2019-06-17 04:47:56 -04:00
|
|
|
/*
|
|
|
|
* store.h
|
2019-11-13 06:11:05 -05:00
|
|
|
* vim: expandtab:ts=4:sts=4:sw=4
|
2019-06-17 04:47:56 -04:00
|
|
|
*
|
|
|
|
* Copyright (C) 2019 Paul Fariello <paul@fariello.eu>
|
|
|
|
*
|
|
|
|
* This file is part of Profanity.
|
|
|
|
*
|
|
|
|
* Profanity is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* Profanity is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with Profanity. If not, see <https://www.gnu.org/licenses/>.
|
|
|
|
*
|
|
|
|
* In addition, as a special exception, the copyright holders give permission to
|
|
|
|
* link the code of portions of this program with the OpenSSL library under
|
|
|
|
* certain conditions as described in each individual source file, and
|
|
|
|
* distribute linked combinations including the two.
|
|
|
|
*
|
|
|
|
* You must obey the GNU General Public License in all respects for all of the
|
|
|
|
* code used other than OpenSSL. If you modify file(s) with this exception, you
|
|
|
|
* may extend this exception to your version of the file(s), but you are not
|
|
|
|
* obligated to do so. If you do not wish to do so, delete this exception
|
|
|
|
* statement from your version. If you delete this exception statement from all
|
|
|
|
* source files in the program, then also delete it here.
|
|
|
|
*
|
|
|
|
*/
|
2019-02-25 11:27:11 -05:00
|
|
|
#include <signal/signal_protocol.h>
|
|
|
|
|
2019-03-11 01:06:02 -04:00
|
|
|
#include "config.h"
|
|
|
|
|
2019-03-01 12:41:20 -05:00
|
|
|
#define OMEMO_STORE_GROUP_IDENTITY "identity"
|
2019-04-01 07:00:19 -04:00
|
|
|
#define OMEMO_STORE_GROUP_PREKEYS "prekeys"
|
|
|
|
#define OMEMO_STORE_GROUP_SIGNED_PREKEYS "signed_prekeys"
|
2019-03-01 12:41:20 -05:00
|
|
|
#define OMEMO_STORE_KEY_DEVICE_ID "device_id"
|
|
|
|
#define OMEMO_STORE_KEY_REGISTRATION_ID "registration_id"
|
|
|
|
#define OMEMO_STORE_KEY_IDENTITY_KEY_PUBLIC "identity_key_public"
|
|
|
|
#define OMEMO_STORE_KEY_IDENTITY_KEY_PRIVATE "identity_key_private"
|
|
|
|
|
2019-02-25 11:27:11 -05:00
|
|
|
typedef struct {
|
|
|
|
signal_buffer *public;
|
|
|
|
signal_buffer *private;
|
|
|
|
uint32_t registration_id;
|
2019-03-07 12:58:15 -05:00
|
|
|
GHashTable *trusted;
|
2019-06-07 17:44:26 -04:00
|
|
|
bool recv;
|
2019-02-25 11:27:11 -05:00
|
|
|
} identity_key_store_t;
|
|
|
|
|
|
|
|
GHashTable * session_store_new(void);
|
|
|
|
GHashTable * pre_key_store_new(void);
|
|
|
|
GHashTable * signed_pre_key_store_new(void);
|
|
|
|
void identity_key_store_new(identity_key_store_t *identity_key_store);
|
|
|
|
|
2019-03-05 13:21:15 -05:00
|
|
|
/**
|
|
|
|
* Returns a copy of the serialized session record corresponding to the
|
|
|
|
* provided recipient ID + device ID tuple.
|
|
|
|
*
|
|
|
|
* @param record pointer to a freshly allocated buffer containing the
|
|
|
|
* serialized session record. Unset if no record was found.
|
|
|
|
* The Signal Protocol library is responsible for freeing this buffer.
