mirror of
https://github.com/AsamK/signal-cli
synced 2025-08-28 18:10:38 +00:00
Update libsignal-service-java
This commit is contained in:
parent
6cc3a6f561
commit
e6113d4d96
11 changed files with 33 additions and 30 deletions
|
@ -3070,7 +3070,6 @@
|
||||||
{
|
{
|
||||||
"name":"org.whispersystems.signalservice.internal.storage.protos.GroupV2Record",
|
"name":"org.whispersystems.signalservice.internal.storage.protos.GroupV2Record",
|
||||||
"allDeclaredFields":true,
|
"allDeclaredFields":true,
|
||||||
"fields":[{"name":"archived"}, {"name":"avatarColor"}, {"name":"blocked"}, {"name":"dontNotifyForMentionsIfMuted"}, {"name":"hideStory"}, {"name":"markedUnread"}, {"name":"masterKey"}, {"name":"mutedUntilTimestamp"}, {"name":"storySendMode"}, {"name":"whitelisted"}],
|
|
||||||
"methods":[{"name":"adapter","parameterTypes":[] }, {"name":"unknownFields","parameterTypes":[] }]
|
"methods":[{"name":"adapter","parameterTypes":[] }, {"name":"unknownFields","parameterTypes":[] }]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -10,7 +10,7 @@ slf4j-api = { module = "org.slf4j:slf4j-api", version.ref = "slf4j" }
|
||||||
slf4j-jul = { module = "org.slf4j:jul-to-slf4j", version.ref = "slf4j" }
|
slf4j-jul = { module = "org.slf4j:jul-to-slf4j", version.ref = "slf4j" }
|
||||||
logback = "ch.qos.logback:logback-classic:1.5.18"
|
logback = "ch.qos.logback:logback-classic:1.5.18"
|
||||||
|
|
||||||
signalservice = "com.github.turasa:signal-service-java:2.15.3_unofficial_125"
|
signalservice = "com.github.turasa:signal-service-java:2.15.3_unofficial_126"
|
||||||
sqlite = "org.xerial:sqlite-jdbc:3.50.1.0"
|
sqlite = "org.xerial:sqlite-jdbc:3.50.1.0"
|
||||||
hikari = "com.zaxxer:HikariCP:6.3.0"
|
hikari = "com.zaxxer:HikariCP:6.3.0"
|
||||||
junit-jupiter = "org.junit.jupiter:junit-jupiter:5.13.2"
|
junit-jupiter = "org.junit.jupiter:junit-jupiter:5.13.2"
|
||||||
|
|
|
@ -2,7 +2,6 @@ package org.asamk.signal.manager.api;
|
||||||
|
|
||||||
import org.asamk.signal.manager.util.Utils;
|
import org.asamk.signal.manager.util.Utils;
|
||||||
import org.signal.libsignal.protocol.InvalidKeyException;
|
import org.signal.libsignal.protocol.InvalidKeyException;
|
||||||
import org.signal.libsignal.protocol.ecc.Curve;
|
|
||||||
import org.signal.libsignal.protocol.ecc.ECPublicKey;
|
import org.signal.libsignal.protocol.ecc.ECPublicKey;
|
||||||
|
|
||||||
import java.net.URI;
|
import java.net.URI;
|
||||||
|
@ -37,7 +36,7 @@ public record DeviceLinkUrl(String deviceIdentifier, ECPublicKey deviceKey) {
|
||||||
}
|
}
|
||||||
ECPublicKey deviceKey;
|
ECPublicKey deviceKey;
|
||||||
try {
|
try {
|
||||||
deviceKey = Curve.decodePoint(publicKeyBytes, 0);
|
deviceKey = new ECPublicKey(publicKeyBytes);
|
||||||
} catch (InvalidKeyException e) {
|
} catch (InvalidKeyException e) {
|
||||||
throw new InvalidDeviceLinkException("Invalid device link", e);
|
throw new InvalidDeviceLinkException("Invalid device link", e);
|
||||||
}
|
}
|
||||||
|
|
|
