aboutsummaryrefslogtreecommitdiffstats
path: root/src/main/java/eu/siacs (unfollow)
Commit message (Collapse)AuthorFilesLines
2015-07-20rely on refreshUi/refreshUiReal and make sure it is being used everywhereDaniel Gultsch14-76/+66
2015-07-20Lock TrustKeys if no trusted keys are availableCryptoNextBetaAndreas Straub3-4/+48
2015-07-20Optimize importsAndreas Straub47-195/+167
2015-07-20don't show 'show contact details' context menu item when contact isn not in ↵Daniel Gultsch1-3/+8
roster
2015-07-20Fix set/remove OnUpdateBlocklistListenerAndreas Straub1-5/+5
2015-07-20Fix axolotl database migrationAndreas Straub1-2/+5
Can't call getWritableDatabase in recreateAxolotlDb()
2015-07-19Remove device list from EditAccountAndreas Straub1-22/+0
2015-07-19Add clear devices to overflow menu in EditAccountAndreas Straub1-3/+11
2015-07-19Ask for key trust when sending messagesAndreas Straub8-57/+453
If the contact (or the own account) has keys that have UNDECIDED trust, we now drop the user into the new TrustKeysActivity, where they have to decide for each new key whether it should be TRUSTED or UNTRUSTED.
2015-07-19Encrypt files for HTTP upload in encrypted chatsAndreas Straub2-3/+7
2015-07-19Refactor trust key ui and show in account detailsAndreas Straub3-48/+102
Refactored the trust key row UI element so it can be used in multiple places. It now also uses a slider to toggle the trust state, and the redundant trust state description was removed. EditAccountActivity now shows the keys of other devices associated with that account.
2015-07-19Send correct body for HTTP filesAndreas Straub1-1/+7
When using HTTP upload to send files, take care to transmit only the URL rather than the entire body, which contains metadata.
2015-07-19Handle file transmission properly in axolotlAndreas Straub1-4/+12
2015-07-19Remove unneccessary codeAndreas Straub1-2/+1
2015-07-19Fix trust status for outgoing messagesAndreas Straub5-28/+43
Tag sent messages with own fingerprint, set own fingerprint as always trusted, include own fingerprint in database trust search, explicitly reset trust colorfilter
2015-07-19Don't merge messages with different trust statusesAndreas Straub1-1/+7
2015-07-19Fix copying of axolotl keys to clipboardSam Whited1-1/+1
2015-07-19Add refresh icon to v21 themeSam Whited1-1/+0
2015-07-19Disable Axolotl option if not usableAndreas Straub2-33/+10
In MUCs or if contact is not axolotl capable, disable axolotl menu option
2015-07-19Show trust status of messages' originating sessionAndreas Straub2-0/+17
Shade lock icon red if message was received in a session that has not been marked trusted by the user or fingerprint is unknown
2015-07-19Add key trust toggle to ContactDetailsActivityAndreas Straub1-10/+39
Can now toggle IdentityKey trust
2015-07-19Ensure that available sessions are always usedAndreas Straub1-9/+30
Any time a new session is established, call syncRosterToDisk() to ensure that on subsequent restoreFromDatabase() calls, the roster is actually available. This is important so that initAccountServices() can properly initialize the SessionMap. This prevents a race condition where after adding a new account and initiating sessions with it, if the app is killed (e.g. by reinstall) before triggering a syncRosterToDisk(), subsequent restores will not have the roster available, leading to missing XmppAxolotlSessions in the SessionMap cache. As a result of this, a new session was initiated when sending a new message, and received messages could not be tagged with the originating session's fingerprint. As an added sanity check, go to the database to confirm no records are present before creating fresh XmppAxolotlSession objects (both in the sending and receiving case).
2015-07-19Fix setIdentityKeyTrust update statementAndreas Straub1-2/+2
2015-07-19Fix IdentityKey storage modelAndreas Straub1-2/+6
Added proper UNIQUE statement
2015-07-19Fix and expand key regeneration functionAndreas Straub1-9/+18
Wipe session cache to prevent stale sessions being used. Wipe fetch status cache to enable recreation of sessions. Regenerate deviceId, so that foreign devices will talk to us again.
