Age | Commit message (Collapse) | Author | |
---|---|---|---|
2016-09-16 | Merge pull request #24 from matrix-org/rav/one_time_keys_comment | Richard van der Hoff | |
Update comment on olm_account_one_time_keys | |||
2016-09-16 | Update comment on olm_account_one_time_keys | Richard van der Hoff | |
Document what it actually returns. | |||
2016-09-14 | Fix the release instructions | Mark Haines | |
2016-09-14 | Changelog and version bump for 1.3.01.3.0 | Mark Haines | |
2016-09-14 | Make release instructions more C+Pable | Mark Haines | |
2016-09-14 | Fix the group javascript demo | Mark Haines | |
2016-09-13 | Merge remote-tracking branch 'matrix/master' | Mark Haines | |
2016-09-13 | Merge pull request #23 from matrix-org/markjh/remove_message_index | Mark Haines | |
Remove the messsage index from olm_init_inbound_group_session | |||
2016-09-13 | Merge pull request #22 from matrix-org/markjh/inbound_group_session_id | Mark Haines | |
Add a olm_inbound_group_session_id method | |||
2016-09-13 | Remove the messsage index from olm_init_inbound_group_session since it is ↵ | Mark Haines | |
read from the session_key | |||
2016-09-13 | Add a test to check the equivalence of session ids for inbound and outbound ↵ | Mark Haines | |
sessions | |||
2016-09-13 | Add a olm_inbound_group_session_id method | Mark Haines | |
2016-09-13 | Merge pull request #21 from matrix-org/markjh/fix_session_ids | Mark Haines | |
Use the ed25519 public key as the group session id. | |||
2016-09-13 | ``if`` is not the same as ``for`` | Mark Haines | |
2016-09-13 | Comment on the encoding of the message counter. | Mark Haines | |
2016-09-13 | Use the ed22519 public key as the group session id. | Mark Haines | |
Some clients expect the session id to be globally unique, so allowing the end devices to pick the session id will cause problems. Include the current ratchet index with the initial keys, this decreases the risk that the client will supply the wrong index causing problems. Sign the initial keys with the ratchet ed25519 key, this reduces the risk of a client claiming a session that they didn't create. | |||
2016-09-06 | call double ratchet what it is | Matthew Hodgson | |
2016-09-06 | Bump version numbers to 1.2.01.2.0 | Richard van der Hoff | |
2016-09-06 | Merge pull request #20 from matrix-org/rav/prep_v1.2.0 | Richard van der Hoff | |
Prepare changelog for v1.2.0 | |||
2016-09-06 | Prepare changelog for v1.2.0 | Richard van der Hoff | |
2016-09-06 | Merge pull request #19 from matrix-org/rav/megolm_signing | Richard van der Hoff | |
Sign megolm messages | |||
2016-09-06 | Sign megolm messages | Richard van der Hoff | |
Add ed25519 keys to the inbound and outbound sessions, and use them to sign and verify megolm messages. We just stuff the ed25519 public key in alongside the megolm session key (and add a version byte), to save adding more boilerplate to the JS/python/etc layers. | |||
2016-09-06 | Clean up some typos | Richard van der Hoff | |
Remove redundant args from some js funcs, and fix a comment typo | |||
2016-09-06 | Merge pull request #18 from matrix-org/rav/pickle_ed25519_in_c | Richard van der Hoff | |
Convert ed25519 pickling functions to C | |||
2016-09-06 | Merge pull request #17 from matrix-org/rav/group_session_error_handling | Richard van der Hoff | |
Fix error handling for group sessions | |||
2016-09-05 | Fix error handling for group sessions | Richard van der Hoff | |
Fix a couple of places where we were using the wrong method to get the last error. | |||
2016-09-05 | remove js package before building | Richard van der Hoff | |
2016-09-05 | pack the js after building | Richard van der Hoff | |
2016-09-05 | Build the JS wrappers on jenkins | Richard van der Hoff | |
2016-09-05 | Convert ed25519 pickling functions to C | Richard van der Hoff | |
