Krille
d94e6d2ac8
fix: Skip invalid keys which got corrupted in database
2024-01-26 09:41:55 +01:00
Nicolas Werner
8b8a647cf9
chore: enable discarded_futures lint
...
BREAKING CHANGE: This changes the runInRoot method to not return a
future. As a user, if you need the result of an async computation passed
to runInRoot, please await it directly. Also the KeyVerification start
and a few call methods now return a future.
2023-11-17 12:59:27 +01:00
Nicolas Werner
5dc3adadfc
chore: enable avoid_bool_literals_in_conditional_expressions
2023-11-17 12:59:27 +01:00
Nicolas Werner
82492f92e1
chore: upgrade lints
2023-11-02 10:20:33 +01:00
Malin Errenst
395ef0eb8e
refactor: Use tryGet for type casts whenever possible
2023-06-21 15:04:46 +02:00
Malin Errenst
5943576b1b
refactor: Added type casts to match refactored matrix_api_lite
2023-06-16 12:42:10 +02:00
Malin Errenst
d8af3edbe1
refactor: Rename one-character-variables in device_keys_list.dart
2023-03-30 12:30:39 +02:00
Reza
f969a733f1
fix: minor stuff
2022-11-24 10:48:17 +01:00
Reza
dd4d0696b3
fix: do not pass the verified device list
2022-11-24 10:19:52 +01:00
Reza
8f37466295
fix: minor stuff
2022-11-24 09:33:36 +01:00
Reza
10cf979877
fix: minor stuff
2022-11-23 19:28:08 +01:00
Reza
44f862b966
feat: start verification with the verified device
2022-11-23 13:43:57 +01:00
Reza
ffb37e834f
feat: check if the key is verified by any master key
2022-11-22 17:22:04 +01:00
Christian Pauly
aaaf63a0b8
feat: Check if a key is verified by any master key
...
To check if a device is cross
signed by any master key can
be useful to know which
device can give us the
bootstrap keys on login.
2022-11-21 10:12:12 +01:00
Nicolas Werner
6555f36d6d
feat: switch from pedantic to lints
2022-08-15 14:15:51 +00:00
Christian Pauly
7885281c72
refactor: Use import sorter and ci templates
2022-07-21 15:44:04 +02:00
Christian Pauly
28231936b1
feat: Calc encryption health state and allow key sharing with unknown devices
...
In order to allow key sharing with
unknown devices (master key has been
verified but this device is not
signed by this master key) the
user should at least be informed.
This makes it possible to set
in the client constructor whether
the app should share keys with
unverified devices or unknown
devices.
2022-07-09 09:39:31 +02:00
Krille Fear
3bce8b4489
refactor: Remove unnecessary type checks and imports
2021-12-23 11:46:45 +01:00
Krille Fear
9abe1ed81d
fix: Dont enable e2ee in test verification DM room
2021-11-09 15:42:43 +01:00
Nicolas Werner
6e20c53b01
refactor: remove redundant null checks
2021-10-28 14:32:09 +02:00
Nicolas Werner
fb0a84d7b2
refactor: make client nullsafe
2021-10-25 16:34:02 +02:00
Krille Fear
faba36d476
fix: Missing null check in a nested json map
2021-10-18 15:45:29 +02:00
Nicolas Werner
60956bde00
chore: port the remaining encryption files to nullsafety
2021-10-13 13:58:21 +00:00
Nicolas Werner
7dd176c278
fix: apply review feedback
2021-09-30 12:58:37 +00:00
Nicolas Werner
1c838e3be8
fix: Cleanup nullsafe encryption a bit
2021-09-30 12:58:37 +00:00
Lukas Lihotzki
da80658c09
refactor: simplify device_keys_list.dart
2021-09-30 12:58:37 +00:00
Nicolas Werner
a196b53219
refactor: nullsafe encryption
2021-09-30 12:58:37 +00:00
Jayesh Nirve
77ca7523d0
refactor: remove unused clientId
2021-09-24 16:05:05 +02:00
Christian Pauly
92755c07d3
refactor: Don't create dummy User object just to start a new chat
2021-09-08 12:31:55 +00:00
Christian Pauly
9b7474e2f2
refactor: Update to dart 2.12 and opt out in all files
...
This also adds some missing license headers, I have detected while
using license header search&replace to add the
null safety opt out
2021-08-18 08:09:39 +02:00
Lukas Lihotzki
8665f092f4
chore: matrix_api_lite 0.4.0
2021-07-26 14:54:22 +02:00
Sorunome
cd5131daa5
fix: Add locking to sending encrypted to_device messages to prevent potential race conditions
...
Due to chunked lazy sending of megolm sessions it was in theory that we encrypted two olm
messages to the same device in different futures out-of-order. Introducing locking here should
fix this (increadibly rare, so far only theoretical?) race-condition
2021-07-11 13:06:39 +02:00
Christian Pauly
c0c7f68bf3
chore: Rename to matrix
2021-06-18 09:58:25 +02:00
Christian Pauly
c3d47b16c6
CI: Use correct image
2021-05-25 10:46:34 +02:00
Lukas Lihotzki
3d55abdd11
chore: upgrade to ffi 1.0.0
2021-03-29 16:37:29 +02:00
Krille Fear
44ca96e544
refactor: Update pedantic
...
This enforces to NOT use curly braces in Strings where not needed
and not await non-future variables.
2021-03-09 17:28:04 +00:00
Sorunome
681b27e269
fix: Don't allow transitive trust unless it is for ouself
2021-02-15 12:19:05 +01:00
Christian Pauly
9ffecd845a
chore: Update license header
2021-01-04 10:34:50 +01:00
Christian Pauly
e450a09fb5
refactor: External matrix api
2021-01-04 10:26:29 +01:00
Sorunome
6723c01a31
feat: Lazy-send room keys, chunked and sorted by importance
2020-12-29 14:46:36 +01:00
Sorunome
768baa7602
chore: Implement a proper deep-copy function for json maps
2020-12-28 14:35:21 +01:00
Sorunome
48904b3a1b
fix: Cache the result of the self-signature check
2020-12-23 10:52:39 +01:00
Sorunome
6f9deb5ae2
fix: Verify device signatures before storing devices and block those with invalid signatures
2020-12-22 10:22:42 +01:00
Sorunome
b00a9e8834
feat: Better determine which devices to encrypt to
2020-12-21 15:26:46 +01:00
Christian Pauly
d3c44687f6
fix: Missing null check which F*cks me up!
2020-12-14 13:24:39 +00:00
Christian Pauly
b563aec7bb
refactor: Add secretstoragekeycontent
2020-12-10 11:03:45 +01:00
Sorunome
5924e57cf1
feat: Add broadcast to-device verification
2020-10-30 11:40:19 +01:00
Sorunome
bbc1b63695
feat: Auto-verify own master key, if there is a valid signature chain within the same account
2020-09-10 13:04:24 +02:00
MTRNord
26586b6f02
style: Change package:famedlysdk imports to relative imports
...
Changing the imports from `package:famedlysdk` to relative imports allows us to easier move the files
Took 2 minutes
2020-08-13 10:40:39 +02:00
Sorunome
dbcdb6883d
better set verified
2020-06-21 21:48:06 +02:00