore.doTxn()
331
- * @internal
332
- */
333
- private getSession(
334
- deviceKey: string,
335
- sessionId: string,
336
- txn: unknown,
337
- func: (unpickledSessionInfo: IUnpickledSessionInfo) => void,
338
- ): void {
339
- this.cryptoStore.getEndToEndSession(deviceKey, sessionId, txn, (sessionInfo: ISessionInfo | null) => {
340
- this.unpickleSession(sessionInfo!, func);
341
- });
342
- }
343
-
344
- /**
345
- * Creates a session object from a session pickle and executes the given
346
- * function with it. The session object is destroyed once the function
347
- * returns.
348
- *
349
- * @internal
350
- */
351
- private unpickleSession(
352
- sessionInfo: ISessionInfo,
353
- func: (unpickledSessionInfo: IUnpickledSessionInfo) => void,
354
- ): void {
355
- const session = new globalThis.Olm.Session();
356
- try {
357
- session.unpickle(this.pickleKey, sessionInfo.session!);
358
- const unpickledSessInfo: IUnpickledSessionInfo = Object.assign({}, sessionInfo, { session });
359
-
360
- func(unpickledSessInfo);
361
- } finally {
362
- session.free();
363
- }
364
- }
365
-
366
- /**
367
- * store our OlmSession in the session store
368
- *
369
- * @param sessionInfo - `{session: OlmSession, lastReceivedMessageTs: int}`
370
- * @param txn - Opaque transaction object from cryptoStore.doTxn()
371
- * @internal
372
- */
373
- private saveSession(deviceKey: string, sessionInfo: IUnpickledSessionInfo, txn: unknown): void {
374
- const sessionId = sessionInfo.session.session_id();
375
- logger.debug(`Saving Olm session ${sessionId} with device ${deviceKey}: ${sessionInfo.session.describe()}`);
376
-
377
- // Why do we re-use the input object for this, overwriting the same key with a different
378
- // type? Is it because we want to erase the unpickled session to enforce that it's no longer
379
- // used? A comment would be great.
380
- const pickledSessionInfo = Object.assign(sessionInfo, {
381
- session: sessionInfo.session.pickle(this.pickleKey),
382
- });
383
- this.cryptoStore.storeEndToEndSession(deviceKey, sessionId, pickledSessionInfo, txn);
384
- }
385
-
386
- /**
387
- * get an OlmUtility and call the given function
388
- *
389
- * @returns result of func
390
- * @internal
391
- */
392
- private getUtility<T>(func: (utility: Utility) => T): T {
393
- const utility = new globalThis.Olm.Utility();
394
- try {
395
- return func(utility);
396
- } finally {
397
- utility.free();
398
- }
399
- }
400
-
401
- /**
402
- * Signs a message with the ed25519 key for this account.
403
- *
404
- * @param message - message to be signed
405
- * @returns base64-encoded signature
406
- */
407
- public async sign(message: string): Promise<string> {
408
- let result: string;
409
- await this.cryptoStore.doTxn("readonly", [IndexedDBCryptoStore.STORE_ACCOUNT], (txn) => {
410
- this.getAccount(txn, (account: Account) => {
411
- result = account.sign(message);
412
- });
413
- });
414
- return result!;
415
- }
416
-
417
- /**
418
- * Get the current (unused, unpublished) one-time keys for this account.
419
- *
420
- * @returns one time keys; an object with the single property
421
- * <tt>curve25519</tt>, which is itself an object mapping key id to Curve25519
422
- * key.
423
- */
424
- public async getOneTimeKeys(): Promise<OneTimeKeys> {
425
- let result: OneTimeKeys;
426
- await this.cryptoStore.doTxn("readonly", [IndexedDBCryptoStore.STORE_ACCOUNT], (txn) => {
427
- this.getAccount(txn, (account) => {
428
- result = JSON.parse(account.one_time_keys());
429
- });
430
- });
431
-
432
- return result!;
433
- }
434
-
435
- /**
436
- * Get the maximum number of one-time keys we can store.
437
- *
438
- * @returns number of keys
439
- */
440
- public maxNumberOfOneTimeKeys(): number {
441
- return this.maxOneTimeKeys ?? -1;
442
- }
443
-
444
- /**
445
- * Marks all of the one-time keys as published.
446
- */
447
- public async markKeysAsPublished(): Promise<void> {
448
- await this.cryptoStore.doTxn("readwrite", [IndexedDBCryptoStore.STORE_ACCOUNT], (txn) => {
449
- this.getAccount(txn, (account: Account) => {
450
- account.mark_keys_as_published();
451
- this.storeAccount(txn, account);
452
- });
453
- });
454
- }
455
-
456
- /**
457
- * Generate some new one-time keys
458
- *
459
- * @param numKeys - number of keys to generate
460
- * @returns Resolved once the account is saved back having generated the keys
461
- */
462
- public generateOneTimeKeys(numKeys: number): Promise<void> {
463
- return this.cryptoStore.doTxn("readwrite", [IndexedDBCryptoStore.STORE_ACCOUNT], (txn) => {
464
- this.getAccount(txn, (account) => {
465
- account.generate_one_time_keys(numKeys);
466
- this.storeAccount(txn, account);
467
- });
468
- });
469
- }
470
-
471
- /**
472
- * Generate a new fallback keys
473
- *
474
- * @returns Resolved once the account is saved back having generated the key
475
- */
476
- public async generateFallbackKey(): Promise<void> {
477
- await this.cryptoStore.doTxn("readwrite", [IndexedDBCryptoStore.STORE_ACCOUNT], (txn) => {
478
- this.getAccount(txn, (account) => {
479
- account.generate_fallback_key();
480
- this.storeAccount(txn, account);
481
- });
482
- });
483
- }
484
-
485
- public async getFallbackKey(): Promise<Record<string, Record<string, string>>> {
486
- let result: Record<string, Record<string, string>>;
487
- await this.cryptoStore.doTxn("readonly", [IndexedDBCryptoStore.STORE_ACCOUNT], (txn) => {
488
- this.getAccount(txn, (account: Account) => {
489
- result = JSON.parse(account.unpublished_fallback_key());
490
- });
491
- });
492
- return result!;
493
- }
494
-
495
- public async forgetOldFallbackKey(): Promise<void> {
496
- await this.cryptoStore.doTxn("readwrite", [IndexedDBCryptoStore.STORE_ACCOUNT], (txn) => {
497
- this.getAccount(txn, (account: Account) => {
498
- account.forget_old_fallback_key();
499
- this.storeAccount(txn, account);
500
- });
501
- });
502
- }
503
-
504
- /**
505
- * Generate a new outbound session
506
- *
507
- * The new session will be stored in the cryptoStore.