@ -2,7 +2,6 @@ package org.asamk.signal.manager.config;
|
||||||
|
|
||||||
import org.signal.libsignal.net.Network.Environment;
|
import org.signal.libsignal.net.Network.Environment;
|
||||||
import org.signal.libsignal.protocol.InvalidKeyException;
|
import org.signal.libsignal.protocol.InvalidKeyException;
|
||||||
import org.signal.libsignal.protocol.ecc.Curve;
|
|
||||||
import org.signal.libsignal.protocol.ecc.ECPublicKey;
|
import org.signal.libsignal.protocol.ecc.ECPublicKey;
|
||||||
import org.whispersystems.signalservice.api.push.TrustStore;
|
import org.whispersystems.signalservice.api.push.TrustStore;
|
||||||
import org.whispersystems.signalservice.internal.configuration.HttpProxy;
|
import org.whispersystems.signalservice.internal.configuration.HttpProxy;
|
||||||
|
@ -80,7 +79,7 @@ class LiveConfig {
|
||||||
|
|
||||||
static ECPublicKey getUnidentifiedSenderTrustRoot() {
|
static ECPublicKey getUnidentifiedSenderTrustRoot() {
|
||||||
try {
|
try {
|
||||||
return Curve.decodePoint(UNIDENTIFIED_SENDER_TRUST_ROOT, 0);
|
return new ECPublicKey(UNIDENTIFIED_SENDER_TRUST_ROOT);
|
||||||
} catch (InvalidKeyException e) {
|
} catch (InvalidKeyException e) {
|
||||||
throw new AssertionError(e);
|
throw new AssertionError(e);
|
||||||
}
|
}
|
||||||
|
|
|
@ -2,7 +2,6 @@ package org.asamk.signal.manager.config;
|
||||||
|
|
||||||
import org.signal.libsignal.net.Network;
|
import org.signal.libsignal.net.Network;
|
||||||
import org.signal.libsignal.protocol.InvalidKeyException;
|
import org.signal.libsignal.protocol.InvalidKeyException;
|
||||||
import org.signal.libsignal.protocol.ecc.Curve;
|
|
||||||
import org.signal.libsignal.protocol.ecc.ECPublicKey;
|
import org.signal.libsignal.protocol.ecc.ECPublicKey;
|
||||||
import org.whispersystems.signalservice.api.push.TrustStore;
|
import org.whispersystems.signalservice.api.push.TrustStore;
|
||||||
import org.whispersystems.signalservice.internal.configuration.HttpProxy;
|
import org.whispersystems.signalservice.internal.configuration.HttpProxy;
|
||||||
|
@ -80,7 +79,7 @@ class StagingConfig {
|
||||||
|
|
||||||
static ECPublicKey getUnidentifiedSenderTrustRoot() {
|
static ECPublicKey getUnidentifiedSenderTrustRoot() {
|
||||||
try {
|
try {
|
||||||
return Curve.decodePoint(UNIDENTIFIED_SENDER_TRUST_ROOT, 0);
|
return new ECPublicKey(UNIDENTIFIED_SENDER_TRUST_ROOT);
|
||||||
} catch (InvalidKeyException e) {
|
} catch (InvalidKeyException e) {
|
||||||
throw new AssertionError(e);
|
throw new AssertionError(e);
|
||||||
}
|
}
|
||||||
|
|
|
@ -9,6 +9,7 @@ import org.asamk.signal.manager.util.IOUtils;
|
||||||
import org.signal.libsignal.protocol.InvalidMessageException;
|
import org.signal.libsignal.protocol.InvalidMessageException;
|
||||||
import org.slf4j.Logger;
|
import org.slf4j.Logger;
|
||||||
import org.slf4j.LoggerFactory;
|
import org.slf4j.LoggerFactory;
|
||||||
|
import org.whispersystems.signalservice.api.crypto.AttachmentCipherInputStream;
|
||||||
import org.whispersystems.signalservice.api.messages.SignalServiceAttachment;
|
import org.whispersystems.signalservice.api.messages.SignalServiceAttachment;
|
||||||
import org.whispersystems.signalservice.api.messages.SignalServiceAttachmentPointer;
|
import org.whispersystems.signalservice.api.messages.SignalServiceAttachmentPointer;
|
||||||
import org.whispersystems.signalservice.api.messages.SignalServiceAttachmentStream;
|
import org.whispersystems.signalservice.api.messages.SignalServiceAttachmentStream;
|
||||||
|
@ -138,9 +139,15 @@ public class AttachmentHelper {
|
||||||
SignalServiceAttachmentPointer pointer,
|
SignalServiceAttachmentPointer pointer,
|
||||||
File tmpFile
|
File tmpFile
|
||||||
) throws IOException {
|
) throws IOException {
|
||||||
|
if (pointer.getDigest().isEmpty()) {
|
||||||
|
throw new IOException("Attachment pointer has no digest.");
|
||||||
|
}
|
||||||
try {
|
try {
|
||||||
return dependencies.getMessageReceiver()
|
return dependencies.getMessageReceiver()
|
||||||
.retrieveAttachment(pointer, tmpFile, ServiceConfig.MAX_ATTACHMENT_SIZE);
|
.retrieveAttachment(pointer,
|
||||||
|
tmpFile,
|
||||||
|
ServiceConfig.MAX_ATTACHMENT_SIZE,
|
||||||
|
AttachmentCipherInputStream.IntegrityCheck.forEncryptedDigest(pointer.getDigest().get()));
|
||||||
} catch (MissingConfigurationException | InvalidMessageException e) {
|
} catch (MissingConfigurationException | InvalidMessageException e) {
|
||||||
throw new IOException(e);
|
throw new IOException(e);
|
||||||
}
|
}
|
||||||
|
|
|
@ -56,7 +56,10 @@ final class SignalWebSocketHealthMonitor implements HealthMonitor {
|
||||||
.distinctUntilChanged()
|
.distinctUntilChanged()
|
||||||
.subscribe(this::onStateChanged);
|
.subscribe(this::onStateChanged);
|
||||||
|
|
||||||
webSocket.setKeepAliveChangedListener(this::updateKeepAliveSenderStatus);
|
webSocket.addKeepAliveChangeListener(() -> {
|
||||||
|
executor.execute(this::updateKeepAliveSenderStatus);
|
||||||
|
return Unit.INSTANCE;
|
||||||
|
});
|
||||||
});
|
});
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -78,7 +81,7 @@ final class SignalWebSocketHealthMonitor implements HealthMonitor {
|
||||||
public void onMessageError(int status, boolean isIdentifiedWebSocket) {
|
public void onMessageError(int status, boolean isIdentifiedWebSocket) {
|
||||||
}
|
}
|
||||||
|
|
||||||
private Unit updateKeepAliveSenderStatus() {
|
private void updateKeepAliveSenderStatus() {
|
||||||
if (keepAliveSender == null && sendKeepAlives()) {
|
if (keepAliveSender == null && sendKeepAlives()) {
|
||||||
keepAliveSender = new KeepAliveSender();
|
keepAliveSender = new KeepAliveSender();
|
||||||
keepAliveSender.start();
|
keepAliveSender.start();
|
||||||
|
@ -86,7 +89,6 @@ final class SignalWebSocketHealthMonitor implements HealthMonitor {
|
||||||
keepAliveSender.shutdown();
|
keepAliveSender.shutdown();
|
||||||
keepAliveSender = null;
|
keepAliveSender = null;
|
||||||
}
|
}
|
||||||
return Unit.INSTANCE;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
