about summary refs log tree commit diff stats
path: root/src/xmpp/message.c
Commit message (Collapse)AuthorAgeFilesLines
...
* Fix a segfault when carbon has no bodyPaul Fariello2019-06-211-11/+13
|
* Don't highlight cleartext message as untrustedPaul Fariello2019-06-211-0/+1
|
* Fix segfault when receiving messages without IDPaul Fariello2019-06-211-1/+3
|
* Fix NULL pointer when handling non encrypted message in MUCPaul Fariello2019-06-211-1/+9
|
* Rename prof_message_t into ProfMessagePaul Fariello2019-06-201-7/+7
|
* Add prof_message_t to wrap all message attributesPaul Fariello2019-06-201-110/+140
| | | | | | | Probably missing copy of body to plain in carbon and privmessage. Only covers the incoming message path because goal is OMEMO decryption of untrusted message. Cover some of the log functions but not all.
* Use flags in xmmp/message.c for encryption and trustPaul Fariello2019-06-201-10/+20
|
* Add trusted state after OMEMO decryptionPaul Fariello2019-06-201-8/+11
| | | | Use it to print message on red background if not trusted.
* Call message_handlers_clear() upon disconnectMichael Vetter2019-06-201-0/+8
| | | | Free pubsub_event_handlers. Fix memory leaks.
* Rework MUC reflected message filteringPaul Fariello2019-04-101-4/+14
| | | | | | | | | Reflected messages can't be filtered by nick only otherwise you might ignore messages comming from you on another devices. Consequently we maintain a list of sent messages id in mucwin. To be sure the id will be correctly reflected we use the origin-id stanza.
* Fix devicelist notification handlerPaul Fariello2019-04-101-2/+1
| | | | devicelist handler should be kept after trigger
* Ensure encrypted carbon of own message are marked as encryptedPaul Fariello2019-04-101-1/+1
|
* Add support for disconnect in OMEMOPaul Fariello2019-04-101-0/+1
|
* Log and print outgoing encrypted messagePaul Fariello2019-04-101-2/+5
|
* Add support for sending encrypted message in MUCPaul Fariello2019-04-101-4/+10
|
* Add MUC message decryptionPaul Fariello2019-04-101-3/+9
|
* Add store hints for OMEMO encrypted messagesPaul Fariello2019-04-101-0/+2
| | | | | | | | | Store hints are required has some server might discard messages without body. Here we ensure OMEMO messages are stored on server and delivered to client when they connect back. It's really important since it avoid libsignal to desynchronize counters.
* Add support for libsignal-protocol-c 2.3.2Paul Fariello2019-04-101-1/+1
|
* Remove hints preventing carbons to work properlyPaul Fariello2019-04-101-3/+0
|
* Don't explicitely disable carbons for OMEMO messagesPaul Fariello2019-04-101-1/+0
|
* Add support for encrypted carbonPaul Fariello2019-04-101-4/+14
| | | | Fix {signed,}_pre_key store
* Follow normal workflow for OMEMO message receptionPaul Fariello2019-04-101-116/+27
| | | | | | We try to decrypt all messages, if it's successful we use sv_ev_incoming_message even for OMEMO messages. We pass an OMEMO boolean to let UI be aware that message were encrypted.
* Add chat session state to OMEMO message stanzaPaul Fariello2019-04-101-0/+5
|
* Add default body on OMEMO messagePaul Fariello2019-04-101-0/+8
|
* Add OMEMO message encryption and decryptionPaul Fariello2019-04-101-1/+202
|
* Fix devicelist subscription and handle pubsub eventPaul Fariello2019-04-101-21/+14
| | | | Devicelist subscription can be done directly with caps_add feature.
* Add pubsub event callbackPaul Fariello2019-04-101-0/+60
| | | | Also add generic message callback struct
* XEP-0027: Mention XEP in message bodyMichael Vetter2019-02-201-1/+1
| | | | With all the different kinds of encryption (OMEMO, OTR3 OTR4, PGP in XEP-0027 and XEP-0373) it might be helpful to know which kind of encryption is used.
* Update copyright to include 2019Michael Vetter2019-01-221-1/+1
|
* Move ID generation to xmpp folderMichael Vetter2018-08-301-6/+6
| | | | | | | | | | | create_unique_id() was changed to use UUIDs instead of a counter in the last commit. Since now it depends on connection_create_uuid() which is in the xmpp subfolder the function should also be moved there. Renamed it to connection_create_stanza_id() and moved it to src/xmpp/connection.c. Discussion happened in https://github.com/boothj5/profanity/pull/1010
* Update copyrightJames Booth2018-01-211-1/+1
|
* Update CopyrightJames Booth2017-01-281-1/+1
|
* Check barejid in carbonsJames Booth2017-01-241-2/+1
|
* Add carbons from checkJames Booth2017-01-231-1/+8
|
* log_info on private carbonsJames Booth2016-08-281-0/+5
|
* Tidy _handle_carbonsJames Booth2016-08-201-35/+52
|
* Use libstrophe xmpp_message_get_body convenience functionJames Booth2016-08-201-49/+22
|
* Use libstrophe xmpp_message_new convenience functionJames Booth2016-08-201-4/+2
|
* Replace stanza_create_message with libstrophe convenience functionsJames Booth2016-08-201-8/+21
|
* Use libstrophe convenience functions for stanza attributesJames Booth2016-08-201-15/+15
|
* Send receipt request only when receiver supports featureJames Booth2016-08-181-46/+13
| | | | issue #829
* Tidy headersJames Booth2016-07-241-8/+9
|
* Update GPL link in headersJames Booth2016-07-241-1/+1
|
* Move connection fulljid functionJames Booth2016-05-061-1/+1
|
* Rename jabber_ functionsJames Booth2016-05-061-2/+3
|
* Renamed connection.c -> session.cJames Booth2016-05-051-1/+1
|
* Rename stanza handler init functionsJames Booth2016-05-021-1/+1
|
* Free stanza text and DiscoInfo featuresJames Booth2016-05-021-0/+2
|
* Free stanza text on plugin send hooksJames Booth2016-05-011-0/+1
|
* Define stanza's attributes as const char*Dmitry Podgorny2016-04-271-23/+23
| | | | | | | | | | | | In most get-like funcitons libstrophe returns pointer to a string that resides in an internal structure (e.g. xmpp_stanza_t). Hence, Profanity must not change such strings. Define respective variables as 'const char*' to reduce a chance of error and conform future libstrophe's interface. This patch mostly replaces 'char *' with 'const char*', but also fixes two memory leaks after stanza_get_reason(). Add comment within stanza_get_reason() to fix conflict with different allocator types.