508
- *
509
- * @param theirIdentityKey - remote user's Curve25519 identity key
510
- * @param theirOneTimeKey - remote user's one-time Curve25519 key
511
- * @returns sessionId for the outbound session.
512
- */
513
- public async createOutboundSession(theirIdentityKey: string, theirOneTimeKey: string): Promise<string> {
514
- let newSessionId: string;
515
- await this.cryptoStore.doTxn(
516
- "readwrite",
517
- [IndexedDBCryptoStore.STORE_ACCOUNT, IndexedDBCryptoStore.STORE_SESSIONS],
518
- (txn) => {
519
- this.getAccount(txn, (account: Account) => {
520
- const session = new globalThis.Olm.Session();
521
- try {
522
- session.create_outbound(account, theirIdentityKey, theirOneTimeKey);
523
- newSessionId = session.session_id();
524
- this.storeAccount(txn, account);
525
- const sessionInfo: IUnpickledSessionInfo = {
526
- session,
527
- // Pretend we've received a message at this point, otherwise
528
- // if we try to send a message to the device, it won't use
529
- // this session
530
- lastReceivedMessageTs: Date.now(),
531
- };
532
- this.saveSession(theirIdentityKey, sessionInfo, txn);
533
- } finally {
534
- session.free();
535
- }
536
- });
537
- },
538
- logger.getChild("[createOutboundSession]"),
539
- );
540
- return newSessionId!;
541
- }
542
-
543
- /**
544
- * Generate a new inbound session, given an incoming message
545
- *
546
- * @param theirDeviceIdentityKey - remote user's Curve25519 identity key
547
- * @param messageType - messageType field from the received message (must be 0)
548
- * @param ciphertext - base64-encoded body from the received message
549
- *
550
- * @returns decrypted payload, and
551
- * session id of new session
552
- *
553
- * @throws Error if the received message was not valid (for instance, it didn't use a valid one-time key).
554
- */
555
- public async createInboundSession(
556
- theirDeviceIdentityKey: string,
557
- messageType: number,
558
- ciphertext: string,
559
- ): Promise<IInboundSession> {
560
- if (messageType !== 0) {
561
- throw new Error("Need messageType == 0 to create inbound session");
562
- }
563
-
564
- let result: { payload: string; session_id: string }; // eslint-disable-line camelcase
565
- await this.cryptoStore.doTxn(
566
- "readwrite",
567
- [IndexedDBCryptoStore.STORE_ACCOUNT, IndexedDBCryptoStore.STORE_SESSIONS],
568
- (txn) => {
569
- this.getAccount(txn, (account: Account) => {
570
- const session = new globalThis.Olm.Session();
571
- try {
572
- session.create_inbound_from(account, theirDeviceIdentityKey, ciphertext);
573
- account.remove_one_time_keys(session);
574
- this.storeAccount(txn, account);
575
-
576
- const payloadString = session.decrypt(messageType, ciphertext);
577
-
578
- const sessionInfo: IUnpickledSessionInfo = {
579
- session,
580
- // this counts as a received message: set last received message time
581
- // to now
582
- lastReceivedMessageTs: Date.now(),
583
- };
584
- this.saveSession(theirDeviceIdentityKey, sessionInfo, txn);
585
-
586
- result = {
587
- payload: payloadString,
588
- session_id: session.session_id(),
589
- };
590
- } finally {
591
- session.free();
592
- }
593
- });
594
- },
595
- logger.getChild("[createInboundSession]"),
596
- );
597
-
598
- return result!;
599
- }
600
-
601
- /**
602
- * Get a list of known session IDs for the given device
603
- *
604
- * @param theirDeviceIdentityKey - Curve25519 identity key for the
605
- * remote device
606
- * @returns a list of known session ids for the device
607
- */
608
- public async getSessionIdsForDevice(theirDeviceIdentityKey: string): Promise<string[]> {
609
- const log = logger.getChild("[getSessionIdsForDevice]");
610
-
611
- if (theirDeviceIdentityKey in this.sessionsInProgress) {
612
- log.debug(`Waiting for Olm session for ${theirDeviceIdentityKey} to be created`);
613
- try {
614
- await this.sessionsInProgress[theirDeviceIdentityKey];
615
- } catch {
616
- // if the session failed to be created, just fall through and
617
- // return an empty result
618
- }
619
- }
620
- let sessionIds: string[];
621
- await this.cryptoStore.doTxn(
622
- "readonly",
623
- [IndexedDBCryptoStore.STORE_SESSIONS],
624
- (txn) => {
625
- this.cryptoStore.getEndToEndSessions(theirDeviceIdentityKey, txn, (sessions) => {
626
- sessionIds = Object.keys(sessions);
627
- });
628
- },
629
- log,
630
- );
631
-
632
- return sessionIds!;
633
- }
634
-
635
- /**
636
- * Get the right olm session id for encrypting messages to the given identity key
637
- *
638
- * @param theirDeviceIdentityKey - Curve25519 identity key for the
639
- * remote device
640
- * @param nowait - Don't wait for an in-progress session to complete.
