aboutsummaryrefslogtreecommitdiffstats
path: root/src/main (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Fix trust status for outgoing messagesCryptoNextAlphaAndreas Straub2015-07-155-28/+43
| | | | | | Tag sent messages with own fingerprint, set own fingerprint as always trusted, include own fingerprint in database trust search, explicitly reset trust colorfilter
* Don't merge messages with different trust statusesAndreas Straub2015-07-151-1/+7
|
* Fix copying of axolotl keys to clipboardSam Whited2015-07-091-1/+1
|
* Add refresh icon to v21 themeSam Whited2015-07-097-1/+1
|
* Disable Axolotl option if not usableAndreas Straub2015-07-102-33/+10
| | | | | In MUCs or if contact is not axolotl capable, disable axolotl menu option
* Show trust status of messages' originating sessionAndreas Straub2015-07-102-0/+17
| | | | | Shade lock icon red if message was received in a session that has not been marked trusted by the user or fingerprint is unknown
* Add key trust toggle to ContactDetailsActivityAndreas Straub2015-07-1013-10/+52
| | | | Can now toggle IdentityKey trust
* Ensure that available sessions are always usedAndreas Straub2015-07-101-9/+30
| | | | | | | | | | | | | | | | | | Any time a new session is established, call syncRosterToDisk() to ensure that on subsequent restoreFromDatabase() calls, the roster is actually available. This is important so that initAccountServices() can properly initialize the SessionMap. This prevents a race condition where after adding a new account and initiating sessions with it, if the app is killed (e.g. by reinstall) before triggering a syncRosterToDisk(), subsequent restores will not have the roster available, leading to missing XmppAxolotlSessions in the SessionMap cache. As a result of this, a new session was initiated when sending a new message, and received messages could not be tagged with the originating session's fingerprint. As an added sanity check, go to the database to confirm no records are present before creating fresh XmppAxolotlSession objects (both in the sending and receiving case).
* Fix setIdentityKeyTrust update statementAndreas Straub2015-07-101-2/+2
|
* Fix IdentityKey storage modelAndreas Straub2015-07-101-2/+6
| | | | Added proper UNIQUE statement
* Fix and expand key regeneration functionAndreas Straub2015-07-101-9/+18
| | | | | | Wipe session cache to prevent stale sessions being used. Wipe fetch status cache to enable recreation of sessions. Regenerate deviceId, so that foreign devices will talk to us again.
* Display trust status in ContactDetailsActivityaxolotl-alphaAndreas Straub2015-07-092-3/+18
|
* Overhauled Message taggingAndreas Straub2015-07-095-88/+138
| | | | | | Messages are now tagged with the IdentityKey fingerprint of the originating session. IdentityKeys have one of three trust states: undecided (default), trusted, and untrusted/not yet trusted.
* Postpone initAccountService until roster loadedAndreas Straub2015-07-091-3/+1
| | | | | The AxolotlService depends on the roster being loaded when it is initialized so that it can fill its in-memory SessionMap.
* Fix getSubDeviceSessions SQL queryAndreas Straub2015-07-091-1/+1
|
* Merge branch 'development' into CryptoNextAlphaAndreas Straub2015-07-081-2/+6
|\ | | | | | | | | * development: show contacts name in non anonymous mucs. fixes #1213
| * show contacts name in non anonymous mucs. fixes #1213Daniel Gultsch2015-07-051-2/+6
| |
* | Display axolotl chat message hintAndreas Straub2015-07-082-0/+4
| |
* | Use full int range for device IDsAndreas Straub2015-07-081-1/+1
| |
* | Clean up unused constantAndreas Straub2015-07-081-1/+0
| |
* | Make some fields finalAndreas Straub2015-07-081-3/+3
| |
* | Clean up loggingAndreas Straub2015-07-085-67/+75
| | | | | | | | | | Add a fixed prefix to axolotl-related log messages, set log levels sensibly.
* | Add basic PEP managemend UI to EditAccountActivityAndreas Straub2015-07-075-4/+266
| | | | | | | | | | | | | | | | | | EditAccountActivity now show own fingerprint, and gives an option to regenerate local keying material (and wipe all sessions associated with the old keys in the process). It also now displays a list of other own devices, and gives an option to remove all but the current device.
* | Fix devicelist update handlingAndreas Straub2015-07-072-0/+6
| | | | | | | | | | | | No longer store own device ID (so that we don't encrypt messages for ourselves), verify that own device ID is present in update list (otherwise republish), reflect update in UI.
* | Refactor axolotl database recreationAndreas Straub2015-07-071-8/+14
| |
* | Adapt prettifyFingerprint() to axolotl FP sizesAndreas Straub2015-07-072-6/+5
| |
* | Fix displaying Contact IdentityKeysAndreas Straub2015-07-072-65/+2
| | | | | | | | | | Migrate ContactDetailsActivity to use new SQL IdentityKeys storage, remove dead code from Contact class.
