signal-desktop/ts/textsecure/AccountManager.ts

1463 lines
44 KiB
TypeScript
Raw Normal View History

2023-01-03 19:55:46 +00:00
// Copyright 2020 Signal Messenger, LLC
2020-10-30 20:34:04 +00:00
// SPDX-License-Identifier: AGPL-3.0-only
import PQueue from 'p-queue';
import { isNumber, omit, orderBy } from 'lodash';
2023-08-29 00:41:32 +00:00
import type { KyberPreKeyRecord } from '@signalapp/libsignal-client';
import EventTarget from './EventTarget';
import type {
UploadKeysType,
UploadKyberPreKeyType,
UploadPreKeyType,
UploadSignedPreKeyType,
WebAPIType,
} from './WebAPI';
import type {
2023-08-29 00:41:32 +00:00
CompatSignedPreKeyType,
CompatPreKeyType,
KeyPairType,
KyberPreKeyType,
PniKeyMaterialType,
} from './Types.d';
import ProvisioningCipher from './ProvisioningCipher';
import type { IncomingWebSocketRequest } from './WebsocketResources';
import createTaskWithTimeout from './TaskWithTimeout';
2021-07-02 19:21:24 +00:00
import * as Bytes from '../Bytes';
2021-12-09 19:45:21 +00:00
import * as Errors from '../types/errors';
2021-09-27 17:31:34 +00:00
import { senderCertificateService } from '../services/senderCertificate';
2024-03-15 14:20:33 +00:00
import { backupsService } from '../services/backups';
import {
deriveAccessKey,
generateRegistrationId,
getRandomBytes,
2021-09-24 00:49:05 +00:00
decryptDeviceName,
encryptDeviceName,
2024-02-29 01:48:11 +00:00
deriveStorageServiceKey,
} from '../Crypto';
import {
generateKeyPair,
generateSignedPreKey,
generatePreKey,
generateKyberPreKey,
} from '../Curve';
2023-08-29 00:41:32 +00:00
import type { ServiceIdString, AciString, PniString } from '../types/ServiceId';
2023-08-16 20:54:39 +00:00
import {
ServiceIdKind,
2023-08-29 00:41:32 +00:00
normalizePni,
2023-08-16 20:54:39 +00:00
toTaggedPni,
isUntaggedPniString,
} from '../types/ServiceId';
2023-09-14 17:04:48 +00:00
import { normalizeAci } from '../util/normalizeAci';
2024-02-16 20:39:58 +00:00
import { drop } from '../util/drop';
import { isMoreRecentThan, isOlderThan } from '../util/timestamp';
import { ourProfileKeyService } from '../services/ourProfileKey';
import { strictAssert } from '../util/assert';
import { getRegionCodeForNumber } from '../util/libphonenumberUtil';
2022-07-18 22:32:00 +00:00
import { isNotNil } from '../util/isNotNil';
2023-08-29 00:41:32 +00:00
import { missingCaseError } from '../util/missingCaseError';
2021-07-02 19:21:24 +00:00
import { SignalService as Proto } from '../protobuf';
import * as log from '../logging/log';
import type { StorageAccessType } from '../types/Storage';
2023-11-02 19:42:31 +00:00
import { linkDeviceRoute } from '../util/signalRoutes';
type StorageKeyByServiceIdKind = {
[kind in ServiceIdKind]: keyof StorageAccessType;
};
const DAY = 24 * 60 * 60 * 1000;
const STARTING_KEY_ID = 1;
const PROFILE_KEY_LENGTH = 32;
2023-10-30 20:31:39 +00:00
const MASTER_KEY_LENGTH = 32;
const KEY_TOO_OLD_THRESHOLD = 14 * DAY;
export const KYBER_KEY_ID_KEY: StorageKeyByServiceIdKind = {
[ServiceIdKind.ACI]: 'maxKyberPreKeyId',
[ServiceIdKind.Unknown]: 'maxKyberPreKeyId',
[ServiceIdKind.PNI]: 'maxKyberPreKeyIdPNI',
};
const LAST_RESORT_KEY_ARCHIVE_AGE = 30 * DAY;
const LAST_RESORT_KEY_ROTATION_AGE = DAY * 1.5;
const LAST_RESORT_KEY_MINIMUM = 5;
const LAST_RESORT_KEY_UPDATE_TIME_KEY: StorageKeyByServiceIdKind = {
[ServiceIdKind.ACI]: 'lastResortKeyUpdateTime',
[ServiceIdKind.Unknown]: 'lastResortKeyUpdateTime',
[ServiceIdKind.PNI]: 'lastResortKeyUpdateTimePNI',
};
const PRE_KEY_ARCHIVE_AGE = 90 * DAY;
const PRE_KEY_GEN_BATCH_SIZE = 100;
const PRE_KEY_MAX_COUNT = 200;
const PRE_KEY_ID_KEY: StorageKeyByServiceIdKind = {
[ServiceIdKind.ACI]: 'maxPreKeyId',
[ServiceIdKind.Unknown]: 'maxPreKeyId',
[ServiceIdKind.PNI]: 'maxPreKeyIdPNI',
};
const PRE_KEY_MINIMUM = 10;
const SIGNED_PRE_KEY_ARCHIVE_AGE = 30 * DAY;
export const SIGNED_PRE_KEY_ID_KEY: StorageKeyByServiceIdKind = {
[ServiceIdKind.ACI]: 'signedKeyId',
[ServiceIdKind.Unknown]: 'signedKeyId',
[ServiceIdKind.PNI]: 'signedKeyIdPNI',
};
const SIGNED_PRE_KEY_ROTATION_AGE = DAY * 1.5;
const SIGNED_PRE_KEY_MINIMUM = 5;
const SIGNED_PRE_KEY_UPDATE_TIME_KEY: StorageKeyByServiceIdKind = {
[ServiceIdKind.ACI]: 'signedKeyUpdateTime',
[ServiceIdKind.Unknown]: 'signedKeyUpdateTime',
[ServiceIdKind.PNI]: 'signedKeyUpdateTimePNI',
};
2023-08-29 00:41:32 +00:00
enum AccountType {
Primary = 'Primary',
Linked = 'Linked',
}
type CreateAccountSharedOptionsType = Readonly<{
number: string;
verificationCode: string;
2022-03-01 23:01:21 +00:00
aciKeyPair: KeyPairType;
2023-08-29 00:41:32 +00:00
pniKeyPair: KeyPairType;
profileKey: Uint8Array;
2023-10-30 20:31:39 +00:00
masterKey: Uint8Array | undefined;
2024-03-15 14:20:33 +00:00
backupFile?: Uint8Array;
}>;
2023-08-29 00:41:32 +00:00
type CreatePrimaryDeviceOptionsType = Readonly<{
type: AccountType.Primary;
deviceName?: undefined;
ourAci?: undefined;
ourPni?: undefined;
userAgent?: undefined;
readReceipts: true;
accessKey: Uint8Array;
sessionId: string;
}> &
CreateAccountSharedOptionsType;
type CreateLinkedDeviceOptionsType = Readonly<{
type: AccountType.Linked;
deviceName: string;
ourAci: AciString;
ourPni: PniString;
userAgent?: string;
readReceipts: boolean;