641
- * This should only be set to true of the calling function is the function
642
- * that marked the session as being in-progress.
643
- * @param log - A possibly customised log
644
- * @returns session id, or null if no established session
645
- */
646
- public async getSessionIdForDevice(
647
- theirDeviceIdentityKey: string,
648
- nowait = false,
649
- log?: Logger,
650
- ): Promise<string | null> {
651
- const sessionInfos = await this.getSessionInfoForDevice(theirDeviceIdentityKey, nowait, log);
652
-
653
- if (sessionInfos.length === 0) {
654
- return null;
655
- }
656
- // Use the session that has most recently received a message
657
- let idxOfBest = 0;
658
- for (let i = 1; i < sessionInfos.length; i++) {
659
- const thisSessInfo = sessionInfos[i];
660
- const thisLastReceived =
661
- thisSessInfo.lastReceivedMessageTs === undefined ? 0 : thisSessInfo.lastReceivedMessageTs;
662
-
663
- const bestSessInfo = sessionInfos[idxOfBest];
664
- const bestLastReceived =
665
- bestSessInfo.lastReceivedMessageTs === undefined ? 0 : bestSessInfo.lastReceivedMessageTs;
666
- if (
667
- thisLastReceived > bestLastReceived ||
668
- (thisLastReceived === bestLastReceived && thisSessInfo.sessionId < bestSessInfo.sessionId)
669
- ) {
670
- idxOfBest = i;
671
- }
672
- }
673
- return sessionInfos[idxOfBest].sessionId;
674
- }
675
-
676
- /**
677
- * Get information on the active Olm sessions for a device.
678
- * <p>
679
- * Returns an array, with an entry for each active session. The first entry in
680
- * the result will be the one used for outgoing messages. Each entry contains
681
- * the keys 'hasReceivedMessage' (true if the session has received an incoming
682
- * message and is therefore past the pre-key stage), and 'sessionId'.
683
- *
684
- * @param deviceIdentityKey - Curve25519 identity key for the device
685
- * @param nowait - Don't wait for an in-progress session to complete.
686
- * This should only be set to true of the calling function is the function
687
- * that marked the session as being in-progress.
688
- * @param log - A possibly customised log
689
- */
690
- public async getSessionInfoForDevice(
691
- deviceIdentityKey: string,
692
- nowait = false,
693
- log: Logger = logger,
694
- ): Promise<{ sessionId: string; lastReceivedMessageTs: number; hasReceivedMessage: boolean }[]> {
695
- log = log.getChild("[getSessionInfoForDevice]");
696
-
697
- if (deviceIdentityKey in this.sessionsInProgress && !nowait) {
698
- log.debug(`Waiting for Olm session for ${deviceIdentityKey} to be created`);
699
- try {
700
- await this.sessionsInProgress[deviceIdentityKey];
701
- } catch {
702
- // if the session failed to be created, then just fall through and
703
- // return an empty result
704
- }
705
- }
706
- const info: {
707
- lastReceivedMessageTs: number;
708
- hasReceivedMessage: boolean;
709
- sessionId: string;
710
- }[] = [];
711
-
712
- await this.cryptoStore.doTxn(
713
- "readonly",
714
- [IndexedDBCryptoStore.STORE_SESSIONS],
715
- (txn) => {
716
- this.cryptoStore.getEndToEndSessions(deviceIdentityKey, txn, (sessions) => {
717
- const sessionIds = Object.keys(sessions).sort();
718
- for (const sessionId of sessionIds) {
719
- this.unpickleSession(sessions[sessionId], (sessInfo: IUnpickledSessionInfo) => {
720
- info.push({
721
- lastReceivedMessageTs: sessInfo.lastReceivedMessageTs!,
722
- hasReceivedMessage: sessInfo.session.has_received_message(),
723
- sessionId,
724
- });
725
- });
726
- }
727
- });
728
- },
729
- log,
730
- );
731
-
732
- return info;
733
- }
734
-
735
- /**
736
- * Encrypt an outgoing message using an existing session
737
- *
738
- * @param theirDeviceIdentityKey - Curve25519 identity key for the
739
- * remote device
740
- * @param sessionId - the id of the active session
741
- * @param payloadString - payload to be encrypted and sent
742
- *
743
- * @returns ciphertext
744
- */
745
- public async encryptMessage(
746
- theirDeviceIdentityKey: string,
747
- sessionId: string,
748
- payloadString: string,
749
- ): Promise<IMessage> {
750
- checkPayloadLength(payloadString);
751
-
752
- let res: IMessage;
753
- await this.cryptoStore.doTxn(
754
- "readwrite",
755
- [IndexedDBCryptoStore.STORE_SESSIONS],
756
- (txn) => {
757
- this.getSession(theirDeviceIdentityKey, sessionId, txn, (sessionInfo) => {
758
- const sessionDesc = sessionInfo.session.describe();
759
- logger.log(
760
- "encryptMessage: Olm Session ID " +
761
- sessionId +
762
- " to " +
763
- theirDeviceIdentityKey +
764
- ": " +
765
- sessionDesc,
766
- );
767
- res = sessionInfo.session.encrypt(payloadString);
768
- this.saveSession(theirDeviceIdentityKey, sessionInfo, txn);
769
- });
770
- },
771
- logger.getChild("[encryptMessage]"),
772
- );
773
- return res!;
774
- }
775
-
776
- /**
777
- * Decrypt an incoming message using an existing session
778
- *
779
- * @param theirDeviceIdentityKey - Curve25519 identity key for the
780
- * remote device
781
- * @param sessionId - the id of the active session
782
- * @param messageType - messageType field from the received message
783
- * @param ciphertext - base64-encoded body from the received message
784
- *
785
- * @returns decrypted payload.
