1 package org
.asamk
.signal
.manager
.helper
;
3 import org
.asamk
.signal
.manager
.config
.ServiceConfig
;
4 import org
.asamk
.signal
.manager
.internal
.SignalDependencies
;
5 import org
.asamk
.signal
.manager
.storage
.SignalAccount
;
6 import org
.asamk
.signal
.manager
.util
.KeyUtils
;
7 import org
.signal
.libsignal
.protocol
.IdentityKeyPair
;
8 import org
.signal
.libsignal
.protocol
.InvalidKeyIdException
;
9 import org
.signal
.libsignal
.protocol
.state
.KyberPreKeyRecord
;
10 import org
.signal
.libsignal
.protocol
.state
.PreKeyRecord
;
11 import org
.signal
.libsignal
.protocol
.state
.SignedPreKeyRecord
;
12 import org
.slf4j
.Logger
;
13 import org
.slf4j
.LoggerFactory
;
14 import org
.whispersystems
.signalservice
.api
.account
.PreKeyUpload
;
15 import org
.whispersystems
.signalservice
.api
.push
.ServiceIdType
;
16 import org
.whispersystems
.signalservice
.api
.push
.exceptions
.AuthorizationFailedException
;
17 import org
.whispersystems
.signalservice
.api
.push
.exceptions
.NonSuccessfulResponseCodeException
;
18 import org
.whispersystems
.signalservice
.internal
.push
.OneTimePreKeyCounts
;
20 import java
.io
.IOException
;
21 import java
.util
.List
;
23 import static org
.asamk
.signal
.manager
.config
.ServiceConfig
.PREKEY_STALE_AGE
;
24 import static org
.asamk
.signal
.manager
.config
.ServiceConfig
.SIGNED_PREKEY_ROTATE_AGE
;
26 public class PreKeyHelper
{
28 private static final Logger logger
= LoggerFactory
.getLogger(PreKeyHelper
.class);
30 private final SignalAccount account
;
31 private final SignalDependencies dependencies
;
33 public PreKeyHelper(final SignalAccount account
, final SignalDependencies dependencies
) {
34 this.account
= account
;
35 this.dependencies
= dependencies
;
38 public void refreshPreKeysIfNecessary() throws IOException
{
39 refreshPreKeysIfNecessary(ServiceIdType
.ACI
);
40 refreshPreKeysIfNecessary(ServiceIdType
.PNI
);
43 public void forceRefreshPreKeys() throws IOException
{
44 forceRefreshPreKeys(ServiceIdType
.ACI
);
45 forceRefreshPreKeys(ServiceIdType
.PNI
);
48 public void refreshPreKeysIfNecessary(ServiceIdType serviceIdType
) throws IOException
{
49 final var identityKeyPair
= account
.getIdentityKeyPair(serviceIdType
);
50 if (identityKeyPair
== null) {
53 final var accountId
= account
.getAccountId(serviceIdType
);
54 if (accountId
== null) {
58 if (refreshPreKeysIfNecessary(serviceIdType
, identityKeyPair
)) {
59 refreshPreKeysIfNecessary(serviceIdType
, identityKeyPair
);
63 public void forceRefreshPreKeys(ServiceIdType serviceIdType
) throws IOException
{
64 final var identityKeyPair
= account
.getIdentityKeyPair(serviceIdType
);
65 if (identityKeyPair
== null) {
68 final var accountId
= account
.getAccountId(serviceIdType
);
69 if (accountId
== null) {
73 final var counts
= new OneTimePreKeyCounts(0, 0);
74 if (refreshPreKeysIfNecessary(serviceIdType
, identityKeyPair
, counts
, true)) {
75 refreshPreKeysIfNecessary(serviceIdType
, identityKeyPair
, counts
, true);
79 private boolean refreshPreKeysIfNecessary(
80 final ServiceIdType serviceIdType
,
81 final IdentityKeyPair identityKeyPair
82 ) throws IOException
{
83 OneTimePreKeyCounts preKeyCounts
;
85 preKeyCounts
= dependencies
.getAccountManager().getPreKeyCounts(serviceIdType
);
86 } catch (AuthorizationFailedException e
) {
87 logger
.debug("Failed to get pre key count, ignoring: " + e
.getClass().getSimpleName());
88 preKeyCounts
= new OneTimePreKeyCounts(0, 0);
