Compare commits
5 commits
master
...
tor_suppor
Author | SHA1 | Date | |
---|---|---|---|
|
bbda8cdd55 | ||
|
c02af991ae | ||
|
e13707a111 | ||
|
b113c6e4fb | ||
|
b7a5254bae |
16 changed files with 415 additions and 165 deletions
|
@ -2,6 +2,10 @@ package eu.siacs.conversations;
|
|||
|
||||
import android.graphics.Bitmap;
|
||||
|
||||
import java.net.InetAddress;
|
||||
import java.net.InetSocketAddress;
|
||||
import java.net.Proxy;
|
||||
|
||||
import eu.siacs.conversations.xmpp.chatstate.ChatState;
|
||||
|
||||
public final class Config {
|
||||
|
@ -38,7 +42,7 @@ public final class Config {
|
|||
public static final int REFRESH_UI_INTERVAL = 500;
|
||||
|
||||
public static final boolean DISABLE_PROXY_LOOKUP = false; //useful to debug ibb
|
||||
public static final boolean DISABLE_HTTP_UPLOAD = false;
|
||||
public static final boolean DISABLE_HTTP_UPLOAD = true;
|
||||
public static final boolean DISABLE_STRING_PREP = false; // setting to true might increase startup performance
|
||||
public static final boolean EXTENDED_SM_LOGGING = true; // log stanza counts
|
||||
public static final boolean RESET_ATTEMPT_COUNT_ON_NETWORK_CHANGE = true; //setting to true might increase power consumption
|
||||
|
|
|
@ -39,6 +39,8 @@ public class Account extends AbstractEntity {
|
|||
public static final String KEYS = "keys";
|
||||
public static final String AVATAR = "avatar";
|
||||
public static final String DISPLAY_NAME = "display_name";
|
||||
public static final String HOSTNAME = "hostname";
|
||||
public static final String PORT = "port";
|
||||
|
||||
public static final String PINNED_MECHANISM_KEY = "pinned_mechanism";
|
||||
|
||||
|
@ -67,7 +69,7 @@ public class Account extends AbstractEntity {
|
|||
}
|
||||
}
|
||||
|
||||
public static enum State {
|
||||
public enum State {
|
||||
DISABLED,
|
||||
OFFLINE,
|
||||
CONNECTING,
|
||||
|
@ -81,7 +83,7 @@ public class Account extends AbstractEntity {
|
|||
REGISTRATION_NOT_SUPPORTED(true),
|
||||
SECURITY_ERROR(true),
|
||||
INCOMPATIBLE_SERVER(true),
|
||||
DNS_TIMEOUT(true);
|
||||
TOR_NOT_AVAILABLE(true);
|
||||
|
||||
private final boolean isError;
|
||||
|
||||
|
@ -125,8 +127,8 @@ public class Account extends AbstractEntity {
|
|||
return R.string.account_status_security_error;
|
||||
case INCOMPATIBLE_SERVER:
|
||||
return R.string.account_status_incompatible_server;
|
||||
case DNS_TIMEOUT:
|
||||
return R.string.account_status_dns_timeout;
|
||||
case TOR_NOT_AVAILABLE:
|
||||
return R.string.account_status_tor_unavailable;
|
||||
default:
|
||||
return R.string.account_status_unknown;
|
||||
}
|
||||
|
@ -147,6 +149,8 @@ public class Account extends AbstractEntity {
|
|||
protected JSONObject keys = new JSONObject();
|
||||
protected String avatar;
|
||||
protected String displayName = null;
|
||||
protected String hostname = null;
|
||||
protected int port = 5222;
|
||||
protected boolean online = false;
|
||||
private OtrService mOtrService = null;
|
||||
private AxolotlService axolotlService = null;
|
||||
|
@ -164,12 +168,12 @@ public class Account extends AbstractEntity {
|
|||
|
||||
public Account(final Jid jid, final String password) {
|
||||
this(java.util.UUID.randomUUID().toString(), jid,
|
||||
password, 0, null, "", null, null);
|
||||
password, 0, null, "", null, null, null, 5222);
|
||||
}
|
||||
|
||||
public Account(final String uuid, final Jid jid,
|
||||
final String password, final int options, final String rosterVersion, final String keys,
|
||||
final String avatar, String displayName) {
|
||||
final String avatar, String displayName, String hostname, int port) {
|
||||
this.uuid = uuid;
|
||||
this.jid = jid;
|
||||
if (jid.isBareJid()) {
|
||||
|
@ -185,6 +189,8 @@ public class Account extends AbstractEntity {
|
|||
}
|
||||
this.avatar = avatar;
|
||||
this.displayName = displayName;
|
||||
this.hostname = hostname;
|
||||
this.port = port;
|
||||
}
|
||||
|
||||
public static Account fromCursor(final Cursor cursor) {
|
||||
|
@ -201,7 +207,9 @@ public class Account extends AbstractEntity {
|
|||
cursor.getString(cursor.getColumnIndex(ROSTERVERSION)),
|
||||
cursor.getString(cursor.getColumnIndex(KEYS)),
|
||||
cursor.getString(cursor.getColumnIndex(AVATAR)),
|
||||
cursor.getString(cursor.getColumnIndex(DISPLAY_NAME)));
|
||||
cursor.getString(cursor.getColumnIndex(DISPLAY_NAME)),
|
||||
cursor.getString(cursor.getColumnIndex(HOSTNAME)),
|
||||
cursor.getInt(cursor.getColumnIndex(PORT)));
|
||||
}
|
||||
|
||||
public boolean isOptionSet(final int option) {
|
||||
|
@ -236,6 +244,26 @@ public class Account extends AbstractEntity {
|
|||
this.password = password;
|
||||
}
|
||||
|
||||
public void setHostname(String hostname) {
|
||||
this.hostname = hostname;
|
||||
}
|
||||
|
||||
public String getHostname() {
|
||||
return this.hostname == null ? "" : this.hostname;
|
||||
}
|
||||
|
||||
public boolean isOnion() {
|
||||
return getServer().toString().toLowerCase().endsWith(".onion");
|
||||
}
|
||||
|
||||
public void setPort(int port) {
|
||||
this.port = port;
|
||||
}
|
||||
|
||||
public int getPort() {
|
||||
return this.port;
|
||||
}
|
||||
|
||||
public State getStatus() {
|
||||
if (isOptionSet(OPTION_DISABLED)) {
|
||||
return State.DISABLED;
|
||||
|
@ -314,6 +342,8 @@ public class Account extends AbstractEntity {
|
|||
values.put(ROSTERVERSION, rosterVersion);
|
||||
values.put(AVATAR, avatar);
|
||||
values.put(DISPLAY_NAME, displayName);
|
||||
values.put(HOSTNAME, hostname);
|
||||
values.put(PORT, port);
|
||||
return values;
|
||||
}
|
||||
|
||||
|
|
|
@ -1,7 +1,13 @@
|
|||
package eu.siacs.conversations.http;
|
||||
|
||||
import android.os.Build;
|
||||
|
||||
import org.apache.http.conn.ssl.StrictHostnameVerifier;
|
||||
|
||||
import java.io.IOException;
|
||||
import java.net.InetAddress;
|
||||
import java.net.InetSocketAddress;
|
||||
import java.net.Proxy;
|
||||
import java.security.KeyManagementException;
|
||||
import java.security.NoSuchAlgorithmException;
|
||||
import java.util.List;
|
||||
|
@ -87,4 +93,8 @@ public class HttpConnectionManager extends AbstractConnectionManager {
|
|||
} catch (final KeyManagementException | NoSuchAlgorithmException ignored) {
|
||||
}
|
||||
}
|
||||
|
||||
public Proxy getProxy() throws IOException {
|
||||
return new Proxy(Proxy.Type.HTTP, new InetSocketAddress(InetAddress.getLocalHost(), 8118));
|
||||
}
|
||||
}
|
||||
|
|
|
@ -10,7 +10,10 @@ import java.io.IOException;
|
|||
import java.io.InputStream;
|
||||
import java.io.OutputStream;
|
||||
import java.net.HttpURLConnection;
|
||||
import java.net.InetAddress;
|
||||
import java.net.InetSocketAddress;
|
||||
import java.net.MalformedURLException;
|
||||
import java.net.Proxy;
|
||||
import java.net.URL;
|
||||
import java.util.Arrays;
|
||||
|
||||
|
@ -39,10 +42,12 @@ public class HttpDownloadConnection implements Transferable {
|
|||
private int mStatus = Transferable.STATUS_UNKNOWN;
