9 #include <esp_random.h>
\r
12 #define STATIC static
\r
14 #define LOGIN_REQUEST_SIZE 1024
\r
15 #define LOGIN_RESPONSE_SIZE 1024
\r
16 #define LOGIN_URL "/_matrix/client/v3/login"
\r
18 #define ENCRYPTED_REQUEST_SIZE (1024*5)
\r
19 STATIC char g_EncryptedRequestBuffer[ENCRYPTED_REQUEST_SIZE];
\r
20 #define ENCRYPTED_EVENT_SIZE (1024*10)
\r
21 STATIC char g_EncryptedEventBuffer[ENCRYPTED_EVENT_SIZE];
\r
22 #define ROOM_SEND_REQUEST_SIZE 256
\r
23 #define ROOM_SEND_RESPONSE_SIZE 1024
\r
24 #define ROOM_SEND_URL "/_matrix/client/v3/rooms/%s/send/%s/%d"
\r
26 #define ROOMKEY_REQUEST_SIZE (1024*4)
\r
28 #define TODEVICE_EVENT_SIZE (1024*5)
\r
29 STATIC char g_TodeviceEventBuffer[TODEVICE_EVENT_SIZE];
\r
30 #define TODEVICE_URL "/_matrix/client/v3/sendToDevice/%s/%d"
\r
32 #define KEYS_QUERY_URL "/_matrix/client/v3/keys/query"
\r
33 #define KEYS_QUERY_REQUEST_SIZE 256
\r
34 #define KEYS_QUERY_RESPONSE_SIZE (1024*5)
\r
36 #define KEYS_UPLOAD_URL "/_matrix/client/v3/keys/upload"
\r
37 #define KEYS_UPLOAD_REQUEST_SIZE 1024*4
\r
38 STATIC char g_KeysUploadRequestBuffer[KEYS_UPLOAD_REQUEST_SIZE];
\r
39 #define KEYS_UPLOAD_REQUEST_SIGNED_SIZE 2048*4
\r
40 STATIC char g_KeysUploadRequestSignedBuffer[KEYS_UPLOAD_REQUEST_SIGNED_SIZE];
\r
41 #define KEYS_UPLOAD_RESPONSE_SIZE 2048
\r
43 #define KEYS_CLAIM_URL "/_matrix/client/v3/keys/claim"
\r
44 #define KEYS_CLAIM_REQUEST_SIZE 1024
\r
45 #define KEYS_CLAIM_RESPONSE_SIZE 1024
\r
47 #define SYNC_TIMEOUT 5000
\r
49 #define JSON_QUERY_SIZE 128
\r
50 #define JSON_MAX_INDICES 100
\r
51 #define JSON_MAX_ENTRY_SIZE 1024
\r
53 #define MAX(a,b) ((a) > (b) ? (a) : (b))
\r
54 #define MIN(a,b) ((a) < (b) ? (a) : (b))
\r
63 for (int i = 0; i < randomLen; i++)
\r
65 random[i] = esp_random() % 256;
\r
70 STATIC bool first = true;
\r
71 if (first) { srand(time(0)); first = false; }
\r
73 for (int i = 0; i < randomLen; i++)
\r
75 random[i] = rand() % 256;
\r
83 const char * sIn, int sInLen,
\r
84 char * sOut, int sOutCap)
\r
88 for (int i = 0; i < sInLen; i++)
\r
93 if (sIn[i] == '.' ||
\r
97 sOut[sOutIndex++] = '\\';
\r
99 sOut[sOutIndex++] = sIn[i];
\r
102 if (sOutIndex < sOutCap)
\r
103 sOut[sOutIndex] = '\0';
\r
110 const char * sIn, int sInLen,
\r
111 char * sOut, int sOutCap)
\r
113 snprintf(sOut, sOutCap, "{}");
\r
115 int koff, klen, voff, vlen, vtype, off;
\r
122 struct Key keys[JSON_MAX_INDICES];
\r
125 for (off = 0; (off = mjson_next(sIn, sInLen, off, &koff, &klen, &voff, &vlen, &vtype)) != 0; ) {
\r
126 keys[numKeys].ptr = sIn + koff;
\r
127 keys[numKeys].len = klen;
\r
131 for (int i = 0; i < numKeys; i++) {
\r
132 for (int j = i; j < numKeys; j++) {
\r
137 MIN(keys[i].len, keys[j].len)
\r
140 struct Key k = keys[i];
\r
147 for (int i = 0; i < numKeys; i++) {
\r
148 char jp[JSON_QUERY_SIZE];
\r
149 snprintf(jp, JSON_QUERY_SIZE, "$.%.*s", keys[i].len-2, keys[i].ptr+1);
\r
151 const char * valPtr;
\r
153 mjson_find(sIn, sInLen, jp, &valPtr, &valLen);
\r
155 STATIC char newEntry[JSON_MAX_ENTRY_SIZE];
\r
156 snprintf(newEntry, JSON_MAX_ENTRY_SIZE, "{%.*s:%.*s}", keys[i].len, keys[i].ptr, valLen, valPtr);
\r
158 char * buffer = strdup(sOut);
\r
160 struct mjson_fixedbuf fb = { sOut, sOutCap, 0 };
\r
161 mjson_merge(buffer, strlen(buffer), newEntry, strlen(newEntry), mjson_print_fixed_buf, &fb);
\r
166 // TODO: recursively sort entries
\r
172 MatrixClient * client,
\r
173 const char * sIn, int sInLen,
\r
174 char * sOut, int sOutCap)
\r
176 STATIC char signature[OLM_SIGNATURE_SIZE];
\r
178 olm_account_sign(client->olmAccount.account,
\r
180 signature, OLM_SIGNATURE_SIZE);
\r
182 int signatureLen = res;
\r
184 STATIC char thisSigningKey[SIGNING_KEY_SIZE];
\r
185 MatrixOlmAccountGetSigningKey(&client->olmAccount, thisSigningKey, SIGNING_KEY_SIZE);
\r
187 STATIC char signatureJson[JSON_SIGNATURE_SIZE];
\r
188 int signatureJsonLen =
\r
189 mjson_snprintf(signatureJson, JSON_SIGNATURE_SIZE,
\r
193 "\"ed25519:%s\":\"%.*s\""
\r
200 signatureLen, signature);
\r
202 struct mjson_fixedbuf result = { sOut, sOutCap, 0 };
\r
205 signatureJson, signatureJsonLen,
\r
206 mjson_print_fixed_buf,
\r
214 MatrixOlmAccountInit(
\r
215 MatrixOlmAccount * account)
\r
217 account->account = olm_account(account->memory);
\r
219 STATIC uint8_t random[OLM_ACCOUNT_RANDOM_SIZE];
\r
220 Randomize(random, OLM_ACCOUNT_RANDOM_SIZE);
\r
222 size_t res = olm_create_account(
\r
225 OLM_ACCOUNT_RANDOM_SIZE);
\r
227 return res != olm_error();
\r
231 MatrixOlmAccountUnpickle(
\r
232 MatrixOlmAccount * account,
\r
233 void * pickled, int pickledLen,
\r
234 const void * key, int keyLen)
\r
237 res = olm_unpickle_account(account->account,
\r
239 pickled, pickledLen);
\r
240 if (res == olm_error()) {
\r
241 printf("error unpickling olm account:%s\n",
\r
242 olm_account_last_error(account->account));
\r
244 return res != olm_error();
\r
248 MatrixOlmAccountGetDeviceKey(
\r
249 MatrixOlmAccount * account,
\r
250 char * key, int keyCap)
\r
252 STATIC char deviceKeysJson[OLM_IDENTITY_KEYS_JSON_SIZE];
\r
254 olm_account_identity_keys(account->account,
\r
255 deviceKeysJson, OLM_IDENTITY_KEYS_JSON_SIZE);
\r
256 mjson_get_string(deviceKeysJson, res,
\r
263 MatrixOlmAccountGetSigningKey(
\r
264 MatrixOlmAccount * account,
\r
265 char * key, int keyCap)
\r
267 STATIC char deviceKeysJson[OLM_IDENTITY_KEYS_JSON_SIZE];
\r
269 olm_account_identity_keys(account->account,
\r
270 deviceKeysJson, OLM_IDENTITY_KEYS_JSON_SIZE);
\r
271 mjson_get_string(deviceKeysJson, res,
\r
278 MatrixOlmSessionFrom(
\r
279 MatrixOlmSession * session,
\r
280 OlmAccount * olmAccount,
\r
281 const char * deviceId,
\r
282 const char * deviceKey,
\r
283 const char * encrypted)
\r
285 memset(session, 0, sizeof(MatrixOlmSession));
\r
287 session->deviceId = deviceId;
\r
290 olm_session(session->memory);
\r
292 char * encryptedCopy = strdup(encrypted);
