Scott Nonnenberg
5369950c1d
Don't promote archived sessions, more logging on error
2020-12-09 14:05:11 -08:00
Evan Hahn
8bfaf598af
Add license headers across the project
2020-11-04 13:03:13 -06:00
Ken Powers
a90246cbe5
Passive UUID support
...
Co-authored-by: Scott Nonnenberg <scott@signal.org>
2020-03-24 16:59:35 -07:00
Scott Nonnenberg
0c09f9620f
Improve message download performance
2019-10-10 14:56:14 -07:00
Scott Nonnenberg
041fe4be05
Remove JSON column and Backbone Model for unprocessed
2019-02-13 16:04:58 -08:00
Scott Nonnenberg
9c540ab977
Add cache support to Signal Protocol Store
2019-02-13 16:04:58 -08:00
Scott Nonnenberg
11fdf22881
Change sessions.id to a TEXT field to prevent type coercion
2018-11-26 15:22:55 -08:00
Scott Nonnenberg
dbf0be2db5
eslintify all test files
2018-11-07 16:34:38 -08:00
Scott Nonnenberg
1755e0adfd
Move all remaining stores to SQLCipher
2018-10-31 17:36:51 -07:00
Scott Nonnenberg
7983300f4a
Use base64 strings for incoming message cache instead of binary
2018-08-10 13:13:25 -07:00
Scott Nonnenberg
cfe0bd0e79
Move to npm for several dependencies
...
mustache
jQuery
underscore
backbone
mocha
chai
intl-tel-input
2018-05-23 16:26:48 -07:00
Daniel Gasienica
1dd87ad197
Format all source code using Prettier
2018-04-30 16:53:34 -04:00
Scott Nonnenberg
a728c9efbf
Remove all mention of obsolete safety-number-approval setting
2018-03-14 14:42:15 -07:00
Scott Nonnenberg
ef3431af1b
isUntrusted: Return false if firstUse is true
...
Because users will see this upon first trying to communicate with a new
contact if they're quick about it.
FREEBIE
2017-08-04 12:03:25 -07:00
Scott Nonnenberg
bd0050b6c6
Cache messages on receipt, remove from cache when processed
...
FREEBIE
2017-08-04 12:03:25 -07:00
Scott Nonnenberg
91f50c028f
Unify processVerifiedMessage with Java implementation
...
This removes our support for the New Key/DEFAULT case, which iOS will
sync to us. Why? Because it ensures that in out of date scenarios, we
don't lose the higher-security state we were in previously.
FREEBIE
2017-08-04 12:03:25 -07:00
Scott Nonnenberg
c10e1b4ad0
Code coverage test run: Fix broken test
...
This test failed only under code coverage runs - because start up of the
page too took long!
FREEBIE
2017-08-04 12:03:25 -07:00
Scott Nonnenberg
f654532fa8
Handle UNVERIFIED sync verification messages (via contact sync)
...
FREEBIE
2017-08-04 12:03:25 -07:00
Scott Nonnenberg
20451cc827
Show verified/keychange notifications when actually relevant
...
FREEBIE
2017-08-04 12:03:25 -07:00
lilia
877f092b2c
Fix tests
...
saveIdentity now requires a full protocol address string
// FREEBIE
2017-08-04 12:03:25 -07:00
Scott Nonnenberg
0056cbefc1
processVerifiedMessage: Trigger keychange event when key differs
...
FREEBIE
2017-08-04 12:03:25 -07:00
lilia
5d5805526a
Fix a test
...
Set the timestamp on the record to current time to ensure that
nonblockingApproval will be required.
// FREEBIE
2017-08-04 12:03:25 -07:00
lilia
f15fadbb4d
Test processVerifiedMessage
2017-08-04 12:03:25 -07:00
lilia
044e1560e0
Test new setVerified behavior
...
// FREEBIE
2017-08-04 12:03:25 -07:00
lilia
33b4d398d6
Fix indentation
2017-08-04 12:03:25 -07:00
lilia
51080141cd
Update identity store tests
...
// FREEBIE
2017-08-04 12:03:25 -07:00
lilia
27692b4dfc
Normalize whitespace in storage tests
...
// FREEBIE
2017-08-04 12:03:25 -07:00
lilia
c6bfdec84d
Remove blockingApproval
...