786
- */
787
- public async decryptMessage(
788
- theirDeviceIdentityKey: string,
789
- sessionId: string,
790
- messageType: number,
791
- ciphertext: string,
792
- ): Promise<string> {
793
- let payloadString: string;
794
- await this.cryptoStore.doTxn(
795
- "readwrite",
796
- [IndexedDBCryptoStore.STORE_SESSIONS],
797
- (txn) => {
798
- this.getSession(theirDeviceIdentityKey, sessionId, txn, (sessionInfo: IUnpickledSessionInfo) => {
799
- const sessionDesc = sessionInfo.session.describe();
800
- logger.log(
801
- "decryptMessage: Olm Session ID " +
802
- sessionId +
803
- " from " +
804
- theirDeviceIdentityKey +
805
- ": " +
806
- sessionDesc,
807
- );
808
- payloadString = sessionInfo.session.decrypt(messageType, ciphertext);
809
- sessionInfo.lastReceivedMessageTs = Date.now();
810
- this.saveSession(theirDeviceIdentityKey, sessionInfo, txn);
811
- });
812
- },
813
- logger.getChild("[decryptMessage]"),
814
- );
815
- return payloadString!;
816
- }
817
-
818
- /**
819
- * Determine if an incoming messages is a prekey message matching an existing session
820
- *
821
- * @param theirDeviceIdentityKey - Curve25519 identity key for the
822
- * remote device
823
- * @param sessionId - the id of the active session
824
- * @param messageType - messageType field from the received message
825
- * @param ciphertext - base64-encoded body from the received message
826
- *
827
- * @returns true if the received message is a prekey message which matches
828
- * the given session.
829
- */
830
- public async matchesSession(
831
- theirDeviceIdentityKey: string,
832
- sessionId: string,
833
- messageType: number,
834
- ciphertext: string,
835
- ): Promise<boolean> {
836
- if (messageType !== 0) {
837
- return false;
838
- }
839
-
840
- let matches: boolean;
841
- await this.cryptoStore.doTxn(
842
- "readonly",
843
- [IndexedDBCryptoStore.STORE_SESSIONS],
844
- (txn) => {
845
- this.getSession(theirDeviceIdentityKey, sessionId, txn, (sessionInfo) => {
846
- matches = sessionInfo.session.matches_inbound(ciphertext);
847
- });
848
- },
849
- logger.getChild("[matchesSession]"),
850
- );
851
- return matches!;
852
- }
853
-
854
- public async recordSessionProblem(deviceKey: string, type: string, fixed: boolean): Promise<void> {
855
- logger.info(`Recording problem on olm session with ${deviceKey} of type ${type}. Recreating: ${fixed}`);
856
- await this.cryptoStore.storeEndToEndSessionProblem(deviceKey, type, fixed);
857
- }
858
-
859
- public sessionMayHaveProblems(deviceKey: string, timestamp: number): Promise<IProblem | null> {
860
- return this.cryptoStore.getEndToEndSessionProblem(deviceKey, timestamp);
861
- }
862
-
863
- public filterOutNotifiedErrorDevices(devices: IOlmDevice[]): Promise<IOlmDevice[]> {
864
- return this.cryptoStore.filterOutNotifiedErrorDevices(devices);
865
- }
866
-
867
- // Outbound group session
868
- // ======================
869
-
870
- /**
871
- * store an OutboundGroupSession in outboundGroupSessionStore
872
- *
873
- * @internal
874
- */
875
- private saveOutboundGroupSession(session: OutboundGroupSession): void {
876
- this.outboundGroupSessionStore[session.session_id()] = session.pickle(this.pickleKey);
877
- }
878
-
879
- /**
880
- * extract an OutboundGroupSession from outboundGroupSessionStore and call the
881
- * given function
882
- *
883
- * @returns result of func
884
- * @internal
885
- */
886
- private getOutboundGroupSession<T>(sessionId: string, func: (session: OutboundGroupSession) => T): T {
887
- const pickled = this.outboundGroupSessionStore[sessionId];
888
- if (pickled === undefined) {
889
- throw new Error("Unknown outbound group session " + sessionId);
890
- }
891
-
892
- const session = new globalThis.Olm.OutboundGroupSession();
893
- try {
894
- session.unpickle(this.pickleKey, pickled);
895
- return func(session);
896
- } finally {
897
- session.free();
898
- }
899
- }
900
-
901
- /**
902
- * Generate a new outbound group session
903
- *
904
- * @returns sessionId for the outbound session.
905
- */
906
- public createOutboundGroupSession(): string {
907
- const session = new globalThis.Olm.OutboundGroupSession();
908
- try {
909
- session.create();
910
- this.saveOutboundGroupSession(session);
911
- return session.session_id();
912
- } finally {
913
- session.free();
914
- }
915
- }
916
-
917
- /**
918
- * Encrypt an outgoing message with an outbound group session
919
- *
920
- * @param sessionId - the id of the outboundgroupsession
921
- * @param payloadString - payload to be encrypted and sent
922
- *
923
- * @returns ciphertext
924
- */
925
- public encryptGroupMessage(sessionId: string, payloadString: string): string {
926
- logger.log(`encrypting msg with megolm session ${sessionId}`);
927
-
928
- checkPayloadLength(payloadString);
929
-
930
- return this.getOutboundGroupSession(sessionId, (session: OutboundGroupSession) => {
931
- const res = session.encrypt(payloadString);
932
- this.saveOutboundGroupSession(session);
933
- return res;
934
- });
935
- }
936
-
937
- /**
938
- * Get the session keys for an outbound group session
939
- *
940
- * @param sessionId - the id of the outbound group session
941
- *
942
- * @returns current chain index, and
943
- * base64-encoded secret key.
