Commit graph

6424 commits

Author SHA1 Message Date
Daniel Gultsch cce5a7b39f parse jid from CN in client certs if nothing else is available 2017-08-07 16:02:48 +02:00
Daniel Gultsch 4a43df8c97 do not crash on some very rare logging 2017-08-07 15:55:56 +02:00
Daniel Gultsch ed4a190793 Merge branch 'master' of github.com:siacs/Conversations 2017-08-05 19:53:36 +02:00
Daniel Gultsch 719102d02f change bounty source badge to open bounties 2017-08-05 19:52:17 +02:00
Daniel Gultsch c3926a9ef8 Merge pull request #2483 from uchchishta/patch-1
add badges in README.md & align center
2017-08-05 19:51:01 +02:00
Daniel Gultsch 1ab391931d some code cleanup. and avoid scheduling reconnect task for negative interval 2017-08-05 19:13:29 +02:00
Daniel Gultsch 490115d20e do not run file observer on hidden directories 2017-08-05 19:12:44 +02:00
Daniel Gultsch 911e392006 update mini dns 2017-08-05 15:17:10 +02:00
Daniel Gultsch b925f436fd add more logging to http download connection and reset file params after setting expected size 2017-08-04 11:58:12 +02:00
Daniel Gultsch 5cee46cda5 version bump to 1.12.0-beta + changelog (untagged/unreleased) 2017-08-03 14:21:48 +02:00
Daniel Gultsch 014643b9c4 pulled translations from transifex 2017-08-03 14:21:22 +02:00
Daniel Gultsch c3cbb21133 cache some information generated from body like isEmojiOnly, fileParams and isGeoUri 2017-08-03 13:24:41 +02:00
Daniel Gultsch 7bcf173866 remove all whitespaces in emoji only messages 2017-08-03 10:55:14 +02:00
Daniel Gultsch 225cca4566 provide extra 'network is unreachable' account state 2017-08-02 18:58:51 +02:00
Daniel Gultsch 4ff3c36ed9 updated build tools and some library versions 2017-08-02 17:42:21 +02:00
Daniel Gultsch 768eadde36 use random string generator instead of BigInteger in DigestMd5 2017-08-01 12:27:26 +02:00
Daniel Gultsch 82c5924434 display messages that only contain emoji slightly larger 2017-07-30 22:04:58 +02:00
Daniel Gultsch e11277c70f use base64 instead of base36 when creating random strings 2017-07-30 11:39:47 +02:00
Daniel Gultsch 01b207d44d avoid empty strings when figuring out display name 2017-07-30 11:39:16 +02:00
Daniel Gultsch d3194172c5 update dependencies 2017-07-29 13:50:59 +02:00
Daniel Gultsch f5da4791ad avoid unnecessary roster sync in OMEMO code. fixed startup performance regression 2017-07-29 13:50:32 +02:00
Daniel Gultsch 837c212931 refresh omemo activity after failing to fetch keys due to lack of ids 2017-07-28 18:37:07 +02:00
Daniel Gultsch ad601e47c8 fixed roster items w/o subscription (request) not being shown 2017-07-28 18:34:55 +02:00
Daniel Gultsch ea6289c02e pulled translations from transifex 2017-07-26 13:23:40 +02:00
Daniel Gultsch d6e51288c3 Merge pull request #2564 from yushijinhun/fix-decryption-blocked
Give up PGP decryption when intent is cancelled
2017-07-25 09:20:51 +02:00
yushijinhun 48147b7fd1
Give up PGP decryption when intent is cancelled
When receiving a PGP message which is not encrypted with YOUR key,
OpenKeychain shows a dialog, which tells you the private key to decrypt
the message is unavailable. However, Conversations won't give up
decrypting the message. So whether the subsequent messages are
decryptable or not, the decryption is blocked at the current message.
The commit fixes the bug in this way: Give up the current message when
the decryption intent is cancelled, so that subsequent messages can be
handled.
2017-07-25 15:09:18 +08:00
Daniel Gultsch 432598f896 Merge branch 'bugfixes' 2017-07-23 07:53:09 +02:00
Daniel Gultsch 7ac26952d7 version bump to 1.19.5 + changelog 2017-07-23 07:51:13 +02:00
Daniel Gultsch c8bd5bc1f5 made OF selfSigned() workaround only available >=kitkat
this undos 8a729061d5. as it turns out 4.1
and 4.0 only break when checking if a cert is self signed.
2017-07-23 07:47:39 +02:00
Daniel Gultsch 2fc216bfc4 skip initial socket closing if thread was already interrupted 2017-07-21 08:30:16 +02:00
Daniel Gultsch 74cde1d60a incorporate support for publish-options into server info 2017-07-18 12:51:15 +02:00
Daniel Gultsch 85dc0c284d made omemo always available but in public mucs 2017-07-18 12:51:15 +02:00
Daniel Gultsch 002dbf2e17 enable all encryption options 2017-07-18 12:51:15 +02:00
Daniel Gultsch da87eac48e provide upgrade path for accounts with publish-options 2017-07-18 12:51:15 +02:00
Daniel Gultsch 9a57673130 use publish-options instead of always pushing node configuration 2017-07-18 12:51:15 +02:00
Daniel Gultsch 8d6b2074cb let hasPendingFetches() return true when fetching device ids 2017-07-18 12:51:15 +02:00
Daniel Gultsch 7a2856ac86 fetch required device ids on demand 2017-07-18 12:51:15 +02:00
Daniel Gultsch f7258d16e1 explicitly fetch device ids before building sessions in single mode conversation 2017-07-18 12:51:15 +02:00
Daniel Gultsch 25e993693f change access model of omemo pep nodes after every publish 2017-07-18 12:51:15 +02:00
Daniel Gultsch 6c95897f09 fetch device ids for muc members w/o known devices 2017-07-18 12:51:15 +02:00
Daniel Gultsch 2a198793b1 fixed otr jingle file size reporting 2017-07-18 12:43:53 +02:00
Daniel Gultsch 58f3787795 increment version code for 1.19.4 2017-07-17 23:14:02 +02:00
Daniel Gultsch 8a729061d5 use CN-workaround for pre-kitkat 2017-07-17 23:13:55 +02:00
Daniel Gultsch 8285a4fe1c pulled translations from transifex 2017-07-17 22:06:56 +02:00
Daniel Gultsch 217335703c fix regression introduces with OF fix. properly fall back to common name 2017-07-17 21:11:15 +02:00
Daniel Gultsch 0a20b87ebe check length first in timestamp parser 2017-07-16 21:03:59 +02:00
Daniel Gultsch febee9863f catch IllegalArgumentException caused by invalid custom hostname 2017-07-16 21:02:56 +02:00
Daniel Gultsch 2dce71cd96 version bump to 1.19.4 + changelog 2017-07-16 11:38:17 +02:00
Daniel Gultsch 8afe7efc2c workaround for OpenFire: check CN first in self signed certs
The self signed certificates created by OpenFire (Not sure if other
certs are affected as well) will crash the Java/Android TLS stack when
accessing getSubjectAlternativeNames() on the the peer certificate.

This usually goes unnoticed in other applications since the
DefaultHostnameVerifier checkes the CN first. That however is a
violation of RFC6125 section 6.4.4 which requires us to check for the
existence of SAN first.

This commit adds a work around where in self signed certificates we
check for the CN first as well. (Avoiding the call to
getSubjectAlternativeNames())
2017-07-16 11:05:25 +02:00
Daniel Gultsch dfa17d1339 more migration fixes for updating from 1.6.0 to 1.19.3 2017-07-14 10:34:01 +02:00