- Oct 25, 2016
-
-
Mark Haines authored
-
- Oct 21, 2016
-
-
Richard van der Hoff authored
All the other methods clear their random inputs. This one needs to do the same, to reduce the risk of the randomness being used elsewhere and leaking key info.
-
- Oct 20, 2016
-
-
Mark Haines authored
Applications can use the index to detect replays of the same message.
-
- Sep 16, 2016
-
-
Richard van der Hoff authored
Document what it actually returns.
-
- Sep 13, 2016
-
-
Mark Haines authored
-
Mark Haines authored
-
- Sep 06, 2016
-
-
Richard van der Hoff authored
Add ed25519 keys to the inbound and outbound sessions, and use them to sign and verify megolm messages. We just stuff the ed25519 public key in alongside the megolm session key (and add a version byte), to save adding more boilerplate to the JS/python/etc layers.
-
Richard van der Hoff authored
Remove redundant args from some js funcs, and fix a comment typo
-
- Sep 05, 2016
-
-
Richard van der Hoff authored
... so that I can use them from the group session bits.
-
Richard van der Hoff authored
-
Richard van der Hoff authored
-
- Sep 04, 2016
-
-
Richard van der Hoff authored
I find myself wanting to know if an OlmSession is in the pre-key state or not, to help debugging at the application level.
-
- Sep 02, 2016
-
-
Richard van der Hoff authored
We were using olm::KEY_LENGTH for everything under the sun which happened to be 32 bytes long, and making a bunch of assumptions in the process. Create a bunch of new constants (as C #defines rather than C++ consts so that I can use them in another forthcoming refactor).
-
- Sep 01, 2016
-
-
Richard van der Hoff authored
Ed25519 private keys, it turns out, have 64 bytes, not 32. We were previously generating only 32 bytes (which is all that is required to generate the public key), and then using the public key as the upper 32 bytes when generating the per-message session key. This meant that everything appeared to work, but the security of the private key was severely compromised. By way of fixes: * Use the correct algorithm for generating the Ed25519 private key, and store all 512 bits of it. * Update the account pickle format and refuse to load the old format (since we should consider it compromised). * Bump the library version, and add a function to retrieve the library version, so that applications can verify that they are linked against a fixed version of the library. * Remove the curve25519_{sign, verify} functions which were unused and of dubious quality.
-
- Jun 30, 2016
-
-
Richard van der Hoff authored
Keeping track of the chain index is a useful thing to do, but is only required if we've enabled diagnostics. Extend the session pickle format to make a space for it, so that pickles can be transferred between the logging_enabled branch and the master branch without loss of information. Also add some tests for session pickling which explicitly check that we can unpickle both formats of pickle.
-
Richard van der Hoff authored
This was introduced when I was experimenting with support for logging progress in Olm. That is now relegated to the logging_enabled branch, so this should probably be removed. This also fixes the incompatibility of session pickles from the current master branch with those from olm 0.1.0.
-
- May 25, 2016
-
-
Richard van der Hoff authored
Putting the session_id inside the packed message body makes it hard to extract so that we can decide which session to use. We don't think there is any advantage to having thes sesion_id protected by the HMACs, so we're going to move it to the JSON framing.
-
- May 24, 2016
-
-
Richard van der Hoff authored
Factor the actual message encoding/decoding and encrypting/decrypting out to separate functions from the top-level functions which do the base64-wrangling. This is particularly helpful in the 'outbound' code-path where the offsets required to allow room to base64-encode make the flow hard to see when it's all inline.
-
Richard van der Hoff authored
Initialise megolm_cipher via the preprocessor macro, instead of with a function.
-
Richard van der Hoff authored
Make names (of session_key and message_index) more consistent. Use our own protobuf tags rather than trying to piggyback on the one-to-one structure.
-
Richard van der Hoff authored
Includes creation of inbound sessions, etc
-
Richard van der Hoff authored
We need to be able to inspect an outbound session so that we can tell our peer how to set up an inbound session.
-
Richard van der Hoff authored
-
Richard van der Hoff authored
-
Richard van der Hoff authored
-
Richard van der Hoff authored
We don't need to have all of the top-level pickling functions in olm.cpp; factor out the utilities to support it to pickle_encoding.cpp (and make sure that they have plain-C bindings).
-
Richard van der Hoff authored
I want to be able to use this functionality from elsewhere, so factor it out to its own file.
-
Richard van der Hoff authored
Replace the init-static-var dance with some preprocessor macros
-
Richard van der Hoff authored
We never delete a cipher, and the destruct op is empty, so it's a bit pointless
-
- May 23, 2016
-
-
Richard van der Hoff authored
Give a load of internal symbols "_olm_" prefixes. This better delineates the public and private interfaces in the module, and helps avoid internal symbols leaking out and possibly being abused.
-
Richard van der Hoff authored
-
Richard van der Hoff authored
-
Richard van der Hoff authored
-
Richard van der Hoff authored
-
Richard van der Hoff authored
-
Richard van der Hoff authored
-
Richard van der Hoff authored
-
- May 20, 2016
-
-
Richard van der Hoff authored
We don't want anything which does dynamic memory allocation in the library.
-
- May 16, 2016
-
-
Richard van der Hoff authored
Remove the (now non-functional) declarations of olm_set_log_level in the C and js wrappers.
-
Richard van der Hoff authored
Concerns have been raised that including logging functionality makes it harder to audit the implementation to ensure that no secret information is leaked. We are therefore removing it from the master branch.
-