akwizgran
a9489a519b
Upgraded Tor to 0.2.5.11 with OpenSSL 1.0.2a.
2015-03-20 14:23:53 +00:00
akwizgran
a5b1d92eae
Log discovered devices to track down discovery bugs.
2015-03-11 10:24:53 +00:00
akwizgran
afb6a185e3
Added Android Studio's local.properties to .gitignore.
2015-03-09 16:49:51 +00:00
akwizgran
4630137c94
Added Android Studio files to .gitignore.
2015-03-09 16:45:18 +00:00
akwizgran
37138d7a94
Updated Gradle and Android Gradle wrapper.
2015-03-09 16:11:10 +00:00
akwizgran
50f8712743
Bumped expiry date to 1 April 2015.
2015-03-05 16:18:23 +00:00
Alexander Løvik Stevenson
35212a49dc
Bumped expiry date to 1 PAril 2015.
2015-03-05 14:05:24 +01:00
akwizgran
316e4c88fd
Bumped expiry date to 1 March 2015.
2015-02-05 14:32:43 +00:00
akwizgran
c026a07a43
Bump the version number, indicate that Bluetooth is required.
2015-01-31 19:06:21 +00:00
akwizgran
540a399b77
Moved patches to their own directory.
2015-01-30 19:27:14 +00:00
akwizgran
c14697972a
Upgraded Tor to 0.2.5.10 with OpenSSL 1.0.2.
2015-01-30 19:23:36 +00:00
akwizgran
4fcc3092ae
Remove vuln.pub manifest, we're not getting any useful notifications.
2015-01-29 11:32:27 +00:00
akwizgran
f8a4a4920d
Merge branch 'AbrahamKiggundu/briar-master': better lock encapsulation
2015-01-29 11:28:48 +00:00
akwizgran
0dbfd7073f
Comments to indicate which locks guard which variables.
2015-01-29 11:12:41 +00:00
akwizgran
47bd84122e
Code formatting and small cleanups.
2015-01-28 21:18:31 +00:00
akwizgran
7fbad8dc26
Use FortunaGenerator to implement PseudoRandom.
2015-01-14 20:46:03 +00:00
akwizgran
1c7432cac4
Use a provider to instantiate AuthenticatedCipher.
2015-01-14 19:59:38 +00:00
akwizgran
6ff8f5ce69
Don't close the connection until both peers have finished. Bug #78 .
2015-01-14 19:58:54 +00:00
akwizgran
03247aedd6
Log how long it takes to generate and verify signatures.
2015-01-14 19:09:37 +00:00
akwizgran
920c81199e
Forgot to update some constants to reflect the new crypto primitives.
2015-01-14 16:38:15 +00:00
akwizgran
73d4f39726
Bumped expiry date to 1 February 2015.
2015-01-14 16:04:01 +00:00
akwizgran
112d80420c
Downgrade to 256-bit curve for performance.
...
Also reduced hash function to 256 bits because our target security level
is now 128 bits.
2015-01-09 13:23:44 +00:00
akwizgran
5d46d3a4b4
AuthenticatedCipher interface isn't needed outside crypto package.
2015-01-09 13:06:44 +00:00
akwizgran
dc5e37a96d
Remove AAD from AuthenticatedCipher interface.
2015-01-09 13:01:02 +00:00
Abraham Kiggundu
fcb983a651
Bug#49
...
https://sourceforge.net/p/briar/bugs/49/
Fixed by ensuring that the generated contact and group intents are uniquely identified
2015-01-08 11:58:44 +03:00
Abraham Kiggundu
851151041e
Pull-Merge of latest changes from main repo
2015-01-08 11:54:47 +03:00
Abraham Kiggundu
686d5fd206
bug#49 Fixed by ensuring that intents for different contacts/groups can be distinguished from each other when resolving PendingIntent refs
2015-01-08 00:37:10 +03:00
Abraham Kiggundu
8d25840a1d
Fixed bug calling notifyAll instead of signalAll
2015-01-07 00:47:27 +03:00
Abraham Kiggundu
be2a92d6c2
Revert lock variable rename for clarity
2015-01-07 00:37:28 +03:00
Abraham Kiggundu
2933f1a874
Reverted inadvertent downgrade of gradle version
2015-01-07 00:23:32 +03:00
akwizgran
4e57029d98
Use constant-time GCM multiplier.
2015-01-06 19:30:11 +00:00
Abraham Kiggundu
2b9c469063
Merge branch 'improve-thread-encapsulation' into upstream
2015-01-06 07:15:11 +03:00
akwizgran
ed79719bab
Unit tests for StreamEncrypterImpl.
2015-01-05 18:55:17 +00:00
akwizgran
1f69f0d2f6
Variable-length frames (untested).
2015-01-05 17:35:45 +00:00
akwizgran
d3bf2d59a1
Use the same maximum frame length for all transports.
2015-01-05 16:24:44 +00:00
Abraham Kiggundu
8b79d84029
Fix to travis android build tools version
2015-01-04 23:40:19 +03:00
akwizgran
358166bc12
Don't try to erase secrets from memory.
...
1. The things we're really trying to protect - contact identities,
message contents, etc - can't be erased from memory because they're
encapsulated inside objects we don't control.
2. Long-term secrets can't be protected by erasing them from memory
because they're stored in the database and the database key has to be
held in memory whenever the app's running.
3. If the runtime uses a compacting garbage collector then we have no
way to ensure an object is erased from memory.
4. Trying to erase secrets from memory makes the code more complex.
Conclusion: Let's not try to protect secrets from an attacker who can
read arbitrary memory locations.
2014-12-29 21:08:27 +00:00
akwizgran
f316d64afa
Moved stream crypto to crypto component.
2014-12-29 19:55:05 +00:00
Abraham Kiggundu
9a2e93ebb9
cleanup
2014-12-26 17:35:37 +03:00
Abraham Kiggundu
b074978472
Improved encapsulation of thread synchronisation as follows
...
- replaced use of Object instance mutex with a private final Lock object
- replaced Object signaling with specific condition signalling
2014-12-26 16:40:46 +03:00
Abraham Kiggundu
276dcb1038
undo unnecessary changes to .project file and ignore eclipse metadata
2014-12-22 21:11:16 +03:00
akwizgran
02a485ace0
Improved description of Bluetooth setting. Bug #73 .
2014-12-17 08:34:44 +00:00
akwizgran
388b36b6be
Check periodically for retransmittable packets. Bug #46 .
2014-12-14 20:26:41 +00:00
akwizgran
29a6596ee3
Use the transport's idle timeout, not a hardcoded value.
2014-12-14 15:18:39 +00:00
akwizgran
d4fa656dbb
Application layer keepalives to detect dead TCP connections.
...
DuplexOutgoingSession flushes its output stream if it's idle for a
transport-defined interval, causing an empty frame to be sent. The TCP
and Tor plugins use a socket timeout equal to twice the idle interval to
detect dead connections.
See bugs #27 , #46 and #60 .
2014-12-13 12:00:40 +00:00
Abraham Kiggundu
0f8baf7726
Fix Travis Build
2014-12-08 11:10:57 +00:00
Abraham Kiggundu
b9436aaaa9
Fixed Travis build
2014-12-08 10:50:00 +00:00
Abraham Kiggundu
0bd0702059
Fixed Travis build status markdown
2014-12-08 10:29:39 +00:00
Abraham Kiggundu
9d0f871bcd
Fix travis build
2014-12-08 10:23:13 +00:00
Abraham Kiggundu
5c754f5c56
Fixed Travis Build
2014-12-08 10:20:25 +00:00