| Commit message (Collapse) | Author | Age | Files | Lines |
| |
|
| |
|
| |
|
|
|
|
|
|
| |
This reverts commit 9b55f2dec0ea27a9ce4856e303425e12f866cea2.
Sorting the includes creates some problems.
|
|
|
|
| |
Regards https://github.com/profanity-im/profanity/issues/1396
|
|\ |
|
| |\
| | |
| | | |
Request Device and Key, when OMEMO is in use
|
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
Profanity requests the device list and keys for contacts, also when the user
hasn't generated the OMEMO key. If the user has no OMEMO key, there is no need
to request OMEMO information.
Issue: #1332
|
|\ \ \
| |/ /
|/| | |
|
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
In 0.9.x we fixed an issue, because OMEMO devices should be defined in "item"
with id "current". This should work, but it won't work if there is no "current".
If there is no "current" we will just use the first item.
Issue #1384
|
|/ /
| |
| |
| |
| | |
It just does a free.
Related to b580b9ef119045f142fa4baa9689a1c5ce8864ef
|
|/
|
|
|
| |
We often had a use case where we want the account specific data dir.
Let's create a function for this instead of doing it by hand each time.
|
|
|
|
| |
Instead of connection_get_fulljid() and then creating a Jid from it.
|
| |
|
|
|
|
|
|
|
| |
We decrypt both 12 and 16 bytes.
And send 12 instead of 16 bytes now.
Close https://github.com/profanity-im/profanity/issues/1272
|
| |
|
|
|
|
| |
Fix #1068
|
|
|
|
|
|
|
| |
16 bytes IV should be used. Some clients can't use it so we should also
support decrypting 12 bytes IV.
Fix #1253
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
I don't see a reason for strdupping here.
|
| |
|
|
|
|
| |
I don't see a reason for strdupping here.
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
|
| |
We already do this in omemo_init() no need to do it again in
omemo_on_connect().
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
We call omemo_init() when starting profanity and should have an
omemo_close() at exit.
For now we free the fingerprint autocompleter in there.
Fixes valgrind:
```
==13226== 24 bytes in 1 blocks are definitely lost in loss record 2,855
of 6,958
==13226== at 0x483677F: malloc (in
/usr/lib64/valgrind/vgpreload_memcheck-amd64-linux.so)
==13226== by 0x48AD39: autocomplete_new (autocomplete.c:57)
==13226== by 0x4AB89F: omemo_init (omemo.c:127)
==13226== by 0x42C283: _init (profanity.c:206)
==13226== by 0x42BFF3: prof_run (profanity.c:98)
==13226== by 0x4B25E6: main (main.c:172)
```
Regards https://github.com/profanity-im/profanity/issues/1131
|
| |
|
|
|
|
|
|
|
| |
Probably missing copy of body to plain in carbon and privmessage.
Only covers the incoming message path because goal is OMEMO decryption
of untrusted message.
Cover some of the log functions but not all.
|
|
|
|
| |
Use it to print message on red background if not trusted.
|
|
|
|
|
| |
Trust all key as long as it's for reading. This code isn't multithread
safe.
|
| |
|
| |
|
| |
|
|
|
|
|
|
| |
We have to store known_devices in a long term fashion otherwise we might
not be able to delete session if it is remove from device list server
side.
|
|
|
|
| |
Fix #1101
|
|
|
|
|
|
|
|
|
| |
This is actually not needed because result will always be set.
hartmann had problems building profanity on OpenBSD and he proposed this
patch.
Let's use it to make the compiler happy there.
|
|
|
|
|
|
|
| |
This should never happens since we should ensure MUC is Non-Anonymous
before enabling OMEMO.
But we should neither segfault if this happens.
|
|
|
|
|
|
|
|
|
|
|
|
| |
There is 3 policy:
- manual: OMEMO session are only started manually
- automatic: OMEMO session are only started if they have been started
manually before
- always: OMEMO session are always started unless they have been ended
manually before
Closes #1040 and fixes #1052
|
|
|
|
|
| |
We should not remove signed prekey and prekey from persistent storage
when cleaning OMEMO store on disconnect.
|
|
|
|
|
| |
If OMEMO identity.txt is malformed just abort loading.
User should be able to call `/omemo gen` again.
|
|
|
|
|
|
|
| |
If OMEMO wasn't loaded, removing key would create empty identity.txt
file. Then at load time it would segfault profanity.
Another commit should fix load of malformed identity.txt.
|
|
|
|
|
|
|
|
| |
When decrypting first message with prekey, libsignal wants to remove
used prekey from storage. Return value on success should be 0.
We used to return number of deleted keys. Thus libsignal was considering
we failed to remove the key and we were ignoring plaintext.
|
| |
|