Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | code cleanup in AxolotlService.fetchDeviceIds() | Christian Schneppe | 2018-04-24 | 1 | -25/+29 |
| | |||||
* | load currently open conversation faster | Christian Schneppe | 2018-04-24 | 1 | -1/+0 |
| | |||||
* | make error message for 'not encrypted for this device' | Christian Schneppe | 2018-04-23 | 1 | -2/+9 |
| | |||||
* | create dedicated exception for not encrypted for this device | Christian Schneppe | 2018-04-23 | 2 | -1/+36 |
| | |||||
* | introduced tri state omemo setting (off by default, on by default, always) | Christian Schneppe | 2018-04-13 | 1 | -0/+74 |
| | |||||
* | figure out fallbacks with omemo source id | Christian Schneppe | 2018-04-12 | 2 | -0/+29 |
| | |||||
* | offer a more convienient way to disable omemo from trust keys dialog | Christian Schneppe | 2018-04-08 | 1 | -26/+43 |
| | |||||
* | migrate to xmpp-addr | Christian Schneppe | 2018-04-02 | 8 | -101/+103 |
| | |||||
* | finished 'Set Status Message' dialog | Christian Schneppe | 2018-04-01 | 1 | -6/+5 |
| | |||||
* | don't send messages in callback | Christian Schneppe | 2018-04-01 | 1 | -114/+86 |
| | |||||
* | integrate trust manager into conversations | Christian Schneppe | 2018-03-12 | 2 | -2/+10 |
| | |||||
* | discover file extension in original filename from pgp | Christian Schneppe | 2018-01-30 | 1 | -1/+23 |
| | |||||
* | encrypt muc PM only to actual recipient | Christian Schneppe | 2018-01-27 | 1 | -5/+23 |
| | |||||
* | improvements for self messages | Christian Schneppe | 2018-01-27 | 1 | -2/+7 |
| | | | | | | * fix omemo in group chats w/o participants * don't create two axolotl messages when messaging self * fix read marker for self messages | ||||
* | allow axolotl header to be empty in empty mucs | Christian Schneppe | 2018-01-27 | 1 | -4/+4 |
| | |||||
* | make chat markers opportunistic in private mucs | Christian Schneppe | 2018-01-27 | 1 | -2/+2 |
| | |||||
* | disable offline messages. postpone prekey handling until after mam catchup | Christian Schneppe | 2018-01-21 | 1 | -3/+33 |
| | |||||
* | properly handle key transport messages. use prekeyparsing only when that ↵ | Christian Schneppe | 2018-01-21 | 3 | -36/+38 |
| | | | | attribute is set | ||||
* | show pep as available if omemo_all_access has been installed on server | Christian Schneppe | 2017-12-27 | 1 | -0/+1 |
| | |||||
* | fixed omemo device list not getting annouced on empty list | Christian Schneppe | 2017-12-27 | 1 | -1/+1 |
| | |||||
* | fixup for pep omemo notification dedup | Christian Schneppe | 2017-12-16 | 1 | -4/+6 |
| | |||||
* | fixed workaround that allowed us to expire devices | Christian Schneppe | 2017-12-16 | 1 | -7/+8 |
| | |||||
* | possible fix for retry loop on pgp key annoucement | Christian Schneppe | 2017-12-10 | 1 | -3/+2 |
| | |||||
* | fixed publish-options migration | Christian Schneppe | 2017-12-10 | 1 | -1/+9 |
| | |||||
* | PgpService: feed result intent back into decryption | Christian Schneppe | 2017-11-23 | 1 | -6/+12 |
| | |||||
* | excute db read and writes on different threads | Christian Schneppe | 2017-11-21 | 1 | -1/+1 |
| | |||||
* | create a new axolotl service when the account jid changes | Christian Schneppe | 2017-08-13 | 1 | -0/+13 |
| | |||||
* | prevent users from editing their account jid after successful login | Christian Schneppe | 2017-08-13 | 1 | -2/+2 |
| | |||||
* | use random string generator instead of BigInteger in DigestMd5 | Christian Schneppe | 2017-08-03 | 1 | -2/+1 |
| | |||||
* | use base64 instead of base36 when creating random strings | Christian Schneppe | 2017-08-01 | 2 | -3/+11 |
| | |||||