\r
295 olm_create_inbound_session_from(session->session, olmAccount,
\r
296 deviceKey, strlen(deviceKey),
\r
297 encryptedCopy, strlen(encryptedCopy));
\r
299 if (res == olm_error()) {
\r
300 printf("error olm:%s\n", olm_session_last_error(session->session));
\r
303 return res != olm_error();
\r
307 MatrixOlmSessionTo(
\r
308 MatrixOlmSession * session,
\r
309 OlmAccount * olmAccount,
\r
310 const char * deviceId,
\r
311 const char * deviceKey,
\r
312 const char * deviceOnetimeKey)
\r
314 memset(session, 0, sizeof(MatrixOlmSession));
\r
316 session->deviceId = deviceId;
\r
319 olm_session(session->memory);
\r
321 STATIC uint8_t random[OLM_OUTBOUND_SESSION_RANDOM_SIZE];
\r
322 Randomize(random, OLM_OUTBOUND_SESSION_RANDOM_SIZE);
\r
325 olm_create_outbound_session(session->session,
\r
327 deviceKey, strlen(deviceKey),
\r
328 deviceOnetimeKey, strlen(deviceOnetimeKey),
\r
329 random, OLM_OUTBOUND_SESSION_RANDOM_SIZE);
\r
331 if (res == olm_error()) {
\r
332 printf("error olm:%s\n", olm_session_last_error(session->session));
\r
335 return res != olm_error();
\r
339 MatrixOlmSessionUnpickle(
\r
340 MatrixOlmSession * session,
\r
341 const char * deviceId,
\r
342 void * pickled, int pickledLen,
\r
343 const void * key, int keyLen)
\r
345 memset(session, 0, sizeof(MatrixOlmSession));
\r
347 session->deviceId = deviceId;
\r
350 olm_session(session->memory);
\r
353 res = olm_unpickle_session(session->session,
\r
355 pickled, pickledLen);
\r
357 if (res == olm_error()) {
\r
358 printf("error unpickling olm session:%s\n", olm_session_last_error(session->session));
\r
361 return res != olm_error();
\r
365 MatrixOlmSessionEncrypt(
\r
366 MatrixOlmSession * session,
\r
367 const char * plaintext,
\r
368 char * outBuffer, int outBufferCap)
\r
370 STATIC uint8_t random[OLM_ENCRYPT_RANDOM_SIZE];
\r
371 Randomize(random, OLM_ENCRYPT_RANDOM_SIZE);
\r
373 memset(outBuffer, 0, outBufferCap);
\r
374 size_t res = olm_encrypt(session->session,
\r
375 plaintext, strlen(plaintext),
\r
376 random, OLM_ENCRYPT_RANDOM_SIZE,
\r
377 outBuffer, outBufferCap);
\r
379 return res != olm_error();
\r
383 MatrixOlmSessionDecrypt(
\r
384 MatrixOlmSession * session,
\r
385 size_t messageType,
\r
387 char * outBuffer, int outBufferCap)
\r
389 STATIC uint8_t random[OLM_ENCRYPT_RANDOM_SIZE];
\r
390 Randomize(random, OLM_ENCRYPT_RANDOM_SIZE);
\r
393 olm_decrypt(session->session,
\r
395 encrypted, strlen(encrypted),
\r
396 outBuffer, outBufferCap);
\r
398 if (res != olm_error() && (int)res < outBufferCap)
\r
399 outBuffer[res] = '\0';
\r
401 return res != olm_error();
\r
405 MatrixMegolmInSessionInit(
\r
406 MatrixMegolmInSession * session,
\r
407 const char * roomId,
\r
408 const char * sessionId,
\r
409 const char * sessionKey, int sessionKeyLen)
\r
411 memset(session, 0, sizeof(MatrixMegolmInSession));
\r
413 strncpy(session->roomId, roomId, sizeof(session->roomId));
\r
414 strncpy(session->id, sessionId, sizeof(session->id));
\r
415 strncpy(session->key, sessionKey, sizeof(session->key));
\r
418 olm_inbound_group_session(session->memory);
\r
421 olm_init_inbound_group_session(
\r
422 // olm_import_inbound_group_session(
\r
424 (const uint8_t *)sessionKey, sessionKeyLen);
\r
425 if (res == olm_error()) {
\r
426 printf("Error initializing Megolm session: %s\n", olm_inbound_group_session_last_error(session->session));
\r
429 return res != olm_error();
\r
433 MatrixMegolmInSessionDecrypt(
\r
434 MatrixMegolmInSession * session,
\r
435 const char * encrypted, int encryptedLen,
\r
436 char * outDecrypted, int outDecryptedCap)
\r
438 // uint8_t buffer[1024];
\r
439 // memcpy(buffer, encrypted, encryptedLen);
\r
441 uint32_t megolmInMessageIndex;
\r
444 olm_group_decrypt(session->session,
\r
445 (uint8_t *)encrypted, encryptedLen,
\r
446 (uint8_t *)outDecrypted, outDecryptedCap,
\r
447 &megolmInMessageIndex);
\r
449 printf("message index: %d\n", (int)megolmInMessageIndex);
\r
451 if (res == olm_error()) {
\r
452 printf("error decrypting megolm message: %s\n", olm_inbound_group_session_last_error(session->session));
\r
455 printf("decrypted len: %d\n", res);
\r
461 // https://matrix.org/docs/guides/end-to-end-encryption-implementation-guide#starting-a-megolm-session
\r
463 MatrixMegolmOutSessionInit(
\r
464 MatrixMegolmOutSession * session,
\r
465 const char * roomId)
\r
467 memset(session, 0, sizeof(MatrixMegolmOutSession));
\r
469 STATIC uint8_t random[MEGOLM_INIT_RANDOM_SIZE];
\r
470 Randomize(random, MEGOLM_INIT_RANDOM_SIZE);
\r
472 strncpy(session->roomId, roomId, ROOM_ID_SIZE);
\r
475 olm_outbound_group_session(session->memory);
\r
477 olm_init_outbound_group_session(
\r
480 MEGOLM_INIT_RANDOM_SIZE);
\r
482 olm_outbound_group_session_id(session->session,
\r
483 (uint8_t *)session->id,
\r
484 MEGOLM_SESSION_ID_SIZE);
\r
486 olm_outbound_group_session_key(session->session,
\r
487 (uint8_t *)session->key,
\r
488 MEGOLM_SESSION_KEY_SIZE);
\r
494 MatrixMegolmOutSessionEncrypt(
\r
495 MatrixMegolmOutSession * session,
\r
496 const char * plaintext,
\r
497 char * outBuffer, int outBufferCap)
\r
499 memset(outBuffer, 0, outBufferCap);
\r
500 size_t res = olm_group_encrypt(session->session,
\r
501 (uint8_t *)plaintext, strlen(plaintext),
\r
502 (uint8_t *)outBuffer, outBufferCap);
\r
504 return res != olm_error();
\r
510 MatrixClient * client)
\r
512 memset(client, 0, sizeof(MatrixClient));
\r
514 // init olm account
\r
515 MatrixOlmAccountInit(&client->olmAccount);
\r
521 MatrixClientSetAccessToken(
\r
522 MatrixClient * client,
\r
523 const char * accessToken)
\r
525 for (int i = 0; i < ACCESS_TOKEN_SIZE-1; i++)
\r
526 client->accessToken[i] = accessToken[i];
\r
527 client->accessToken[ACCESS_TOKEN_SIZE-1] = '\0';
\r
533 MatrixClientSetDeviceId(
\r
534 MatrixClient * client,
\r
535 const char * deviceId)
\r
537 for (int i = 0; i < DEVICE_ID_SIZE-1; i++)
