mirror of
https://github.com/AsamK/signal-cli
synced 2025-08-28 18:10:38 +00:00
Update libsignal-service-java
This commit is contained in:
parent
6cc3a6f561
commit
e6113d4d96
11 changed files with 33 additions and 30 deletions
|
@ -3070,7 +3070,6 @@
|
|||
{
|
||||
"name":"org.whispersystems.signalservice.internal.storage.protos.GroupV2Record",
|
||||
"allDeclaredFields":true,
|
||||
"fields":[{"name":"archived"}, {"name":"avatarColor"}, {"name":"blocked"}, {"name":"dontNotifyForMentionsIfMuted"}, {"name":"hideStory"}, {"name":"markedUnread"}, {"name":"masterKey"}, {"name":"mutedUntilTimestamp"}, {"name":"storySendMode"}, {"name":"whitelisted"}],
|
||||
"methods":[{"name":"adapter","parameterTypes":[] }, {"name":"unknownFields","parameterTypes":[] }]
|
||||
},
|
||||
{
|
||||
|
|
|
@ -10,7 +10,7 @@ slf4j-api = { module = "org.slf4j:slf4j-api", version.ref = "slf4j" }
|
|||
slf4j-jul = { module = "org.slf4j:jul-to-slf4j", version.ref = "slf4j" }
|
||||
logback = "ch.qos.logback:logback-classic:1.5.18"
|
||||
|
||||
signalservice = "com.github.turasa:signal-service-java:2.15.3_unofficial_125"
|
||||
signalservice = "com.github.turasa:signal-service-java:2.15.3_unofficial_126"
|
||||
sqlite = "org.xerial:sqlite-jdbc:3.50.1.0"
|
||||
hikari = "com.zaxxer:HikariCP:6.3.0"
|
||||
junit-jupiter = "org.junit.jupiter:junit-jupiter:5.13.2"
|
||||
|
|
|
@ -2,7 +2,6 @@ package org.asamk.signal.manager.api;
|
|||
|
||||
import org.asamk.signal.manager.util.Utils;
|
||||
import org.signal.libsignal.protocol.InvalidKeyException;
|
||||
import org.signal.libsignal.protocol.ecc.Curve;
|
||||
import org.signal.libsignal.protocol.ecc.ECPublicKey;
|
||||
|
||||
import java.net.URI;
|
||||
|
@ -37,7 +36,7 @@ public record DeviceLinkUrl(String deviceIdentifier, ECPublicKey deviceKey) {
|
|||
}
|
||||
ECPublicKey deviceKey;
|
||||
try {
|
||||
deviceKey = Curve.decodePoint(publicKeyBytes, 0);
|
||||
deviceKey = new ECPublicKey(publicKeyBytes);
|
||||
} catch (InvalidKeyException e) {
|
||||
throw new InvalidDeviceLinkException("Invalid device link", e);
|
||||
}
|
||||
|
|
|
@ -2,7 +2,6 @@ package org.asamk.signal.manager.config;
|
|||
|
||||
import org.signal.libsignal.net.Network.Environment;
|
||||
import org.signal.libsignal.protocol.InvalidKeyException;
|
||||
import org.signal.libsignal.protocol.ecc.Curve;
|
||||
import org.signal.libsignal.protocol.ecc.ECPublicKey;
|
||||
import org.whispersystems.signalservice.api.push.TrustStore;
|
||||
import org.whispersystems.signalservice.internal.configuration.HttpProxy;
|
||||
|
@ -80,7 +79,7 @@ class LiveConfig {
|
|||
|
||||
static ECPublicKey getUnidentifiedSenderTrustRoot() {
|
||||
try {
|
||||
return Curve.decodePoint(UNIDENTIFIED_SENDER_TRUST_ROOT, 0);
|
||||
return new ECPublicKey(UNIDENTIFIED_SENDER_TRUST_ROOT);
|
||||
} catch (InvalidKeyException e) {
|
||||
throw new AssertionError(e);
|
||||
}
|
||||
|
|
|
@ -2,7 +2,6 @@ package org.asamk.signal.manager.config;
|
|||
|
||||
import org.signal.libsignal.net.Network;
|
||||
