Skip to content
Snippets Groups Projects
  1. May 15, 2019
  2. May 14, 2019
  3. Apr 03, 2019
  4. Mar 14, 2019
  5. Feb 01, 2019
  6. Jan 29, 2019
  7. Jan 22, 2019
  8. Oct 15, 2018
  9. Oct 11, 2018
  10. Oct 05, 2018
  11. Oct 02, 2018
    • David Baker's avatar
      Work with PkDecryption keys by their private keys · 0346145a
      David Baker authored
      Change interface to allow the app to get the private part of the
      key and instantiate a decryption object from just the private part
      of the key.
      
      Changes the function generating a key from random bytes to be
      initialising a key with a private key (because it's exactly the
      same thing). Exports & imports private key parts as ArrayBuffer at
      JS level rather than base64 assuming we are moving that way in
      general.
      0346145a
  12. Sep 19, 2018
  13. Jun 28, 2018
  14. Jun 27, 2018
  15. Sep 29, 2017
  16. Jan 10, 2017
  17. Jan 09, 2017
  18. Jan 06, 2017
  19. Oct 24, 2016
    • Richard van der Hoff's avatar
      Return the base64-encoded length of pickles · a7310c58
      Richard van der Hoff authored
      make olm_pickle_* return the lengths of the base64-encoded pickles, rather than
      the raw pickle. (From the application's POV, the format of the pickle is
      opaque: it doesn't even know that it is base64-encoded. So returning the length
      of the raw pickle is particularly unhelpful.)
      a7310c58
  20. Oct 21, 2016
  21. Oct 20, 2016
  22. Oct 19, 2016
  23. Sep 13, 2016
  24. Sep 06, 2016
    • Richard van der Hoff's avatar
      Sign megolm messages · 2fc83aa9
      Richard van der Hoff authored
      Add ed25519 keys to the inbound and outbound sessions, and use them to sign and
      verify megolm messages.
      
      We just stuff the ed25519 public key in alongside the megolm session key (and
      add a version byte), to save adding more boilerplate to the JS/python/etc
      layers.
      2fc83aa9
  25. Sep 05, 2016
  26. Sep 04, 2016
  27. Sep 02, 2016
    • Richard van der Hoff's avatar
      Create new constants for key lengths, etc · 39212987
      Richard van der Hoff authored
      We were using olm::KEY_LENGTH for everything under the sun which happened to be
      32 bytes long, and making a bunch of assumptions in the process. Create a bunch
      of new constants (as C #defines rather than C++ consts so that I can use them
      in another forthcoming refactor).
      39212987
  28. Sep 01, 2016
    • Richard van der Hoff's avatar
      Fix Ed25519 keypair generation · 0c462cff
      Richard van der Hoff authored
      Ed25519 private keys, it turns out, have 64 bytes, not 32.
      
      We were previously generating only 32 bytes (which is all that is required to
      generate the public key), and then using the public key as the upper 32 bytes
      when generating the per-message session key. This meant that everything
      appeared to work, but the security of the private key was severely compromised.
      
      By way of fixes:
      
       * Use the correct algorithm for generating the Ed25519 private key, and store
         all 512 bits of it.
      
       * Update the account pickle format and refuse to load the old format (since we
         should consider it compromised).
      
       * Bump the library version, and add a function to retrieve the library
         version, so that applications can verify that they are linked against a
         fixed version of the library.
      
       * Remove the curve25519_{sign, verify} functions which were unused and of
         dubious quality.
      0c462cff
Loading