|
||||
private boolean acceptedAutomatically = false;
|
||||
private int mProgress = 0;
|
||||
private boolean mUseTor = false;
|
||||
|
||||
public HttpDownloadConnection(HttpConnectionManager manager) {
|
||||
this.mHttpConnectionManager = manager;
|
||||
this.mXmppConnectionService = manager.getXmppConnectionService();
|
||||
this.mUseTor = mXmppConnectionService.useTorToConnect();
|
||||
}
|
||||
|
||||
@Override
|
||||
|
@ -191,8 +196,15 @@ public class HttpDownloadConnection implements Transferable {
|
|||
try {
|
||||
Log.d(Config.LOGTAG, "retrieve file size. interactive:" + String.valueOf(interactive));
|
||||
changeStatus(STATUS_CHECKING);
|
||||
HttpURLConnection connection = (HttpURLConnection) mUrl.openConnection();
|
||||
HttpURLConnection connection;
|
||||
if (mUseTor) {
|
||||
connection = (HttpURLConnection) mUrl.openConnection(mHttpConnectionManager.getProxy());
|
||||
} else {
|
||||
connection = (HttpURLConnection) mUrl.openConnection();
|
||||
}
|
||||
connection.setRequestMethod("HEAD");
|
||||
Log.d(Config.LOGTAG,"url: "+connection.getURL().toString());
|
||||
Log.d(Config.LOGTAG,"connection: "+connection.toString());
|
||||
connection.setRequestProperty("User-Agent", mXmppConnectionService.getIqGenerator().getIdentityName());
|
||||
if (connection instanceof HttpsURLConnection) {
|
||||
mHttpConnectionManager.setupTrustManager((HttpsURLConnection) connection, interactive);
|
||||
|
@ -245,7 +257,12 @@ public class HttpDownloadConnection implements Transferable {
|
|||
PowerManager.WakeLock wakeLock = mHttpConnectionManager.createWakeLock("http_download_"+message.getUuid());
|
||||
try {
|
||||
wakeLock.acquire();
|
||||
HttpURLConnection connection = (HttpURLConnection) mUrl.openConnection();
|
||||
HttpURLConnection connection;
|
||||
if (mUseTor) {
|
||||
connection = (HttpURLConnection) mUrl.openConnection(mHttpConnectionManager.getProxy());
|
||||
} else {
|
||||
connection = (HttpURLConnection) mUrl.openConnection();
|
||||
}
|
||||
if (connection instanceof HttpsURLConnection) {
|
||||
mHttpConnectionManager.setupTrustManager((HttpsURLConnection) connection, interactive);
|
||||
}
|
||||
|
|
|
@ -12,7 +12,10 @@ import java.io.IOException;
|
|||
import java.io.InputStream;
|
||||
import java.io.OutputStream;
|
||||
import java.net.HttpURLConnection;
|
||||
import java.net.InetAddress;
|
||||
import java.net.InetSocketAddress;
|
||||
import java.net.MalformedURLException;
|
||||
import java.net.Proxy;
|
||||
import java.net.URL;
|
||||
|
||||
import javax.net.ssl.HttpsURLConnection;
|
||||
|
@ -46,6 +49,7 @@ public class HttpUploadConnection implements Transferable {
|
|||
private String mime;
|
||||
private URL mGetUrl;
|
||||
private URL mPutUrl;
|
||||
private boolean mUseTor = false;
|
||||
|
||||
private byte[] key = null;
|
||||
|
||||
|
@ -56,6 +60,7 @@ public class HttpUploadConnection implements Transferable {
|
|||
public HttpUploadConnection(HttpConnectionManager httpConnectionManager) {
|
||||
this.mHttpConnectionManager = httpConnectionManager;
|
||||
this.mXmppConnectionService = httpConnectionManager.getXmppConnectionService();
|
||||
this.mUseTor = mXmppConnectionService.useTorToConnect();
|
||||
}
|
||||
|
||||
@Override
|
||||
|
@ -158,7 +163,11 @@ public class HttpUploadConnection implements Transferable {
|
|||
try {
|
||||
wakeLock.acquire();
|
||||
Log.d(Config.LOGTAG, "uploading to " + mPutUrl.toString());
|
||||
connection = (HttpURLConnection) mPutUrl.openConnection();
|
||||
if (mUseTor) {
|
||||
connection = (HttpURLConnection) mPutUrl.openConnection(mHttpConnectionManager.getProxy());
|
||||
} else {
|
||||
connection = (HttpURLConnection) mPutUrl.openConnection();
|
||||
}
|
||||
if (connection instanceof HttpsURLConnection) {
|
||||
mHttpConnectionManager.setupTrustManager((HttpsURLConnection) connection, true);
|
||||
}
|
||||
|
|
|
@ -43,7 +43,7 @@ public class DatabaseBackend extends SQLiteOpenHelper {
|
|||
private static DatabaseBackend instance = null;
|
||||
|
||||
private static final String DATABASE_NAME = "history";
|
||||
private static final int DATABASE_VERSION = 19;
|
||||
private static final int DATABASE_VERSION = 20;
|
||||
|
||||
private static String CREATE_CONTATCS_STATEMENT = "create table "
|
||||
+ Contact.TABLENAME + "(" + Contact.ACCOUNT + " TEXT, "
|
||||
|
@ -59,41 +59,41 @@ public class DatabaseBackend extends SQLiteOpenHelper {
|
|||
|
||||
private static String CREATE_PREKEYS_STATEMENT = "CREATE TABLE "
|
||||
+ SQLiteAxolotlStore.PREKEY_TABLENAME + "("
|
||||
+ SQLiteAxolotlStore.ACCOUNT + " TEXT, "
|
||||
+ SQLiteAxolotlStore.ID + " INTEGER, "
|
||||
+ SQLiteAxolotlStore.KEY + " TEXT, FOREIGN KEY("
|
||||
+ SQLiteAxolotlStore.ACCOUNT
|
||||
+ ") REFERENCES " + Account.TABLENAME + "(" + Account.UUID + ") ON DELETE CASCADE, "
|
||||
+ "UNIQUE( " + SQLiteAxolotlStore.ACCOUNT + ", "
|
||||
+ SQLiteAxolotlStore.ID
|
||||
+ ") ON CONFLICT REPLACE"
|
||||
+");";
|
||||
+ SQLiteAxolotlStore.ACCOUNT + " TEXT, "
|
||||
+ SQLiteAxolotlStore.ID + " INTEGER, "
|
||||
+ SQLiteAxolotlStore.KEY + " TEXT, FOREIGN KEY("
|
||||
+ SQLiteAxolotlStore.ACCOUNT
|
||||
+ ") REFERENCES " + Account.TABLENAME + "(" + Account.UUID + ") ON DELETE CASCADE, "
|
||||
+ "UNIQUE( " + SQLiteAxolotlStore.ACCOUNT + ", "
|
||||
+ SQLiteAxolotlStore.ID
|
||||
+ ") ON CONFLICT REPLACE"
|
||||
+ ");";
|
||||
|
||||
private static String CREATE_SIGNED_PREKEYS_STATEMENT = "CREATE TABLE "
|
||||
+ SQLiteAxolotlStore.SIGNED_PREKEY_TABLENAME + "("
|
||||
+ SQLiteAxolotlStore.ACCOUNT + " TEXT, "
|
||||
+ SQLiteAxolotlStore.ID + " INTEGER, "
|
||||
+ SQLiteAxolotlStore.KEY + " TEXT, FOREIGN KEY("
|
||||
+ SQLiteAxolotlStore.ACCOUNT
|
||||
+ ") REFERENCES " + Account.TABLENAME + "(" + Account.UUID + ") ON DELETE CASCADE, "
|
||||
+ "UNIQUE( " + SQLiteAxolotlStore.ACCOUNT + ", "
|
||||
+ SQLiteAxolotlStore.ID
|
||||
+ ") ON CONFLICT REPLACE"+
|
||||
+ SQLiteAxolotlStore.ACCOUNT + " TEXT, "
|
||||
+ SQLiteAxolotlStore.ID + " INTEGER, "
|
||||
+ SQLiteAxolotlStore.KEY + " TEXT, FOREIGN KEY("
|
||||
+ SQLiteAxolotlStore.ACCOUNT
|
||||
+ ") REFERENCES " + Account.TABLENAME + "(" + Account.UUID + ") ON DELETE CASCADE, "
|
||||
+ "UNIQUE( " + SQLiteAxolotlStore.ACCOUNT + ", "
|
||||
+ SQLiteAxolotlStore.ID
|
||||
+ ") ON CONFLICT REPLACE" +
|
||||
");";
|
||||
|
||||
private static String CREATE_SESSIONS_STATEMENT = "CREATE TABLE "
|
||||
+ SQLiteAxolotlStore.SESSION_TABLENAME + "("
|
||||
+ SQLiteAxolotlStore.ACCOUNT + " TEXT, "
|
||||
+ SQLiteAxolotlStore.NAME + " TEXT, "
|
||||
+ SQLiteAxolotlStore.DEVICE_ID + " INTEGER, "
|
||||
+ SQLiteAxolotlStore.KEY + " TEXT, FOREIGN KEY("
|
||||
+ SQLiteAxolotlStore.ACCOUNT
|
||||
+ ") REFERENCES " + Account.TABLENAME + "(" + Account.UUID + ") ON DELETE CASCADE, "
|
||||
+ "UNIQUE( " + SQLiteAxolotlStore.ACCOUNT + ", "
|
||||
+ SQLiteAxolotlStore.NAME + ", "
|
||||
+ SQLiteAxolotlStore.DEVICE_ID
