blob: a1d9a55fc16c01333a69022c1bab63c40e62c625 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
|
import { TruthKey, TruthSalt, TruthUuid } from "./crypto.js";
export interface RecoveryDocument {
// Human-readable name of the secret
secret_name?: string;
// Encrypted core secret.
encrypted_core_secret: string; // bytearray of undefined length
// List of escrow providers and selected authentication method.
escrow_methods: EscrowMethod[];
// List of possible decryption policies.
policies: DecryptionPolicy[];
}
export interface DecryptionPolicy {
// Salt included to encrypt master key share when
// using this decryption policy.
salt: string;
/**
* Master key, AES-encrypted with key derived from
* salt and keyshares revealed by the following list of
* escrow methods identified by UUID.
*/
master_key: string;
/**
* List of escrow methods identified by their UUID.
*/
uuids: string[];
}
export interface EscrowMethod {
/**
* URL of the escrow provider (including possibly this Anastasis server).
*/
url: string;
/**
* Type of the escrow method (e.g. security question, SMS etc.).
*/
escrow_type: string;
// UUID of the escrow method.
// 16 bytes base32-crock encoded.
uuid: TruthUuid;
// Key used to encrypt the Truth this EscrowMethod is related to.
// Client has to provide this key to the server when using /truth/.
truth_key: TruthKey;
/**
* Salt to hash the security question answer if applicable.
*/
truth_salt: TruthSalt;
// Salt from the provider to derive the user ID
// at this provider.
provider_salt: string;
// The instructions to give to the user (i.e. the security question
// if this is challenge-response).
instructions: string;
}
|