- 06 Sep, 2016 1 commit
-
-
Richard van der Hoff authored
Add ed25519 keys to the inbound and outbound sessions, and use them to sign and verify megolm messages. We just stuff the ed25519 public key in alongside the megolm session key (and add a version byte), to save adding more boilerplate to the JS/python/etc layers.
-
- 25 May, 2016 1 commit
-
-
Richard van der Hoff authored
Putting the session_id inside the packed message body makes it hard to extract so that we can decide which session to use. We don't think there is any advantage to having thes sesion_id protected by the HMACs, so we're going to move it to the JSON framing.
-
- 24 May, 2016 6 commits
-
-
Richard van der Hoff authored
Factor the actual message encoding/decoding and encrypting/decrypting out to separate functions from the top-level functions which do the base64-wrangling. This is particularly helpful in the 'outbound' code-path where the offsets required to allow room to base64-encode make the flow hard to see when it's all inline.
-
Richard van der Hoff authored
Initialise megolm_cipher via the preprocessor macro, instead of with a function.
-
Richard van der Hoff authored
memset is at risk of being optimised away, so use _olm_unset instead.
-
Richard van der Hoff authored
We need to be able to inspect an outbound session so that we can tell our peer how to set up an inbound session.
-
Richard van der Hoff authored
-
Richard van der Hoff authored
-