aboutsummaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
Diffstat (limited to 'src')
-rw-r--r--src/account.cpp7
-rw-r--r--src/logging.c47
-rw-r--r--src/message.cpp20
-rw-r--r--src/olm.cpp1
-rw-r--r--src/ratchet.cpp33
-rw-r--r--src/session.cpp56
6 files changed, 0 insertions, 164 deletions
diff --git a/src/account.cpp b/src/account.cpp
index d34110a..e5cbfab 100644
--- a/src/account.cpp
+++ b/src/account.cpp
@@ -14,12 +14,9 @@
*/
#include "olm/account.hh"
#include "olm/base64.hh"
-#include "olm/logging.h"
#include "olm/pickle.hh"
#include "olm/memory.hh"
-static const char *LOG_CATEGORY = "olm::Account";
-
olm::Account::Account(
) : next_one_time_key_id(0),
last_error(olm::ErrorCode::SUCCESS) {
@@ -45,11 +42,9 @@ std::size_t olm::Account::remove_key(
if (olm::array_equal(i->key.public_key, public_key.public_key)) {
std::uint32_t id = i->id;
one_time_keys.erase(i);
- olm_logf(OLM_LOG_INFO, LOG_CATEGORY, "removed key id %i", id);
return id;
}
}
- olm_logf(OLM_LOG_WARNING, LOG_CATEGORY, "Couldn't find key to remove");
return std::size_t(-1);
}
@@ -69,8 +64,6 @@ std::size_t olm::Account::new_account(
random += KEY_LENGTH;
olm::curve25519_generate_key(random, identity_keys.curve25519_key);
- olm_logf(OLM_LOG_DEBUG, LOG_CATEGORY, "Created new account");
-
return 0;
}
diff --git a/src/logging.c b/src/logging.c
deleted file mode 100644
index ce17167..0000000
--- a/src/logging.c
+++ /dev/null
@@ -1,47 +0,0 @@
-/* Copyright 2016 OpenMarket Ltd
- *
- * Licensed under the Apache License, Version 2.0 (the "License");
- * you may not use this file except in compliance with the License.
- * You may obtain a copy of the License at
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing, software
- * distributed under the License is distributed on an "AS IS" BASIS,
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- * See the License for the specific language governing permissions and
- * limitations under the License.
- */
-
-#include "olm/logging.h"
-
-#include <stdarg.h>
-#include <stdio.h>
-
-static unsigned int log_level = 1;
-
-void olm_set_log_level(unsigned int level) {
- log_level = level;
-}
-
-int olm_log_enabled_for(unsigned int level, const char *category)
-{
- return level <= log_level;
-}
-
-void olm_logf(unsigned int level, const char *category,
- const char *format, ...) {
- if (level > log_level) {
- return;
- }
-
- fputs(category, stdout);
- fputs(": ", stdout);
-
- va_list ap;
- va_start(ap, format);
- vprintf(format, ap);
- va_end(ap);
-
- putchar('\n');
-}
diff --git a/src/message.cpp b/src/message.cpp
index ff03903..1c93eb8 100644
--- a/src/message.cpp
+++ b/src/message.cpp
@@ -14,13 +14,10 @@
*/
#include "olm/message.hh"
-#include "olm/logging.h"
#include "olm/memory.hh"
namespace {
-static const char *LOG_CATEGORY = "olm::Message";
-
template<typename T>
static std::size_t varint_length(
T value
@@ -239,13 +236,6 @@ void olm::decode_message(
}
unknown = pos;
}
- olm_logf(OLM_LOG_TRACE, LOG_CATEGORY,
- "Decoded message ver=%i ratchet_key=%s chain_idx=%i ciphertext=%s",
- reader.version,
- olm::bytes_to_string(reader.ratchet_key, reader.ratchet_key_length).c_str(),
- reader.has_counter ? reader.counter : -1,
- olm::bytes_to_string(reader.ciphertext, reader.ciphertext_length).c_str()
- );
}
