/* Copyright 2021 The Matrix.org Foundation C.I.C. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ import { DeviceInfo } from "./deviceinfo"; import { IKeyBackupInfo } from "./keybackup"; import { PassphraseInfo } from "../secret-storage"; /* re-exports for backwards compatibility. */ export { PassphraseInfo as IPassphraseInfo, SecretStorageKeyDescription as ISecretStorageKeyInfo, } from "../secret-storage"; // TODO: Merge this with crypto.js once converted export enum CrossSigningKey { Master = "master", SelfSigning = "self_signing", UserSigning = "user_signing", } export interface IEncryptedEventInfo { /** * whether the event is encrypted (if not encrypted, some of the other properties may not be set) */ encrypted: boolean; /** * the sender's key */ senderKey: string; /** * the algorithm used to encrypt the event */ algorithm: string; /** * whether we can be sure that the owner of the senderKey sent the event */ authenticated: boolean; /** * the sender's device information, if available */ sender?: DeviceInfo; /** * if the event's ed25519 and curve25519 keys don't match (only meaningful if `sender` is set) */ mismatchedSender: boolean; } export interface IRecoveryKey { keyInfo?: IAddSecretStorageKeyOpts; privateKey: Uint8Array; encodedPrivateKey?: string; } export interface ICreateSecretStorageOpts { /** * Function called to await a secret storage key creation flow. * @returns Promise resolving to an object with public key metadata, encoded private * recovery key which should be disposed of after displaying to the user, * and raw private key to avoid round tripping if needed. */ createSecretStorageKey?: () => Promise; /** * The current key backup object. If passed, * the passphrase and recovery key from this backup will be used. */ keyBackupInfo?: IKeyBackupInfo; /** * If true, a new key backup version will be * created and the private key stored in the new SSSS store. Ignored if keyBackupInfo * is supplied. */ setupNewKeyBackup?: boolean; /** * Reset even if keys already exist. */ setupNewSecretStorage?: boolean; /** * Function called to get the user's * current key backup passphrase. Should return a promise that resolves with a Uint8Array * containing the key, or rejects if the key cannot be obtained. */ getKeyBackupPassphrase?: () => Promise; } export interface IAddSecretStorageKeyOpts { pubkey?: string; passphrase?: PassphraseInfo; name?: string; key?: Uint8Array; } export interface IImportOpts { stage: string; // TODO: Enum successes: number; failures: number; total: number; } export interface IImportRoomKeysOpts { /** called with an object that has a "stage" param */ progressCallback?: (stage: IImportOpts) => void; untrusted?: boolean; source?: string; // TODO: Enum }