accessKey?: undefined;
sessionId?: undefined;
}> &
CreateAccountSharedOptionsType;
type CreateAccountOptionsType =
| CreatePrimaryDeviceOptionsType
| CreateLinkedDeviceOptionsType;
function getNextKeyId(
kind: ServiceIdKind,
keys: StorageKeyByServiceIdKind
): number {
const id = window.storage.get(keys[kind]);
if (isNumber(id)) {
return id;
}
// For PNI ids, start with existing ACI id
if (kind === ServiceIdKind.PNI) {
return window.storage.get(keys[ServiceIdKind.ACI], STARTING_KEY_ID);
}
return STARTING_KEY_ID;
}
2023-08-29 00:41:32 +00:00
function kyberPreKeyToUploadSignedPreKey(
record: KyberPreKeyRecord
): UploadSignedPreKeyType {
return {
keyId: record.id(),
publicKey: record.publicKey().serialize(),
signature: record.signature(),
};
}
function kyberPreKeyToStoredSignedPreKey(
record: KyberPreKeyRecord,
ourServiceId: ServiceIdString
): Omit<KyberPreKeyType, 'id'> {
return {
createdAt: Date.now(),
data: record.serialize(),
isConfirmed: false,
isLastResort: true,
keyId: record.id(),
ourServiceId,
};
}
function signedPreKeyToUploadSignedPreKey({
keyId,
keyPair,
signature,
}: CompatSignedPreKeyType): UploadSignedPreKeyType {
return {
keyId,
publicKey: keyPair.pubKey,
signature,
};
}
2024-03-15 14:20:33 +00:00
export type ConfirmNumberResultType = Readonly<{
deviceName: string;
backupFile: Uint8Array | undefined;
}>;
export default class AccountManager extends EventTarget {
pending: Promise<void>;
pendingQueue?: PQueue;
constructor(private readonly server: WebAPIType) {
super();
this.pending = Promise.resolve();
}
private async queueTask<T>(task: () => Promise<T>): Promise<T> {
this.pendingQueue = this.pendingQueue || new PQueue({ concurrency: 1 });
const taskWithTimeout = createTaskWithTimeout(task, 'AccountManager task');
return this.pendingQueue.add(taskWithTimeout);
}
2023-08-29 00:41:32 +00:00
encryptDeviceName(
name: string,
identityKey: KeyPairType
): string | undefined {
if (!name) {
2023-08-29 00:41:32 +00:00
return undefined;
}
2021-09-24 00:49:05 +00:00
const encrypted = encryptDeviceName(name, identityKey.pubKey);
2021-07-02 19:21:24 +00:00
const proto = new Proto.DeviceName();
2021-09-24 00:49:05 +00:00
proto.ephemeralPublic = encrypted.ephemeralPublic;
proto.syntheticIv = encrypted.syntheticIv;
proto.ciphertext = encrypted.ciphertext;
2021-07-02 19:21:24 +00:00
const bytes = Proto.DeviceName.encode(proto).finish();
return Bytes.toBase64(bytes);
}
async decryptDeviceName(base64: string): Promise<string> {
const ourAci = window.textsecure.storage.user.getCheckedAci();
2021-11-11 22:43:05 +00:00
const identityKey =
window.textsecure.storage.protocol.getIdentityKeyPair(ourAci);
if (!identityKey) {
throw new Error('decryptDeviceName: No identity key pair!');
}
2021-07-02 19:21:24 +00:00
const bytes = Bytes.fromBase64(base64);
const proto = Proto.DeviceName.decode(bytes);
strictAssert(
proto.ephemeralPublic,
'Missing ephemeralPublic field in DeviceName'
);
strictAssert(proto.syntheticIv, 'Missing syntheticIv field in DeviceName');
strictAssert(proto.ciphertext, 'Missing ciphertext field in DeviceName');
const name = decryptDeviceName(
{
ephemeralPublic: proto.ephemeralPublic,
syntheticIv: proto.syntheticIv,
ciphertext: proto.ciphertext,
},
identityKey.privKey
2021-07-02 19:21:24 +00:00
);
return name;
}
async maybeUpdateDeviceName(): Promise<void> {
2021-11-11 22:43:05 +00:00
const isNameEncrypted =
window.textsecure.storage.user.getDeviceNameEncrypted();
if (isNameEncrypted) {
return;
}
const { storage } = window.textsecure;
const deviceName = storage.user.getDeviceName();
2022-08-15 21:53:33 +00:00
const identityKeyPair = storage.protocol.getIdentityKeyPair(
storage.user.getCheckedAci()
);
strictAssert(
identityKeyPair !== undefined,
"Can't encrypt device name without identity key pair"
);
2021-09-24 00:49:05 +00:00
const base64 = this.encryptDeviceName(deviceName || '', identityKeyPair);
if (base64) {
await this.server.updateDeviceName(base64);
}
}
async deviceNameIsEncrypted(): Promise<void> {
await window.textsecure.storage.user.setDeviceNameEncrypted();
}
async registerSingleDevice(
number: string,
2023-08-29 00:41:32 +00:00
verificationCode: string,
sessionId: string
): Promise<void> {
await this.queueTask(async () => {
2022-03-01 23:01:21 +00:00
const aciKeyPair = generateKeyPair();
const pniKeyPair = generateKeyPair();
const profileKey = getRandomBytes(PROFILE_KEY_LENGTH);
2021-09-24 00:49:05 +00:00
const accessKey = deriveAccessKey(profileKey);
2023-10-30 20:31:39 +00:00
const masterKey = getRandomBytes(MASTER_KEY_LENGTH);
const registrationBaton = this.server.startRegistration();
try {
await this.createAccount({
2023-08-29 00:41:32 +00:00
type: AccountType.Primary,
number,
verificationCode,
2023-08-29 00:41:32 +00:00
sessionId,
2022-03-01 23:01:21 +00:00
aciKeyPair,
pniKeyPair,
profileKey,
accessKey,
2023-10-30 20:31:39 +00:00
masterKey,
2023-08-29 00:41:32 +00:00
readReceipts: true,
});
} finally {
this.server.finishRegistration(registrationBaton);
}
await this.registrationDone();
});
}
async registerSecondDevice(
setProvisioningUrl: (url: string) => void,
2024-03-15 14:20:33 +00:00
confirmNumber: (number?: string) => Promise<ConfirmNumberResultType>