|
|
|
|
* @param address the address of the remote client
|
|
|
|
* @return 1 if the session was loaded, 0 if the session was not found, negative on failure
|
|
|
|
*/
|
2019-03-11 01:06:02 -04:00
|
|
|
#ifdef HAVE_LIBSIGNAL_LT_2_3_2
|
2019-02-25 11:27:11 -05:00
|
|
|
int load_session(signal_buffer **record, const signal_protocol_address *address, void *user_data);
|
2019-03-11 01:06:02 -04:00
|
|
|
#else
|
|
|
|
int load_session(signal_buffer **record, signal_buffer **user_record, const signal_protocol_address *address, void *user_data);
|
|
|
|
#endif
|
2019-03-05 13:21:15 -05:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Returns all known devices with active sessions for a recipient
|
|
|
|
*
|
|
|
|
* @param pointer to an array that will be allocated and populated with the result
|
|
|
|
* @param name the name of the remote client
|
|
|
|
* @param name_len the length of the name
|
|
|
|
* @return size of the sessions array, or negative on failure
|
|
|
|
*/
|
2019-02-25 11:27:11 -05:00
|
|
|
int get_sub_device_sessions(signal_int_list **sessions, const char *name, size_t name_len, void *user_data);
|
2019-03-05 13:21:15 -05:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Commit to storage the session record for a given
|
|
|
|
* recipient ID + device ID tuple.
|
|
|
|
*
|
|
|
|
* @param address the address of the remote client
|
|
|
|
* @param record pointer to a buffer containing the serialized session
|
|
|
|
* record for the remote client
|
|
|
|
* @param record_len length of the serialized session record
|
|
|
|
* @return 0 on success, negative on failure
|
|
|
|
*/
|
2019-03-11 01:06:02 -04:00
|
|
|
#ifdef HAVE_LIBSIGNAL_LT_2_3_2
|
2019-02-25 11:27:11 -05:00
|
|
|
int store_session(const signal_protocol_address *address, uint8_t *record, size_t record_len, void *user_data);
|
2019-03-11 01:06:02 -04:00
|
|
|
#else
|
|
|
|
int store_session(const signal_protocol_address *address, uint8_t *record, size_t record_len, uint8_t *user_record, size_t user_record_len, void *user_data);
|
|
|
|
#endif
|
2019-03-05 13:21:15 -05:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Determine whether there is a committed session record for a
|
|
|
|
* recipient ID + device ID tuple.
|
|
|
|
*
|
|
|
|
* @param address the address of the remote client
|
|
|
|
* @return 1 if a session record exists, 0 otherwise.
|
|
|
|
*/
|
2019-02-25 11:27:11 -05:00
|
|
|
int contains_session(const signal_protocol_address *address, void *user_data);
|
2019-03-05 13:21:15 -05:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Remove a session record for a recipient ID + device ID tuple.
|
|
|
|
*
|
|
|
|
* @param address the address of the remote client
|
|
|
|
* @return 1 if a session was deleted, 0 if a session was not deleted, negative on error
|
|
|
|
*/
|
2019-02-25 11:27:11 -05:00
|
|
|
int delete_session(const signal_protocol_address *address, void *user_data);
|
2019-03-05 13:21:15 -05:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Remove the session records corresponding to all devices of a recipient ID.
|
|
|
|
*
|
|
|
|
* @param name the name of the remote client
|
|
|
|
* @param name_len the length of the name
|
|
|
|
* @return the number of deleted sessions on success, negative on failure
|
|
|
|
*/
|
2019-02-25 11:27:11 -05:00
|
|
|
int delete_all_sessions(const char *name, size_t name_len, void *user_data);
|
2019-03-05 13:21:15 -05:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Load a local serialized PreKey record.
|
|
|
|
*
|
|
|
|
* @param record pointer to a newly allocated buffer containing the record,
|
|
|
|
* if found. Unset if no record was found.
|
|
|
|
* The Signal Protocol library is responsible for freeing this buffer.
|
|
|
|
* @param pre_key_id the ID of the local serialized PreKey record
|
|
|
|
* @retval SG_SUCCESS if the key was found
|
|
|
|
* @retval SG_ERR_INVALID_KEY_ID if the key could not be found
|
|
|
|
*/
|
2019-02-25 11:27:11 -05:00
|
|
|
int load_pre_key(signal_buffer **record, uint32_t pre_key_id, void *user_data);
|
2019-03-05 13:21:15 -05:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Store a local serialized PreKey record.
|
|
|
|
*
|
|
|
|
* @param pre_key_id the ID of the PreKey record to store.