|
||||
+ ") ON CONFLICT REPLACE"
|
||||
+");";
|
||||
+ SQLiteAxolotlStore.ACCOUNT + " TEXT, "
|
||||
+ SQLiteAxolotlStore.NAME + " TEXT, "
|
||||
+ SQLiteAxolotlStore.DEVICE_ID + " INTEGER, "
|
||||
+ SQLiteAxolotlStore.KEY + " TEXT, FOREIGN KEY("
|
||||
+ SQLiteAxolotlStore.ACCOUNT
|
||||
+ ") REFERENCES " + Account.TABLENAME + "(" + Account.UUID + ") ON DELETE CASCADE, "
|
||||
+ "UNIQUE( " + SQLiteAxolotlStore.ACCOUNT + ", "
|
||||
+ SQLiteAxolotlStore.NAME + ", "
|
||||
+ SQLiteAxolotlStore.DEVICE_ID
|
||||
+ ") ON CONFLICT REPLACE"
|
||||
+ ");";
|
||||
|
||||
private static String CREATE_IDENTITIES_STATEMENT = "CREATE TABLE "
|
||||
+ SQLiteAxolotlStore.IDENTITIES_TABLENAME + "("
|
||||
|
@ -106,10 +106,10 @@ public class DatabaseBackend extends SQLiteOpenHelper {
|
|||
+ SQLiteAxolotlStore.ACCOUNT
|
||||
+ ") REFERENCES " + Account.TABLENAME + "(" + Account.UUID + ") ON DELETE CASCADE, "
|
||||
+ "UNIQUE( " + SQLiteAxolotlStore.ACCOUNT + ", "
|
||||
+ SQLiteAxolotlStore.NAME + ", "
|
||||
+ SQLiteAxolotlStore.FINGERPRINT
|
||||
+ SQLiteAxolotlStore.NAME + ", "
|
||||
+ SQLiteAxolotlStore.FINGERPRINT
|
||||
+ ") ON CONFLICT IGNORE"
|
||||
+");";
|
||||
+ ");";
|
||||
|
||||
private DatabaseBackend(Context context) {
|
||||
super(context, DATABASE_NAME, null, DATABASE_VERSION);
|
||||
|
@ -124,7 +124,7 @@ public class DatabaseBackend extends SQLiteOpenHelper {
|
|||
+ Account.DISPLAY_NAME + " TEXT, "
|
||||
+ Account.ROSTERVERSION + " TEXT," + Account.OPTIONS
|
||||
+ " NUMBER, " + Account.AVATAR + " TEXT, " + Account.KEYS
|
||||
+ " TEXT)");
|
||||
+ " TEXT, " + Account.HOSTNAME + " TEXT, " + Account.PORT + " NUMBER DEFAULT 5222)");
|
||||
db.execSQL("create table " + Conversation.TABLENAME + " ("
|
||||
+ Conversation.UUID + " TEXT PRIMARY KEY, " + Conversation.NAME
|
||||
+ " TEXT, " + Conversation.CONTACT + " TEXT, "
|
||||
|
@ -202,23 +202,23 @@ public class DatabaseBackend extends SQLiteOpenHelper {
|
|||
if (oldVersion < 11 && newVersion >= 11) {
|
||||
db.execSQL("ALTER TABLE " + Contact.TABLENAME + " ADD COLUMN "
|
||||
+ Contact.GROUPS + " TEXT");
|
||||
db.execSQL("delete from "+Contact.TABLENAME);
|
||||
db.execSQL("update "+Account.TABLENAME+" set "+Account.ROSTERVERSION+" = NULL");
|
||||
db.execSQL("delete from " + Contact.TABLENAME);
|
||||
db.execSQL("update " + Account.TABLENAME + " set " + Account.ROSTERVERSION + " = NULL");
|
||||
}
|
||||
if (oldVersion < 12 && newVersion >= 12) {
|
||||
db.execSQL("ALTER TABLE " + Message.TABLENAME + " ADD COLUMN "
|
||||
+ Message.SERVER_MSG_ID + " TEXT");
|
||||
}
|
||||
if (oldVersion < 13 && newVersion >= 13) {
|
||||
db.execSQL("delete from "+Contact.TABLENAME);
|
||||
db.execSQL("update "+Account.TABLENAME+" set "+Account.ROSTERVERSION+" = NULL");
|
||||
db.execSQL("delete from " + Contact.TABLENAME);
|
||||
db.execSQL("update " + Account.TABLENAME + " set " + Account.ROSTERVERSION + " = NULL");
|
||||
}
|
||||
if (oldVersion < 14 && newVersion >= 14) {
|
||||
// migrate db to new, canonicalized JID domainpart representation
|
||||
|
||||
// Conversation table
|
||||
Cursor cursor = db.rawQuery("select * from " + Conversation.TABLENAME, new String[0]);
|
||||
while(cursor.moveToNext()) {
|
||||
while (cursor.moveToNext()) {
|
||||
String newJid;
|
||||
try {
|
||||
newJid = Jid.fromString(
|
||||
|
@ -226,8 +226,8 @@ public class DatabaseBackend extends SQLiteOpenHelper {
|
|||
).toString();
|
||||
} catch (InvalidJidException ignored) {
|
||||
Log.e(Config.LOGTAG, "Failed to migrate Conversation CONTACTJID "
|
||||
+cursor.getString(cursor.getColumnIndex(Conversation.CONTACTJID))
|
||||
+": " + ignored +". Skipping...");
|
||||
+ cursor.getString(cursor.getColumnIndex(Conversation.CONTACTJID))
|
||||
+ ": " + ignored + ". Skipping...");
|
||||
continue;
|
||||
}
|
||||
|
||||
|
@ -236,14 +236,14 @@ public class DatabaseBackend extends SQLiteOpenHelper {
|
|||
cursor.getString(cursor.getColumnIndex(Conversation.UUID)),
|
||||
};
|
||||
db.execSQL("update " + Conversation.TABLENAME
|
||||
+ " set " + Conversation.CONTACTJID + " = ? "
|
||||
+ " set " + Conversation.CONTACTJID + " = ? "
|
||||
+ " where " + Conversation.UUID + " = ?", updateArgs);
|
||||
}
|
||||
cursor.close();
|
||||
|
||||
// Contact table
|
||||
cursor = db.rawQuery("select * from " + Contact.TABLENAME, new String[0]);
|
||||
while(cursor.moveToNext()) {
|
||||
while (cursor.moveToNext()) {
|
||||
String newJid;
|
||||
try {
|
||||
newJid = Jid.fromString(
|
||||
|
@ -251,8 +251,8 @@ public class DatabaseBackend extends SQLiteOpenHelper {
|
|||
).toString();
|
||||
} catch (InvalidJidException ignored) {
|
||||
Log.e(Config.LOGTAG, "Failed to migrate Contact JID "
|
||||
+cursor.getString(cursor.getColumnIndex(Contact.JID))
|
||||
+": " + ignored +". Skipping...");
|
||||
+ cursor.getString(cursor.getColumnIndex(Contact.JID))
|
||||
+ ": " + ignored + ". Skipping...");
|
||||
continue;
|
||||
}
|
||||
|
||||
|
@ -270,7 +270,7 @@ public class DatabaseBackend extends SQLiteOpenHelper {
|
|||
|
||||
// Account table
|
||||
cursor = db.rawQuery("select * from " + Account.TABLENAME, new String[0]);
|
||||
while(cursor.moveToNext()) {
|
||||
while (cursor.moveToNext()) {
|
||||
String newServer;
|
||||
try {
|
||||
newServer = Jid.fromParts(
|
||||
|
@ -280,8 +280,8 @@ public class DatabaseBackend extends SQLiteOpenHelper {
|
|||
).getDomainpart();
|
||||
} catch (InvalidJidException ignored) {
|
||||
Log.e(Config.LOGTAG, "Failed to migrate Account SERVER "
|
||||
+cursor.getString(cursor.getColumnIndex(Account.SERVER))
|
||||
+": " + ignored +". Skipping...");
|
||||
+ cursor.getString(cursor.getColumnIndex(Account.SERVER))
|
||||
+ ": " + ignored + ". Skipping...");
|
||||
continue;
|
||||
}
|
||||
|
||||
|
@ -295,7 +295,7 @@ public class DatabaseBackend extends SQLiteOpenHelper {
|
|||
}
|
||||
cursor.close();
|
||||
}
|
||||
if (oldVersion < 15 && newVersion >= 15) {
|
||||
if (oldVersion < 15 && newVersion >= 15) {
|
||||
recreateAxolotlDb(db);
|
||||
db.execSQL("ALTER TABLE " + Message.TABLENAME + " ADD COLUMN "
|
||||
+ Message.FINGERPRINT + " TEXT");
|
||||
|
@ -305,7 +305,11 @@ public class DatabaseBackend extends SQLiteOpenHelper {
|
|||
+ Message.CARBON + " INTEGER");
|
||||
}
|
||||
if (oldVersion < 19 && newVersion >= 19) {
|
||||
db.execSQL("ALTER TABLE " + Account.TABLENAME + " ADD COLUMN "+ Account.DISPLAY_NAME+ " TEXT");
|
||||
db.execSQL("ALTER TABLE " + Account.TABLENAME + " ADD COLUMN " + Account.DISPLAY_NAME + " TEXT");
|
||||
}
|
||||
if (oldVersion < 20 && newVersion >= 20) {
|
||||
db.execSQL("ALTER TABLE " + Account.TABLENAME + " ADD COLUMN " + Account.HOSTNAME + " TEXT");
|
||||
db.execSQL("ALTER TABLE " + Account.TABLENAME + " ADD COLUMN " + Account.PORT + " NUMBER DEFAULT 5222");
|
||||
}
|
||||
/* Any migrations that alter the Account table need to happen BEFORE this migration, as it
|
||||
* depends on account de-serialization.