// FREEBIE
2017-08-04 12:03:25 -07:00
lilia
1eec94dbb7
Update tests for saveIdentity
...
// FREEBIE
2017-08-04 12:03:25 -07:00
lilia
ba3a6efb12
Add tests for all the new isTrusted behaviors
...
// FREEBIE
2017-08-04 12:03:25 -07:00
lilia
2584f4fae4
Fix tests
...
// FREEBIE
2017-08-04 12:03:25 -07:00
lilia
82469713d2
Update saveIdentity
...
Add support new blockingApproval and nonblockingApproval arguments
Populate the firstUse property on identity key records
Return whether an existing record was overwritten.
References
https://github.com/WhisperSystems/Signal-Android/commit/39d4a7#diff-69ede72c549da6bcbcd959935995b7e9R45
// FREEBIE
2017-08-04 12:03:25 -07:00
lilia
16f3717824
Move refresh prekeys out of SignalProtocolStore
...
Use an event/listener instead
// FREEBIE
2017-05-23 11:08:23 -07:00
Scott Nonnenberg
3cfac58d78
Eliminate all console errors during test run
...
FREEBIE
2017-05-23 11:08:23 -07:00
lilia
f8e176fd40
Dedupe methods
...
Define textsecure.crypto in terms of libsignal.crypto.
// FREEBIE
2016-05-18 13:15:57 -07:00
lilia
148bd32671
Update libsignal-protocol v0.10.0
...
* Changes policy for old session deletion
* Renames putIdentityKey to saveIdentity
* Remove device messages
// FREEBIE
2016-05-18 11:11:11 -07:00
lilia
6589ec544a
Unnest before statements
...
// FREEBIE
2016-05-04 00:31:32 -07:00
lilia
348ee0b3e7
More descriptive tests
...
// FREEBIE
2016-05-04 00:30:42 -07:00
lilia
f173104c82
Tests for isTrustedIdentity
...
// FREEBIE
2016-05-04 00:25:01 -07:00
lilia
1d60dc38fb
Rename axolotl storage
...
// FREEBIE
2016-04-22 13:43:30 -07:00
lilia
b1d370755a
Rename AxolotlStore
...
// FREEBIE
2016-04-21 18:36:17 -07:00
lilia
1fe5d63015
Update protocol libs
...
Rename storage functions
// FREEBIE
2016-04-21 18:36:16 -07:00
lilia
173e037fa6
Fix minor style errors
...
And keep it that way, by making jscs config more opinionated.
// FREEBIE
2016-02-18 13:45:22 -08:00
lilia
80d32103d1
Clear session store when re-registering
...
When we re-register, our deviceId might change, which makes our sessions
are no longer valid since the recipient will see us as a new device.
Fixes #388
2015-11-04 13:52:47 -08:00
lilia
f764445c86
Remove erroneous license file and headers
...
We only use GPLV3 around here.
// FREEBIE
2015-09-07 14:58:42 -07:00
lilia
17e515f886
Add identity key conflict tests
2015-07-22 12:48:08 -07:00
lilia
029c9754f0
Fix tests
2015-05-15 11:39:23 -07:00
lilia
915612114b
Remove general get/put/remove methods from AxolotlStore
2015-05-06 18:14:32 -07:00
lilia
f413f03a6b
Add getDeviceIds to axolotlstore
...
And add tests for getDeviceIds and removeAllSessions
2015-05-05 17:44:58 -07:00
lilia
96eafc7750
Integrate libaxolotl async storage changes
...
* Session records are now opaque strings, so treat them that way:
- no more cross checking identity key and session records
- Move hasOpenSession to axolotl wrapper
- Remote registration ids must be fetched async'ly via protocol wrapper
* Implement async AxolotlStore using textsecure.storage
* Add some db stores and move prekeys and signed keys to indexeddb
* Add storage tests
* Rename identityKey storage key from libaxolotl25519KeyidentityKey to
simply identityKey, since it's no longer hardcoded in libaxolotl
* Rework registration and key-generation, keeping logic in libtextsecure
and rendering in options.js.
* Remove key_worker since workers are handled at the libaxolotl level
now
2015-05-05 17:44:55 -07:00