1 package org
.asamk
.signal
.manager
.helper
;
3 import org
.asamk
.signal
.manager
.config
.ServiceConfig
;
4 import org
.asamk
.signal
.manager
.internal
.SignalDependencies
;
5 import org
.asamk
.signal
.manager
.storage
.SignalAccount
;
6 import org
.asamk
.signal
.manager
.util
.KeyUtils
;
7 import org
.signal
.libsignal
.protocol
.IdentityKeyPair
;
8 import org
.signal
.libsignal
.protocol
.InvalidKeyIdException
;
9 import org
.signal
.libsignal
.protocol
.state
.KyberPreKeyRecord
;
10 import org
.signal
.libsignal
.protocol
.state
.PreKeyRecord
;
11 import org
.signal
.libsignal
.protocol
.state
.SignedPreKeyRecord
;
12 import org
.slf4j
.Logger
;
13 import org
.slf4j
.LoggerFactory
;
14 import org
.whispersystems
.signalservice
.api
.account
.PreKeyUpload
;
15 import org
.whispersystems
.signalservice
.api
.push
.ServiceIdType
;
16 import org
.whispersystems
.signalservice
.api
.push
.exceptions
.AuthorizationFailedException
;
17 import org
.whispersystems
.signalservice
.internal
.push
.OneTimePreKeyCounts
;
19 import java
.io
.IOException
;
20 import java
.util
.List
;
22 import static org
.asamk
.signal
.manager
.config
.ServiceConfig
.PREKEY_STALE_AGE
;
23 import static org
.asamk
.signal
.manager
.config
.ServiceConfig
.SIGNED_PREKEY_ROTATE_AGE
;
25 public class PreKeyHelper
{
27 private static final Logger logger
= LoggerFactory
.getLogger(PreKeyHelper
.class);
29 private final SignalAccount account
;
30 private final SignalDependencies dependencies
;
33 final SignalAccount account
, final SignalDependencies dependencies
35 this.account
= account
;
36 this.dependencies
= dependencies
;
39 public void refreshPreKeysIfNecessary() throws IOException
{
40 refreshPreKeysIfNecessary(ServiceIdType
.ACI
);
41 refreshPreKeysIfNecessary(ServiceIdType
.PNI
);
44 public void forceRefreshPreKeys() throws IOException
{
45 forceRefreshPreKeys(ServiceIdType
.ACI
);
46 forceRefreshPreKeys(ServiceIdType
.PNI
);
49 public void refreshPreKeysIfNecessary(ServiceIdType serviceIdType
) throws IOException
{
50 final var identityKeyPair
= account
.getIdentityKeyPair(serviceIdType
);
51 if (identityKeyPair
== null) {
54 final var accountId
= account
.getAccountId(serviceIdType
);
55 if (accountId
== null) {
59 if (refreshPreKeysIfNecessary(serviceIdType
, identityKeyPair
)) {
60 refreshPreKeysIfNecessary(serviceIdType
, identityKeyPair
);
64 public void forceRefreshPreKeys(ServiceIdType serviceIdType
) throws IOException
{
65 final var identityKeyPair
= account
.getIdentityKeyPair(serviceIdType
);
66 if (identityKeyPair
== null) {
69 final var accountId
= account
.getAccountId(serviceIdType
);
70 if (accountId
== null) {
74 final var counts
= new OneTimePreKeyCounts(0, 0);
75 if (refreshPreKeysIfNecessary(serviceIdType
, identityKeyPair
, counts
, true)) {
76 refreshPreKeysIfNecessary(serviceIdType
, identityKeyPair
, counts
, true);
80 private boolean refreshPreKeysIfNecessary(
81 final ServiceIdType serviceIdType
, final IdentityKeyPair identityKeyPair
82 ) throws IOException
{
83 OneTimePreKeyCounts preKeyCounts
;
85 preKeyCounts
= dependencies
.getAccountManager().getPreKeyCounts(serviceIdType
);
86 } catch (AuthorizationFailedException e
) {
87 logger
.debug("Failed to get pre key count, ignoring: " + e
.getClass().getSimpleName());
88 preKeyCounts
= new OneTimePreKeyCounts(0, 0);