\r
538 client->deviceId[i] = deviceId[i];
\r
539 client->deviceId[DEVICE_ID_SIZE-1] = '\0';
\r
545 MatrixClientSetUserId(
\r
546 MatrixClient * client,
\r
547 const char * userId)
\r
549 for (int i = 0; i < USER_ID_SIZE-1; i++)
\r
550 client->userId[i] = userId[i];
\r
551 client->userId[USER_ID_SIZE-1] = '\0';
\r
557 MatrixClientGenerateOnetimeKeys(
\r
558 MatrixClient * client,
\r
561 STATIC uint8_t random[OLM_ONETIME_KEYS_RANDOM_SIZE];
\r
562 Randomize(random, OLM_ONETIME_KEYS_RANDOM_SIZE);
\r
565 olm_account_generate_one_time_keys(client->olmAccount.account,
\r
566 numberOfKeys, random, OLM_ONETIME_KEYS_RANDOM_SIZE);
\r
568 return res != olm_error();
\r
571 // https://spec.matrix.org/v1.7/client-server-api/#post_matrixclientv3keysupload
\r
573 MatrixClientUploadOnetimeKeys(
\r
574 MatrixClient * client)
\r
576 mjson_snprintf(g_KeysUploadRequestBuffer, KEYS_UPLOAD_REQUEST_SIZE,
\r
579 STATIC char onetimeKeysBuffer[1024];
\r
580 olm_account_one_time_keys(client->olmAccount.account,
\r
581 onetimeKeysBuffer, 1024);
\r
585 mjson_find(onetimeKeysBuffer, strlen(onetimeKeysBuffer), "$.curve25519", &keys, &keysLen);
\r
587 int koff, klen, voff, vlen, vtype, off = 0;
\r
588 while ((off = mjson_next(keys, keysLen, off, &koff, &klen, &voff, &vlen, &vtype)) != 0) {
\r
589 STATIC char keyJson[JSON_ONETIME_KEY_SIZE];
\r
592 snprintf(keyJson, JSON_ONETIME_KEY_SIZE,
\r
593 "{\"key\":\"%.*s\"}",
\r
594 vlen-2, keys + voff+1);
\r
596 STATIC char keyJsonSigned[JSON_ONETIME_KEY_SIGNED_SIZE];
\r
599 keyJson, keyJsonLen,
\r
600 keyJsonSigned, JSON_ONETIME_KEY_SIGNED_SIZE);
\r
602 mjson_snprintf(g_KeysUploadRequestBuffer+strlen(g_KeysUploadRequestBuffer), KEYS_UPLOAD_REQUEST_SIZE-strlen(g_KeysUploadRequestBuffer),
\r
603 "\"signed_curve25519:%.*s\":%s,",
\r
604 klen-2, keys + koff+1,
\r
608 if (g_KeysUploadRequestBuffer[strlen(g_KeysUploadRequestBuffer)-1] == ',')
\r
609 g_KeysUploadRequestBuffer[strlen(g_KeysUploadRequestBuffer)-1] = '\0';
\r
611 mjson_snprintf(g_KeysUploadRequestBuffer+strlen(g_KeysUploadRequestBuffer), KEYS_UPLOAD_REQUEST_SIZE-strlen(g_KeysUploadRequestBuffer),
\r
614 // STATIC char onetimeKeysSignedBuffer[KEYS_UPLOAD_REQUEST_SIGNED_SIZE];
\r
615 // JsonSign(client,
\r
616 // g_KeysUploadRequestBuffer, strlen(g_KeysUploadRequestBuffer),
\r
617 // onetimeKeysSignedBuffer, KEYS_UPLOAD_REQUEST_SIZE);
\r
619 // STATIC char finalEvent[KEYS_UPLOAD_REQUEST_SIGNED_SIZE];
\r
620 // snprintf(finalEvent, KEYS_UPLOAD_REQUEST_SIGNED_SIZE,
\r
621 // "{\"one_time_keys\":%s}", onetimeKeysSignedBuffer);
\r
622 snprintf(g_KeysUploadRequestSignedBuffer, KEYS_UPLOAD_REQUEST_SIGNED_SIZE,
\r
623 "{\"one_time_keys\":%s}", g_KeysUploadRequestBuffer);
\r
625 STATIC char responseBuffer[KEYS_UPLOAD_RESPONSE_SIZE];
\r
626 MatrixHttpPost(client->hc,
\r
628 g_KeysUploadRequestSignedBuffer,
\r
629 responseBuffer, KEYS_UPLOAD_RESPONSE_SIZE,
\r
635 // https://spec.matrix.org/v1.7/client-server-api/#post_matrixclientv3keysupload
\r
637 MatrixClientUploadDeviceKeys(
\r
638 MatrixClient * client)
\r
640 char thisDeviceKey[DEVICE_KEY_SIZE];
\r
641 MatrixOlmAccountGetDeviceKey(&client->olmAccount, thisDeviceKey, DEVICE_KEY_SIZE);
\r
642 char thisSigningKey[DEVICE_KEY_SIZE];
\r
643 MatrixOlmAccountGetSigningKey(&client->olmAccount, thisSigningKey, DEVICE_KEY_SIZE);
\r
645 int deviceKeysBufferLen =
\r
646 mjson_snprintf(g_KeysUploadRequestBuffer, KEYS_UPLOAD_REQUEST_SIZE,
\r
648 "\"algorithms\":[\"m.olm.v1.curve25519-aes-sha2\",\"m.megolm.v1.aes-sha2\"],"
\r
649 "\"device_id\":\"%s\","
\r
651 "\"curve25519:%s\":\"%s\","
\r
652 "\"ed25519:%s\":\"%s\""
\r
654 "\"user_id\":\"%s\""
\r
657 client->deviceId, thisDeviceKey,
\r
658 client->deviceId, thisSigningKey,
\r
662 g_KeysUploadRequestBuffer, deviceKeysBufferLen,
\r
663 g_KeysUploadRequestSignedBuffer, KEYS_UPLOAD_REQUEST_SIZE);
\r
665 STATIC char finalEvent[KEYS_UPLOAD_REQUEST_SIGNED_SIZE+30];
\r
666 snprintf(finalEvent, KEYS_UPLOAD_REQUEST_SIGNED_SIZE+30,
\r
667 "{\"device_keys\":%s}", g_KeysUploadRequestSignedBuffer);
\r
669 STATIC char responseBuffer[KEYS_UPLOAD_RESPONSE_SIZE];
\r
670 MatrixHttpPost(client->hc,
\r
673 responseBuffer, KEYS_UPLOAD_RESPONSE_SIZE,
\r
679 // https://spec.matrix.org/v1.7/client-server-api/#post_matrixclientv3keysclaim
\r
681 MatrixClientClaimOnetimeKey(
\r
682 MatrixClient * client,
\r
683 const char * userId,
\r
684 const char * deviceId,
\r
685 char * outOnetimeKey, int outOnetimeKeyCap)
\r
687 STATIC char requestBuffer[KEYS_CLAIM_REQUEST_SIZE];
\r
688 mjson_snprintf(requestBuffer, KEYS_CLAIM_REQUEST_SIZE,
\r
690 "\"one_time_keys\":{"
\r
692 "\"%s\":\"signed_curve25519\""
\r
695 "\"timeout\":10000"
\r
700 STATIC char responseBuffer[KEYS_CLAIM_RESPONSE_SIZE];
\r
701 MatrixHttpPost(client->hc,
\r
704 responseBuffer, KEYS_CLAIM_RESPONSE_SIZE,
\r
707 STATIC char userIdEscaped[USER_ID_SIZE];
\r
708 JsonEscape(userId, strlen(userId),
\r
709 userIdEscaped, USER_ID_SIZE);
\r
711 STATIC char query[JSON_QUERY_SIZE];
\r
712 snprintf(query, JSON_QUERY_SIZE,
\r
713 "$.one_time_keys.%s.%s",
\r
717 const char * keyObject;
\r
719 mjson_find(responseBuffer, strlen(responseBuffer),
\r
721 &keyObject, &keyObjectSize);
\r
723 int koff, klen, voff, vlen, vtype;
\r
724 mjson_next(keyObject, keyObjectSize, 0,
\r
725 &koff, &klen, &voff, &vlen, &vtype);
\r
727 mjson_get_string(keyObject + voff, vlen,
\r
728 "$.key", outOnetimeKey, outOnetimeKeyCap);
\r
730 // TODO:verify signature
\r
735 // https://spec.matrix.org/v1.6/client-server-api/#post_matrixclientv3login
\r
737 MatrixClientLoginPassword(
\r
738 MatrixClient * client,
\r
739 const char * username,
\r
740 const char * password,
\r
741 const char * displayName)
\r
743 STATIC char requestBuffer[LOGIN_REQUEST_SIZE];
\r
745 mjson_snprintf(requestBuffer, LOGIN_REQUEST_SIZE,
\r
747 "\"type\":\"m.login.password\","
