Commit Graph

120 Commits

Author SHA1 Message Date
1349df9274 refactor: Move the DH function into its own file 2022-08-03 16:55:56 +02:00
e11baabfa0 feat: Remove the identityKey == 3 case 2022-08-03 16:52:42 +02:00
f897431692 docs: Improve documentation 2022-08-03 16:50:27 +02:00
45d0c57305 fix: Throw a custom exception 2022-08-03 16:44:18 +02:00
8d222a160f feat: Check the HMAC during decryption 2022-08-03 16:41:33 +02:00
6d8238475c refactor: Remove pkcs7padding function 2022-08-03 16:38:04 +02:00
2fc2623092 docs: I meant 0.8.3, not 0.8.0 2022-08-03 16:32:22 +02:00
1a0f470ada feat: IMPLEMENT THE DOUBLE RATCHET WITH X3DH 2022-08-03 15:29:13 +02:00
4e3e20f08c ???: Move code around 2022-08-03 15:13:03 +02:00
d3c8d813a9 wip: Add the basics for the Double Ratchet 2022-08-02 18:13:14 +02:00
56ae882aa0 style: Fix linter warning 2022-08-02 15:44:31 +02:00
26019ac704 style: Move the X3DH info string into a constant 2022-08-02 15:43:39 +02:00
4211775c90 feat: Add signature validation 2022-08-02 15:40:26 +02:00
fc43655956 feat: Calculate the Appended Data 2022-08-02 15:26:00 +02:00
15df3b7f6b fix: Remove TODO
The X3DH spec says that salt (presumably the nonce) is supposed
to be [0, 0, ..., 0] with the length of the hash. I seem to have
skipped over that.

From Section 2.2:
"HKDF salt = A zero-filled byte sequence with length equal to the
hash output length."
2022-08-02 15:17:07 +02:00
566cb1b0ec style: Lint using very_good_analysis 2022-08-02 15:10:31 +02:00
d86e7f5963 refactor: Clean up the X3DH implementation 2022-08-02 15:03:58 +02:00
34df73c929 ENABLE X3DH WITH ED25519 KEYS 2022-08-01 23:20:31 +02:00
0565cdef81 IMPLEMENT X3DH (without OMEMO) 2022-08-01 22:08:38 +02:00
18c6fdb54e Initial commit 2022-06-30 14:00:18 +02:00