Struct matrix_sdk_crypto::Device [−][src]
pub struct Device { /* fields omitted */ }
Expand description
A device represents a E2EE capable client of an user.
Implementations
Start a interactive verification with this Device
Returns a Sas
object and a to-device request that needs to be sent
out.
This method has been deprecated in the spec and the
request_verification()
method should be used instead.
pub async fn request_verification(
&self
) -> (VerificationRequest, OutgoingVerificationRequest)
pub async fn request_verification(
&self
) -> (VerificationRequest, OutgoingVerificationRequest)
Request an interacitve verification with this Device
Returns a VerificationRequest
object and a to-device request that
needs to be sent out.
pub async fn request_verification_with_methods(
&self,
methods: Vec<VerificationMethod>
) -> (VerificationRequest, OutgoingVerificationRequest)
pub async fn request_verification_with_methods(
&self,
methods: Vec<VerificationMethod>
) -> (VerificationRequest, OutgoingVerificationRequest)
Request an interacitve verification with this Device
Returns a VerificationRequest
object and a to-device request that
needs to be sent out.
Arguments
methods
- The verification methods that we want to support.
Is this device considered to be verified.
This method returns true if either is_locally_trusted()
returns true
or if is_cross_signing_trusted()
returns true.
Is this device considered to be verified using cross signing.
Manually verify this device.
This method will attempt to sign the device using our private cross signing key.
This method will always fail if the device belongs to someone else, we can only sign our own devices.
It can also fail if we don’t have the private part of our self-signing key.
Returns a request that needs to be sent out for the device to be marked as verified.
Set the local trust state of the device to the given state.
This won’t affect any cross signing trust state, this only sets a flag marking to have the given trust state.
Arguments
trust_state
- The new trust state that should be set for the device.
pub async fn encrypt_session(
&self,
session: InboundGroupSession,
message_index: Option<u32>
) -> Result<(Session, EncryptedToDeviceEventContent), OlmError>
pub async fn encrypt_session(
&self,
session: InboundGroupSession,
message_index: Option<u32>
) -> Result<(Session, EncryptedToDeviceEventContent), OlmError>
Encrypt the given inbound group session as a forwarded room key for this device.
Methods from Deref<Target = ReadOnlyDevice>
Get the human readable name of the device.
Get the key of the given key algorithm belonging to this device.
Get a map containing all the device signatures.
Get the trust state of the device.
Is the device locally marked as trusted.
Is the device locally marked as blacklisted.
Blacklisted devices won’t receive any group sessions.
Get the list of algorithms this device supports.
Trait Implementations
Auto Trait Implementations
impl !RefUnwindSafe for Device
impl !UnwindSafe for Device
Blanket Implementations
Mutably borrows from an owned value. Read more
Instruments this type with the provided Span
, returning an
Instrumented
wrapper. Read more