about summary refs log tree commit diff stats
path: root/src
Commit message (Collapse)AuthorAgeFilesLines
* Remove hints preventing carbons to work properlyPaul Fariello2019-04-101-3/+0
|
* Add log on OMEMO session startPaul Fariello2019-04-101-0/+2
|
* Use profanity logs for OMEMO logsPaul Fariello2019-04-101-1/+15
|
* Don't explicitely disable carbons for OMEMO messagesPaul Fariello2019-04-101-1/+0
|
* Add support for encrypted carbonPaul Fariello2019-04-107-43/+326
| | | | Fix {signed,}_pre_key store
* Handle requested device list for session startPaul Fariello2019-04-101-7/+41
|
* Add OMEMO identity materials long term storagePaul Fariello2019-04-105-4/+109
|
* Follow normal workflow for OMEMO message receptionPaul Fariello2019-04-106-119/+110
| | | | | | We try to decrypt all messages, if it's successful we use sv_ev_incoming_message even for OMEMO messages. We pass an OMEMO boolean to let UI be aware that message were encrypted.
* Add chat session state to OMEMO message stanzaPaul Fariello2019-04-101-0/+5
|
* Add default body on OMEMO messagePaul Fariello2019-04-101-0/+8
|
* Add OMEMO message encryption and decryptionPaul Fariello2019-04-1017-34/+672
|
* Create signal sessionPaul Fariello2019-04-103-6/+65
|
* Add signal store backend and OMEMO start commandPaul Fariello2019-04-1011-6/+543
|
* Request for device list when OMEMO is readyPaul Fariello2019-04-105-10/+52
|
* Ensure received devicelist contains our own device idPaul Fariello2019-04-102-3/+12
|
* Fix devicelist subscription and handle pubsub eventPaul Fariello2019-04-109-44/+106
| | | | Devicelist subscription can be done directly with caps_add feature.
* Ensure not to generate omemo crypto twicePaul Fariello2019-04-101-1/+6
|
* Ensure OMEMO isn't started before starting OTRPaul Fariello2019-04-101-0/+5
|
* Add pubsub event callbackPaul Fariello2019-04-103-0/+65
| | | | Also add generic message callback struct
* Rename ProfIdCallback into ProfIqCallbackPaul Fariello2019-04-103-17/+17
| | | | Goal is to create other kind of callback no based on id cmp
* Add devicelist and bundle publicationPaul Fariello2019-04-107-25/+323
|
* Add devicelist subscriptionPaul Fariello2019-04-105-0/+50
|
* Move OMEMO initialization to profanity intializationPaul Fariello2019-04-108-17/+45
| | | | Also store identity keys into account
* Add signal-protocol lockingPaul Fariello2019-04-082-4/+36
|
* Add crypto backend for signal-protocolPaul Fariello2019-04-084-2/+307
|
* Link against libsignal-protocol-cPaul Fariello2019-04-084-1/+54
|
* Avoid use after free on default accountPaul Fariello2019-04-081-1/+2
| | | | Fix 1046
* Fix use after free bugDavid Baer2019-03-221-5/+5
|
* Fix /me display when highlighting user in MUCsMichael Vetter2019-02-261-8/+14
| | | | | Fixes https://github.com/boothj5/profanity/issues/950 Closes https://github.com/boothj5/profanity/pull/992
* Fix broken support for case-sensitive account namesPhilip Flohr2019-02-221-5/+3
| | | | | | | | | | | Don't lower account name before calling accounts_get_account(). Only lower if there is no account with the given name and the name is interpreted as a jid. Updated unittests to test this behaviour. Fixes #725 .
