aboutsummaryrefslogtreecommitdiffstats
path: root/src/main/java/eu (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Clean up unused constantAndreas Straub2015-07-081-1/+0
|
* Make some fields finalAndreas Straub2015-07-081-3/+3
|
* Clean up loggingAndreas Straub2015-07-085-67/+75
| | | | | Add a fixed prefix to axolotl-related log messages, set log levels sensibly.
* Add basic PEP managemend UI to EditAccountActivityAndreas Straub2015-07-073-4/+159
| | | | | | | | | EditAccountActivity now show own fingerprint, and gives an option to regenerate local keying material (and wipe all sessions associated with the old keys in the process). It also now displays a list of other own devices, and gives an option to remove all but the current device.
* Fix devicelist update handlingAndreas Straub2015-07-072-0/+6
| | | | | | No longer store own device ID (so that we don't encrypt messages for ourselves), verify that own device ID is present in update list (otherwise republish), reflect update in UI.
* Refactor axolotl database recreationAndreas Straub2015-07-071-8/+14
|
* Adapt prettifyFingerprint() to axolotl FP sizesAndreas Straub2015-07-072-6/+5
|
* Fix displaying Contact IdentityKeysAndreas Straub2015-07-072-65/+2
| | | | | Migrate ContactDetailsActivity to use new SQL IdentityKeys storage, remove dead code from Contact class.
* Only cache session if successfully establishedAndreas Straub2015-07-051-1/+6
| | | | | | | | When receiving a message, only remember the XmppAxolotlSession wrapper if the prospective session was actually established. This prevents us from erroneously adding empty sessions that are never established using received PreKeyWhisperMessages, which would lead to errors if we try to use them for sending.
* Return empty set on invalid PEP devicelistAndreas Straub2015-07-052-19/+20
|
* Trust all IdentityKeysAndreas Straub2015-07-051-2/+3
| | | | | | | | | The trust-on-first-use policy leads to problems when receiving messages from two different devices of a contact before sending a message to them (as their IdentityKeys will not have been added yet). Since session trust will be managed externally anyway, this change is not a security problem, and will allow us to decrypt messages from yet-untrusted sessions.
* Refresh PEP on session establishAndreas Straub2015-07-051-0/+18
| | | | | | | | We now track preKeys used to establish incoming sessions with us. On each new established session, we remove the used prekey from PEP. We have to do this because libaxolotl-java internally clears the used preKey from its storage, so we will not be able to establish any future sessions using that key.
* Fix asynchronous axolotl message sendingAndreas Straub2015-07-052-8/+27
| | | | | | | | | | XmppConnectionService.sendMessage() now dispatches messages to the AxolotlService, where they only are prepared for sending and cached. AxolotlService now triggers a XmppConnectionService.resendMessage(), which then handles sending the cached message packet. This transparently fixes, e.g., handling of messages sent while we are offline.
* Properly track message senderAndreas Straub2015-07-053-15/+16
| | | | | | | Previously, the sender was assumed to be the conversation counterpart. This broke carboned own-device messages. We now track the sender properly, and also set the status (sent by one of the own devices vs received from the counterpart) accordingly.
* Rework PEP content verificationAndreas Straub2015-07-052-48/+62
| | | | | | Now checks which part(s) are out of sync w/ local storage, and updates only those, rather than assuming the entire node corrupt and overwriting it all (especially relevant for preKey list)
* Formatting fixesAndreas Straub2015-07-051-2/+2
|
* When receiving, add mock session if none existsAndreas Straub2015-07-051-1/+1
| | | | | | | | | | We need a session object in order to build a session from a PreKeyWhisperMessage, so add an empty one when none exists on receiving a message. Warning: this will break right now if the session can not be constructed from the received message.There will be an invalid session which will break if we try to send using it.
* Tag messages with originating sessionAndreas Straub2015-07-052-0/+9
| | | | | This can be used later in order to display trust status of messages, as well as for potential resending of messages in case of preKey conflicts.
