37 lines
1.5 KiB
Dart
37 lines
1.5 KiB
Dart
abstract class OmemoError {}
|
|
|
|
/// Triggered during X3DH if the signature if the SPK does verify to the actual SPK.
|
|
class InvalidKeyExchangeSignatureError extends OmemoError {}
|
|
|
|
/// Triggered by the Double Ratchet if the computed HMAC does not match the attached HMAC.
|
|
class InvalidMessageHMACError extends OmemoError {}
|
|
|
|
/// Triggered by the Double Ratchet if skipping messages would cause skipping more than
|
|
/// MAXSKIP messages
|
|
class SkippingTooManyKeysError extends OmemoError {}
|
|
|
|
/// Triggered by the Session Manager if the message key is not encrypted for the device.
|
|
class NotEncryptedForDeviceError extends OmemoError {}
|
|
|
|
/// Triggered by the Session Manager when the identifier of the used Signed Prekey
|
|
/// is neither the current SPK's identifier nor the old one's.
|
|
class UnknownSignedPrekeyError extends OmemoError {}
|
|
|
|
/// Triggered by the OmemoManager when we could not encrypt a message as we have
|
|
/// no key material available. That happens, for example, when we want to create a
|
|
/// ratchet session with a JID we had no session with but fetching the device bundle
|
|
/// failed.
|
|
class NoKeyMaterialAvailableError extends OmemoError {}
|
|
|
|
/// A non-key-exchange message was received that was encrypted for our device, but we have no ratchet with
|
|
/// the device that sent the message.
|
|
class NoSessionWithDeviceError extends OmemoError {}
|
|
|
|
/// Caused when the AES-256 CBC decryption failed.
|
|
class MalformedCiphertextError extends OmemoError {
|
|
MalformedCiphertextError(this.ex);
|
|
|
|
/// The exception that was raised while decryption.
|
|
final Object ex;
|
|
}
|