aboutsummaryrefslogtreecommitdiffstats
path: root/src/main/java/de/pixart/messenger/crypto (follow)
Commit message (Collapse)AuthorAgeFilesLines
* code cleanup in AxolotlService.fetchDeviceIds()Christian Schneppe2018-04-241-25/+29
|
* load currently open conversation fasterChristian Schneppe2018-04-241-1/+0
|
* make error message for 'not encrypted for this device'Christian Schneppe2018-04-231-2/+9
|
* create dedicated exception for not encrypted for this deviceChristian Schneppe2018-04-232-1/+36
|
* introduced tri state omemo setting (off by default, on by default, always)Christian Schneppe2018-04-131-0/+74
|
* figure out fallbacks with omemo source idChristian Schneppe2018-04-122-0/+29
|
* offer a more convienient way to disable omemo from trust keys dialogChristian Schneppe2018-04-081-26/+43
|
* migrate to xmpp-addrChristian Schneppe2018-04-028-101/+103
|
* finished 'Set Status Message' dialogChristian Schneppe2018-04-011-6/+5
|
* don't send messages in callbackChristian Schneppe2018-04-011-114/+86
|
* integrate trust manager into conversationsChristian Schneppe2018-03-122-2/+10
|
* discover file extension in original filename from pgpChristian Schneppe2018-01-301-1/+23
|
* encrypt muc PM only to actual recipientChristian Schneppe2018-01-271-5/+23
|
* improvements for self messagesChristian Schneppe2018-01-271-2/+7
| | | | | | * fix omemo in group chats w/o participants * don't create two axolotl messages when messaging self * fix read marker for self messages
* allow axolotl header to be empty in empty mucsChristian Schneppe2018-01-271-4/+4
|
* make chat markers opportunistic in private mucsChristian Schneppe2018-01-271-2/+2
|
* disable offline messages. postpone prekey handling until after mam catchupChristian Schneppe2018-01-211-3/+33
|
* properly handle key transport messages. use prekeyparsing only when that ↵Christian Schneppe2018-01-213-36/+38
| | | | attribute is set
* show pep as available if omemo_all_access has been installed on serverChristian Schneppe2017-12-271-0/+1
|
* fixed omemo device list not getting annouced on empty listChristian Schneppe2017-12-271-1/+1
|
* fixup for pep omemo notification dedupChristian Schneppe2017-12-161-4/+6
|
* fixed workaround that allowed us to expire devicesChristian Schneppe2017-12-161-7/+8
|
* possible fix for retry loop on pgp key annoucementChristian Schneppe2017-12-101-3/+2
|
* fixed publish-options migrationChristian Schneppe2017-12-101-1/+9
|
* PgpService: feed result intent back into decryptionChristian Schneppe2017-11-231-6/+12
|
* excute db read and writes on different threadsChristian Schneppe2017-11-211-1/+1
|
* create a new axolotl service when the account jid changesChristian Schneppe2017-08-131-0/+13
|
* prevent users from editing their account jid after successful loginChristian Schneppe2017-08-131-2/+2
|
* use random string generator instead of BigInteger in DigestMd5Christian Schneppe2017-08-031-2/+1
|
* use base64 instead of base36 when creating random stringsChristian Schneppe2017-08-012-3/+11
|
* avoid unnecessary roster sync in OMEMO code. fixed startup performance ↵Christian Schneppe2017-08-011-1/+0
| | | | regression
* refresh omemo activity after failing to fetch keys due to lack of idsChristian Schneppe2017-08-011-0/+1
|
* Give up PGP decryption when intent is cancelledChristian Schneppe2017-08-011-0/+21
| | | | | | | | | | | When receiving a PGP message which is not encrypted with YOUR key, OpenKeychain shows a dialog, which tells you the private key to decrypt the message is unavailable. However, Conversations won't give up decrypting the message. So whether the subsequent messages are decryptable or not, the decryption is blocked at the current message. The commit fixes the bug in this way: Give up the current message when the decryption intent is cancelled, so that subsequent messages can be handled.
* made OF selfSigned() workaround only available >=kitkatChristian Schneppe2017-08-011-4/+3
| | | | | this undos 0f34c0ab3ed0ce3c98dc4d835c7897e8d533f7e6 as it turns out 4.1 and 4.0 only break when checking if a cert is self signed.
* made omemo always available but in public mucsChristian Schneppe2017-08-011-1/+1
|
* provide upgrade path for accounts with publish-optionsChristian Schneppe2017-08-011-3/+13
|
* use publish-options instead of always pushing node configurationChristian Schneppe2017-08-011-29/+57
|
* let hasPendingFetches() return true when fetching device idsChristian Schneppe2017-08-011-4/+6
|
* fetch required device ids on demandChristian Schneppe2017-08-012-33/+85
|
* explicitly fetch device ids before building sessions in single mode conversationChristian Schneppe2017-08-011-0/+36
|
* change access model of omemo pep nodes after every publishChristian Schneppe2017-08-011-13/+32
|
* fetch device ids for muc members w/o known devicesChristian Schneppe2017-08-011-1/+22
|
* use CN-workaround for pre-kitkatChristian Schneppe2017-08-011-2/+4
|
* fix regression introduces with OF fix. properly fall back to common nameChristian Schneppe2017-08-011-7/+7
|
* workaround for OpenFire: check CN first in self signed certsChristian Schneppe2017-08-011-5/+32
| | | | | | | | | | | | | | | The self signed certificates created by OpenFire (Not sure if other certs are affected as well) will crash the Java/Android TLS stack when accessing getSubjectAlternativeNames() on the the peer certificate. This usually goes unnoticed in other applications since the DefaultHostnameVerifier checkes the CN first. That however is a violation of RFC6125 section 6.4.4 which requires us to check for the existence of SAN first. This commit adds a work around where in self signed certificates we check for the CN first as well. (Avoiding the call to getSubjectAlternativeNames())
* fixed fingerprint trust (was messed up after library upgrade)Christian Schneppe2017-06-252-5/+6
|
* also check for hostname in in certs if hostname is from trusted sourceChristian Schneppe2017-06-241-4/+16
|
* upgrade to signal-protocol-javaChristian Schneppe2017-06-243-107/+114
|
* display open pgp key id in account details and allow to deleteChristian Schneppe2017-05-101-4/+0
|
* don't load signed prekeys on startupChristian Schneppe2017-05-092-4/+5
|