| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190 |
- // Copyright (c) 2022 Tulir Asokan
- //
- // This Source Code Form is subject to the terms of the Mozilla Public
- // License, v. 2.0. If a copy of the MPL was not distributed with this
- // file, You can obtain one at http://mozilla.org/MPL/2.0/.
- package store
- import (
- "context"
- "fmt"
- "go.mau.fi/libsignal/ecc"
- groupRecord "go.mau.fi/libsignal/groups/state/record"
- "go.mau.fi/libsignal/keys/identity"
- "go.mau.fi/libsignal/protocol"
- "go.mau.fi/libsignal/serialize"
- "go.mau.fi/libsignal/state/record"
- "go.mau.fi/libsignal/state/store"
- )
- var SignalProtobufSerializer = serialize.NewProtoBufSerializer()
- var _ store.SignalProtocol = (*Device)(nil)
- func (device *Device) GetIdentityKeyPair() *identity.KeyPair {
- return identity.NewKeyPair(
- identity.NewKey(ecc.NewDjbECPublicKey(*device.IdentityKey.Pub)),
- ecc.NewDjbECPrivateKey(*device.IdentityKey.Priv),
- )
- }
- func (device *Device) GetLocalRegistrationID() uint32 {
- return device.RegistrationID
- }
- func (device *Device) SaveIdentity(ctx context.Context, address *protocol.SignalAddress, identityKey *identity.Key) error {
- addrString := address.String()
- err := device.Identities.PutIdentity(ctx, addrString, identityKey.PublicKey().PublicKey())
- if err != nil {
- return fmt.Errorf("failed to save identity of %s: %w", addrString, err)
- }
- return nil
- }
- func (device *Device) IsTrustedIdentity(ctx context.Context, address *protocol.SignalAddress, identityKey *identity.Key) (bool, error) {
- addrString := address.String()
- isTrusted, err := device.Identities.IsTrustedIdentity(ctx, addrString, identityKey.PublicKey().PublicKey())
- if err != nil {
- return false, fmt.Errorf("failed to check if %s's identity is trusted: %w", addrString, err)
- }
- return isTrusted, nil
- }
- func (device *Device) LoadPreKey(ctx context.Context, id uint32) (*record.PreKey, error) {
- preKey, err := device.PreKeys.GetPreKey(ctx, id)
- if err != nil {
- return nil, fmt.Errorf("failed to load prekey %d: %w", id, err)
- }
- if preKey == nil {
- return nil, nil
- }
- return record.NewPreKey(preKey.KeyID, ecc.NewECKeyPair(
- ecc.NewDjbECPublicKey(*preKey.Pub),
- ecc.NewDjbECPrivateKey(*preKey.Priv),
- ), nil), nil
- }
- func (device *Device) RemovePreKey(ctx context.Context, id uint32) error {
- err := device.PreKeys.RemovePreKey(ctx, id)
- if err != nil {
- return fmt.Errorf("failed to remove prekey %d: %w", id, err)
- }
- return nil
- }
- func (device *Device) StorePreKey(ctx context.Context, preKeyID uint32, preKeyRecord *record.PreKey) error {
- panic("not implemented")
- }
- func (device *Device) ContainsPreKey(ctx context.Context, preKeyID uint32) (bool, error) {
- panic("not implemented")
- }
- func (device *Device) LoadSession(ctx context.Context, address *protocol.SignalAddress) (*record.Session, error) {
- addrString := address.String()
- if sess := getCachedSession(ctx, addrString); sess != nil {
- return sess, nil
- }
- rawSess, err := device.Sessions.GetSession(ctx, addrString)
- if err != nil {
- return nil, fmt.Errorf("failed to load session with %s: %w", addrString, err)
- }
- if rawSess == nil {
- return record.NewSession(SignalProtobufSerializer.Session, SignalProtobufSerializer.State), nil
- }
- sess, err := record.NewSessionFromBytes(rawSess, SignalProtobufSerializer.Session, SignalProtobufSerializer.State)
- if err != nil {
- return nil, fmt.Errorf("failed to deserialize session with %s: %w", addrString, err)
