Daniel Gultsch
eed2d93145
integrate intent integrator to finish activity when needed
2018-02-12 11:22:51 +01:00
Daniel Gultsch
617425e7ff
link jid in trust keys activity to contact details
2017-08-24 10:09:16 +02:00
Daniel Gultsch
e0fa820436
improved error messages on missing omemo keys
2017-08-21 14:08:20 +02:00
Daniel Gultsch
7c1e1132b0
make scan barcode icon survive rotations
2017-06-29 20:23:28 +02:00
Daniel Gultsch
b2aae44645
show scan button in TrustKeys only if there is something to scan
2017-06-29 14:01:12 +02:00
Daniel Gultsch
cbce73c301
fixed fingerprint trust (was messed up after library upgrade)
2017-06-25 18:18:13 +02:00
Daniel Gultsch
24768d051d
upgrade to signal-protocol-java. thanks @ysangkok
...
fixes #1384
closes #2509
2017-06-18 16:36:30 +02:00
Daniel Gultsch
87746ca2ba
remove own fetch errors from device announcement
2016-12-16 17:12:26 +01:00
Daniel Gultsch
84a2fa0041
allow fingerprint verification via context menu
2016-11-28 15:11:44 +01:00
Daniel Gultsch
20d3a41b52
explictly scan for aztec and qr codes only
2016-11-23 11:01:58 +01:00
Daniel Gultsch
839ef8e14b
introduced blind trust before verification mode
...
read more about the concept on https://gultsch.de/trust.html
2016-11-23 10:42:27 +01:00
Daniel Gultsch
d76b0a3104
offer verification directly from the trust keys screen
2016-11-22 12:03:21 +01:00
Daniel Gultsch
7e2e42cb11
parse omemo fingerprints from uris
2016-11-17 20:09:42 +01:00
Daniel Gultsch
48afeb571b
refactor omemo fingerprint UI code
2016-11-15 20:00:52 +01:00
Daniel Gultsch
05fc15be3d
refactore trust enum to be FingerprintStatus class with trust and active
2016-11-14 22:27:41 +01:00
Daniel Gultsch
fd246f7e5a
properly persist accepted crypto targets
2016-03-01 12:22:20 +01:00
Daniel Gultsch
198dc2c6b4
let users confirm each member in a conference even if that contact is already trusted
2016-03-01 11:26:59 +01:00
Daniel Gultsch
9e0466d1e6
refactored omemo to take multiple recipients
2016-02-29 13:18:07 +01:00
Daniel Gultsch
43521891f0
show fetch errors in trust keys activity
2016-01-23 11:39:02 +01:00
Daniel Gultsch
ba98fe4f86
use extract account from intent method and final EXTRA_ACCOUNT variable
2016-01-22 20:46:24 +01:00
Daniel Gultsch
14428da108
show key fetch error in activity when there are no keys to be used
2016-01-13 12:19:56 +01:00
Daniel Gultsch
f46cbb38a9
show certificate information
2015-12-23 19:18:53 +01:00
Daniel Gultsch
a83aae341f
improved error reporting in trust keys activity
2015-10-17 14:09:26 +02:00
Daniel Gultsch
cfeb67d71d
introduced code to verify omemo device keys with x509 certificates.
...
cleaned up TrustKeysActivity to automatically close if there is nothing to do
2015-10-16 23:48:42 +02:00
Andreas Straub
a95c451f1e
Only show that have sessions in fingerprint list
...
Doesn't access database directly anymore but goes through AxolotlService
now to obtain list of fingerprints associated with an Account/Contact.
This should prevent orphaned keys littering the UI which previously
couldn't be removed through the Clear Devices function.
Together with 1c79982da84964c1d81179a0927d9cd1eadf53de this fixes #1393
2015-09-06 15:15:57 +02:00
Andreas Straub
45d68c200e
Display error message if all contact keys purged
2015-08-15 18:52:47 +02:00
Daniel Gultsch
8b9b74ff7e
renamed multi-end / axolotl to OMEMO
2015-08-08 13:29:21 +02:00
Andreas Straub
34b22dea48
Improve TrustKeysActivity slider responsiveness
...
Slider used to skip back on drag-and-drop action. The switch doesn't
trigger explicit whole UI refreshes anymore, it now directly adjusts the
"done" button's locked status.
2015-08-05 22:24:13 +02:00
Andreas Straub
6cd9383e53
Let UNTRUSTED/UNDECIDED keys become INACTIVE
2015-08-01 18:30:11 +02:00
Andreas Straub
2b3bb02261
Highlight selected message's fingerprint in list
2015-07-29 20:21:37 +02:00
Andreas Straub
efcefc2e63
Refactor out inner classes, cache trust store
...
Moves SQLiteAxolotlStore and XmppAxolotlSession into proper classes.
IdentityKeys trust statuses are now cached in an LruCache to prevent
hammering the database when rendering the UI.
2015-07-29 02:59:26 +02:00
Andreas Straub
92b5081b5e
Add INACTIVE state for removed keys
...
We introduce a new trust state: INACTIVE. This state is intended for
old keys that have been removed.
When a TRUSTED device is removed from the PEP devicelist, it's status
will be set to INACTIVE. INACTIVE keys are shown in the UI as greyed
out, non-interactible key rows. Messages are not encrypted for INACTIVE
devices.
When an INACTIVE device reappears in PEP, or a message is received from
an INACTIVE device, it is set back to trusted.
2015-07-21 14:24:59 +02:00
Andreas Straub
8be0e8a27d
Start TrustKeysActivity if no keys are TRUSTED
...
If there are no UNDECIDED keys, but none of the contact's keys are
trusted, redirect the user to the TrustKeysActivity
2015-07-20 22:35:07 +02:00
Daniel Gultsch
504ef0b72e
rely on refreshUi/refreshUiReal and make sure it is being used everywhere
2015-07-20 15:48:58 +02:00
Andreas Straub
19a0ae42d6
Lock TrustKeys if no trusted keys are available
2015-07-20 14:56:41 +02:00
Andreas Straub
012f036840
Optimize imports
2015-07-20 14:26:29 +02:00
Andreas Straub
14010bf5a6
Ask for key trust when sending messages
...
If the contact (or the own account) has keys that have UNDECIDED trust,
we now drop the user into the new TrustKeysActivity, where they have to
decide for each new key whether it should be TRUSTED or UNTRUSTED.
2015-07-19 22:27:26 +02:00