Type Alias CryptoEventHandlerMap CryptoEventHandlerMap : { crossSigning.keysChanged : ( ( data : {} ) => void ) ; crypto.devicesUpdated : ( ( users : string [] ,
initialFetch : boolean ) => void ) ; crypto.keyBackupDecryptionKeyCached : ( ( version : string ) => void ) ; crypto.keyBackupFailed : ( ( errcode : string ) => void ) ; crypto.keyBackupSessionsRemaining : ( ( remaining : number ) => void ) ; crypto.keyBackupStatus : ( ( enabled : boolean ) => void ) ; crypto.keySignatureUploadFailure : ( ( failures : IUploadKeySignaturesResponse [ "failures" ] ,
source : "checkOwnCrossSigningTrust" | "afterCrossSigningLocalKeyChange" | "setDeviceVerification" ,
upload : ( ( opts : { shouldEmit : boolean ; } ) => Promise < void > ) ) => void ) ; crypto.legacyCryptoStoreMigrationProgress : ( ( progress : number ,
total : number ) => void ) ; crypto.roomKeyRequest : ( ( request : IncomingRoomKeyRequest ) => void ) ; crypto.roomKeyRequestCancellation : ( ( request : IncomingRoomKeyRequestCancellation ) => void ) ; crypto.verification.request : ( ( request : VerificationRequest < any > ) => void ) ; crypto.verificationRequestReceived : ( ( request : Crypto . VerificationRequest ) => void ) ; crypto.warning : ( ( type : string ) => void ) ; crypto.willUpdateDevices : ( ( users : string [] ,
initialFetch : boolean ) => void ) ; deviceVerificationChanged : ( ( userId : string ,
deviceId : string ,
deviceInfo : DeviceInfo ) => void ) ; userCrossSigningUpdated : ( ( userId : string ) => void ) ; userTrustStatusChanged : ( ( userId : string ,
trustLevel : UserVerificationStatus ) => void ) ; } Type declaration crossSigning.keysChanged : ( ( data : {} ) => void ) crypto.devicesUpdated : ( ( users : string [] , initialFetch : boolean ) => void ) ( users , initialFetch ) : void Parameters users : string [] initialFetch : boolean Returns void crypto.keyBackupDecryptionKeyCached : ( ( version : string ) => void ) ( version ) : void Returns void crypto.keyBackupFailed : ( ( errcode : string ) => void ) ( errcode ) : void Returns void crypto.keyBackupSessionsRemaining : ( ( remaining : number ) => void ) ( remaining ) : void Returns void crypto.keyBackupStatus : ( ( enabled : boolean ) => void ) ( enabled ) : void Returns void crypto.keySignatureUploadFailure : ( ( failures : IUploadKeySignaturesResponse [ "failures" ] , source : "checkOwnCrossSigningTrust" | "afterCrossSigningLocalKeyChange" | "setDeviceVerification" , upload : ( ( opts : { shouldEmit : boolean ; } ) => Promise < void > ) ) => void ) ( failures , source , upload ) : void Parameters failures : IUploadKeySignaturesResponse [ "failures" ] source : "checkOwnCrossSigningTrust" | "afterCrossSigningLocalKeyChange" | "setDeviceVerification" upload : ( ( opts : { shouldEmit : boolean ; } ) => Promise < void > ) ( opts ) : Promise < void > Parameters opts : { shouldEmit : boolean ; } Returns void crypto.legacyCryptoStoreMigrationProgress : ( ( progress : number , total : number ) => void ) ( progress , total ) : void Parameters progress : number total : number Returns void ( request ) : void Returns void ( request ) : void Returns void crypto.verification.request : ( ( request : VerificationRequest < any > ) => void ) ( request ) : void Returns void crypto.verificationRequestReceived : ( ( request : Crypto . VerificationRequest ) => void ) ( request ) : void Returns void crypto.warning : ( ( type : string ) => void ) crypto.willUpdateDevices : ( ( users : string [] , initialFetch : boolean ) => void ) ( users , initialFetch ) : void Parameters users : string [] initialFetch : boolean Returns void deviceVerificationChanged : ( ( userId : string , deviceId : string , deviceInfo : DeviceInfo ) => void ) ( userId , deviceId , deviceInfo ) : void Parameters userId : string deviceId : string deviceInfo : DeviceInfo Returns void userCrossSigningUpdated : ( ( userId : string ) => void ) ( userId ) : void Returns void userTrustStatusChanged : ( ( userId : string , trustLevel : UserVerificationStatus ) => void ) ( userId , trustLevel ) : void Returns void
" "
Fires when the user's cross-signing keys have changed or cross-signing has been enabled/disabled. The client can use getStoredCrossSigningForUser with the user ID of the logged in user to check if cross-signing is enabled on the account. If enabled, it can test whether the current key is trusted using with checkUserTrust with the user ID of the logged in user. The checkOwnCrossSigningTrust function may be used to reconcile the trust in the account key.
The cross-signing API is currently UNSTABLE and may change without notice.