944
- */
945
- public getOutboundGroupSessionKey(sessionId: string): IOutboundGroupSessionKey {
946
- return this.getOutboundGroupSession(sessionId, function (session: OutboundGroupSession) {
947
- return {
948
- chain_index: session.message_index(),
949
- key: session.session_key(),
950
- };
951
- });
952
- }
953
-
954
- // Inbound group session
955
- // =====================
956
-
957
- /**
958
- * Unpickle a session from a sessionData object and invoke the given function.
959
- * The session is valid only until func returns.
960
- *
961
- * @param sessionData - Object describing the session.
962
- * @param func - Invoked with the unpickled session
963
- * @returns result of func
964
- */
965
- private unpickleInboundGroupSession<T>(
966
- sessionData: InboundGroupSessionData,
967
- func: (session: InboundGroupSession) => T,
968
- ): T {
969
- const session = new globalThis.Olm.InboundGroupSession();
970
- try {
971
- session.unpickle(this.pickleKey, sessionData.session);
972
- return func(session);
973
- } finally {
974
- session.free();
975
- }
976
- }
977
-
978
- /**
979
- * extract an InboundGroupSession from the crypto store and call the given function
980
- *
981
- * @param roomId - The room ID to extract the session for, or null to fetch
982
- * sessions for any room.
983
- * @param txn - Opaque transaction object from cryptoStore.doTxn()
984
- * @param func - function to call.
985
- *
986
- * @internal
987
- */
988
- private getInboundGroupSession(
989
- roomId: string,
990
- senderKey: string,
991
- sessionId: string,
992
- txn: unknown,
993
- func: (
994
- session: InboundGroupSession | null,
995
- data: InboundGroupSessionData | null,
996
- withheld: IWithheld | null,
997
- ) => void,
998
- ): void {
999
- this.cryptoStore.getEndToEndInboundGroupSession(
1000
- senderKey,
1001
- sessionId,
1002
- txn,
1003
- (sessionData: InboundGroupSessionData | null, withheld: IWithheld | null) => {
1004
- if (sessionData === null) {
1005
- func(null, null, withheld);
1006
- return;
1007
- }
1008
-
1009
- // if we were given a room ID, check that the it matches the original one for the session. This stops
1010
- // the HS pretending a message was targeting a different room.
1011
- if (roomId !== null && roomId !== sessionData.room_id) {
1012
- throw new Error(
1013
- "Mismatched room_id for inbound group session (expected " +
1014
- sessionData.room_id +
1015
- ", was " +
1016
- roomId +
1017
- ")",
1018
- );
1019
- }
1020
-
1021
- this.unpickleInboundGroupSession(sessionData, (session: InboundGroupSession) => {
1022
- func(session, sessionData, withheld);
1023
- });
1024
- },
1025
- );
1026
- }
1027
-
1028
- /**
1029
- * Add an inbound group session to the session store
1030
- *
1031
- * @param roomId - room in which this session will be used
1032
- * @param senderKey - base64-encoded curve25519 key of the sender
1033
- * @param forwardingCurve25519KeyChain - Devices involved in forwarding
1034
- * this session to us.
1035
- * @param sessionId - session identifier
1036
- * @param sessionKey - base64-encoded secret key
1037
- * @param keysClaimed - Other keys the sender claims.
1038
- * @param exportFormat - true if the megolm keys are in export format
1039
- * (ie, they lack an ed25519 signature)
1040
- * @param extraSessionData - any other data to be include with the session
1041
- */
1042
- public async addInboundGroupSession(
1043
- roomId: string,
1044
- senderKey: string,
1045
- forwardingCurve25519KeyChain: string[],
1046
- sessionId: string,
1047
- sessionKey: string,
1048
- keysClaimed: Record<string, string>,
1049
- exportFormat: boolean,
1050
- extraSessionData: OlmGroupSessionExtraData = {},
1051
- ): Promise<void> {
1052
- await this.cryptoStore.doTxn(
1053
- "readwrite",
1054
- [
1055
- IndexedDBCryptoStore.STORE_INBOUND_GROUP_SESSIONS,
1056
- IndexedDBCryptoStore.STORE_INBOUND_GROUP_SESSIONS_WITHHELD,
1057
- IndexedDBCryptoStore.STORE_SHARED_HISTORY_INBOUND_GROUP_SESSIONS,
1058
- ],
1059
- (txn) => {
1060
- /* if we already have this session, consider updating it */
1061
- this.getInboundGroupSession(
1062
- roomId,
1063
- senderKey,
1064
- sessionId,
1065
- txn,
1066
- (
1067
- existingSession: InboundGroupSession | null,
1068
- existingSessionData: InboundGroupSessionData | null,
1069
- ) => {
1070
- // new session.