): Promise<void> {
const provisioningCipher = new ProvisioningCipher();
2021-06-09 22:28:54 +00:00
const pubKey = await provisioningCipher.getPublicKey();
let envelopeCallbacks:
| {
resolve(data: Proto.ProvisionEnvelope): void;
reject(error: Error): void;
}
| undefined;
const envelopePromise = new Promise<Proto.ProvisionEnvelope>(
(resolve, reject) => {
envelopeCallbacks = { resolve, reject };
}
);
2021-06-09 22:28:54 +00:00
const wsr = await this.server.getProvisioningResource({
handleRequest(request: IncomingWebSocketRequest) {
if (
request.path === '/v1/address' &&
request.verb === 'PUT' &&
request.body
) {
const proto = Proto.ProvisioningUuid.decode(request.body);
const { uuid } = proto;
if (!uuid) {
throw new Error('registerSecondDevice: expected a UUID');
}
2023-11-02 19:42:31 +00:00
const url = linkDeviceRoute
.toAppUrl({
uuid,
pubKey: Bytes.toBase64(pubKey),
})
.toString();
2021-06-09 22:28:54 +00:00
window.SignalCI?.setProvisioningURL(url);
setProvisioningUrl(url);
request.respond(200, 'OK');
} else if (
request.path === '/v1/message' &&
request.verb === 'PUT' &&
request.body
) {
const envelope = Proto.ProvisionEnvelope.decode(request.body);
request.respond(200, 'OK');
wsr.close();
envelopeCallbacks?.resolve(envelope);
} else {
log.error('Unknown websocket message', request.path);
2021-06-09 22:28:54 +00:00
}
},
});
2021-06-09 22:28:54 +00:00
log.info('provisioning socket open');
2021-06-09 22:28:54 +00:00
wsr.addEventListener('close', ({ code, reason }) => {
log.info(`provisioning socket closed. Code: ${code} Reason: ${reason}`);
2021-06-09 22:28:54 +00:00
// Note: if we have resolved the envelope already - this has no effect
envelopeCallbacks?.reject(new Error('websocket closed'));
});
const envelope = await envelopePromise;
const provisionMessage = await provisioningCipher.decrypt(envelope);
await this.queueTask(async () => {
2024-03-15 14:20:33 +00:00
const { deviceName, backupFile } = await confirmNumber(
provisionMessage.number
);
if (typeof deviceName !== 'string' || deviceName.length === 0) {
throw new Error(
'AccountManager.registerSecondDevice: Invalid device name'
);
}
if (
!provisionMessage.number ||
!provisionMessage.provisioningCode ||
2023-08-29 00:41:32 +00:00
!provisionMessage.aciKeyPair ||
!provisionMessage.pniKeyPair ||
!provisionMessage.profileKey ||
!provisionMessage.aci ||
2023-09-27 23:14:55 +00:00
!isUntaggedPniString(provisionMessage.untaggedPni)
) {
throw new Error(
'AccountManager.registerSecondDevice: Provision message was missing key data'
);
}
2023-08-29 00:41:32 +00:00
const ourAci = normalizeAci(provisionMessage.aci, 'provisionMessage.aci');
const ourPni = normalizePni(
2023-09-27 23:14:55 +00:00
toTaggedPni(provisionMessage.untaggedPni),
2023-08-29 00:41:32 +00:00
'provisionMessage.pni'
);
2023-08-29 00:41:32 +00:00
const registrationBaton = this.server.startRegistration();
try {
await this.createAccount({
2023-08-29 00:41:32 +00:00
type: AccountType.Linked,
number: provisionMessage.number,
verificationCode: provisionMessage.provisioningCode,
2022-03-01 23:01:21 +00:00
aciKeyPair: provisionMessage.aciKeyPair,
pniKeyPair: provisionMessage.pniKeyPair,
profileKey: provisionMessage.profileKey,
deviceName,
2024-03-15 14:20:33 +00:00
backupFile,
userAgent: provisionMessage.userAgent,
2023-08-29 00:41:32 +00:00
ourAci,
ourPni,
readReceipts: Boolean(provisionMessage.readReceipts),
2023-10-30 20:31:39 +00:00
masterKey: provisionMessage.masterKey,
});
} finally {
this.server.finishRegistration(registrationBaton);
}
await this.registrationDone();
2021-06-09 22:28:54 +00:00
});
}
private getIdentityKeyOrThrow(ourServiceId: ServiceIdString): KeyPairType {
const { storage } = window.textsecure;
const store = storage.protocol;
let identityKey: KeyPairType | undefined;
try {
identityKey = store.getIdentityKeyPair(ourServiceId);
} catch (error) {
const errorText = Errors.toLogFormat(error);
throw new Error(
`getIdentityKeyOrThrow: Failed to fetch identity key - ${errorText}`
);
}
if (!identityKey) {
throw new Error('getIdentityKeyOrThrow: Missing identity key');
}
return identityKey;
}
private async generateNewPreKeys(
serviceIdKind: ServiceIdKind,
2023-08-29 00:41:32 +00:00
count = PRE_KEY_GEN_BATCH_SIZE
): Promise<Array<UploadPreKeyType>> {
2023-08-29 00:41:32 +00:00
const ourServiceId =
window.textsecure.storage.user.getCheckedServiceId(serviceIdKind);
const logId = `AccountManager.generateNewPreKeys(${serviceIdKind})`;
const { storage } = window.textsecure;
const store = storage.protocol;
const startId = getNextKeyId(serviceIdKind, PRE_KEY_ID_KEY);
log.info(`${logId}: Generating ${count} new keys starting at ${startId}`);
if (typeof startId !== 'number') {
throw new Error(
`${logId}: Invalid ${PRE_KEY_ID_KEY[serviceIdKind]} in storage`
);
}
const toSave: Array<CompatPreKeyType> = [];
for (let keyId = startId; keyId < startId + count; keyId += 1) {
toSave.push(generatePreKey(keyId));
}
await Promise.all([
store.storePreKeys(ourServiceId, toSave),
storage.put(PRE_KEY_ID_KEY[serviceIdKind], startId + count),
]);
return toSave.map(key => ({
keyId: key.keyId,
publicKey: key.keyPair.pubKey,
}));
}
private async generateNewKyberPreKeys(