91 return refreshPreKeysIfNecessary(serviceIdType
, identityKeyPair
, preKeyCounts
, false);
94 private boolean refreshPreKeysIfNecessary(
95 final ServiceIdType serviceIdType
,
96 final IdentityKeyPair identityKeyPair
,
97 final OneTimePreKeyCounts preKeyCounts
,
99 ) throws IOException
{
100 List
<PreKeyRecord
> preKeyRecords
= null;
101 if (force
|| preKeyCounts
.getEcCount() < ServiceConfig
.PREKEY_MINIMUM_COUNT
) {
102 logger
.debug("Refreshing {} ec pre keys, because only {} of min {} pre keys remain",
104 preKeyCounts
.getEcCount(),
105 ServiceConfig
.PREKEY_MINIMUM_COUNT
);
106 preKeyRecords
= generatePreKeys(serviceIdType
);
109 SignedPreKeyRecord signedPreKeyRecord
= null;
110 if (force
|| signedPreKeyNeedsRefresh(serviceIdType
)) {
111 logger
.debug("Refreshing {} signed pre key.", serviceIdType
);
112 signedPreKeyRecord
= generateSignedPreKey(serviceIdType
, identityKeyPair
);
115 List
<KyberPreKeyRecord
> kyberPreKeyRecords
= null;
116 if (force
|| preKeyCounts
.getKyberCount() < ServiceConfig
.PREKEY_MINIMUM_COUNT
) {
117 logger
.debug("Refreshing {} kyber pre keys, because only {} of min {} pre keys remain",
119 preKeyCounts
.getKyberCount(),
120 ServiceConfig
.PREKEY_MINIMUM_COUNT
);
121 kyberPreKeyRecords
= generateKyberPreKeys(serviceIdType
, identityKeyPair
);
124 KyberPreKeyRecord lastResortKyberPreKeyRecord
= null;
125 if (force
|| lastResortKyberPreKeyNeedsRefresh(serviceIdType
)) {
126 logger
.debug("Refreshing {} last resort kyber pre key.", serviceIdType
);
127 lastResortKyberPreKeyRecord
= generateLastResortKyberPreKey(serviceIdType
,
129 kyberPreKeyRecords
== null ?
0 : kyberPreKeyRecords
.size());
132 if (signedPreKeyRecord
== null
133 && preKeyRecords
== null
134 && lastResortKyberPreKeyRecord
== null
135 && kyberPreKeyRecords
== null) {
139 final var preKeyUpload
= new PreKeyUpload(serviceIdType
,
142 lastResortKyberPreKeyRecord
,
144 var needsReset
= false;
146 dependencies
.getAccountManager().setPreKeys(preKeyUpload
);
148 if (preKeyRecords
!= null) {
149 account
.addPreKeys(serviceIdType
, preKeyRecords
);
151 if (signedPreKeyRecord
!= null) {
152 account
.addSignedPreKey(serviceIdType
, signedPreKeyRecord
);
154 } catch (Exception e
) {
155 logger
.warn("Failed to store new pre keys, resetting preKey id offset", e
);
156 account
.resetPreKeyOffsets(serviceIdType
);
160 if (kyberPreKeyRecords
!= null) {
161 account
.addKyberPreKeys(serviceIdType
, kyberPreKeyRecords
);
163 if (lastResortKyberPreKeyRecord
!= null) {
164 account
.addLastResortKyberPreKey(serviceIdType
, lastResortKyberPreKeyRecord
);
166 } catch (Exception e
) {
167 logger
.warn("Failed to store new kyber pre keys, resetting preKey id offset", e
);
168 account
.resetKyberPreKeyOffsets(serviceIdType
);
171 } catch (AuthorizationFailedException e
) {
172 // This can happen when the primary device has changed phone number
173 logger
.warn("Failed to updated pre keys: {}", e
.getMessage());
174 } catch (NonSuccessfulResponseCodeException e
) {
175 if (serviceIdType
!= ServiceIdType
.PNI
|| e
.code
!= 422) {
178 logger
.warn("Failed to set PNI pre keys, ignoring for now. Account needs to be reregistered to fix this.");
183 public void cleanOldPreKeys() {
184 cleanOldPreKeys(ServiceIdType
.ACI
);
185 cleanOldPreKeys(ServiceIdType
.PNI
);
188 private void cleanOldPreKeys(final ServiceIdType serviceIdType
) {
189 cleanSignedPreKeys(serviceIdType
);
190 cleanOneTimePreKeys(serviceIdType
);
193 private List
