1use std::collections::BTreeMap;
6
7use serde::{Deserialize, Serialize};
8
9use crate::{
10 serde::{Base64, StringEnum},
11 CrossSigningOrDeviceSignatures, DeviceSignatures, EventEncryptionAlgorithm,
12 OwnedCrossSigningKeyId, OwnedDeviceId, OwnedDeviceKeyId, OwnedUserId, PrivOwnedStr,
13};
14
15#[derive(Clone, Debug, Deserialize, Serialize)]
17#[cfg_attr(not(ruma_unstable_exhaustive_types), non_exhaustive)]
18pub struct DeviceKeys {
19 pub user_id: OwnedUserId,
23
24 pub device_id: OwnedDeviceId,
28
29 pub algorithms: Vec<EventEncryptionAlgorithm>,
31
32 pub keys: BTreeMap<OwnedDeviceKeyId, String>,
34
35 pub signatures: CrossSigningOrDeviceSignatures,
37
38 #[serde(default, skip_serializing_if = "UnsignedDeviceInfo::is_empty")]
41 pub unsigned: UnsignedDeviceInfo,
42}
43
44impl DeviceKeys {
45 pub fn new(
48 user_id: OwnedUserId,
49 device_id: OwnedDeviceId,
50 algorithms: Vec<EventEncryptionAlgorithm>,
51 keys: BTreeMap<OwnedDeviceKeyId, String>,
52 signatures: CrossSigningOrDeviceSignatures,
53 ) -> Self {
54 Self { user_id, device_id, algorithms, keys, signatures, unsigned: Default::default() }
55 }
56}
57
58#[derive(Clone, Debug, Default, Deserialize, Serialize)]
60#[cfg_attr(not(ruma_unstable_exhaustive_types), non_exhaustive)]
61pub struct UnsignedDeviceInfo {
62 #[serde(skip_serializing_if = "Option::is_none")]
64 pub device_display_name: Option<String>,
65}
66
67impl UnsignedDeviceInfo {
68 pub fn new() -> Self {
70 Default::default()
71 }
72
73 pub fn is_empty(&self) -> bool {
75 self.device_display_name.is_none()
76 }
77}
78
79#[derive(Debug, Clone, Serialize, Deserialize)]
81#[cfg_attr(not(ruma_unstable_exhaustive_types), non_exhaustive)]
82pub struct SignedKey {
83 pub key: Base64,
85
86 pub signatures: DeviceSignatures,
88
89 #[serde(default, skip_serializing_if = "crate::serde::is_default")]
91 pub fallback: bool,
92}
93
94impl SignedKey {
95 pub fn new(key: Base64, signatures: DeviceSignatures) -> Self {
97 Self { key, signatures, fallback: false }
98 }
99
100 pub fn new_fallback(key: Base64, signatures: DeviceSignatures) -> Self {
102 Self { key, signatures, fallback: true }
103 }
104}
105
106#[derive(Debug, Clone, Serialize, Deserialize)]
108#[cfg_attr(not(ruma_unstable_exhaustive_types), non_exhaustive)]
109#[serde(untagged)]
110pub enum OneTimeKey {
111 SignedKey(SignedKey),
113
114 Key(String),
116}
117
118#[derive(Clone, Debug, Deserialize, Serialize)]
122#[cfg_attr(not(ruma_unstable_exhaustive_types), non_exhaustive)]
123pub struct CrossSigningKey {
124 pub user_id: OwnedUserId,
126
127 pub usage: Vec<KeyUsage>,
129
130 pub keys: BTreeMap<OwnedCrossSigningKeyId, String>,
134
135 #[serde(default, skip_serializing_if = "BTreeMap::is_empty")]
143 pub signatures: CrossSigningOrDeviceSignatures,
144}
145
146impl CrossSigningKey {
147 pub fn new(
149 user_id: OwnedUserId,
150 usage: Vec<KeyUsage>,
151 keys: BTreeMap<OwnedCrossSigningKeyId, String>,
152 signatures: CrossSigningOrDeviceSignatures,
153 ) -> Self {
154 Self { user_id, usage, keys, signatures }
155 }
156}
157
158#[doc = include_str!(concat!(env!("CARGO_MANIFEST_DIR"), "/src/doc/string_enum.md"))]
160#[derive(Clone, PartialEq, Eq, StringEnum)]
161#[cfg_attr(not(ruma_unstable_exhaustive_types), non_exhaustive)]
162#[ruma_enum(rename_all = "snake_case")]
163pub enum KeyUsage {
164 Master,
166
167 SelfSigning,
169
170 UserSigning,
172
173 #[doc(hidden)]
174 _Custom(PrivOwnedStr),
175}