- 18 Jun, 2019 1 commit
-
-
poljar authored
-
- 17 Apr, 2019 1 commit
-
-
Hubert Chathi authored
-
- 12 Apr, 2019 1 commit
-
-
Hubert Chathi authored
-
- 09 Apr, 2019 2 commits
- 08 Apr, 2019 2 commits
-
-
Hubert Chathi authored
-
This patch adds bindings to the PK part of the Olm library contained in the pk.h header file. Encryption, decryption as well as pickling/unpickling of the decryption object is supported. Signed-off-by:
Damir Jelić <poljar@termina.org.uk>
-
- 02 Apr, 2019 2 commits
-
-
poljar authored
Signed-off-by:
Damir Jelić <poljar@termina.org.uk>
-
poljar authored
This patch adds bindings to the SAS part of the Olm library contained in the sas.h header file. Signed-off-by:
Damir Jelić <poljar@termina.org.uk>
-
- 23 Jan, 2019 1 commit
-
-
This is a workaround for a bug where signature verification would overwrite the variable holding the signature. This only happens on python2. Signed-off-by:
Damir Jelić <poljar@termina.org.uk>
-
- 23 Oct, 2018 1 commit
-
-
Hubert Chathi authored
-
- 16 Oct, 2018 3 commits
-
-
Hubert Chathi authored
-
Hubert Chathi authored
also reduce the amount of memory copying that we do
-
Hubert Chathi authored
-
- 15 Oct, 2018 1 commit
-
-
Hubert Chathi authored
-
- 18 Jul, 2018 2 commits
-
-
This commit imports the python bindings from: https://github.com/poljar/python-olm The bindings are imported at commit c44b145818520d69eaaa350fb95afcb846125e0f Minor modifications were made while importing: - Removed travis config - Removed Arch Linux PKGBUILD - Removed the html docs, they can be rebuild by running make html in the docs folder - Slightly modified the README The new bindings feature some improvements over the old ones: - Python 2 and 3 support - Automatic memory management - Automatic memory clearing before it is freed - Type signatures via the python typing module - Full test coverage - Properties are utilized where it makes sense (e.g. account.id) Signed-off-by:
Damir Jelić <poljar@termina.org.uk>
-
Signed-off-by:
Damir Jelić <poljar@termina.org.uk>
-
- 29 May, 2018 1 commit
-
-
Wilfried Klaebe authored
Signed-off-by:
Wilfried Klaebe <w+gitstuff@chaos.in-kiel.de>
-
- 24 Apr, 2017 4 commits
-
-
Richard van der Hoff authored
It's not much use if everything is hardcoded.
-
Richard van der Hoff authored
Fix line lengths in newly-added code
-
pik authored
Signed-off-by:
Alexander Maznev <alexander.maznev@gmail.com>
-
pik authored
Signed-off-by:
Alexander Maznev <alexander.maznev@gmail.com>
-
- 18 Apr, 2017 2 commits
-
-
pik authored
Signed-off-by:
Alexander Maznev <alexander.maznev@gmail.com>
-
Richard van der Hoff authored
make the python code adhere to PEP8
-
- 04 Apr, 2017 1 commit
-
-
J08nY authored
Signed-off-by:
Jan Jancar <johny@neuromancer.sk>
-
- 09 Jan, 2017 1 commit
-
-
Richard van der Hoff authored
olm_import_inbound_group_session, which reads the format written by olm_export_inbound_group_session to initialise a group session.
-
- 06 Jan, 2017 1 commit
-
-
Richard van der Hoff authored
A pair of functions which allow you to export the megolm keys for an inbound group session, so that an application can save/restore them.
-
- 25 Oct, 2016 1 commit
-
-
Richard van der Hoff authored
-
- 20 Oct, 2016 1 commit
-
-
Mark Haines authored
Applications can use the index to detect replays of the same message.
-
- 02 Oct, 2016 1 commit
-
-
Matthew Hodgson authored
These missing signatures were causing OSX to truncate 64-bit pointers to 32-bit pointers when calling the missing methods, causing segfaults
-
- 22 Sep, 2016 2 commits
-
-
Richard van der Hoff authored
-
Richard van der Hoff authored
-
- 16 Sep, 2016 1 commit
-
-
Mark Haines authored
-
- 13 Sep, 2016 2 commits
-
-
Mark Haines authored
-
Mark Haines authored
-
- 01 Sep, 2016 1 commit
-
-
Richard van der Hoff authored
Ed25519 private keys, it turns out, have 64 bytes, not 32. We were previously generating only 32 bytes (which is all that is required to generate the public key), and then using the public key as the upper 32 bytes when generating the per-message session key. This meant that everything appeared to work, but the security of the private key was severely compromised. By way of fixes: * Use the correct algorithm for generating the Ed25519 private key, and store all 512 bits of it. * Update the account pickle format and refuse to load the old format (since we should consider it compromised). * Bump the library version, and add a function to retrieve the library version, so that applications can verify that they are linked against a fixed version of the library. * Remove the curve25519_{sign, verify} functions which were unused and of dubious quality.
-
- 24 May, 2016 4 commits
-
-
Richard van der Hoff authored
I want to use test_olm.sh on jenkins, which lacks jq. Hence, add support to olm.main to get id and one-time keys individually.
-
Richard van der Hoff authored
-
Richard van der Hoff authored
We need to be able to inspect an outbound session so that we can tell our peer how to set up an inbound session.
-
Richard van der Hoff authored
-