91 return refreshPreKeysIfNecessary(serviceIdType
, identityKeyPair
, preKeyCounts
, false);
94 private boolean refreshPreKeysIfNecessary(
95 final ServiceIdType serviceIdType
,
96 final IdentityKeyPair identityKeyPair
,
97 final OneTimePreKeyCounts preKeyCounts
,
99 ) throws IOException
{
100 List
<PreKeyRecord
> preKeyRecords
= null;
101 if (force
|| preKeyCounts
.getEcCount() < ServiceConfig
.PREKEY_MINIMUM_COUNT
) {
102 logger
.debug("Refreshing {} ec pre keys, because only {} of min {} pre keys remain",
104 preKeyCounts
.getEcCount(),
105 ServiceConfig
.PREKEY_MINIMUM_COUNT
);
106 preKeyRecords
= generatePreKeys(serviceIdType
);
109 SignedPreKeyRecord signedPreKeyRecord
= null;
110 if (force
|| signedPreKeyNeedsRefresh(serviceIdType
)) {
111 logger
.debug("Refreshing {} signed pre key.", serviceIdType
);
112 signedPreKeyRecord
= generateSignedPreKey(serviceIdType
, identityKeyPair
);
115 List
<KyberPreKeyRecord
> kyberPreKeyRecords
= null;
116 if (force
|| preKeyCounts
.getKyberCount() < ServiceConfig
.PREKEY_MINIMUM_COUNT
) {
117 logger
.debug("Refreshing {} kyber pre keys, because only {} of min {} pre keys remain",
119 preKeyCounts
.getKyberCount(),
120 ServiceConfig
.PREKEY_MINIMUM_COUNT
);
121 kyberPreKeyRecords
= generateKyberPreKeys(serviceIdType
, identityKeyPair
);
124 KyberPreKeyRecord lastResortKyberPreKeyRecord
= null;
125 if (force
|| lastResortKyberPreKeyNeedsRefresh(serviceIdType
)) {
126 logger
.debug("Refreshing {} last resort kyber pre key.", serviceIdType
);
127 lastResortKyberPreKeyRecord
= generateLastResortKyberPreKey(serviceIdType
,
129 kyberPreKeyRecords
== null ?
0 : kyberPreKeyRecords
.size());
132 if (signedPreKeyRecord
== null
133 && preKeyRecords
== null
134 && lastResortKyberPreKeyRecord
== null
135 && kyberPreKeyRecords
== null) {
139 final var preKeyUpload
= new PreKeyUpload(serviceIdType
,
142 lastResortKyberPreKeyRecord
,
144 var needsReset
= false;
146 dependencies
.getAccountManager().setPreKeys(preKeyUpload
);
148 if (preKeyRecords
!= null) {
149 account
.addPreKeys(serviceIdType
, preKeyRecords
);
151 if (signedPreKeyRecord
!= null) {
152 account
.addSignedPreKey(serviceIdType
, signedPreKeyRecord
);
154 } catch (Exception e
) {
155 logger
.warn("Failed to store new pre keys, resetting preKey id offset", e
);
156 account
.resetPreKeyOffsets(serviceIdType
);
160 if (kyberPreKeyRecords
!= null) {
161 account
.addKyberPreKeys(serviceIdType
, kyberPreKeyRecords
);
163 if (lastResortKyberPreKeyRecord
!= null) {
164 account
.addLastResortKyberPreKey(serviceIdType
, lastResortKyberPreKeyRecord
);
166 } catch (Exception e
) {
167 logger
.warn("Failed to store new kyber pre keys, resetting preKey id offset", e
);
168 account
.resetKyberPreKeyOffsets(serviceIdType
);
171 } catch (AuthorizationFailedException e
) {
172 // This can happen when the primary device has changed phone number
173 logger
.warn("Failed to updated pre keys: {}", e
.getMessage());
178 public void cleanOldPreKeys() {
179 cleanOldPreKeys(ServiceIdType
.ACI
);
180 cleanOldPreKeys(ServiceIdType
.PNI
);
183 private void cleanOldPreKeys(final ServiceIdType serviceIdType
) {
184 cleanSignedPreKeys(serviceIdType
);
185 cleanOneTimePreKeys(serviceIdType
);
188 private List
<PreKeyRecord
> generatePreKeys(ServiceIdType serviceIdType
) {
189 final var accountData
= account
.getAccountData(serviceIdType
);
