Commit Graph

7320 Commits

Author SHA1 Message Date
akwizgran aa70900ed9 Fixed Eclipse classpath to export new Bouncy Castle jar. 2015-04-08 08:50:07 +01:00
akwizgran 18503af665 Updated Bouncy Castle source jar. 2015-04-08 08:44:15 +01:00
akwizgran 8f06880708 Upgraded Tor to 0.2.5.12 with libevent 2.0.22. 2015-04-07 23:01:06 +01:00
akwizgran 6e7578a0e0 Don't try to access Build.CPU_ABI2 on API version 7. 2015-04-07 19:11:59 +01:00
akwizgran f2d3e4cb81 Remove crash handler when handling first crash. Fixes bug #76. 2015-04-07 19:07:57 +01:00
akwizgran e4a79b8125 Bumped APK version to 0.8. 2015-04-05 16:42:23 +01:00
akwizgran 84596baddb Bumped expiry date to 1 May 2015. 2015-04-05 16:37:46 +01:00
akwizgran 56f24d462e Change target of gradle build to Android 5.1. 2015-04-04 12:19:46 +01:00
akwizgran b558218d48 Upgraded Bouncy Castle to 1.52. 2015-04-04 12:19:22 +01:00
akwizgran a1d2aaf10e Use JDK 1.7, target Android 5.1. 2015-04-03 20:56:01 +01:00
akwizgran 10924709d0 Use PIE Tor binary on API version 16+. 2015-03-23 11:03:00 +00:00
akwizgran 0be467f4f5 Updated Tor GeoIP database. 2015-03-23 11:01:27 +00:00
akwizgran b791ce02b6 Insert padding between password strength meter and progress spinner. 2015-03-23 11:00:54 +00:00
akwizgran a9489a519b Upgraded Tor to 0.2.5.11 with OpenSSL 1.0.2a. 2015-03-20 14:23:53 +00:00
akwizgran a5b1d92eae Log discovered devices to track down discovery bugs. 2015-03-11 10:24:53 +00:00
akwizgran afb6a185e3 Added Android Studio's local.properties to .gitignore. 2015-03-09 16:49:51 +00:00
akwizgran 4630137c94 Added Android Studio files to .gitignore. 2015-03-09 16:45:18 +00:00
akwizgran 37138d7a94 Updated Gradle and Android Gradle wrapper. 2015-03-09 16:11:10 +00:00
akwizgran 50f8712743 Bumped expiry date to 1 April 2015. 2015-03-05 16:18:23 +00:00
Alexander Løvik Stevenson 35212a49dc Bumped expiry date to 1 PAril 2015. 2015-03-05 14:05:24 +01:00
akwizgran 316e4c88fd Bumped expiry date to 1 March 2015. 2015-02-05 14:32:43 +00:00
akwizgran c026a07a43 Bump the version number, indicate that Bluetooth is required. 2015-01-31 19:06:21 +00:00
akwizgran 540a399b77 Moved patches to their own directory. 2015-01-30 19:27:14 +00:00
akwizgran c14697972a Upgraded Tor to 0.2.5.10 with OpenSSL 1.0.2. 2015-01-30 19:23:36 +00:00
akwizgran 4fcc3092ae Remove vuln.pub manifest, we're not getting any useful notifications. 2015-01-29 11:32:27 +00:00
akwizgran f8a4a4920d Merge branch 'AbrahamKiggundu/briar-master': better lock encapsulation 2015-01-29 11:28:48 +00:00
akwizgran 0dbfd7073f Comments to indicate which locks guard which variables. 2015-01-29 11:12:41 +00:00
akwizgran 47bd84122e Code formatting and small cleanups. 2015-01-28 21:18:31 +00:00
akwizgran 7fbad8dc26 Use FortunaGenerator to implement PseudoRandom. 2015-01-14 20:46:03 +00:00
akwizgran 1c7432cac4 Use a provider to instantiate AuthenticatedCipher. 2015-01-14 19:59:38 +00:00
akwizgran 6ff8f5ce69 Don't close the connection until both peers have finished. Bug #78. 2015-01-14 19:58:54 +00:00
akwizgran 03247aedd6 Log how long it takes to generate and verify signatures. 2015-01-14 19:09:37 +00:00
akwizgran 920c81199e Forgot to update some constants to reflect the new crypto primitives. 2015-01-14 16:38:15 +00:00
akwizgran 73d4f39726 Bumped expiry date to 1 February 2015. 2015-01-14 16:04:01 +00:00
akwizgran 112d80420c Downgrade to 256-bit curve for performance.
Also reduced hash function to 256 bits because our target security level
is now 128 bits.
2015-01-09 13:23:44 +00:00
akwizgran 5d46d3a4b4 AuthenticatedCipher interface isn't needed outside crypto package. 2015-01-09 13:06:44 +00:00
akwizgran dc5e37a96d Remove AAD from AuthenticatedCipher interface. 2015-01-09 13:01:02 +00:00
Abraham Kiggundu fcb983a651 Bug#49
https://sourceforge.net/p/briar/bugs/49/
Fixed by ensuring that the generated contact and group intents are uniquely identified
2015-01-08 11:58:44 +03:00
Abraham Kiggundu 851151041e Pull-Merge of latest changes from main repo 2015-01-08 11:54:47 +03:00
Abraham Kiggundu 686d5fd206 bug#49 Fixed by ensuring that intents for different contacts/groups can be distinguished from each other when resolving PendingIntent refs 2015-01-08 00:37:10 +03:00
Abraham Kiggundu 8d25840a1d Fixed bug calling notifyAll instead of signalAll 2015-01-07 00:47:27 +03:00
Abraham Kiggundu be2a92d6c2 Revert lock variable rename for clarity 2015-01-07 00:37:28 +03:00
Abraham Kiggundu 2933f1a874 Reverted inadvertent downgrade of gradle version 2015-01-07 00:23:32 +03:00
akwizgran 4e57029d98 Use constant-time GCM multiplier. 2015-01-06 19:30:11 +00:00
Abraham Kiggundu 2b9c469063 Merge branch 'improve-thread-encapsulation' into upstream 2015-01-06 07:15:11 +03:00
akwizgran ed79719bab Unit tests for StreamEncrypterImpl. 2015-01-05 18:55:17 +00:00
akwizgran 1f69f0d2f6 Variable-length frames (untested). 2015-01-05 17:35:45 +00:00
akwizgran d3bf2d59a1 Use the same maximum frame length for all transports. 2015-01-05 16:24:44 +00:00
Abraham Kiggundu 8b79d84029 Fix to travis android build tools version 2015-01-04 23:40:19 +03:00
akwizgran 358166bc12 Don't try to erase secrets from memory.
1. The things we're really trying to protect - contact identities,
message contents, etc - can't be erased from memory because they're
encapsulated inside objects we don't control.

2. Long-term secrets can't be protected by erasing them from memory
because they're stored in the database and the database key has to be
held in memory whenever the app's running.

3. If the runtime uses a compacting garbage collector then we have no
way to ensure an object is erased from memory.

4. Trying to erase secrets from memory makes the code more complex.

Conclusion: Let's not try to protect secrets from an attacker who can
read arbitrary memory locations.
2014-12-29 21:08:27 +00:00