1071
- const session = new globalThis.Olm.InboundGroupSession();
1072
- try {
1073
- if (exportFormat) {
1074
- session.import_session(sessionKey);
1075
- } else {
1076
- session.create(sessionKey);
1077
- }
1078
- if (sessionId != session.session_id()) {
1079
- throw new Error("Mismatched group session ID from senderKey: " + senderKey);
1080
- }
1081
-
1082
- if (existingSession) {
1083
- logger.log(`Update for megolm session ${senderKey}|${sessionId}`);
1084
- if (existingSession.first_known_index() <= session.first_known_index()) {
1085
- if (!existingSessionData!.untrusted || extraSessionData.untrusted) {
1086
- // existing session has less-than-or-equal index
1087
- // (i.e. can decrypt at least as much), and the
1088
- // new session's trust does not win over the old
1089
- // session's trust, so keep it
1090
- logger.log(`Keeping existing megolm session ${senderKey}|${sessionId}`);
1091
- return;
1092
- }
1093
- if (existingSession.first_known_index() < session.first_known_index()) {
1094
- // We want to upgrade the existing session's trust,
1095
- // but we can't just use the new session because we'll
1096
- // lose the lower index. Check that the sessions connect
1097
- // properly, and then manually set the existing session
1098
- // as trusted.
1099
- if (
1100
- existingSession.export_session(session.first_known_index()) ===
1101
- session.export_session(session.first_known_index())
1102
- ) {
1103
- logger.info(
1104
- "Upgrading trust of existing megolm session " +
1105
- `${senderKey}|${sessionId} based on newly-received trusted session`,
1106
- );
1107
- existingSessionData!.untrusted = false;
1108
- this.cryptoStore.storeEndToEndInboundGroupSession(
1109
- senderKey,
1110
- sessionId,
1111
- existingSessionData!,
1112
- txn,
1113
- );
1114
- } else {
1115
- logger.warn(
1116
- `Newly-received megolm session ${senderKey}|$sessionId}` +
1117
- " does not match existing session! Keeping existing session",
1118
- );
1119
- }
1120
- return;
1121
- }
1122
- // If the sessions have the same index, go ahead and store the new trusted one.
1123
- }
1124
- }
1125
-
1126
- logger.debug(
1127
- `Storing megolm session ${senderKey}|${sessionId} with first index ` +
1128
- session.first_known_index(),
1129
- );
1130
-
1131
- const sessionData = Object.assign({}, extraSessionData, {
1132
- room_id: roomId,
1133
- session: session.pickle(this.pickleKey),
1134
- keysClaimed: keysClaimed,
1135
- forwardingCurve25519KeyChain: forwardingCurve25519KeyChain,
1136
- });
1137
-
1138
- this.cryptoStore.storeEndToEndInboundGroupSession(senderKey, sessionId, sessionData, txn);
1139
-
1140
- if (!existingSession && extraSessionData.sharedHistory) {
1141
- this.cryptoStore.addSharedHistoryInboundGroupSession(roomId, senderKey, sessionId, txn);
1142
- }
1143
- } finally {
1144
- session.free();
1145
- }
1146
- },
1147
- );
1148
- },
1149
- logger.getChild("[addInboundGroupSession]"),
1150
- );
1151
- }
1152
-
1153
- /**
1154
- * Record in the data store why an inbound group session was withheld.
1155
- *
1156
- * @param roomId - room that the session belongs to
1157
- * @param senderKey - base64-encoded curve25519 key of the sender
1158
- * @param sessionId - session identifier
1159
- * @param code - reason code
1160
- * @param reason - human-readable version of `code`
1161
- */
1162
- public async addInboundGroupSessionWithheld(
1163
- roomId: string,
1164
- senderKey: string,
1165
- sessionId: string,
1166
- code: string,
1167
- reason: string,
1168
- ): Promise<void> {
1169
- await this.cryptoStore.doTxn(
1170
- "readwrite",
1171
- [IndexedDBCryptoStore.STORE_INBOUND_GROUP_SESSIONS_WITHHELD],
1172
- (txn) => {
1173
- this.cryptoStore.storeEndToEndInboundGroupSessionWithheld(
1174
- senderKey,
1175
- sessionId,
1176
- {
1177
- room_id: roomId,
1178
- code: code,
1179
- reason: reason,
1180
- },
1181
- txn,
1182
- );
1183
- },
1184
- );
1185
- }
1186
-
1187
- /**
1188
- * Decrypt a received message with an inbound group session
1189
- *
1190
- * @param roomId - room in which the message was received
1191
- * @param senderKey - base64-encoded curve25519 key of the sender
1192
- * @param sessionId - session identifier
1193
- * @param body - base64-encoded body of the encrypted message
1194
- * @param eventId - ID of the event being decrypted
1195
- * @param timestamp - timestamp of the event being decrypted
1196
- *
1197
- * @returns null if the sessionId is unknown
1198
- */
1199
- public async decryptGroupMessage(
1200
- roomId: string,
1201
- senderKey: string,
1202
- sessionId: string,
1203
- body: string,
1204
- eventId: string,
1205
- timestamp: number,
1206
- ): Promise<IDecryptedGroupMessage | null> {
1207
- let result: IDecryptedGroupMessage | null = null;
1208
- // when the localstorage crypto store is used as an indexeddb backend,
1209
- // exceptions thrown from within the inner function are not passed through
1210
- // to the top level, so we store exceptions in a variable and raise them at
1211
- // the end
1212
- let error: Error;
1213
-
1214
- await this.cryptoStore.doTxn(
1215
- "readwrite",
1216
- [
1217
- IndexedDBCryptoStore.STORE_INBOUND_GROUP_SESSIONS,
1218
- IndexedDBCryptoStore.STORE_INBOUND_GROUP_SESSIONS_WITHHELD,
1219
- ],
1220
- (txn) => {
1221
- this.getInboundGroupSession(roomId, senderKey, sessionId, txn, (session, sessionData, withheld) => {
1222
- if (session === null || sessionData === null) {
1223
- if (withheld) {
1224
- const failureCode =
1225
- withheld.code === "m.unverified"
1226
- ? DecryptionFailureCode.MEGOLM_KEY_WITHHELD_FOR_UNVERIFIED_DEVICE
1227
- : DecryptionFailureCode.MEGOLM_KEY_WITHHELD;
1228
- error = new DecryptionError(failureCode, calculateWithheldMessage(withheld), {
1229
- session: senderKey + "|" + sessionId,
1230
- });
1231
- }
1232
- result = null;
1233
- return;
1234
- }
1235
- let res: ReturnType<InboundGroupSession["decrypt"]>;
1236
- try {
1237
- res = session.decrypt(body);
1238
- } catch (e) {
1239
- if ((<Error>e)?.message === "OLM.UNKNOWN_MESSAGE_INDEX" && withheld) {
1240
- const failureCode =
1241
- withheld.code === "m.unverified"
1242
- ? DecryptionFailureCode.MEGOLM_KEY_WITHHELD_FOR_UNVERIFIED_DEVICE
1243
- : DecryptionFailureCode.MEGOLM_KEY_WITHHELD;
1244
- error = new DecryptionError(failureCode, calculateWithheldMessage(withheld), {
1245
- session: senderKey + "|" + sessionId,
1246
- });
1247
- } else {
1248
- error = <Error>e;
1249
- }
1250
- return;
1251
- }
1252
-
1253
- let plaintext: string = res.plaintext;
1254
- if (plaintext === undefined) {
1255
- // @ts-ignore - Compatibility for older olm versions.