serviceIdKind: ServiceIdKind,
2023-08-29 00:41:32 +00:00
count = PRE_KEY_GEN_BATCH_SIZE
): Promise<Array<UploadKyberPreKeyType>> {
const logId = `AccountManager.generateNewKyberPreKeys(${serviceIdKind})`;
const { storage } = window.textsecure;
const store = storage.protocol;
const startId = getNextKeyId(serviceIdKind, KYBER_KEY_ID_KEY);
log.info(`${logId}: Generating ${count} new keys starting at ${startId}`);
if (typeof startId !== 'number') {
throw new Error(
`${logId}: Invalid ${KYBER_KEY_ID_KEY[serviceIdKind]} in storage`
);
}
2023-08-29 00:41:32 +00:00
const ourServiceId = storage.user.getCheckedServiceId(serviceIdKind);
const identityKey = this.getIdentityKeyOrThrow(ourServiceId);
const toSave: Array<Omit<KyberPreKeyType, 'id'>> = [];
const toUpload: Array<UploadKyberPreKeyType> = [];
const now = Date.now();
for (let keyId = startId; keyId < startId + count; keyId += 1) {
const record = generateKyberPreKey(identityKey, keyId);
toSave.push({
createdAt: now,
data: record.serialize(),
isConfirmed: false,
isLastResort: false,
keyId,
2023-08-16 20:54:39 +00:00
ourServiceId,
});
toUpload.push({
keyId,
publicKey: record.publicKey().serialize(),
signature: record.signature(),
});
}
await Promise.all([
store.storeKyberPreKeys(ourServiceId, toSave),
storage.put(KYBER_KEY_ID_KEY[serviceIdKind], startId + count),
]);
return toUpload;
}
2024-02-16 20:39:58 +00:00
async maybeUpdateKeys(
serviceIdKind: ServiceIdKind,
forceUpdate = false
): Promise<void> {
const logId = `maybeUpdateKeys(${serviceIdKind})`;
await this.queueTask(async () => {
const { storage } = window.textsecure;
let identityKey: KeyPairType;
try {
const ourServiceId = storage.user.getCheckedServiceId(serviceIdKind);
identityKey = this.getIdentityKeyOrThrow(ourServiceId);
} catch (error) {
if (serviceIdKind === ServiceIdKind.PNI) {
log.info(
`${logId}: Not enough information to update PNI keys`,
Errors.toLogFormat(error)
);
return;
}
throw error;
}
const { count: preKeyCount, pqCount: kyberPreKeyCount } =
await this.server.getMyKeyCounts(serviceIdKind);
let preKeys: Array<UploadPreKeyType> | undefined;
// We want to generate new keys both if there are too few keys, and also if we
// have too many on the server (unlikely, but has happened due to bugs), since
// uploading new keys _should_ replace all existing ones on the server
if (
preKeyCount < PRE_KEY_MINIMUM ||
preKeyCount > PRE_KEY_MAX_COUNT ||
forceUpdate
) {
log.info(
`${logId}: Server prekey count is ${preKeyCount}, generating a new set`
);
2023-08-29 00:41:32 +00:00
preKeys = await this.generateNewPreKeys(serviceIdKind);
}
let pqPreKeys: Array<UploadKyberPreKeyType> | undefined;
if (
kyberPreKeyCount < PRE_KEY_MINIMUM ||
preKeyCount > PRE_KEY_MAX_COUNT ||
forceUpdate
) {
log.info(
`${logId}: Server kyber prekey count is ${kyberPreKeyCount}, generating a new set`
);
2023-08-29 00:41:32 +00:00
pqPreKeys = await this.generateNewKyberPreKeys(serviceIdKind);
}
const pqLastResortPreKey = await this.maybeUpdateLastResortKyberKey(
2024-02-16 20:39:58 +00:00
serviceIdKind,
forceUpdate
);
const signedPreKey = await this.maybeUpdateSignedPreKey(
serviceIdKind,
forceUpdate
);
if (
!preKeys?.length &&
!signedPreKey &&
!pqLastResortPreKey &&
!pqPreKeys?.length
) {
log.info(`${logId}: No new keys are needed; returning early`);
2021-12-09 19:45:21 +00:00
return;
}
const keySummary: Array<string> = [];
if (preKeys?.length) {
2024-02-16 20:39:58 +00:00
keySummary.push(`${preKeys.length} prekeys`);
}
if (signedPreKey) {
keySummary.push('a signed prekey');
}
if (pqLastResortPreKey) {
keySummary.push('a last-resort kyber prekey');
}
if (pqPreKeys?.length) {
2024-02-16 20:39:58 +00:00
keySummary.push(`${pqPreKeys.length} kyber prekeys`);
2021-12-09 19:45:21 +00:00
}
log.info(`${logId}: Uploading with ${keySummary.join(', ')}`);
const toUpload = {
identityKey: identityKey.pubKey,
preKeys,
pqPreKeys,
pqLastResortPreKey,
signedPreKey,
};
2021-12-09 19:45:21 +00:00
await this.server.registerKeys(toUpload, serviceIdKind);
await this._confirmKeys(toUpload, serviceIdKind);
const { count: updatedPreKeyCount, pqCount: updatedKyberPreKeyCount } =
await this.server.getMyKeyCounts(serviceIdKind);
2021-12-09 19:45:21 +00:00
log.info(
`${logId}: Successfully updated; ` +
`server prekey count: ${updatedPreKeyCount}, ` +
`server kyber prekey count: ${updatedKyberPreKeyCount}`
2021-12-09 19:45:21 +00:00
);
await this._cleanSignedPreKeys(serviceIdKind);
await this._cleanLastResortKeys(serviceIdKind);
await this._cleanPreKeys(serviceIdKind);
await this._cleanKyberPreKeys(serviceIdKind);
});
}
2021-12-09 19:45:21 +00:00
areKeysOutOfDate(serviceIdKind: ServiceIdKind): boolean {
const signedPreKeyTime = window.storage.get(
SIGNED_PRE_KEY_UPDATE_TIME_KEY[serviceIdKind],
0
);
const lastResortKeyTime = window.storage.get(
LAST_RESORT_KEY_UPDATE_TIME_KEY[serviceIdKind],
0
);
2021-12-09 19:45:21 +00:00
if (isOlderThan(signedPreKeyTime, KEY_TOO_OLD_THRESHOLD)) {
return true;
}
if (isOlderThan(lastResortKeyTime, KEY_TOO_OLD_THRESHOLD)) {
return true;
}
2021-12-09 19:45:21 +00:00
return false;
}
2021-12-09 19:45:21 +00:00
2023-08-29 00:41:32 +00:00
private async generateSignedPreKey(
serviceIdKind: ServiceIdKind,
