Crates.io | matrix-sdk-crypto |
lib.rs | matrix-sdk-crypto |
version | 0.8.0 |
source | src |
created_at | 2020-05-26 17:51:35.376197 |
updated_at | 2024-11-19 13:14:12.8958 |
description | Matrix encryption library |
homepage | https://github.com/matrix-org/matrix-rust-sdk |
repository | https://github.com/matrix-org/matrix-rust-sdk |
max_upload_size | |
id | 246287 |
size | 2,081,297 |
A no-network-IO implementation of a state machine that handles E2EE for Matrix clients.
If you're just trying to write a Matrix client or bot in Rust, you're probably looking for matrix-sdk instead.
However, if you're looking to add E2EE to an existing Matrix client or library, read on.
The state machine works in a push/pull manner:
use std::collections::BTreeMap;
use matrix_sdk_crypto::{EncryptionSyncChanges, OlmMachine, OlmError};
use ruma::{
api::client::sync::sync_events::{v3::ToDevice, DeviceLists},
device_id, user_id,
};
#[tokio::main]
async fn main() -> Result<(), OlmError> {
let alice = user_id!("@alice:example.org");
let machine = OlmMachine::new(&alice, device_id!("DEVICEID")).await;
let changed_devices = DeviceLists::default();
let one_time_key_counts = BTreeMap::default();
let unused_fallback_keys = Some(Vec::new());
let next_batch_token = "T0K3N".to_owned();
// Push changes that the server sent to us in a sync response.
let decrypted_to_device = machine.receive_sync_changes(EncryptionSyncChanges {
to_device_events: vec![],
changed_devices: &changed_devices,
one_time_keys_counts: &one_time_key_counts,
unused_fallback_keys: unused_fallback_keys.as_deref(),
next_batch_token: Some(next_batch_token),
}).await?;
// Pull requests that we need to send out.
let outgoing_requests = machine.outgoing_requests().await?;
// Send the requests here out and call machine.mark_request_as_sent().
Ok(())
}
The decision tree below visualizes the way this crate decides whether a message
key ("room key") will be forwarded to a requester upon a
key request, provided the automatic-room-key-forwarding
feature is enabled.
Key forwarding is sometimes also referred to as key gossiping.
The following crate feature flags are available:
qrcode
: Enbles QRcode generation and reading code
testing
: Provides facilities and functions for tests, in particular for integration testing store implementations. ATTENTION: do not ever use outside of tests, we do not provide any stability warantees on these, these are merely helpers. If you find you need any function provided here outside of tests, please open a Github Issue and inform us about your use case for us to consider.
_disable-minimum-rotation-period-ms
: Do not use except for testing. Disables the floor on the rotation period of room keys.