\r
749 "\"type\":\"m.id.user\","
\r
752 "\"password\":\"%s\","
\r
753 "\"initial_device_display_name\":\"%s\""
\r
759 STATIC char responseBuffer[LOGIN_RESPONSE_SIZE];
\r
761 MatrixHttpPost(client->hc,
\r
764 responseBuffer, LOGIN_RESPONSE_SIZE,
\r
770 int responseLen = strlen(responseBuffer);
\r
772 mjson_get_string(responseBuffer, responseLen,
\r
774 client->accessToken, ACCESS_TOKEN_SIZE);
\r
775 mjson_get_string(responseBuffer, responseLen,
\r
777 client->deviceId, DEVICE_ID_SIZE);
\r
778 mjson_get_string(responseBuffer, responseLen,
\r
780 client->expireMs, EXPIRE_MS_SIZE);
\r
781 mjson_get_string(responseBuffer, responseLen,
\r
783 client->refreshToken, REFRESH_TOKEN_SIZE);
\r
785 MatrixHttpSetAccessToken(client->hc, client->accessToken);
\r
790 // https://spec.matrix.org/v1.6/client-server-api/#put_matrixclientv3roomsroomidsendeventtypetxnid
\r
792 MatrixClientSendEvent(
\r
793 MatrixClient * client,
\r
794 const char * roomId,
\r
795 const char * msgType,
\r
796 const char * msgBody)
\r
798 STATIC char requestUrl[MAX_URL_LEN];
\r
799 sprintf(requestUrl,
\r
800 ROOM_SEND_URL, roomId, msgType, (int)time(NULL));
\r
802 STATIC char responseBuffer[ROOM_SEND_RESPONSE_SIZE];
\r
804 MatrixHttpPut(client->hc,
\r
807 responseBuffer, ROOM_SEND_RESPONSE_SIZE,
\r
813 // https://spec.matrix.org/v1.6/client-server-api/#mroomencrypted
\r
814 // https://matrix.org/docs/guides/end-to-end-encryption-implementation-guide#sending-an-encrypted-message-event
\r
816 MatrixClientSendEventEncrypted(
\r
817 MatrixClient * client,
\r
818 const char * roomId,
\r
819 const char * msgType,
\r
820 const char * msgBody)
\r
823 STATIC char requestBuffer[ROOM_SEND_REQUEST_SIZE];
\r
824 sprintf(requestBuffer,
\r
828 "\"room_id\":\"%s\""
\r
834 // get megolm session
\r
835 MatrixMegolmOutSession * outSession;
\r
836 if (! MatrixClientGetMegolmOutSession(client, roomId, &outSession))
\r
837 MatrixClientNewMegolmOutSession(client, roomId, &outSession);
\r
840 MatrixMegolmOutSessionEncrypt(outSession,
\r
842 g_EncryptedRequestBuffer, ENCRYPTED_REQUEST_SIZE);
\r
844 char thisDeviceKey[DEVICE_KEY_SIZE];
\r
845 MatrixOlmAccountGetDeviceKey(&client->olmAccount, thisDeviceKey, DEVICE_KEY_SIZE);
\r
848 // encrypted event json
\r
849 const char * senderKey = thisDeviceKey;
\r
850 const char * sessionId = outSession->id;
\r
851 const char * deviceId = client->deviceId;
\r
853 snprintf(g_EncryptedEventBuffer, ENCRYPTED_EVENT_SIZE,
\r
855 "\"algorithm\":\"m.megolm.v1.aes-sha2\","
\r
856 "\"ciphertext\":\"%s\","
\r
857 "\"device_id\":\"%s\","
\r
858 "\"sender_key\":\"%s\","
\r
859 "\"session_id\":\"%s\""
\r
861 g_EncryptedRequestBuffer,
\r
867 return MatrixClientSendEvent(client,
\r
869 "m.room.encrypted",
\r
870 g_EncryptedEventBuffer);
\r
874 MatrixClientHandleEvent(
\r
875 MatrixClient * client,
\r
876 const char * event, int eventLen
\r
878 STATIC char eventType[128];
\r
879 memset(eventType, 0, sizeof(eventType));
\r
880 mjson_get_string(event, eventLen, "$.type", eventType, 128);
\r
882 static char transactionId[64];
\r
883 static char verifyFromDeviceId[DEVICE_ID_SIZE];
\r
884 static OlmSAS * olmSas = NULL;
\r
886 if (strcmp(eventType, "m.key.verification.request") == 0) {
\r
887 memset(transactionId, 0, 64);
\r
888 if (olmSas != NULL)
\r
891 mjson_get_string(event, eventLen, "$.content.transaction_id", transactionId, 64);
\r
892 mjson_get_string(event, eventLen, "$.content.from_device", verifyFromDeviceId, DEVICE_ID_SIZE);
\r
894 char verificationReadyBuffer[2048];
\r
895 snprintf(verificationReadyBuffer, 2048,
\r
897 "\"from_device\":\"%s\","
\r
898 "\"methods\":[\"m.sas.v1\"],"
\r
899 "\"transaction_id\":\"%s\""
\r
904 MatrixClientSendToDevice(client,
\r
906 verifyFromDeviceId,
\r
907 verificationReadyBuffer,
\r
908 "m.key.verification.ready");
\r
910 else if (strcmp(eventType, "m.key.verification.start") == 0) {
\r
911 olmSas = olm_sas(malloc(olm_sas_size()));
\r
912 void * sasRandomBytes = malloc(olm_create_sas_random_length(olmSas));
\r
913 olm_create_sas(olmSas,
\r
915 olm_create_sas_random_length(olmSas));
\r
917 OlmUtility * olmUtil = olm_utility(malloc(olm_utility_size()));
\r
919 STATIC char publicKey[64];
\r
920 STATIC char keyStartJsonCanonical[512];
\r
921 STATIC char concat[512+64];
\r
922 STATIC char commitment[1024];
\r
923 olm_sas_get_pubkey(olmSas,
\r
926 printf("public key: %.*s\n", olm_sas_pubkey_length(olmSas), publicKey);
\r
928 const char * keyStartJson;
\r
929 int keyStartJsonLen;
\r
930 mjson_find(event, eventLen, "$.content", &keyStartJson, &keyStartJsonLen);
\r
931 JsonCanonicalize(keyStartJson, keyStartJsonLen, keyStartJsonCanonical, 512);
\r
933 printf("json:\n%.*s\ncanonical json:\n%s\n", keyStartJsonLen, keyStartJson, keyStartJsonCanonical);
\r
936 snprintf(concat, 512+64, "%.*s%s", olm_sas_pubkey_length(olmSas), publicKey, keyStartJsonCanonical);
\r
938 int commitmentLen =
\r
939 olm_sha256(olmUtil, concat, concatLen, commitment, 1024);
\r
941 STATIC char verificationAcceptBuffer[512];
\r
942 snprintf(verificationAcceptBuffer, 512,
\r
944 "\"commitment\":\"%.*s\","
\r
945 "\"hash\":\"sha256\","
\r
946 "\"key_agreement_protocol\":\"curve25519\","
\r
947 "\"message_authentication_code\":\"hkdf-hmac-sha256.v2\","
\r
948 "\"method\":\"m.sas.v1\","
\r
949 "\"short_authentication_string\":[\"decimal\"],"
\r
950 "\"transaction_id\":\"%s\""
\r
952 commitmentLen, commitment,
\r
955 MatrixClientSendToDevice(client,
\r
957 verifyFromDeviceId,
\r
958 verificationAcceptBuffer,
\r
959 "m.key.verification.accept");
\r
961 else if (strcmp(eventType, "m.key.verification.key") == 0) {
\r
962 STATIC char publicKey[128];
\r
963 olm_sas_get_pubkey(olmSas,
\r
967 STATIC char theirPublicKey[128];
\r
968 int theirPublicKeyLen =
\r
969 mjson_get_string(event, eventLen, "$.content.key", theirPublicKey, 128);
\r