* Fetch bundles on-demand, encrypt in backgroundAndreas Straub2015-07-055-65/+109
| | | | | | | | | | | Bundles are now fetched on demand when a session needs to be established. This should lessen the chance of changes to the bundles occuring before they're used, as well as lessen the load of fetching bundles. Also, the message encryption is now done in a background thread, as this can be somewhat costly if many sessions are present. This is probably not going to be an issue in real use, but it's good practice anyway.
* Use bareJid for own session retrievalAndreas Straub2015-07-051-1/+1
|
* Migrate to new PEP layoutAndreas Straub2015-07-054-147/+157
| | | | Merge prekeys into bundle node
* Formatting fixesAndreas Straub2015-07-051-22/+22
|
* Save IdentityKeys in databaseAndreas Straub2015-07-052-47/+108
|
* DatabaseBackend bugfixesAndreas Straub2015-07-051-0/+5
| | | | Don't leak cursors, initially create tables
* Reformat code to use tabsAndreas Straub2015-07-0510-1115/+1115
| | | | This really sucks to do it like this. Sorry. :(
* Added axolotl activation code to UIAndreas Straub2015-07-055-0/+80
|
* Added PEP and message protocol layersAndreas Straub2015-07-058-8/+509
| | | | Can now fetch/retrieve from PEP, as well as encode/decode messages
* Reworked axolotl protocol layerAndreas Straub2015-07-058-95/+579
| | | | Numerous fixes
* CryptoNext persistance layer mockupAndreas Straub2015-07-056-65/+841
| | | | | Initial sketch of the peripheral storage infrastructure for the new axolotl-based encryption scheme.
* refactored sendMessage and merged with resendMessageDaniel Gultsch2015-07-052-148/+117
|
* make sure unread count is initialized as 0. fixes #1270Daniel Gultsch2015-07-031-1/+2
|
* avoid very rare npeDaniel Gultsch2015-07-032-2/+4
|
* Merge branch 'master' into developmentDaniel Gultsch2015-07-031-0/+1
|\
| * added fallback for non-srv dns queriesDaniel Gultsch2015-07-031-0/+1
| |
* | fixed share with activity to account for http file uploadDaniel Gultsch2015-07-022-43/+38
| |
* | also offer http download for some 'well known extensions'Daniel Gultsch2015-07-022-1/+4
| |
* | refactored message context menuDaniel Gultsch2015-07-023-33/+38
| |
* | moved null check for to and from in message parserDaniel Gultsch2015-07-021-5/+6
| |
* | changed mime type handlingDaniel Gultsch2015-07-017-54/+555
| |
* | disable automatic aes encryption for the time beingDaniel Gultsch2015-06-301-1/+1
| |
* | changed namespace of the http upload featureDaniel Gultsch2015-06-301-1/+1
| |
* | made httpconnection (download) ready all kind of filesfeature/http_uploadDaniel Gultsch2015-06-309-69/+74
| |
* | made storage path decision entirely based upon file extensionDaniel Gultsch2015-06-301-2/+4
| |
* | refactored bodyContainsDownloadable to be more flexibleDaniel Gultsch2015-06-305-37/+39
| |
* | always show copy original url in context menu when url is availableDaniel Gultsch2015-06-301-2/+1
| |
* | untested pgp support for http uploadDaniel Gultsch2015-06-292-6/+31
| |
* | added trigger to Config.java to always enable aes encryption for uploaded filesDaniel Gultsch2015-06-292-0/+15
| |
* | make quick actions available in conferences when file attachment is availableDaniel Gultsch2015-06-291-23/+28
| |
* | show attach button in conferences when http upload is availableDaniel Gultsch2015-06-294-7/+14
| |
* | initial http upload supportDaniel Gultsch2015-06-2914-95/+278
|/ | | | be careful: little error handling and no encryption