2020-06-04 11:39:51 +00:00
|
|
|
/*
|
|
|
|
* Famedly Matrix SDK
|
|
|
|
* Copyright (C) 2019, 2020 Famedly GmbH
|
|
|
|
*
|
|
|
|
* This program is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License as
|
|
|
|
* published by the Free Software Foundation, either version 3 of the
|
|
|
|
* License, or (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License
|
|
|
|
* along with this program. If not, see <https://www.gnu.org/licenses/>.
|
|
|
|
*/
|
|
|
|
|
|
|
|
import 'dart:convert';
|
|
|
|
|
|
|
|
import 'package:famedlysdk/famedlysdk.dart';
|
|
|
|
import 'package:famedlysdk/matrix_api.dart';
|
|
|
|
import 'package:pedantic/pedantic.dart';
|
|
|
|
import 'key_manager.dart';
|
|
|
|
import 'olm_manager.dart';
|
|
|
|
import 'key_verification_manager.dart';
|
2020-06-05 20:03:28 +00:00
|
|
|
import 'cross_signing.dart';
|
|
|
|
import 'ssss.dart';
|
2020-06-04 11:39:51 +00:00
|
|
|
|
|
|
|
class Encryption {
|
|
|
|
final Client client;
|
|
|
|
final bool debug;
|
|
|
|
final bool enableE2eeRecovery;
|
|
|
|
|
|
|
|
bool get enabled => olmManager.enabled;
|
|
|
|
|
|
|
|
/// Returns the base64 encoded keys to store them in a store.
|
|
|
|
/// This String should **never** leave the device!
|
|
|
|
String get pickledOlmAccount => olmManager.pickledOlmAccount;
|
|
|
|
|
|
|
|
String get fingerprintKey => olmManager.fingerprintKey;
|
|
|
|
String get identityKey => olmManager.identityKey;
|
|
|
|
|
|
|
|
KeyManager keyManager;
|
|
|
|
OlmManager olmManager;
|
|
|
|
KeyVerificationManager keyVerificationManager;
|
2020-06-05 20:03:28 +00:00
|
|
|
CrossSigning crossSigning;
|
|
|
|
SSSS ssss;
|
2020-06-04 11:39:51 +00:00
|
|
|
|
|
|
|
Encryption({
|
|
|
|
this.client,
|
|
|
|
this.debug,
|
|
|
|
this.enableE2eeRecovery,
|
|
|
|
}) {
|
2020-06-05 20:03:28 +00:00
|
|
|
ssss = SSSS(this);
|
2020-06-04 11:39:51 +00:00
|
|
|
keyManager = KeyManager(this);
|
|
|
|
olmManager = OlmManager(this);
|
|
|
|
keyVerificationManager = KeyVerificationManager(this);
|
2020-06-05 20:03:28 +00:00
|
|
|
crossSigning = CrossSigning(this);
|
2020-06-04 11:39:51 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
Future<void> init(String olmAccount) async {
|
|
|
|
await olmManager.init(olmAccount);
|
|
|
|
}
|
|
|
|
|
|
|
|
void handleDeviceOneTimeKeysCount(Map<String, int> countJson) {
|
|
|
|
olmManager.handleDeviceOneTimeKeysCount(countJson);
|
|
|
|
}
|
|
|
|
|
|
|
|
void onSync() {
|
|
|
|
keyVerificationManager.cleanup();
|
|
|
|
}
|
|
|
|
|
|
|
|
Future<void> handleToDeviceEvent(ToDeviceEvent event) async {
|
|
|
|
if (['m.room_key', 'm.room_key_request', 'm.forwarded_room_key']
|
|
|
|
.contains(event.type)) {
|
2020-06-04 15:51:49 +00:00
|
|
|
// a new room key or thelike. We need to handle this asap, before other
|
|
|
|
// events in /sync are handled
|
2020-06-04 11:39:51 +00:00
|
|
|
await keyManager.handleToDeviceEvent(event);
|
|
|
|
}
|
|
|
|
if (event.type.startsWith('m.key.verification.')) {
|
2020-06-04 15:51:49 +00:00
|
|
|
// some key verification event. No need to handle it now, we can easily
|
|
|
|
// do this in the background