971 printf("event: %.*s\n", eventLen, event);
\r
972 printf("theirPublicKey: %.*s\n", theirPublicKeyLen, theirPublicKey);
\r
973 printf("publicKey: %.*s\n", olm_sas_pubkey_length(olmSas), publicKey);
\r
975 olm_sas_set_their_key(olmSas, theirPublicKey, theirPublicKeyLen);
\r
977 STATIC char verificationKeyBuffer[256];
\r
978 snprintf(verificationKeyBuffer, 256,
\r
980 "\"key\":\"%.*s\","
\r
981 "\"transaction_id\":\"%s\""
\r
983 olm_sas_pubkey_length(olmSas), publicKey,
\r
986 MatrixClientSendToDevice(client,
\r
988 verifyFromDeviceId,
\r
989 verificationKeyBuffer,
\r
990 "m.key.verification.key");
\r
993 STATIC char hkdfInfo[1024];
\r
995 snprintf(hkdfInfo, 1024,
\r
996 "MATRIX_KEY_VERIFICATION_SAS%s%s%s%s%s",
\r
998 verifyFromDeviceId,
\r
1003 unsigned char sasBytes[5];
\r
1004 olm_sas_generate_bytes(olmSas,
\r
1005 hkdfInfo, hkdfInfoLen,
\r
1007 int b0 = sasBytes[0];
\r
1008 int b1 = sasBytes[1];
\r
1009 int b2 = sasBytes[2];
\r
1010 int b3 = sasBytes[3];
\r
1011 int b4 = sasBytes[4];
\r
1013 printf("%d %d %d %d %d\n", b0, b1, b2, b3, b4);
\r
1015 // https://spec.matrix.org/v1.7/client-server-api/#sas-method-decimal
\r
1016 printf("%d | %d | %d\n",
\r
1017 (b0 << 5 | b1 >> 3) + 1000,
\r
1018 ((b1 & 0x7) << 10 | b2 << 2 | b3 >> 6) + 1000,
\r
1019 ((b3 & 0x3F) << 7 | b4 >> 1) + 1000);
\r
1020 printf("%d | %d | %d\n",
\r
1021 ((b0 << 5) | (b1 >> 3)) + 1000,
\r
1022 (((b1 & 0x7) << 10) | (b2 << 2) | (b3 >> 6)) + 1000,
\r
1023 (((b3 & 0x3F) << 7) | (b4 >> 1)) + 1000);
\r
1025 else if (strcmp(eventType, "m.key.verification.mac") == 0) {
\r
1027 STATIC char masterKey[123];
\r
1028 MatrixClientRequestMasterKey(client, masterKey, 123);
\r
1030 STATIC char keyList[256];
\r
1031 STATIC char keyListMac[256];
\r
1032 STATIC char key1Id[128];
\r
1033 STATIC char key1[128];
\r
1034 STATIC char key1Mac[128];
\r
1035 STATIC char key2Id[128];
\r
1036 STATIC char key2[128];
\r
1037 STATIC char key2Mac[128];
\r
1039 if (strcmp(masterKey, client->deviceId) < 0) {
\r
1040 snprintf(key1Id, 1024, "ed25519:%s", masterKey);
\r
1041 strcpy(key1, masterKey);
\r
1042 snprintf(key2Id, 1024, "ed25519:%s", client->deviceId);
\r
1043 MatrixOlmAccountGetSigningKey(&client->olmAccount, key2, 1024);
\r
1046 snprintf(key1Id, 1024, "ed25519:%s", client->deviceId);
\r
1047 MatrixOlmAccountGetSigningKey(&client->olmAccount, key1, 1024);
\r
1048 snprintf(key2Id, 1024, "ed25519:%s", masterKey);
\r
1049 strcpy(key2, masterKey);
\r
1052 snprintf(keyList, 1024,
\r
1053 "%s,%s", key1Id, key2Id);
\r
1055 STATIC char macInfo[1024];
\r
1059 snprintf(macInfo, 1024,
\r
1060 "MATRIX_KEY_VERIFICATION_MAC%s%s%s%s%s%s",
\r
1064 verifyFromDeviceId,
\r
1067 olm_sas_calculate_mac_fixed_base64(olmSas, keyList, strlen(keyList), macInfo, macInfoLen, keyListMac, 1024);
\r
1071 snprintf(macInfo, 1024,
\r
1072 "MATRIX_KEY_VERIFICATION_MAC%s%s%s%s%s%s",
\r
1076 verifyFromDeviceId,
\r
1079 olm_sas_calculate_mac_fixed_base64(olmSas, key1, strlen(key1), macInfo, macInfoLen, key1Mac, 1024);
\r
1083 snprintf(macInfo, 1024,
\r
1084 "MATRIX_KEY_VERIFICATION_MAC%s%s%s%s%s%s",
\r
1088 verifyFromDeviceId,
\r
1091 olm_sas_calculate_mac_fixed_base64(olmSas, key2, strlen(key2), macInfo, macInfoLen, key2Mac, 1024);
\r
1094 STATIC char verificationMacBuffer[1024];
\r
1095 snprintf(verificationMacBuffer, 1024,
\r
1097 "\"keys\":\"%s\","
\r
1102 "\"transaction_id\":\"%s\""
\r
1111 MatrixClientSendToDevice(client,
\r
1113 verifyFromDeviceId,
\r
1114 verificationMacBuffer,
\r
1115 "m.key.verification.mac");
\r
1117 STATIC char verificationDoneBuffer[128];
\r
1118 snprintf(verificationDoneBuffer, 128,
\r
1120 "\"transaction_id\":\"%s\""
\r
1124 MatrixClientSendToDevice(client,
\r
1126 verifyFromDeviceId,
\r
1127 verificationDoneBuffer,
\r
1128 "m.key.verification.done");
\r
1131 client->verified = true;
\r
1133 else if (strcmp(eventType, "m.room.encrypted") == 0) {
\r
1134 STATIC char algorithm[128];
\r
1135 mjson_get_string(event, eventLen, "$.content.algorithm", algorithm, 128);
\r
1137 if (strcmp(algorithm, "m.olm.v1.curve25519-aes-sha2") == 0) {
\r
1138 STATIC char thisDeviceKey[DEVICE_KEY_SIZE];
\r
1139 MatrixOlmAccountGetDeviceKey(&client->olmAccount, thisDeviceKey, DEVICE_KEY_SIZE);
\r
1141 STATIC char jp[128];
\r
1142 snprintf(jp, 128, "$.content.ciphertext.%s.type", thisDeviceKey);
\r
1144 double messageType;
\r
1145 mjson_get_number(event, eventLen, jp, &messageType);
\r
1146 int messageTypeInt = (int)messageType;
\r
1148 snprintf(jp, 128, "$.content.ciphertext.%s.body", thisDeviceKey);
\r
1150 mjson_get_string(event, eventLen, jp, g_EncryptedEventBuffer, 2048);
\r
1152 MatrixOlmSession * olmSession;
\r
1154 if (! MatrixClientGetOlmSession(client, client->userId, verifyFromDeviceId, &olmSession))
\r
1156 if (messageTypeInt == 0) {
\r
1157 MatrixClientNewOlmSessionIn(client,
\r
1159 verifyFromDeviceId,
\r
1160 g_EncryptedEventBuffer,
\r
1164 MatrixClientNewOlmSessionOut(client,
\r
1166 verifyFromDeviceId,
\r
1171 STATIC char decrypted[2048];
\r
1172 MatrixOlmSessionDecrypt(olmSession,
\r
1173 messageTypeInt, g_EncryptedEventBuffer, decrypted, 2048);
\r
1175 MatrixClientHandleEvent(client, decrypted, strlen(decrypted));
\r
1178 else if (strcmp(eventType, "m.room_key") == 0 ||
\r
1179 strcmp(eventType, "m.forwarded_room_key") == 0) {
\r
1180 STATIC char roomId[128];
\r
1181 STATIC char sessionId[128];
\r
1182 STATIC char sessionKey[1024];
\r
1183 mjson_get_string(event, eventLen, "$.content.room_id", roomId, 128);
\r
1184 mjson_get_string(event, eventLen, "$.content.session_id", sessionId, 128);
\r
1185 mjson_get_string(event, eventLen, "$.content.session_key", sessionKey, 1024);
\r
1187 printf("sessionId: %s\n", sessionId);
\r
1188 printf("sessionKey: %s\n", sessionKey);
\r
1190 MatrixMegolmInSession * megolmInSession;
\r