|
||||
|
@ -314,7 +318,7 @@ public class DatabaseBackend extends SQLiteOpenHelper {
|
|||
List<Account> accounts = getAccounts(db);
|
||||
for (Account account : accounts) {
|
||||
String ownDeviceIdString = account.getKey(SQLiteAxolotlStore.JSONKEY_REGISTRATION_ID);
|
||||
if ( ownDeviceIdString == null ) {
|
||||
if (ownDeviceIdString == null) {
|
||||
continue;
|
||||
}
|
||||
int ownDeviceId = Integer.valueOf(ownDeviceIdString);
|
||||
|
@ -324,12 +328,12 @@ public class DatabaseBackend extends SQLiteOpenHelper {
|
|||
if (identityKeyPair != null) {
|
||||
setIdentityKeyTrust(db, account, identityKeyPair.getPublicKey().getFingerprint().replaceAll("\\s", ""), XmppAxolotlSession.Trust.TRUSTED);
|
||||
} else {
|
||||
Log.d(Config.LOGTAG,account.getJid().toBareJid()+": could not load own identity key pair");
|
||||
Log.d(Config.LOGTAG, account.getJid().toBareJid() + ": could not load own identity key pair");
|
||||
}
|
||||
}
|
||||
}
|
||||
if (oldVersion < 18 && newVersion >= 18) {
|
||||
db.execSQL("ALTER TABLE " + Message.TABLENAME + " ADD COLUMN "+ Message.READ+ " NUMBER DEFAULT 1");
|
||||
db.execSQL("ALTER TABLE " + Message.TABLENAME + " ADD COLUMN " + Message.READ + " NUMBER DEFAULT 1");
|
||||
}
|
||||
}
|
||||
|
||||
|
@ -374,7 +378,7 @@ public class DatabaseBackend extends SQLiteOpenHelper {
|
|||
public CopyOnWriteArrayList<Conversation> getConversations(int status) {
|
||||
CopyOnWriteArrayList<Conversation> list = new CopyOnWriteArrayList<>();
|
||||
SQLiteDatabase db = this.getReadableDatabase();
|
||||
String[] selectionArgs = { Integer.toString(status) };
|
||||
String[] selectionArgs = {Integer.toString(status)};
|
||||
Cursor cursor = db.rawQuery("select * from " + Conversation.TABLENAME
|
||||
+ " where " + Conversation.STATUS + " = ? order by "
|
||||
+ Conversation.CREATED + " desc", selectionArgs);
|
||||
|
@ -390,20 +394,20 @@ public class DatabaseBackend extends SQLiteOpenHelper {
|
|||
}
|
||||
|
||||
public ArrayList<Message> getMessages(Conversation conversation, int limit,
|
||||
long timestamp) {
|
||||
long timestamp) {
|
||||
ArrayList<Message> list = new ArrayList<>();
|
||||
SQLiteDatabase db = this.getReadableDatabase();
|
||||
Cursor cursor;
|
||||
if (timestamp == -1) {
|
||||
String[] selectionArgs = { conversation.getUuid() };
|
||||
String[] selectionArgs = {conversation.getUuid()};
|
||||
cursor = db.query(Message.TABLENAME, null, Message.CONVERSATION
|
||||
+ "=?", selectionArgs, null, null, Message.TIME_SENT
|
||||
+ " DESC", String.valueOf(limit));
|
||||
} else {
|
||||
String[] selectionArgs = { conversation.getUuid(),
|
||||
Long.toString(timestamp) };
|
||||
String[] selectionArgs = {conversation.getUuid(),
|
||||
Long.toString(timestamp)};
|
||||
cursor = db.query(Message.TABLENAME, null, Message.CONVERSATION
|
||||
+ "=? and " + Message.TIME_SENT + "<?", selectionArgs,
|
||||
+ "=? and " + Message.TIME_SENT + "<?", selectionArgs,
|
||||
null, null, Message.TIME_SENT + " DESC",
|
||||
String.valueOf(limit));
|
||||
}
|
||||
|
@ -419,13 +423,13 @@ public class DatabaseBackend extends SQLiteOpenHelper {
|
|||
return list;
|
||||
}
|
||||
|
||||
public Iterable<Message> getMessagesIterable(final Conversation conversation){
|
||||
public Iterable<Message> getMessagesIterable(final Conversation conversation) {
|
||||
return new Iterable<Message>() {
|
||||
@Override
|
||||
public Iterator<Message> iterator() {
|
||||
class MessageIterator implements Iterator<Message>{
|
||||
class MessageIterator implements Iterator<Message> {
|
||||
SQLiteDatabase db = getReadableDatabase();
|
||||
String[] selectionArgs = { conversation.getUuid() };
|
||||
String[] selectionArgs = {conversation.getUuid()};
|
||||
Cursor cursor = db.query(Message.TABLENAME, null, Message.CONVERSATION
|
||||
+ "=?", selectionArgs, null, null, Message.TIME_SENT
|
||||
+ " ASC", null);
|
||||
|
@ -458,10 +462,10 @@ public class DatabaseBackend extends SQLiteOpenHelper {
|
|||
|
||||
public Conversation findConversation(final Account account, final Jid contactJid) {
|
||||
SQLiteDatabase db = this.getReadableDatabase();
|
||||
String[] selectionArgs = { account.getUuid(),
|
||||
String[] selectionArgs = {account.getUuid(),
|
||||
contactJid.toBareJid().toString() + "/%",
|
||||
contactJid.toBareJid().toString()
|
||||
};
|
||||
};
|
||||
Cursor cursor = db.query(Conversation.TABLENAME, null,
|
||||
Conversation.ACCOUNT + "=? AND (" + Conversation.CONTACTJID
|
||||
+ " like ? OR " + Conversation.CONTACTJID + "=?)", selectionArgs, null, null, null);
|
||||
|
@ -475,7 +479,7 @@ public class DatabaseBackend extends SQLiteOpenHelper {
|
|||
|
||||
public void updateConversation(final Conversation conversation) {
|
||||
final SQLiteDatabase db = this.getWritableDatabase();
|
||||
final String[] args = { conversation.getUuid() };
|
||||
final String[] args = {conversation.getUuid()};
|
||||
db.update(Conversation.TABLENAME, conversation.getContentValues(),
|
||||
Conversation.UUID + "=?", args);
|
||||
}
|
||||
|
@ -498,14 +502,14 @@ public class DatabaseBackend extends SQLiteOpenHelper {
|
|||
|
||||
public void updateAccount(Account account) {
|
||||
SQLiteDatabase db = this.getWritableDatabase();
|
||||
String[] args = { account.getUuid() };
|
||||
String[] args = {account.getUuid()};
|
||||
db.update(Account.TABLENAME, account.getContentValues(), Account.UUID
|
||||
+ "=?", args);
|
||||
}
|
||||
|
||||
public void deleteAccount(Account account) {
|
||||
SQLiteDatabase db = this.getWritableDatabase();
|
||||
String[] args = { account.getUuid() };
|
||||
String[] args = {account.getUuid()};
|
||||
db.delete(Account.TABLENAME, Account.UUID + "=?", args);
|
||||
}
|
||||
|
||||
|
@ -534,7 +538,7 @@ public class DatabaseBackend extends SQLiteOpenHelper {
|
|||
|
||||
public void updateMessage(Message message) {
|
||||
SQLiteDatabase db = this.getWritableDatabase();
|
||||
String[] args = { message.getUuid() };
|
||||
String[] args = {message.getUuid()};
|
||||
db.update(Message.TABLENAME, message.getContentValues(), Message.UUID
|
||||
+ "=?", args);
|
||||
}
|
||||
|
@ -542,7 +546,7 @@ public class DatabaseBackend extends SQLiteOpenHelper {
|
|||
public void readRoster(Roster roster) {
|
||||
SQLiteDatabase db = this.getReadableDatabase();
|
||||
Cursor cursor;
|
||||
String args[] = { roster.getAccount().getUuid() };
|
||||
String args[] = {roster.getAccount().getUuid()};
|
||||
cursor = db.query(Contact.TABLENAME, null, Contact.ACCOUNT + "=?", args, null, null, null);
|
||||
while (cursor.moveToNext()) {
|
||||
roster.initContact(Contact.fromCursor(cursor));
|
||||
|
@ -558,7 +562,7 @@ public class DatabaseBackend extends SQLiteOpenHelper {
|
|||
db.insert(Contact.TABLENAME, null, contact.getContentValues());
|
||||
} else {
|
||||
String where = Contact.ACCOUNT + "=? AND " + Contact.JID + "=?";
|
||||
String[] whereArgs = { account.getUuid(), contact.getJid().toString() };
|
||||
String[] whereArgs = {account.getUuid(), contact.getJid().toString()};
|
||||
db.delete(Contact.TABLENAME, where, whereArgs);
|
||||
}
|
||||
}
|
||||
|
@ -568,19 +572,19 @@ public class DatabaseBackend extends SQLiteOpenHelper {
|
|||
|
||||
public void deleteMessage(Message message) {
|
||||
SQLiteDatabase db = this.getWritableDatabase();
|
||||
String[] args = { message.getUuid() };
|
||||
String[] args = {message.getUuid()};
|
||||
db.delete(Message.TABLENAME, Message.UUID + "=?", args);
|
||||
}
|
||||
|
||||
public void deleteMessagesInConversation(Conversation conversation) {
|
||||
SQLiteDatabase db = this.getWritableDatabase();
|
||||
String[] args = { conversation.getUuid() };
|
||||
String[] args = {conversation.getUuid()};
|
||||
db.delete(Message.TABLENAME, Message.CONVERSATION + "=?", args);
|
||||
}
|
||||
|
||||
public Conversation findConversationByUuid(String conversationUuid) {
|
||||
SQLiteDatabase db = this.getReadableDatabase();
|
||||
String[] selectionArgs = { conversationUuid };
|
||||
String[] selectionArgs = {conversationUuid};
|
||||
Cursor cursor = db.query(Conversation.TABLENAME, null,
|
||||
Conversation.UUID + "=?", selectionArgs, null, null, null);
|
||||
if (cursor.getCount() == 0) {
|
||||
|
@ -594,7 +598,7 @@ public class DatabaseBackend extends SQLiteOpenHelper {
|
|||
|
||||
public Message findMessageByUuid(String messageUuid) {
|
||||
SQLiteDatabase db = this.getReadableDatabase();
|
||||
String[] selectionArgs = { messageUuid };
|
||||
String[] selectionArgs = {messageUuid};
|
||||
Cursor cursor = db.query(Message.TABLENAME, null, Message.UUID + "=?",
|
||||
selectionArgs, null, null, null);
|
||||
if (cursor.getCount() == 0) {
|
||||
|
@ -608,7 +612,7 @@ public class DatabaseBackend extends SQLiteOpenHelper {
|
|||
|
||||
public Account findAccountByUuid(String accountUuid) {
|
||||
SQLiteDatabase db = this.getReadableDatabase();
|
||||
String[] selectionArgs = { accountUuid };
|
||||
String[] selectionArgs = {accountUuid};
|
||||
Cursor cursor = db.query(Account.TABLENAME, null, Account.UUID + "=?",
|
||||
selectionArgs, null, null, null);
|
||||
if (cursor.getCount() == 0) {
|
||||
|
@ -624,9 +628,9 @@ public class DatabaseBackend extends SQLiteOpenHelper {
|
|||
ArrayList<Message> list = new ArrayList<>();
|
||||
SQLiteDatabase db = this.getReadableDatabase();