|
2020-06-04 11:39:51 +00:00
|
|
|
unawaited(keyVerificationManager.handleToDeviceEvent(event));
|
|
|
|
}
|
2020-06-06 11:38:19 +00:00
|
|
|
if (event.type.startsWith('m.secret.')) {
|
|
|
|
// some ssss thing. We can do this in the background
|
|
|
|
unawaited(ssss.handleToDeviceEvent(event));
|
|
|
|
}
|
2020-06-04 11:39:51 +00:00
|
|
|
}
|
|
|
|
|
2020-06-05 20:03:28 +00:00
|
|
|
Future<void> handleEventUpdate(EventUpdate update) async {
|
|
|
|
if (update.type == 'ephemeral') {
|
|
|
|
return;
|
|
|
|
}
|
2020-06-06 11:47:37 +00:00
|
|
|
if (update.eventType.startsWith('m.key.verification.') ||
|
|
|
|
(update.eventType == 'm.room.message' &&
|
|
|
|
(update.content['content']['msgtype'] is String) &&
|
|
|
|
update.content['content']['msgtype']
|
|
|
|
.startsWith('m.key.verification.'))) {
|
2020-06-05 20:03:28 +00:00
|
|
|
// "just" key verification, no need to do this in sync
|
|
|
|
unawaited(keyVerificationManager.handleEventUpdate(update));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-04 11:39:51 +00:00
|
|
|
Future<ToDeviceEvent> decryptToDeviceEvent(ToDeviceEvent event) async {
|
|
|
|
return await olmManager.decryptToDeviceEvent(event);
|
|
|
|
}
|
|
|
|
|
|
|
|
Event decryptRoomEventSync(String roomId, Event event) {
|
|
|
|
if (event.type != EventTypes.Encrypted ||
|
|
|
|
event.content['ciphertext'] == null) return event;
|
|
|
|
Map<String, dynamic> decryptedPayload;
|
2020-06-10 08:44:22 +00:00
|
|
|
var canRequestSession = false;
|
2020-06-04 11:39:51 +00:00
|
|
|
try {
|
|
|
|
if (event.content['algorithm'] != 'm.megolm.v1.aes-sha2') {
|
|
|
|
throw (DecryptError.UNKNOWN_ALGORITHM);
|
|
|
|
}
|
|
|
|
final String sessionId = event.content['session_id'];
|
|
|
|
final String senderKey = event.content['sender_key'];
|
|
|
|
final inboundGroupSession =
|
|
|
|
keyManager.getInboundGroupSession(roomId, sessionId, senderKey);
|
|
|
|
if (inboundGroupSession == null) {
|
2020-06-10 08:44:22 +00:00
|
|
|
canRequestSession = true;
|
2020-06-04 11:39:51 +00:00
|
|
|
throw (DecryptError.UNKNOWN_SESSION);
|
|
|
|
}
|
2020-06-10 10:11:10 +00:00
|
|
|
// decrypt errors here may mean we have a bad session key - others might have a better one
|
|
|
|
canRequestSession = true;
|
2020-06-04 11:39:51 +00:00
|
|
|
final decryptResult = inboundGroupSession.inboundGroupSession
|
|
|
|
.decrypt(event.content['ciphertext']);
|
2020-06-10 10:11:10 +00:00
|
|
|
canRequestSession = false;
|
2020-06-04 11:39:51 +00:00
|
|
|
final messageIndexKey = event.eventId +
|
|
|
|
event.originServerTs.millisecondsSinceEpoch.toString();
|
|
|
|
var haveIndex = inboundGroupSession.indexes.containsKey(messageIndexKey);
|
|
|
|
if (haveIndex &&
|
|
|
|
inboundGroupSession.indexes[messageIndexKey] !=
|
|
|
|
decryptResult.message_index) {
|
|
|
|
// TODO: maybe clear outbound session, if it is ours
|
|
|
|
throw (DecryptError.CHANNEL_CORRUPTED);
|
|
|
|
}
|
|
|
|
inboundGroupSession.indexes[messageIndexKey] =
|
|
|
|
decryptResult.message_index;
|
|
|
|
if (!haveIndex) {
|
|
|
|
// now we persist the udpated indexes into the database.
