Skip to content
Snippets Groups Projects
  1. Apr 03, 2019
  2. Mar 14, 2019
  3. Jan 30, 2019
  4. Jan 29, 2019
  5. Jan 22, 2019
  6. Oct 16, 2018
  7. Oct 11, 2018
  8. Oct 05, 2018
  9. Oct 02, 2018
    • David Baker's avatar
      Work with PkDecryption keys by their private keys · 0346145a
      David Baker authored
      Change interface to allow the app to get the private part of the
      key and instantiate a decryption object from just the private part
      of the key.
      
      Changes the function generating a key from random bytes to be
      initialising a key with a private key (because it's exactly the
      same thing). Exports & imports private key parts as ArrayBuffer at
      JS level rather than base64 assuming we are moving that way in
      general.
      0346145a
  10. Jun 28, 2018
  11. Jun 27, 2018
  12. Sep 29, 2017
  13. Jan 10, 2017
  14. Jan 09, 2017
  15. Jan 06, 2017
  16. Oct 25, 2016
  17. Oct 21, 2016
  18. Oct 20, 2016
  19. Sep 16, 2016
  20. Sep 13, 2016
  21. Sep 06, 2016
    • Richard van der Hoff's avatar
      Sign megolm messages · 2fc83aa9
      Richard van der Hoff authored
      Add ed25519 keys to the inbound and outbound sessions, and use them to sign and
      verify megolm messages.
      
      We just stuff the ed25519 public key in alongside the megolm session key (and
      add a version byte), to save adding more boilerplate to the JS/python/etc
      layers.
      2fc83aa9
    • Richard van der Hoff's avatar
      Clean up some typos · 50cd2b2a
      Richard van der Hoff authored
      Remove redundant args from some js funcs, and fix a comment typo
      50cd2b2a
  22. Sep 05, 2016
  23. Sep 04, 2016
  24. Sep 02, 2016
    • Richard van der Hoff's avatar
      Create new constants for key lengths, etc · 39212987
      Richard van der Hoff authored
      We were using olm::KEY_LENGTH for everything under the sun which happened to be
      32 bytes long, and making a bunch of assumptions in the process. Create a bunch
      of new constants (as C #defines rather than C++ consts so that I can use them
      in another forthcoming refactor).
      39212987
  25. Sep 01, 2016
    • Richard van der Hoff's avatar
      Fix Ed25519 keypair generation · 0c462cff
      Richard van der Hoff authored
      Ed25519 private keys, it turns out, have 64 bytes, not 32.
      
      We were previously generating only 32 bytes (which is all that is required to
      generate the public key), and then using the public key as the upper 32 bytes
      when generating the per-message session key. This meant that everything
      appeared to work, but the security of the private key was severely compromised.
      
      By way of fixes:
      
       * Use the correct algorithm for generating the Ed25519 private key, and store
         all 512 bits of it.
      
       * Update the account pickle format and refuse to load the old format (since we
         should consider it compromised).
      
       * Bump the library version, and add a function to retrieve the library
         version, so that applications can verify that they are linked against a
         fixed version of the library.
      
       * Remove the curve25519_{sign, verify} functions which were unused and of
         dubious quality.
      0c462cff
  26. Jun 30, 2016
    • Richard van der Hoff's avatar
      Make space in the session pickle for chain index · 8dd3c182
      Richard van der Hoff authored
      Keeping track of the chain index is a useful thing to do, but is only required
      if we've enabled diagnostics. Extend the session pickle format to make a space
      for it, so that pickles can be transferred between the logging_enabled branch
      and the master branch without loss of information.
      
      Also add some tests for session pickling which explicitly check that we can
      unpickle both formats of pickle.
      8dd3c182
    • Richard van der Hoff's avatar
      Remove unused 'chain_index' from Ratchet · 757c4225
      Richard van der Hoff authored
      This was introduced when I was experimenting with support for logging progress
      in Olm. That is now relegated to the logging_enabled branch, so this should
      probably be removed.
      
      This also fixes the incompatibility of session pickles from the current master
      branch with those from olm 0.1.0.
      757c4225
  27. May 25, 2016
    • Richard van der Hoff's avatar
      Remove session_id from group messages · 708fddd7
      Richard van der Hoff authored
      Putting the session_id inside the packed message body makes it hard to extract
      so that we can decide which session to use. We don't think there is any
      advantage to having thes sesion_id protected by the HMACs, so we're going to
      move it to the JSON framing.
      708fddd7
  28. May 24, 2016
Loading