Age | Commit message (Collapse) | Author | |
---|---|---|---|
2018-10-16 | document a couple more places where olm clobbers things | Hubert Chathi | |
2018-06-27 | fix some comments | Hubert Chathi | |
2018-06-27 | Fix warnings reported by LLVM | manuroe | |
2016-10-25 | Document the return values for olm_matches_inbound_session | Mark Haines | |
2016-09-16 | Update comment on olm_account_one_time_keys | Richard van der Hoff | |
Document what it actually returns. | |||
2016-09-04 | OlmSession.has_received_message | Richard van der Hoff | |
I find myself wanting to know if an OlmSession is in the pre-key state or not, to help debugging at the application level. | |||
2016-09-01 | Fix Ed25519 keypair generation | Richard van der Hoff | |
Ed25519 private keys, it turns out, have 64 bytes, not 32. We were previously generating only 32 bytes (which is all that is required to generate the public key), and then using the public key as the upper 32 bytes when generating the per-message session key. This meant that everything appeared to work, but the security of the private key was severely compromised. By way of fixes: * Use the correct algorithm for generating the Ed25519 private key, and store all 512 bits of it. * Update the account pickle format and refuse to load the old format (since we should consider it compromised). * Bump the library version, and add a function to retrieve the library version, so that applications can verify that they are linked against a fixed version of the library. * Remove the curve25519_{sign, verify} functions which were unused and of dubious quality. | |||
2016-05-24 | Implement decrypting inbound group messages | Richard van der Hoff | |
Includes creation of inbound sessions, etc | |||
2016-05-24 | Implementation of an outbound group session | Richard van der Hoff | |
2016-05-23 | Rename olm.hh to olm.h | Richard van der Hoff | |