|
|
|
|
* @param record pointer to a buffer containing the serialized record
|
|
|
|
* @param record_len length of the serialized record
|
|
|
|
* @return 0 on success, negative on failure
|
|
|
|
*/
|
2019-02-25 11:27:11 -05:00
|
|
|
int store_pre_key(uint32_t pre_key_id, uint8_t *record, size_t record_len, void *user_data);
|
2019-03-05 13:21:15 -05:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Determine whether there is a committed PreKey record matching the
|
|
|
|
* provided ID.
|
|
|
|
*
|
|
|
|
* @param pre_key_id A PreKey record ID.
|
|
|
|
* @return 1 if the store has a record for the PreKey ID, 0 otherwise
|
|
|
|
*/
|
2019-02-25 11:27:11 -05:00
|
|
|
int contains_pre_key(uint32_t pre_key_id, void *user_data);
|
2019-03-05 13:21:15 -05:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Delete a PreKey record from local storage.
|
|
|
|
*
|
|
|
|
* @param pre_key_id The ID of the PreKey record to remove.
|
|
|
|
* @return 0 on success, negative on failure
|
|
|
|
*/
|
2019-02-25 11:27:11 -05:00
|
|
|
int remove_pre_key(uint32_t pre_key_id, void *user_data);
|
2019-03-05 13:21:15 -05:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Load a local serialized signed PreKey record.
|
|
|
|
*
|
|
|
|
* @param record pointer to a newly allocated buffer containing the record,
|
|
|
|
* if found. Unset if no record was found.
|
|
|
|
* The Signal Protocol library is responsible for freeing this buffer.
|
|
|
|
* @param signed_pre_key_id the ID of the local signed PreKey record
|
|
|
|
* @retval SG_SUCCESS if the key was found
|
|
|
|
* @retval SG_ERR_INVALID_KEY_ID if the key could not be found
|
|
|
|
*/
|
2019-02-25 11:27:11 -05:00
|
|
|
int load_signed_pre_key(signal_buffer **record, uint32_t signed_pre_key_id, void *user_data);
|
2019-03-05 13:21:15 -05:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Store a local serialized signed PreKey record.
|
|
|
|
*
|
|
|
|
* @param signed_pre_key_id the ID of the signed PreKey record to store
|
|
|
|
* @param record pointer to a buffer containing the serialized record
|
|
|
|
* @param record_len length of the serialized record
|
|
|
|
* @return 0 on success, negative on failure
|
|
|
|
*/
|
2019-02-25 11:27:11 -05:00
|
|
|
int store_signed_pre_key(uint32_t signed_pre_key_id, uint8_t *record, size_t record_len, void *user_data);
|
2019-03-05 13:21:15 -05:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Determine whether there is a committed signed PreKey record matching
|
|
|
|
* the provided ID.
|
|
|
|
*
|
|
|
|
* @param signed_pre_key_id A signed PreKey record ID.
|
|
|
|
* @return 1 if the store has a record for the signed PreKey ID, 0 otherwise
|
|
|
|
*/
|
2019-02-25 11:27:11 -05:00
|
|
|
int contains_signed_pre_key(uint32_t signed_pre_key_id, void *user_data);
|
2019-03-05 13:21:15 -05:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Delete a SignedPreKeyRecord from local storage.
|
|
|
|
*
|
|
|
|
* @param signed_pre_key_id The ID of the signed PreKey record to remove.
|
|
|
|
* @return 0 on success, negative on failure
|
|
|
|
*/
|
2019-02-25 11:27:11 -05:00
|
|
|
int remove_signed_pre_key(uint32_t signed_pre_key_id, void *user_data);
|
2019-03-05 13:21:15 -05:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Get the local client's identity key pair.
|
|
|
|
*
|
|
|
|
* @param public_data pointer to a newly allocated buffer containing the
|
|
|
|
* public key, if found. Unset if no record was found.
|
|
|
|
* The Signal Protocol library is responsible for freeing this buffer.
|
|
|
|
* @param private_data pointer to a newly allocated buffer containing the
|
|
|
|
* private key, if found. Unset if no record was found.
|
|
|
|
* The Signal Protocol library is responsible for freeing this buffer.