1191 MatrixClientNewMegolmInSession(client, roomId, sessionId, sessionKey, &megolmInSession);
\r
1196 MatrixClientHandleRoomEvent(
\r
1197 MatrixClient * client,
\r
1198 const char * room, int roomLen,
\r
1199 const char * event, int eventLen)
\r
1201 STATIC char eventType[128];
\r
1202 memset(eventType, 0, sizeof(eventType));
\r
1203 mjson_get_string(event, eventLen, "$.type", eventType, 128);
\r
1205 if (strcmp(eventType, "m.room.encrypted") == 0) {
\r
1206 STATIC char algorithm[128];
\r
1207 mjson_get_string(event, eventLen, "$.content.algorithm", algorithm, 128);
\r
1209 if (strcmp(algorithm, "m.megolm.v1.aes-sha2") == 0) {
\r
1210 STATIC char sessionId[128];
\r
1211 int sessionIdLen =
\r
1212 mjson_get_string(event, eventLen, "$.content.session_id", sessionId, 128);
\r
1216 MatrixMegolmInSession * megolmInSession;
\r
1217 res = MatrixClientGetMegolmInSession(client,
\r
1219 sessionId, sessionIdLen,
\r
1220 &megolmInSession);
\r
1223 mjson_get_string(event, eventLen, "$.content.ciphertext", g_EncryptedEventBuffer, 2048);
\r
1225 STATIC char decrypted[2048];
\r
1226 MatrixMegolmInSessionDecrypt(megolmInSession, g_EncryptedEventBuffer, strlen(g_EncryptedEventBuffer), decrypted, 2048);
\r
1228 MatrixClientHandleEvent(client, decrypted, strlen(decrypted));
\r
1231 printf("megolm session not known\n");
\r
1235 MatrixClientHandleEvent(client, event, eventLen);
\r
1239 MatrixClientHandleSync(
\r
1240 MatrixClient * client,
\r
1241 char * syncBuffer, int syncBufferLen,
\r
1242 char * nextBatch, int nextBatchCap)
\r
1246 const char * s = syncBuffer;
\r
1247 int slen = syncBufferLen;
\r
1249 mjson_get_string(s, slen, "$.next_batch", nextBatch, nextBatchCap);
\r
1253 const char * events;
\r
1256 mjson_find(s, slen, "$.to_device.events", &events, &eventsLen);
\r
1258 if (res != MJSON_TOK_INVALID) {
\r
1260 int koff, klen, voff, vlen, vtype, off = 0;
\r
1261 for (off = 0; (off = mjson_next(events, eventsLen, off, &koff, &klen,
\r
1262 &voff, &vlen, &vtype)) != 0; ) {
\r
1263 const char * v = events + voff;
\r
1265 MatrixClientHandleEvent(client, v, vlen);
\r
1272 const char * rooms;
\r
1275 mjson_find(s, slen, "$.rooms.join", &rooms, &roomsLen);
\r
1277 if (res != MJSON_TOK_INVALID) {
\r
1279 int koff, klen, voff, vlen, vtype, off = 0;
\r
1280 for (off = 0; (off = mjson_next(rooms, roomsLen, off, &koff, &klen,
\r
1281 &voff, &vlen, &vtype)) != 0; ) {
\r
1282 const char * k = rooms + koff;
\r
1283 const char * v = rooms + voff;
\r
1285 const char * events;
\r
1288 mjson_find(v, vlen, "$.timeline.events", &events, &eventsLen);
\r
1290 if (res != MJSON_TOK_INVALID) {
\r
1292 int koff2, klen2, voff2, vlen2, vtype2, off2 = 0;
\r
1293 for (off2 = 0; (off2 = mjson_next(events, eventsLen, off2, &koff2, &klen2,
\r
1294 &voff2, &vlen2, &vtype2)) != 0; ) {
\r
1295 const char * v2 = events + voff2;
\r
1297 MatrixClientHandleRoomEvent(client,
\r
1308 // https://spec.matrix.org/v1.6/client-server-api/#get_matrixclientv3sync
\r
1311 MatrixClient * client,
\r
1312 char * outSyncBuffer, int outSyncCap,
\r
1313 char * nextBatch, int nextBatchCap)
\r
1315 // filter={\"event_fields\":[\"to_device\"]}
\r
1316 STATIC char url[MAX_URL_LEN];
\r
1317 snprintf(url, MAX_URL_LEN,
\r
1318 "/_matrix/client/v3/sync?timeout=%d" "%s" "%s",
\r
1321 // "&filter={\"event_fields\":[\"to_device\"]}",
\r
1322 strlen(nextBatch) > 0 ? "&since=" : "");
\r
1324 int index = strlen(url);
\r
1326 for (size_t i = 0; i < strlen(nextBatch); i++) {
\r
1327 char c = nextBatch[i];
\r
1330 url[index++] = '%';
\r
1331 url[index++] = '7';
\r
1332 url[index++] = 'E';
\r
1338 url[index] = '\0';
\r
1341 MatrixHttpGet(client->hc,
\r
1343 outSyncBuffer, outSyncCap,
\r
1346 MatrixClientHandleSync(client,
\r
1347 outSyncBuffer, strlen(outSyncBuffer),
\r
1348 nextBatch, nextBatchCap);
\r
1353 // https://spec.matrix.org/v1.7/client-server-api/#get_matrixclientv3roomsroomideventeventid
\r
1355 MatrixClientGetRoomEvent(
\r
1356 MatrixClient * client,
\r
1357 const char * roomId,
\r
1358 const char * eventId,
\r
1359 char * outEvent, int outEventCap)
\r
1361 STATIC char url[MAX_URL_LEN];
\r
1362 snprintf(url, MAX_URL_LEN,
\r
1363 "/_matrix/client/v3/rooms/%s/event/%s",
\r
1368 MatrixHttpGet(client->hc,
\r
1370 outEvent, outEventCap,
\r
1375 MatrixClientShareMegolmOutSession(
\r
1376 MatrixClient * client,
\r
1377 const char * userId,
\r
1378 const char * deviceId,
\r
1379 MatrixMegolmOutSession * session)
\r
1381 // generate room key event
\r
1382 STATIC char eventBuffer[KEY_SHARE_EVENT_LEN];
\r
1383 sprintf(eventBuffer,
\r
1385 "\"algorithm\":\"m.megolm.v1.aes-sha2\","
\r
1386 "\"room_id\":\"%s\","
\r
1387 "\"session_id\":\"%s\","
\r
1388 "\"session_key\":\"%s\""
\r
1396 MatrixClientSendToDeviceEncrypted(client,
\r
1406 MatrixClientShareMegolmOutSessionTest(
\r
1407 MatrixClient * client,
\r
1408 const char * userId,
\r
1409 const char * deviceId,
\r
1410 MatrixMegolmOutSession * session)
\r
1412 // generate room key event
\r
1413 char eventBuffer[KEY_SHARE_EVENT_LEN];
\r
1414 sprintf(eventBuffer,
\r
1416 "\"algorithm\":\"m.megolm.v1.aes-sha2\","
\r
1417 "\"room_id\":\"%s\","
\r
1418 "\"session_id\":\"%s\","
\r
1419 "\"session_key\":\"%s\""
\r
1427 MatrixClientSendToDevice(client,
\r
1437 MatrixClientGetMegolmOutSession(
\r
1438 MatrixClient * client,
\r
1439 const char * roomId,
\r
1440 MatrixMegolmOutSession ** outSession)
\r
1442 for (int i = 0; i < client->numMegolmOutSessions; i++)
\r
1444 if (strcmp(client->megolmOutSessions[i].roomId, roomId) == 0)
\r
1446 *outSession = &client->megolmOutSessions[i];
\r
1455 MatrixClientNewMegolmOutSession(
\r
1456 MatrixClient * client,
\r
1457 const char * roomId,
\r
1458 MatrixMegolmOutSession ** outSession)
\r
1460 if (client->numMegolmOutSessions < NUM_MEGOLM_SESSIONS)
\r
1462 MatrixMegolmOutSession * result =
\r
1463 &client->megolmOutSessions[client->numMegolmOutSessions];