@@ -334,14 +324,4 @@ void olm::decode_one_time_key_message(
}
unknown = pos;
}
-
- olm_logf(OLM_LOG_TRACE, LOG_CATEGORY,
- "Decoded pre-key message ver=%i one_time_key[Eb]=%s "
- "base_key[Ea]=%s identity_key[Ia]=%s message=%s",
- reader.version,
- olm::bytes_to_string(reader.one_time_key, reader.one_time_key_length).c_str(),
- olm::bytes_to_string(reader.base_key, reader.base_key_length).c_str(),
- olm::bytes_to_string(reader.identity_key, reader.identity_key_length).c_str(),
- olm::bytes_to_string(reader.message, reader.message_length).c_str()
- );
}
diff --git a/src/olm.cpp b/src/olm.cpp
index afbbbc6..63f3d83 100644
--- a/src/olm.cpp
+++ b/src/olm.cpp
@@ -19,7 +19,6 @@
#include "olm/base64.hh"
#include "olm/cipher.hh"
#include "olm/memory.hh"
-#include "olm/logging.h"
#include <new>
#include <cstring>
diff --git a/src/ratchet.cpp b/src/ratchet.cpp
index 06912af..b04099f 100644
--- a/src/ratchet.cpp
+++ b/src/ratchet.cpp
@@ -17,14 +17,11 @@
#include "olm/memory.hh"
#include "olm/cipher.hh"
#include "olm/pickle.hh"
-#include "olm/logging.h"
#include <cstring>
namespace {
-static const char *LOG_CATEGORY = "olm::Ratchet";
-
static const std::uint8_t PROTOCOL_VERSION = 3;
static const std::uint8_t MESSAGE_KEY_SEED[1] = {0x01};
static const std::uint8_t CHAIN_KEY_SEED[1] = {0x02};
@@ -79,8 +76,6 @@ static void advance_chain_key(
new_chain_key.key
);
new_chain_key.index = chain_key.index + 1;
- olm_logf(OLM_LOG_DEBUG, LOG_CATEGORY, "Derived chain key C(%i,%i)",
- chain_index, new_chain_key.index);
}
@@ -95,8 +90,6 @@ static void create_message_keys(
message_key.key
);
message_key.index = chain_key.index;
- olm_logf(OLM_LOG_DEBUG, LOG_CATEGORY, "Created message key with chain key C(%i,%i)",
- chain_index, message_key.index);
}
@@ -176,9 +169,6 @@ static std::size_t verify_mac_and_decrypt_for_new_chain(
new_chain.ratchet_key, session.kdf_info,
new_root_key, new_chain.chain_key
);
- olm_logf(OLM_LOG_DEBUG, LOG_CATEGORY, "Calculated new receiver chain R(%i)",
- chain_index);
-
std::size_t result = verify_mac_and_decrypt_for_existing_chain(
session, chain_index, new_chain.chain_key, reader,
plaintext, max_plaintext_length
@@ -219,7 +209,6 @@ void olm::Ratchet::initialise_as_bob(
receiver_chains[0].ratchet_key = their_ratchet_key;
chain_index = 0;
olm::unset(derived_secrets);
- olm_logf(OLM_LOG_DEBUG, LOG_CATEGORY, "Initialised receiver chain R(0)");
}
@@ -242,7 +231,6 @@ void olm::Ratchet::initialise_as_alice(
sender_chain[0].ratchet_key = our_ratchet_key;
chain_index = 0;
olm::unset(derived_secrets);
- olm_logf(OLM_LOG_DEBUG, LOG_CATEGORY, "Initialised sender chain R(0)");
}
namespace olm {
@@ -450,9 +438,6 @@ std::size_t olm::Ratchet::encrypt(
if (sender_chain.empty()) {
sender_chain.insert();
olm::curve25519_generate_key(random, sender_chain[0].ratchet_key);
- olm_logf(OLM_LOG_DEBUG, LOG_CATEGORY, "Created new ratchet key T(%i) %s",
- chain_index + 1,
- sender_chain[0].ratchet_key.to_string().c_str());
create_chain_key(
root_key,
sender_chain[0].ratchet_key,
@@ -460,8 +445,6 @@ std::size_t olm::Ratchet::encrypt(
kdf_info,
root_key, sender_chain[0].chain_key
);
- olm_logf(OLM_LOG_DEBUG, LOG_CATEGORY, "Initialised new sender chain R(%i)",
- chain_index + 1);
chain_index++;
}
@@ -491,14 +474,6 @@ std::size_t olm::Ratchet::encrypt(
output, output_length
);