2015-07-19Display trust status in ContactDetailsActivityAndreas Straub1-0/+3
2015-07-19Overhauled Message taggingAndreas Straub5-88/+138
Messages are now tagged with the IdentityKey fingerprint of the originating session. IdentityKeys have one of three trust states: undecided (default), trusted, and untrusted/not yet trusted.
2015-07-19Postpone initAccountService until roster loadedAndreas Straub1-3/+1
The AxolotlService depends on the roster being loaded when it is initialized so that it can fill its in-memory SessionMap.
2015-07-19Fix getSubDeviceSessions SQL queryAndreas Straub1-1/+1
2015-07-19Display axolotl chat message hintAndreas Straub1-0/+3
2015-07-19Use full int range for device IDsAndreas Straub1-1/+1
2015-07-19Clean up unused constantAndreas Straub1-1/+0
2015-07-19Make some fields finalAndreas Straub1-3/+3
2015-07-19Clean up loggingAndreas Straub5-67/+75
Add a fixed prefix to axolotl-related log messages, set log levels sensibly.
2015-07-19Add basic PEP managemend UI to EditAccountActivityAndreas Straub3-4/+159
EditAccountActivity now show own fingerprint, and gives an option to regenerate local keying material (and wipe all sessions associated with the old keys in the process). It also now displays a list of other own devices, and gives an option to remove all but the current device.
2015-07-19show contact details in conference details ...Christian S1-0/+5
2015-07-19Fix devicelist update handlingAndreas Straub2-0/+6
No longer store own device ID (so that we don't encrypt messages for ourselves), verify that own device ID is present in update list (otherwise republish), reflect update in UI.
2015-07-19Refactor axolotl database recreationAndreas Straub1-8/+14
2015-07-19Adapt prettifyFingerprint() to axolotl FP sizesAndreas Straub2-6/+5
2015-07-19Fix displaying Contact IdentityKeysAndreas Straub2-65/+2
Migrate ContactDetailsActivity to use new SQL IdentityKeys storage, remove dead code from Contact class.
2015-07-19Only cache session if successfully establishedAndreas Straub1-1/+6
When receiving a message, only remember the XmppAxolotlSession wrapper if the prospective session was actually established. This prevents us from erroneously adding empty sessions that are never established using received PreKeyWhisperMessages, which would lead to errors if we try to use them for sending.
2015-07-19Return empty set on invalid PEP devicelistAndreas Straub2-19/+20
2015-07-19Trust all IdentityKeysAndreas Straub1-2/+3
The trust-on-first-use policy leads to problems when receiving messages from two different devices of a contact before sending a message to them (as their IdentityKeys will not have been added yet). Since session trust will be managed externally anyway, this change is not a security problem, and will allow us to decrypt messages from yet-untrusted sessions.
2015-07-19Refresh PEP on session establishAndreas Straub1-0/+18
We now track preKeys used to establish incoming sessions with us. On each new established session, we remove the used prekey from PEP. We have to do this because libaxolotl-java internally clears the used preKey from its storage, so we will not be able to establish any future sessions using that key.
2015-07-19Fix asynchronous axolotl message sendingAndreas Straub2-8/+27
XmppConnectionService.sendMessage() now dispatches messages to the AxolotlService, where they only are prepared for sending and cached. AxolotlService now triggers a XmppConnectionService.resendMessage(), which then handles sending the cached message packet. This transparently fixes, e.g., handling of messages sent while we are offline.
2015-07-19Properly track message senderAndreas Straub3-15/+16
Previously, the sender was assumed to be the conversation counterpart. This broke carboned own-device messages. We now track the sender properly, and also set the status (sent by one of the own devices vs received from the counterpart) accordingly.
2015-07-19Rework PEP content verificationAndreas Straub2-48/+62
Now checks which part(s) are out of sync w/ local storage, and updates only those, rather than assuming the entire node corrupt and overwriting it all (especially relevant for preKey list)
2015-07-19Formatting fixesAndreas Straub1-2/+2
2015-07-19When receiving, add mock session if none existsAndreas Straub1-1/+1
We need a session object in order to build a session from a PreKeyWhisperMessage, so add an empty one when none exists on receiving a message. Warning: this will break right now if the session can not be constructed from the received message.There will be an invalid session which will break if we try to send using it.
2015-07-19Tag messages with originating sessionAndreas Straub2-0/+9
This can be used later in order to display trust status of messages, as well as for potential resending of messages in case of preKey conflicts.