aboutsummaryrefslogtreecommitdiffstats
path: root/src/main/java/de/pixart/messenger/utils/CryptoHelper.java (unfollow)
Commit message (Collapse)AuthorFilesLines
2018-04-02migrate to xmpp-addrChristian Schneppe1-8/+7
2018-02-26added config param to use a random resource at every bindChristian Schneppe1-1/+1
2017-08-13parse jid from CN in client certs if nothing else is availableChristian Schneppe1-4/+12
2017-08-01use base64 instead of base36 when creating random stringsChristian Schneppe1-0/+8
2017-06-24upgrade to signal-protocol-javaChristian Schneppe1-2/+1
2017-04-16transform aesgcm:// links back to https:// before connecting through TorChristian Schneppe1-1/+13
2017-04-13send urls pointing to pgp encrypted files directly in body+oobChristian Schneppe1-0/+8
2017-04-13use aesgcm:// uri scheme for omemo encrypted http uploadChristian Schneppe1-0/+13
2016-11-24added share button to account detailsChristian Schneppe1-1/+5
2016-11-19reformat codeChristian Schneppe1-185/+185
2016-10-08issue ping after push was receivedChristian Schneppe1-0/+10
2016-07-29show identity type for device selectionDaniel Gultsch1-0/+3
2016-07-29changed package id inside manifest and projectChristian Schneppe1-6/+6
2016-05-28put bug report jid in config. include package signature in reportDaniel Gultsch1-3/+8
2015-12-27lower case all fingerprints. fixes #1521Daniel Gultsch1-1/+2
2015-12-23code cleanupDaniel Gultsch1-22/+0
2015-12-23show certificate informationDaniel Gultsch1-0/+50
2015-10-28show encryption type in warned/red messagesDaniel Gultsch1-0/+15
2015-10-16introduced code to verify omemo device keys with x509 certificates.Daniel Gultsch1-4/+24
cleaned up TrustKeysActivity to automatically close if there is nothing to do
2015-10-11add menu item in account details to renew certificateDaniel Gultsch1-0/+19
2015-07-19Adapt prettifyFingerprint() to axolotl FP sizesAndreas Straub1-5/+4
2015-07-11null check otr fingerprint before displayDaniel Gultsch1-1/+3
2015-04-25fixed #1039Daniel Gultsch1-0/+3
2015-03-07disable all really weak cipher suitesBoris Wachtmeister1-0/+16
With #959 all ciphers of the platform were enabled, but this also includes several suites that are considered as very weak, even down to NULL- and anon-ciphers which disable completely disable encryption and/or authentication. Especially the anon-ciphers could be easily used for a mitm-attack. To remove all weak ciphers a blacklist with patterns of cipher-names was added to Config.java. The blacklist is based on the "mandatory discards" that Mozilla suggests to not use for TLS-servers because they are weak or known to be broken. https://wiki.mozilla.org/Security/Server_Side_TLS#Mandatory_discards
2015-02-02Use platform ciphers as well, just prefer oursSam Whited1-5/+7
2015-02-02don't disable any ciphersiNPUTmice1-3/+4
2015-01-14Harden the TLS connection cipher suitesSam Whited1-5/+16
2014-11-15Don't escape passwords in SASLSam Whited1-1/+1
Fixes #671
2014-11-16parse otr-fingerprint in qr codes and nfc. include otr fingerprint in ↵iNPUTmice1-0/+9
shareable uri where ever possible
2014-11-15Cache SCRAM-SHA-1 keys for current sessionSam Whited1-0/+4
2014-11-14Add SCRAM-SHA1 supportSam Whited1-2/+29
Factor out GS2 tokanization into own class Add authentication exception class Fixes #71
2014-11-12Refactor authentication codeSam Whited1-59/+1
2014-10-22Make conversations the root projectSam Whited1-0/+0