\r
1465 MatrixMegolmOutSessionInit(result,
\r
1468 *outSession = result;
\r
1470 client->numMegolmOutSessions++;
\r
1479 MatrixClientGetMegolmInSession(
\r
1480 MatrixClient * client,
\r
1481 const char * roomId, int roomIdLen,
\r
1482 const char * sessionId, int sessionIdLen,
\r
1483 MatrixMegolmInSession ** outSession)
\r
1485 for (int i = 0; i < client->numMegolmInSessions; i++)
\r
1487 if (strncmp(client->megolmInSessions[i].roomId, roomId, roomIdLen) == 0 &&
\r
1488 strncmp(client->megolmInSessions[i].id, sessionId, sessionIdLen) == 0)
\r
1490 *outSession = &client->megolmInSessions[i];
\r
1499 MatrixClientNewMegolmInSession(
\r
1500 MatrixClient * client,
\r
1501 const char * roomId,
\r
1502 const char * sessionId,
\r
1503 const char * sessionKey,
\r
1504 MatrixMegolmInSession ** outSession)
\r
1506 if (client->numMegolmInSessions < NUM_MEGOLM_SESSIONS)
\r
1508 MatrixMegolmInSession * result =
\r
1509 &client->megolmInSessions[client->numMegolmInSessions];
\r
1511 MatrixMegolmInSessionInit(result,
\r
1514 sessionKey, strlen(sessionKey));
\r
1516 *outSession = result;
\r
1518 client->numMegolmInSessions++;
\r
1527 MatrixClientRequestMegolmInSession(
\r
1528 MatrixClient * client,
\r
1529 const char * roomId,
\r
1530 const char * sessionId,
\r
1531 const char * senderKey,
\r
1532 const char * userId,
\r
1533 const char * deviceId)
\r
1535 // TODO: cancel requests
\r
1536 MatrixClientSendDummy(client, userId, deviceId);
\r
1538 STATIC char event[ROOMKEY_REQUEST_SIZE];
\r
1539 snprintf(event, ROOMKEY_REQUEST_SIZE,
\r
1541 "\"action\":\"request\","
\r
1543 "\"algorithm\":\"m.megolm.v1.aes-sha2\","
\r
1544 "\"room_id\":\"%s\","
\r
1545 "\"sender_key\":\"%s\","
\r
1546 "\"session_id\":\"%s\""
\r
1548 "\"request_id\":\"%lld\","
\r
1549 "\"requesting_device_id\":\"%s\""
\r
1555 client->deviceId);
\r
1558 MatrixClientSendToDevice(client,
\r
1562 "m.room_key_request");
\r
1568 MatrixClientGetOlmSession(
\r
1569 MatrixClient * client,
\r
1570 const char * userId,
\r
1571 const char * deviceId,
\r
1572 MatrixOlmSession ** outSession)
\r
1574 (void)userId; //unused for now
\r
1576 for (int i = 0; i < client->numOlmSessions; i++)
\r
1578 if (strcmp(client->olmSessions[i].deviceId, deviceId) == 0)
\r
1580 *outSession = &client->olmSessions[i];
\r
1589 MatrixClientNewOlmSessionIn(
\r
1590 MatrixClient * client,
\r
1591 const char * userId,
\r
1592 const char * deviceId,
\r
1593 const char * encrypted,
\r
1594 MatrixOlmSession ** outSession)
\r
1596 (void)userId; //unused for now
\r
1598 if (client->numOlmSessions < NUM_OLM_SESSIONS)
\r
1600 STATIC char deviceKey[DEVICE_KEY_SIZE];
\r
1601 MatrixClientRequestDeviceKey(client,
\r
1603 deviceKey, DEVICE_KEY_SIZE);
\r
1605 MatrixOlmSessionFrom(
\r
1606 &client->olmSessions[client->numOlmSessions],
\r
1607 client->olmAccount.account,
\r
1612 *outSession = &client->olmSessions[client->numOlmSessions];
\r
1614 client->numOlmSessions++;
\r
1623 MatrixClientNewOlmSessionOut(
\r
1624 MatrixClient * client,
\r
1625 const char * userId,
\r
1626 const char * deviceId,
\r
1627 MatrixOlmSession ** outSession)
\r
1629 if (client->numOlmSessions < NUM_OLM_SESSIONS)
\r
1631 STATIC char deviceKey[DEVICE_KEY_SIZE];
\r
1632 MatrixClientRequestDeviceKey(client,
\r
1634 deviceKey, DEVICE_KEY_SIZE);
\r
1636 char onetimeKey[ONETIME_KEY_SIZE];
\r
1637 MatrixClientClaimOnetimeKey(client,
\r
1640 onetimeKey, ONETIME_KEY_SIZE);
\r
1642 MatrixOlmSessionTo(
\r
1643 &client->olmSessions[client->numOlmSessions],
\r
1644 client->olmAccount.account,
\r
1649 *outSession = &client->olmSessions[client->numOlmSessions];
\r
1651 client->numOlmSessions++;
\r
1659 // https://spec.matrix.org/v1.6/client-server-api/#put_matrixclientv3sendtodeviceeventtypetxnid
\r
1661 MatrixClientSendToDevice(
\r
1662 MatrixClient * client,
\r
1663 const char * userId,
\r
1664 const char * deviceId,
\r
1665 const char * message,
\r
1666 const char * msgType)
\r
1668 STATIC char requestUrl[MAX_URL_LEN];
\r
1669 sprintf(requestUrl,
\r
1670 TODEVICE_URL, msgType, (int)time(NULL));
\r
1672 snprintf(g_TodeviceEventBuffer, TODEVICE_EVENT_SIZE,
\r
1684 STATIC char responseBuffer[ROOM_SEND_RESPONSE_SIZE];
\r
1686 MatrixHttpPut(client->hc,
\r
1688 g_TodeviceEventBuffer,
\r
1689 responseBuffer, ROOM_SEND_RESPONSE_SIZE,
\r
1692 printf("%s\n", responseBuffer);
\r
1698 MatrixClientSendToDeviceEncrypted(
\r
1699 MatrixClient * client,
\r
1700 const char * userId,
\r
1701 const char * deviceId,
\r
1702 const char * message,
\r
1703 const char * msgType)
\r
1705 // get olm session
\r
1706 MatrixOlmSession * olmSession;
\r
1707 if (! MatrixClientGetOlmSession(client, userId, deviceId, &olmSession))
\r
1708 MatrixClientNewOlmSessionOut(client, userId, deviceId, &olmSession);
\r
1710 // create event json
\r
1711 char targetDeviceKey[DEVICE_KEY_SIZE];
\r
1712 MatrixClientRequestDeviceKey(client, deviceId, targetDeviceKey, DEVICE_KEY_SIZE);
\r
1713 char targetSigningKey[SIGNING_KEY_SIZE];
\r
1714 MatrixClientRequestSigningKey(client, deviceId, targetSigningKey, SIGNING_KEY_SIZE);
\r
1716 char thisSigningKey[DEVICE_KEY_SIZE];
\r
1717 MatrixOlmAccountGetSigningKey(&client->olmAccount, thisSigningKey, DEVICE_KEY_SIZE);
\r
1719 snprintf(g_TodeviceEventBuffer, TODEVICE_EVENT_SIZE,
\r
1721 "\"type\":\"%s\","
\r
1723 "\"sender\":\"%s\","
\r
1724 "\"recipient\":\"%s\","
\r
1725 "\"recipient_keys\":{"
\r
1726 "\"ed25519\":\"%s\""
\r
1729 "\"ed25519\":\"%s\""
\r
1735 userId, // recipient user id
\r
1736 targetSigningKey, // recipient device key
\r
1740 MatrixOlmSessionEncrypt(olmSession,
\r
1741 g_TodeviceEventBuffer,
\r
1742 g_EncryptedRequestBuffer, ENCRYPTED_REQUEST_SIZE);
\r
1744 char thisDeviceKey[DEVICE_KEY_SIZE];
\r
1745 MatrixOlmAccountGetDeviceKey(&client->olmAccount, thisDeviceKey, DEVICE_KEY_SIZE);
\r
