- Oct 01, 2018
-
-
David Baker authored
Don't think this matters since there's no PkEncryption / PkDecryption object being passed, but for the sake of consistency
-
- Jul 04, 2018
-
- Jun 28, 2018
-
-
Hubert Chathi authored
-
Hubert Chathi authored
-
- Jun 27, 2018
-
-
Hubert Chathi authored
-
Hubert Chathi authored
-
- Jan 09, 2018
-
-
Hubert Chathi authored
From 4a82d31e8cb808a04956fc847ed0ec0ff322b956 Mon Sep 17 00:00:00 2001 From: Hubert Chathi <hubert@uhoreg.ca> Date: Wed, 3 Jan 2018 21:37:43 -0500 Subject: [PATCH] fix some typos in JavaScript library Signed-off-by:
Hubert Chathi <hubert@uhoreg.ca>
-
- Mar 01, 2017
-
- Jan 18, 2017
-
- Jan 09, 2017
-
-
Richard van der Hoff authored
olm_import_inbound_group_session, which reads the format written by olm_export_inbound_group_session to initialise a group session.
-
- Jan 06, 2017
-
-
Richard van der Hoff authored
A pair of functions which allow you to export the megolm keys for an inbound group session, so that an application can save/restore them.
-
- Dec 22, 2016
-
- Dec 19, 2016
-
-
Richard van der Hoff authored
These would have helped avoid the recent FRV.
-
- Dec 16, 2016
-
-
Richard van der Hoff authored
Make sure we null-terminate encrypted strings before passing them to UTF8ToString. This used to work when we allocated the buffer on the stack, because it turns out that allocate() zeroinits the returned memory. malloc(), of course, does not.
-
- Dec 15, 2016
-
-
Richard van der Hoff authored
-
Richard van der Hoff authored
Avoid leaving copies of the plaintext sitting around in the emscripten heap.
-
- Dec 14, 2016
-
-
Richard van der Hoff authored
Messages can be very large, so we don't really want to allocate them on the stack. Switch to using the heap for them, and try to clean up some of the string handling while we're at it.
-
Richard van der Hoff authored
Read settings from OLM_OPTIONS to allow apps to configure some options. In particular, this is useful for setting the heap size.
-
- Dec 12, 2016
-
-
Richard van der Hoff authored
If we get an exception during load, don't define half of window.Olm (which confuses apps). This is a partial fix to https://github.com/vector-im/riot-web/issues/2726.
-
- Oct 25, 2016
-
- Oct 20, 2016
-
-
Mark Haines authored
Applications can use the index to detect replays of the same message.
-
- Sep 14, 2016
-
-
Mark Haines authored
- Sep 13, 2016
-
-
Mark Haines authored
-
Mark Haines authored
-
- Sep 06, 2016
-
-
Matthew Hodgson authored
-
Richard van der Hoff authored
Remove redundant args from some js funcs, and fix a comment typo
-
- Sep 05, 2016
-
-
Richard van der Hoff authored
Fix a couple of places where we were using the wrong method to get the last error.
-
- Sep 04, 2016
-
-
Richard van der Hoff authored
Repeat the fix from b10f90d for megolm messages. It turns out that the 'length' argument to 'Pointer_stringify' doesn't work if the input includes characters >= 128. Rather than try to figure out which methods can return UTF-8, and which always return plain ascii, replace all uses of Pointer_stringify with a 'length' argument with the version that expects a NULL-terminated input, and extend the buffer by a byte to allow space for a null-terminator. In the case of decrypt, we need to add the null ourself. Fixes https://github.com/vector-im/vector-web/issues/2078.
-
Richard van der Hoff authored
I find myself wanting to know if an OlmSession is in the pre-key state or not, to help debugging at the application level.
-
- Sep 01, 2016
-
-
Richard van der Hoff authored
... to match the Makefile
-
Richard van der Hoff authored
Ed25519 private keys, it turns out, have 64 bytes, not 32. We were previously generating only 32 bytes (which is all that is required to generate the public key), and then using the public key as the upper 32 bytes when generating the per-message session key. This meant that everything appeared to work, but the security of the private key was severely compromised. By way of fixes: * Use the correct algorithm for generating the Ed25519 private key, and store all 512 bits of it. * Update the account pickle format and refuse to load the old format (since we should consider it compromised). * Bump the library version, and add a function to retrieve the library version, so that applications can verify that they are linked against a fixed version of the library. * Remove the curve25519_{sign, verify} functions which were unused and of dubious quality.
-
- Jul 11, 2016
-
- Jul 06, 2016
-
-
Richard van der Hoff authored
It turns out that the 'length' argument to 'Pointer_stringify' doesn't work if the input includes characters >= 128. Rather than try to figure out which methods can return UTF-8, and which always return plain ascii, replace all uses of Pointer_stringify with a 'length' argument with the version that expects a NULL-terminated input, and extend the buffer by a byte to allow space for a null-terminator. In the case of decrypt, we need to add the null ourself. Fixes https://github.com/vector-im/vector-web/issues/1719.
-
- May 26, 2016
-
-
Richard van der Hoff authored
It's important that group messages be signed by the sender, rather than by a secret derived from the shared secret.
-
Richard van der Hoff authored
To make sure that we don't sneakily use methods which we wouldn't be able to for remote users, expose an interface object which contains the remote interface.
-
Richard van der Hoff authored
message.length counts codepoints; we need bytes.
-
- May 25, 2016
-
-
Richard van der Hoff authored
-