// // Copyright (c) 2018 Open Whisper Systems. All rights reserved. // #import "OWSVerificationStateSyncMessage.h" #import "OWSIdentityManager.h" #import #import NS_ASSUME_NONNULL_BEGIN #pragma mark - @interface OWSVerificationStateSyncMessage () @property (nonatomic, readonly) OWSVerificationState verificationState; @property (nonatomic, readonly) NSData *identityKey; @end #pragma mark - @implementation OWSVerificationStateSyncMessage - (instancetype)initWithVerificationState:(OWSVerificationState)verificationState identityKey:(NSData *)identityKey verificationForRecipientId:(NSString *)verificationForRecipientId { OWSAssertDebug(identityKey.length == kIdentityKeyLength); OWSAssertDebug(verificationForRecipientId.length > 0); // we only sync user's marking as un/verified. Never sync the conflicted state, the sibling device // will figure that out on it's own. OWSAssertDebug(verificationState != OWSVerificationStateNoLongerVerified); self = [super init]; if (!self) { return self; } _verificationState = verificationState; _identityKey = identityKey; _verificationForRecipientId = verificationForRecipientId; // This sync message should be 1-512 bytes longer than the corresponding NullMessage // we store this values so the corresponding NullMessage can subtract it from the total length. _paddingBytesLength = arc4random_uniform(512) + 1; return self; } - (nullable instancetype)initWithCoder:(NSCoder *)coder { return [super initWithCoder:coder]; } - (nullable SSKProtoSyncMessageBuilder *)syncMessageBuilder { OWSAssertDebug(self.identityKey.length == kIdentityKeyLength); OWSAssertDebug(self.verificationForRecipientId.length > 0); // we only sync user's marking as un/verified. Never sync the conflicted state, the sibling device // will figure that out on it's own. OWSAssertDebug(self.verificationState != OWSVerificationStateNoLongerVerified); // We add the same amount of padding in the VerificationStateSync message and it's coresponding NullMessage so that // the sync message is indistinguishable from an outgoing Sent transcript corresponding to the NullMessage. We pad // the NullMessage so as to obscure it's content. The sync message (like all sync messages) will be *additionally* // padded by the superclass while being sent. The end result is we send a NullMessage of a non-distinct size, and a // verification sync which is ~1-512 bytes larger then that. OWSAssertDebug(self.paddingBytesLength != 0); SSKProtoVerified *_Nullable verifiedProto = BuildVerifiedProtoWithRecipientId( self.verificationForRecipientId, self.identityKey, self.verificationState, self.paddingBytesLength); if (!verifiedProto) { OWSFailDebug(@"could not build protobuf."); return nil; } SSKProtoSyncMessageBuilder *syncMessageBuilder = [SSKProtoSyncMessageBuilder new]; [syncMessageBuilder setVerified:verifiedProto]; return syncMessageBuilder; } - (size_t)unpaddedVerifiedLength { OWSAssertDebug(self.identityKey.length == kIdentityKeyLength); OWSAssertDebug(self.verificationForRecipientId.length > 0); // we only sync user's marking as un/verified. Never sync the conflicted state, the sibling device // will figure that out on it's own. OWSAssertDebug(self.verificationState != OWSVerificationStateNoLongerVerified); SSKProtoVerified *_Nullable verifiedProto = BuildVerifiedProtoWithRecipientId( self.verificationForRecipientId, self.identityKey, self.verificationState, 0); if (!verifiedProto) { OWSFailDebug(@"could not build protobuf."); return 0; } NSError *error; NSData *_Nullable verifiedData = [verifiedProto serializedDataAndReturnError:&error]; if (error || !verifiedData) { OWSFailDebug(@"could not serialize protobuf."); return 0; } return verifiedData.length; } @end NS_ASSUME_NONNULL_END