//TODO: Stolen from MDN (copyright...) function b64ToUint6 (nChr) { return nChr > 64 && nChr < 91 ? nChr - 65 : nChr > 96 && nChr < 123 ? nChr - 71 : nChr > 47 && nChr < 58 ? nChr + 4 : nChr === 43 ? 62 : nChr === 47 ? 63 : 0; } function base64DecToArr (sBase64, nBlocksSize) { var sB64Enc = sBase64.replace(/[^A-Za-z0-9\+\/]/g, ""), nInLen = sB64Enc.length, nOutLen = nBlocksSize ? Math.ceil((nInLen * 3 + 1 >> 2) / nBlocksSize) * nBlocksSize : nInLen * 3 + 1 >> 2; var aBBytes = new ArrayBuffer(nOutLen); var taBytes = new Uint8Array(aBBytes); for (var nMod3, nMod4, nUint24 = 0, nOutIdx = 0, nInIdx = 0; nInIdx < nInLen; nInIdx++) { nMod4 = nInIdx & 3; nUint24 |= b64ToUint6(sB64Enc.charCodeAt(nInIdx)) << 18 - 6 * nMod4; if (nMod4 === 3 || nInLen - nInIdx === 1) { for (nMod3 = 0; nMod3 < 3 && nOutIdx < nOutLen; nMod3++, nOutIdx++) { taBytes[nOutIdx] = nUint24 >>> (16 >>> nMod3 & 24) & 255; } nUint24 = 0; } } return aBBytes; } /********************************* *** Type conversion utilities *** *********************************/ // Strings/arrays var StaticByteBufferProto = new dcodeIO.ByteBuffer().__proto__; var StaticArrayBufferProto = new ArrayBuffer().__proto__; function getString(thing) { if (thing.__proto__ == StaticArrayBufferProto) return String.fromCharCode.apply(null, thing); if (thing != undefined && thing.__proto__ == StaticByteBufferProto) return thing.toString("utf8"); return thing; } function getArrayBuffer(string) { return base64DecToArr(btoa(string)); } function base64ToArrayBuffer(string) { return base64DecToArr(string); } // Protobuf decodingA //TODO: throw on missing fields everywhere var IncomingPushMessageProtobuf = dcodeIO.ProtoBuf.loadProtoFile("protos/IncomingPushMessageSignal.proto").build("textsecure.IncomingPushMessageSignal"); function decodeIncomingPushMessageProtobuf(string) { return IncomingPushMessageProtobuf.decode(btoa(string)); } var PushMessageContentProtobuf = dcodeIO.ProtoBuf.loadProtoFile("protos/IncomingPushMessageSignal.proto").build("textsecure.PushMessageContent"); function decodePushMessageContentProtobuf(string) { return PushMessageContentProtobuf.decode(btoa(string)); } var WhisperMessageProtobuf = dcodeIO.ProtoBuf.loadProtoFile("protos/WhisperTextProtocol.proto").build("textsecure.WhisperMessage"); function decodeWhisperMessageProtobuf(string) { return WhisperMessageProtobuf.decode(btoa(string)); } var PreKeyWhisperMessageProtobuf = dcodeIO.ProtoBuf.loadProtoFile("protos/WhisperTextProtocol.proto").build("textsecure.PreKeyWhisperMessage"); function decodePreKeyWhisperMessageProtobuf(string) { return PreKeyWhisperMessageProtobuf.decode(btoa(string)); } var KeyExchangeMessageProtobuf = dcodeIO.ProtoBuf.loadProtoFile("protos/WhisperTextProtocol.proto").build("textsecure.KeyExchangeMessage"); function decodeKeyExchangeMessageProtobuf(string) { return KeyExchangeMessageProtobuf.decode(btoa(string)); } // Number formatting function getNumberFromString(string) { return string.split(".")[0]; } function getEncodedNumber(number) { var split = number.split("."); if (split.length > 1) { if (split[1] == 1) return split[0]; else return number; } else return number; } function getDeviceId(encodedNumber) { var split = encodedNumber.split("."); if (split.length > 1) return split[1]; return 1; } // Other function timestampToHumanReadable(timestamp) { var date = new Date(); date.setTime(timestamp*1000); return date.toUTCString(); } function objectContainsKeys(object) { var count = 0; for (key in object) { count++; break; } return count != 0; } /************************************************ *** Utilities to store data in local storage *** ************************************************/ var storage = {}; storage.putEncrypted = function(key, value) { //TODO if (value === undefined) throw "Tried to store undefined"; localStorage.setItem("e" + key, JSON.stringify(getString(value))); } storage.getEncrypted = function(key, defaultValue) { //TODO var value = localStorage.getItem("e" + key); if (value === null) return defaultValue; return JSON.parse(value); } storage.removeEncrypted = function(key) { //TODO } storage.putUnencrypted = function(key, value) { if (value === undefined) throw "Tried to store undefined"; localStorage.setItem("u" + key, JSON.stringify(getString(value))); } storage.getUnencrypted = function(key, defaultValue) { var value = localStorage.getItem("u" + key); if (value === null) return defaultValue; return JSON.parse(value); } storage.removeUnencrypted = function(key) { //TODO } function registrationDone() { storage.putUnencrypted("registration_done", ""); //TODO: Fix dirty hack: chrome.runtime.reload(); } function isRegistrationDone() { return storage.getUnencrypted("registration_done") !== undefined; } function getMessageMap() { return storage.getEncrypted("messageMap", {}); } function storeMessage(outgoingMessageSignal) { var messageMap = getMessageMap(); var conversation = messageMap[outgoingMessageSignal.source]; //TODO: Also support Group message IDs here if (conversation === undefined) { conversation = [] messageMap[outgoingMessageSignal.source] = conversation; } conversation[conversation.length] = { message: getString(outgoingMessageSignal.message), destinations: outgoingMessageSignal.destinations, sender: outgoingMessageSignal.source, timestamp: outgoingMessageSignal.timestamp.div(dcodeIO.Long.fromNumber(1000)).toNumber() }; storage.putEncrypted("messageMap", messageMap); chrome.runtime.sendMessage(conversation[conversation.length - 1]); } function getDeviceObject(encodedNumber) { return storage.getEncrypted("deviceObject" + getEncodedNumber(encodedNumber)); } function getDeviceIdListFromNumber(number) { return storage.getEncrypted("deviceIdList" + getNumberFromString(number), []); } function addDeviceIdForNumber(number, deviceId) { var deviceIdList = getDeviceIdListFromNumber(getNumberFromString(number)); for (var i = 0; i < deviceIdList.length; i++) { if (deviceIdList[i] == deviceId) return; } deviceIdList[deviceIdList.length] = deviceId; storage.putEncrypted("deviceIdList" + getNumberFromString(number), deviceIdList); } // throws "Identity key mismatch" function saveDeviceObject(deviceObject) { var existing = getDeviceObject(deviceObject.encodedNumber); if (existing === undefined) existing = {encodedNumber: getEncodedNumber(deviceObject.encodedNumber)}; for (key in deviceObject) { if (key == "encodedNumber") continue; if (key == "identityKey" && deviceObject.identityKey != deviceObject.identityKey) throw "Identity key mismatch"; existing[key] = deviceObject[key]; } storage.putEncrypted("deviceObject" + getEncodedNumber(deviceObject.encodedNumber), existing); addDeviceIdForNumber(deviceObject.encodedNumber, getDeviceId(deviceObject.encodedNumber)); } function getDeviceObjectListFromNumber(number) { var deviceObjectList = []; var deviceIdList = getDeviceIdListFromNumber(number); for (var i = 0; i < deviceIdList.length; i++) deviceObjectList[deviceObjectList.length] = getDeviceObject(getNumberFromString(number) + "." + deviceIdList[i]); return deviceObjectList; } /********************** *** NaCL Interface *** **********************/ var onLoadCallbacks = []; var naclLoaded = 0; function registerOnLoadFunction(func) { if (naclLoaded) func(); onLoadCallbacks[onLoadCallbacks.length] = func; } var naclMessageNextId = 0; var naclMessageIdCallbackMap = {}; function moduleDidLoad() { common.hideModule(); naclLoaded = 1; for (var i = 0; i < onLoadCallbacks.length; i++) onLoadCallbacks[i](); onLoadCallbacks = []; } function handleMessage(message) { console.log("Got