status-go/protocol/encryption
Andrea Maria Piana 11db9f2119
Add test for everyone tag & fix migration order
A migration was added out-of-order, which meant that in clients who
had already run the migration after, it would be skip.
This commit re-adds the migration so it's run, tested against an empty
account and one that had already migrated.
2023-02-24 10:18:26 +00:00
..
github.com/protocol/encryption feat: display name 2022-03-14 13:48:34 -04:00
migrations Add test for everyone tag & fix migration order 2023-02-24 10:18:26 +00:00
multidevice feat: make kdf iterations configurable when creating a multiaccount (#2796) 2022-09-27 16:27:20 -04:00
publisher using zap.NewNop() ignores configured log level 2021-08-19 11:35:40 +02:00
sharedsecret feat: make kdf iterations configurable when creating a multiaccount (#2796) 2022-09-27 16:27:20 -04:00
README.md Communities encryption 2021-11-30 20:52:47 +02:00
encryption_multi_device_test.go feat: make kdf iterations configurable when creating a multiaccount (#2796) 2022-09-27 16:27:20 -04:00
encryption_test.go Send all encryption keys 2022-10-20 12:19:44 +01:00
encryptor.go Bump encryption too high number 2023-01-13 11:51:30 +00:00
persistence.go Sync community encryption keys 2022-11-15 10:11:01 +00:00
persistence_keys_storage_test.go replace deprecated ioutil.TempDir with os.MkdirTemp 2023-01-03 15:40:11 +01:00
persistence_test.go replace deprecated ioutil.TempDir with os.MkdirTemp 2023-01-03 15:40:11 +01:00
protocol.go Sync community encryption keys 2022-11-15 10:11:01 +00:00
protocol_message.pb.go Send all encryption keys 2022-10-20 12:19:44 +01:00
protocol_message.proto Send all encryption keys 2022-10-20 12:19:44 +01:00
protocol_test.go feat: make kdf iterations configurable when creating a multiaccount (#2796) 2022-09-27 16:27:20 -04:00
x3dh.go Create a home submodule for Eth node bridges- Rename StatusBackend to GethStatusBackend 2019-11-27 17:02:09 +01:00
x3dh_test.go Use goimports instead of gofmt 2020-01-06 10:17:23 +01:00

README.md

protocol/encryption package

Hash ratchet encryption

encryptor.GenerateHashRatchetKey() generates a hash ratchet key and stores it in in the DB. There, 2 new tables are created: hash_ratchet_encryption and hash_ratchet_encryption_cache. Each hash ratchet key is uniquely identified by the (groupId, keyId) pair, where keyId is derived from a clock value.

protocol.BuildHashRatchetKeyExchangeMessage builds an 1-on-1 message containing the hash ratchet key, given it's ID.

protocol.BuildHashRatchetMessage builds a hash ratchet message with arbitrary payload, given groupId. It will use the latest hash ratchet key available. encryptor.encryptWithHR encrypts the payload using Hash Ratchet algorithms. Intermediate hashes are stored in hash_ratchet_encryption_cache table.

protocol.HandleMessage uses encryptor.decryptWithHR fn for decryption.