|
||||
Cursor cursor;
|
||||
String[] selectionArgs = { conversation.getUuid(), String.valueOf(Message.TYPE_IMAGE) };
|
||||
cursor = db.query(Message.TABLENAME, null, Message.CONVERSATION
|
||||
+ "=? AND "+Message.TYPE+"=?", selectionArgs, null, null,null);
|
||||
String[] selectionArgs = {conversation.getUuid(), String.valueOf(Message.TYPE_IMAGE)};
|
||||
cursor = db.query(Message.TABLENAME, null, Message.CONVERSATION
|
||||
+ "=? AND " + Message.TYPE + "=?", selectionArgs, null, null, null);
|
||||
if (cursor.getCount() > 0) {
|
||||
cursor.moveToLast();
|
||||
do {
|
||||
|
@ -659,10 +663,10 @@ public class DatabaseBackend extends SQLiteOpenHelper {
|
|||
public SessionRecord loadSession(Account account, AxolotlAddress contact) {
|
||||
SessionRecord session = null;
|
||||
Cursor cursor = getCursorForSession(account, contact);
|
||||
if(cursor.getCount() != 0) {
|
||||
if (cursor.getCount() != 0) {
|
||||
cursor.moveToFirst();
|
||||
try {
|
||||
session = new SessionRecord(Base64.decode(cursor.getString(cursor.getColumnIndex(SQLiteAxolotlStore.KEY)),Base64.DEFAULT));
|
||||
session = new SessionRecord(Base64.decode(cursor.getString(cursor.getColumnIndex(SQLiteAxolotlStore.KEY)), Base64.DEFAULT));
|
||||
} catch (IOException e) {
|
||||
cursor.close();
|
||||
throw new AssertionError(e);
|
||||
|
@ -689,7 +693,7 @@ public class DatabaseBackend extends SQLiteOpenHelper {
|
|||
selectionArgs,
|
||||
null, null, null);
|
||||
|
||||
while(cursor.moveToNext()) {
|
||||
while (cursor.moveToNext()) {
|
||||
devices.add(cursor.getInt(
|
||||
cursor.getColumnIndex(SQLiteAxolotlStore.DEVICE_ID)));
|
||||
}
|
||||
|
@ -710,7 +714,7 @@ public class DatabaseBackend extends SQLiteOpenHelper {
|
|||
ContentValues values = new ContentValues();
|
||||
values.put(SQLiteAxolotlStore.NAME, contact.getName());
|
||||
values.put(SQLiteAxolotlStore.DEVICE_ID, contact.getDeviceId());
|
||||
values.put(SQLiteAxolotlStore.KEY, Base64.encodeToString(session.serialize(),Base64.DEFAULT));
|
||||
values.put(SQLiteAxolotlStore.KEY, Base64.encodeToString(session.serialize(), Base64.DEFAULT));
|
||||
values.put(SQLiteAxolotlStore.ACCOUNT, account.getUuid());
|
||||
db.insert(SQLiteAxolotlStore.SESSION_TABLENAME, null, values);
|
||||
}
|
||||
|
@ -757,11 +761,11 @@ public class DatabaseBackend extends SQLiteOpenHelper {
|
|||
public PreKeyRecord loadPreKey(Account account, int preKeyId) {
|
||||
PreKeyRecord record = null;
|
||||
Cursor cursor = getCursorForPreKey(account, preKeyId);
|
||||
if(cursor.getCount() != 0) {
|
||||
if (cursor.getCount() != 0) {
|
||||
cursor.moveToFirst();
|
||||
try {
|
||||
record = new PreKeyRecord(Base64.decode(cursor.getString(cursor.getColumnIndex(SQLiteAxolotlStore.KEY)),Base64.DEFAULT));
|
||||
} catch (IOException e ) {
|
||||
record = new PreKeyRecord(Base64.decode(cursor.getString(cursor.getColumnIndex(SQLiteAxolotlStore.KEY)), Base64.DEFAULT));
|
||||
} catch (IOException e) {
|
||||
throw new AssertionError(e);
|
||||
}
|
||||
}
|
||||
|
@ -780,7 +784,7 @@ public class DatabaseBackend extends SQLiteOpenHelper {
|
|||
SQLiteDatabase db = this.getWritableDatabase();
|
||||
ContentValues values = new ContentValues();
|
||||
values.put(SQLiteAxolotlStore.ID, record.getId());
|
||||
values.put(SQLiteAxolotlStore.KEY, Base64.encodeToString(record.serialize(),Base64.DEFAULT));
|
||||
values.put(SQLiteAxolotlStore.KEY, Base64.encodeToString(record.serialize(), Base64.DEFAULT));
|
||||
values.put(SQLiteAxolotlStore.ACCOUNT, account.getUuid());
|
||||
db.insert(SQLiteAxolotlStore.PREKEY_TABLENAME, null, values);
|
||||
}
|
||||
|
@ -810,11 +814,11 @@ public class DatabaseBackend extends SQLiteOpenHelper {
|
|||
public SignedPreKeyRecord loadSignedPreKey(Account account, int signedPreKeyId) {
|
||||
SignedPreKeyRecord record = null;
|
||||
Cursor cursor = getCursorForSignedPreKey(account, signedPreKeyId);
|
||||
if(cursor.getCount() != 0) {
|
||||
if (cursor.getCount() != 0) {
|
||||
cursor.moveToFirst();
|
||||
try {
|
||||
record = new SignedPreKeyRecord(Base64.decode(cursor.getString(cursor.getColumnIndex(SQLiteAxolotlStore.KEY)),Base64.DEFAULT));
|
||||
} catch (IOException e ) {
|
||||
record = new SignedPreKeyRecord(Base64.decode(cursor.getString(cursor.getColumnIndex(SQLiteAxolotlStore.KEY)), Base64.DEFAULT));
|
||||
} catch (IOException e) {
|
||||
throw new AssertionError(e);
|
||||
}
|
||||
}
|
||||
|
@ -833,7 +837,7 @@ public class DatabaseBackend extends SQLiteOpenHelper {
|
|||
selectionArgs,
|
||||
null, null, null);
|
||||
|
||||
while(cursor.moveToNext()) {
|
||||
while (cursor.moveToNext()) {
|
||||
try {
|
||||
prekeys.add(new SignedPreKeyRecord(Base64.decode(cursor.getString(cursor.getColumnIndex(SQLiteAxolotlStore.KEY)), Base64.DEFAULT)));
|
||||
} catch (IOException ignored) {
|
||||
|
@ -854,7 +858,7 @@ public class DatabaseBackend extends SQLiteOpenHelper {
|
|||
SQLiteDatabase db = this.getWritableDatabase();
|
||||
ContentValues values = new ContentValues();
|
||||
values.put(SQLiteAxolotlStore.ID, record.getId());
|
||||
values.put(SQLiteAxolotlStore.KEY, Base64.encodeToString(record.serialize(),Base64.DEFAULT));
|
||||
values.put(SQLiteAxolotlStore.KEY, Base64.encodeToString(record.serialize(), Base64.DEFAULT));
|
||||
values.put(SQLiteAxolotlStore.ACCOUNT, account.getUuid());
|
||||
db.insert(SQLiteAxolotlStore.SIGNED_PREKEY_TABLENAME, null, values);
|
||||
}
|
||||
|
@ -874,7 +878,7 @@ public class DatabaseBackend extends SQLiteOpenHelper {
|
|||
}
|
||||
|
||||
private Cursor getIdentityKeyCursor(SQLiteDatabase db, Account account, String name, boolean own) {
|
||||
return getIdentityKeyCursor(db, account, name, own, null);
|
||||
return getIdentityKeyCursor(db, account, name, own, null);
|
||||
}
|
||||
|
||||
private Cursor getIdentityKeyCursor(Account account, String fingerprint) {
|
||||
|
@ -892,16 +896,16 @@ public class DatabaseBackend extends SQLiteOpenHelper {
|
|||
ArrayList<String> selectionArgs = new ArrayList<>(4);
|
||||
selectionArgs.add(account.getUuid());
|
||||
String selectionString = SQLiteAxolotlStore.ACCOUNT + " = ?";
|
||||
if (name != null){
|
||||
if (name != null) {
|
||||
selectionArgs.add(name);
|
||||
selectionString += " AND " + SQLiteAxolotlStore.NAME + " = ?";
|
||||
}
|
||||
if (fingerprint != null){
|
||||
if (fingerprint != null) {
|
||||
selectionArgs.add(fingerprint);
|
||||
selectionString += " AND " + SQLiteAxolotlStore.FINGERPRINT + " = ?";
|
||||
}
|
||||
if (own != null){
|
||||
selectionArgs.add(own?"1":"0");
|
||||
if (own != null) {
|
||||
selectionArgs.add(own ? "1" : "0");
|
||||
selectionString += " AND " + SQLiteAxolotlStore.OWN + " = ?";
|
||||
}
|
||||
Cursor cursor = db.query(SQLiteAxolotlStore.IDENTITIES_TABLENAME,
|
||||
|
@ -922,12 +926,12 @@ public class DatabaseBackend extends SQLiteOpenHelper {
|
|||
String name = account.getJid().toBareJid().toString();
|
||||
IdentityKeyPair identityKeyPair = null;
|
||||
Cursor cursor = getIdentityKeyCursor(db, account, name, true);
|
||||
if(cursor.getCount() != 0) {
|
||||
if (cursor.getCount() != 0) {
|
||||
cursor.moveToFirst();
|
||||
try {
|
||||
identityKeyPair = new IdentityKeyPair(Base64.decode(cursor.getString(cursor.getColumnIndex(SQLiteAxolotlStore.KEY)),Base64.DEFAULT));
|
||||
identityKeyPair = new IdentityKeyPair(Base64.decode(cursor.getString(cursor.getColumnIndex(SQLiteAxolotlStore.KEY)), Base64.DEFAULT));
|
||||
} catch (InvalidKeyException e) {
|
||||
Log.d(Config.LOGTAG, AxolotlService.getLogprefix(account)+"Encountered invalid IdentityKey in database for account" + account.getJid().toBareJid() + ", address: " + name);
|
||||
Log.d(Config.LOGTAG, AxolotlService.getLogprefix(account) + "Encountered invalid IdentityKey in database for account" + account.getJid().toBareJid() + ", address: " + name);
|
||||
}
|
||||
}
|
||||
cursor.close();
|
||||
|
@ -943,16 +947,16 @@ public class DatabaseBackend extends SQLiteOpenHelper {
|
|||
Set<IdentityKey> identityKeys = new HashSet<>();
|
||||
Cursor cursor = getIdentityKeyCursor(account, name, false);
|
||||
|
||||
while(cursor.moveToNext()) {
|
||||
if ( trust != null &&
|
||||
while (cursor.moveToNext()) {
|
||||
if (trust != null &&
|
||||
cursor.getInt(cursor.getColumnIndex(SQLiteAxolotlStore.TRUSTED))
|
||||
!= trust.getCode()) {
|
||||
continue;
|
||||
}
|
||||
try {
|
||||
identityKeys.add(new IdentityKey(Base64.decode(cursor.getString(cursor.getColumnIndex(SQLiteAxolotlStore.KEY)),Base64.DEFAULT),0));
|
||||
identityKeys.add(new IdentityKey(Base64.decode(cursor.getString(cursor.getColumnIndex(SQLiteAxolotlStore.KEY)), Base64.DEFAULT), 0));
|
||||
} catch (InvalidKeyException e) {
|
||||
Log.d(Config.LOGTAG, AxolotlService.getLogprefix(account)+"Encountered invalid IdentityKey in database for account"+account.getJid().toBareJid()+", address: "+name);
|
||||
Log.d(Config.LOGTAG, AxolotlService.getLogprefix(account) + "Encountered invalid IdentityKey in database for account" + account.getJid().toBareJid() + ", address: " + name);
|
||||
}
|
||||
}
|
||||
cursor.close();
|
||||
|
@ -970,8 +974,8 @@ public class DatabaseBackend extends SQLiteOpenHelper {
|
|||
};
|
||||
return DatabaseUtils.queryNumEntries(db, SQLiteAxolotlStore.IDENTITIES_TABLENAME,
|
||||
SQLiteAxolotlStore.ACCOUNT + " = ?"
