/* * omemo.h * vim: expandtab:ts=4:sts=4:sw=4 * * Copyright (C) 2019 Paul Fariello * * This file is part of Profanity. * * Profanity is free software: you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation, either version 3 of the License, or * (at your option) any later version. * * Profanity is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with Profanity. If not, see . * * In addition, as a special exception, the copyright holders give permission to * link the code of portions of this program with the OpenSSL library under * certain conditions as described in each individual source file, and * distribute linked combinations including the two. * * You must obey the GNU General Public License in all respects for all of the * code used other than OpenSSL. If you modify file(s) with this exception, you * may extend this exception to your version of the file(s), but you are not * obligated to do so. If you do not wish to do so, delete this exception * statement from your version. If you delete this exception statement from all * source files in the program, then also delete it here. * */ #include #include #include "ui/ui.h" #include "config/account.h" #define OMEMO_ERR_UNSUPPORTED_CRYPTO -10000 #define OMEMO_ERR_GCRYPT -20000 #define OMEMO_AESGCM_NONCE_LENGTH AES128_GCM_IV_LENGTH #define OMEMO_AESGCM_KEY_LENGTH 32 #define OMEMO_AESGCM_URL_SCHEME "aesgcm" typedef enum { PROF_OMEMOPOLICY_MANUAL, PROF_OMEMOPOLICY_AUTOMATIC, PROF_OMEMOPOLICY_ALWAYS } prof_omemopolicy_t; typedef struct omemo_key { unsigned char* data; size_t length; gboolean prekey; uint32_t device_id; uint32_t id; } omemo_key_t; void omemo_init(void); void omemo_close(void); void omemo_on_connect(ProfAccount* account); void omemo_on_disconnect(void); void omemo_generate_crypto_materials(ProfAccount* account); void omemo_key_free(omemo_key_t* key); void omemo_publish_crypto_materials(void); uint32_t omemo_device_id(void); void omemo_identity_key(unsigned char** output, size_t* length); void omemo_signed_prekey(unsigned char** output, size_t* length); void omemo_signed_prekey_signature(unsigned char** output, size_t* length); void omemo_prekeys(GList** prekeys, GList** ids, GList** lengths); void omemo_set_device_list(const char* const jid, GList* device_list); GKeyFile* omemo_identity_keyfile(void); void omemo_identity_keyfile_save(void); GKeyFile* omemo_trust_keyfile(void); void omemo_trust_keyfile_save(void); GKeyFile* omemo_sessions_keyfile(void); void omemo_sessions_keyfile_save(void); char* omemo_format_fingerprint(const char* const fingerprint); char* omemo_own_fingerprint(gboolean formatted); void omemo_trust(const char* const jid, const char* const fingerprint); void omemo_untrust(const char* const jid, const char* const fingerprint); GList* omemo_known_device_identities(const char* const jid); gboolean omemo_is_trusted_identity(const char* const jid, const char* const fingerprint); char* omemo_fingerprint_autocomplete(const char* const search_str, gboolean previous, void* context); void omemo_fingerprint_autocomplete_reset(void); gboolean omemo_automatic_start(const char* const recipient); void omemo_start_sessions(void); void omemo_start_session(const char* const barejid); void omemo_start_muc_sessions(const char* const roomjid); void omemo_start_device_session(const char* const jid, uint32_t device_id, GList* prekeys, uint32_t signed_prekey_id, const unsigned char* const signed_prekey, size_t signed_prekey_len, const unsigned char* const signature, size_t signature_len, const unsigned char* const identity_key, size_t identity_key_len); gboolean omemo_loaded(void); char* omemo_on_message_send(ProfWin* win, const char* const message, gboolean request_receipt, gboolean muc, const char* const replace_id); char* omemo_on_message_recv(const char* const from, uint32_t sid, const unsigned char* const iv, size_t iv_len, GList* keys, const unsigned char* const payload, size_t payload_len, gboolean muc, gboolean* trusted); char* omemo_encrypt_file(FILE* in, FILE* out, off_t file_size, int* gcry_res); gcry_error_t omemo_decrypt_file(FILE* in, FILE* out, off_t file_size, const char* fragment); void omemo_free(void* a); int omemo_parse_aesgcm_url(const char* aesgcm_url, char** https_url, char** fragment); char* omemo_qrcode_str();