1. 16 Sep, 2016 1 commit
  2. 13 Sep, 2016 2 commits
  3. 06 Sep, 2016 2 commits
    • Richard van der Hoff's avatar
      Sign megolm messages · 2fc83aa9
      Richard van der Hoff authored
      Add ed25519 keys to the inbound and outbound sessions, and use them to sign and
      verify megolm messages.
      
      We just stuff the ed25519 public key in alongside the megolm session key (and
      add a version byte), to save adding more boilerplate to the JS/python/etc
      layers.
      2fc83aa9
    • Richard van der Hoff's avatar
      Clean up some typos · 50cd2b2a
      Richard van der Hoff authored
      Remove redundant args from some js funcs, and fix a comment typo
      50cd2b2a
  4. 05 Sep, 2016 3 commits
  5. 04 Sep, 2016 1 commit
  6. 02 Sep, 2016 1 commit
    • Richard van der Hoff's avatar
      Create new constants for key lengths, etc · 39212987
      Richard van der Hoff authored
      We were using olm::KEY_LENGTH for everything under the sun which happened to be
      32 bytes long, and making a bunch of assumptions in the process. Create a bunch
      of new constants (as C #defines rather than C++ consts so that I can use them
      in another forthcoming refactor).
      39212987
  7. 01 Sep, 2016 1 commit
    • Richard van der Hoff's avatar
      Fix Ed25519 keypair generation · 0c462cff
      Richard van der Hoff authored
      Ed25519 private keys, it turns out, have 64 bytes, not 32.
      
      We were previously generating only 32 bytes (which is all that is required to
      generate the public key), and then using the public key as the upper 32 bytes
      when generating the per-message session key. This meant that everything
      appeared to work, but the security of the private key was severely compromised.
      
      By way of fixes:
      
       * Use the correct algorithm for generating the Ed25519 private key, and store
         all 512 bits of it.
      
       * Update the account pickle format and refuse to load the old format (since we
         should consider it compromised).
      
       * Bump the library version, and add a function to retrieve the library
         version, so that applications can verify that they are linked against a
         fixed version of the library.
      
       * Remove the curve25519_{sign, verify} functions which were unused and of
         dubious quality.
      0c462cff
  8. 30 Jun, 2016 2 commits
    • Richard van der Hoff's avatar
      Make space in the session pickle for chain index · 8dd3c182
      Richard van der Hoff authored
      Keeping track of the chain index is a useful thing to do, but is only required
      if we've enabled diagnostics. Extend the session pickle format to make a space
      for it, so that pickles can be transferred between the logging_enabled branch
      and the master branch without loss of information.
      
      Also add some tests for session pickling which explicitly check that we can
      unpickle both formats of pickle.
      8dd3c182
    • Richard van der Hoff's avatar
      Remove unused 'chain_index' from Ratchet · 757c4225
      Richard van der Hoff authored
      This was introduced when I was experimenting with support for logging progress
      in Olm. That is now relegated to the logging_enabled branch, so this should
      probably be removed.
      
      This also fixes the incompatibility of session pickles from the current master
      branch with those from olm 0.1.0.
      757c4225
  9. 25 May, 2016 1 commit
    • Richard van der Hoff's avatar
      Remove session_id from group messages · 708fddd7
      Richard van der Hoff authored
      Putting the session_id inside the packed message body makes it hard to extract
      so that we can decide which session to use. We don't think there is any
      advantage to having thes sesion_id protected by the HMACs, so we're going to
      move it to the JSON framing.
      708fddd7
  10. 24 May, 2016 12 commits
  11. 23 May, 2016 8 commits
  12. 20 May, 2016 1 commit
  13. 16 May, 2016 4 commits
  14. 26 Apr, 2016 1 commit