status-protocol-go/encryption
Andrea Maria Piana e3b3ba39f3
Handle DH double ratchet errors
Errors when generating a DH secret where silently ignored, resulting in
invalid key material being used.
This commit fixes the issue by upgrading the double ratchet library
 and implementing the updated interface, which uses now slices instead of fixed bytes keys.
2019-10-31 16:22:44 +01:00
..
migrations Add identicon and gfycat generated names 2019-09-26 06:43:11 +02:00
multidevice Add persistent datasync 2019-08-28 09:47:58 +02:00
publisher Remove sqlite persistence 2019-08-22 10:39:21 +02:00
sharedsecret Add persistent datasync 2019-08-28 09:47:58 +02:00
encryption_multi_device_test.go Remove deprecated bundle field 2019-09-10 13:33:37 +02:00
encryption_test.go Add persistent datasync 2019-08-28 09:47:58 +02:00
encryptor.go Handle DH double ratchet errors 2019-10-31 16:22:44 +01:00
persistence.go Handle DH double ratchet errors 2019-10-31 16:22:44 +01:00
persistence_keys_storage_test.go Add persistent datasync 2019-08-28 09:47:58 +02:00
persistence_test.go Add persistent datasync 2019-08-28 09:47:58 +02:00
protocol.go Remove deprecated bundle field 2019-09-10 13:33:37 +02:00
protocol_message.pb.go Remove deprecated bundle field 2019-09-10 13:33:37 +02:00
protocol_message.proto Remove deprecated bundle field 2019-09-10 13:33:37 +02:00
protocol_test.go Remove deprecated bundle field 2019-09-10 13:33:37 +02:00
x3dh.go [Fixes #9] Increase multidevice response (#16) 2019-07-17 08:42:27 +02:00
x3dh_test.go move code from status-go and status-console-client 2019-07-08 11:21:21 +02:00