private boolean sendKeepAlives() {
|
private boolean sendKeepAlives() {
|
||||||
|
|
|
@ -4,8 +4,9 @@ import org.asamk.signal.manager.storage.Database;
|
||||||
import org.asamk.signal.manager.storage.Utils;
|
import org.asamk.signal.manager.storage.Utils;
|
||||||
import org.signal.libsignal.protocol.InvalidKeyException;
|
import org.signal.libsignal.protocol.InvalidKeyException;
|
||||||
import org.signal.libsignal.protocol.InvalidKeyIdException;
|
import org.signal.libsignal.protocol.InvalidKeyIdException;
|
||||||
import org.signal.libsignal.protocol.ecc.Curve;
|
|
||||||
import org.signal.libsignal.protocol.ecc.ECKeyPair;
|
import org.signal.libsignal.protocol.ecc.ECKeyPair;
|
||||||
|
import org.signal.libsignal.protocol.ecc.ECPrivateKey;
|
||||||
|
import org.signal.libsignal.protocol.ecc.ECPublicKey;
|
||||||
import org.signal.libsignal.protocol.state.PreKeyRecord;
|
import org.signal.libsignal.protocol.state.PreKeyRecord;
|
||||||
import org.slf4j.Logger;
|
import org.slf4j.Logger;
|
||||||
import org.slf4j.LoggerFactory;
|
import org.slf4j.LoggerFactory;
|
||||||
|
@ -176,8 +177,8 @@ public class PreKeyStore implements SignalServicePreKeyStore {
|
||||||
private PreKeyRecord getPreKeyRecordFromResultSet(ResultSet resultSet) throws SQLException {
|
private PreKeyRecord getPreKeyRecordFromResultSet(ResultSet resultSet) throws SQLException {
|
||||||
try {
|
try {
|
||||||
final var keyId = resultSet.getInt("key_id");
|
final var keyId = resultSet.getInt("key_id");
|
||||||
final var publicKey = Curve.decodePoint(resultSet.getBytes("public_key"), 0);
|
final var publicKey = new ECPublicKey(resultSet.getBytes("public_key"));
|
||||||
final var privateKey = Curve.decodePrivatePoint(resultSet.getBytes("private_key"));
|
final var privateKey = new ECPrivateKey(resultSet.getBytes("private_key"));
|
||||||
return new PreKeyRecord(keyId, new ECKeyPair(publicKey, privateKey));
|
return new PreKeyRecord(keyId, new ECKeyPair(publicKey, privateKey));
|
||||||
} catch (InvalidKeyException e) {
|
} catch (InvalidKeyException e) {
|
||||||
return null;
|
return null;
|
||||||
|
|
|
@ -4,8 +4,9 @@ import org.asamk.signal.manager.storage.Database;
|
||||||
import org.asamk.signal.manager.storage.Utils;
|
import org.asamk.signal.manager.storage.Utils;
|
||||||
import org.signal.libsignal.protocol.InvalidKeyException;
|
import org.signal.libsignal.protocol.InvalidKeyException;
|
||||||
import org.signal.libsignal.protocol.InvalidKeyIdException;
|
import org.signal.libsignal.protocol.InvalidKeyIdException;
|
||||||
import org.signal.libsignal.protocol.ecc.Curve;
|
|
||||||
import org.signal.libsignal.protocol.ecc.ECKeyPair;
|
import org.signal.libsignal.protocol.ecc.ECKeyPair;
|
||||||
|
import org.signal.libsignal.protocol.ecc.ECPrivateKey;
|
||||||
|
import org.signal.libsignal.protocol.ecc.ECPublicKey;
|
||||||
import org.signal.libsignal.protocol.state.SignedPreKeyRecord;
|
import org.signal.libsignal.protocol.state.SignedPreKeyRecord;
|
||||||
import org.slf4j.Logger;
