summary refs log tree commit diff
path: root/src/CacheCryptoStructs.h
blob: 1dde21ce21fb0c6504e987b5a2af344de4e9379f (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
#pragma once

#include <map>
#include <mutex>

//#include <nlohmann/json.hpp>

#include <mtx/responses.hpp>
#include <mtxclient/crypto/client.hpp>

// Extra information associated with an outbound megolm session.
struct OutboundGroupSessionData
{
        std::string session_id;
        std::string session_key;
        uint64_t message_index = 0;
};

void
to_json(nlohmann::json &obj, const OutboundGroupSessionData &msg);
void
from_json(const nlohmann::json &obj, OutboundGroupSessionData &msg);

struct OutboundGroupSessionDataRef
{
        OlmOutboundGroupSession *session;
        OutboundGroupSessionData data;
};

struct DevicePublicKeys
{
        std::string ed25519;
        std::string curve25519;
};

void
to_json(nlohmann::json &obj, const DevicePublicKeys &msg);
void
from_json(const nlohmann::json &obj, DevicePublicKeys &msg);

//! Represents a unique megolm session identifier.
struct MegolmSessionIndex
{
        //! The room in which this session exists.
        std::string room_id;
        //! The session_id of the megolm session.
        std::string session_id;
        //! The curve25519 public key of the sender.
        std::string sender_key;
};

void
to_json(nlohmann::json &obj, const MegolmSessionIndex &msg);
void
from_json(const nlohmann::json &obj, MegolmSessionIndex &msg);

struct OlmSessionStorage
{
        // Megolm sessions
        std::map<std::string, mtx::crypto::InboundGroupSessionPtr> group_inbound_sessions;
        std::map<std::string, mtx::crypto::OutboundGroupSessionPtr> group_outbound_sessions;
        std::map<std::string, OutboundGroupSessionData> group_outbound_session_data;

        // Guards for accessing megolm sessions.
        std::mutex group_outbound_mtx;
        std::mutex group_inbound_mtx;
};

// this will store the keys of the user with whom a encrypted room is shared with
struct UserCache
{
        //! map of public key key_ids and their public_key
        mtx::responses::QueryKeys keys;
        //! if the current cache is updated or not
        bool isUpdated = false;

        UserCache(mtx::responses::QueryKeys res, bool isUpdated_ = false)
          : keys(res)
          , isUpdated(isUpdated_)
        {}
        UserCache() {}
};

void
to_json(nlohmann::json &j, const UserCache &info);
void
from_json(const nlohmann::json &j, UserCache &info);

// the reason these are stored in a seperate cache rather than storing it in the user cache is
// UserCache stores only keys of users with which encrypted room is shared
struct DeviceVerifiedCache
{
        //! list of verified device_ids with device-verification
        std::vector<std::string> device_verified;
        //! list of verified device_ids with cross-signing
        std::vector<std::string> cross_verified;
        //! list of devices the user blocks
        std::vector<std::string> device_blocked;
        //! this stores if the user is verified (with cross-signing)
        bool is_user_verified = false;

        DeviceVerifiedCache(std::vector<std::string> device_verified_,
                            std::vector<std::string> cross_verified_,
                            std::vector<std::string> device_blocked_,
                            bool is_user_verified_ = false)
          : device_verified(device_verified_)
          , cross_verified(cross_verified_)
          , device_blocked(device_blocked_)
          , is_user_verified(is_user_verified_)
        {}

        DeviceVerifiedCache() {}
};

void
to_json(nlohmann::json &j, const DeviceVerifiedCache &info);
void
from_json(const nlohmann::json &j, DeviceVerifiedCache &info);