about summary refs log tree commit diff stats
path: root/src
Commit message (Collapse)AuthorAgeFilesLines
...
* Don't trust unknown identity keysPaul Fariello2019-04-104-55/+105
| | | | | Also add long terme storage of known identity keys. If a key is stored it means it is trusted.
* Add OMEMO status in build informationPaul Fariello2019-04-101-0/+6
|
* Add support for libsignal-protocol-c 2.3.2Paul Fariello2019-04-103-1/+26
|
* Add OMEMO fingerprint commandPaul Fariello2019-04-106-3/+90
|
* Add OMEMO session long term storagePaul Fariello2019-04-103-30/+95
|
* Replace used prekey in bundlePaul Fariello2019-04-101-1/+16
|
* Start new session upon prekey receptionPaul Fariello2019-04-101-0/+1
|
* Randomly choose a prekey on session buildPaul Fariello2019-04-103-28/+50
|
* Add OMEMO commands autocompletionPaul Fariello2019-04-102-1/+32
|
* Enable start of OMEMO in existing chat winPaul Fariello2019-04-101-0/+30
|
* Check received gcm tagPaul Fariello2019-04-103-7/+18
|
* Follow xep by putting gcm tag on encrypted keyPaul Fariello2019-04-103-13/+23
|
* Get rid of libsodiumPaul Fariello2019-04-104-34/+73
|
* Remove hints preventing carbons to work properlyPaul Fariello2019-04-101-3/+0
|
* Add log on OMEMO session startPaul Fariello2019-04-101-0/+2
|
* Use profanity logs for OMEMO logsPaul Fariello2019-04-101-1/+15
|
* Don't explicitely disable carbons for OMEMO messagesPaul Fariello2019-04-101-1/+0
|
* Add support for encrypted carbonPaul Fariello2019-04-107-43/+326
| | | | Fix {signed,}_pre_key store
* Handle requested device list for session startPaul Fariello2019-04-101-7/+41
|
* Add OMEMO identity materials long term storagePaul Fariello2019-04-105-4/+109
|
* Follow normal workflow for OMEMO message receptionPaul Fariello2019-04-106-119/+110
| | | | | | We try to decrypt all messages, if it's successful we use sv_ev_incoming_message even for OMEMO messages. We pass an OMEMO boolean to let UI be aware that message were encrypted.
* Add chat session state to OMEMO message stanzaPaul Fariello2019-04-101-0/+5
|
* Add default body on OMEMO messagePaul Fariello2019-04-101-0/+8
|
* Add OMEMO message encryption and decryptionPaul Fariello2019-04-1017-34/+672
|
* Create signal sessionPaul Fariello2019-04-103-6/+65
|
* Add signal store backend and OMEMO start commandPaul Fariello2019-04-1011-6/+543
|
* Request for device list when OMEMO is readyPaul Fariello2019-04-105-10/+52
|
* Ensure received devicelist contains our own device idPaul Fariello2019-04-102-3/+12
|
* Fix devicelist subscription and handle pubsub eventPaul Fariello2019-04-109-44/+106
| | | | Devicelist subscription can be done directly with caps_add feature.
* Ensure not to generate omemo crypto twicePaul Fariello2019-04-101-1/+6
|
* Ensure OMEMO isn't started before starting OTRPaul Fariello2019-04-101-0/+5
|
* Add pubsub event callbackPaul Fariello2019-04-103-0/+65
| | | | Also add generic message callback struct
* Rename ProfIdCallback into ProfIqCallbackPaul Fariello2019-04-103-17/+17
| | | | Goal is to create other kind of callback no based on id cmp
* Add devicelist and bundle publicationPaul Fariello2019-04-107-25/+323
|
* Add devicelist subscriptionPaul Fariello2019-04-105-0/+50
|
* Move OMEMO initialization to profanity intializationPaul Fariello2019-04-108-17/+45
| | | | Also store identity keys into account
* Add signal-protocol lockingPaul Fariello2019-04-082-4/+36
|
* Add crypto backend for signal-protocolPaul Fariello2019-04-084-2/+307
|
* Link against libsignal-protocol-cPaul Fariello2019-04-084-1/+54
|
* Avoid use after free on default accountPaul Fariello2019-04-081-1/+2
| | | | Fix 1046
* Fix use after free bugDavid Baer2019-03-221-5/+5
|
* Fix /me display when highlighting user in MUCsMichael Vetter2019-02-261-8/+14
| | | | | Fixes https://github.com/boothj5/profanity/issues/950 Closes https://github.com/boothj5/profanity/pull/992
* Fix broken support for case-sensitive account namesPhilip Flohr2019-02-221-5/+3
| | | | | | | | | | | Don't lower account name before calling accounts_get_account(). Only lower if there is no account with the given name and the name is interpreted as a jid. Updated unittests to test this behaviour. Fixes #725 .
* Redraw screen after entry of PGP secret keyMichael Vetter2019-02-201-0/+10
| | | | | | | | | | | | | | | | | | | | | | After specifying the PGP key ID with pgp.keyid within the accounts file on startup profanity asks for the secret key passphrase. It then doesn't redraw the screen, leaving it in an odd looking state. This probably only happens with pinentry-curses since it draws in screen. We need this fix for cli only environments. Fixes https://github.com/boothj5/profanity/issues/906 reported by Bob Mottram. Based on https://github.com/boothj5/profanity/pull/908 by Bob Mottram Bob removed his GitHub account, so GitHub created a ghost placeholder user for him, which unfortunately makes it impossible to cherry-pick this commit. To more or less preserve authorship I added him as co-author. Commit picked and message edited by jubalh. Co-authored-by: Bob Mottram <bob@freedombone.net>
* Restoration of correct GPG encryptionViachaslau Khalikin2019-02-201-1/+1
| | | | | | | | Fixes https://github.com/boothj5/profanity/issues/997 Proposed as https://github.com/boothj5/profanity/pull/1008 Related to XEP-0027. Message edited and commit cherry picked by jubalh.
* XEP-0027: Mention XEP in message bodyMichael Vetter2019-02-201-1/+1
| | | | With all the different kinds of encryption (OMEMO, OTR3 OTR4, PGP in XEP-0027 and XEP-0373) it might be helpful to know which kind of encryption is used.
* Merge pull request #994 from philipflohr/masterMichael Vetter2019-02-201-1/+2
|\ | | | | Fail plugin unloading if plugin does not exist
| * Fail plugin unload operation if plugin does not existPhilip Flohr2019-02-201-1/+2
| |
* | Merge pull request #995 from philipflohr/plugins_unload_allMichael Vetter2019-02-201-3/+3
|\ \ | | | | | | let plugins_unload_all fail if one plugin unload operation fails
| * | plugins_unload_all fails if one plugin unload operation failsPhilip Flohr2018-04-211-3/+3
| |/