- olm_logf(OLM_LOG_TRACE, LOG_CATEGORY,
- "Encoded message ver=%i ratchet_key=%s chain_idx=%i ciphertext=%s",
- PROTOCOL_VERSION,
- olm::bytes_to_string(writer.ratchet_key, olm::KEY_LENGTH).c_str(),
- counter,
- olm::bytes_to_string(writer.ciphertext, ciphertext_length).c_str()
- );
-
olm::unset(keys);
return output_length;
}
@@ -525,10 +500,6 @@ std::size_t olm::Ratchet::decrypt(
std::uint8_t const * input, std::size_t input_length,
std::uint8_t * plaintext, std::size_t max_plaintext_length
) {
- olm_logf(OLM_LOG_TRACE, LOG_CATEGORY,
- "Decrypting message %s",
- olm::bytes_to_string(input, input_length).c_str());
-
olm::MessageReader reader;
olm::decode_message(
reader, input, input_length, ratchet_cipher.mac_length()
@@ -580,8 +551,6 @@ std::size_t olm::Ratchet::decrypt(
std::size_t result = std::size_t(-1);
if (!chain) {
- olm_logf(OLM_LOG_DEBUG, LOG_CATEGORY,
- "Sender ratchet key does not match known chain; starting new one");
result = verify_mac_and_decrypt_for_new_chain(
*this, reader, plaintext, max_plaintext_length
);
@@ -642,8 +611,6 @@ std::size_t olm::Ratchet::decrypt(
olm::unset(sender_chain[0]);
sender_chain.erase(sender_chain.begin());
receiver_chain_index = ++chain_index;
- olm_logf(OLM_LOG_DEBUG, LOG_CATEGORY, "Initialised new receiver chain R(%i)",
- chain_index);
}
while (chain->chain_key.index < reader.counter) {
diff --git a/src/session.cpp b/src/session.cpp
index 816dd26..86ba63b 100644
--- a/src/session.cpp
+++ b/src/session.cpp
@@ -16,7 +16,6 @@
#include "olm/cipher.hh"
#include "olm/crypto.hh"
#include "olm/account.hh"
-#include "olm/logging.h"
#include "olm/memory.hh"
#include "olm/message.hh"
#include "olm/pickle.hh"
@@ -25,8 +24,6 @@
namespace {
-static const char *LOG_CATEGORY = "olm::Session";
-
static const std::uint8_t PROTOCOL_VERSION = 0x3;
static const std::uint8_t ROOT_KDF_INFO[] = "OLM_ROOT";
@@ -68,21 +65,11 @@ std::size_t olm::Session::new_outbound_session(
return std::size_t(-1);
}
- olm_logf(OLM_LOG_DEBUG, LOG_CATEGORY,
- "Creating new outbound session to receiver identity IB %s, "
- "receiver ephemeral EB %s", identity_key.to_string().c_str(),
- one_time_key.to_string().c_str()
- );
-
olm::Curve25519KeyPair base_key;
olm::curve25519_generate_key(random, base_key);
- olm_logf(OLM_LOG_DEBUG, LOG_CATEGORY, "Created new ephemeral key EA %s",
- base_key.to_string().c_str());
olm::Curve25519KeyPair ratchet_key;
olm::curve25519_generate_key(random + olm::KEY_LENGTH, ratchet_key);
- olm_logf(OLM_LOG_DEBUG, LOG_CATEGORY, "Created new ratchet key T(0) %s",
- ratchet_key.to_string().c_str());
olm::Curve25519KeyPair const & alice_identity_key_pair = (
local_account.identity_keys.curve25519_key
@@ -108,7 +95,6 @@ std::size_t olm::Session::new_outbound_session(
olm::unset(ratchet_key);
olm::unset(secret);
- olm_logf(OLM_LOG_DEBUG, LOG_CATEGORY, "Initialised outbound session");
return std::size_t(0);
}
@@ -151,13 +137,6 @@ std::size_t olm::Session::new_inbound_session(
their_identity_key->public_key, reader.identity_key, olm::KEY_LENGTH
);
if (!same) {
- olm_logf(OLM_LOG_INFO, LOG_CATEGORY,
- "Identity key on received message is incorrect "
- "(expected %s, got %s)",
- their_identity_key->to_string().c_str(),
- olm::bytes_to_string(reader.identity_key,
- reader.identity_key + olm::KEY_LENGTH)
- .c_str());
last_error = olm::ErrorCode::BAD_MESSAGE_KEY_ID;
return std::size_t(-1);
}
@@ -167,13 +146,6 @@ std::size_t olm::Session::new_inbound_session(
olm::load_array(alice_base_key.public_key, reader.base_key);
olm::load_array(bob_one_time_key.public_key, reader.one_time_key);
- olm_logf(OLM_LOG_DEBUG, LOG_CATEGORY,
- "Creating new inbound session from sender identity IA %s, "
- "sender ephemeral EA %s, our ephemeral EB %s",
- alice_identity_key.to_string().c_str(),
- alice_base_key.to_string().c_str(),
- bob_one_time_key.to_string().c_str());
-
olm::MessageReader message_reader;
decode_message(
message_reader, reader.message, reader.message_length,
@@ -189,17 +161,11 @@ std::size_t olm::Session::new_inbound_session(
olm::Curve25519PublicKey ratchet_key;
olm::load_array(ratchet_key.public_key, message_reader.ratchet_key);
- olm_logf(OLM_LOG_DEBUG, LOG_CATEGORY,
- "Received ratchet key T(0) %s", ratchet_key.to_string().c_str());
-
olm::OneTimeKey const * our_one_time_key = local_account.lookup_key(
bob_one_time_key
);
if (!our_one_time_key) {
- olm_logf(OLM_LOG_INFO, LOG_CATEGORY,
- "Session uses unknown ephemeral key %s",
- bob_one_time_key.to_string().c_str());
last_error = olm::ErrorCode::BAD_MESSAGE_KEY_ID;
return std::size_t(-1);
}
@@ -221,7 +187,6 @@ std::size_t olm::Session::new_inbound_session(
olm::unset(secret);
- olm_logf(OLM_LOG_DEBUG, LOG_CATEGORY, "Initialised inbound session");
return std::size_t(0);
}
@@ -320,9 +285,6 @@ std::size_t olm::Session::encrypt(
std::uint8_t const * random, std::size_t random_length,
std::uint8_t * message, std::size_t message_length
) {
- olm_logf(OLM_LOG_DEBUG, LOG_CATEGORY, "Encrypting '%.*s'",
- (int)plaintext_length, plaintext);
-
if (message_length < encrypt_message_length(plaintext_length)) {
last_error = olm::ErrorCode::OUTPUT_BUFFER_TOO_SMALL;
return std::size_t(-1);
@@ -349,16 +311,6 @@ std::size_t olm::Session::encrypt(
olm::store_array(writer.identity_key, alice_identity_key.public_key);
olm::store_array(writer.base_key, alice_base_key.public_key);
message_body = writer.message;
-
-
- olm_logf(OLM_LOG_DEBUG, LOG_CATEGORY,
- "Encoded pre-key message ver=%i one_time_key[Eb]=%s "
- "base_key[Ea]=%s identity_key[Ia]=%s",
- PROTOCOL_VERSION,
- olm::bytes_to_string(writer.one_time_key, olm::KEY_LENGTH).c_str(),
- olm::bytes_to_string(writer.base_key, olm::KEY_LENGTH).c_str(),
- olm::bytes_to_string(writer.identity_key, olm::KEY_LENGTH).c_str()
- );
}
std::size_t result = ratchet.encrypt(
@@ -373,9 +325,6 @@ std::size_t olm::Session::encrypt(
return result;
}
- olm_logf(OLM_LOG_TRACE, LOG_CATEGORY, "Encrypted message %s",
- olm::bytes_to_string(message_body, result).c_str());
-
return result;
}
@@ -417,9 +366,6 @@ std::size_t olm::Session::decrypt(
std::uint8_t const * message, std::size_t message_length,
std::uint8_t * plaintext, std::size_t max_plaintext_length
) {
- olm_logf(OLM_LOG_TRACE, LOG_CATEGORY, "Decrypting %smessage",
- message_type == olm::MessageType::MESSAGE ? "" : "pre-key ");
-
std::uint8_t const * message_body;
std::size_t message_body_length;
if (message_type == olm::MessageType::MESSAGE) {
@@ -447,8 +393,6 @@ std::size_t olm::Session::decrypt(
}
received_message = true;
- olm_logf(OLM_LOG_DEBUG, LOG_CATEGORY, "Decrypted '%.*s'",
- (int)result, plaintext);
return result;
}