Trust all IdentityKeys

Andreas Straub created

The trust-on-first-use policy leads to problems when receiving messages
from two different devices of a contact before sending a message to them
(as their IdentityKeys will not have been added yet). Since session
trust will be managed externally anyway, this change is not a security
problem, and will allow us to decrypt messages from yet-untrusted
sessions.

Change summary

src/main/java/eu/siacs/conversations/crypto/axolotl/AxolotlService.java | 5 
1 file changed, 3 insertions(+), 2 deletions(-)

Detailed changes

src/main/java/eu/siacs/conversations/crypto/axolotl/AxolotlService.java 🔗

@@ -233,8 +233,9 @@ public class AxolotlService {
 		 */
 		@Override
 		public boolean isTrustedIdentity(String name, IdentityKey identityKey) {
-			Set<IdentityKey> trustedKeys = mXmppConnectionService.databaseBackend.loadIdentityKeys(account, name);
-			return trustedKeys.isEmpty() || trustedKeys.contains(identityKey);
+			//Set<IdentityKey> trustedKeys = mXmppConnectionService.databaseBackend.loadIdentityKeys(account, name);
+			//return trustedKeys.isEmpty() || trustedKeys.contains(identityKey);
+			return true;
 		}
 
 		// --------------------------------------