* | Only cache session if successfully establishedAndreas Straub2015-07-051-1/+6
| | | | | | | | | | | | | | | | When receiving a message, only remember the XmppAxolotlSession wrapper if the prospective session was actually established. This prevents us from erroneously adding empty sessions that are never established using received PreKeyWhisperMessages, which would lead to errors if we try to use them for sending.
* | Return empty set on invalid PEP devicelistAndreas Straub2015-07-052-19/+20
| |
* | Trust all IdentityKeysAndreas Straub2015-07-051-2/+3
| | | | | | | | | | | | | | | | | | The trust-on-first-use policy leads to problems when receiving messages from two different devices of a contact before sending a message to them (as their IdentityKeys will not have been added yet). Since session trust will be managed externally anyway, this change is not a security problem, and will allow us to decrypt messages from yet-untrusted sessions.
* | Refresh PEP on session establishAndreas Straub2015-07-051-0/+18
| | | | | | | | | | | | | | | | We now track preKeys used to establish incoming sessions with us. On each new established session, we remove the used prekey from PEP. We have to do this because libaxolotl-java internally clears the used preKey from its storage, so we will not be able to establish any future sessions using that key.
* | Fix asynchronous axolotl message sendingAndreas Straub2015-07-052-8/+27
| | | | | | | | | | | | | | | | | | | | XmppConnectionService.sendMessage() now dispatches messages to the AxolotlService, where they only are prepared for sending and cached. AxolotlService now triggers a XmppConnectionService.resendMessage(), which then handles sending the cached message packet. This transparently fixes, e.g., handling of messages sent while we are offline.
* | Properly track message senderAndreas Straub2015-07-053-15/+16
| | | | | | | | | | | | | | Previously, the sender was assumed to be the conversation counterpart. This broke carboned own-device messages. We now track the sender properly, and also set the status (sent by one of the own devices vs received from the counterpart) accordingly.
* | Rework PEP content verificationAndreas Straub2015-07-052-48/+62
| | | | | | | | | | | | Now checks which part(s) are out of sync w/ local storage, and updates only those, rather than assuming the entire node corrupt and overwriting it all (especially relevant for preKey list)
* | Formatting fixesAndreas Straub2015-07-051-2/+2
| |
* | When receiving, add mock session if none existsAndreas Straub2015-07-051-1/+1
| | | | | | | | | | | | | | | | | | | | We need a session object in order to build a session from a PreKeyWhisperMessage, so add an empty one when none exists on receiving a message. Warning: this will break right now if the session can not be constructed from the received message.There will be an invalid session which will break if we try to send using it.
* | Tag messages with originating sessionAndreas Straub2015-07-052-0/+9
| | | | | | | | | | This can be used later in order to display trust status of messages, as well as for potential resending of messages in case of preKey conflicts.
* | Fetch bundles on-demand, encrypt in backgroundAndreas Straub2015-07-055-65/+109
| | | | | | | | | | | | | | | | | | | | | | Bundles are now fetched on demand when a session needs to be established. This should lessen the chance of changes to the bundles occuring before they're used, as well as lessen the load of fetching bundles. Also, the message encryption is now done in a background thread, as this can be somewhat costly if many sessions are present. This is probably not going to be an issue in real use, but it's good practice anyway.
* | Use bareJid for own session retrievalAndreas Straub2015-07-051-1/+1
| |
* | Migrate to new PEP layoutAndreas Straub2015-07-054-147/+157
| | | | | | | | Merge prekeys into bundle node
* | Formatting fixesAndreas Straub2015-07-051-22/+22
| |
* | Save IdentityKeys in databaseAndreas Straub2015-07-052-47/+108
| |
* | DatabaseBackend bugfixesAndreas Straub2015-07-051-0/+5
| | | | | | | | Don't leak cursors, initially create tables
* | Reformat code to use tabsAndreas Straub2015-07-0510-1115/+1115
| | | | | | | | This really sucks to do it like this. Sorry. :(
* | Added axolotl activation code to UIAndreas Straub2015-07-055-0/+80
| |
* | Added PEP and message protocol layersAndreas Straub2015-07-058-8/+509
| | | | | | | | Can now fetch/retrieve from PEP, as well as encode/decode messages
* | Reworked axolotl protocol layerAndreas Straub2015-07-058-95/+579
| | | | | | | | Numerous fixes
* | CryptoNext Menu entries addedAndreas Straub2015-07-052-0/+4
| |
* | CryptoNext persistance layer mockupAndreas Straub2015-07-056-65/+841
|/ | | | | Initial sketch of the peripheral storage infrastructure for the new axolotl-based encryption scheme.
* refactored sendMessage and merged with resendMessageDaniel Gultsch2015-07-052-148/+117
|