Trust all IdentityKeys

The trust-on-first-use policy leads to problems when receiving messages
from two different devices of a contact before sending a message to them
(as their IdentityKeys will not have been added yet). Since session
trust will be managed externally anyway, this change is not a security
problem, and will allow us to decrypt messages from yet-untrusted
sessions.
This commit is contained in:
Andreas Straub 2015-07-05 22:10:43 +02:00
parent bf4185ac08
commit 25450bf6d3

View file

@ -233,8 +233,9 @@ public class AxolotlService {
*/ */
@Override @Override
public boolean isTrustedIdentity(String name, IdentityKey identityKey) { public boolean isTrustedIdentity(String name, IdentityKey identityKey) {
Set<IdentityKey> trustedKeys = mXmppConnectionService.databaseBackend.loadIdentityKeys(account, name); //Set<IdentityKey> trustedKeys = mXmppConnectionService.databaseBackend.loadIdentityKeys(account, name);
return trustedKeys.isEmpty() || trustedKeys.contains(identityKey); //return trustedKeys.isEmpty() || trustedKeys.contains(identityKey);
return true;
} }
// -------------------------------------- // --------------------------------------