<PreKeyRecord
> generatePreKeys(ServiceIdType serviceIdType
) {
194 final var accountData
= account
.getAccountData(serviceIdType
);
195 final var offset
= accountData
.getPreKeyMetadata().getNextPreKeyId();
197 return KeyUtils
.generatePreKeyRecords(offset
);
200 private boolean signedPreKeyNeedsRefresh(ServiceIdType serviceIdType
) {
201 final var accountData
= account
.getAccountData(serviceIdType
);
203 final var activeSignedPreKeyId
= accountData
.getPreKeyMetadata().getActiveSignedPreKeyId();
204 if (activeSignedPreKeyId
== -1) {
208 final var signedPreKeyRecord
= accountData
.getSignedPreKeyStore().loadSignedPreKey(activeSignedPreKeyId
);
209 return signedPreKeyRecord
.getTimestamp() < System
.currentTimeMillis() - SIGNED_PREKEY_ROTATE_AGE
;
210 } catch (InvalidKeyIdException e
) {
215 private SignedPreKeyRecord
generateSignedPreKey(ServiceIdType serviceIdType
, IdentityKeyPair identityKeyPair
) {
216 final var accountData
= account
.getAccountData(serviceIdType
);
217 final var signedPreKeyId
= accountData
.getPreKeyMetadata().getNextSignedPreKeyId();
219 return KeyUtils
.generateSignedPreKeyRecord(signedPreKeyId
, identityKeyPair
.getPrivateKey());
222 private List
<KyberPreKeyRecord
> generateKyberPreKeys(
223 ServiceIdType serviceIdType
,
224 final IdentityKeyPair identityKeyPair
226 final var accountData
= account
.getAccountData(serviceIdType
);
227 final var offset
= accountData
.getPreKeyMetadata().getNextKyberPreKeyId();
229 return KeyUtils
.generateKyberPreKeyRecords(offset
, identityKeyPair
.getPrivateKey());
232 private boolean lastResortKyberPreKeyNeedsRefresh(ServiceIdType serviceIdType
) {
233 final var accountData
= account
.getAccountData(serviceIdType
);
235 final var activeLastResortKyberPreKeyId
= accountData
.getPreKeyMetadata().getActiveLastResortKyberPreKeyId();
236 if (activeLastResortKyberPreKeyId
== -1) {
240 final var kyberPreKeyRecord
= accountData
.getKyberPreKeyStore()
241 .loadKyberPreKey(activeLastResortKyberPreKeyId
);
242 return kyberPreKeyRecord
.getTimestamp() < System
.currentTimeMillis() - SIGNED_PREKEY_ROTATE_AGE
;
243 } catch (InvalidKeyIdException e
) {
248 private KyberPreKeyRecord
generateLastResortKyberPreKey(
249 ServiceIdType serviceIdType
,
250 IdentityKeyPair identityKeyPair
,
253 final var accountData
= account
.getAccountData(serviceIdType
);
254 final var signedPreKeyId
= accountData
.getPreKeyMetadata().getNextKyberPreKeyId() + offset
;
256 return KeyUtils
.generateKyberPreKeyRecord(signedPreKeyId
, identityKeyPair
.getPrivateKey());
259 private void cleanSignedPreKeys(ServiceIdType serviceIdType
) {
260 final var accountData
= account
.getAccountData(serviceIdType
);
262 final var activeSignedPreKeyId
= accountData
.getPreKeyMetadata().getActiveSignedPreKeyId();
263 accountData
.getSignedPreKeyStore().removeOldSignedPreKeys(activeSignedPreKeyId
);
265 final var activeLastResortKyberPreKeyId
= accountData
.getPreKeyMetadata().getActiveLastResortKyberPreKeyId();
266 accountData
.getKyberPreKeyStore().removeOldLastResortKyberPreKeys(activeLastResortKyberPreKeyId
);
269 private void cleanOneTimePreKeys(ServiceIdType serviceIdType
) {
270 long threshold
= System
.currentTimeMillis() - PREKEY_STALE_AGE
;
273 final var accountData
= account
.getAccountData(serviceIdType
);
274 accountData
.getPreKeyStore().deleteAllStaleOneTimeEcPreKeys(threshold
, minCount
);
275 accountData
.getKyberPreKeyStore().deleteAllStaleOneTimeKyberPreKeys(threshold
, minCount
);