Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | Use OMEMO for offline MUC members (#1242) | Paul Fariello | 2020-01-20 | 1 | -21/+11 | |
| | ||||||
* | Update my Copyright to 2020 | Michael Vetter | 2020-01-03 | 1 | -1/+1 | |
| | ||||||
* | Add vim modeline | Michael Vetter | 2019-11-13 | 6 | -0/+6 | |
| | ||||||
* | omemo: use lower case to log info | Michael Vetter | 2019-08-23 | 1 | -1/+1 | |
| | ||||||
* | Fix typo in OMEMO materials log | Michael Vetter | 2019-08-23 | 1 | -1/+1 | |
| | ||||||
* | Fix memleak in save_identity() | Michael Vetter | 2019-07-23 | 1 | -1/+1 | |
| | | | | I don't see a reason for strdupping here. | |||||
* | Fix potential leak in omemo_untrust() | Michael Vetter | 2019-07-23 | 1 | -0/+2 | |
| | ||||||
* | Dont use not needed strdup() in save_identity() | Michael Vetter | 2019-07-23 | 1 | -1/+1 | |
| | | | | I don't see a reason for strdupping here. | |||||
* | Remove dead assignments | Michael Vetter | 2019-07-22 | 1 | -1/+1 | |
| | ||||||
* | Dirty fix libgcrypt memleak | Paul Fariello | 2019-07-11 | 1 | -0/+5 | |
| | ||||||
* | Enable secure memory in gcrypt initialisation | Paul Fariello | 2019-07-11 | 1 | -0/+6 | |
| | ||||||
* | Fix various OMEMO memleaks | Paul Fariello | 2019-07-10 | 2 | -3/+12 | |
| | ||||||
* | Free omemo_ctx.device_list_handler | Michael Vetter | 2019-07-04 | 1 | -0/+1 | |
| | ||||||
* | Dont initialize omemo autocompleter twice | Michael Vetter | 2019-07-04 | 1 | -2/+0 | |
| | | | | | We already do this in omemo_init() no need to do it again in omemo_on_connect(). | |||||
* | Add omemo_close function | Michael Vetter | 2019-07-04 | 2 | -0/+10 | |
| | | | | | | | | | | | | | | | | | | | | | | We call omemo_init() when starting profanity and should have an omemo_close() at exit. For now we free the fingerprint autocompleter in there. Fixes valgrind: ``` ==13226== 24 bytes in 1 blocks are definitely lost in loss record 2,855 of 6,958 ==13226== at 0x483677F: malloc (in /usr/lib64/valgrind/vgpreload_memcheck-amd64-linux.so) ==13226== by 0x48AD39: autocomplete_new (autocomplete.c:57) ==13226== by 0x4AB89F: omemo_init (omemo.c:127) ==13226== by 0x42C283: _init (profanity.c:206) ==13226== by 0x42BFF3: prof_run (profanity.c:98) ==13226== by 0x4B25E6: main (main.c:172) ``` Regards https://github.com/profanity-im/profanity/issues/1131 | |||||
* | Mark messages received from a session as trusted | Paul Fariello | 2019-06-25 | 3 | -10/+25 | |
| | ||||||
* | Add prof_message_t to wrap all message attributes | Paul Fariello | 2019-06-20 | 2 | -2/+2 | |
| | | | | | | | Probably missing copy of body to plain in carbon and privmessage. Only covers the incoming message path because goal is OMEMO decryption of untrusted message. Cover some of the log functions but not all. | |||||
* | Add trusted state after OMEMO decryption | Paul Fariello | 2019-06-20 | 4 | -7/+10 | |
| | | | | Use it to print message on red background if not trusted. | |||||
* | Decrypt all incoming OMEMO msg | Paul Fariello | 2019-06-20 | 3 | -1/+23 | |
| | | | | | Trust all key as long as it's for reading. This code isn't multithread safe. | |||||
* | Free contacts in omemo_start_sessions() | Michael Vetter | 2019-06-19 | 1 | -0/+1 | |
| | ||||||
* | Free OMEMO session store upon disconnect | Michael Vetter | 2019-06-19 | 1 | -0/+1 | |
| | ||||||
* | Add copyright to omemo code | Michael Vetter | 2019-06-17 | 6 | -0/+199 | |
| | ||||||
* | Remove OMEMO session when untrusting a fingerprint | Paul Fariello | 2019-06-07 | 2 | -16/+122 | |
| | | | | | | We have to store known_devices in a long term fashion otherwise we might not be able to delete session if it is remove from device list server side. | |||||
* | Correctly handle malformed OMEMO messages | Paul Fariello | 2019-05-23 | 1 | -4/+8 | |
| | | | | Fix #1101 | |||||
* | OMEMO: Initialize result in omemo_automatic_start | Michael Vetter | 2019-04-29 | 1 | -1/+1 | |
| | | | | | | | | | This is actually not needed because result will always be set. hartmann had problems building profanity on OpenBSD and he proposed this patch. Let's use it to make the compiler happy there. | |||||
