about summary refs log tree commit diff stats
path: root/src/xmpp
Commit message (Collapse)AuthorAgeFilesLines
* Add store hints for OMEMO encrypted messagesPaul Fariello2019-04-103-0/+15
| | | | | | | | | Store hints are required has some server might discard messages without body. Here we ensure OMEMO messages are stored on server and delivered to client when they connect back. It's really important since it avoid libsignal to desynchronize counters.
* Add support for libsignal-protocol-c 2.3.2Paul Fariello2019-04-101-1/+1
|
* Randomly choose a prekey on session buildPaul Fariello2019-04-101-19/+22
|
* Remove hints preventing carbons to work properlyPaul Fariello2019-04-101-3/+0
|
* Don't explicitely disable carbons for OMEMO messagesPaul Fariello2019-04-101-1/+0
|
* Add support for encrypted carbonPaul Fariello2019-04-102-5/+15
| | | | Fix {signed,}_pre_key store
* Follow normal workflow for OMEMO message receptionPaul Fariello2019-04-103-116/+107
| | | | | | We try to decrypt all messages, if it's successful we use sv_ev_incoming_message even for OMEMO messages. We pass an OMEMO boolean to let UI be aware that message were encrypted.
* Add chat session state to OMEMO message stanzaPaul Fariello2019-04-101-0/+5
|
* Add default body on OMEMO messagePaul Fariello2019-04-101-0/+8
|
* Add OMEMO message encryption and decryptionPaul Fariello2019-04-103-3/+205
|
* Create signal sessionPaul Fariello2019-04-101-3/+47
|
* Add signal store backend and OMEMO start commandPaul Fariello2019-04-104-1/+104
|
* Request for device list when OMEMO is readyPaul Fariello2019-04-104-3/+49
|
* Fix devicelist subscription and handle pubsub eventPaul Fariello2019-04-107-33/+81
| | | | Devicelist subscription can be done directly with caps_add feature.
* Add pubsub event callbackPaul Fariello2019-04-103-0/+65
| | | | Also add generic message callback struct
* Rename ProfIdCallback into ProfIqCallbackPaul Fariello2019-04-103-17/+17
| | | | Goal is to create other kind of callback no based on id cmp
* Add devicelist and bundle publicationPaul Fariello2019-04-105-6/+198
|
* Add devicelist subscriptionPaul Fariello2019-04-105-0/+50
|
* XEP-0027: Mention XEP in message bodyMichael Vetter2019-02-201-1/+1
| | | | With all the different kinds of encryption (OMEMO, OTR3 OTR4, PGP in XEP-0027 and XEP-0373) it might be helpful to know which kind of encryption is used.
* Update copyright to include 2019Michael Vetter2019-01-2237-37/+37
|
* Fix optionnal sessionid in xep 0050Paul Fariello2019-01-212-2/+9
|
* Add option to trust server's certificateDmitry Podgorny2018-11-061-0/+3
| | | | | | | | | | | New tls policy "trust" added to /connect and /account. With the policy TLS connection is established even with invalid certificate. Note, that trust policy forces TLS connection and it fails when server doesn't support TLS. Examples: /connect <jid> tls trust /account <name> set tls trust
* Merge pull request #991 from paulfariello/feature/xep-0050Michael Vetter2018-09-278-32/+327
|\ | | | | Add support for xep 0050 ad-hoc commands, without multi-step
| * Make _get_groups_from_item and roster _compare_* publicPaul Fariello2018-09-265-31/+19
| | | | | | | | In order to avoid duplication with xep 0133 support in command execution
| * Add special handling for xep-0133 get-user-rosterPaul Fariello2018-09-101-3/+42
| |
| * Add support for ad-hoc response with formsPaul Fariello2018-09-101-0/+6
| |
| * Add missing command name for completion logPaul Fariello2018-09-101-1/+1
| |
| * Allow to use cmd without being in a windowPaul Fariello2018-09-051-2/+4
| |
| * Add support for command config executionPaul Fariello2018-09-053-3/+67
| |
| * Add conf win callbackPaul Fariello2018-09-052-31/+41
| |
| * Rename mucconf wins into conf winsPaul Fariello2018-09-051-4/+4
| | | | | | | | Configuration windows are now being used by both muc and cmd.
| * Add support for form edition in command executionPaul Fariello2018-09-051-7/+24
| | | | | | | | Also change wins_get_by_string prototype in order to handle const str.
| * Add command exec error handlingPaul Fariello2018-09-051-1/+1
| |
| * Handle simple executionPaul Fariello2018-09-053-2/+50
| | | | | | | | Tested with ping from biboumi
| * Add command subcommands: list and execPaul Fariello2018-09-054-14/+85
| | | | | | | | Also handle list result
| * Add command commandPaul Fariello2018-09-054-0/+50
| | | | | | | | Initial commit to test commands API
* | Move p_sha1_hash() to stanza.cMichael Vetter2018-09-061-1/+18
|/ | | | | | | | | | | | Move `p_sha1_hash()` from `common.c` to `xmpp/stanza.c` as it is only used in this file and now depends on libstrophe so xmpp is a better namespace folder. Renaming it as `_stanza_create_sha1_hash()`. And making static since only used here. The function cannot be tested in the unit tests anymore. Once functional tests are working again we should write a test for the sha1 functionality.
* Move ID generation to xmpp folderMichael Vetter2018-08-309-45/+68
| | | | | | | | | | | create_unique_id() was changed to use UUIDs instead of a counter in the last commit. Since now it depends on connection_create_uuid() which is in the xmpp subfolder the function should also be moved there. Renamed it to connection_create_stanza_id() and moved it to src/xmpp/connection.c. Discussion happened in https://github.com/boothj5/profanity/pull/1010
* Use correct macroDominik Heidler2018-07-301-2/+2
| | | | XMPP_FEATURE_PING insted of STANZA_NS_PING
* Fix muc nick autocomplete colon mid messageJames Booth2018-02-091-33/+37
|
* Add /rooms service autocompletionJames Booth2018-02-053-0/+44
|
* Clear rooms cache on disconnectJames Booth2018-02-051-0/+2
|
* Add /rooms cacheJames Booth2018-02-052-1/+26
|
* Filter rooms by simple case insensitive textJames Booth2018-02-041-8/+35
|
* Include filter string in no rooms messageJames Booth2018-01-281-2/+2
|
* Fix tests, move glob creationJames Booth2018-01-272-7/+12
|
* Allow filtering rooms list by globJames Booth2018-01-272-8/+70
|
* Update copyrightJames Booth2018-01-2137-37/+37
|
* Legacy SSL supportDmitry Podgorny2017-06-241-0/+2
| | | | | | | | | | | | | | | | Add "legacy" tls policy to /account and /connect commands. When this policy is specified the connection is connected with XMPP_CONN_LEGACY_SSL flag. Notice, legacy SSL and STARTTLS are not compatible and user has to know when exactly the new policy should be used. To enable it, run one of the next commands: /connect <jid> tls legacy [server <host>] /account <name> set tls legacy Notice, there is no SRV record for legacy SSL. Therefore, you may need "server" property to connect successfully. Refer to configuration provided by your server.
* Merge remote-tracking branch 'asdil12/ping'James Booth2017-06-171-0/+9
|\