|
|
|
|
// the entry should always exist. In the case it doesn't, the following
|
|
|
|
// line *could* throw an error. As that is a future, though, and we call
|
|
|
|
// it un-awaited here, nothing happens, which is exactly the result we want
|
|
|
|
client.database?.updateInboundGroupSessionIndexes(
|
|
|
|
json.encode(inboundGroupSession.indexes),
|
|
|
|
client.id,
|
|
|
|
roomId,
|
|
|
|
sessionId);
|
|
|
|
}
|
|
|
|
decryptedPayload = json.decode(decryptResult.plaintext);
|
|
|
|
} catch (exception) {
|
|
|
|
// alright, if this was actually by our own outbound group session, we might as well clear it
|
|
|
|
if (client.enableE2eeRecovery &&
|
|
|
|
(keyManager
|
|
|
|
.getOutboundGroupSession(roomId)
|
|
|
|
?.outboundGroupSession
|
|
|
|
?.session_id() ??
|
|
|
|
'') ==
|
|
|
|
event.content['session_id']) {
|
|
|
|
keyManager.clearOutboundGroupSession(roomId, wipe: true);
|
|
|
|
}
|
2020-06-10 08:44:22 +00:00
|
|
|
if (canRequestSession) {
|
2020-06-04 11:39:51 +00:00
|
|
|
decryptedPayload = {
|
|
|
|
'content': event.content,
|
|
|
|
'type': EventTypes.Encrypted,
|
|
|
|
};
|
|
|
|
decryptedPayload['content']['body'] = exception.toString();
|
|
|
|
decryptedPayload['content']['msgtype'] = 'm.bad.encrypted';
|
2020-06-10 08:44:22 +00:00
|
|
|
decryptedPayload['content']['can_request_session'] = true;
|
2020-06-04 11:39:51 +00:00
|
|
|
} else {
|
|
|
|
decryptedPayload = {
|
|
|
|
'content': <String, dynamic>{
|
|
|
|
'msgtype': 'm.bad.encrypted',
|
|
|
|
'body': exception.toString(),
|
|
|
|
},
|
|
|
|
'type': EventTypes.Encrypted,
|
|
|
|
};
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (event.content['m.relates_to'] != null) {
|
|
|
|
decryptedPayload['content']['m.relates_to'] =
|
|
|
|
event.content['m.relates_to'];
|
|
|
|
}
|
|
|
|
return Event(
|
|
|
|
content: decryptedPayload['content'],
|
|
|
|
type: decryptedPayload['type'],
|
|
|
|
senderId: event.senderId,
|
|
|
|
eventId: event.eventId,
|
|
|
|
roomId: event.roomId,
|
|
|
|
room: event.room,
|
|
|
|
originServerTs: event.originServerTs,
|
|
|
|
unsigned: event.unsigned,
|
|
|
|
stateKey: event.stateKey,
|
|
|
|
prevContent: event.prevContent,
|
|
|
|
status: event.status,
|
|
|
|
sortOrder: event.sortOrder,
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
Future<Event> decryptRoomEvent(String roomId, Event event,
|
|
|
|
{bool store = false, String updateType = 'timeline'}) async {
|
|
|
|
final doStore = () async {
|
|
|
|
await client.database?.storeEventUpdate(
|
|
|
|
client.id,
|
|
|
|
EventUpdate(
|
|
|
|
eventType: event.type,
|
|
|
|
content: event.toJson(),
|
|
|
|
roomID: event.roomId,
|
|
|
|
type: updateType,
|
|
|
|
sortOrder: event.sortOrder,
|
|
|
|
),
|
|
|
|
);
|
|
|
|
if (updateType != 'history') {
|
|
|
|
event.room?.setState(event);
|
|
|
|
}
|
|
|
|
};
|
|
|
|
if (event.type != EventTypes.Encrypted) {
|
|
|
|
return event;
|
|
|
|
}
|
|
|
|
event = decryptRoomEventSync(roomId, event);
|
|
|
|
if (event.type != EventTypes.Encrypted) {
|
|
|
|
if (store) {
|
|
|
|
await doStore();
|
|
|
|
}
|
|
|
|
return event;
|
|
|
|
}
|
|
|
|
if (client.database == null) {
|
|
|
|
return event;
|
|
|
|
}
|
|
|
|
await keyManager.loadInboundGroupSession(
|
|
|
|
roomId, event.content['session_id'], event.content['sender_key']);
|
|
|
|
event = decryptRoomEventSync(roomId, event);
|
|
|
|
if (event.type != EventTypes.Encrypted && store) {
|
|
|
|
await doStore();
|
|
|
|
}
|
|
|
|
return event;
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Encrypts the given json payload and creates a send-ready m.room.encrypted
|
|
|
|
/// payload. This will create a new outgoingGroupSession if necessary.