* | Handle missing real jid in OMEMO encrypted MUC | Paul Fariello | 2019-04-17 | 1 | -3/+7 | |
| | | | | | | | This should never happens since we should ensure MUC is Non-Anonymous before enabling OMEMO. But we should neither segfault if this happens. | |||||
* | Add OMEMO policy | Paul Fariello | 2019-04-17 | 2 | -16/+69 | |
| | | | | | | | | | | | | There is 3 policy: - manual: OMEMO session are only started manually - automatic: OMEMO session are only started if they have been started manually before - always: OMEMO session are always started unless they have been ended manually before Closes #1040 and fixes #1052 | |||||
* | Don't persist OMEMO {signed,}prekey cleaning on disconnect | Paul Fariello | 2019-04-14 | 1 | -10/+0 | |
| | | | | | We should not remove signed prekey and prekey from persistent storage when cleaning OMEMO store on disconnect. | |||||
* | Handle malformed OMEMO identity.txt | Paul Fariello | 2019-04-14 | 1 | -7/+34 | |
| | | | | | If OMEMO identity.txt is malformed just abort loading. User should be able to call `/omemo gen` again. | |||||
* | Don't unload OMEMO cryto on disconnect if OMEMO wasn't loaded | Paul Fariello | 2019-04-14 | 1 | -0/+4 | |
| | | | | | | | If OMEMO wasn't loaded, removing key would create empty identity.txt file. Then at load time it would segfault profanity. Another commit should fix load of malformed identity.txt. | |||||
* | Fix issue with first encrypted message | Paul Fariello | 2019-04-10 | 1 | -1/+5 | |
| | | | | | | | | When decrypting first message with prekey, libsignal wants to remove used prekey from storage. Return value on success should be 0. We used to return number of deleted keys. Thus libsignal was considering we failed to remove the key and we were ignoring plaintext. | |||||
* | Try to start sessions with every jid in roster | Paul Fariello | 2019-04-10 | 2 | -0/+18 | |
| | ||||||
* | Automatically starts OMEMO if one identity is trusted | Paul Fariello | 2019-04-10 | 2 | -6/+24 | |
| | ||||||
* | Rework trusted fingerprint storage | Paul Fariello | 2019-04-10 | 4 | -29/+90 | |
| | | | | | Stop using "jid:device_id" keys. And move long term storage to its own file: trust.txt. | |||||
* | Wait for discovery end to publish omemo devicelist and bundle | Paul Fariello | 2019-04-10 | 2 | -7/+15 | |
| | | | | Add sv_ev_connection_features_received for that purpose | |||||
* | Prefix static function with _ | Paul Fariello | 2019-04-10 | 1 | -41/+41 | |
| | ||||||
* | Ensure pre keys are generated if missing from long term storage | Paul Fariello | 2019-04-10 | 1 | -24/+51 | |
| | ||||||
* | Permanently store pre keys | Paul Fariello | 2019-04-10 | 3 | -22/+119 | |
| | ||||||
* | Handle bundle publication error on publish-options | Paul Fariello | 2019-04-10 | 1 | -2/+2 | |
| | | | | | We try to reconfigure node and publish again. If it fails again then we give up. | |||||
* | Ensure signal context is built on connection | Paul Fariello | 2019-04-10 | 1 | -20/+23 | |
| | | | | | We can't keep it between two connection because signal context is specific to a given account. | |||||
* | Don't use glib 2.58 func | Paul Fariello | 2019-04-10 | 1 | -3/+1 | |
| | ||||||
* | Add fingerprint autocompletion | Paul Fariello | 2019-04-10 | 2 | -1/+23 | |
| | ||||||
* | Use /omemo fingerprint to show contact fingerprints | Paul Fariello | 2019-04-10 | 2 | -27/+46 | |
| | | | | Don't print fingerprints when they are received | |||||
* | Add support for disconnect in OMEMO | Paul Fariello | 2019-04-10 | 3 | -27/+91 | |
| | ||||||
* | Handle absent muc member | Paul Fariello | 2019-04-10 | 1 | -0/+4 | |
| | ||||||
* | Log and print outgoing encrypted message | Paul Fariello | 2019-04-10 | 2 | -39/+35 | |
| | ||||||
* | Add support for sending encrypted message in MUC | Paul Fariello | 2019-04-10 | 2 | -41/+88 | |
| | ||||||
* | Cosmetics rename variable barejid into roomjid | Paul Fariello | 2019-04-10 | 2 | -3/+3 | |
| | ||||||
* | Allow to start OMEMO in MUC | Paul Fariello | 2019-04-10 | 2 | -0/+14 | |
| | ||||||
* | Add MUC message decryption | Paul Fariello | 2019-04-10 | 2 | -15/+45 | |
| |