aboutsummaryrefslogtreecommitdiff
path: root/src
AgeCommit message (Collapse)Author
2020-09-23also check that the pubkey is set when calculating the MACHubert Chathi
2020-09-23set their_key_set flag explicitly on initHubert Chathi
2020-09-23SAS: add olm_sas_is_their_key_setSaúl Ibarra Corretgé
Also make olm_sas_generate_bytes fail if their key wasn't set.
2020-09-16fix styleHubert Chathi
2020-08-14add support for fallback keysHubert Chathi
2019-10-08check return value of snprintf, fix typo, add clarificationHubert Chathi
2019-10-04Pass in a buffer to olm_session_describeDavid Baker
instead of having a static one, as that could end up taking up a lot of memory if your app keeps olm sessions hanging about.
2019-10-01Add olm_session_describeDavid Baker
As a way to dump the state of an olm session, ie. the chain indicies, so we can debug why olm sessions break and get out of sync.
2019-05-14add more consts and commentsHubert Chathi
2019-05-14add comment about input buffers being overwrittenHubert Chathi
also make some params const where possible
2019-04-02add support for an incorrect KDF that snuck into Riot 1.0Hubert Chathi
2019-03-13rename functions to be more consistentHubert Chathi
2019-02-01call the right function and remove unnecessary includeHubert Chathi
2019-01-29Add signing class to the pk moduleDavid Baker
2019-01-21initial implementation of short authentication string generationHubert Chathi
2018-10-15use the correct error codeHubert Chathi
2018-10-11Add aliases for deprecated functionsDavid Baker
2018-10-05Merge branch 'master' into dbkr/pk_private_export_importHubert Chathi
2018-10-05fix some code style issues and typosHubert Chathi
2018-10-02Work with PkDecryption keys by their private keysDavid Baker
Change interface to allow the app to get the private part of the key and instantiate a decryption object from just the private part of the key. Changes the function generating a key from random bytes to be initialising a key with a private key (because it's exactly the same thing). Exports & imports private key parts as ArrayBuffer at JS level rather than base64 assuming we are moving that way in general.
2018-09-19Fix output buffer length checkDavid Baker
...when generating a key in PkDecryption. The pubkey is base64ed on the output, so will be longer.
2018-06-28use void in type signatures for functions with no argumentsHubert Chathi
2018-06-28add functions for pickling/unpickling a decryption objectHubert Chathi
2018-06-27add initial implementation of basic private key encryption functionalityHubert Chathi
2018-06-27Fix warnings reported by LLVMmanuroe
2018-06-27fix a length check and add some missing length checksHubert Chathi
2017-09-29Drop unused #includeAlexey Rusakov
Signed-off-by: Alexey Rusakov <ktirf@users.sf.net>
2017-09-29Avoid C99 inside C++ codeAlexey Rusakov
This disrupts building at least with Visual Studio. Signed-off-by: Alexey Rusakov <ktirf@users.sf.net>
2017-01-10Add some tests for inbound session import/exportRichard van der Hoff
2017-01-10Store a flag indicating if the sender key is verifiedRichard van der Hoff
2017-01-09Implement importing group session dataRichard van der Hoff
olm_import_inbound_group_session, which reads the format written by olm_export_inbound_group_session to initialise a group session.
2017-01-06Enable exporting inbound group session keysRichard van der Hoff
A pair of functions which allow you to export the megolm keys for an inbound group session, so that an application can save/restore them.
2016-10-24Return the base64-encoded length of picklesRichard van der Hoff
make olm_pickle_* return the lengths of the base64-encoded pickles, rather than the raw pickle. (From the application's POV, the format of the pickle is opaque: it doesn't even know that it is base64-encoded. So returning the length of the raw pickle is particularly unhelpful.)
2016-10-21Clear random buf in olm_init_outbound_group_sessionRichard van der Hoff
All the other methods clear their random inputs. This one needs to do the same, to reduce the risk of the randomness being used elsewhere and leaking key info.
2016-10-21Merge pull request #31 from matrix-org/markjh/groupmessageindexMark Haines
Return the message index when decrypting group messages.
2016-10-20Add NULL check for message_index pointerMark Haines
2016-10-20Return the message index when decrypting group messages.Mark Haines
Applications can use the index to detect replays of the same message.
2016-10-19Fix a buffer bounds check when decoding group messagesRichard van der Hoff
Fixes a segfault when a group message had exactly the length of the mac + signature. Also tweak skipping of unknown tags to avoid an extra trip around the loop.
2016-09-13Merge pull request #23 from matrix-org/markjh/remove_message_indexMark Haines
Remove the messsage index from olm_init_inbound_group_session
2016-09-13Remove the messsage index from olm_init_inbound_group_session since it is ↵Mark Haines
read from the session_key
2016-09-13Add a olm_inbound_group_session_id methodMark Haines
2016-09-13``if`` is not the same as ``for``Mark Haines
2016-09-13Comment on the encoding of the message counter.Mark Haines
2016-09-13Use the ed22519 public key as the group session id.Mark Haines
Some clients expect the session id to be globally unique, so allowing the end devices to pick the session id will cause problems. Include the current ratchet index with the initial keys, this decreases the risk that the client will supply the wrong index causing problems. Sign the initial keys with the ratchet ed25519 key, this reduces the risk of a client claiming a session that they didn't create.
2016-09-06Sign megolm messagesRichard van der Hoff
Add ed25519 keys to the inbound and outbound sessions, and use them to sign and verify megolm messages. We just stuff the ed25519 public key in alongside the megolm session key (and add a version byte), to save adding more boilerplate to the JS/python/etc layers.
2016-09-05Convert ed25519 pickling functions to CRichard van der Hoff
... so that I can use them from the group session bits.
2016-09-05Convert AES functions to plain CRichard van der Hoff
2016-09-05Convert Ed25519 and Curve25519 functions to plain CRichard van der Hoff
2016-09-05Merge pull request #15 from matrix-org/rav/has_received_messageRichard van der Hoff
OlmSession.has_received_message
2016-09-04OlmSession.has_received_messageRichard van der Hoff
I find myself wanting to know if an OlmSession is in the pre-key state or not, to help debugging at the application level.