1747 snprintf(g_EncryptedEventBuffer, ENCRYPTED_EVENT_SIZE,
\r
1749 "\"algorithm\":\"m.olm.v1.curve25519-aes-sha2\","
\r
1750 "\"ciphertext\":{"
\r
1752 "\"body\":\"%s\","
\r
1756 "\"device_id\":\"%s\","
\r
1757 "\"sender_key\":\"%s\""
\r
1760 // olm_encrypt_message_length(olmSession->session, strlen(g_TodeviceEventBuffer)), g_EncryptedRequestBuffer,
\r
1761 g_EncryptedRequestBuffer,
\r
1762 olm_session_has_received_message(olmSession->session),
\r
1767 return MatrixClientSendToDevice(
\r
1771 g_EncryptedEventBuffer,
\r
1772 "m.room.encrypted");
\r
1776 MatrixClientSendDummy(
\r
1777 MatrixClient * client,
\r
1778 const char * userId,
\r
1779 const char * deviceId)
\r
1781 return MatrixClientSendToDeviceEncrypted(
\r
1790 MatrixClientFindDevice(
\r
1791 MatrixClient * client,
\r
1792 const char * deviceId,
\r
1793 MatrixDevice ** outDevice)
\r
1795 for (int i = 0; i < client->numDevices; i++)
\r
1797 if (strcmp(client->devices[i].deviceId, deviceId) == 0)
\r
1799 *outDevice = &client->devices[i];
\r
1804 MatrixClientRequestDeviceKeys(client);
\r
1806 for (int i = 0; i < client->numDevices; i++)
\r
1808 if (strcmp(client->devices[i].deviceId, deviceId) == 0)
\r
1810 *outDevice = &client->devices[i];
\r
1815 *outDevice = NULL;
\r
1820 MatrixClientRequestDeviceKey(
\r
1821 MatrixClient * client,
\r
1822 const char * deviceId,
\r
1823 char * outDeviceKey, int outDeviceKeyCap)
\r
1825 MatrixDevice * device;
\r
1827 if (MatrixClientFindDevice(client, deviceId, &device))
\r
1829 strncpy(outDeviceKey, device->deviceKey, outDeviceKeyCap);
\r
1833 MatrixClientRequestDeviceKeys(client);
\r
1835 if (MatrixClientFindDevice(client, deviceId, &device))
\r
1837 strncpy(outDeviceKey, device->deviceKey, outDeviceKeyCap);
\r
1845 MatrixClientRequestSigningKey(
\r
1846 MatrixClient * client,
\r
1847 const char * deviceId,
\r
1848 char * outSigningKey, int outSigningKeyCap)
\r
1850 MatrixDevice * device;
\r
1852 if (MatrixClientFindDevice(client, deviceId, &device))
\r
1854 strncpy(outSigningKey, device->signingKey, outSigningKeyCap);
\r
1858 MatrixClientRequestDeviceKeys(client);
\r
1860 if (MatrixClientFindDevice(client, deviceId, &device))
\r
1862 strncpy(outSigningKey, device->signingKey, outSigningKeyCap);
\r
1870 MatrixClientRequestMasterKey(
\r
1871 MatrixClient * client,
\r
1872 char * outMasterKey, int outMasterKeyCap)
\r
1874 if (strlen(client->masterKey) > 0) {
\r
1875 strncpy(outMasterKey, outMasterKeyCap, client->masterKey);
\r
1879 MatrixClientRequestDeviceKeys(client);
\r
1881 if (strlen(client->masterKey) > 0) {
\r
1882 strncpy(outMasterKey, outMasterKeyCap, client->masterKey);
\r
1889 // https://spec.matrix.org/v1.6/client-server-api/#post_matrixclientv3keysquery
\r
1891 MatrixClientRequestDeviceKeys(
\r
1892 MatrixClient * client)
\r
1894 if (client->numDevices >= NUM_DEVICES) {
\r
1895 printf("Maximum number of devices reached\n");
\r
1899 STATIC char userIdEscaped[USER_ID_SIZE];
\r
1900 JsonEscape(client->userId, strlen(client->userId),
\r
1901 userIdEscaped, USER_ID_SIZE);
\r
1903 STATIC char request[KEYS_QUERY_REQUEST_SIZE];
\r
1904 snprintf(request, KEYS_QUERY_REQUEST_SIZE,
\r
1905 "{\"device_keys\":{\"%s\":[]}}", client->userId);
\r
1907 STATIC char responseBuffer[KEYS_QUERY_RESPONSE_SIZE];
\r
1908 bool requestResult = MatrixHttpPost(client->hc,
\r
1911 responseBuffer, KEYS_QUERY_RESPONSE_SIZE,
\r
1914 if (! requestResult)
\r
1917 // query for retrieving device keys for user id
\r
1918 STATIC char query[JSON_QUERY_SIZE];
\r
1922 snprintf(query, JSON_QUERY_SIZE,
\r
1923 "$.master_keys.%s.keys", userIdEscaped);
\r
1924 mjson_find(responseBuffer, strlen(responseBuffer),
\r
1925 query, &s, &slen);
\r
1927 int koff, klen, voff, vlen, vtype, off = 0;
\r
1928 for (off = 0; (off = mjson_next(s, slen, off, &koff, &klen,
\r
1929 &voff, &vlen, &vtype)) != 0; ) {
\r
1930 snprintf(client->masterKey, MASTER_KEY_SIZE,
\r
1931 "%.*s", vlen-2, s+voff+1);
\r
1933 printf("found master key: %s\n", client->masterKey);
\r
1936 snprintf(query, JSON_QUERY_SIZE,
\r
1937 "$.device_keys.%s", userIdEscaped);
\r
1939 mjson_find(responseBuffer, strlen(responseBuffer),
\r
1940 query, &s, &slen);
\r
1944 for (off = 0; (off = mjson_next(s, slen, off, &koff, &klen,
\r
1945 &voff, &vlen, &vtype)) != 0; ) {
\r
1946 const char * key = s + koff;
\r
1947 const char * val = s + voff;
\r
1949 // set device id, "key" is the JSON key
\r
1951 snprintf(d.deviceId, DEVICE_ID_SIZE,
\r
1952 "%.*s", klen-2, key+1);
\r
1954 // look for device key in value
\r
1955 STATIC char deviceKeyQuery[JSON_QUERY_SIZE];
\r
1956 snprintf(deviceKeyQuery, JSON_QUERY_SIZE,
\r
1957 "$.keys.curve25519:%s", d.deviceId);
\r
1958 mjson_get_string(val, vlen,
\r
1959 deviceKeyQuery, d.deviceKey, DEVICE_KEY_SIZE);
\r
1961 // look for signing key in value
\r
1962 STATIC char signingKeyQuery[JSON_QUERY_SIZE];
\r
1963 snprintf(signingKeyQuery, JSON_QUERY_SIZE,
\r
1964 "$.keys.ed25519:%s", d.deviceId);
\r
1965 mjson_get_string(val, vlen,
\r
1966 signingKeyQuery, d.signingKey, SIGNING_KEY_SIZE);
\r
1969 if (client->numDevices < NUM_DEVICES)
\r
1971 bool foundDevice = false;
\r
1972 for (int i = 0; i < client->numDevices; i++)
\r
1973 if (strcmp(client->devices[i].deviceId, d.deviceId) == 0)
\r
1974 foundDevice = true;
\r
1976 if (! foundDevice) {
\r
1977 printf("new device: %s %s %s\n", d.deviceId, d.deviceKey, d.signingKey);
\r
1978 client->devices[client->numDevices] = d;
\r
1979 client->numDevices++;
\r
1992 MatrixClientDeleteDevice(
\r
1993 MatrixClient * client)
\r
1995 STATIC char deleteRequest[1024];
\r
1996 snprintf(deleteRequest, 1024,
\r
1997 "{\"devices\":[\"%s\"]}",
\r
1998 client->deviceId);
\r
1999 STATIC char deleteResponse[1024];
\r
2000 bool res = MatrixHttpPost(client->hc, "/_matrix/client/v3/delete_devices",
\r
2001 deleteRequest, deleteResponse, 1024, true);
\r