message"); console.log(message); naclMessageIdCallbackMap[message.data.call_id](message.data); } function postNaclMessage(message, callback) { naclMessageIdCallbackMap[naclMessageNextId] = callback; message.call_id = naclMessageNextId++; common.naclModule.postMessage(message); } /******************************************* *** Utilities to manage keys/randomness *** *******************************************/ function getRandomBytes(size) { //TODO: Better random (https://www.grc.com/r&d/js.htm?) try { var buffer = new ArrayBuffer(size); var array = new Uint8Array(buffer); window.crypto.getRandomValues(array); return buffer; } catch (err) { //TODO: ummm...wat? throw err; } } (function(crypto, $, undefined) { var createNewKeyPair = function(callback) { //TODO var privKey = getRandomBytes(32); privKey[0] &= 248; privKey[31] &= 127; privKey[31] |= 64; postNaclMessage({command: "bytesToPriv", priv: privKey}, function(message) { postNaclMessage({command: "privToPub", priv: message.res}, function(message) { callback({ pubKey: message.res, privKey: privKey }); }); }); } var crypto_storage = {}; crypto_storage.getNewPubKeySTORINGPrivKey = function(keyName, callback) { createNewKeyPair(function(keyPair) { storage.putEncrypted("25519Key" + keyName, keyPair); callback(keyPair.pubKey); }); } crypto_storage.getStoredPubKey = function(keyName) { return storage.getEncrypted("25519Key" + keyName, { pubKey: undefined }).pubKey; } crypto_storage.getStoredKeyPair = function(keyName) { return storage.getEncrypted("25519Key" + keyName); } crypto_storage.getAndRemoveStoredKeyPair = function(keyName) { var keyPair = this.getStoredKeyPair(keyName); storage.removeEncrypted("25519Key" + keyName); return keyPair; } crypto_storage.getAndRemovePreKeyPair = function(keyId) { return this.getAndRemoveStoredKeyPair("preKey" + keyId); } crypto_storage.getIdentityPrivKey = function() { return this.getStoredKeyPair("identityKey").privKey; } crypto_storage.saveSession = function(encodedNumber, session) { storage.putEncrypted("session" + getEncodedNumber(encodedNumber), session); } crypto_storage.getSession = function(encodedNumber) { return storage.getEncrypted("session" + getEncodedNumber(encodedNumber)); } /***************************** *** Internal Crypto stuff *** *****************************/ var ECDHE = function(pubKey, privKey) { return "ECDHE";//TODO } var HKDF = function(input, salt, info) { var hkdf = "HKDF(" + input + ", " + salt + ", " + info + ")"; //TODO return [ hkdf.substring(0, 32), hkdf.substring(32, 64) ]; } var HMACSHA256 = function(input, key) { //TODO: NativeA //TODO: return string return CryptoJS.HmacSHA256(input, CryptoJS.enc.Latin1.parse(getString(key))); } var verifyMACWithVersionByte = function(data, key, mac) { var calculated_mac = CryptoJS.algo.HMAC.create(CryptoJS.algo.SHA256, key); calculated_mac.update(CryptoJS.enc.Latin1.parse(String.fromCharCode(1))); calculated_mac.update(CryptoJS.enc.Latin1.parse(getString(data))); calculated_mac = calculated_mac.finalize(); if (btoa(calculated_mac.toString(CryptoJS.enc.Base64)).substring(0, mac.length) != mac) { console.log("Got message with bad MAC"); throw "Bad MAC"; } } /****************************** *** Ratchet implementation *** ******************************/ var initSession = function(isInitiator, theirIdentityPubKey, ourEphemeralPrivKey, theirEphemeralPubKey) { var ourIdentityPrivKey = crypto_storage.getIdentityPrivKey(); var sharedSecret = ECDHE(theirEphemeralPubKey, ourIdentityPrivKey); if (isInitiator) sharedSecret = sharedSecret + ECDHE(theirIdentityPubKey, ourEphemeralPrivKey); else sharedSecret = ECDHE(theirIdentityPubKey, ourEphemeralPrivKey) + sharedSecret; sharedSecret += ECDHE(theirEphemeralPubKey, ourEphemeralPrivKey); var masterKey = HKDF(sharedSecret, '', "WhisperText"); return { rootKey: masterKey[0], chainKey: masterKey[1] }; } var initSessionFromPreKeyWhisperMessage = function(encodedNumber, message) { //TODO: Check remote identity key matches known-good key var preKeyPair = crypto_storage.getAndRemovePreKeyPair(preKeyProto.preKeyId); if (preKeyPair === undefined) throw "Missing preKey for PreKeyWhisperMessage"; var firstRatchet = initSession(false, message.identityKey, preKeyPair.privKey, message.baseKey); var session = {currentRatchet: { rootKey: firstRatchet.rootKey, ephemeralKeyPair: preKeyPair, lastRemoteEphemeralKey: message.baseKey }, oldRatchetList: [] }; session[preKeyPair.pubKey] = { messageKeys: {}, chainKey: { counter: 0, key: firstRatchet.chainKey } }; storage.saveSession(encodedNumber, session); } var fillMessageKeys = function(chain, counter) { var messageKeys = chain.messageKeys; var key = chain.chainKey.key; for (var i = chain.chainKey.counter; i < counter; i++) { messageKeys[counter] = HMACSHA256(key, String.fromCharCode(1)); key = HMACSHA256(key, String.fromCharCode(2)); } chain.chainKey.key = key; chain.chainKey.counter = counter; } var maybeStepRatchet = function(session, remoteKey, previousCounter, callback) { if (sesion[remoteKey] !== undefined) //TODO: null??? return; var ratchet = session.currentRatchet; var previousRatchet = session[ratchet.lastRemoteEphemeralKey]; fillMessageKeys(previousRatchet, previousCounter); if (!objectContainsKeys(previousRatchet.messageKeys)) delete session[ratchet.lastRemoteEphemeralKey]; else session.oldRatchetList[session.oldRatchetList.length] = { added: new Date().getTime(), ephemeralKey: ratchet.lastRemoteEphemeralKey }; delete session[ratchet.ephemeralKeyPair.pubKey]; var masterKey = HKDF(ECDHE(remoteKey, ratchet.ephemeralKeyPair.privKey), ratchet.rootKey, "WhisperRatchet"); session[remoteKey] = { messageKeys: {}, chainKey: { counter: 0, key: masterKey.substring(32, 64) } }; createNewKeyPair(function(keyPair) { ratchet.ephemeralKeyPair = keyPair; masterKey = HKDF(ECDHE(remoteKey, ratchet.ephemeralKeyPair.privKey), masterKey.substring(0, 32), "WhisperRatchet"); ratchet.rootKey = masterKey.substring(0, 32); session[nextRatchet.ephemeralKeyPair.pubKey] = { messageKeys: {}, chainKey: { counter: 0, key: masterKey.substring(32, 64) } }; ratchet.lastRemoteEphemeralKey = remoteKey; callback(); }); } var doDecryptWhisperMessage = function(ciphertext, mac, messageKey, counter) { //TODO keys swapped? var keys = HKDF(messageKey, /* all 0x00 bytes????? */ '', "WhisperMessageKeys"); verifyMACWithVersionByte(ciphertext, keys[0], mac); return AES_CTR_NOPADDING(keys[1], CTR = counter, ciphertext); } // returns decrypted protobuf var decryptWhisperMessage = function(encodedNumber, messageBytes, callback) { var session = crypto_storage.getSession(encodedNumber); if (session === undefined) throw "No session currently open with " + encodedNumber; if (messageBytes[0] != String.fromCharCode(1)) throw "Bad version number on WhisperMessage"; var messageProto = messageBytes.substring(1, messageBytes.length - 8); var mac = messageBytes.substring(messageBytes.length - 8, messageBytes.length); var message = decodeWhisperMessageProtobuf(messageProto); maybeStepRatchet(session, getString(message.ephemeralKey), message.previousCounter, function() { var chain = session[getString(message.ephemeralKey)]; fillMessageKeys(chain, message.counter); var plaintext = doDecryptWhisperMessage(message.ciphertext, mac, chain.messageKeys[message.counter], message.counter); delete chain.messageKeys[message.counter]; removeOldChains(session); crypto_storage.saveSession(encodedNumber, session); callback(decodePushMessageContentProtobuf(atob(plaintext))); }); } /************************* *** Public crypto API *** *************************/ // Decrypts message into a raw