2020-05-25 13:30:53 +00:00
|
|
|
import 'dart:typed_data';
|
|
|
|
import 'dart:convert';
|
|
|
|
|
|
|
|
import 'package:olm/olm.dart' as olm;
|
|
|
|
|
|
|
|
import 'client.dart';
|
|
|
|
import 'utils/device_keys_list.dart';
|
|
|
|
|
|
|
|
const SELF_SIGNING_KEY = 'm.cross_signing.self_signing';
|
|
|
|
const USER_SIGNING_KEY = 'm.cross_signing.user_signing';
|
|
|
|
const MASTER_KEY = 'm.cross_signing.master';
|
|
|
|
|
|
|
|
class CrossSigning {
|
|
|
|
final Client client;
|
|
|
|
CrossSigning(this.client);
|
|
|
|
|
|
|
|
bool get enabled =>
|
|
|
|
client.accountData[SELF_SIGNING_KEY] != null &&
|
|
|
|
client.accountData[USER_SIGNING_KEY] != null &&
|
|
|
|
client.accountData[MASTER_KEY] != null;
|
|
|
|
|
|
|
|
Future<bool> isCached() async {
|
|
|
|
if (!enabled) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
return (await client.ssss.getCached(SELF_SIGNING_KEY)) != null &&
|
|
|
|
(await client.ssss.getCached(USER_SIGNING_KEY)) != null;
|
|
|
|
}
|
|
|
|
|
2020-05-27 16:50:09 +00:00
|
|
|
Future<void> selfSign({String password, String recoveryKey}) async {
|
|
|
|
final handle = client.ssss.open(MASTER_KEY);
|
|
|
|
await handle.unlock(password: password, recoveryKey: recoveryKey);
|
|
|
|
await handle.maybeCacheAll();
|
|
|
|
final masterPrivateKey = base64.decode(await handle.getStored(MASTER_KEY));
|
|
|
|
final keyObj = olm.PkSigning();
|
|
|
|
String masterPubkey;
|
|
|
|
try {
|
|
|
|
masterPubkey = keyObj.init_with_seed(masterPrivateKey);
|
|
|
|
} finally {
|
|
|
|
keyObj.free();
|
|
|
|
}
|
2020-05-27 19:35:00 +00:00
|
|
|
if (masterPubkey == null ||
|
|
|
|
!client.userDeviceKeys.containsKey(client.userID) ||
|
|
|
|
!client.userDeviceKeys[client.userID].deviceKeys
|
|
|
|
.containsKey(client.deviceID)) {
|
2020-05-27 16:50:09 +00:00
|
|
|
throw 'Master or user keys not found';
|
|
|
|
}
|
|
|
|
final masterKey = client.userDeviceKeys[client.userID].masterKey;
|
|
|
|
if (masterKey == null || masterKey.ed25519Key != masterPubkey) {
|
|
|
|
throw 'Master pubkey key doesn\'t match';
|
|
|
|
}
|
|
|
|
// master key is valid, set it to verified
|
|
|
|
masterKey.setVerified(true, false);
|
|
|
|
// and now sign bout our own key and our master key
|
2020-05-27 19:35:00 +00:00
|
|
|
await sign([
|
|
|
|
masterKey,
|
|
|
|
client.userDeviceKeys[client.userID].deviceKeys[client.deviceID]
|
|
|
|
]);
|
2020-05-27 16:50:09 +00:00
|
|
|
}
|
|
|
|
|
2020-05-25 13:30:53 +00:00
|
|
|
bool signable(List<SignedKey> keys) {
|
|
|
|
for (final key in keys) {
|
|
|
|
if (key is CrossSigningKey && key.usage.contains('master')) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
if (key.userId == client.userID &&
|
|
|
|
(key is DeviceKeys) &&
|
|
|
|
key.identifier != client.deviceID) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
Future<void> sign(List<SignedKey> keys) async {
|
|
|
|
Uint8List selfSigningKey;
|
|
|
|
Uint8List userSigningKey;
|
|
|
|
final signatures = <String, dynamic>{};
|
|
|
|
var signedKey = false;
|
|
|
|
final addSignature =
|
|
|
|
(SignedKey key, SignedKey signedWith, String signature) {
|
|
|
|
if (key == null || signedWith == null || signature == null) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (!signatures.containsKey(key.userId)) {
|
|
|
|
signatures[key.userId] = <String, dynamic>{};
|
|
|
|
}
|
|
|
|
