diff options
Diffstat (limited to 'includes/external/matrix/node_modules/matrix-js-sdk/lib/crypto/api.d.ts')
-rw-r--r-- | includes/external/matrix/node_modules/matrix-js-sdk/lib/crypto/api.d.ts | 89 |
1 files changed, 0 insertions, 89 deletions
diff --git a/includes/external/matrix/node_modules/matrix-js-sdk/lib/crypto/api.d.ts b/includes/external/matrix/node_modules/matrix-js-sdk/lib/crypto/api.d.ts deleted file mode 100644 index a01a697..0000000 --- a/includes/external/matrix/node_modules/matrix-js-sdk/lib/crypto/api.d.ts +++ /dev/null @@ -1,89 +0,0 @@ -import { DeviceInfo } from "./deviceinfo"; -import { IKeyBackupInfo } from "./keybackup"; -import { PassphraseInfo } from "../secret-storage"; -export { PassphraseInfo as IPassphraseInfo, SecretStorageKeyDescription as ISecretStorageKeyInfo, } from "../secret-storage"; -export declare enum CrossSigningKey { - Master = "master", - SelfSigning = "self_signing", - UserSigning = "user_signing" -} -export interface IEncryptedEventInfo { - /** - * whether the event is encrypted (if not encrypted, some of the other properties may not be set) - */ - encrypted: boolean; - /** - * the sender's key - */ - senderKey: string; - /** - * the algorithm used to encrypt the event - */ - algorithm: string; - /** - * whether we can be sure that the owner of the senderKey sent the event - */ - authenticated: boolean; - /** - * the sender's device information, if available - */ - sender?: DeviceInfo; - /** - * if the event's ed25519 and curve25519 keys don't match (only meaningful if `sender` is set) - */ - mismatchedSender: boolean; -} -export interface IRecoveryKey { - keyInfo?: IAddSecretStorageKeyOpts; - privateKey: Uint8Array; - encodedPrivateKey?: string; -} -export interface ICreateSecretStorageOpts { - /** - * Function called to await a secret storage key creation flow. - * @returns Promise resolving to an object with public key metadata, encoded private - * recovery key which should be disposed of after displaying to the user, - * and raw private key to avoid round tripping if needed. - */ - createSecretStorageKey?: () => Promise<IRecoveryKey>; - /** - * The current key backup object. If passed, - * the passphrase and recovery key from this backup will be used. - */ - keyBackupInfo?: IKeyBackupInfo; - /** - * If true, a new key backup version will be - * created and the private key stored in the new SSSS store. Ignored if keyBackupInfo - * is supplied. - */ - setupNewKeyBackup?: boolean; - /** - * Reset even if keys already exist. - */ - setupNewSecretStorage?: boolean; - /** - * Function called to get the user's - * current key backup passphrase. Should return a promise that resolves with a Uint8Array - * containing the key, or rejects if the key cannot be obtained. - */ - getKeyBackupPassphrase?: () => Promise<Uint8Array>; -} -export interface IAddSecretStorageKeyOpts { - pubkey?: string; - passphrase?: PassphraseInfo; - name?: string; - key?: Uint8Array; -} -export interface IImportOpts { - stage: string; - successes: number; - failures: number; - total: number; -} -export interface IImportRoomKeysOpts { - /** called with an object that has a "stage" param */ - progressCallback?: (stage: IImportOpts) => void; - untrusted?: boolean; - source?: string; -} -//# sourceMappingURL=api.d.ts.map
\ No newline at end of file |