about summary refs log tree commit diff stats
path: root/src/omemo/store.c
Commit message (Collapse)AuthorAgeFilesLines
* Improved OMEMO loggingDebXWoody2021-05-281-1/+22
| | | | | | | | | | | The most loggings has been set to debug. Just in case of error / problem the logging should be done with log-level ERROR or WARNING. We will see later, which loggings should be switched to log-level INFO. This improvement has been done to find OMEMO bugs. See also: #1070 #1530 #1538
* Apply coding styleMichael Vetter2020-07-071-95/+92
|
* Revert "Apply coding style"Michael Vetter2020-07-071-92/+95
| | | | | | This reverts commit 9b55f2dec0ea27a9ce4856e303425e12f866cea2. Sorting the includes creates some problems.
* Apply coding styleMichael Vetter2020-07-071-95/+92
| | | | Regards https://github.com/profanity-im/profanity/issues/1396
* Add vim modelineMichael Vetter2019-11-131-0/+1
|
* Fix memleak in save_identity()Michael Vetter2019-07-231-1/+1
| | | | I don't see a reason for strdupping here.
* Dont use not needed strdup() in save_identity()Michael Vetter2019-07-231-1/+1
| | | | I don't see a reason for strdupping here.
* Fix various OMEMO memleaksPaul Fariello2019-07-101-1/+10
|
* Mark messages received from a session as trustedPaul Fariello2019-06-251-4/+9
|
* Add prof_message_t to wrap all message attributesPaul Fariello2019-06-201-1/+1
| | | | | | | Probably missing copy of body to plain in carbon and privmessage. Only covers the incoming message path because goal is OMEMO decryption of untrusted message. Cover some of the log functions but not all.
* Add trusted state after OMEMO decryptionPaul Fariello2019-06-201-5/+7
| | | | Use it to print message on red background if not trusted.
* Decrypt all incoming OMEMO msgPaul Fariello2019-06-201-1/+15
| | | | | Trust all key as long as it's for reading. This code isn't multithread safe.
* Add copyright to omemo codeMichael Vetter2019-06-171-0/+33
|
* Remove OMEMO session when untrusting a fingerprintPaul Fariello2019-06-071-1/+8
| | | | | | We have to store known_devices in a long term fashion otherwise we might not be able to delete session if it is remove from device list server side.
* Fix issue with first encrypted messagePaul Fariello2019-04-101-1/+5
| | | | | | | | When decrypting first message with prekey, libsignal wants to remove used prekey from storage. Return value on success should be 0. We used to return number of deleted keys. Thus libsignal was considering we failed to remove the key and we were ignoring plaintext.
* Rework trusted fingerprint storagePaul Fariello2019-04-101-8/+17
| | | | | Stop using "jid:device_id" keys. And move long term storage to its own file: trust.txt.
* Permanently store pre keysPaul Fariello2019-04-101-2/+41
|
* Add support for disconnect in OMEMOPaul Fariello2019-04-101-3/+13
|
* Don't trust unknown identity keysPaul Fariello2019-04-101-4/+10
| | | | | Also add long terme storage of known identity keys. If a key is stored it means it is trusted.
* Add support for libsignal-protocol-c 2.3.2Paul Fariello2019-04-101-0/+15
|
* Add OMEMO session long term storagePaul Fariello2019-04-101-0/+8
|
* Add support for encrypted carbonPaul Fariello2019-04-101-12/+32
| | | | Fix {signed,}_pre_key store
* Add OMEMO message encryption and decryptionPaul Fariello2019-04-101-4/+8
|
* Add signal store backend and OMEMO start commandPaul Fariello2019-04-101-0/+267