identityKey: KeyPairType
): Promise<CompatSignedPreKeyType> {
const logId = `AccountManager.generateSignedPreKey(${serviceIdKind})`;
2021-12-09 19:45:21 +00:00
const signedKeyId = getNextKeyId(serviceIdKind, SIGNED_PRE_KEY_ID_KEY);
if (typeof signedKeyId !== 'number') {
throw new Error(
`${logId}: Invalid ${SIGNED_PRE_KEY_ID_KEY[serviceIdKind]} in storage`
);
}
2021-12-09 19:45:21 +00:00
2023-08-29 00:41:32 +00:00
const key = await generateSignedPreKey(identityKey, signedKeyId);
log.info(`${logId}: Saving new signed prekey`, key.keyId);
await window.textsecure.storage.put(
SIGNED_PRE_KEY_ID_KEY[serviceIdKind],
signedKeyId + 1
);
return key;
}
private async maybeUpdateSignedPreKey(
2024-02-16 20:39:58 +00:00
serviceIdKind: ServiceIdKind,
forceUpdate = false
2023-08-29 00:41:32 +00:00
): Promise<UploadSignedPreKeyType | undefined> {
const ourServiceId =
window.textsecure.storage.user.getCheckedServiceId(serviceIdKind);
const identityKey = this.getIdentityKeyOrThrow(ourServiceId);
const logId = `AccountManager.maybeUpdateSignedPreKey(${serviceIdKind}, ${ourServiceId})`;
const store = window.textsecure.storage.protocol;
const keys = await store.loadSignedPreKeys(ourServiceId);
const sortedKeys = orderBy(keys, ['created_at'], ['desc']);
const confirmedKeys = sortedKeys.filter(key => key.confirmed);
const mostRecent = confirmedKeys[0];
const lastUpdate = mostRecent?.created_at;
2024-02-16 20:39:58 +00:00
if (
!forceUpdate &&
isMoreRecentThan(lastUpdate || 0, SIGNED_PRE_KEY_ROTATION_AGE)
) {
log.warn(
`${logId}: ${confirmedKeys.length} confirmed keys, ` +
`most recent was created ${lastUpdate}. No need to update.`
);
const existing = window.storage.get(
SIGNED_PRE_KEY_UPDATE_TIME_KEY[serviceIdKind]
);
if (lastUpdate && !existing) {
log.warn(`${logId}: Updating last update time to ${lastUpdate}`);
await window.storage.put(
SIGNED_PRE_KEY_UPDATE_TIME_KEY[serviceIdKind],
lastUpdate
);
2021-12-09 19:45:21 +00:00
}
return;
}
2023-08-29 00:41:32 +00:00
const key = await this.generateSignedPreKey(serviceIdKind, identityKey);
log.info(`${logId}: Saving new signed prekey`, key.keyId);
2023-08-29 00:41:32 +00:00
await store.storeSignedPreKey(ourServiceId, key.keyId, key.keyPair);
2023-08-29 00:41:32 +00:00
return signedPreKeyToUploadSignedPreKey(key);
}
2023-08-29 00:41:32 +00:00
private async generateLastResortKyberKey(
serviceIdKind: ServiceIdKind,
identityKey: KeyPairType
): Promise<KyberPreKeyRecord> {
const logId = `generateLastRestortKyberKey(${serviceIdKind})`;
const kyberKeyId = getNextKeyId(serviceIdKind, KYBER_KEY_ID_KEY);
if (typeof kyberKeyId !== 'number') {
throw new Error(
`${logId}: Invalid ${KYBER_KEY_ID_KEY[serviceIdKind]} in storage`
);
}
2023-08-29 00:41:32 +00:00
const keyId = kyberKeyId;
const record = await generateKyberPreKey(identityKey, keyId);
log.info(`${logId}: Saving new last resort prekey`, keyId);
await window.textsecure.storage.put(
KYBER_KEY_ID_KEY[serviceIdKind],
kyberKeyId + 1
);
return record;
}
private async maybeUpdateLastResortKyberKey(
2024-02-16 20:39:58 +00:00
serviceIdKind: ServiceIdKind,
forceUpdate = false
2023-08-29 00:41:32 +00:00
): Promise<UploadSignedPreKeyType | undefined> {
const ourServiceId =
window.textsecure.storage.user.getCheckedServiceId(serviceIdKind);
const identityKey = this.getIdentityKeyOrThrow(ourServiceId);
const logId = `maybeUpdateLastResortKyberKey(${serviceIdKind}, ${ourServiceId})`;
const store = window.textsecure.storage.protocol;
const keys = store.loadKyberPreKeys(ourServiceId, { isLastResort: true });
const sortedKeys = orderBy(keys, ['createdAt'], ['desc']);
const confirmedKeys = sortedKeys.filter(key => key.isConfirmed);
const mostRecent = confirmedKeys[0];
const lastUpdate = mostRecent?.createdAt;
2024-02-16 20:39:58 +00:00
if (
!forceUpdate &&
isMoreRecentThan(lastUpdate || 0, LAST_RESORT_KEY_ROTATION_AGE)
) {
log.warn(
`${logId}: ${confirmedKeys.length} confirmed keys, ` +
`most recent was created ${lastUpdate}. No need to update.`
);
const existing = window.storage.get(
LAST_RESORT_KEY_UPDATE_TIME_KEY[serviceIdKind]
);
if (lastUpdate && !existing) {
log.warn(`${logId}: Updating last update time to ${lastUpdate}`);
await window.storage.put(
LAST_RESORT_KEY_UPDATE_TIME_KEY[serviceIdKind],
lastUpdate
);
}
return;
}
2023-08-29 00:41:32 +00:00
const record = await this.generateLastResortKyberKey(
serviceIdKind,
identityKey
);
log.info(`${logId}: Saving new last resort prekey`, record.id());
const key = kyberPreKeyToStoredSignedPreKey(record, ourServiceId);
2023-08-29 00:41:32 +00:00
await store.storeKyberPreKeys(ourServiceId, [key]);
2023-08-29 00:41:32 +00:00
return kyberPreKeyToUploadSignedPreKey(record);
}
// Exposed only for tests
async _cleanSignedPreKeys(serviceIdKind: ServiceIdKind): Promise<void> {
const ourServiceId =
window.textsecure.storage.user.getCheckedServiceId(serviceIdKind);
const store = window.textsecure.storage.protocol;
const logId = `AccountManager.cleanSignedPreKeys(${serviceIdKind})`;
const allKeys = store.loadSignedPreKeys(ourServiceId);
const sortedKeys = orderBy(allKeys, ['created_at'], ['desc']);
const confirmed = sortedKeys.filter(key => key.confirmed);
const unconfirmed = sortedKeys.filter(key => !key.confirmed);