|
import org.slf4j.Logger;
|
||||||
import org.slf4j.LoggerFactory;
|
import org.slf4j.LoggerFactory;
|
||||||
|
@ -238,8 +239,8 @@ public class SignedPreKeyStore implements org.signal.libsignal.protocol.state.Si
|
||||||
private SignedPreKeyRecord getSignedPreKeyRecordFromResultSet(ResultSet resultSet) throws SQLException {
|
private SignedPreKeyRecord getSignedPreKeyRecordFromResultSet(ResultSet resultSet) throws SQLException {
|
||||||
try {
|
try {
|
||||||
final var keyId = resultSet.getInt("key_id");
|
final var keyId = resultSet.getInt("key_id");
|
||||||
final var publicKey = Curve.decodePoint(resultSet.getBytes("public_key"), 0);
|
final var publicKey = new ECPublicKey(resultSet.getBytes("public_key"));
|
||||||
final var privateKey = Curve.decodePrivatePoint(resultSet.getBytes("private_key"));
|
final var privateKey = new ECPrivateKey(resultSet.getBytes("private_key"));
|
||||||
final var signature = resultSet.getBytes("signature");
|
final var signature = resultSet.getBytes("signature");
|
||||||
final var timestamp = resultSet.getLong("timestamp");
|
final var timestamp = resultSet.getLong("timestamp");
|
||||||
return new SignedPreKeyRecord(keyId, timestamp, new ECKeyPair(publicKey, privateKey), signature);
|
return new SignedPreKeyRecord(keyId, timestamp, new ECKeyPair(publicKey, privateKey), signature);
|
||||||
|
|
|
@ -4,7 +4,7 @@ import org.asamk.signal.manager.storage.SignalAccount;
|
||||||
import org.signal.libsignal.protocol.IdentityKey;
|
import org.signal.libsignal.protocol.IdentityKey;
|
||||||
import org.signal.libsignal.protocol.IdentityKeyPair;
|
import org.signal.libsignal.protocol.IdentityKeyPair;
|
||||||
import org.signal.libsignal.protocol.InvalidKeyException;
|
import org.signal.libsignal.protocol.InvalidKeyException;
|
||||||
import org.signal.libsignal.protocol.ecc.Curve;
|
import org.signal.libsignal.protocol.ecc.ECKeyPair;
|
||||||
import org.signal.libsignal.protocol.ecc.ECPrivateKey;
|
import org.signal.libsignal.protocol.ecc.ECPrivateKey;
|
||||||
import org.signal.libsignal.protocol.kem.KEMKeyPair;
|
import org.signal.libsignal.protocol.kem.KEMKeyPair;
|
||||||
import org.signal.libsignal.protocol.kem.KEMKeyType;
|
import org.signal.libsignal.protocol.kem.KEMKeyType;
|
||||||
|
@ -33,8 +33,8 @@ public class KeyUtils {
|
||||||
|
|
||||||
public static IdentityKeyPair getIdentityKeyPair(byte[] publicKeyBytes, byte[] privateKeyBytes) {
|
public static IdentityKeyPair getIdentityKeyPair(byte[] publicKeyBytes, byte[] privateKeyBytes) {
|
||||||
try {
|
try {
|
||||||
IdentityKey publicKey = new IdentityKey(publicKeyBytes);
|
final var publicKey = new IdentityKey(publicKeyBytes);
|
||||||
ECPrivateKey privateKey = Curve.decodePrivatePoint(privateKeyBytes);
|
final var privateKey = new ECPrivateKey(privateKeyBytes);
|
||||||
|
|
||||||
return new IdentityKeyPair(publicKey, privateKey);
|
return new IdentityKeyPair(publicKey, privateKey);
|
||||||
} catch (InvalidKeyException e) {
|
} catch (InvalidKeyException e) {
