Commit message (Collapse) | Author | Files | Lines | ||
---|---|---|---|---|---|
2019-07-01 | attempt to unregister when receiving push for channel no longer joined | Christian Schneppe | 1 | -1/+5 | |
when receiving a FCM push message for a channel the user is no longer in (this can happen when the disable command failed) an attempt will be made to explicitly unregister from the app server (which in turn will then send item-not-found on next push) | |||||
2019-02-07 | provide the same fab submenu for both tabs. rename tab to bookmark | Christian Schneppe | 1 | -1/+2 | |
2018-12-04 | implement self healing omemo | Christian Schneppe | 1 | -0/+1 | |
after receiving a SignalMessage that can’t be decrypted because of broken sessions Conversations will attempt to grab a new pre key bundle and send a new PreKeySignalMessage wrapped in a key transport message. | |||||
2018-10-20 | refactor magic creates password gen to CryptoHelper | Christian Schneppe | 1 | -5/+13 | |
2018-07-09 | refined create conference dialog | Christian Schneppe | 1 | -0/+14 | |
2018-05-26 | Do not use TLS_FALLBACK_SCSV | Christian Schneppe | 1 | -0/+1 | |
2018-05-26 | add support for S3 file transfers | Christian Schneppe | 1 | -1/+1 | |
2018-05-17 | changed jid of push server | Christian Schneppe | 1 | -3/+3 | |
2018-04-23 | make error message for 'not encrypted for this device' | Christian Schneppe | 1 | -0/+1 | |
2018-04-02 | migrate to xmpp-addr | Christian Schneppe | 1 | -8/+7 | |
2018-02-26 | added config param to use a random resource at every bind | Christian Schneppe | 1 | -1/+1 | |
2017-08-13 | parse jid from CN in client certs if nothing else is available | Christian Schneppe | 1 | -4/+12 | |
2017-08-01 | use base64 instead of base36 when creating random strings | Christian Schneppe | 1 | -0/+8 | |
2017-06-24 | upgrade to signal-protocol-java | Christian Schneppe | 1 | -2/+1 | |
2017-04-16 | transform aesgcm:// links back to https:// before connecting through Tor | Christian Schneppe | 1 | -1/+13 | |
2017-04-13 | send urls pointing to pgp encrypted files directly in body+oob | Christian Schneppe | 1 | -0/+8 | |
2017-04-13 | use aesgcm:// uri scheme for omemo encrypted http upload | Christian Schneppe | 1 | -0/+13 | |
2016-11-24 | added share button to account details | Christian Schneppe | 1 | -1/+5 | |
2016-11-19 | reformat code | Christian Schneppe | 1 | -185/+185 | |
2016-10-08 | issue ping after push was received | Christian Schneppe | 1 | -0/+10 | |
2016-07-29 | show identity type for device selection | Daniel Gultsch | 1 | -0/+3 | |
2016-07-29 | changed package id inside manifest and project | Christian Schneppe | 1 | -6/+6 | |
2016-05-28 | put bug report jid in config. include package signature in report | Daniel Gultsch | 1 | -3/+8 | |
2015-12-27 | lower case all fingerprints. fixes #1521 | Daniel Gultsch | 1 | -1/+2 | |
2015-12-23 | code cleanup | Daniel Gultsch | 1 | -22/+0 | |
2015-12-23 | show certificate information | Daniel Gultsch | 1 | -0/+50 | |
2015-10-28 | show encryption type in warned/red messages | Daniel Gultsch | 1 | -0/+15 | |
2015-10-16 | introduced code to verify omemo device keys with x509 certificates. | Daniel Gultsch | 1 | -4/+24 | |
cleaned up TrustKeysActivity to automatically close if there is nothing to do | |||||
2015-10-11 | add menu item in account details to renew certificate | Daniel Gultsch | 1 | -0/+19 | |
2015-07-19 | Adapt prettifyFingerprint() to axolotl FP sizes | Andreas Straub | 1 | -5/+4 | |
2015-07-11 | null check otr fingerprint before display | Daniel Gultsch | 1 | -1/+3 | |
2015-04-25 | fixed #1039 | Daniel Gultsch | 1 | -0/+3 | |
2015-03-07 | disable all really weak cipher suites | Boris Wachtmeister | 1 | -0/+16 | |
With #959 all ciphers of the platform were enabled, but this also includes several suites that are considered as very weak, even down to NULL- and anon-ciphers which disable completely disable encryption and/or authentication. Especially the anon-ciphers could be easily used for a mitm-attack. To remove all weak ciphers a blacklist with patterns of cipher-names was added to Config.java. The blacklist is based on the "mandatory discards" that Mozilla suggests to not use for TLS-servers because they are weak or known to be broken. https://wiki.mozilla.org/Security/Server_Side_TLS#Mandatory_discards | |||||
2015-02-02 | Use platform ciphers as well, just prefer ours | Sam Whited | 1 | -5/+7 | |
2015-02-02 | don't disable any ciphers | iNPUTmice | 1 | -3/+4 | |
2015-01-14 | Harden the TLS connection cipher suites | Sam Whited | 1 | -5/+16 | |
2014-11-15 | Don't escape passwords in SASL | Sam Whited | 1 | -1/+1 | |
Fixes #671 | |||||
2014-11-16 | parse otr-fingerprint in qr codes and nfc. include otr fingerprint in ↵ | iNPUTmice | 1 | -0/+9 | |
shareable uri where ever possible | |||||
2014-11-15 | Cache SCRAM-SHA-1 keys for current session | Sam Whited | 1 | -0/+4 | |
2014-11-14 | Add SCRAM-SHA1 support | Sam Whited | 1 | -2/+29 | |
Factor out GS2 tokanization into own class Add authentication exception class Fixes #71 | |||||
2014-11-12 | Refactor authentication code | Sam Whited | 1 | -59/+1 | |
2014-10-22 | Make conversations the root project | Sam Whited | 1 | -0/+0 | |