aboutsummaryrefslogtreecommitdiffstats
path: root/src/main (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Increase number of published prekeys for releaseAndreas Straub2015-08-071-1/+1
|
* request server-ACKs for iq stanzasDaniel Gultsch2015-08-061-33/+37
|
* fail old/invalid iq stanzas on bindDaniel Gultsch2015-08-061-0/+13
|
* hide multi-end and otr encryption in conferencesDaniel Gultsch2015-08-061-2/+3
|
* Improve TrustKeysActivity slider responsivenessAndreas Straub2015-08-051-11/+11
| | | | | | Slider used to skip back on drag-and-drop action. The switch doesn't trigger explicit whole UI refreshes anymore, it now directly adjusts the "done" button's locked status.
* added config.java variable to hide openpgp as an encryption methodDaniel Gultsch2015-08-053-0/+4
|
* changed text selection colorDaniel Gultsch2015-08-053-0/+3
|
* added Config.java varibale to lock account creation to specfic domainDaniel Gultsch2015-08-039-33/+112
|
* sync translations with transifexDaniel Gultsch2015-08-0324-71/+14
|
* lets try jpeg for a whileDaniel Gultsch2015-08-011-1/+1
|
* temporarily renamed new encryption method to 'Multi-End' until a better name ↵Daniel Gultsch2015-08-011-10/+10
| | | | has been found
* use content-type in http slot request and stick with during uploadDaniel Gultsch2015-08-012-2/+8
|
* fixed calculated file size in http slot requestDaniel Gultsch2015-08-011-15/+13
|
* Let UNTRUSTED/UNDECIDED keys become INACTIVEAndreas Straub2015-08-019-116/+138
|
* enable axolotl encryption for jingle supported file transfersDaniel Gultsch2015-08-0110-138/+223
|
* Provide process function for key transport messageAndreas Straub2015-07-314-19/+84
|
* Refactor axolotl message processing workflowAndreas Straub2015-07-317-157/+121
| | | | | | | | | | | | | | XmppAxolotlMessage is now entirely responsible for handling encryption and decryption of messages, only leveraging XmppAxolotlSession as a packing/unpacking primitive for payload keys. Removed pseudo-dead session generation code step from prepareMessage function, as sessions have been created by invoking the TrustKeysActivity for a while now. Added prepareKeyTransportMessage function, which creates a message with no payload. The key that is packed into the header keyElements can then be used for other purposes (e.g. encrypted file transfer).
* Reformat codeAndreas Straub2015-07-313-86/+87
|
* Change to new wire protocol versionAndreas Straub2015-07-315-73/+112
|
* added missing carbon column message table create statementDaniel Gultsch2015-07-311-0/+1
| | | | fixes #1310
* improved 'next encryption' selectionDaniel Gultsch2015-07-316-73/+69
|
* removed expert setting to 'force encryption'. merged certifcate and ↵Daniel Gultsch2015-07-312-83/+75
| | | | encryption settings into same category
* Fix session logic: enforce same type of encryptionAndreas Straub2015-07-302-25/+34
|
* fixed some colors in message adapterDaniel Gultsch2015-07-305-28/+33
|
* use gcm for file encryption over httpDaniel Gultsch2015-07-296-104/+127
|
* Reset lock color for non-axolotl messagesAndreas Straub2015-07-291-0/+2
|
* Highlight selected message's fingerprint in listAndreas Straub2015-07-297-13/+34
|
* Rerender message bubbles on encryption changeAndreas Straub2015-07-291-0/+1
|
* Tag carbon messages in parser, adapt session logicAndreas Straub2015-07-294-7/+32
| | | | | | Messages sent from another device of the own account are now explicitly tagged as carboned message. The session detection logic now uses this tag to find "session borders".
* Fix NPE: consider unknown keys UNDECIDEDAndreas Straub2015-07-291-1/+2
|
* Color plaintext messages in encrypted sessions redAndreas Straub2015-07-291-0/+30
| | | | | | | | | Plaintext messages that were received while in an encrypted session are now colored red. We define "in an encrypted session" if a) the last message sent by our own device before the message under consideration (or any message received between then and now) was encrypted AND b) the next message will be sent encrypted or the next message sent after the one under consideration was sent encrypted
* Improve trust toggle responsivenessAndreas Straub2015-07-291-6/+1
| | | | Removed unnecessary UI refreshes, explicitly update UI where needed.
* Refactor out inner classes, cache trust storeAndreas Straub2015-07-2910-709/+760
| | | | | | | Moves SQLiteAxolotlStore and XmppAxolotlSession into proper classes. IdentityKeys trust statuses are now cached in an LruCache to prevent hammering the database when rendering the UI.
* add new received message bubble drawableDaniel Gultsch2015-07-2915-0/+0
|
* show http downloaded images in notificationDaniel Gultsch2015-07-291-2/+3
|
* removed recursion in message.getMerged*()Daniel Gultsch2015-07-281-13/+19
|
* changed logging. (work around logcat null pointerDaniel Gultsch2015-07-282-2/+1
|
* log reason for message failureDaniel Gultsch2015-07-281-0/+7
|
* set time on resend to current timeDaniel Gultsch2015-07-281-1/+2
| | | | | fixes #1298 fixes #919
* rewrote dns fallbackDaniel Gultsch2015-07-242-9/+9
|
* call refreshUi directlyDaniel Gultsch2015-07-241-1/+1
|
* switch/case can't deal with null pointersDaniel Gultsch2015-07-231-0/+3
|
* show warning when trying to highlight users that have left the conferenceDaniel Gultsch2015-07-223-5/+22
|
* treat private, non-anonymous mucs like 1:1 chats notification wiseDaniel Gultsch2015-07-224-4/+11
|
* Always build own device session automaticallyAndreas Straub2015-07-221-6/+13
|
* add no-store to chat statesDaniel Gultsch2015-07-221-0/+2
|
* use type=chat more often to go along with new, simple carbon and mam rulesDaniel Gultsch2015-07-222-12/+15
| | | | | * change chat states to type=chat and chat markers to type=chat * use same type as requesting stanza for delivery receipts (which should make them type=chat most of the time)
* use 'interactive mode' when starting downloads from the context menuDaniel Gultsch2015-07-223-3/+2
|
* Hide regenerate keys buttonAndreas Straub2015-07-223-11/+16
| | | | Can re-enable it via Config.java setting
* Disable trust toggle completely for INACTIVE keysAndreas Straub2015-07-221-0/+1
|