//! Common types for [encryption] related tasks. //! //! [encryption]: https://spec.matrix.org/latest/client-server-api/#end-to-end-encryption use std::collections::BTreeMap; use serde::{Deserialize, Serialize}; use crate::{ serde::{Base64, StringEnum}, CrossSigningOrDeviceSignatures, DeviceSignatures, EventEncryptionAlgorithm, OwnedCrossSigningKeyId, OwnedDeviceId, OwnedDeviceKeyId, OwnedUserId, PrivOwnedStr, }; /// Identity keys for a device. #[derive(Clone, Debug, Deserialize, Serialize)] #[cfg_attr(not(feature = "unstable-exhaustive-types"), non_exhaustive)] pub struct DeviceKeys { /// The ID of the user the device belongs to. /// /// Must match the user ID used when logging in. pub user_id: OwnedUserId, /// The ID of the device these keys belong to. /// /// Must match the device ID used when logging in. pub device_id: OwnedDeviceId, /// The encryption algorithms supported by this device. pub algorithms: Vec, /// Public identity keys. pub keys: BTreeMap, /// Signatures for the device key object. pub signatures: CrossSigningOrDeviceSignatures, /// Additional data added to the device key information by intermediate servers, and /// not covered by the signatures. #[serde(default, skip_serializing_if = "UnsignedDeviceInfo::is_empty")] pub unsigned: UnsignedDeviceInfo, } impl DeviceKeys { /// Creates a new `DeviceKeys` from the given user id, device id, algorithms, keys and /// signatures. pub fn new( user_id: OwnedUserId, device_id: OwnedDeviceId, algorithms: Vec, keys: BTreeMap, signatures: CrossSigningOrDeviceSignatures, ) -> Self { Self { user_id, device_id, algorithms, keys, signatures, unsigned: Default::default() } } } /// Additional data added to device key information by intermediate servers. #[derive(Clone, Debug, Default, Deserialize, Serialize)] #[cfg_attr(not(feature = "unstable-exhaustive-types"), non_exhaustive)] pub struct UnsignedDeviceInfo { /// The display name which the user set on the device. #[serde(skip_serializing_if = "Option::is_none")] pub device_display_name: Option, } impl UnsignedDeviceInfo { /// Creates an empty `UnsignedDeviceInfo`. pub fn new() -> Self { Default::default() } /// Checks whether all fields are empty / `None`. pub fn is_empty(&self) -> bool { self.device_display_name.is_none() } } /// A key for the SignedCurve25519 algorithm #[derive(Debug, Clone, Serialize, Deserialize)] #[cfg_attr(not(feature = "unstable-exhaustive-types"), non_exhaustive)] pub struct SignedKey { /// Base64-encoded 32-byte Curve25519 public key. pub key: Base64, /// Signatures for the key object. pub signatures: DeviceSignatures, /// Is this key considered to be a fallback key, defaults to false. #[serde(default, skip_serializing_if = "crate::serde::is_default")] pub fallback: bool, } impl SignedKey { /// Creates a new `SignedKey` with the given key and signatures. pub fn new(key: Base64, signatures: DeviceSignatures) -> Self { Self { key, signatures, fallback: false } } /// Creates a new fallback `SignedKey` with the given key and signatures. pub fn new_fallback(key: Base64, signatures: DeviceSignatures) -> Self { Self { key, signatures, fallback: true } } } /// A one-time public key for "pre-key" messages. #[derive(Debug, Clone, Serialize, Deserialize)] #[cfg_attr(not(feature = "unstable-exhaustive-types"), non_exhaustive)] #[serde(untagged)] pub enum OneTimeKey { /// A key containing signatures, for the SignedCurve25519 algorithm. SignedKey(SignedKey), /// A string-valued key, for the Ed25519 and Curve25519 algorithms. Key(String), } /// A [cross-signing] key. /// /// [cross-signing]: https://spec.matrix.org/latest/client-server-api/#cross-signing #[derive(Clone, Debug, Deserialize, Serialize)] #[cfg_attr(not(feature = "unstable-exhaustive-types"), non_exhaustive)] pub struct CrossSigningKey { /// The ID of the user the key belongs to. pub user_id: OwnedUserId, /// What the key is used for. pub usage: Vec, /// The public key. /// /// The object must have exactly one property. pub keys: BTreeMap, /// Signatures of the key. /// /// The master key should be signed by the device key and can be signed by other users' /// user-signing key. The user-signing and self-signing keys must be signed by the master /// key. /// /// Only optional for the master key. #[serde(default, skip_serializing_if = "BTreeMap::is_empty")] pub signatures: CrossSigningOrDeviceSignatures, } impl CrossSigningKey { /// Creates a new `CrossSigningKey` with the given user ID, usage, keys and signatures. pub fn new( user_id: OwnedUserId, usage: Vec, keys: BTreeMap, signatures: CrossSigningOrDeviceSignatures, ) -> Self { Self { user_id, usage, keys, signatures } } } /// The usage of a cross signing key. #[doc = include_str!(concat!(env!("CARGO_MANIFEST_DIR"), "/src/doc/string_enum.md"))] #[derive(Clone, PartialEq, Eq, StringEnum)] #[cfg_attr(not(feature = "unstable-exhaustive-types"), non_exhaustive)] #[ruma_enum(rename_all = "snake_case")] pub enum KeyUsage { /// Master key. Master, /// Self-signing key. SelfSigning, /// User-signing key. UserSigning, #[doc(hidden)] _Custom(PrivOwnedStr), }