- }
- return sess, nil
- }
- func (device *Device) GetSubDeviceSessions(ctx context.Context, name string) ([]uint32, error) {
- panic("not implemented")
- }
- func (device *Device) StoreSession(ctx context.Context, address *protocol.SignalAddress, record *record.Session) error {
- addrString := address.String()
- if putCachedSession(ctx, addrString, record) {
- return nil
- }
- err := device.Sessions.PutSession(ctx, addrString, record.Serialize())
- if err != nil {
- return fmt.Errorf("failed to store session with %s: %w", addrString, err)
- }
- return nil
- }
- func (device *Device) ContainsSession(ctx context.Context, remoteAddress *protocol.SignalAddress) (bool, error) {
- addrString := remoteAddress.String()
- hasSession, err := device.Sessions.HasSession(ctx, addrString)
- if err != nil {
- return false, fmt.Errorf("failed to check if store has session for %s: %w", addrString, err)
- }
- return hasSession, nil
- }
- func (device *Device) DeleteSession(ctx context.Context, remoteAddress *protocol.SignalAddress) error {
- panic("not implemented")
- }
- func (device *Device) DeleteAllSessions(ctx context.Context) error {
- panic("not implemented")
- }
- func (device *Device) LoadSignedPreKey(ctx context.Context, signedPreKeyID uint32) (*record.SignedPreKey, error) {
- if signedPreKeyID == device.SignedPreKey.KeyID {
- return record.NewSignedPreKey(signedPreKeyID, 0, ecc.NewECKeyPair(
- ecc.NewDjbECPublicKey(*device.SignedPreKey.Pub),
- ecc.NewDjbECPrivateKey(*device.SignedPreKey.Priv),
- ), *device.SignedPreKey.Signature, nil), nil
- }
- return nil, nil
- }
- func (device *Device) LoadSignedPreKeys(ctx context.Context) ([]*record.SignedPreKey, error) {
- panic("not implemented")
- }
- func (device *Device) StoreSignedPreKey(ctx context.Context, signedPreKeyID uint32, record *record.SignedPreKey) error {
- panic("not implemented")
- }
- func (device *Device) ContainsSignedPreKey(ctx context.Context, signedPreKeyID uint32) (bool, error) {
- panic("not implemented")
- }
- func (device *Device) RemoveSignedPreKey(ctx context.Context, signedPreKeyID uint32) error {
- panic("not implemented")
- }
- func (device *Device) StoreSenderKey(ctx context.Context, senderKeyName *protocol.SenderKeyName, keyRecord *groupRecord.SenderKey) error {
- groupID := senderKeyName.GroupID()
- senderString := senderKeyName.Sender().String()
- err := device.SenderKeys.PutSenderKey(ctx, groupID, senderString, keyRecord.Serialize())
- if err != nil {
- return fmt.Errorf("failed to store sender key from %s for %s: %w", senderString, groupID, err)
- }
- return nil
- }
- func (device *Device) LoadSenderKey(ctx context.Context, senderKeyName *protocol.SenderKeyName) (*groupRecord.SenderKey, error) {
- groupID := senderKeyName.GroupID()
- senderString := senderKeyName.Sender().String()
- rawKey, err := device.SenderKeys.GetSenderKey(ctx, groupID, senderString)
- if err != nil {
- return nil, fmt.Errorf("failed to load sender key from %s for %s: %w", senderString, groupID, err)
- }
- if rawKey == nil {
- return groupRecord.NewSenderKey(SignalProtobufSerializer.SenderKeyRecord, SignalProtobufSerializer.SenderKeyState), nil
- }
- key, err := groupRecord.NewSenderKeyFromBytes(rawKey, SignalProtobufSerializer.SenderKeyRecord, SignalProtobufSerializer.SenderKeyState)
- if err != nil {
- return nil, fmt.Errorf("failed to deserialize sender key from %s for %s: %w", senderString, groupID, err)
- }
- return key, nil
- }
|