akwizgran
53f6f24d53
Don't enable Bluetooth by default. #99
2015-12-03 17:13:49 +00:00
akwizgran
8529c976c2
Renamed a bunch of lock variables.
...
"synchLock" will become confusing when we have lots of objects with "sync" in the name.
2015-12-03 16:39:53 +00:00
akwizgran
427efdc7d6
Raise minimum Java version to 6, upgrade H2. #24
2015-12-02 14:59:51 +00:00
akwizgran
c65ea9a896
Source should be Java 6, don't use diamond operator.
2015-12-02 13:22:23 +00:00
akwizgran
79d9b4b6af
Raised minimum Android version to 2.3 (API 9). #23
2015-12-02 13:20:55 +00:00
akwizgran
db6d277887
Bumped expiry date to 1 Jan 2016.
2015-11-30 11:02:33 +00:00
akwizgran
027ae8340f
Whitespace-only code formatting changes.
2015-11-30 09:38:25 +00:00
akwizgran
dea5a44724
Simpler forum sharing UX.
2015-04-29 15:08:58 +01:00
akwizgran
ec7eb386f5
Bumped expiry date to 15 May 2015.
2015-04-27 15:20:53 +01:00
akwizgran
6135bea2b4
Support Tor on Android x86 (thanks to n8fr8).
2015-04-16 08:02:57 +01:00
akwizgran
92d26f7867
Use strict mode to log potential problems with testing builds.
2015-04-08 08:50:40 +01:00
akwizgran
6e7578a0e0
Don't try to access Build.CPU_ABI2 on API version 7.
2015-04-07 19:11:59 +01:00
akwizgran
f2d3e4cb81
Remove crash handler when handling first crash. Fixes bug #76 .
2015-04-07 19:07:57 +01:00
akwizgran
84596baddb
Bumped expiry date to 1 May 2015.
2015-04-05 16:37:46 +01:00
akwizgran
a1d2aaf10e
Use JDK 1.7, target Android 5.1.
2015-04-03 20:56:01 +01:00
akwizgran
10924709d0
Use PIE Tor binary on API version 16+.
2015-03-23 11:03:00 +00:00
akwizgran
b791ce02b6
Insert padding between password strength meter and progress spinner.
2015-03-23 11:00:54 +00:00
akwizgran
a5b1d92eae
Log discovered devices to track down discovery bugs.
2015-03-11 10:24:53 +00:00
Alexander Løvik Stevenson
35212a49dc
Bumped expiry date to 1 PAril 2015.
2015-03-05 14:05:24 +01:00
akwizgran
316e4c88fd
Bumped expiry date to 1 March 2015.
2015-02-05 14:32:43 +00:00
akwizgran
c14697972a
Upgraded Tor to 0.2.5.10 with OpenSSL 1.0.2.
2015-01-30 19:23:36 +00:00
akwizgran
f8a4a4920d
Merge branch 'AbrahamKiggundu/briar-master': better lock encapsulation
2015-01-29 11:28:48 +00:00
akwizgran
0dbfd7073f
Comments to indicate which locks guard which variables.
2015-01-29 11:12:41 +00:00
akwizgran
47bd84122e
Code formatting and small cleanups.
2015-01-28 21:18:31 +00:00
akwizgran
7fbad8dc26
Use FortunaGenerator to implement PseudoRandom.
2015-01-14 20:46:03 +00:00
akwizgran
73d4f39726
Bumped expiry date to 1 February 2015.
2015-01-14 16:04:01 +00:00
Abraham Kiggundu
fcb983a651
Bug#49
...
https://sourceforge.net/p/briar/bugs/49/
Fixed by ensuring that the generated contact and group intents are uniquely identified
2015-01-08 11:58:44 +03:00
Abraham Kiggundu
851151041e
Pull-Merge of latest changes from main repo
2015-01-08 11:54:47 +03:00
Abraham Kiggundu
686d5fd206
bug#49 Fixed by ensuring that intents for different contacts/groups can be distinguished from each other when resolving PendingIntent refs
2015-01-08 00:37:10 +03:00
Abraham Kiggundu
2b9c469063
Merge branch 'improve-thread-encapsulation' into upstream
2015-01-06 07:15:11 +03:00
akwizgran
d3bf2d59a1
Use the same maximum frame length for all transports.