|
||||
+ " AND " + SQLiteAxolotlStore.NAME + " = ?"
|
||||
+ " AND (" + SQLiteAxolotlStore.TRUSTED + " = ? OR "+SQLiteAxolotlStore.TRUSTED+ " = ?)",
|
||||
+ " AND " + SQLiteAxolotlStore.NAME + " = ?"
|
||||
+ " AND (" + SQLiteAxolotlStore.TRUSTED + " = ? OR " + SQLiteAxolotlStore.TRUSTED + " = ?)",
|
||||
args
|
||||
);
|
||||
}
|
||||
|
@ -1018,7 +1022,7 @@ public class DatabaseBackend extends SQLiteOpenHelper {
|
|||
values.put(SQLiteAxolotlStore.TRUSTED, trust.getCode());
|
||||
int rows = db.update(SQLiteAxolotlStore.IDENTITIES_TABLENAME, values,
|
||||
SQLiteAxolotlStore.ACCOUNT + " = ? AND "
|
||||
+ SQLiteAxolotlStore.FINGERPRINT + " = ? ",
|
||||
+ SQLiteAxolotlStore.FINGERPRINT + " = ? ",
|
||||
selectionArgs);
|
||||
return rows == 1;
|
||||
}
|
||||
|
@ -1036,7 +1040,7 @@ public class DatabaseBackend extends SQLiteOpenHelper {
|
|||
}
|
||||
|
||||
public void recreateAxolotlDb(SQLiteDatabase db) {
|
||||
Log.d(Config.LOGTAG, AxolotlService.LOGPREFIX+" : "+">>> (RE)CREATING AXOLOTL DATABASE <<<");
|
||||
Log.d(Config.LOGTAG, AxolotlService.LOGPREFIX + " : " + ">>> (RE)CREATING AXOLOTL DATABASE <<<");
|
||||
db.execSQL("DROP TABLE IF EXISTS " + SQLiteAxolotlStore.SESSION_TABLENAME);
|
||||
db.execSQL(CREATE_SESSIONS_STATEMENT);
|
||||
db.execSQL("DROP TABLE IF EXISTS " + SQLiteAxolotlStore.PREKEY_TABLENAME);
|
||||
|
@ -1046,12 +1050,12 @@ public class DatabaseBackend extends SQLiteOpenHelper {
|
|||
db.execSQL("DROP TABLE IF EXISTS " + SQLiteAxolotlStore.IDENTITIES_TABLENAME);
|
||||
db.execSQL(CREATE_IDENTITIES_STATEMENT);
|
||||
}
|
||||
|
||||
|
||||
public void wipeAxolotlDb(Account account) {
|
||||
String accountName = account.getUuid();
|
||||
Log.d(Config.LOGTAG, AxolotlService.getLogprefix(account)+">>> WIPING AXOLOTL DATABASE FOR ACCOUNT " + accountName + " <<<");
|
||||
Log.d(Config.LOGTAG, AxolotlService.getLogprefix(account) + ">>> WIPING AXOLOTL DATABASE FOR ACCOUNT " + accountName + " <<<");
|
||||
SQLiteDatabase db = this.getWritableDatabase();
|
||||
String[] deleteArgs= {
|
||||
String[] deleteArgs = {
|
||||
accountName
|
||||
};
|
||||
db.delete(SQLiteAxolotlStore.SESSION_TABLENAME,
|
||||
|
|
|
@ -2106,8 +2106,7 @@ public class XmppConnectionService extends Service implements OnPhoneContactsLoa
|
|||
}
|
||||
|
||||
public void createContact(Contact contact) {
|
||||
SharedPreferences sharedPref = getPreferences();
|
||||
boolean autoGrant = sharedPref.getBoolean("grant_new_contacts", true);
|
||||
boolean autoGrant = getPreferences().getBoolean("grant_new_contacts", true);
|
||||
if (autoGrant) {
|
||||
contact.setOption(Contact.Options.PREEMPTIVE_GRANT);
|
||||
contact.setOption(Contact.Options.ASKING);
|
||||
|
@ -2534,10 +2533,6 @@ public class XmppConnectionService extends Service implements OnPhoneContactsLoa
|
|||
.getDefaultSharedPreferences(getApplicationContext());
|
||||
}
|
||||
|
||||
public boolean forceEncryption() {
|
||||
return getPreferences().getBoolean("force_encryption", false);
|
||||
}
|
||||
|
||||
public boolean confirmMessages() {
|
||||
return getPreferences().getBoolean("confirm_messages", true);
|
||||
}
|
||||
|
@ -2554,6 +2549,10 @@ public class XmppConnectionService extends Service implements OnPhoneContactsLoa
|
|||
return getPreferences().getBoolean("indicate_received", false);
|
||||
}
|
||||
|
||||
public boolean useTorToConnect() {
|
||||
return getPreferences().getBoolean("use_tor", false);
|
||||
}
|
||||
|
||||
public int unreadCount() {
|
||||
int count = 0;
|
||||
for (Conversation conversation : getConversations()) {
|
||||
|
|
|
@ -82,10 +82,14 @@ public class EditAccountActivity extends XmppActivity implements OnAccountUpdate
|
|||
private ImageButton mRegenerateAxolotlKeyButton;
|
||||
private LinearLayout keys;
|
||||
private LinearLayout keysCard;
|
||||
private LinearLayout mNamePort;
|
||||
private EditText mHostname;
|
||||
private EditText mPort;
|
||||
private AlertDialog mCaptchaDialog = null;
|
||||
|
||||
private Jid jidToEdit;
|
||||
private boolean mInitMode = false;
|
||||
private boolean mUseTor = false;
|
||||
private Account mAccount;
|
||||
private String messageFingerprint;
|
||||
|
||||
|
@ -125,6 +129,31 @@ public class EditAccountActivity extends XmppActivity implements OnAccountUpdate
|
|||
mAccountJid.requestFocus();
|
||||
return;
|
||||
}
|
||||
String hostname = null;
|
||||
int numericPort = 5222;
|
||||
if (mUseTor) {
|
||||
hostname = mHostname.getText().toString();
|
||||
final String port = mPort.getText().toString();
|
||||
if (hostname.contains(" ")) {
|
||||
mHostname.setError(getString(R.string.not_valid_hostname));
|
||||
mHostname.requestFocus();
|
||||
return;
|
||||
}
|
||||
try {
|
||||
numericPort = Integer.parseInt(port);
|
||||
if (numericPort < 0 || numericPort > 65535) {
|
||||
mPort.setError(getString(R.string.not_a_valid_port));
|
||||
mPort.requestFocus();
|
||||
return;
|
||||
}
|
||||
|
||||
} catch (NumberFormatException e) {
|
||||
mPort.setError(getString(R.string.not_a_valid_port));
|
||||
mPort.requestFocus();
|
||||
return;
|
||||
}
|
||||
}
|
||||
|
||||
if (jid.isDomainJid()) {
|
||||
if (Config.DOMAIN_LOCK != null) {
|
||||
mAccountJid.setError(getString(R.string.invalid_username));
|
||||
|
@ -145,6 +174,8 @@ public class EditAccountActivity extends XmppActivity implements OnAccountUpdate
|
|||
}
|
||||
if (mAccount != null) {
|
||||
mAccount.setJid(jid);
|
||||
mAccount.setPort(numericPort);
|
||||
mAccount.setHostname(hostname);
|
||||
mAccountJid.setError(null);
|
||||
mPasswordConfirm.setError(null);
|
||||
mAccount.setPassword(password);
|
||||
|
@ -157,11 +188,15 @@ public class EditAccountActivity extends XmppActivity implements OnAccountUpdate
|
|||
return;
|
||||
}
|
||||
mAccount = new Account(jid.toBareJid(), password);
|
||||
mAccount.setPort(numericPort);
|
||||
mAccount.setHostname(hostname);
|
||||
mAccount.setOption(Account.OPTION_USETLS, true);
|
||||
mAccount.setOption(Account.OPTION_USECOMPRESSION, true);
|
||||
mAccount.setOption(Account.OPTION_REGISTER, registerNewAccount);
|
||||
xmppConnectionService.createAccount(mAccount);
|
||||
}
|
||||
mHostname.setError(null);
|
||||
mPort.setError(null);
|
||||
if (!mAccount.isOptionSet(Account.OPTION_DISABLED)
|
||||
&& !registerNewAccount
|
||||
&& !mInitMode) {
|
||||
|
@ -319,7 +354,9 @@ public class EditAccountActivity extends XmppActivity implements OnAccountUpdate
|
|||
unmodified = this.mAccount.getJid().toBareJid().toString();
|
||||
}
|
||||
return !unmodified.equals(this.mAccountJid.getText().toString()) ||
|
||||
!this.mAccount.getPassword().equals(this.mPassword.getText().toString());
|
||||
!this.mAccount.getPassword().equals(this.mPassword.getText().toString()) ||
|
||||
!this.mAccount.getHostname().equals(this.mHostname.getText().toString()) ||
|
||||
!String.valueOf(this.mAccount.getPort()).equals(this.mPort.getText().toString());
|
||||
}
|
||||
|
||||
@Override
|
||||
|
@ -368,6 +405,12 @@ public class EditAccountActivity extends XmppActivity implements OnAccountUpdate
|
|||
this.mRegenerateAxolotlKeyButton = (ImageButton) findViewById(R.id.action_regenerate_axolotl_key);
|
||||
this.keysCard = (LinearLayout) findViewById(R.id.other_device_keys_card);
|
||||
this.keys = (LinearLayout) findViewById(R.id.other_device_keys);
|
||||
this.mNamePort = (LinearLayout) findViewById(R.id.name_port);
|
||||
this.mHostname = (EditText) findViewById(R.id.hostname);
|
||||
this.mHostname.addTextChangedListener(mTextWatcher);
|
||||
this.mPort = (EditText) findViewById(R.id.port);
|
||||
this.mPort.setText("5222");
|
||||
this.mPort.addTextChangedListener(mTextWatcher);
|
||||
