Commit Graph

2519 Commits

Author SHA1 Message Date
akwizgran
18503af665 Updated Bouncy Castle source jar. 2015-04-08 08:44:15 +01:00
akwizgran
8f06880708 Upgraded Tor to 0.2.5.12 with libevent 2.0.22. 2015-04-07 23:01:06 +01:00
akwizgran
6e7578a0e0 Don't try to access Build.CPU_ABI2 on API version 7. 2015-04-07 19:11:59 +01:00
akwizgran
f2d3e4cb81 Remove crash handler when handling first crash. Fixes bug #76. 2015-04-07 19:07:57 +01:00
akwizgran
e4a79b8125 Bumped APK version to 0.8. 2015-04-05 16:42:23 +01:00
akwizgran
84596baddb Bumped expiry date to 1 May 2015. 2015-04-05 16:37:46 +01:00
akwizgran
56f24d462e Change target of gradle build to Android 5.1. 2015-04-04 12:19:46 +01:00
akwizgran
b558218d48 Upgraded Bouncy Castle to 1.52. 2015-04-04 12:19:22 +01:00
akwizgran
a1d2aaf10e Use JDK 1.7, target Android 5.1. 2015-04-03 20:56:01 +01:00
akwizgran
10924709d0 Use PIE Tor binary on API version 16+. 2015-03-23 11:03:00 +00:00
akwizgran
0be467f4f5 Updated Tor GeoIP database. 2015-03-23 11:01:27 +00:00
akwizgran
b791ce02b6 Insert padding between password strength meter and progress spinner. 2015-03-23 11:00:54 +00:00
akwizgran
a9489a519b Upgraded Tor to 0.2.5.11 with OpenSSL 1.0.2a. 2015-03-20 14:23:53 +00:00
akwizgran
a5b1d92eae Log discovered devices to track down discovery bugs. 2015-03-11 10:24:53 +00:00
akwizgran
afb6a185e3 Added Android Studio's local.properties to .gitignore. 2015-03-09 16:49:51 +00:00
akwizgran
4630137c94 Added Android Studio files to .gitignore. 2015-03-09 16:45:18 +00:00
akwizgran
37138d7a94 Updated Gradle and Android Gradle wrapper. 2015-03-09 16:11:10 +00:00
akwizgran
50f8712743 Bumped expiry date to 1 April 2015. 2015-03-05 16:18:23 +00:00
Alexander Løvik Stevenson
35212a49dc Bumped expiry date to 1 PAril 2015. 2015-03-05 14:05:24 +01:00
akwizgran
316e4c88fd Bumped expiry date to 1 March 2015. 2015-02-05 14:32:43 +00:00
akwizgran
c026a07a43 Bump the version number, indicate that Bluetooth is required. 2015-01-31 19:06:21 +00:00
akwizgran
540a399b77 Moved patches to their own directory. 2015-01-30 19:27:14 +00:00
akwizgran
c14697972a Upgraded Tor to 0.2.5.10 with OpenSSL 1.0.2. 2015-01-30 19:23:36 +00:00
akwizgran
4fcc3092ae Remove vuln.pub manifest, we're not getting any useful notifications. 2015-01-29 11:32:27 +00:00
akwizgran
f8a4a4920d Merge branch 'AbrahamKiggundu/briar-master': better lock encapsulation 2015-01-29 11:28:48 +00:00
akwizgran
0dbfd7073f Comments to indicate which locks guard which variables. 2015-01-29 11:12:41 +00:00
akwizgran
47bd84122e Code formatting and small cleanups. 2015-01-28 21:18:31 +00:00
akwizgran
7fbad8dc26 Use FortunaGenerator to implement PseudoRandom. 2015-01-14 20:46:03 +00:00
akwizgran
1c7432cac4 Use a provider to instantiate AuthenticatedCipher. 2015-01-14 19:59:38 +00:00
akwizgran
6ff8f5ce69 Don't close the connection until both peers have finished. Bug #78. 2015-01-14 19:58:54 +00:00
akwizgran
03247aedd6 Log how long it takes to generate and verify signatures. 2015-01-14 19:09:37 +00:00
akwizgran
920c81199e Forgot to update some constants to reflect the new crypto primitives. 2015-01-14 16:38:15 +00:00
akwizgran
73d4f39726 Bumped expiry date to 1 February 2015. 2015-01-14 16:04:01 +00:00
akwizgran
112d80420c Downgrade to 256-bit curve for performance.
Also reduced hash function to 256 bits because our target security level
is now 128 bits.
2015-01-09 13:23:44 +00:00
akwizgran
5d46d3a4b4 AuthenticatedCipher interface isn't needed outside crypto package. 2015-01-09 13:06:44 +00:00
akwizgran
dc5e37a96d Remove AAD from AuthenticatedCipher interface. 2015-01-09 13:01:02 +00:00
Abraham Kiggundu
fcb983a651 Bug#49
https://sourceforge.net/p/briar/bugs/49/
Fixed by ensuring that the generated contact and group intents are uniquely identified
2015-01-08 11:58:44 +03:00
Abraham Kiggundu
851151041e Pull-Merge of latest changes from main repo 2015-01-08 11:54:47 +03:00
Abraham Kiggundu
686d5fd206 bug#49 Fixed by ensuring that intents for different contacts/groups can be distinguished from each other when resolving PendingIntent refs 2015-01-08 00:37:10 +03:00
Abraham Kiggundu
8d25840a1d Fixed bug calling notifyAll instead of signalAll 2015-01-07 00:47:27 +03:00
Abraham Kiggundu
be2a92d6c2 Revert lock variable rename for clarity 2015-01-07 00:37:28 +03:00
Abraham Kiggundu
2933f1a874 Reverted inadvertent downgrade of gradle version 2015-01-07 00:23:32 +03:00
akwizgran
4e57029d98 Use constant-time GCM multiplier. 2015-01-06 19:30:11 +00:00
Abraham Kiggundu
2b9c469063 Merge branch 'improve-thread-encapsulation' into upstream 2015-01-06 07:15:11 +03:00
akwizgran
ed79719bab Unit tests for StreamEncrypterImpl. 2015-01-05 18:55:17 +00:00
akwizgran
1f69f0d2f6 Variable-length frames (untested). 2015-01-05 17:35:45 +00:00
akwizgran
d3bf2d59a1 Use the same maximum frame length for all transports. 2015-01-05 16:24:44 +00:00
Abraham Kiggundu
8b79d84029 Fix to travis android build tools version 2015-01-04 23:40:19 +03:00
akwizgran
358166bc12 Don't try to erase secrets from memory.
1. The things we're really trying to protect - contact identities,
message contents, etc - can't be erased from memory because they're
encapsulated inside objects we don't control.

2. Long-term secrets can't be protected by erasing them from memory
because they're stored in the database and the database key has to be
held in memory whenever the app's running.

3. If the runtime uses a compacting garbage collector then we have no
way to ensure an object is erased from memory.

4. Trying to erase secrets from memory makes the code more complex.

Conclusion: Let's not try to protect secrets from an attacker who can
read arbitrary memory locations.
2014-12-29 21:08:27 +00:00
akwizgran
f316d64afa Moved stream crypto to crypto component. 2014-12-29 19:55:05 +00:00