import org.signal.libsignal.protocol.InvalidKeyException;
|
||||
import org.signal.libsignal.protocol.ecc.Curve;
|
||||
import org.signal.libsignal.protocol.ecc.ECPublicKey;
|
||||
import org.whispersystems.signalservice.api.push.TrustStore;
|
||||
import org.whispersystems.signalservice.internal.configuration.HttpProxy;
|
||||
|
@ -80,7 +79,7 @@ class StagingConfig {
|
|||
|
||||
static ECPublicKey getUnidentifiedSenderTrustRoot() {
|
||||
try {
|
||||
return Curve.decodePoint(UNIDENTIFIED_SENDER_TRUST_ROOT, 0);
|
||||
return new ECPublicKey(UNIDENTIFIED_SENDER_TRUST_ROOT);
|
||||
} catch (InvalidKeyException e) {
|
||||
throw new AssertionError(e);
|
||||
}
|
||||
|
|
|
@ -9,6 +9,7 @@ import org.asamk.signal.manager.util.IOUtils;
|
|||
import org.signal.libsignal.protocol.InvalidMessageException;
|
||||
import org.slf4j.Logger;
|
||||
import org.slf4j.LoggerFactory;
|
||||
import org.whispersystems.signalservice.api.crypto.AttachmentCipherInputStream;
|
||||
import org.whispersystems.signalservice.api.messages.SignalServiceAttachment;
|
||||
import org.whispersystems.signalservice.api.messages.SignalServiceAttachmentPointer;
|
||||
import org.whispersystems.signalservice.api.messages.SignalServiceAttachmentStream;
|
||||
|
@ -138,9 +139,15 @@ public class AttachmentHelper {
|
|||
SignalServiceAttachmentPointer pointer,
|
||||
File tmpFile
|
||||
) throws IOException {
|
||||
if (pointer.getDigest().isEmpty()) {
|
||||
throw new IOException("Attachment pointer has no digest.");
|
||||
}
|
||||
try {
|
||||
return dependencies.getMessageReceiver()
|
||||
.retrieveAttachment(pointer, tmpFile, ServiceConfig.MAX_ATTACHMENT_SIZE);
|
||||
.retrieveAttachment(pointer,
|
||||
tmpFile,
|
||||
ServiceConfig.MAX_ATTACHMENT_SIZE,
|
||||
AttachmentCipherInputStream.IntegrityCheck.forEncryptedDigest(pointer.getDigest().get()));
|
||||
} catch (MissingConfigurationException | InvalidMessageException e) {
|
||||
throw new IOException(e);
|
||||
}
|
||||
|
|
|
@ -56,7 +56,10 @@ final class SignalWebSocketHealthMonitor implements HealthMonitor {
|
|||
.distinctUntilChanged()
|
||||
.subscribe(this::onStateChanged);
|
||||
|
||||
webSocket.setKeepAliveChangedListener(this::updateKeepAliveSenderStatus);
|
||||
webSocket.addKeepAliveChangeListener(() -> {
|
||||
executor.execute(this::updateKeepAliveSenderStatus);
|
||||
return Unit.INSTANCE;
|
||||
});
|
||||
});
|
||||
}
|
||||
|
||||
|
@ -78,7 +81,7 @@ final class SignalWebSocketHealthMonitor implements HealthMonitor {
|
|||
public void onMessageError(int status, boolean isIdentifiedWebSocket) {
|
||||
}
|
||||
|
||||
private Unit updateKeepAliveSenderStatus() {
|
||||
private void updateKeepAliveSenderStatus() {
|
||||
if (keepAliveSender == null && sendKeepAlives()) {
|
||||
keepAliveSender = new KeepAliveSender();
|
||||
keepAliveSender.start();
|
||||
|
@ -86,7 +89,6 @@ final class SignalWebSocketHealthMonitor implements HealthMonitor {
|
|||
keepAliveSender.shutdown();
|
||||
keepAliveSender = null;
|
||||
}
|
||||