this.mSaveButton = (Button) findViewById(R.id.save_button);
|
||||
this.mCancelButton = (Button) findViewById(R.id.cancel_button);
|
||||
this.mSaveButton.setOnClickListener(this.mSaveButtonClickListener);
|
||||
|
@ -448,6 +491,8 @@ public class EditAccountActivity extends XmppActivity implements OnAccountUpdate
|
|||
}
|
||||
}
|
||||
}
|
||||
this.mUseTor = getPreferences().getBoolean("use_tor", false);
|
||||
this.mNamePort.setVisibility(mUseTor ? View.VISIBLE : View.GONE);
|
||||
}
|
||||
|
||||
@Override
|
||||
|
@ -529,6 +574,12 @@ public class EditAccountActivity extends XmppActivity implements OnAccountUpdate
|
|||
this.mAccountJid.getEditableText().append(this.mAccount.getJid().toBareJid().toString());
|
||||
}
|
||||
this.mPassword.setText(this.mAccount.getPassword());
|
||||
this.mHostname.setText("");
|
||||
this.mHostname.getEditableText().append(this.mAccount.getHostname());
|
||||
this.mPort.setText("");
|
||||
this.mPort.getEditableText().append(String.valueOf(this.mAccount.getPort()));
|
||||
this.mNamePort.setVisibility(mUseTor ? View.VISIBLE : View.GONE);
|
||||
|
||||
}
|
||||
if (!mInitMode) {
|
||||
this.mAvatar.setVisibility(View.VISIBLE);
|
||||
|
|
|
@ -160,6 +160,8 @@ public class SettingsActivity extends XmppActivity implements
|
|||
} else if (name.equals("dont_trust_system_cas")) {
|
||||
xmppConnectionService.updateMemorizingTrustmanager();
|
||||
reconnectAccounts();
|
||||
} else if (name.equals("use_tor")) {
|
||||
reconnectAccounts();
|
||||
}
|
||||
|
||||
}
|
||||
|
|
|
@ -0,0 +1,57 @@
|
|||
package eu.siacs.conversations.utils;
|
||||
|
||||
import java.io.IOException;
|
||||
import java.io.InputStream;
|
||||
import java.io.OutputStream;
|
||||
import java.net.InetAddress;
|
||||
import java.net.InetSocketAddress;
|
||||
import java.net.Socket;
|
||||
import java.nio.ByteBuffer;
|
||||
|
||||
import eu.siacs.conversations.Config;
|
||||
|
||||
public class SocksSocketFactory {
|
||||
|
||||
public static void createSocksConnection(Socket socket, String destination, int port) throws IOException {
|
||||
InputStream proxyIs = socket.getInputStream();
|
||||
OutputStream proxyOs = socket.getOutputStream();
|
||||
proxyOs.write(new byte[]{0x05, 0x01, 0x00});
|
||||
byte[] response = new byte[2];
|
||||
proxyIs.read(response);
|
||||
byte[] dest = destination.getBytes();
|
||||
ByteBuffer request = ByteBuffer.allocate(7 + dest.length);
|
||||
request.put(new byte[]{0x05, 0x01, 0x00, 0x03});
|
||||
request.put((byte) dest.length);
|
||||
request.put(dest);
|
||||
request.putShort((short) port);
|
||||
proxyOs.write(request.array());
|
||||
response = new byte[7 + dest.length];
|
||||
proxyIs.read(response);
|
||||
if (response[1] != 0x00) {
|
||||
throw new SocksConnectionException();
|
||||
}
|
||||
}
|
||||
|
||||
public static Socket createSocket(InetSocketAddress address, String destination, int port) throws IOException {
|
||||
Socket socket = new Socket();
|
||||
try {
|
||||
socket.connect(address, Config.CONNECT_TIMEOUT * 1000);
|
||||
} catch (IOException e) {
|
||||
throw new SocksProxyNotFoundException();
|
||||
}
|
||||
createSocksConnection(socket, destination, port);
|
||||
return socket;
|
||||
}
|
||||
|
||||
public static Socket createSocketOverTor(String destination, int port) throws IOException {
|
||||
return createSocket(new InetSocketAddress(InetAddress.getLocalHost(), 9050), destination, port);
|
||||
}
|
||||
|
||||
static class SocksConnectionException extends IOException {
|
||||
|
||||
}
|
||||
|
||||
public static class SocksProxyNotFoundException extends IOException {
|
||||
|
||||
}
|
||||
}
|
|
@ -13,7 +13,6 @@ import android.util.Log;
|
|||
import android.util.Pair;
|
||||
import android.util.SparseArray;
|
||||
|
||||
import org.apache.http.conn.ssl.StrictHostnameVerifier;
|
||||
import org.json.JSONException;
|
||||
import org.json.JSONObject;
|
||||
import org.xmlpull.v1.XmlPullParserException;
|
||||
|
@ -67,6 +66,7 @@ import eu.siacs.conversations.generator.IqGenerator;
|
|||
import eu.siacs.conversations.services.XmppConnectionService;
|
||||
import eu.siacs.conversations.utils.CryptoHelper;
|
||||
import eu.siacs.conversations.utils.DNSHelper;
|
||||
import eu.siacs.conversations.utils.SocksSocketFactory;
|
||||
import eu.siacs.conversations.utils.Xmlns;
|
||||
import eu.siacs.conversations.xml.Element;
|
||||
import eu.siacs.conversations.xml.Tag;
|
||||
|
@ -233,7 +233,17 @@ public class XmppConnection implements Runnable {
|
|||
tagReader = new XmlReader(wakeLock);
|
||||
tagWriter = new TagWriter();
|
||||
this.changeStatus(Account.State.CONNECTING);
|
||||
if (DNSHelper.isIp(account.getServer().toString())) {
|
||||
final boolean useTor = mXmppConnectionService.useTorToConnect() || account.isOnion();
|
||||
if (useTor) {
|
||||
String destination;
|
||||
if (account.getHostname() == null || account.getHostname().isEmpty()) {
|
||||
destination = account.getServer().toString();
|
||||
} else {
|
||||
destination = account.getHostname();
|
||||
}
|
||||
Log.d(Config.LOGTAG,account.getJid().toBareJid()+": connect to "+destination+" via TOR");
|
||||
socket = SocksSocketFactory.createSocketOverTor(destination,account.getPort());
|
||||
} else if (DNSHelper.isIp(account.getServer().toString())) {
|
||||
socket = new Socket();
|
||||
try {
|
||||
socket.connect(new InetSocketAddress(account.getServer().toString(), 5222), Config.SOCKET_TIMEOUT * 1000);
|
||||
|
@ -242,7 +252,7 @@ public class XmppConnection implements Runnable {
|
|||
}
|
||||
} else {
|
||||
final Bundle result = DNSHelper.getSRVRecord(account.getServer(),mXmppConnectionService);
|
||||
final ArrayList<Parcelable> values = result.getParcelableArrayList("values");
|
||||
final ArrayList<Parcelable>values = result.getParcelableArrayList("values");
|
||||
int i = 0;
|
||||
boolean socketError = true;
|
||||
while (socketError && values.size() > i) {
|
||||
|
@ -273,7 +283,7 @@ public class XmppConnection implements Runnable {
|
|||
socket.connect(addr, Config.SOCKET_TIMEOUT * 1000);
|
||||
socketError = false;
|
||||
} catch (final Throwable e) {
|
||||
Log.d(Config.LOGTAG, account.getJid().toBareJid().toString() + ": " + e.getMessage());
|
||||
Log.d(Config.LOGTAG, account.getJid().toBareJid().toString() + ": " + e.getMessage() +"("+e.getClass().getName()+")");
|
||||
i++;
|
||||
}
|
||||
}
|
||||
|
@ -307,8 +317,8 @@ public class XmppConnection implements Runnable {
|
|||
this.changeStatus(Account.State.UNAUTHORIZED);
|
||||
} catch (final UnknownHostException | ConnectException e) {
|
||||
this.changeStatus(Account.State.SERVER_NOT_FOUND);
|
||||
} catch (final DnsTimeoutException e) {
|
||||
this.changeStatus(Account.State.DNS_TIMEOUT);
|
||||
} catch (final SocksSocketFactory.SocksProxyNotFoundException e) {
|
||||
this.changeStatus(Account.State.TOR_NOT_AVAILABLE);
|
||||
} catch (final IOException | XmlPullParserException | NoSuchAlgorithmException e) {
|
||||
Log.d(Config.LOGTAG, account.getJid().toBareJid().toString() + ": " + e.getMessage());
|
||||
this.changeStatus(Account.State.OFFLINE);
|
||||
|
@ -1316,9 +1326,6 @@ public class XmppConnection implements Runnable {
|
|||
|
||||
}
|
||||
|
||||
private class DnsTimeoutException extends IOException {
|
||||
|
||||
}
|
||||
public enum Identity {
|
||||
FACEBOOK,
|
||||
SLACK,
|
||||
|
|
|
@ -7,7 +7,9 @@ import java.io.FileNotFoundException;
|
|||
import java.io.IOException;
|
||||
import java.io.InputStream;
|
||||
import java.io.OutputStream;
|
||||
import java.net.InetAddress;
|
||||
import java.net.InetSocketAddress;
|
||||
import java.net.Proxy;
|
||||
import java.net.Socket;
|
||||
import java.net.SocketAddress;
|
||||