1256
- plaintext = res as string;
1257
- } else {
1258
- // Check if we have seen this message index before to detect replay attacks.
1259
- // If the event ID and timestamp are specified, and the match the event ID
1260
- // and timestamp from the last time we used this message index, then we
1261
- // don't consider it a replay attack.
1262
- const messageIndexKey = senderKey + "|" + sessionId + "|" + res.message_index;
1263
- if (messageIndexKey in this.inboundGroupSessionMessageIndexes) {
1264
- const msgInfo = this.inboundGroupSessionMessageIndexes[messageIndexKey];
1265
- if (msgInfo.id !== eventId || msgInfo.timestamp !== timestamp) {
1266
- error = new Error(
1267
- "Duplicate message index, possible replay attack: " + messageIndexKey,
1268
- );
1269
- return;
1270
- }
1271
- }
1272
- this.inboundGroupSessionMessageIndexes[messageIndexKey] = {
1273
- id: eventId,
1274
- timestamp: timestamp,
1275
- };
1276
- }
1277
-
1278
- sessionData.session = session.pickle(this.pickleKey);
1279
- this.cryptoStore.storeEndToEndInboundGroupSession(senderKey, sessionId, sessionData, txn);
1280
- result = {
1281
- result: plaintext,
1282
- keysClaimed: sessionData.keysClaimed || {},
1283
- senderKey: senderKey,
1284
- forwardingCurve25519KeyChain: sessionData.forwardingCurve25519KeyChain || [],
1285
- untrusted: !!sessionData.untrusted,
1286
- };
1287
- });
1288
- },
1289
- logger.getChild("[decryptGroupMessage]"),
1290
- );
1291
-
1292
- if (error!) {
1293
- throw error;
1294
- }
1295
- return result!;
1296
- }
1297
-
1298
- /**
1299
- * Determine if we have the keys for a given megolm session
1300
- *
1301
- * @param roomId - room in which the message was received
1302
- * @param senderKey - base64-encoded curve25519 key of the sender
1303
- * @param sessionId - session identifier
1304
- *
1305
- * @returns true if we have the keys to this session
1306
- */
1307
- public async hasInboundSessionKeys(roomId: string, senderKey: string, sessionId: string): Promise<boolean> {
1308
- let result: boolean;
1309
- await this.cryptoStore.doTxn(
1310
- "readonly",
1311
- [
1312
- IndexedDBCryptoStore.STORE_INBOUND_GROUP_SESSIONS,
1313
- IndexedDBCryptoStore.STORE_INBOUND_GROUP_SESSIONS_WITHHELD,
1314
- ],
1315
- (txn) => {
1316
- this.cryptoStore.getEndToEndInboundGroupSession(senderKey, sessionId, txn, (sessionData) => {
1317
- if (sessionData === null) {
1318
- result = false;
1319
- return;
1320
- }
1321
-
1322
- if (roomId !== sessionData.room_id) {
1323
- logger.warn(
1324
- `requested keys for inbound group session ${senderKey}|` +
1325
- `${sessionId}, with incorrect room_id ` +
1326
- `(expected ${sessionData.room_id}, ` +
1327
- `was ${roomId})`,
1328
- );
1329
- result = false;
1330
- } else {
1331
- result = true;
1332
- }
1333
- });
1334
- },
1335
- logger.getChild("[hasInboundSessionKeys]"),
1336
- );
1337
-
1338
- return result!;
1339
- }
1340
-
1341
- /**
1342
- * Extract the keys to a given megolm session, for sharing
1343
- *
1344
- * @param roomId - room in which the message was received
1345
- * @param senderKey - base64-encoded curve25519 key of the sender
1346
- * @param sessionId - session identifier
1347
- * @param chainIndex - The chain index at which to export the session.
1348
- * If omitted, export at the first index we know about.
1349
- *
1350
- * @returns
1351
- * details of the session key. The key is a base64-encoded megolm key in
1352
- * export format.
1353
- *
1354
- * @throws Error If the given chain index could not be obtained from the known
1355
- * index (ie. the given chain index is before the first we have).
1356
- */
1357
- public async getInboundGroupSessionKey(
1358
- roomId: string,
1359
- senderKey: string,
1360
- sessionId: string,
1361
- chainIndex?: number,
1362
- ): Promise<IInboundGroupSessionKey | null> {
1363
- let result: IInboundGroupSessionKey | null = null;
1364
- await this.cryptoStore.doTxn(
1365
- "readonly",
1366
- [
1367
- IndexedDBCryptoStore.STORE_INBOUND_GROUP_SESSIONS,
1368
- IndexedDBCryptoStore.STORE_INBOUND_GROUP_SESSIONS_WITHHELD,
1369
- ],
1370
- (txn) => {
1371
- this.getInboundGroupSession(roomId, senderKey, sessionId, txn, (session, sessionData) => {
1372
- if (session === null || sessionData === null) {
1373
- result = null;
1374
- return;
1375
- }
1376
-
1377
- if (chainIndex === undefined) {
1378
- chainIndex = session.first_known_index();
1379
- }
1380
-
1381
- const exportedSession = session.export_session(chainIndex);
1382
-
1383
- const claimedKeys = sessionData.keysClaimed || {};
1384
- const senderEd25519Key = claimedKeys.ed25519 || null;
1385
-
1386
- const forwardingKeyChain = sessionData.forwardingCurve25519KeyChain || [];
1387
- // older forwarded keys didn't set the "untrusted"
1388
- // property, but can be identified by having a
1389
- // non-empty forwarding key chain. These keys should
1390
- // be marked as untrusted since we don't know that they
1391
- // can be trusted
1392
- const untrusted =
1393
- "untrusted" in sessionData ? sessionData.untrusted : forwardingKeyChain.length > 0;
1394
-
1395
- result = {
1396
- chain_index: chainIndex,
1397
- key: exportedSession,
1398
- forwarding_curve25519_key_chain: forwardingKeyChain,
1399
- sender_claimed_ed25519_key: senderEd25519Key,
1400
- shared_history: sessionData.sharedHistory || false,
1401
- untrusted: untrusted,
1402
- };
1403
- });
1404
- },
1405
- logger.getChild("[getInboundGroupSessionKey]"),
1406
- );
1407
-
1408
- return result;
1409
- }
1410
-
1411
- /**
1412
- * Export an inbound group session
1413
- *
1414
- * @param senderKey - base64-encoded curve25519 key of the sender
1415
- * @param sessionId - session identifier
1416
- * @param sessionData - The session object from the store
1417
- * @returns exported session data
1418
- */
1419
- public exportInboundGroupSession(
1420
- senderKey: string,
1421
- sessionId: string,
1422
- sessionData: InboundGroupSessionData,
1423
- ): IMegolmSessionData {
1424
- return this.unpickleInboundGroupSession(sessionData, (session) => {
1425
- const messageIndex = session.first_known_index();
1426
-
1427
- return {
1428
- "sender_key": senderKey,
1429
- "sender_claimed_keys": sessionData.keysClaimed,
1430
- "room_id": sessionData.room_id,
1431
- "session_id": sessionId,
1432
- "session_key": session.export_session(messageIndex),
1433
- "forwarding_curve25519_key_chain": sessionData.forwardingCurve25519KeyChain || [],
1434
- "first_known_index": session.first_known_index(),
1435
- "org.matrix.msc3061.shared_history": sessionData.sharedHistory || false,
1436
- } as IMegolmSessionData;
1437
- });
1438
- }
1439
-
1440
- public async getSharedHistoryInboundGroupSessions(
1441
- roomId: string,
1442
- ): Promise<[senderKey: string, sessionId: string][]> {
1443
- let result: Promise<[senderKey: string, sessionId: string][]>;
1444
- await this.cryptoStore.doTxn(
1445
- "readonly",
1446
- [IndexedDBCryptoStore.STORE_SHARED_HISTORY_INBOUND_GROUP_SESSIONS],
1447
- (txn) => {
1448
- result = this.cryptoStore.getSharedHistoryInboundGroupSessions(roomId, txn);
1449
- },
1450
- logger.getChild("[getSharedHistoryInboundGroupSessionsForRoom]"),
1451
- );
1452
- return result!;
1453
- }
1454
-
1455
- // Utilities
1456
- // =========
1457
-
1458
- /**
1459
- * Verify an ed25519 signature.
1460
- *
1461
- * @param key - ed25519 key
1462
- * @param message - message which was signed
1463
- * @param signature - base64-encoded signature to be checked
1464
- *
1465
- * @throws Error if there is a problem with the verification. If the key was
1466
- * too small then the message will be "OLM.INVALID_BASE64". If the signature
1467
- * was invalid then the message will be "OLM.BAD_MESSAGE_MAC".
1468
- */
1469
- public verifySignature(key: string, message: string, signature: string): void {
1470
- this.getUtility(function (util: Utility) {
1471
- util.ed25519_verify(key, message, signature);
1472
- });
1473
- }
1474
- }
1475
-
1476
- export const WITHHELD_MESSAGES: Record<string, string> = {
1477
- "m.unverified": "The sender has disabled encrypting to unverified devices.",
1478
- "m.blacklisted": "The sender has blocked you.",
1479
- "m.unauthorised": "You are not authorised to read the message.",
1480
- "m.no_olm": "Unable to establish a secure channel.",
1481
- };
1482
-
1483
- /**
1484
- * Calculate the message to use for the exception when a session key is withheld.
1485
- *
1486
- * @param withheld - An object that describes why the key was withheld.
1487
- *
1488
- * @returns the message
1489
- *
1490
- * @internal
1491
- */
1492
- function calculateWithheldMessage(withheld: IWithheld): string {
1493
- if (withheld.code && withheld.code in WITHHELD_MESSAGES) {
1494
- return WITHHELD_MESSAGES[withheld.code];
1495
- } else if (withheld.reason) {
1496
- return withheld.reason;
1497
- } else {
1498
- return "decryption key withheld";
1499
- }
1500
- }