aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* version bump for ShortcutBadgerDaniel Gultsch2015-08-031-1/+1
|
* added changelog for version 1.6Daniel Gultsch2015-08-011-0/+6
|
* version bump to 1.6.0-betaDaniel Gultsch2015-08-011-2/+2
|
* lets try jpeg for a whileDaniel Gultsch2015-08-011-1/+1
|
* temporarily renamed new encryption method to 'Multi-End' until a better name ↵Daniel Gultsch2015-08-011-10/+10
| | | | has been found
* use content-type in http slot request and stick with during uploadDaniel Gultsch2015-08-012-2/+8
|
* fixed calculated file size in http slot requestDaniel Gultsch2015-08-011-15/+13
|
* Let UNTRUSTED/UNDECIDED keys become INACTIVEAndreas Straub2015-08-019-116/+138
|
* enable axolotl encryption for jingle supported file transfersDaniel Gultsch2015-08-0110-138/+223
|
* Provide process function for key transport messageAndreas Straub2015-07-314-19/+84
|
* Refactor axolotl message processing workflowAndreas Straub2015-07-317-157/+121
| | | | | | | | | | | | | | XmppAxolotlMessage is now entirely responsible for handling encryption and decryption of messages, only leveraging XmppAxolotlSession as a packing/unpacking primitive for payload keys. Removed pseudo-dead session generation code step from prepareMessage function, as sessions have been created by invoking the TrustKeysActivity for a while now. Added prepareKeyTransportMessage function, which creates a message with no payload. The key that is packed into the header keyElements can then be used for other purposes (e.g. encrypted file transfer).
* Reformat codeAndreas Straub2015-07-313-86/+87
|
* Change to new wire protocol versionAndreas Straub2015-07-315-73/+112
|
* added missing carbon column message table create statementDaniel Gultsch2015-07-311-0/+1
| | | | fixes #1310
* improved 'next encryption' selectionDaniel Gultsch2015-07-316-73/+69
|
* removed expert setting to 'force encryption'. merged certifcate and ↵Daniel Gultsch2015-07-312-83/+75
| | | | encryption settings into same category
* Fix session logic: enforce same type of encryptionAndreas Straub2015-07-302-25/+34
|
* fixed some colors in message adapterDaniel Gultsch2015-07-305-28/+33
|
* use gcm for file encryption over httpDaniel Gultsch2015-07-296-104/+127
|
* Reset lock color for non-axolotl messagesAndreas Straub2015-07-291-0/+2
|
* Highlight selected message's fingerprint in listAndreas Straub2015-07-297-13/+34
|
* Rerender message bubbles on encryption changeAndreas Straub2015-07-291-0/+1
|
* Tag carbon messages in parser, adapt session logicAndreas Straub2015-07-294-7/+32
| | | | | | Messages sent from another device of the own account are now explicitly tagged as carboned message. The session detection logic now uses this tag to find "session borders".
* Fix NPE: consider unknown keys UNDECIDEDAndreas Straub2015-07-291-1/+2
|
* Color plaintext messages in encrypted sessions redAndreas Straub2015-07-291-0/+30
| | | | | | | | | Plaintext messages that were received while in an encrypted session are now colored red. We define "in an encrypted session" if a) the last message sent by our own device before the message under consideration (or any message received between then and now) was encrypted AND b) the next message will be sent encrypted or the next message sent after the one under consideration was sent encrypted
* Improve trust toggle responsivenessAndreas Straub2015-07-291-6/+1
| | | | Removed unnecessary UI refreshes, explicitly update UI where needed.
* Refactor out inner classes, cache trust storeAndreas Straub2015-07-2910-709/+760
| | | | | | | Moves SQLiteAxolotlStore and XmppAxolotlSession into proper classes. IdentityKeys trust statuses are now cached in an LruCache to prevent hammering the database when rendering the UI.
* add new received message bubble drawableDaniel Gultsch2015-07-2917-0/+166
|
* show http downloaded images in notificationDaniel Gultsch2015-07-291-2/+3
|
* removed recursion in message.getMerged*()Daniel Gultsch2015-07-281-13/+19
|
* changed logging. (work around logcat null pointerDaniel Gultsch2015-07-282-2/+1
|
* log reason for message failureDaniel Gultsch2015-07-281-0/+7
|
* linked XEPs in READMEDaniel Gultsch2015-07-281-9/+9
|
* set time on resend to current timeDaniel Gultsch2015-07-281-1/+2
| | | | | fixes #1298 fixes #919
* rewrote dns fallbackDaniel Gultsch2015-07-242-9/+9
|
* call refreshUi directlyDaniel Gultsch2015-07-241-1/+1
|
* switch/case can't deal with null pointersDaniel Gultsch2015-07-231-0/+3
|
* show warning when trying to highlight users that have left the conferenceDaniel Gultsch2015-07-223-5/+22
|
* treat private, non-anonymous mucs like 1:1 chats notification wiseDaniel Gultsch2015-07-224-4/+11
|
* Always build own device session automaticallyAndreas Straub2015-07-221-6/+13
|
* add no-store to chat statesDaniel Gultsch2015-07-221-0/+2
|
* use type=chat more often to go along with new, simple carbon and mam rulesDaniel Gultsch2015-07-222-12/+15
| | | | | * change chat states to type=chat and chat markers to type=chat * use same type as requesting stanza for delivery receipts (which should make them type=chat most of the time)
* use 'interactive mode' when starting downloads from the context menuDaniel Gultsch2015-07-223-3/+2
|
* Hide regenerate keys buttonAndreas Straub2015-07-223-11/+16
| | | | Can re-enable it via Config.java setting
* Disable trust toggle completely for INACTIVE keysAndreas Straub2015-07-221-0/+1
|
* made image file format configurable by Config.javaDaniel Gultsch2015-07-213-8/+18
|
* bump to version 1.5.2Daniel Gultsch2015-07-211-2/+2
|
* fixed npe in error message handlingDaniel Gultsch2015-07-211-1/+1
|
* decreased saturation of received message bubbles by 25 unitsDaniel Gultsch2015-07-2111-1/+1
|
* Add INACTIVE state for removed keysAndreas Straub2015-07-219-40/+102
| | | | | | | | | | | | | We introduce a new trust state: INACTIVE. This state is intended for old keys that have been removed. When a TRUSTED device is removed from the PEP devicelist, it's status will be set to INACTIVE. INACTIVE keys are shown in the UI as greyed out, non-interactible key rows. Messages are not encrypted for INACTIVE devices. When an INACTIVE device reappears in PEP, or a message is received from an INACTIVE device, it is set back to trusted.