import java.net.UnknownHostException;
|
||||
|
@ -19,6 +21,7 @@ import eu.siacs.conversations.Config;
|
|||
import eu.siacs.conversations.entities.DownloadableFile;
|
||||
import eu.siacs.conversations.persistance.FileBackend;
|
||||
import eu.siacs.conversations.utils.CryptoHelper;
|
||||
import eu.siacs.conversations.utils.SocksSocketFactory;
|
||||
|
||||
public class JingleSocks5Transport extends JingleTransport {
|
||||
private JingleCandidate candidate;
|
||||
|
@ -59,34 +62,19 @@ public class JingleSocks5Transport extends JingleTransport {
|
|||
@Override
|
||||
public void run() {
|
||||
try {
|
||||
socket = new Socket();
|
||||
SocketAddress address = new InetSocketAddress(candidate.getHost(),candidate.getPort());
|
||||
socket.connect(address,Config.SOCKET_TIMEOUT * 1000);
|
||||
final boolean useTor = connection.getAccount().isOnion() || connection.getConnectionManager().getXmppConnectionService().useTorToConnect();
|
||||
if (useTor) {
|
||||
socket = SocksSocketFactory.createSocketOverTor(candidate.getHost(),candidate.getPort());
|
||||
} else {
|
||||
socket = new Socket();
|
||||
SocketAddress address = new InetSocketAddress(candidate.getHost(),candidate.getPort());
|
||||
socket.connect(address,Config.SOCKET_TIMEOUT * 1000);
|
||||
}
|
||||
inputStream = socket.getInputStream();
|
||||
outputStream = socket.getOutputStream();
|
||||
byte[] login = { 0x05, 0x01, 0x00 };
|
||||
byte[] expectedReply = { 0x05, 0x00 };
|
||||
byte[] reply = new byte[2];
|
||||
outputStream.write(login);
|
||||
inputStream.read(reply);
|
||||
final String connect = Character.toString('\u0005')
|
||||
+ '\u0001' + '\u0000' + '\u0003' + '\u0028'
|
||||
+ destination + '\u0000' + '\u0000';
|
||||
if (Arrays.equals(reply, expectedReply)) {
|
||||
outputStream.write(connect.getBytes());
|
||||
byte[] result = new byte[2];
|
||||
inputStream.read(result);
|
||||
int status = result[1];
|
||||
if (status == 0) {
|
||||
isEstablished = true;
|
||||
callback.established();
|
||||
} else {
|
||||
callback.failed();
|
||||
}
|
||||
} else {
|
||||
socket.close();
|
||||
callback.failed();
|
||||
}
|
||||
SocksSocketFactory.createSocksConnection(socket,destination,0);
|
||||
isEstablished = true;
|
||||
callback.established();
|
||||
} catch (UnknownHostException e) {
|
||||
callback.failed();
|
||||
} catch (IOException e) {
|
||||
|
@ -158,7 +146,7 @@ public class JingleSocks5Transport extends JingleTransport {
|
|||
wakeLock.acquire();
|
||||
MessageDigest digest = MessageDigest.getInstance("SHA-1");
|
||||
digest.reset();
|
||||
inputStream.skip(45);
|
||||
//inputStream.skip(45);
|
||||
socket.setSoTimeout(30000);
|
||||
file.getParentFile().mkdirs();
|
||||
file.createNewFile();
|
||||
|
|
|
@ -78,7 +78,59 @@
|
|||
android:textColorHint="@color/black54"
|
||||
android:textSize="?attr/TextSizeBody" />
|
||||
|
||||
<CheckBox
|
||||
<LinearLayout
|
||||
android:id="@+id/name_port"
|
||||
android:layout_marginTop="8dp"
|
||||
android:orientation="horizontal"
|
||||
android:layout_width="fill_parent"
|
||||
android:layout_height="wrap_content"
|
||||
android:weightSum="1">
|
||||
<LinearLayout
|
||||
android:orientation="vertical"
|
||||
android:layout_width="0dp"
|
||||
android:layout_height="match_parent"
|
||||
android:layout_weight="0.8">
|
||||
<TextView
|
||||
android:layout_width="wrap_content"
|
||||
android:layout_height="wrap_content"
|
||||
android:text="@string/account_settings_hostname"
|
||||
android:textColor="@color/black87"
|
||||
android:textSize="?attr/TextSizeBody"
|
||||
android:id="@+id/textView"/>
|
||||
<EditText
|
||||
android:layout_width="fill_parent"
|
||||
android:layout_height="wrap_content"
|
||||
android:textColor="@color/black87"
|
||||
android:textColorHint="@color/black54"
|
||||
android:textSize="?attr/TextSizeBody"
|
||||
android:id="@+id/hostname"
|
||||
android:inputType="textNoSuggestions"
|
||||
android:hint="@string/hostname_or_onion"/>
|
||||
</LinearLayout>
|
||||
<LinearLayout
|
||||
android:orientation="vertical"
|
||||
android:layout_width="0dp"
|
||||
android:layout_height="match_parent"
|
||||
android:layout_weight="0.2"
|
||||
>
|
||||
<TextView
|
||||
android:layout_width="wrap_content"
|
||||
android:layout_height="wrap_content"
|
||||
android:text="@string/account_settings_port"
|
||||
android:textColor="@color/black87"
|
||||
android:textSize="?attr/TextSizeBody"/>
|
||||
<EditText
|
||||
android:layout_width="match_parent"
|
||||
android:layout_height="match_parent"
|
||||
android:inputType="number"
|
||||
android:maxLength="5"
|
||||
android:textColor="@color/black87"
|
||||
android:textColorHint="@color/black54"
|
||||
android:textSize="?attr/TextSizeBody"
|
||||
android:id="@+id/port"/>
|
||||
</LinearLayout>
|
||||
</LinearLayout>
|
||||
<CheckBox
|
||||
android:id="@+id/account_register_new"
|
||||
android:layout_width="wrap_content"
|
||||
android:layout_height="wrap_content"
|
||||
|
|
|
@ -31,4 +31,9 @@
|
|||
<item android:id="@+id/action_clear_devices"
|
||||
android:title="@string/clear_other_devices"
|
||||
android:showAsAction="never"/>
|
||||
<item
|
||||
android:id="@+id/action_settings"
|
||||
android:orderInCategory="100"
|
||||
android:showAsAction="never"
|
||||
android:title="@string/action_settings"/>
|
||||
</menu>
|
|
@ -521,7 +521,7 @@
|
|||
<string name="download_failed_could_not_connect">Download failed: Could not connect to host</string>
|
||||
<string name="pref_use_white_background">Use white background</string>
|
||||
<string name="pref_use_white_background_summary">Show received messages as black text on a white background</string>
|
||||
<string name="account_status_dns_timeout">Timeout in DNS</string>
|
||||
<string name="account_status_tor_unavailable">TOR network unavailable</string>
|
||||
<string name="server_info_broken">Broken</string>
|
||||
<string name="pref_presence_settings">Presence settings</string>
|
||||
<string name="pref_away_when_screen_off">Away when screen is off</string>
|
||||
|
@ -540,4 +540,12 @@
|
|||
<string name="error_fetching_omemo_key">Error fetching OMEMO key!</string>
|
||||
<string name="verified_omemo_key_with_certificate">Verified OMEMO key with certificate!</string>
|
||||
<string name="device_does_not_support_certificates">Your device does not support the selection of client certificates!</string>
|
||||
<string name="pref_connection_options">Connection options</string>
|
||||
<string name="pref_use_tor">Connect via Tor</string>
|
||||
<string name="pref_use_tor_summary">Tunnel all connections through the TOR network. Requires Orbot</string>
|
||||
<string name="account_settings_hostname">Hostname</string>
|
||||
<string name="account_settings_port">Port</string>
|
||||
<string name="hostname_or_onion">Server- or .onion-Address</string>
|
||||
<string name="not_a_valid_port">This is not a valid port number</string>
|
||||
<string name="not_valid_hostname">This is not a valid hostname</string>
|
||||
</resources>
|
||||
|
|
|
@ -147,6 +147,13 @@
|
|||
android:summary="@string/pref_remove_trusted_certificates_summary"
|
||||
android:title="@string/pref_remove_trusted_certificates_title"/>
|
||||
</PreferenceCategory>
|
||||
<PreferenceCategory android:title="@string/pref_connection_options">
|
||||
<CheckBoxPreference
|
||||
android:defaultValue="false"
|
||||
android:key="use_tor"
|
||||
android:title="@string/pref_use_tor"
|
||||
android:summary="@string/pref_use_tor_summary"/>
|
||||
</PreferenceCategory>
|
||||
<PreferenceCategory android:title="@string/pref_input_options">
|
||||
<CheckBoxPreference
|
||||
android:defaultValue="false"
|
||||
|
|
Loading…
Add table
Reference in a new issue