|
|
|
|
Future<Map<String, dynamic>> encryptGroupMessagePayload(
|
|
|
|
String roomId, Map<String, dynamic> payload,
|
|
|
|
{String type = EventTypes.Message}) async {
|
|
|
|
final room = client.getRoomById(roomId);
|
|
|
|
if (room == null || !room.encrypted || !enabled) {
|
|
|
|
return payload;
|
|
|
|
}
|
|
|
|
if (room.encryptionAlgorithm != 'm.megolm.v1.aes-sha2') {
|
|
|
|
throw ('Unknown encryption algorithm');
|
|
|
|
}
|
|
|
|
if (keyManager.getOutboundGroupSession(roomId) == null) {
|
|
|
|
await keyManager.loadOutboundGroupSession(roomId);
|
|
|
|
}
|
|
|
|
await keyManager.clearOutboundGroupSession(roomId);
|
|
|
|
if (keyManager.getOutboundGroupSession(roomId) == null) {
|
|
|
|
await keyManager.createOutboundGroupSession(roomId);
|
|
|
|
}
|
|
|
|
final sess = keyManager.getOutboundGroupSession(roomId);
|
|
|
|
if (sess == null) {
|
|
|
|
throw ('Unable to create new outbound group session');
|
|
|
|
}
|
|
|
|
final Map<String, dynamic> mRelatesTo = payload.remove('m.relates_to');
|
|
|
|
final payloadContent = {
|
|
|
|
'content': payload,
|
|
|
|
'type': type,
|
|
|
|
'room_id': roomId,
|
|
|
|
};
|
|
|
|
var encryptedPayload = <String, dynamic>{
|
|
|
|
'algorithm': 'm.megolm.v1.aes-sha2',
|
|
|
|
'ciphertext':
|
|
|
|
sess.outboundGroupSession.encrypt(json.encode(payloadContent)),
|
|
|
|
'device_id': client.deviceID,
|
|
|
|
'sender_key': identityKey,
|
|
|
|
'session_id': sess.outboundGroupSession.session_id(),
|
|
|
|
if (mRelatesTo != null) 'm.relates_to': mRelatesTo,
|
|
|
|
};
|
|
|
|
sess.sentMessages++;
|
|
|
|
await keyManager.storeOutboundGroupSession(roomId, sess);
|
|
|
|
return encryptedPayload;
|
|
|
|
}
|
|
|
|
|
|
|
|
Future<Map<String, dynamic>> encryptToDeviceMessagePayload(
|
|
|
|
DeviceKeys device, String type, Map<String, dynamic> payload) async {
|
|
|
|
return await olmManager.encryptToDeviceMessagePayload(
|
|
|
|
device, type, payload);
|
|
|
|
}
|
|
|
|
|
|
|
|
Future<Map<String, dynamic>> encryptToDeviceMessage(
|
|
|
|
List<DeviceKeys> deviceKeys,
|
|
|
|
String type,
|
|
|
|
Map<String, dynamic> payload) async {
|
|
|
|
return await olmManager.encryptToDeviceMessage(deviceKeys, type, payload);
|
|
|
|
}
|
|
|
|
|
|
|
|
void dispose() {
|
|
|
|
keyManager.dispose();
|
|
|
|
olmManager.dispose();
|
|
|
|
keyVerificationManager.dispose();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
abstract class DecryptError {
|
|
|
|
static const String NOT_ENABLED = 'Encryption is not enabled in your client.';
|
|
|
|
static const String UNKNOWN_ALGORITHM = 'Unknown encryption algorithm.';
|
|
|
|
static const String UNKNOWN_SESSION =
|
|
|
|
'The sender has not sent us the session key.';
|
|
|
|
static const String CHANNEL_CORRUPTED =
|
|
|
|
'The secure channel with the sender was corrupted.';
|
|
|
|
}
|