|
|
|
|
* @return 0 on success, negative on failure
|
|
|
|
*/
|
2019-02-25 11:27:11 -05:00
|
|
|
int get_identity_key_pair(signal_buffer **public_data, signal_buffer **private_data, void *user_data);
|
2019-03-05 13:21:15 -05:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Return the local client's registration ID.
|
|
|
|
*
|
|
|
|
* Clients should maintain a registration ID, a random number
|
|
|
|
* between 1 and 16380 that's generated once at install time.
|
|
|
|
*
|
|
|
|
* @param registration_id pointer to be set to the local client's
|
|
|
|
* registration ID, if it was successfully retrieved.
|
|
|
|
* @return 0 on success, negative on failure
|
|
|
|
*/
|
2019-02-25 11:27:11 -05:00
|
|
|
int get_local_registration_id(void *user_data, uint32_t *registration_id);
|
2019-03-05 13:21:15 -05:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Save a remote client's identity key
|
|
|
|
* <p>
|
|
|
|
* Store a remote client's identity key as trusted.
|
|
|
|
* The value of key_data may be null. In this case remove the key data
|
|
|
|
* from the identity store, but retain any metadata that may be kept
|
|
|
|
* alongside it.
|
|
|
|
*
|
|
|
|
* @param address the address of the remote client
|
|
|
|
* @param key_data Pointer to the remote client's identity key, may be null
|
|
|
|
* @param key_len Length of the remote client's identity key
|
|
|
|
* @return 0 on success, negative on failure
|
|
|
|
*/
|
2019-02-25 11:27:11 -05:00
|
|
|
int save_identity(const signal_protocol_address *address, uint8_t *key_data, size_t key_len, void *user_data);
|
2019-03-05 13:21:15 -05:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Verify a remote client's identity key.
|
|
|
|
*
|
|
|
|
* Determine whether a remote client's identity is trusted. Convention is
|
|
|
|
* that the TextSecure protocol is 'trust on first use.' This means that
|
|
|
|
* an identity key is considered 'trusted' if there is no entry for the recipient
|
|
|
|
* in the local store, or if it matches the saved key for a recipient in the local
|
|
|
|
* store. Only if it mismatches an entry in the local store is it considered
|
|
|
|
* 'untrusted.'
|
|
|
|
*
|
|
|
|
* @param address the address of the remote client
|
|
|
|
* @param identityKey The identity key to verify.
|
|
|
|
* @param key_data Pointer to the identity key to verify
|
|
|
|
* @param key_len Length of the identity key to verify
|
|
|
|
* @return 1 if trusted, 0 if untrusted, negative on failure
|
|
|
|
*/
|
2019-02-25 11:27:11 -05:00
|
|
|
int is_trusted_identity(const signal_protocol_address *address, uint8_t *key_data, size_t key_len, void *user_data);
|
2019-03-05 13:21:15 -05:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Store a serialized sender key record for a given
|
|
|
|
* (groupId + senderId + deviceId) tuple.
|
|
|
|
*
|
|
|
|
* @param sender_key_name the (groupId + senderId + deviceId) tuple
|
|
|
|
* @param record pointer to a buffer containing the serialized record
|
|
|
|
* @param record_len length of the serialized record
|
|
|
|
* @return 0 on success, negative on failure
|
|
|
|
*/
|
2019-02-25 11:27:11 -05:00
|
|
|
int store_sender_key(const signal_protocol_sender_key_name *sender_key_name, uint8_t *record, size_t record_len, uint8_t *user_record, size_t user_record_len, void *user_data);
|
2019-03-05 13:21:15 -05:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Returns a copy of the sender key record corresponding to the
|
|
|
|
* (groupId + senderId + deviceId) tuple.
|
|
|
|
*
|
|
|
|
* @param record pointer to a newly allocated buffer containing the record,
|
|
|
|
* if found. Unset if no record was found.
|
|
|
|
* The Signal Protocol library is responsible for freeing this buffer.
|
|
|
|
* @param sender_key_name the (groupId + senderId + deviceId) tuple
|
|
|
|
* @return 1 if the record was loaded, 0 if the record was not found, negative on failure
|
|
|
|
*/
|
2019-02-25 11:27:11 -05:00
|
|
|
int load_sender_key(signal_buffer **record, signal_buffer **user_record, const signal_protocol_sender_key_name *sender_key_name, void *user_data);
|