2015-01-05 16:24:44 +00:00
akwizgran
358166bc12
Don't try to erase secrets from memory.
...
1. The things we're really trying to protect - contact identities,
message contents, etc - can't be erased from memory because they're
encapsulated inside objects we don't control.
2. Long-term secrets can't be protected by erasing them from memory
because they're stored in the database and the database key has to be
held in memory whenever the app's running.
3. If the runtime uses a compacting garbage collector then we have no
way to ensure an object is erased from memory.
4. Trying to erase secrets from memory makes the code more complex.
Conclusion: Let's not try to protect secrets from an attacker who can
read arbitrary memory locations.
2014-12-29 21:08:27 +00:00
Abraham Kiggundu
9a2e93ebb9
cleanup
2014-12-26 17:35:37 +03:00
Abraham Kiggundu
b074978472
Improved encapsulation of thread synchronisation as follows
...
- replaced use of Object instance mutex with a private final Lock object
- replaced Object signaling with specific condition signalling
2014-12-26 16:40:46 +03:00
akwizgran
388b36b6be
Check periodically for retransmittable packets. Bug #46 .
2014-12-14 20:26:41 +00:00
akwizgran
29a6596ee3
Use the transport's idle timeout, not a hardcoded value.
2014-12-14 15:18:39 +00:00
akwizgran
d4fa656dbb
Application layer keepalives to detect dead TCP connections.
...
DuplexOutgoingSession flushes its output stream if it's idle for a
transport-defined interval, causing an empty frame to be sent. The TCP
and Tor plugins use a socket timeout equal to twice the idle interval to
detect dead connections.
See bugs #27 , #46 and #60 .
2014-12-13 12:00:40 +00:00
akwizgran
3a70aa7653
Removed unused code from AndroidLocationUtils.
...
It's in the git history if we ever decide to use it.
2014-12-05 19:23:47 +00:00
akwizgran
6cc864db2c
Bumped expiry date to 1 January 2015.
2014-12-05 13:32:59 +00:00
akwizgran
0d12e39107
Bumped expiry date to 1 January 2015.
2014-12-05 10:28:51 +00:00
akwizgran
8046ff3793
Merge branch 'master' of git@code.briarproject.org:akwizgran/briar.git
2014-11-11 21:11:52 +00:00
akwizgran
5fec373689
Bumped expiry date to 14 November 2014.
2014-11-09 09:46:07 +00:00
akwizgran
4ca83842d1
Moved ConnectionDispatcher and ConnectionRegistry to plugins package.
2014-11-05 19:40:07 +00:00
akwizgran
1151c35d1c
Bumped expiry date to 7 November 2014.
2014-11-04 16:53:13 +00:00
akwizgran
7b8181e309
Massive refactoring to merge handling of simplex and duplex connections.
2014-11-04 16:51:25 +00:00
akwizgran
f4a647f14a
Update description of Bluetooth setting when setting is toggled. Bug #75 .
2014-10-29 12:44:00 +00:00
akwizgran
b24f153704
Renamed a load of things from 'connection' to 'stream'.
2014-10-08 16:21:55 +01:00
akwizgran
58a2b725bf
Bumped expiry date to 31 October 2014 and build target to android-20.
...
This should make it easier for people to build the project with a freshly
downloaded ADT Bundle.
2014-10-07 11:44:39 +01:00
akwizgran
9e5e2e2df2
Patched tor and jtorctl for improved hidden service performance.
...
Two changes have been made to Tor:
1. Set can_complete_circuit to false when the network is disabled, and
don't try to build introduction circuits while can_complete_circuit is
false. This avoids a situation where Tor tries to build introduction
circuits as soon as the network is re-enabled, all the circuits fail,
and then Tor waits 5 minutes before trying to build more.
2. Added a FORGETHS command to the control protocol which clears any
cached client state relating to a specified hidden service. This can be
used to flush state that's likely to be stale before trying to connect
to a hidden service with an unstable network connection.
Support for the FORGETHS command was also added to jtorctl.
2014-10-06 18:57:57 +01:00
akwizgran
e5620f8b05
Parts of our jtorctl patch have been merged upstream.
2014-10-03 13:29:12 +01:00