Trust all IdentityKeys
The trust-on-first-use policy leads to problems when receiving messages from two different devices of a contact before sending a message to them (as their IdentityKeys will not have been added yet). Since session trust will be managed externally anyway, this change is not a security problem, and will allow us to decrypt messages from yet-untrusted sessions.
This commit is contained in:
		
							parent
							
								
									bf4185ac08
								
							
						
					
					
						commit
						25450bf6d3
					
				| 
						 | 
				
			
			@ -233,8 +233,9 @@ public class AxolotlService {
 | 
			
		|||
		 */
 | 
			
		||||
		@Override
 | 
			
		||||
		public boolean isTrustedIdentity(String name, IdentityKey identityKey) {
 | 
			
		||||
			Set<IdentityKey> trustedKeys = mXmppConnectionService.databaseBackend.loadIdentityKeys(account, name);
 | 
			
		||||
			return trustedKeys.isEmpty() || trustedKeys.contains(identityKey);
 | 
			
		||||
			//Set<IdentityKey> trustedKeys = mXmppConnectionService.databaseBackend.loadIdentityKeys(account, name);
 | 
			
		||||
			//return trustedKeys.isEmpty() || trustedKeys.contains(identityKey);
 | 
			
		||||
			return true;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		// --------------------------------------
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
		Loading…
	
		Reference in New Issue