Alan Friedman d46b8f24b5 Use asymmetric encryption to replace passphrase exchange
All parties now create public/private key pairs for
encryption/decryption and signing/verification. Public keys are passed
around and stored in server memory while the room is alive. Session
keys, which are used to encrypt cleartext messages, are newly generated
for each message and are encrypted using each participant’s public key.
Messages are signed using the sender’s private signing key.
2016-01-23 20:49:29 -05:00
..
2016-01-19 16:43:19 -05:00
2016-01-19 12:35:47 -05:00