7177c52
Do not insert text shared over XMPP uri when already drafting message
Click to expand commit body
XMPP uris in the style of `xmpp:test@domain.tld?body=Something` can be used to
directly share a message with a specific contact. Previously the text was
always appended to the message currently in draft. The message was never send
automatically. Essentially those links where treated like normal text share
intents (for example when sharing a URL from the browser) but without the
contact selection.
There is a concern (CVE-2018-18467) that when this URI is invoked automatically
and the user is currently drafting a long message to that particular contact
the text could be inserted in the draft field (input box) without the user
noticing.
To circumvent that the text shared over XMPP uris that contain a particular
contact is now appended only if the draft box is currently empty.
Sharing text normally (**with** manual contact selection) is still treated the
same; meaning the shared text will be appended to the current draft. This is
intended behaviour to make the
'Hey I have this cool link here;' *open browser*, *share link* - secenario
work.
Daniel Gultsch
created
71bbd37
removed unused paramater 'newTask' from switchToConversation api
apparently using conscrypt on Android below version 7? throws an exception when using 16 byte IVs.
so we now use BC when ever possible (excluding api 28)
we don’t know why Conscrypt behaves differently on various android versions
Daniel Gultsch
created
7c5af89
offer either 'cancel download' or 'delete file' but not both
Click to expand commit body
fixes #3221
Daniel Gultsch
created
58c6dbb
Lower foreground service notification priority (#3223)
Click to expand commit body
...so no useless icon is shown on the status bar on Android 7 and older (as it was up to 2.2.9)
0e3be46
fixed regression introduce in earlier commit. don’t use conscrypt on older devices
Daniel Gultsch
created
bfa63e1
added a few TODOs in regards to the handling of inactive devices
Daniel Gultsch
created
04ac226
Do weOwnFile security check only when attaching
Click to expand commit body
The general security check is recommend so a third party can not ask us to send an internal file. But we don’t need to do this for files we attach ourself from within Conversations
Daniel Gultsch
created
657b1ca
use fab.hide() and fab.show() - this will animate the process
Daniel Gultsch
created
390175e
use short read timeout when waiting for first stream open. disable read timeout aftwards
Daniel Gultsch
created
a34033d
run through sendMessage() procedure instead of taking shortcut after returning from TrustKeys
Click to expand commit body
The shortcut didn’t take care of message edits and some other things
Daniel Gultsch
created
2328248
prevent race condition when fetching device ids
Daniel Gultsch
created
f608fb3
refactored file encryption to give access to inner stream
Click to expand commit body
Conscrypt on some plattforms doesn’t like when we close the CipherInputStream. Therefor we refactor the api to give us access to the inner stream so we can close that independently.