if (!signatures[key.userId].containsKey(key.identifier)) {
|
2020-05-26 07:54:46 +00:00
|
|
|
signatures[key.userId][key.identifier] =
|
|
|
|
Map<String, dynamic>.from(key.toJson());
|
2020-05-27 19:35:00 +00:00
|
|
|
// we don't need to send all old signatures, so let's just remove them
|
2020-05-26 07:54:46 +00:00
|
|
|
signatures[key.userId][key.identifier].remove('signatures');
|
2020-05-25 13:30:53 +00:00
|
|
|
}
|
|
|
|
if (!signatures[key.userId][key.identifier].containsKey('signatures')) {
|
|
|
|
signatures[key.userId][key.identifier]
|
|
|
|
['signatures'] = <String, dynamic>{};
|
|
|
|
}
|
|
|
|
if (!signatures[key.userId][key.identifier]['signatures']
|
|
|
|
.containsKey(signedWith.userId)) {
|
|
|
|
signatures[key.userId][key.identifier]['signatures']
|
|
|
|
[signedWith.userId] = <String, dynamic>{};
|
|
|
|
}
|
|
|
|
signatures[key.userId][key.identifier]['signatures'][signedWith.userId]
|
2020-05-25 13:58:37 +00:00
|
|
|
['ed25519:${signedWith.identifier}'] = signature;
|
2020-05-25 13:30:53 +00:00
|
|
|
signedKey = true;
|
|
|
|
};
|
|
|
|
for (final key in keys) {
|
|
|
|
if (key.userId == client.userID) {
|
|
|
|
// we are singing a key of ourself
|
|
|
|
if (key is CrossSigningKey) {
|
|
|
|
if (key.usage.contains('master')) {
|
|
|
|
// okay, we'll sign our own master key
|
|
|
|
final signature = client.signString(key.signingContent);
|
|
|
|
addSignature(
|
|
|
|
key,
|
2020-05-26 07:54:46 +00:00
|
|
|
client
|
|
|
|
.userDeviceKeys[client.userID].deviceKeys[client.deviceID],
|
2020-05-25 13:30:53 +00:00
|
|
|
signature);
|
|
|
|
}
|
|
|
|
// we don't care about signing other cross-signing keys
|
2020-05-27 16:50:09 +00:00
|
|
|
} else {
|
2020-05-25 13:30:53 +00:00
|
|
|
// okay, we'll sign a device key with our self signing key
|
2020-05-26 07:54:46 +00:00
|
|
|
selfSigningKey ??= base64
|
|
|
|
.decode(await client.ssss.getCached(SELF_SIGNING_KEY) ?? '');
|
2020-05-25 13:30:53 +00:00
|
|
|
if (selfSigningKey != null) {
|
|
|
|
final signature = _sign(key.signingContent, selfSigningKey);
|
2020-05-26 07:54:46 +00:00
|
|
|
addSignature(key,
|
|
|
|
client.userDeviceKeys[client.userID].selfSigningKey, signature);
|
2020-05-25 13:30:53 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
} else if (key is CrossSigningKey && key.usage.contains('master')) {
|
|
|
|
// we are signing someone elses master key
|
|
|
|
userSigningKey ??=
|
|
|
|
base64.decode(await client.ssss.getCached(USER_SIGNING_KEY) ?? '');
|
|
|
|
if (userSigningKey != null) {
|
|
|
|
final signature = _sign(key.signingContent, userSigningKey);
|
2020-05-26 07:54:46 +00:00
|
|
|
addSignature(key, client.userDeviceKeys[client.userID].userSigningKey,
|
|
|
|
signature);
|
2020-05-25 13:30:53 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (signedKey) {
|
|
|
|
// post our new keys!
|
|
|
|
await client.jsonRequest(
|
|
|
|
type: HTTPType.POST,
|
|
|
|
action: '/client/r0/keys/signatures/upload',
|
|
|
|
data: signatures,
|
|
|
|
);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
String _sign(String canonicalJson, Uint8List key) {
|
|
|
|
final keyObj = olm.PkSigning();
|
|
|
|
try {
|
2020-05-27 16:50:09 +00:00
|
|
|
keyObj.init_with_seed(key);
|
2020-05-25 13:30:53 +00:00
|
|
|
return keyObj.sign(canonicalJson);
|
|
|
|
} finally {
|
|
|
|
keyObj.free();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|