* Redraw screen after entry of PGP secret keyMichael Vetter2019-02-201-0/+10
| | | | | | | | | | | | | | | | | | | | | | After specifying the PGP key ID with pgp.keyid within the accounts file on startup profanity asks for the secret key passphrase. It then doesn't redraw the screen, leaving it in an odd looking state. This probably only happens with pinentry-curses since it draws in screen. We need this fix for cli only environments. Fixes https://github.com/boothj5/profanity/issues/906 reported by Bob Mottram. Based on https://github.com/boothj5/profanity/pull/908 by Bob Mottram Bob removed his GitHub account, so GitHub created a ghost placeholder user for him, which unfortunately makes it impossible to cherry-pick this commit. To more or less preserve authorship I added him as co-author. Commit picked and message edited by jubalh. Co-authored-by: Bob Mottram <bob@freedombone.net>
* Restoration of correct GPG encryptionViachaslau Khalikin2019-02-201-1/+1
| | | | | | | | Fixes https://github.com/boothj5/profanity/issues/997 Proposed as https://github.com/boothj5/profanity/pull/1008 Related to XEP-0027. Message edited and commit cherry picked by jubalh.
* XEP-0027: Mention XEP in message bodyMichael Vetter2019-02-201-1/+1
| | | | With all the different kinds of encryption (OMEMO, OTR3 OTR4, PGP in XEP-0027 and XEP-0373) it might be helpful to know which kind of encryption is used.
* Merge pull request #994 from philipflohr/masterMichael Vetter2019-02-201-1/+2
|\ | | | | Fail plugin unloading if plugin does not exist
| * Fail plugin unload operation if plugin does not existPhilip Flohr2019-02-201-1/+2
| |
* | Merge pull request #995 from philipflohr/plugins_unload_allMichael Vetter2019-02-201-3/+3
|\ \ | | | | | | let plugins_unload_all fail if one plugin unload operation fails
| * | plugins_unload_all fails if one plugin unload operation failsPhilip Flohr2018-04-211-3/+3
| |/
* | Fix autoaway typoMichael Vetter2019-02-191-1/+1
| |
* | Update copyright to include 2019Michael Vetter2019-01-22137-137/+137
| |
* | Fix optionnal sessionid in xep 0050Paul Fariello2019-01-212-2/+9
| |
* | Add prof_win_close (#1017)twardziejszy2019-01-101-0/+11
| |
* | Merge branch 'nick'Michael Vetter2018-11-221-1/+1
|\ \ | | | | | | | | | See https://github.com/boothj5/profanity/pull/1023
| * | Nicks containig spaces need to be quotedRaf Czlonka2018-11-221-1/+1
| | | | | | | | | | | | For example "FirstName LastName", need to be quoted.
* | | Splash logo improvements (#1022)Raf Czlonka2018-11-211-7/+7
|/ / | | | | | | | | * Splash logo improvements * Use straight/flat, instead or rounded, outer edges on `o` and `a`
* | Override account options with connect optionsDmitry Podgorny2018-11-073-0/+28
| | | | | | | | | | | | | | | | | | | | | | | | With this feature user can configure TLS policy for an account and override it for a single login with /connect command. Example: /account set <jid> tls force /connect <jid> tls trust The example shows how to trust server's certificate only once. Fixes #1021.
* | Add option to trust server's certificateDmitry Podgorny2018-11-065-2/+11
| | | | | | | | | | | | | | | | | | | | | | New tls policy "trust" added to /connect and /account. With the policy TLS connection is established even with invalid certificate. Note, that trust policy forces TLS connection and it fails when server doesn't support TLS. Examples: /connect <jid> tls trust /account <name> set tls trust
* | Merge pull request #991 from paulfariello/feature/xep-0050Michael Vetter2018-09-2724-167/+670
|\ \ | | | | | | Add support for xep 0050 ad-hoc commands, without multi-step
| * | Make _get_groups_from_item and roster _compare_* publicPaul Fariello2018-09-265-31/+19
| | | | | | | | | | | | In order to avoid duplication with xep 0133 support in command execution
| * | Add special handling for xep-0133 get-user-rosterPaul Fariello2018-09-101-3/+42
| | |
| * | Don't show submit help on form if there is no submit callbackPaul Fariello2018-09-101-1/+3
| | | | | | | | | | | | Could be missleading for user.