return Unit.INSTANCE;
|
||||
}
|
||||
|
||||
private boolean sendKeepAlives() {
|
||||
|
|
|
@ -4,8 +4,9 @@ import org.asamk.signal.manager.storage.Database;
|
|||
import org.asamk.signal.manager.storage.Utils;
|
||||
import org.signal.libsignal.protocol.InvalidKeyException;
|
||||
import org.signal.libsignal.protocol.InvalidKeyIdException;
|
||||
import org.signal.libsignal.protocol.ecc.Curve;
|
||||
import org.signal.libsignal.protocol.ecc.ECKeyPair;
|
||||
import org.signal.libsignal.protocol.ecc.ECPrivateKey;
|
||||
import org.signal.libsignal.protocol.ecc.ECPublicKey;
|
||||
import org.signal.libsignal.protocol.state.PreKeyRecord;
|
||||
import org.slf4j.Logger;
|
||||
import org.slf4j.LoggerFactory;
|
||||
|
@ -176,8 +177,8 @@ public class PreKeyStore implements SignalServicePreKeyStore {
|
|||
private PreKeyRecord getPreKeyRecordFromResultSet(ResultSet resultSet) throws SQLException {
|
||||
try {
|
||||
final var keyId = resultSet.getInt("key_id");
|
||||
final var publicKey = Curve.decodePoint(resultSet.getBytes("public_key"), 0);
|
||||
final var privateKey = Curve.decodePrivatePoint(resultSet.getBytes("private_key"));
|
||||
final var publicKey = new ECPublicKey(resultSet.getBytes("public_key"));
|
||||
final var privateKey = new ECPrivateKey(resultSet.getBytes("private_key"));
|
||||
return new PreKeyRecord(keyId, new ECKeyPair(publicKey, privateKey));
|
||||
} catch (InvalidKeyException e) {
|
||||
return null;
|
||||
|
|
|
@ -4,8 +4,9 @@ import org.asamk.signal.manager.storage.Database;
|
|||
import org.asamk.signal.manager.storage.Utils;
|
||||
import org.signal.libsignal.protocol.InvalidKeyException;
|
||||
import org.signal.libsignal.protocol.InvalidKeyIdException;
|
||||
import org.signal.libsignal.protocol.ecc.Curve;
|
||||
import org.signal.libsignal.protocol.ecc.ECKeyPair;
|
||||
import org.signal.libsignal.protocol.ecc.ECPrivateKey;
|
||||
import org.signal.libsignal.protocol.ecc.ECPublicKey;
|
||||
import org.signal.libsignal.protocol.state.SignedPreKeyRecord;
|
||||
import org.slf4j.Logger;
|
||||
import org.slf4j.LoggerFactory;
|
||||
|
@ -238,8 +239,8 @@ public class SignedPreKeyStore implements org.signal.libsignal.protocol.state.Si
|
|||
private SignedPreKeyRecord getSignedPreKeyRecordFromResultSet(ResultSet resultSet) throws SQLException {
|
||||
try {
|
||||
final var keyId = resultSet.getInt("key_id");
|
||||
final var publicKey = Curve.decodePoint(resultSet.getBytes("public_key"), 0);
|
||||
final var privateKey = Curve.decodePrivatePoint(resultSet.getBytes("private_key"));
|
||||
final var publicKey = new ECPublicKey(resultSet.getBytes("public_key"));
|
||||
final var privateKey = new ECPrivateKey(resultSet.getBytes("private_key"));
|
||||
final var signature = resultSet.getBytes("signature");
|
||||
final var timestamp = resultSet.getLong("timestamp");
|
||||
return new SignedPreKeyRecord(keyId, timestamp, new ECKeyPair(publicKey, privateKey), signature);
|
||||
|
|
|
@ -4,7 +4,7 @@ import org.asamk.signal.manager.storage.SignalAccount;
