aboutsummaryrefslogtreecommitdiff
path: root/include/olm
AgeCommit message (Collapse)Author
2019-09-30Fix comment and also js buildDavid Baker
The python that searches the header files for exports isn't smart enough to know what is a comment and what isn't, so it picks this up too and emscripten then complains about it being undefined.
2019-06-12fix another incorrect commentHubert Chathi
2019-06-12use the right error in the commentHubert Chathi
2019-05-14add more consts and commentsHubert Chathi
2019-05-14add comment about input buffers being overwrittenHubert Chathi
also make some params const where possible
2019-04-10Fix arg name in commentsmanuroe
(cherry picked from commit c0a53ebaeda420f636698b99c393868d2bf8f905)
2019-04-02add support for an incorrect KDF that snuck into Riot 1.0Hubert Chathi
2019-03-13rename functions to be more consistentHubert Chathi
2019-01-30Yay for incorrect comments breaking the build...David Baker
2019-01-29Add signing class to the pk moduleDavid Baker
2019-01-21initial implementation of short authentication string generationHubert Chathi
2018-10-22Merge pull request #70 from matrix-org/manuroe/objc_pkmanuroe
OLMKit: Add objc wrappers for pk encryption/decryption
2018-10-16document a couple more places where olm clobbers thingsHubert Chathi
2018-10-16Fix compilation warning for olm_pk_private_key_length(void);manuroe
2018-10-11Add aliases for deprecated functionsDavid Baker
2018-10-05Merge branch 'master' into dbkr/pk_private_export_importHubert Chathi
2018-10-05add more comments describing the pk encrypt/decrypt functionsHubert Chathi
2018-10-05fix some code style issues and typosHubert Chathi
2018-10-02Work with PkDecryption keys by their private keysDavid Baker
Change interface to allow the app to get the private part of the key and instantiate a decryption object from just the private part of the key. Changes the function generating a key from random bytes to be initialising a key with a private key (because it's exactly the same thing). Exports & imports private key parts as ArrayBuffer at JS level rather than base64 assuming we are moving that way in general.
2018-06-28use void in type signatures for functions with no argumentsHubert Chathi
2018-06-28add functions for pickling/unpickling a decryption objectHubert Chathi
2018-06-27add initial implementation of basic private key encryption functionalityHubert Chathi
2018-06-27fix some commentsHubert Chathi
2018-06-27Fix warnings reported by LLVMmanuroe
2017-09-29Avoid C99 inside C++ codeAlexey Rusakov
This disrupts building at least with Visual Studio. Signed-off-by: Alexey Rusakov <ktirf@users.sf.net>
2017-01-10Add some tests for inbound session import/exportRichard van der Hoff
2017-01-09Implement importing group session dataRichard van der Hoff
olm_import_inbound_group_session, which reads the format written by olm_export_inbound_group_session to initialise a group session.
2017-01-06Enable exporting inbound group session keysRichard van der Hoff
A pair of functions which allow you to export the megolm keys for an inbound group session, so that an application can save/restore them.
2016-10-25Document the return values for olm_matches_inbound_sessionMark Haines
2016-10-21Clear random buf in olm_init_outbound_group_sessionRichard van der Hoff
All the other methods clear their random inputs. This one needs to do the same, to reduce the risk of the randomness being used elsewhere and leaking key info.
2016-10-20Return the message index when decrypting group messages.Mark Haines
Applications can use the index to detect replays of the same message.
2016-09-16Update comment on olm_account_one_time_keysRichard van der Hoff
Document what it actually returns.
2016-09-13Merge pull request #23 from matrix-org/markjh/remove_message_indexMark Haines
Remove the messsage index from olm_init_inbound_group_session
2016-09-13Remove the messsage index from olm_init_inbound_group_session since it is ↵Mark Haines
read from the session_key
2016-09-13Add a olm_inbound_group_session_id methodMark Haines
2016-09-06Sign megolm messagesRichard van der Hoff
Add ed25519 keys to the inbound and outbound sessions, and use them to sign and verify megolm messages. We just stuff the ed25519 public key in alongside the megolm session key (and add a version byte), to save adding more boilerplate to the JS/python/etc layers.
2016-09-06Clean up some typosRichard van der Hoff
Remove redundant args from some js funcs, and fix a comment typo
2016-09-05Convert ed25519 pickling functions to CRichard van der Hoff
... so that I can use them from the group session bits.
2016-09-05Convert AES functions to plain CRichard van der Hoff
2016-09-05Convert Ed25519 and Curve25519 functions to plain CRichard van der Hoff
2016-09-05Merge pull request #15 from matrix-org/rav/has_received_messageRichard van der Hoff
OlmSession.has_received_message
2016-09-04OlmSession.has_received_messageRichard van der Hoff
I find myself wanting to know if an OlmSession is in the pre-key state or not, to help debugging at the application level.
2016-09-02Create new constants for key lengths, etcRichard van der Hoff
We were using olm::KEY_LENGTH for everything under the sun which happened to be 32 bytes long, and making a bunch of assumptions in the process. Create a bunch of new constants (as C #defines rather than C++ consts so that I can use them in another forthcoming refactor).
2016-09-01Fix Ed25519 keypair generationRichard van der Hoff
Ed25519 private keys, it turns out, have 64 bytes, not 32. We were previously generating only 32 bytes (which is all that is required to generate the public key), and then using the public key as the upper 32 bytes when generating the per-message session key. This meant that everything appeared to work, but the security of the private key was severely compromised. By way of fixes: * Use the correct algorithm for generating the Ed25519 private key, and store all 512 bits of it. * Update the account pickle format and refuse to load the old format (since we should consider it compromised). * Bump the library version, and add a function to retrieve the library version, so that applications can verify that they are linked against a fixed version of the library. * Remove the curve25519_{sign, verify} functions which were unused and of dubious quality.
2016-06-30Make space in the session pickle for chain indexRichard van der Hoff
Keeping track of the chain index is a useful thing to do, but is only required if we've enabled diagnostics. Extend the session pickle format to make a space for it, so that pickles can be transferred between the logging_enabled branch and the master branch without loss of information. Also add some tests for session pickling which explicitly check that we can unpickle both formats of pickle.
2016-06-30Remove unused 'chain_index' from RatchetRichard van der Hoff
This was introduced when I was experimenting with support for logging progress in Olm. That is now relegated to the logging_enabled branch, so this should probably be removed. This also fixes the incompatibility of session pickles from the current master branch with those from olm 0.1.0.
2016-05-25Remove session_id from group messagesRichard van der Hoff
Putting the session_id inside the packed message body makes it hard to extract so that we can decide which session to use. We don't think there is any advantage to having thes sesion_id protected by the HMACs, so we're going to move it to the JSON framing.
2016-05-24Separate base64ing from the rest of msg encodingRichard van der Hoff
Factor the actual message encoding/decoding and encrypting/decrypting out to separate functions from the top-level functions which do the base64-wrangling. This is particularly helpful in the 'outbound' code-path where the offsets required to allow room to base64-encode make the flow hard to see when it's all inline.
2016-05-24Update megolm_cipher as a global structRichard van der Hoff
Initialise megolm_cipher via the preprocessor macro, instead of with a function.
2016-05-24Fix up some names, and protobuf tagsRichard van der Hoff
Make names (of session_key and message_index) more consistent. Use our own protobuf tags rather than trying to piggyback on the one-to-one structure.