const recent = sortedKeys[0] ? sortedKeys[0].keyId : 'none';
const recentConfirmed = confirmed[0] ? confirmed[0].keyId : 'none';
const recentUnconfirmed = unconfirmed[0] ? unconfirmed[0].keyId : 'none';
log.info(`${logId}: Most recent signed key: ${recent}`);
log.info(`${logId}: Most recent confirmed signed key: ${recentConfirmed}`);
log.info(
`${logId}: Most recent unconfirmed signed key: ${recentUnconfirmed}`
);
log.info(
`${logId}: Total signed key count:`,
sortedKeys.length,
'-',
confirmed.length,
'confirmed'
);
// Keep SIGNED_PRE_KEY_MINIMUM keys, drop if older than SIGNED_PRE_KEY_ARCHIVE_AGE
const toDelete: Array<number> = [];
sortedKeys.forEach((key, index) => {
if (index < SIGNED_PRE_KEY_MINIMUM) {
return;
}
const createdAt = key.created_at || 0;
if (isOlderThan(createdAt, SIGNED_PRE_KEY_ARCHIVE_AGE)) {
const timestamp = new Date(createdAt).toJSON();
const confirmedText = key.confirmed ? ' (confirmed)' : '';
log.info(
`${logId}: Removing signed prekey: ${key.keyId} with ` +
`timestamp ${timestamp}${confirmedText}`
);
toDelete.push(key.keyId);
}
});
if (toDelete.length > 0) {
log.info(`${logId}: Removing ${toDelete.length} signed prekeys`);
await store.removeSignedPreKeys(ourServiceId, toDelete);
}
}
// Exposed only for tests
async _cleanLastResortKeys(serviceIdKind: ServiceIdKind): Promise<void> {
const ourServiceId =
window.textsecure.storage.user.getCheckedServiceId(serviceIdKind);
const store = window.textsecure.storage.protocol;
const logId = `AccountManager.cleanLastResortKeys(${serviceIdKind})`;
const allKeys = store.loadKyberPreKeys(ourServiceId, {
isLastResort: true,
});
const sortedKeys = orderBy(allKeys, ['createdAt'], ['desc']);
const confirmed = sortedKeys.filter(key => key.isConfirmed);
const unconfirmed = sortedKeys.filter(key => !key.isConfirmed);
const recent = sortedKeys[0] ? sortedKeys[0].keyId : 'none';
const recentConfirmed = confirmed[0] ? confirmed[0].keyId : 'none';
const recentUnconfirmed = unconfirmed[0] ? unconfirmed[0].keyId : 'none';
log.info(`${logId}: Most recent last resort key: ${recent}`);
log.info(
`${logId}: Most recent confirmed last resort key: ${recentConfirmed}`
);
log.info(
`${logId}: Most recent unconfirmed last resort key: ${recentUnconfirmed}`
);
log.info(
`${logId}: Total last resort key count:`,
sortedKeys.length,
'-',
confirmed.length,
'confirmed'
);
// Keep LAST_RESORT_KEY_MINIMUM keys, drop if older than LAST_RESORT_KEY_ARCHIVE_AGE
const toDelete: Array<number> = [];
sortedKeys.forEach((key, index) => {
if (index < LAST_RESORT_KEY_MINIMUM) {
return;
}
const createdAt = key.createdAt || 0;
if (isOlderThan(createdAt, LAST_RESORT_KEY_ARCHIVE_AGE)) {
const timestamp = new Date(createdAt).toJSON();
const confirmedText = key.isConfirmed ? ' (confirmed)' : '';
log.info(
`${logId}: Removing last resort key: ${key.keyId} with ` +
`timestamp ${timestamp}${confirmedText}`
);
toDelete.push(key.keyId);
}
});
if (toDelete.length > 0) {
log.info(`${logId}: Removing ${toDelete.length} last resort keys`);
await store.removeKyberPreKeys(ourServiceId, toDelete);
}
}
async _cleanPreKeys(serviceIdKind: ServiceIdKind): Promise<void> {
const store = window.textsecure.storage.protocol;
const logId = `AccountManager.cleanPreKeys(${serviceIdKind})`;
2023-08-29 00:41:32 +00:00
const ourServiceId =
window.textsecure.storage.user.getCheckedServiceId(serviceIdKind);
const preKeys = store.loadPreKeys(ourServiceId);
const toDelete: Array<number> = [];
const sortedKeys = orderBy(preKeys, ['createdAt'], ['desc']);
sortedKeys.forEach((key, index) => {
if (index < PRE_KEY_MAX_COUNT) {
return;
}
const createdAt = key.createdAt || 0;
if (isOlderThan(createdAt, PRE_KEY_ARCHIVE_AGE)) {
toDelete.push(key.keyId);
}
});
log.info(`${logId}: ${sortedKeys.length} total prekeys`);
if (toDelete.length > 0) {
log.info(`${logId}: Removing ${toDelete.length} obsolete prekeys`);
await store.removePreKeys(ourServiceId, toDelete);
}
}
async _cleanKyberPreKeys(serviceIdKind: ServiceIdKind): Promise<void> {
const store = window.textsecure.storage.protocol;
const logId = `AccountManager.cleanKyberPreKeys(${serviceIdKind})`;
2023-08-29 00:41:32 +00:00
const ourServiceId =
window.textsecure.storage.user.getCheckedServiceId(serviceIdKind);
const preKeys = store.loadKyberPreKeys(ourServiceId, {
isLastResort: false,
});
const toDelete: Array<number> = [];
const sortedKeys = orderBy(preKeys, ['createdAt'], ['desc']);
sortedKeys.forEach((key, index) => {
if (index < PRE_KEY_MAX_COUNT) {
return;
}
const createdAt = key.createdAt || 0;
if (isOlderThan(createdAt, PRE_KEY_ARCHIVE_AGE)) {
toDelete.push(key.keyId);
}
});
log.info(`${logId}: ${sortedKeys.length} total prekeys`);
if (toDelete.length > 0) {
log.info(`${logId}: Removing ${toDelete.length} kyber keys`);
await store.removeKyberPreKeys(ourServiceId, toDelete);
}
}
2023-08-29 00:41:32 +00:00
private async createAccount(
options: CreateAccountOptionsType
): Promise<void> {
const {
number,
verificationCode,
aciKeyPair,
pniKeyPair,
profileKey,
2023-10-30 20:31:39 +00:00
masterKey,
2023-08-29 00:41:32 +00:00
readReceipts,
userAgent,
2024-03-15 14:20:33 +00:00
backupFile,
2023-08-29 00:41:32 +00:00
} = options;
const { storage } = window.textsecure;
2021-09-24 00:49:05 +00:00
let password = Bytes.toBase64(getRandomBytes(16));
password = password.substring(0, password.length - 2);
const registrationId = generateRegistrationId();
const pniRegistrationId = generateRegistrationId();
2022-07-18 22:32:00 +00:00
const previousNumber = storage.user.getNumber();
const previousACI = storage.user.getAci();
const previousPNI = storage.user.getPni();
log.info(
`createAccount: Number is ${number}, password has length: ${
password ? password.length : 'none'
}`
);
2023-08-29 00:41:32 +00:00
let uuidChanged: boolean;
if (options.type === AccountType.Primary) {
uuidChanged = true;
} else if (options.type === AccountType.Linked) {
uuidChanged = previousACI != null && previousACI !== options.ourAci;
} else {
throw missingCaseError(options);
}
// We only consider the number changed if we didn't have a UUID before
const numberChanged =
2022-07-18 22:32:00 +00:00
!previousACI && previousNumber && previousNumber !== number;
2024-03-15 14:20:33 +00:00
if (uuidChanged || numberChanged || backupFile !== undefined) {
if (uuidChanged) {
log.warn(
2021-09-27 17:31:34 +00:00
'createAccount: New uuid is different from old uuid; deleting all previous data'
);
}
if (numberChanged) {
log.warn(
2021-09-27 17:31:34 +00:00
'createAccount: New number is different from old number; deleting all previous data'
);
}
2024-03-15 14:20:33 +00:00
if (backupFile !== undefined) {
log.warn(
'createAccount: Restoring from backup; deleting all previous data'
);
}
try {
await storage.protocol.removeAllData();
2021-09-27 17:31:34 +00:00
log.info('createAccount: Successfully deleted previous data');
} catch (error) {
log.error(
'Something went wrong deleting data from previous number',
Errors.toLogFormat(error)
);
}
2021-09-27 17:31:34 +00:00
} else {
log.info('createAccount: Erasing configuration');
await storage.protocol.removeAllConfiguration();
}
2021-09-27 17:31:34 +00:00
await senderCertificateService.clear();
2022-07-18 22:32:00 +00:00
const previousUuids = [previousACI, previousPNI].filter(isNotNil);
if (previousUuids.length > 0) {
await Promise.all([
storage.put(
'identityKeyMap',
2022-07-18 22:32:00 +00:00
omit(storage.get('identityKeyMap') || {}, previousUuids)
),
storage.put(
'registrationIdMap',
2022-07-18 22:32:00 +00:00
omit(storage.get('registrationIdMap') || {}, previousUuids)
),
]);
}
2023-08-29 00:41:32 +00:00
let ourAci: AciString;
let ourPni: PniString;
let deviceId: number;
const aciPqLastResortPreKey = await this.generateLastResortKyberKey(
ServiceIdKind.ACI,
aciKeyPair
);
const pniPqLastResortPreKey = await this.generateLastResortKyberKey(
ServiceIdKind.PNI,
pniKeyPair
);
const aciSignedPreKey = await this.generateSignedPreKey(
ServiceIdKind.ACI,
aciKeyPair
);
const pniSignedPreKey = await this.generateSignedPreKey(
ServiceIdKind.PNI,
pniKeyPair
);
const keysToUpload = {
aciPqLastResortPreKey: kyberPreKeyToUploadSignedPreKey(
aciPqLastResortPreKey
),
aciSignedPreKey: signedPreKeyToUploadSignedPreKey(aciSignedPreKey),
pniPqLastResortPreKey: kyberPreKeyToUploadSignedPreKey(
pniPqLastResortPreKey
),
pniSignedPreKey: signedPreKeyToUploadSignedPreKey(pniSignedPreKey),
};
if (options.type === AccountType.Primary) {
const response = await this.server.createAccount({
number,
code: verificationCode,
newPassword: password,
registrationId,
pniRegistrationId,
accessKey: options.accessKey,
sessionId: options.sessionId,
aciPublicKey: aciKeyPair.pubKey,
pniPublicKey: pniKeyPair.pubKey,
...keysToUpload,
});
ourAci = normalizeAci(response.uuid, 'createAccount');
strictAssert(
isUntaggedPniString(response.pni),
'Response pni must be untagged'
);
ourPni = toTaggedPni(response.pni);
deviceId = 1;
} else if (options.type === AccountType.Linked) {
const encryptedDeviceName = this.encryptDeviceName(
options.deviceName,
aciKeyPair
);
await this.deviceNameIsEncrypted();
const response = await this.server.linkDevice({
number,
verificationCode,
encryptedDeviceName,
newPassword: password,
registrationId,
pniRegistrationId,
...keysToUpload,
});
ourAci = normalizeAci(response.uuid, 'createAccount');
strictAssert(
isUntaggedPniString(response.pni),
'Response pni must be untagged'
);
ourPni = toTaggedPni(response.pni);
deviceId = response.deviceId ?? 1;
strictAssert(
ourAci === options.ourAci,
'Server response has unexpected ACI'
);
strictAssert(
ourPni === options.ourPni,
'Server response has unexpected PNI'
);
} else {
throw missingCaseError(options);
}
// `setCredentials` needs to be called
// before `saveIdentifyWithAttributes` since `saveIdentityWithAttributes`
2023-01-01 11:41:40 +00:00
// indirectly calls `ConversationController.getConversationId()` which
// initializes the conversation for the given number (our number) which
// calls out to the user storage API to get the stored UUID and number
// information.
await storage.user.setCredentials({
aci: ourAci,
pni: ourPni,
number,
2023-08-29 00:41:32 +00:00
deviceId,
deviceName: options.deviceName,
password,
});
// This needs to be done very early, because it changes how things are saved in the
// database. Your identity, for example, in the saveIdentityWithAttributes call
// below.
2024-03-15 14:20:33 +00:00
window.ConversationController.maybeMergeContacts({
aci: ourAci,
pni: ourPni,
e164: number,
reason: 'createAccount',
});
const identityAttrs = {
firstUse: true,
timestamp: Date.now(),
verified: storage.protocol.VerifiedStatus.VERIFIED,
nonblockingApproval: true,
};
// update our own identity key, which may have changed
// if we're relinking after a reinstall on the master device
await Promise.all([
storage.protocol.saveIdentityWithAttributes(ourAci, {
...identityAttrs,
2022-03-01 23:01:21 +00:00
publicKey: aciKeyPair.pubKey,
}),
2023-08-29 00:41:32 +00:00
storage.protocol.saveIdentityWithAttributes(ourPni, {
...identityAttrs,
publicKey: pniKeyPair.pubKey,
}),
]);
const identityKeyMap = {
...(storage.get('identityKeyMap') || {}),
[ourAci]: aciKeyPair,
2023-08-29 00:41:32 +00:00
[ourPni]: pniKeyPair,
};
const registrationIdMap = {
...(storage.get('registrationIdMap') || {}),
[ourAci]: registrationId,
[ourPni]: pniRegistrationId,
};
await storage.put('identityKeyMap', identityKeyMap);
await storage.put('registrationIdMap', registrationIdMap);
2023-08-29 00:41:32 +00:00
await ourProfileKeyService.set(profileKey);
if (userAgent) {
await storage.put('userAgent', userAgent);
}
2023-10-30 20:31:39 +00:00
if (masterKey) {
await storage.put('masterKey', Bytes.toBase64(masterKey));
2024-02-29 01:48:11 +00:00
await storage.put(
'storageKey',
Bytes.toBase64(deriveStorageServiceKey(masterKey))
);
2023-10-30 20:31:39 +00:00
}
await storage.put('read-receipt-setting', Boolean(readReceipts));
const regionCode = getRegionCodeForNumber(number);
await storage.put('regionCode', regionCode);
await storage.protocol.hydrateCaches();
2023-08-29 00:41:32 +00:00
const store = storage.protocol;
await store.storeSignedPreKey(
ourAci,
aciSignedPreKey.keyId,
aciSignedPreKey.keyPair
);
await store.storeSignedPreKey(
ourPni,
pniSignedPreKey.keyId,
pniSignedPreKey.keyPair
);
await store.storeKyberPreKeys(ourAci, [
kyberPreKeyToStoredSignedPreKey(aciPqLastResortPreKey, ourAci),
]);
await store.storeKyberPreKeys(ourPni, [
kyberPreKeyToStoredSignedPreKey(pniPqLastResortPreKey, ourPni),
]);
await this._confirmKeys(
{
pqLastResortPreKey: keysToUpload.aciPqLastResortPreKey,
signedPreKey: keysToUpload.aciSignedPreKey,
},
ServiceIdKind.ACI
);
await this._confirmKeys(
{
pqLastResortPreKey: keysToUpload.pniPqLastResortPreKey,
signedPreKey: keysToUpload.pniSignedPreKey,
},
ServiceIdKind.PNI
);
const uploadKeys = async (kind: ServiceIdKind) => {
try {
const keys = await this._generateSingleUseKeys(kind);
await this.server.registerKeys(keys, kind);
} catch (error) {
if (kind === ServiceIdKind.PNI) {
log.error(
'Failed to upload PNI prekeys. Moving on',
Errors.toLogFormat(error)
);
return;
}
throw error;
}
};
await Promise.all([
uploadKeys(ServiceIdKind.ACI),
uploadKeys(ServiceIdKind.PNI),
]);
2024-03-15 14:20:33 +00:00
if (backupFile !== undefined) {
await backupsService.importBackup(backupFile);
}
}
// Exposed only for testing
public async _confirmKeys(
2023-08-29 00:41:32 +00:00
{
signedPreKey,
pqLastResortPreKey,
}: Readonly<{
signedPreKey?: UploadSignedPreKeyType;
pqLastResortPreKey?: UploadSignedPreKeyType;
}>,
serviceIdKind: ServiceIdKind
): Promise<void> {
2023-08-29 00:41:32 +00:00
const ourServiceId =
window.textsecure.storage.user.getCheckedServiceId(serviceIdKind);
const logId = `AccountManager.confirmKeys(${serviceIdKind})`;
const { storage } = window.textsecure;
const store = storage.protocol;
const updatedAt = Date.now();
if (signedPreKey) {
log.info(`${logId}: confirming signed prekey key`, signedPreKey.keyId);
await store.confirmSignedPreKey(ourServiceId, signedPreKey.keyId);
await window.storage.put(
SIGNED_PRE_KEY_UPDATE_TIME_KEY[serviceIdKind],
updatedAt
);
} else {
log.info(`${logId}: signedPreKey was not uploaded, not confirming`);
}
if (pqLastResortPreKey) {
log.info(
`${logId}: confirming last resort key`,
pqLastResortPreKey.keyId
);
await store.confirmKyberPreKey(ourServiceId, pqLastResortPreKey.keyId);
await window.storage.put(
LAST_RESORT_KEY_UPDATE_TIME_KEY[serviceIdKind],
updatedAt
);
} else {
log.info(`${logId}: pqLastResortPreKey was not uploaded, not confirming`);
}
}
// Very similar to maybeUpdateKeys, but will always generate prekeys and doesn't upload
2023-08-29 00:41:32 +00:00
async _generateSingleUseKeys(
serviceIdKind: ServiceIdKind,
2023-08-29 00:41:32 +00:00
count = PRE_KEY_GEN_BATCH_SIZE
): Promise<UploadKeysType> {
2023-08-29 00:41:32 +00:00
const ourServiceId =
window.textsecure.storage.user.getCheckedServiceId(serviceIdKind);
const logId = `AccountManager.generateKeys(${serviceIdKind}, ${ourServiceId})`;
const preKeys = await this.generateNewPreKeys(serviceIdKind, count);
const pqPreKeys = await this.generateNewKyberPreKeys(serviceIdKind, count);
log.info(
`${logId}: Generated ` +
`${preKeys.length} pre keys, ` +
2023-08-29 00:41:32 +00:00
`${pqPreKeys.length} kyber pre keys`
);
// These are primarily for the summaries they log out
await this._cleanPreKeys(serviceIdKind);
await this._cleanKyberPreKeys(serviceIdKind);
return {
2023-08-29 00:41:32 +00:00
identityKey: this.getIdentityKeyOrThrow(ourServiceId).pubKey,
preKeys,
pqPreKeys,
};
}
private async registrationDone(): Promise<void> {
log.info('registration done');
this.dispatchEvent(new Event('registration'));
}
2022-07-18 22:32:00 +00:00
async setPni(
pni: PniString,
keyMaterial?: PniKeyMaterialType
): Promise<void> {
const logId = `AccountManager.setPni(${pni})`;
2022-07-18 22:32:00 +00:00
const { storage } = window.textsecure;
const oldPni = storage.user.getPni();
2022-07-28 16:35:29 +00:00
if (oldPni === pni && !keyMaterial) {
2022-07-18 22:32:00 +00:00
return;
}
log.info(`${logId}: updating from ${oldPni}`);
2022-07-28 16:35:29 +00:00
2022-07-18 22:32:00 +00:00
if (oldPni) {
await storage.protocol.removeOurOldPni(oldPni);
2023-10-30 23:25:55 +00:00
await window.ConversationController.clearShareMyPhoneNumber();
2022-07-18 22:32:00 +00:00
}
await storage.user.setPni(pni);
2022-07-28 16:35:29 +00:00
if (keyMaterial) {
await storage.protocol.updateOurPniKeyMaterial(pni, keyMaterial);
2022-07-28 16:35:29 +00:00
// Intentionally not awaiting since this is processed on encrypted queue
2024-02-16 20:39:58 +00:00
// of MessageReceiver. Note that `maybeUpdateKeys` runs on the queue so
// we don't have to wrap it with `queueTask`.
drop(
(async () => {
try {
await this.maybeUpdateKeys(ServiceIdKind.PNI, true);
} catch (error) {
log.error(
`${logId}: Failed to upload PNI prekeys. Moving on`,
Errors.toLogFormat(error)
);
}
})()
);
2022-07-28 16:35:29 +00:00
// PNI has changed and credentials are no longer valid
await storage.put('groupCredentials', []);
} else {
log.warn(`${logId}: no key material`);
2022-07-28 16:35:29 +00:00
}
2022-07-18 22:32:00 +00:00
}
}