Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | Apply coding style | Michael Vetter | 2020-07-07 | 1 | -95/+92 |
| | |||||
* | Revert "Apply coding style" | Michael Vetter | 2020-07-07 | 1 | -92/+95 |
| | | | | | | This reverts commit 9b55f2dec0ea27a9ce4856e303425e12f866cea2. Sorting the includes creates some problems. | ||||
* | Apply coding style | Michael Vetter | 2020-07-07 | 1 | -95/+92 |
| | | | | Regards https://github.com/profanity-im/profanity/issues/1396 | ||||
* | Add vim modeline | Michael Vetter | 2019-11-13 | 1 | -0/+1 |
| | |||||
* | Fix memleak in save_identity() | Michael Vetter | 2019-07-23 | 1 | -1/+1 |
| | | | | I don't see a reason for strdupping here. | ||||
* | Dont use not needed strdup() in save_identity() | Michael Vetter | 2019-07-23 | 1 | -1/+1 |
| | | | | I don't see a reason for strdupping here. | ||||
* | Fix various OMEMO memleaks | Paul Fariello | 2019-07-10 | 1 | -1/+10 |
| | |||||
* | Mark messages received from a session as trusted | Paul Fariello | 2019-06-25 | 1 | -4/+9 |
| | |||||
* | Add prof_message_t to wrap all message attributes | Paul Fariello | 2019-06-20 | 1 | -1/+1 |
| | | | | | | | Probably missing copy of body to plain in carbon and privmessage. Only covers the incoming message path because goal is OMEMO decryption of untrusted message. Cover some of the log functions but not all. | ||||
* | Add trusted state after OMEMO decryption | Paul Fariello | 2019-06-20 | 1 | -5/+7 |
| | | | | Use it to print message on red background if not trusted. | ||||
* | Decrypt all incoming OMEMO msg | Paul Fariello | 2019-06-20 | 1 | -1/+15 |
| | | | | | Trust all key as long as it's for reading. This code isn't multithread safe. | ||||
* | Add copyright to omemo code | Michael Vetter | 2019-06-17 | 1 | -0/+33 |
| | |||||
* | Remove OMEMO session when untrusting a fingerprint | Paul Fariello | 2019-06-07 | 1 | -1/+8 |
| | | | | | | We have to store known_devices in a long term fashion otherwise we might not be able to delete session if it is remove from device list server side. | ||||
* | Fix issue with first encrypted message | Paul Fariello | 2019-04-10 | 1 | -1/+5 |
| | | | | | | | | When decrypting first message with prekey, libsignal wants to remove used prekey from storage. Return value on success should be 0. We used to return number of deleted keys. Thus libsignal was considering we failed to remove the key and we were ignoring plaintext. | ||||
* | Rework trusted fingerprint storage | Paul Fariello | 2019-04-10 | 1 | -8/+17 |
| | | | | | Stop using "jid:device_id" keys. And move long term storage to its own file: trust.txt. | ||||
* | Permanently store pre keys | Paul Fariello | 2019-04-10 | 1 | -2/+41 |
| | |||||
* | Add support for disconnect in OMEMO | Paul Fariello | 2019-04-10 | 1 | -3/+13 |
| | |||||
* | Don't trust unknown identity keys | Paul Fariello | 2019-04-10 | 1 | -4/+10 |
| | | | | | Also add long terme storage of known identity keys. If a key is stored it means it is trusted. | ||||
* | Add support for libsignal-protocol-c 2.3.2 | Paul Fariello | 2019-04-10 | 1 | -0/+15 |
| | |||||
* | Add OMEMO session long term storage | Paul Fariello | 2019-04-10 | 1 | -0/+8 |
| | |||||
* | Add support for encrypted carbon | Paul Fariello | 2019-04-10 | 1 | -12/+32 |
| | | | | Fix {signed,}_pre_key store | ||||
* | Add OMEMO message encryption and decryption | Paul Fariello | 2019-04-10 | 1 | -4/+8 |
| | |||||
* | Add signal store backend and OMEMO start command | Paul Fariello | 2019-04-10 | 1 | -0/+267 |