string crypto.decryptWebsocketMessage = function(message) { //TODO: Use a native AES impl (so I dont feel so bad about side-channels) var signaling_key = storage.getEncrypted("signaling_key"); //TODO: in crypto_storage var aes_key = CryptoJS.enc.Latin1.parse(signaling_key.substring(0, 32));//TODO: UTF8 breaks this????? var mac_key = CryptoJS.enc.Latin1.parse(signaling_key.substring(32, 32 + 20)); //TODO: Can we drop the uint8array in favor of raw strings? var decodedMessage = base64ToUint8Array(message); if (decodedMessage[0] != 1) { console.log("Got bad version number: " + decodedMessage[0]); return; } var iv = CryptoJS.lib.WordArray.create(decodedMessage.subarray(1, 1 + 16)); var ciphertext = decodedMessage.subarray(1 + 16, decodedMessage.length - 10); var mac = CryptoJS.lib.WordArray.create(decodedMessage.subarray(decodedMessage.length - 10, decodedMessage.length)); var calculated_mac = CryptoJS.algo.HMAC.create(CryptoJS.algo.SHA256, mac_key); calculated_mac.update(CryptoJS.enc.Latin1.parse(String.fromCharCode(1))); calculated_mac.update(iv); calculated_mac.update(CryptoJS.lib.WordArray.create(ciphertext)); calculated_mac = calculated_mac.finalize(); if (calculated_mac.toString(CryptoJS.enc.Hex).substring(0, 20) != mac.toString(CryptoJS.enc.Hex)) { console.log("Got message with bad MAC"); throw "Bad MAC"; } var plaintext = CryptoJS.AES.decrypt(btoa(getString(ciphertext)), aes_key, {iv: iv});//TODO: Does this throw on invalid padding (seems not...) return atob(plaintext.toString(CryptoJS.enc.Base64)); } crypto.handleIncomingPushMessageProto = function(proto, callback) { switch(proto.type) { case 0: //TYPE_MESSAGE_PLAINTEXT callback(decodePushMessageContentProtobuf(getString(proto.message))); break; case 1: //TYPE_MESSAGE_CIPHERTEXT decryptWhisperMessage(proto.source, getString(proto.message), function(result) { callback(result); }); break; case 3: //TYPE_MESSAGE_PREKEY_BUNDLE var preKeyProto = decodePreKeyWhisperMessageProtobuf(getString(proto.message)); initSessionFromPreKeyWhisperMessage(proto.source, preKeyProto); decryptWhisperMessage(proto.source, getString(preKeyProto.message), function(result) { callback(result); }); break; } } crypto.encryptMessageFor = function(deviceObject, message) { return message + " encrypted to " + deviceObject.encodedNumber + " with relay " + deviceObject.relay + " with identityKey " + deviceObject.identityKey + " and public key " + deviceObject.publicKey; //TODO } var GENERATE_KEYS_KEYS_GENERATED = 100; crypto.generateKeys = function(callback) { var identityKey = crypto_storage.getStoredPubKey("identityKey"); var identityKeyCalculated = function(pubKey) { identityKey = pubKey; var firstKeyId = storage.getEncrypted("maxPreKeyId", -1) + 1; storage.putEncrypted("maxPreKeyId", firstKeyId + GENERATE_KEYS_KEYS_GENERATED); if (firstKeyId > 16777000) throw "You crazy motherfucker"; var keys = {}; keys.keys = []; var keysLeft = GENERATE_KEYS_KEYS_GENERATED; for (var i = firstKeyId; i < firstKeyId + GENERATE_KEYS_KEYS_GENERATED; i++) { crypto_storage.getNewPubKeySTORINGPrivKey("preKey" + i, function(pubKey) { keys.keys[i] = {keyId: i, publicKey: pubKey, identityKey: identityKey}; keysLeft--; if (keysLeft == 0) { // 0xFFFFFF == 16777215 keys.lastResortKey = {keyId: 16777215, publicKey: crypto_storage.getStoredPubKey("preKey16777215"), identityKey: identityKey};//TODO: Rotate lastResortKey if (keys.lastResortKey.publicKey === undefined) { crypto_storage.getNewPubKeySTORINGPrivKey("preKey16777215", function(pubKey) { keys.lastResortKey.publicKey = pubKey; callback(keys); }); } else callback(keys); } }); } } if (identityKey === undefined) crypto_storage.getNewPubKeySTORINGPrivKey("identityKey", function(pubKey) { identityKeyCalculated(pubKey); }); else identityKeyCalculated(pubKey); } }( window.crypto = window.crypto || {}, jQuery )); /************************************************ *** Utilities to communicate with the server *** ************************************************/ var URL_BASE = "http://textsecure-test.herokuapp.com"; var URL_CALLS = {}; URL_CALLS['accounts'] = "/v1/accounts"; URL_CALLS['devices'] = "/v1/devices"; URL_CALLS['keys'] = "/v1/keys"; URL_CALLS['push'] = "/v1/messagesocket"; URL_CALLS['messages'] = "/v1/messages/"; /** * REQUIRED PARAMS: * call: URL_CALLS entry * httpType: POST/GET/PUT/etc * OPTIONAL PARAMS: * success_callback: function(response object) called on success * error_callback: function(http status code = -1 or != 200) called on failure * urlParameters: crap appended to the url (probably including a leading /) * user: user name to be sent in a basic auth header * password: password to be sent in a basic auth headerA * do_auth: alternative to user/password where user/password are figured out automagically * jsonData: JSON data sent in the request body */ function doAjax(param) { if (param.urlParameters === undefined) param.urlParameters = ""; if (param.do_auth) { param.user = storage.getUnencrypted("number_id"); param.password = storage.getEncrypted("password"); } $.ajax(URL_BASE + URL_CALLS[param.call] + param.urlParameters, { type: param.httpType, data: JSON.stringify(param.jsonData), contentType: 'application/json; charset=utf-8', dataType: 'json', beforeSend: function(xhr) { if (param.user !== undefined && param.password !== undefined) xhr.setRequestHeader("Authorization", "Basic " + btoa(getString(param.user) + ":" + getString(param.password))); }, success: function(response, textStatus, jqXHR) { if (param.success_callback !== undefined) param.success_callback(response); }, error: function(jqXHR, textStatus, errorThrown) { var code = jqXHR.status; if (code == 200) {// happens sometimes when we get no response (TODO: Fix server to return 204? instead) if (param.success_callback !== undefined) param.success_callback(null); return; } if (code > 999 || code < 100) code = -1; if (param.error_callback !== undefined) param.error_callback(code); }, cache: false }); } // message_callback(decoded_protobuf) (use decodeMessage(proto)) function subscribeToPush(message_callback) { var user = storage.getUnencrypted("number_id"); var password = storage.getEncrypted("password"); var request = { url: URL_BASE + URL_CALLS['push'] + "/?user=%2B" + getString(user).substring(1) + "&password=" + getString(password), method: 'GET', fallbackMethod: 'GET', transport: 'websocket', fallbackTransport: 'websocket', logLevel: 'debug', //TODO trackMessageLength: false, //data: "user=" + getString(user) + "&password=" + getString(password), onOpen: function(response) { console.log('Connected to server using ' + response.transport); }, onMessage: function(response) { try { // Some bug in Atmosphere.js is forcing trackMessageLength to true var message = JSON.parse(response.responseBody.split("|")[1]); } catch (e) { console.log('Error parsing server JSON message: ' + response.responseBody.split("|")[1]); return; } var proto; try { var plaintext = crypto.decryptWebsocketMessage(message.message); var proto = decodeIncomingPushMessageProtobuf(plaintext); // After this point, a) decoding errors are not the server's fault, and // b) we should handle them gracefully and tell the user they received an invalid message doAjax({call: 'push', httpType: 'PUT', urlParameters: '/' + message.id, do_auth: true}); } catch (e) { console.log("Error decoding message: " + e); return; } try { crypto.handleIncomingPushMessageProto(proto, function(decrypted) { message_callback(decrypted); }); // Decrypts/decodes/fills in fields/etc } catch (e) { //TODO: Tell the user decryption failed } }, onError: function(response) { console.log('Server