Skip to content

Conversation

@Fizzadar
Copy link
Contributor

For servers that verify the OTKs are indeed signed by the device key.

Pull Request Checklist

Signed-off-by: Nick @ Beeper (@Fizzadar) <nick@beeper.com)

For servers that verify the OTKs are indeed signed by the device key.
@Fizzadar Fizzadar requested review from a team as code owners December 19, 2025 12:23
Comment on lines +183 to +187
deviceKeys, oneTimeKeys := alice.MustGenerateOneTimeKeys(t, 2)

// first upload key 1, sleep a bit, then upload key 0.
otk1 := map[string]interface{}{"signed_curve25519:1": oneTimeKeys["signed_curve25519:1"]}
alice.MustUploadKeys(t, nil, otk1)
alice.MustUploadKeys(t, deviceKeys, otk1)
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is the only place where we didn't do this. Are we sure this wasn't on purpose (should have had a comment if-so)?

This test is about one-time key claim ordering so it shouldn't matter ⏩

@MadLittleMods MadLittleMods merged commit 98c05e6 into matrix-org:main Dec 19, 2025
4 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants