|
| 1 | +# Copyright (c) 2025 Tulir Asokan |
| 2 | +# |
| 3 | +# This Source Code Form is subject to the terms of the Mozilla Public |
| 4 | +# License, v. 2.0. If a copy of the MPL was not distributed with this |
| 5 | +# file, You can obtain one at http://mozilla.org/MPL/2.0/. |
| 6 | +from ..types import ( |
| 7 | + JSON, |
| 8 | + CrossSigner, |
| 9 | + CrossSigningKeys, |
| 10 | + CrossSigningUsage, |
| 11 | + DeviceIdentity, |
| 12 | + EventType, |
| 13 | + KeyID, |
| 14 | + UserID, |
| 15 | +) |
| 16 | +from .cross_signing_key import CrossSigningPrivateKeys, CrossSigningPublicKeys, CrossSigningSeeds |
| 17 | +from .device_lists import DeviceListMachine |
| 18 | +from .signature import sign_olm |
| 19 | +from .ssss import Key as SSSSKey |
| 20 | + |
| 21 | + |
| 22 | +class CrossSigningMachine(DeviceListMachine): |
| 23 | + _cross_signing_public_keys: CrossSigningPublicKeys | None |
| 24 | + _cross_signing_public_keys_fetched: bool |
| 25 | + _cross_signing_private_keys: CrossSigningPrivateKeys | None |
| 26 | + |
| 27 | + async def verify_with_recovery_key(self, recovery_key: str) -> None: |
| 28 | + key_id, key_data = await self.ssss.get_default_key_data() |
| 29 | + ssss_key = key_data.verify_recovery_key(key_id, recovery_key) |
| 30 | + seeds = await self._fetch_cross_signing_keys_from_ssss(ssss_key) |
| 31 | + self._import_cross_signing_keys(seeds) |
| 32 | + await self.sign_own_device(self.own_identity) |
| 33 | + |
| 34 | + def _import_cross_signing_keys(self, seeds: CrossSigningSeeds) -> None: |
| 35 | + self._cross_signing_private_keys = seeds.to_keys() |
| 36 | + self._cross_signing_public_keys = self._cross_signing_private_keys.public_keys |
| 37 | + |
| 38 | + async def generate_recovery_key( |
| 39 | + self, passphrase: str | None = None, seeds: CrossSigningSeeds | None = None |
| 40 | + ) -> str: |
| 41 | + seeds = seeds or CrossSigningSeeds.generate() |
| 42 | + ssss_key = await self.ssss.generate_and_upload_key(passphrase) |
| 43 | + await self._upload_cross_signing_keys_to_ssss(ssss_key, seeds) |
| 44 | + await self._publish_cross_signing_keys(seeds.to_keys()) |
| 45 | + await self.ssss.set_default_key_id(ssss_key.id) |
| 46 | + await self.sign_own_device(self.own_identity) |
| 47 | + return ssss_key.recovery_key |
| 48 | + |
| 49 | + async def _fetch_cross_signing_keys_from_ssss(self, key: SSSSKey) -> CrossSigningSeeds: |
| 50 | + return CrossSigningSeeds( |
| 51 | + master_key=await self.ssss.get_decrypted_account_data( |
| 52 | + EventType.CROSS_SIGNING_MASTER, key |
| 53 | + ), |
| 54 | + user_signing_key=await self.ssss.get_decrypted_account_data( |
| 55 | + EventType.CROSS_SIGNING_USER_SIGNING, key |
| 56 | + ), |
| 57 | + self_signing_key=await self.ssss.get_decrypted_account_data( |
| 58 | + EventType.CROSS_SIGNING_SELF_SIGNING, key |
| 59 | + ), |
| 60 | + ) |
| 61 | + |
| 62 | + async def _upload_cross_signing_keys_to_ssss( |
| 63 | + self, key: SSSSKey, seeds: CrossSigningSeeds |
| 64 | + ) -> None: |
| 65 | + await self.ssss.set_encrypted_account_data( |
| 66 | + EventType.CROSS_SIGNING_MASTER, seeds.master_key, key |
| 67 | + ) |
| 68 | + await self.ssss.set_encrypted_account_data( |
| 69 | + EventType.CROSS_SIGNING_USER_SIGNING, seeds.user_signing_key, key |
| 70 | + ) |
| 71 | + await self.ssss.set_encrypted_account_data( |
| 72 | + EventType.CROSS_SIGNING_SELF_SIGNING, seeds.self_signing_key, key |
| 73 | + ) |
| 74 | + |
| 75 | + async def get_own_cross_signing_public_keys(self) -> CrossSigningPublicKeys | None: |
| 76 | + if self._cross_signing_public_keys or self._cross_signing_public_keys_fetched: |
| 77 | + return self._cross_signing_public_keys |
| 78 | + keys = await self.get_cross_signing_public_keys(self.client.mxid) |
| 79 | + self._cross_signing_public_keys_fetched = True |
| 80 | + if keys: |
| 81 | + self._cross_signing_public_keys = keys |
| 82 | + return keys |
| 83 | + |
| 84 | + async def get_cross_signing_public_keys( |
| 85 | + self, user_id: UserID |
| 86 | + ) -> CrossSigningPublicKeys | None: |
| 87 | + db_keys = await self.crypto_store.get_cross_signing_keys(user_id) |
| 88 | + if CrossSigningUsage.MASTER not in db_keys: |
| 89 | + await self._fetch_keys([user_id], include_untracked=True) |
| 90 | + db_keys = await self.crypto_store.get_cross_signing_keys(user_id) |
| 91 | + if CrossSigningUsage.MASTER not in db_keys: |
| 92 | + return None |
| 93 | + return CrossSigningPublicKeys( |
| 94 | + master_key=db_keys[CrossSigningUsage.MASTER].key, |
| 95 | + self_signing_key=( |
| 96 | + db_keys[CrossSigningUsage.SELF].key if CrossSigningUsage.SELF in db_keys else None |
| 97 | + ), |
| 98 | + user_signing_key=( |
| 99 | + db_keys[CrossSigningUsage.USER].key if CrossSigningUsage.USER in db_keys else None |
| 100 | + ), |
| 101 | + ) |
| 102 | + |
| 103 | + async def sign_own_device(self, device: DeviceIdentity) -> None: |
| 104 | + full_keys = await self._get_full_device_keys(device) |
| 105 | + ssk = self._cross_signing_private_keys.self_signing_key |
| 106 | + signature = sign_olm(full_keys, ssk) |
| 107 | + full_keys.signatures = {self.client.mxid: {KeyID.ed25519(ssk.public_key): signature}} |
| 108 | + await self.client.upload_one_signature(device.user_id, device.device_id, full_keys) |
| 109 | + await self.crypto_store.put_signature( |
| 110 | + CrossSigner(device.user_id, device.signing_key), |
| 111 | + CrossSigner(self.client.mxid, ssk.public_key), |
| 112 | + signature, |
| 113 | + ) |
| 114 | + |
| 115 | + async def _publish_cross_signing_keys( |
| 116 | + self, |
| 117 | + keys: CrossSigningPrivateKeys, |
| 118 | + auth: dict[str, JSON] | None = None, |
| 119 | + ) -> None: |
| 120 | + public = keys.public_keys |
| 121 | + master_key = CrossSigningKeys( |
| 122 | + user_id=self.client.mxid, |
| 123 | + usage=[CrossSigningUsage.MASTER], |
| 124 | + keys={KeyID.ed25519(public.master_key): public.master_key}, |
| 125 | + ) |
| 126 | + master_key.signatures = { |
| 127 | + self.client.mxid: { |
| 128 | + KeyID.ed25519(self.client.device_id): sign_olm(master_key, self.account), |
| 129 | + } |
| 130 | + } |
| 131 | + self_key = CrossSigningKeys( |
| 132 | + user_id=self.client.mxid, |
| 133 | + usage=[CrossSigningUsage.SELF], |
| 134 | + keys={KeyID.ed25519(public.self_signing_key): public.self_signing_key}, |
| 135 | + ) |
| 136 | + self_key.signatures = { |
| 137 | + self.client.mxid: { |
| 138 | + KeyID.ed25519(public.master_key): sign_olm(self_key, keys.master_key), |
| 139 | + } |
| 140 | + } |
| 141 | + user_key = CrossSigningKeys( |
| 142 | + user_id=self.client.mxid, |
| 143 | + usage=[CrossSigningUsage.USER], |
| 144 | + keys={KeyID.ed25519(public.user_signing_key): public.user_signing_key}, |
| 145 | + ) |
| 146 | + user_key.signatures = { |
| 147 | + self.client.mxid: { |
| 148 | + KeyID.ed25519(public.master_key): sign_olm(user_key, keys.master_key), |
| 149 | + } |
| 150 | + } |
| 151 | + await self.client.upload_cross_signing_keys( |
| 152 | + keys={ |
| 153 | + CrossSigningUsage.MASTER: master_key, |
| 154 | + CrossSigningUsage.SELF: self_key, |
| 155 | + CrossSigningUsage.USER: user_key, |
| 156 | + }, |
| 157 | + auth=auth, |
| 158 | + ) |
| 159 | + await self.crypto_store.put_cross_signing_key( |
| 160 | + self.client.mxid, CrossSigningUsage.MASTER, public.master_key |
| 161 | + ) |
| 162 | + await self.crypto_store.put_cross_signing_key( |
| 163 | + self.client.mxid, CrossSigningUsage.SELF, public.self_signing_key |
| 164 | + ) |
| 165 | + await self.crypto_store.put_cross_signing_key( |
| 166 | + self.client.mxid, CrossSigningUsage.USER, public.user_signing_key |
| 167 | + ) |
| 168 | + self._cross_signing_private_keys = keys |
| 169 | + self._cross_signing_public_keys = public |
0 commit comments