- Sep 13, 2016
-
-
Mark Haines authored
Remove the messsage index from olm_init_inbound_group_session
-
Mark Haines authored
Add a olm_inbound_group_session_id method
-
Mark Haines authored
-
Mark Haines authored
-
Mark Haines authored
-
Mark Haines authored
Use the ed25519 public key as the group session id.
-
Mark Haines authored
-
Mark Haines authored
-
Mark Haines authored
Some clients expect the session id to be globally unique, so allowing the end devices to pick the session id will cause problems. Include the current ratchet index with the initial keys, this decreases the risk that the client will supply the wrong index causing problems. Sign the initial keys with the ratchet ed25519 key, this reduces the risk of a client claiming a session that they didn't create.
-
- Sep 06, 2016
-
-
Richard van der Hoff authored
Prepare changelog for v1.2.0
-
Richard van der Hoff authored
-
Richard van der Hoff authored
Sign megolm messages
-
Richard van der Hoff authored
Add ed25519 keys to the inbound and outbound sessions, and use them to sign and verify megolm messages. We just stuff the ed25519 public key in alongside the megolm session key (and add a version byte), to save adding more boilerplate to the JS/python/etc layers.
-
Richard van der Hoff authored
Remove redundant args from some js funcs, and fix a comment typo
-
Richard van der Hoff authored
Convert ed25519 pickling functions to C
-
Richard van der Hoff authored
Fix error handling for group sessions
-
- Sep 05, 2016
-
-
Richard van der Hoff authored
Fix a couple of places where we were using the wrong method to get the last error.
-
Richard van der Hoff authored
-
Richard van der Hoff authored
-
Richard van der Hoff authored
-
Richard van der Hoff authored
... so that I can use them from the group session bits.
-
Richard van der Hoff authored
... because OSX doesn't support it.
-
Richard van der Hoff authored
Convert crypto.hh into C-compatible interface
-
Richard van der Hoff authored
-
Richard van der Hoff authored
-
Richard van der Hoff authored
OlmSession.has_received_message
-
Richard van der Hoff authored
Fix megolm decryption of UTF-8
-
Richard van der Hoff authored
Create new constants for key lengths, etc
-
- Sep 04, 2016
-
-
Richard van der Hoff authored
Repeat the fix from b10f90d for megolm messages. It turns out that the 'length' argument to 'Pointer_stringify' doesn't work if the input includes characters >= 128. Rather than try to figure out which methods can return UTF-8, and which always return plain ascii, replace all uses of Pointer_stringify with a 'length' argument with the version that expects a NULL-terminated input, and extend the buffer by a byte to allow space for a null-terminator. In the case of decrypt, we need to add the null ourself. Fixes https://github.com/vector-im/vector-web/issues/2078.
-
Richard van der Hoff authored
I find myself wanting to know if an OlmSession is in the pre-key state or not, to help debugging at the application level.
-
- Sep 02, 2016
-
-
Richard van der Hoff authored
We were using olm::KEY_LENGTH for everything under the sun which happened to be 32 bytes long, and making a bunch of assumptions in the process. Create a bunch of new constants (as C #defines rather than C++ consts so that I can use them in another forthcoming refactor).
-
- Sep 01, 2016
-
-
Richard van der Hoff authored
... to match the Makefile
-
Richard van der Hoff authored
-
Richard van der Hoff authored
-
Richard van der Hoff authored
pre-1.0.0 was broken too
-
Richard van der Hoff authored
Ed25519 private keys, it turns out, have 64 bytes, not 32. We were previously generating only 32 bytes (which is all that is required to generate the public key), and then using the public key as the upper 32 bytes when generating the per-message session key. This meant that everything appeared to work, but the security of the private key was severely compromised. By way of fixes: * Use the correct algorithm for generating the Ed25519 private key, and store all 512 bits of it. * Update the account pickle format and refuse to load the old format (since we should consider it compromised). * Bump the library version, and add a function to retrieve the library version, so that applications can verify that they are linked against a fixed version of the library. * Remove the curve25519_{sign, verify} functions which were unused and of dubious quality.
-
- Jul 16, 2016
-
-
Matthew Hodgson authored
-
- Jul 11, 2016
-
-
Richard van der Hoff authored
-
Richard van der Hoff authored
-