190 final var offset
= accountData
.getPreKeyMetadata().getNextPreKeyId();
192 return KeyUtils
.generatePreKeyRecords(offset
);
195 private boolean signedPreKeyNeedsRefresh(ServiceIdType serviceIdType
) {
196 final var accountData
= account
.getAccountData(serviceIdType
);
198 final var activeSignedPreKeyId
= accountData
.getPreKeyMetadata().getActiveSignedPreKeyId();
199 if (activeSignedPreKeyId
== -1) {
203 final var signedPreKeyRecord
= accountData
.getSignedPreKeyStore().loadSignedPreKey(activeSignedPreKeyId
);
204 return signedPreKeyRecord
.getTimestamp() < System
.currentTimeMillis() - SIGNED_PREKEY_ROTATE_AGE
;
205 } catch (InvalidKeyIdException e
) {
210 private SignedPreKeyRecord
generateSignedPreKey(ServiceIdType serviceIdType
, IdentityKeyPair identityKeyPair
) {
211 final var accountData
= account
.getAccountData(serviceIdType
);
212 final var signedPreKeyId
= accountData
.getPreKeyMetadata().getNextSignedPreKeyId();
214 return KeyUtils
.generateSignedPreKeyRecord(signedPreKeyId
, identityKeyPair
.getPrivateKey());
217 private List
<KyberPreKeyRecord
> generateKyberPreKeys(
218 ServiceIdType serviceIdType
, final IdentityKeyPair identityKeyPair
220 final var accountData
= account
.getAccountData(serviceIdType
);
221 final var offset
= accountData
.getPreKeyMetadata().getNextKyberPreKeyId();
223 return KeyUtils
.generateKyberPreKeyRecords(offset
, identityKeyPair
.getPrivateKey());
226 private boolean lastResortKyberPreKeyNeedsRefresh(ServiceIdType serviceIdType
) {
227 final var accountData
= account
.getAccountData(serviceIdType
);
229 final var activeLastResortKyberPreKeyId
= accountData
.getPreKeyMetadata().getActiveLastResortKyberPreKeyId();
230 if (activeLastResortKyberPreKeyId
== -1) {
234 final var kyberPreKeyRecord
= accountData
.getKyberPreKeyStore()
235 .loadKyberPreKey(activeLastResortKyberPreKeyId
);
236 return kyberPreKeyRecord
.getTimestamp() < System
.currentTimeMillis() - SIGNED_PREKEY_ROTATE_AGE
;
237 } catch (InvalidKeyIdException e
) {
242 private KyberPreKeyRecord
generateLastResortKyberPreKey(
243 ServiceIdType serviceIdType
, IdentityKeyPair identityKeyPair
, final int offset
245 final var accountData
= account
.getAccountData(serviceIdType
);
246 final var signedPreKeyId
= accountData
.getPreKeyMetadata().getNextKyberPreKeyId() + offset
;
248 return KeyUtils
.generateKyberPreKeyRecord(signedPreKeyId
, identityKeyPair
.getPrivateKey());
251 private void cleanSignedPreKeys(ServiceIdType serviceIdType
) {
252 final var accountData
= account
.getAccountData(serviceIdType
);
254 final var activeSignedPreKeyId
= accountData
.getPreKeyMetadata().getActiveSignedPreKeyId();
255 accountData
.getSignedPreKeyStore().removeOldSignedPreKeys(activeSignedPreKeyId
);
257 final var activeLastResortKyberPreKeyId
= accountData
.getPreKeyMetadata().getActiveLastResortKyberPreKeyId();
258 accountData
.getKyberPreKeyStore().removeOldLastResortKyberPreKeys(activeLastResortKyberPreKeyId
);
261 private void cleanOneTimePreKeys(ServiceIdType serviceIdType
) {
262 long threshold
= System
.currentTimeMillis() - PREKEY_STALE_AGE
;
265 final var accountData
= account
.getAccountData(serviceIdType
);
266 accountData
.getPreKeyStore().deleteAllStaleOneTimeEcPreKeys(threshold
, minCount
);
267 accountData
.getKyberPreKeyStore().deleteAllStaleOneTimeKyberPreKeys(threshold
, minCount
);