is down :('); //TODO: GUI }}; $.atmosphere.subscribe(request); } // success_callback(identity_key), error_callback(error_msg) function getKeysForNumber(number, success_callback, error_callback) { doAjax({call: 'keys', httpType: 'GET', do_auth: true, urlParameters: "/" + getNumberFromString(number) + "?multikeys", success_callback: function(response) { for (var i = 0; i < response.length; i++) { try { saveDeviceObject({ encodedNumber: number + "." + response[i].deviceId, identityKey: response[i].identityKey, publicKey: response[i].publicKey }); } catch (e) { error_callback(e); return; } } success_callback(response[0].identityKey); }, error_callback: function(code) { error_callback("Error making HTTP request: " + code); } }); } // success_callback(server success/failure map), error_callback(error_msg) function sendMessageToDevices(deviceObjectList, message, success_callback, error_callback) { if (message.type === undefined) message.type = 0; //TODO: Change to 1 for ciphertext instead of plaintext var jsonData = []; for (var i = 0; i < deviceObjectList.legnth; i++) { jsonData[jsonData.length] = { type: message.type, destination: deviceObjectList[i].encodedNumber, body: encryptMessageFor(deviceObjectList[i], message.message), //TODO: Protobuf? relay: deviceObjectList[i].relay, timestamp: new Date().getTime() }; } doAjax({call: 'messages', httpType: 'POST', do_auth: true, jsonData: jsonData, success_callback: function(result) { if (result.missingDeviceIds.length > 0) { var responsesLeft = result.missingDeviceIds.length; var errorThrown = 0; for (var i = 0; i < result.missingDeviceIds.length; i++) { getKeysForNumber(result.missingDeviceIds[i], function(identity_key) { responsesLeft--; if (responsesLeft == 0 && errorThrown == 0) sendMessageToDevices(deviceObjectList, message, success_callback, error_callback); }, function(error_msg) { errorThrown++; if (errorThrown == 1) error_callback("Failed to retreive new device keys for number " + result.missingDeviceIds[i]); }); } } else { success_callback(result); } }, error_callback: function(code) { error_callback("Failed to conect to data channel: " + code); } }); } // success_callback(success/failure map, see second-to-last line), error_callback(error_msg) function sendMessageToNumbers(numbers, message, success_callback, error_callback) { var deviceObjectList = []; var deviceDatasMissing = 0; var loopDone = 0; var errorThrown = 0; for (var i = 0; i < numbers.length; i++) { var devicesForNumber = getDeviceObjectListFromNumber(numbers[i]); for (var j = 0; j < devicesForNumber.length; j++) deviceObjectList[deviceObjectList.length] = devicesForNumber[j]; if (devicesForNumber.length == 0) { deviceDatasMissing++; getKeysForNumber(numbers[i], function(identity_key) { deviceDatasMissing--; if (deviceDatasMissing == 0 && loopDone && errorThrown == 0) sendMessageToNumbers(numbers, message, success_callback, error_callback); }, function(error_msg) { errorThrown++; if (errorThrown == 1) error_callback("Failed to retreive new device keys for number " + numbers[i]); }); } } if (deviceDatasMissing > 0 || errorThrown > 0) { loopDone = 1; return; } return sendMessageToDevices(deviceObjectList, message, function(result) { var successNumbers = {}; var failureNumbers = {}; for (var i = 0; i < result.success; i++) successNumbers[getNumberFromString(result.success[i])] = 1; for (var i = 0; i < result.failure; i++) failureNumbers[getNumberFromString(result.success[i])] = 1; success_callback({success: successNumbers, failure: failureNumbers}); }, error_callback); } function requestIdentityPrivKeyFromMasterDevice(number, identityKey) { sendMessageToDevices([getDeviceObject(getNumberFromString(number)) + ".1"], {message: "Identity Key request"}, function() {}, function() {});//TODO }