... so that I can use them from the group session bits. | |||
2016-09-05 | Avoid ldconfig in the Makefile | Richard van der Hoff | |
... because OSX doesn't support it. | |||
2016-09-05 | Merge pull request #14 from matrix-org/rav/convert_crypto_to_c | Richard van der Hoff | |
Convert crypto.hh into C-compatible interface | |||
2016-09-05 | Convert AES functions to plain C | Richard van der Hoff | |
2016-09-05 | Convert Ed25519 and Curve25519 functions to plain C | Richard van der Hoff | |
2016-09-05 | Merge pull request #15 from matrix-org/rav/has_received_message | Richard van der Hoff | |
OlmSession.has_received_message | |||
2016-09-05 | Merge pull request #16 from matrix-org/rav/fix_megolm_utf8 | Richard van der Hoff | |
Fix megolm decryption of UTF-8 | |||
2016-09-05 | Merge pull request #13 from matrix-org/rav/split_out_key_lengths | Richard van der Hoff | |
Create new constants for key lengths, etc | |||
2016-09-05 | Fix megolm decryption of UTF-8 | Richard van der Hoff | |
Repeat the fix from b10f90d for megolm messages. It turns out that the 'length' argument to 'Pointer_stringify' doesn't work if the input includes characters >= 128. Rather than try to figure out which methods can return UTF-8, and which always return plain ascii, replace all uses of Pointer_stringify with a 'length' argument with the version that expects a NULL-terminated input, and extend the buffer by a byte to allow space for a null-terminator. In the case of decrypt, we need to add the null ourself. Fixes https://github.com/vector-im/vector-web/issues/2078. | |||
2016-09-04 | OlmSession.has_received_message | Richard van der Hoff | |
I find myself wanting to know if an OlmSession is in the pre-key state or not, to help debugging at the application level. | |||
2016-09-02 | Create new constants for key lengths, etc | Richard van der Hoff | |
We were using olm::KEY_LENGTH for everything under the sun which happened to be 32 bytes long, and making a bunch of assumptions in the process. Create a bunch of new constants (as C #defines rather than C++ consts so that I can use them in another forthcoming refactor). | |||
2016-09-01 | Bump version in package.json1.1.0 | Richard van der Hoff | |
... to match the Makefile | |||
2016-09-01 | Merge branch 'rav/ed25519_fix' | Richard van der Hoff | |
2016-09-01 | Merge branch 'rav/ed25519_fix' | Richard van der Hoff | |
2016-09-01 | update changelog | Richard van der Hoff | |
pre-1.0.0 was broken too | |||
2016-09-01 | Fix Ed25519 keypair generation | Richard van der Hoff | |
Ed25519 private keys, it turns out, have 64 bytes, not 32. We were previously generating only 32 bytes (which is all that is required to generate the public key), and then using the public key as the upper 32 bytes when generating the per-message session key. This meant that everything appeared to work, but the security of the private key was severely compromised. By way of fixes: * Use the correct algorithm for generating the Ed25519 private key, and store all 512 bits of it. * Update the account pickle format and refuse to load the old format (since we should consider it compromised). * Bump the library version, and add a function to retrieve the library version, so that applications can verify that they are linked against a fixed version of the library. * Remove the curve25519_{sign, verify} functions which were unused and of dubious quality. | |||
2016-07-16 | refer to Double Ratchet in readme | Matthew Hodgson | |
2016-07-11 | Document the release process | Richard van der Hoff | |
2016-07-11 | Makefile rules to build the rst into html | Richard van der Hoff | |
2016-07-11 | Prepare 1.0.0 release1.0.0 | Richard van der Hoff | |
2016-07-06 | Merge branch 'rav/fix_decrypt_utf8' | Richard van der Hoff | |