* | avoid unnecessary roster sync in OMEMO code. fixed startup performance ↵ | Christian Schneppe | 2017-08-01 | 1 | -1/+0 |
| | | | | regression | ||||
* | refresh omemo activity after failing to fetch keys due to lack of ids | Christian Schneppe | 2017-08-01 | 1 | -0/+1 |
| | |||||
* | Give up PGP decryption when intent is cancelled | Christian Schneppe | 2017-08-01 | 1 | -0/+21 |
| | | | | | | | | | | | When receiving a PGP message which is not encrypted with YOUR key, OpenKeychain shows a dialog, which tells you the private key to decrypt the message is unavailable. However, Conversations won't give up decrypting the message. So whether the subsequent messages are decryptable or not, the decryption is blocked at the current message. The commit fixes the bug in this way: Give up the current message when the decryption intent is cancelled, so that subsequent messages can be handled. | ||||
* | made OF selfSigned() workaround only available >=kitkat | Christian Schneppe | 2017-08-01 | 1 | -4/+3 |
| | | | | | this undos 0f34c0ab3ed0ce3c98dc4d835c7897e8d533f7e6 as it turns out 4.1 and 4.0 only break when checking if a cert is self signed. | ||||
* | made omemo always available but in public mucs | Christian Schneppe | 2017-08-01 | 1 | -1/+1 |
| | |||||
* | provide upgrade path for accounts with publish-options | Christian Schneppe | 2017-08-01 | 1 | -3/+13 |
| | |||||
* | use publish-options instead of always pushing node configuration | Christian Schneppe | 2017-08-01 | 1 | -29/+57 |
| | |||||
* | let hasPendingFetches() return true when fetching device ids | Christian Schneppe | 2017-08-01 | 1 | -4/+6 |
| | |||||
* | fetch required device ids on demand | Christian Schneppe | 2017-08-01 | 2 | -33/+85 |
| | |||||
* | explicitly fetch device ids before building sessions in single mode conversation | Christian Schneppe | 2017-08-01 | 1 | -0/+36 |
| | |||||
* | change access model of omemo pep nodes after every publish | Christian Schneppe | 2017-08-01 | 1 | -13/+32 |
| | |||||
* | fetch device ids for muc members w/o known devices | Christian Schneppe | 2017-08-01 | 1 | -1/+22 |
| | |||||
* | use CN-workaround for pre-kitkat | Christian Schneppe | 2017-08-01 | 1 | -2/+4 |
| | |||||
* | fix regression introduces with OF fix. properly fall back to common name | Christian Schneppe | 2017-08-01 | 1 | -7/+7 |
| | |||||
* | workaround for OpenFire: check CN first in self signed certs | Christian Schneppe | 2017-08-01 | 1 | -5/+32 |
| | | | | | | | | | | | | | | | The self signed certificates created by OpenFire (Not sure if other certs are affected as well) will crash the Java/Android TLS stack when accessing getSubjectAlternativeNames() on the the peer certificate. This usually goes unnoticed in other applications since the DefaultHostnameVerifier checkes the CN first. That however is a violation of RFC6125 section 6.4.4 which requires us to check for the existence of SAN first. This commit adds a work around where in self signed certificates we check for the CN first as well. (Avoiding the call to getSubjectAlternativeNames()) | ||||
* | fixed fingerprint trust (was messed up after library upgrade) | Christian Schneppe | 2017-06-25 | 2 | -5/+6 |
| | |||||
* | also check for hostname in in certs if hostname is from trusted source | Christian Schneppe | 2017-06-24 | 1 | -4/+16 |
| | |||||
* | upgrade to signal-protocol-java | Christian Schneppe | 2017-06-24 | 3 | -107/+114 |
| | |||||
* | display open pgp key id in account details and allow to delete | Christian Schneppe | 2017-05-10 | 1 | -4/+0 |
| | |||||
* | don't load signed prekeys on startup | Christian Schneppe | 2017-05-09 | 2 | -4/+5 |
| |