2015-06-22 18:50:56 +02:00
|
|
|
/* Copyright 2015 OpenMarket Ltd
|
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
2015-06-27 01:15:23 +02:00
|
|
|
#ifndef OLM_ACCOUNT_HH_
|
|
|
|
#define OLM_ACCOUNT_HH_
|
2015-06-11 19:03:22 +02:00
|
|
|
|
2015-06-27 01:15:23 +02:00
|
|
|
#include "olm/list.hh"
|
|
|
|
#include "olm/crypto.hh"
|
|
|
|
#include "olm/error.hh"
|
2015-06-11 19:03:22 +02:00
|
|
|
|
|
|
|
#include <cstdint>
|
|
|
|
|
2015-06-27 01:15:23 +02:00
|
|
|
namespace olm {
|
2015-06-11 19:03:22 +02:00
|
|
|
|
|
|
|
|
2015-07-07 17:42:03 +02:00
|
|
|
struct IdentityKeys {
|
|
|
|
Ed25519KeyPair ed25519_key;
|
|
|
|
Curve25519KeyPair curve25519_key;
|
|
|
|
};
|
|
|
|
|
|
|
|
struct OneTimeKey {
|
2015-06-11 19:03:22 +02:00
|
|
|
std::uint32_t id;
|
2015-07-09 17:09:16 +02:00
|
|
|
bool published;
|
2015-06-11 19:03:22 +02:00
|
|
|
Curve25519KeyPair key;
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
static std::size_t const MAX_ONE_TIME_KEYS = 100;
|
|
|
|
|
2015-07-07 10:01:38 +02:00
|
|
|
|
2015-06-11 19:03:22 +02:00
|
|
|
struct Account {
|
2015-07-09 17:09:16 +02:00
|
|
|
Account();
|
2015-07-07 17:42:03 +02:00
|
|
|
IdentityKeys identity_keys;
|
|
|
|
List<OneTimeKey, MAX_ONE_TIME_KEYS> one_time_keys;
|
2015-07-09 17:09:16 +02:00
|
|
|
std::uint32_t next_one_time_key_id;
|
2015-06-12 15:09:41 +02:00
|
|
|
ErrorCode last_error;
|
2015-06-11 19:03:22 +02:00
|
|
|
|
|
|
|
/** Number of random bytes needed to create a new account */
|
|
|
|
std::size_t new_account_random_length();
|
|
|
|
|
2015-07-09 17:09:16 +02:00
|
|
|
/** Create a new account. Returns std::size_t(-1) on error. If the number of
|
|
|
|
* random bytes is too small then last_error will be NOT_ENOUGH_RANDOM */
|
2015-06-12 15:09:41 +02:00
|
|
|
std::size_t new_account(
|
2015-06-11 19:03:22 +02:00
|
|
|
uint8_t const * random, std::size_t random_length
|
|
|
|
);
|
|
|
|
|
2015-07-07 17:42:03 +02:00
|
|
|
/** Number of bytes needed to output the identity keys for this account */
|
|
|
|
std::size_t get_identity_json_length(
|
|
|
|
std::size_t user_id_length,
|
|
|
|
std::size_t device_id_length,
|
|
|
|
std::uint64_t valid_after_ts,
|
|
|
|
std::uint64_t valid_until_ts
|
|
|
|
);
|
|
|
|
|
|
|
|
/** Output the identity keys for this account as JSON in the following
|
2015-07-09 17:09:16 +02:00
|
|
|
* format:
|
2015-07-07 17:42:03 +02:00
|
|
|
*
|
2015-07-09 17:09:16 +02:00
|
|
|
* {"algorithms":
|
|
|
|
* ["m.olm.curve25519-aes-sha256"
|
|
|
|
* ]
|
|
|
|
* ,"device_id":"<device identifier>"
|
|
|
|
* ,"keys":
|
|
|
|
* {"curve25519:<key id>":"<base64 characters>"
|
|
|
|
* ,"ed25519:<key id>":"<base64 characters>"
|
|
|
|
* }
|
|
|
|
* ,"user_id":"<user identifier>"
|
|
|
|
* ,"valid_after_ts":<digits>
|
|
|
|
* ,"valid_until_ts":<digits>
|
|
|
|
* ,"signatures":
|
|
|
|
* {"<user identifier>/<device identifier>":
|
|
|
|
* {"ed25519:<key id>":"<base64 characters>"
|
|
|
|
* }
|
|
|
|
* }
|
|
|
|
* }
|
|
|
|
*
|
|
|
|
* The user_id and device_id must not contain 0x00-0x1F, '\"' or '\\'.
|
|
|
|
* The JSON up to but not including the "signatures" key will be signed
|
|
|
|
* using the account's ed25519 key. That signature is then included under
|
|
|
|
* the "signatures" key.
|
2015-07-08 16:30:34 +02:00
|
|
|
*
|
|
|
|
* Returns the size of the JSON written or std::size_t(-1) on error.
|
|
|
|
* If the buffer is too small last_error will be OUTPUT_BUFFER_TOO_SMALL. */
|
2015-07-07 17:42:03 +02:00
|
|
|
std::size_t get_identity_json(
|
|
|
|
std::uint8_t const * user_id, std::size_t user_id_length,
|
|
|
|
std::uint8_t const * device_id, std::size_t device_id_length,
|
|
|
|
std::uint64_t valid_after_ts,
|
|
|
|
std::uint64_t valid_until_ts,
|
2015-07-08 12:16:00 +02:00
|
|
|
std::uint8_t * identity_json, std::size_t identity_json_length
|
2015-07-07 17:42:03 +02:00
|
|
|
);
|
|
|
|
|
2015-07-08 16:30:34 +02:00
|
|
|
/** Number of bytes needed to output the one time keys for this account */
|
|
|
|
std::size_t get_one_time_keys_json_length();
|
|
|
|
|
2015-07-09 17:09:16 +02:00
|
|
|
/** Output the one time keys that haven't been published yet as JSON:
|
|
|
|
*
|
|
|
|
* {"curve25519:<key id>":"<base64 characters>"
|
|
|
|
* ,"curve25519:<key_id>":"<base64 characters>"
|
|
|
|
* ...
|
|
|
|
* }
|
|
|
|
*
|
2015-07-08 16:30:34 +02:00
|
|
|
* Returns the size of the JSON written or std::size_t(-1) on error.
|
|
|
|
* If the buffer is too small last_error will be OUTPUT_BUFFER_TOO_SMALL.
|
|
|
|
*/
|
|
|
|
std::size_t get_one_time_keys_json(
|
|
|
|
std::uint8_t * one_time_json, std::size_t one_time_json_length
|
|
|
|
);
|
|
|
|
|
2015-07-09 17:09:16 +02:00
|
|
|
/** Mark the current list of one_time_keys as being published. They
|
|
|
|
* will no longer be returned by get_one_time_keys_json_length(). */
|
|
|
|
std::size_t mark_keys_as_published();
|
|
|
|
|
|
|
|
/** The largest number of one time keys this account can store. */
|
|
|
|
std::size_t max_number_of_one_time_keys();
|
|
|
|
|
|
|
|
/** Returns the number of random bytes needed to generate a given number
|
|
|
|
* of new one time keys. */
|
|
|
|
std::size_t generate_one_time_keys_random_length(
|
|
|
|
std::size_t number_of_keys
|
|
|
|
);
|
|
|
|
|
|
|
|
/** Generates a number of new one time keys. If the total number of keys
|
|
|
|
* stored by this account exceeds max_number_of_one_time_keys() then the
|
|
|
|
* old keys are discarded. Returns std::size_t(-1) on error. If the number
|
|
|
|
* of random bytes is too small then last_error will be NOT_ENOUGH_RANDOM */
|
|
|
|
std::size_t generate_one_time_keys(
|
|
|
|
std::size_t number_of_keys,
|
|
|
|
std::uint8_t const * random, std::size_t random_length
|
|
|
|
);
|
|
|
|
|
2015-07-08 17:00:08 +02:00
|
|
|
/** Lookup a one time key with the given public key */
|
2015-07-07 17:42:03 +02:00
|
|
|
OneTimeKey const * lookup_key(
|
2015-07-08 15:53:25 +02:00
|
|
|
Curve25519PublicKey const & public_key
|
2015-06-12 15:09:41 +02:00
|
|
|
);
|
2015-06-22 12:02:42 +02:00
|
|
|
|
2015-07-08 17:00:08 +02:00
|
|
|
/** Remove a one time key with the given public key */
|
2015-06-22 12:02:42 +02:00
|
|
|
std::size_t remove_key(
|
2015-07-08 17:00:08 +02:00
|
|
|
Curve25519PublicKey const & public_key
|
2015-06-22 12:02:42 +02:00
|
|
|
);
|
2015-06-12 17:15:37 +02:00
|
|
|
};
|
2015-06-12 15:09:41 +02:00
|
|
|
|
2015-06-11 19:03:22 +02:00
|
|
|
|
2015-06-12 17:15:37 +02:00
|
|
|
std::size_t pickle_length(
|
|
|
|
Account const & value
|
|
|
|
);
|
2015-06-11 19:03:22 +02:00
|
|
|
|
2015-06-12 17:15:37 +02:00
|
|
|
|
|
|
|
std::uint8_t * pickle(
|
|
|
|
std::uint8_t * pos,
|
|
|
|
Account const & value
|
|
|
|
);
|
|
|
|
|
|
|
|
|
|
|
|
std::uint8_t const * unpickle(
|
|
|
|
std::uint8_t const * pos, std::uint8_t const * end,
|
|
|
|
Account & value
|
|
|
|
);
|
2015-06-11 19:03:22 +02:00
|
|
|
|
|
|
|
|
2015-06-27 01:15:23 +02:00
|
|
|
} // namespace olm
|
2015-06-11 19:03:22 +02:00
|
|
|
|
2015-06-27 01:15:23 +02:00
|
|
|
#endif /* OLM_ACCOUNT_HH_ */
|