|
||||||
|
@ -43,7 +43,7 @@ public class KeyUtils {
|
||||||
}
|
}
|
||||||
|
|
||||||
public static IdentityKeyPair generateIdentityKeyPair() {
|
public static IdentityKeyPair generateIdentityKeyPair() {
|
||||||
var djbKeyPair = Curve.generateKeyPair();
|
var djbKeyPair = ECKeyPair.generate();
|
||||||
var djbIdentityKey = new IdentityKey(djbKeyPair.getPublicKey());
|
var djbIdentityKey = new IdentityKey(djbKeyPair.getPublicKey());
|
||||||
var djbPrivateKey = djbKeyPair.getPrivateKey();
|
var djbPrivateKey = djbKeyPair.getPrivateKey();
|
||||||
|
|
||||||
|
@ -54,7 +54,7 @@ public class KeyUtils {
|
||||||
var records = new ArrayList<PreKeyRecord>(PREKEY_BATCH_SIZE);
|
var records = new ArrayList<PreKeyRecord>(PREKEY_BATCH_SIZE);
|
||||||
for (var i = 0; i < PREKEY_BATCH_SIZE; i++) {
|
for (var i = 0; i < PREKEY_BATCH_SIZE; i++) {
|
||||||
var preKeyId = (offset + i) % PREKEY_MAXIMUM_ID;
|
var preKeyId = (offset + i) % PREKEY_MAXIMUM_ID;
|
||||||
var keyPair = Curve.generateKeyPair();
|
var keyPair = ECKeyPair.generate();
|
||||||
var record = new PreKeyRecord(preKeyId, keyPair);
|
var record = new PreKeyRecord(preKeyId, keyPair);
|
||||||
|
|
||||||
records.add(record);
|
records.add(record);
|
||||||
|
@ -66,13 +66,9 @@ public class KeyUtils {
|
||||||
final int signedPreKeyId,
|
final int signedPreKeyId,
|
||||||
final ECPrivateKey privateKey
|
final ECPrivateKey privateKey
|
||||||
) {
|
) {
|
||||||
var keyPair = Curve.generateKeyPair();
|
var keyPair = ECKeyPair.generate();
|
||||||
byte[] signature;
|
byte[] signature;
|
||||||
try {
|
signature = privateKey.calculateSignature(keyPair.getPublicKey().serialize());
|
||||||
signature = Curve.calculateSignature(privateKey, keyPair.getPublicKey().serialize());
|
|
||||||
} catch (InvalidKeyException e) {
|
|
||||||
throw new AssertionError(e);
|
|
||||||
}
|
|
||||||
return new SignedPreKeyRecord(signedPreKeyId, System.currentTimeMillis(), keyPair, signature);
|
return new SignedPreKeyRecord(signedPreKeyId, System.currentTimeMillis(), keyPair, signature);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -8,7 +8,7 @@ public class BaseConfig {
|
||||||
public static final String PROJECT_VERSION = BaseConfig.class.getPackage().getImplementationVersion();
|
public static final String PROJECT_VERSION = BaseConfig.class.getPackage().getImplementationVersion();
|
||||||
|
|
||||||
static final String USER_AGENT_SIGNAL_ANDROID = Optional.ofNullable(System.getenv("SIGNAL_CLI_USER_AGENT"))
|
static final String USER_AGENT_SIGNAL_ANDROID = Optional.ofNullable(System.getenv("SIGNAL_CLI_USER_AGENT"))
|
||||||
.orElse("Signal-Android/7.46.1");
|
.orElse("Signal-Android/7.47.1");
|
||||||
static final String USER_AGENT_SIGNAL_CLI = PROJECT_NAME == null
|
static final String USER_AGENT_SIGNAL_CLI = PROJECT_NAME == null
|
||||||
? "signal-cli"
|
? "signal-cli"
|
||||||
: PROJECT_NAME + "/" + PROJECT_VERSION;
|
: PROJECT_NAME + "/" + PROJECT_VERSION;
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue