1//! Endpoints for server-side key backups.
23pub mod add_backup_keys;
4pub mod add_backup_keys_for_room;
5pub mod add_backup_keys_for_session;
6pub mod create_backup_version;
7pub mod delete_backup_keys;
8pub mod delete_backup_keys_for_room;
9pub mod delete_backup_keys_for_session;
10pub mod delete_backup_version;
11pub mod get_backup_info;
12pub mod get_backup_keys;
13pub mod get_backup_keys_for_room;
14pub mod get_backup_keys_for_session;
15pub mod get_latest_backup_info;
16pub mod update_backup_version;
1718use std::collections::BTreeMap;
1920use js_int::UInt;
21use ruma_common::{
22 serde::{Base64, Raw},
23 CrossSigningOrDeviceSignatures,
24};
25use serde::{Deserialize, Serialize};
2627/// A wrapper around a mapping of session IDs to key data.
28#[derive(Clone, Debug, Serialize, Deserialize)]
29#[cfg_attr(not(ruma_unstable_exhaustive_types), non_exhaustive)]
30pub struct RoomKeyBackup {
31/// A map of session IDs to key data.
32pub sessions: BTreeMap<String, Raw<KeyBackupData>>,
33}
3435impl RoomKeyBackup {
36/// Creates a new `RoomKeyBackup` with the given sessions.
37pub fn new(sessions: BTreeMap<String, Raw<KeyBackupData>>) -> Self {
38Self { sessions }
39 }
40}
4142/// The algorithm used for storing backups.
43#[derive(Clone, Debug, Serialize, Deserialize)]
44#[serde(tag = "algorithm", content = "auth_data")]
45#[cfg_attr(not(ruma_unstable_exhaustive_types), non_exhaustive)]
46pub enum BackupAlgorithm {
47/// `m.megolm_backup.v1.curve25519-aes-sha2` backup algorithm.
48#[serde(rename = "m.megolm_backup.v1.curve25519-aes-sha2")]
49MegolmBackupV1Curve25519AesSha2 {
50/// The curve25519 public key used to encrypt the backups, encoded in unpadded base64.
51public_key: Base64,
5253/// Signatures of the auth_data as Signed JSON.
54signatures: CrossSigningOrDeviceSignatures,
55 },
56}
5758/// Information about the backup key.
59///
60/// To create an instance of this type, first create a [`KeyBackupDataInit`] and convert it via
61/// `KeyBackupData::from` / `.into()`.
62#[derive(Clone, Debug, Serialize, Deserialize)]
63#[cfg_attr(not(ruma_unstable_exhaustive_types), non_exhaustive)]
64pub struct KeyBackupData {
65/// The index of the first message in the session that the key can decrypt.
66pub first_message_index: UInt,
6768/// The number of times this key has been forwarded via key-sharing between devices.
69pub forwarded_count: UInt,
7071/// Whether the device backing up the key verified the device that the key is from.
72pub is_verified: bool,
7374/// Encrypted data about the session.
75pub session_data: EncryptedSessionData,
76}
7778/// Information about the backup key.
79///
80/// This struct will not be updated even if additional fields are added to [`KeyBackupData`] in a
81/// new (non-breaking) release of the Matrix specification.
82#[derive(Debug)]
83#[allow(clippy::exhaustive_structs)]
84pub struct KeyBackupDataInit {
85/// The index of the first message in the session that the key can decrypt.
86pub first_message_index: UInt,
8788/// The number of times this key has been forwarded via key-sharing between devices.
89pub forwarded_count: UInt,
9091/// Whether the device backing up the key verified the device that the key is from.
92pub is_verified: bool,
9394/// Encrypted data about the session.
95pub session_data: EncryptedSessionData,
96}
9798impl From<KeyBackupDataInit> for KeyBackupData {
99fn from(init: KeyBackupDataInit) -> Self {
100let KeyBackupDataInit { first_message_index, forwarded_count, is_verified, session_data } =
101 init;
102Self { first_message_index, forwarded_count, is_verified, session_data }
103 }
104}
105106/// The encrypted algorithm-dependent data for backups.
107///
108/// To create an instance of this type, first create an [`EncryptedSessionDataInit`] and convert it
109/// via `EncryptedSessionData::from` / `.into()`.
110#[derive(Clone, Debug, Serialize, Deserialize)]
111#[cfg_attr(not(ruma_unstable_exhaustive_types), non_exhaustive)]
112pub struct EncryptedSessionData {
113/// Unpadded base64-encoded public half of the ephemeral key.
114pub ephemeral: Base64,
115116/// Ciphertext, encrypted using AES-CBC-256 with PKCS#7 padding, encoded in base64.
117pub ciphertext: Base64,
118119/// First 8 bytes of MAC key, encoded in base64.
120pub mac: Base64,
121}
122123/// The encrypted algorithm-dependent data for backups.
124///
125/// This struct will not be updated even if additional fields are added to [`EncryptedSessionData`]
126/// in a new (non-breaking) release of the Matrix specification.
127#[derive(Debug)]
128#[allow(clippy::exhaustive_structs)]
129pub struct EncryptedSessionDataInit {
130/// Unpadded base64-encoded public half of the ephemeral key.
131pub ephemeral: Base64,
132133/// Ciphertext, encrypted using AES-CBC-256 with PKCS#7 padding, encoded in base64.
134pub ciphertext: Base64,
135136/// First 8 bytes of MAC key, encoded in base64.
137pub mac: Base64,
138}
139140impl From<EncryptedSessionDataInit> for EncryptedSessionData {
141fn from(init: EncryptedSessionDataInit) -> Self {
142let EncryptedSessionDataInit { ephemeral, ciphertext, mac } = init;
143Self { ephemeral, ciphertext, mac }
144 }
145}