aboutsummaryrefslogtreecommitdiffstats
path: root/src/main/java/de/pixart/messenger/crypto (follow)
Commit message (Collapse)AuthorAgeFilesLines
* PgpService: feed result intent back into decryptionChristian Schneppe2017-11-231-6/+12
|
* excute db read and writes on different threadsChristian Schneppe2017-11-211-1/+1
|
* create a new axolotl service when the account jid changesChristian Schneppe2017-08-131-0/+13
|
* prevent users from editing their account jid after successful loginChristian Schneppe2017-08-131-2/+2
|
* use random string generator instead of BigInteger in DigestMd5Christian Schneppe2017-08-031-2/+1
|
* use base64 instead of base36 when creating random stringsChristian Schneppe2017-08-012-3/+11
|
* avoid unnecessary roster sync in OMEMO code. fixed startup performance ↵Christian Schneppe2017-08-011-1/+0
| | | | regression
* refresh omemo activity after failing to fetch keys due to lack of idsChristian Schneppe2017-08-011-0/+1
|
* Give up PGP decryption when intent is cancelledChristian Schneppe2017-08-011-0/+21
| | | | | | | | | | | When receiving a PGP message which is not encrypted with YOUR key, OpenKeychain shows a dialog, which tells you the private key to decrypt the message is unavailable. However, Conversations won't give up decrypting the message. So whether the subsequent messages are decryptable or not, the decryption is blocked at the current message. The commit fixes the bug in this way: Give up the current message when the decryption intent is cancelled, so that subsequent messages can be handled.
* made OF selfSigned() workaround only available >=kitkatChristian Schneppe2017-08-011-4/+3
| | | | | this undos 0f34c0ab3ed0ce3c98dc4d835c7897e8d533f7e6 as it turns out 4.1 and 4.0 only break when checking if a cert is self signed.
* made omemo always available but in public mucsChristian Schneppe2017-08-011-1/+1
|
* provide upgrade path for accounts with publish-optionsChristian Schneppe2017-08-011-3/+13
|
* use publish-options instead of always pushing node configurationChristian Schneppe2017-08-011-29/+57
|
* let hasPendingFetches() return true when fetching device idsChristian Schneppe2017-08-011-4/+6
|
* fetch required device ids on demandChristian Schneppe2017-08-012-33/+85
|
* explicitly fetch device ids before building sessions in single mode conversationChristian Schneppe2017-08-011-0/+36
|
* change access model of omemo pep nodes after every publishChristian Schneppe2017-08-011-13/+32
|
* fetch device ids for muc members w/o known devicesChristian Schneppe2017-08-011-1/+22
|
* use CN-workaround for pre-kitkatChristian Schneppe2017-08-011-2/+4
|
* fix regression introduces with OF fix. properly fall back to common nameChristian Schneppe2017-08-011-7/+7
|
* workaround for OpenFire: check CN first in self signed certsChristian Schneppe2017-08-011-5/+32
| | | | | | | | | | | | | | | The self signed certificates created by OpenFire (Not sure if other certs are affected as well) will crash the Java/Android TLS stack when accessing getSubjectAlternativeNames() on the the peer certificate. This usually goes unnoticed in other applications since the DefaultHostnameVerifier checkes the CN first. That however is a violation of RFC6125 section 6.4.4 which requires us to check for the existence of SAN first. This commit adds a work around where in self signed certificates we check for the CN first as well. (Avoiding the call to getSubjectAlternativeNames())
* fixed fingerprint trust (was messed up after library upgrade)Christian Schneppe2017-06-252-5/+6
|
* also check for hostname in in certs if hostname is from trusted sourceChristian Schneppe2017-06-241-4/+16
|
* upgrade to signal-protocol-javaChristian Schneppe2017-06-243-107/+114
|
* display open pgp key id in account details and allow to deleteChristian Schneppe2017-05-101-4/+0
|
* don't load signed prekeys on startupChristian Schneppe2017-05-092-4/+5
|
* treat URL as file if URL is in oob or contains keyChristian Schneppe2017-04-131-1/+1
|
* make x509 verification node world readableChristian Schneppe2017-03-041-3/+18
|
* add explicit encryption hints to outgoing messagesChristian Schneppe2017-01-291-0/+1
|
* Add SCRAM-SHA-2 supportChristian Schneppe2017-01-163-211/+261
|
* refactored whispermessage processingChristian Schneppe2017-01-162-27/+27
|
* partially improved logging for receiving omemo messagesChristian Schneppe2017-01-164-18/+28
|
* don't allow to purge keys. offer distrust insteadChristian Schneppe2017-01-153-7/+11
|
* treat omemo keys >= 32 bytes as containing auth tag. add config flag to put ↵Christian Schneppe2017-01-142-23/+51
| | | | auth tag in key
* adding prekey='true' to omemo messages if applicableChristian Schneppe2017-01-092-11/+25
|
* don't throw assertion error when building session with same device id from ↵Christian Schneppe2016-12-291-1/+6
| | | | other contact
* added omemo padding but disabled by Config.java flagChristian Schneppe2016-12-251-2/+18
|
* disable removing of broken devices by defaultChristian Schneppe2016-12-251-10/+12
|
* remove broken devices only once to prevent loopsChristian Schneppe2016-12-251-2/+5
|
* remove own fetch errors from device announcementChristian Schneppe2016-12-181-29/+45
|
* use prepped string when building axolotl sessionChristian Schneppe2016-12-181-3/+3
|
* update the conversations view (and the lock icon) after receiving device listChristian Schneppe2016-11-241-0/+1
|
* introduced blind trust before verification modeChristian Schneppe2016-11-243-3/+35
| | | | read more about the concept on https://gultsch.de/trust.html
* remove omemo devices from annoucement after 7 days of inactivityChristian Schneppe2016-11-202-24/+54
|
* save last activation time in fingerprint statusChristian Schneppe2016-11-204-7/+48
|
* show 'clear devices' button underneath own devicesChristian Schneppe2016-11-202-23/+6
|
* removed some unecessary logging from omemo message generationChristian Schneppe2016-11-201-4/+0
|
* removed some very verbose logging from axolotl serviceChristian Schneppe2016-11-201-1/+0
|
* reformat codeChristian Schneppe2016-11-1919-2861/+2865
|
* put omemo fingerprint in own uri (qr code / nfc)Christian Schneppe2016-11-182-2/+6
|