about summary refs log tree commit diff stats
path: root/src/xmpp/connection.c
Commit message (Collapse)AuthorAgeFilesLines
...
* Free prof_identifier in case of reconnectMichael Vetter2019-10-191-0/+3
| | | | Bedore we assign it new.
* Change origin-id/id algoMichael Vetter2019-10-181-10/+10
| | | | | Hash twice. Use HMAC SHA256 from glib.
* Log incoming MUC messages if origin-id sais they dont come from usMichael Vetter2019-10-181-10/+7
| | | | Regards https://github.com/profanity-im/profanity/issues/1201
* Remove prefix from stanza idMichael Vetter2019-10-171-1/+1
| | | | | We sent `prof_prefix_uuid` as id. Where the prefix was also optional. We don't need this at all.
* Change algo for connection_create_stanza_id()Michael Vetter2019-10-171-7/+11
|
* Change connection_create_stanza_id()Michael Vetter2019-10-171-11/+11
| | | | | To return identifier and uuid together. We can remove the prefix later on.
* Calculate identifier upon connectMichael Vetter2019-10-161-5/+28
| | | | | | | This will be needed so that we can later detect if messages (origin-in) was sent by us. Regards https://github.com/profanity-im/profanity/issues/1207
* Rename identification fileMichael Vetter2019-10-161-1/+2
|
* Use random string for random-bytes identifierMichael Vetter2019-10-161-4/+5
| | | | | | And rename `instance` to `identifier`. Regards https://github.com/profanity-im/profanity/issues/1207
* Create random-bytes fileMichael Vetter2019-10-161-0/+53
| | | | | | | | | | So far only with dummy value. We will need an identifier that we can hash together with a message ID and put in as the origin-id. So when we receive message we can unsplit it and see if it was sent from this client. Regards https://github.com/profanity-im/profanity/issues/1207
* Fix various OMEMO memleaksPaul Fariello2019-07-101-2/+4
|
* xmpp/connection: fix #1103Dmitry Podgorny2019-06-011-11/+28
| | | | | | | | | | | | When connection is lost, profanity tries to disconnect what leads to an infinite loop. The loop occurs, because connection_disconnet() runs xmpp_run_once() separately and waits for XMPP_CONN_DISCONNECT event. But it doesn't happen, because the connection object is disconnected. As solution, don't disconnect after XMPP_CONN_DISCONNECT is received. Also, don't free libstrophe objects while the event loops executes, because the event loop continues using objects after callbacks quit.
* Wait for discovery end to publish omemo devicelist and bundlePaul Fariello2019-04-101-0/+23
| | | | Add sv_ev_connection_features_received for that purpose
* Update copyright to include 2019Michael Vetter2019-01-221-1/+1
|
* Add option to trust server's certificateDmitry Podgorny2018-11-061-0/+3
| | | | | | | | | | | New tls policy "trust" added to /connect and /account. With the policy TLS connection is established even with invalid certificate. Note, that trust policy forces TLS connection and it fails when server doesn't support TLS. Examples: /connect <jid> tls trust /account <name> set tls trust
* Move ID generation to xmpp folderMichael Vetter2018-08-301-0/+21
| | | | | | | | | | | create_unique_id() was changed to use UUIDs instead of a counter in the last commit. Since now it depends on connection_create_uuid() which is in the xmpp subfolder the function should also be moved there. Renamed it to connection_create_stanza_id() and moved it to src/xmpp/connection.c. Discussion happened in https://github.com/boothj5/profanity/pull/1010
* Update copyrightJames Booth2018-01-211-1/+1
|
* Legacy SSL supportDmitry Podgorny2017-06-241-0/+2
| | | | | | | | | | | | | | | | Add "legacy" tls policy to /account and /connect commands. When this policy is specified the connection is connected with XMPP_CONN_LEGACY_SSL flag. Notice, legacy SSL and STARTTLS are not compatible and user has to know when exactly the new policy should be used. To enable it, run one of the next commands: /connect <jid> tls legacy [server <host>] /account <name> set tls legacy Notice, there is no SRV record for legacy SSL. Therefore, you may need "server" property to connect successfully. Refer to configuration provided by your server.
* Update CopyrightJames Booth2017-01-281-1/+1
|
* Allow clearing account resourceJames Booth2016-11-221-14/+14
| | | | issue #880
* Use server features for account muc serviceJames Booth2016-11-201-0/+4
| | | | issue #878
* Add /tls certpath defaultJames Booth2016-10-171-2/+2
| | | | issue #871
* Free hashtable key list in connection_jid_for_feature()James Booth2016-09-051-0/+1
|
* Tidy headersJames Booth2016-07-241-0/+1
|
* Move event timeout to connection moduleJames Booth2016-07-241-1/+7
|
* Update GPL link in headersJames Booth2016-07-241-1/+1
|
* Check for NULL before clearing connection dataJames Booth2016-06-011-3/+7
|
* Add connection_set_disconnected()James Booth2016-05-111-18/+8
|
* Add connection_clear_data()James Booth2016-05-101-17/+12
|
* Remove connection_free_conn(), connection_free_ctx()James Booth2016-05-101-18/+10
|
* Add connection_shutdown()James Booth2016-05-101-7/+11
|
* Remove JABBER_STARTED, JABBER_UNDEFINED connection statesJames Booth2016-05-101-1/+12
|
* Remove _session_free_session_data from session.cJames Booth2016-05-101-1/+2
|
* Tidy connection.cJames Booth2016-05-101-21/+35
|
* Tidy connection.cJames Booth2016-05-101-150/+128
|
* Tidy session.cJames Booth2016-05-081-2/+2
|
* Free features on disconnectJames Booth2016-05-081-1/+2
|
* Use hash table for disco featuresJames Booth2016-05-081-48/+33
|
* Remove connection_get_disco_infos()James Booth2016-05-081-6/+0
|
* Rename diso_items->diso_infosJames Booth2016-05-081-12/+12
|
* Add connection_get_disco_info()James Booth2016-05-081-6/+21
|
* Add connection_item_for_feature()James Booth2016-05-081-0/+16
|
* Move logic to connection_set_disco_itemsJames Booth2016-05-081-6/+17
|
* Move conneciton initialisation to _connection_handlerJames Booth2016-05-081-16/+11
|
* Move xmpp_initialise() to conneciton.cJames Booth2016-05-071-0/+1
|
* Move disco info struct to connectionJames Booth2016-05-071-0/+58
|
* Move available resources to connection structJames Booth2016-05-071-0/+26
|
* Rename xmpp typesJames Booth2016-05-061-48/+48
|
* Remove redundant tls secured functionJames Booth2016-05-061-7/+1
|
* Tidy connect functionJames Booth2016-05-061-18/+3
|