|
|||
import org.signal.libsignal.protocol.IdentityKey;
|
||||
import org.signal.libsignal.protocol.IdentityKeyPair;
|
||||
import org.signal.libsignal.protocol.InvalidKeyException;
|
||||
import org.signal.libsignal.protocol.ecc.Curve;
|
||||
import org.signal.libsignal.protocol.ecc.ECKeyPair;
|
||||
import org.signal.libsignal.protocol.ecc.ECPrivateKey;
|
||||
import org.signal.libsignal.protocol.kem.KEMKeyPair;
|
||||
import org.signal.libsignal.protocol.kem.KEMKeyType;
|
||||
|
@ -33,8 +33,8 @@ public class KeyUtils {
|
|||
|
||||
public static IdentityKeyPair getIdentityKeyPair(byte[] publicKeyBytes, byte[] privateKeyBytes) {
|
||||
try {
|
||||
IdentityKey publicKey = new IdentityKey(publicKeyBytes);
|
||||
ECPrivateKey privateKey = Curve.decodePrivatePoint(privateKeyBytes);
|
||||
final var publicKey = new IdentityKey(publicKeyBytes);
|
||||
final var privateKey = new ECPrivateKey(privateKeyBytes);
|
||||
|
||||
return new IdentityKeyPair(publicKey, privateKey);
|
||||
} catch (InvalidKeyException e) {
|
||||
|
@ -43,7 +43,7 @@ public class KeyUtils {
|
|||
}
|
||||
|
||||
public static IdentityKeyPair generateIdentityKeyPair() {
|
||||
var djbKeyPair = Curve.generateKeyPair();
|
||||
var djbKeyPair = ECKeyPair.generate();
|
||||
var djbIdentityKey = new IdentityKey(djbKeyPair.getPublicKey());
|
||||
var djbPrivateKey = djbKeyPair.getPrivateKey();
|
||||
|
||||
|
@ -54,7 +54,7 @@ public class KeyUtils {
|
|||
var records = new ArrayList<PreKeyRecord>(PREKEY_BATCH_SIZE);
|
||||
for (var i = 0; i < PREKEY_BATCH_SIZE; i++) {
|
||||
var preKeyId = (offset + i) % PREKEY_MAXIMUM_ID;
|
||||
var keyPair = Curve.generateKeyPair();
|
||||
var keyPair = ECKeyPair.generate();
|
||||
var record = new PreKeyRecord(preKeyId, keyPair);
|
||||
|
||||
records.add(record);
|
||||
|
@ -66,13 +66,9 @@ public class KeyUtils {
|
|||
final int signedPreKeyId,
|
||||
final ECPrivateKey privateKey
|
||||
) {
|
||||
var keyPair = Curve.generateKeyPair();
|
||||
var keyPair = ECKeyPair.generate();
|
||||
byte[] signature;
|
||||
try {
|
||||
signature = Curve.calculateSignature(privateKey, keyPair.getPublicKey().serialize());
|
||||
} catch (InvalidKeyException e) {
|
||||
throw new AssertionError(e);
|
||||
}
|
||||
signature = privateKey.calculateSignature(keyPair.getPublicKey().serialize());
|
||||
return new SignedPreKeyRecord(signedPreKeyId, System.currentTimeMillis(), keyPair, signature);
|
||||
}
|
||||
|
||||
|
|
|
@ -8,7 +8,7 @@ public class BaseConfig {
|
|||
public static final String PROJECT_VERSION = BaseConfig.class.getPackage().getImplementationVersion();
|
||||
|
||||
static final String USER_AGENT_SIGNAL_ANDROID = Optional.ofNullable(System.getenv("SIGNAL_CLI_USER_AGENT"))
|
||||
.orElse("Signal-Android/7.46.1");
|
||||
.orElse("Signal-Android/7.47.1");
|
||||
static final String USER_AGENT_SIGNAL_CLI = PROJECT_NAME == null
|
||||
? "signal-cli"
|
||||
: PROJECT_NAME + "/" + PROJECT_VERSION;
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue