1package eu.siacs.conversations.ui;
2
3import android.content.Intent;
4import android.databinding.DataBindingUtil;
5import android.os.Bundle;
6import android.support.v7.app.ActionBar;
7import android.util.Log;
8import android.view.Gravity;
9import android.view.Menu;
10import android.view.MenuItem;
11import android.view.View;
12import android.view.View.OnClickListener;
13import android.widget.Button;
14import android.widget.CompoundButton;
15import android.widget.LinearLayout;
16import android.widget.TextView;
17import android.widget.Toast;
18
19import org.whispersystems.libsignal.IdentityKey;
20
21import java.util.ArrayList;
22import java.util.Arrays;
23import java.util.HashMap;
24import java.util.List;
25import java.util.Map;
26import java.util.Set;
27import java.util.concurrent.atomic.AtomicBoolean;
28
29import eu.siacs.conversations.Config;
30import eu.siacs.conversations.R;
31import eu.siacs.conversations.crypto.axolotl.AxolotlService;
32import eu.siacs.conversations.crypto.axolotl.FingerprintStatus;
33import eu.siacs.conversations.databinding.ActivityTrustKeysBinding;
34import eu.siacs.conversations.databinding.KeysCardBinding;
35import eu.siacs.conversations.entities.Account;
36import eu.siacs.conversations.entities.Conversation;
37import eu.siacs.conversations.utils.CryptoHelper;
38import eu.siacs.conversations.utils.XmppUri;
39import eu.siacs.conversations.xmpp.OnKeyStatusUpdated;
40import rocks.xmpp.addr.Jid;
41
42
43public class TrustKeysActivity extends OmemoActivity implements OnKeyStatusUpdated {
44 private List<Jid> contactJids;
45
46 private Account mAccount;
47 private Conversation mConversation;
48
49 private AtomicBoolean mUseCameraHintShown = new AtomicBoolean(false);
50
51 private AxolotlService.FetchStatus lastFetchReport = AxolotlService.FetchStatus.SUCCESS;
52
53 private final Map<String, Boolean> ownKeysToTrust = new HashMap<>();
54 private final Map<Jid,Map<String, Boolean>> foreignKeysToTrust = new HashMap<>();
55
56 private final OnClickListener mSaveButtonListener = new OnClickListener() {
57 @Override
58 public void onClick(View v) {
59 commitTrusts();
60 finishOk();
61 }
62 };
63
64 private final OnClickListener mCancelButtonListener = new OnClickListener() {
65 @Override
66 public void onClick(View v) {
67 setResult(RESULT_CANCELED);
68 finish();
69 }
70 };
71 private Toast mUseCameraHintToast = null;
72 private ActivityTrustKeysBinding binding;
73
74 @Override
75 protected void refreshUiReal() {
76 invalidateOptionsMenu();
77 populateView();
78 }
79
80 @Override
81 protected void onCreate(final Bundle savedInstanceState) {
82 super.onCreate(savedInstanceState);
83 this.binding = DataBindingUtil.setContentView(this,R.layout.activity_trust_keys);
84 this.contactJids = new ArrayList<>();
85 for(String jid : getIntent().getStringArrayExtra("contacts")) {
86 try {
87 this.contactJids.add(Jid.of(jid));
88 } catch (IllegalArgumentException e) {
89 e.printStackTrace();
90 }
91 }
92
93 binding.cancelButton.setOnClickListener(mCancelButtonListener);
94 binding.saveButton.setOnClickListener(mSaveButtonListener);
95
96
97 if (getSupportActionBar() != null) {
98 getSupportActionBar().setHomeButtonEnabled(true);
99 getSupportActionBar().setDisplayHomeAsUpEnabled(true);
100 }
101
102 if (savedInstanceState != null) {
103 mUseCameraHintShown.set(savedInstanceState.getBoolean("camera_hint_shown",false));
104 }
105 }
106
107 @Override
108 public void onSaveInstanceState(Bundle savedInstanceState) {
109 savedInstanceState.putBoolean("camera_hint_shown", mUseCameraHintShown.get());
110 super.onSaveInstanceState(savedInstanceState);
111 }
112
113 @Override
114 public boolean onCreateOptionsMenu(Menu menu) {
115 getMenuInflater().inflate(R.menu.trust_keys, menu);
116 MenuItem scanQrCode = menu.findItem(R.id.action_scan_qr_code);
117 scanQrCode.setVisible(ownKeysToTrust.size() > 0 || foreignActuallyHasKeys());
118 return super.onCreateOptionsMenu(menu);
119 }
120
121 private void showCameraToast() {
122 mUseCameraHintToast = Toast.makeText(this,R.string.use_camera_icon_to_scan_barcode,Toast.LENGTH_LONG);
123 ActionBar actionBar = getSupportActionBar();
124 mUseCameraHintToast.setGravity(Gravity.TOP | Gravity.END, 0 ,actionBar == null ? 0 : actionBar.getHeight());
125 mUseCameraHintToast.show();
126 }
127
128 @Override
129 public boolean onOptionsItemSelected(MenuItem item) {
130 switch (item.getItemId()) {
131 case R.id.action_scan_qr_code:
132 if (hasPendingKeyFetches()) {
133 Toast.makeText(this, R.string.please_wait_for_keys_to_be_fetched, Toast.LENGTH_SHORT).show();
134 } else {
135 ScanActivity.scan(this);
136 //new IntentIntegrator(this).initiateScan(Arrays.asList("AZTEC","QR_CODE"));
137 return true;
138 }
139 }
140 return super.onOptionsItemSelected(item);
141 }
142
143 @Override
144 protected void onStop() {
145 super.onStop();
146 if (mUseCameraHintToast != null) {
147 mUseCameraHintToast.cancel();
148 }
149 }
150
151 @Override
152 protected void processFingerprintVerification(XmppUri uri) {
153 if (mConversation != null
154 && mAccount != null
155 && uri.hasFingerprints()
156 && mAccount.getAxolotlService().getCryptoTargets(mConversation).contains(uri.getJid())) {
157 boolean performedVerification = xmppConnectionService.verifyFingerprints(mAccount.getRoster().getContact(uri.getJid()),uri.getFingerprints());
158 boolean keys = reloadFingerprints();
159 if (performedVerification && !keys && !hasNoOtherTrustedKeys() && !hasPendingKeyFetches()) {
160 Toast.makeText(this,R.string.all_omemo_keys_have_been_verified, Toast.LENGTH_SHORT).show();
161 finishOk();
162 return;
163 } else if (performedVerification) {
164 Toast.makeText(this,R.string.verified_fingerprints,Toast.LENGTH_SHORT).show();
165 }
166 } else {
167 reloadFingerprints();
168 Log.d(Config.LOGTAG,"xmpp uri was: "+uri.getJid()+" has Fingerprints: "+Boolean.toString(uri.hasFingerprints()));
169 Toast.makeText(this,R.string.barcode_does_not_contain_fingerprints_for_this_conversation,Toast.LENGTH_SHORT).show();
170 }
171 populateView();
172 }
173
174 private void populateView() {
175 setTitle(getString(R.string.trust_omemo_fingerprints));
176 binding.ownKeysDetails.removeAllViews();
177 binding.foreignKeys.removeAllViews();
178 boolean hasOwnKeys = false;
179 boolean hasForeignKeys = false;
180 for(final String fingerprint : ownKeysToTrust.keySet()) {
181 hasOwnKeys = true;
182 addFingerprintRowWithListeners(binding.ownKeysDetails, mAccount, fingerprint, false,
183 FingerprintStatus.createActive(ownKeysToTrust.get(fingerprint)), false, false,
184 new CompoundButton.OnCheckedChangeListener() {
185 @Override
186 public void onCheckedChanged(CompoundButton buttonView, boolean isChecked) {
187 ownKeysToTrust.put(fingerprint, isChecked);
188 // own fingerprints have no impact on locked status.
189 }
190 }
191 );
192 }
193
194 synchronized (this.foreignKeysToTrust) {
195 for (Map.Entry<Jid, Map<String, Boolean>> entry : foreignKeysToTrust.entrySet()) {
196 hasForeignKeys = true;
197 KeysCardBinding keysCardBinding = DataBindingUtil.inflate(getLayoutInflater(),R.layout.keys_card, binding.foreignKeys,false);
198 //final LinearLayout layout = (LinearLayout) getLayoutInflater().inflate(R.layout.keys_card, foreignKeys, false);
199 final Jid jid = entry.getKey();
200 keysCardBinding.foreignKeysTitle.setText(jid.toString());
201 keysCardBinding.foreignKeysTitle.setOnClickListener(v -> switchToContactDetails(mAccount.getRoster().getContact(jid)));
202 final Map<String, Boolean> fingerprints = entry.getValue();
203 for (final String fingerprint : fingerprints.keySet()) {
204 addFingerprintRowWithListeners(keysCardBinding.foreignKeysDetails, mAccount, fingerprint, false,
205 FingerprintStatus.createActive(fingerprints.get(fingerprint)), false, false,
206 (buttonView, isChecked) -> {
207 fingerprints.put(fingerprint, isChecked);
208 lockOrUnlockAsNeeded();
209 }
210 );
211 }
212 if (fingerprints.size() == 0) {
213 keysCardBinding.noKeysToAccept.setVisibility(View.VISIBLE);
214 if (hasNoOtherTrustedKeys(jid)) {
215 if (!mAccount.getRoster().getContact(jid).mutualPresenceSubscription()) {
216 keysCardBinding.noKeysToAccept.setText(R.string.error_no_keys_to_trust_presence);
217 } else {
218 keysCardBinding.noKeysToAccept.setText(R.string.error_no_keys_to_trust_server_error);
219 }
220 } else {
221 keysCardBinding.noKeysToAccept.setText(getString(R.string.no_keys_just_confirm, mAccount.getRoster().getContact(jid).getDisplayName()));
222 }
223 } else {
224 keysCardBinding.noKeysToAccept.setVisibility(View.GONE);
225 }
226 binding.foreignKeys.addView(keysCardBinding.foreignKeysCard);
227 }
228 }
229
230 if ((hasOwnKeys || foreignActuallyHasKeys()) && mUseCameraHintShown.compareAndSet(false,true)) {
231 showCameraToast();
232 }
233
234 binding.ownKeysTitle.setText(mAccount.getJid().asBareJid().toString());
235 binding.ownKeysCard.setVisibility(hasOwnKeys ? View.VISIBLE : View.GONE);
236 binding.foreignKeys.setVisibility(hasForeignKeys ? View.VISIBLE : View.GONE);
237 if(hasPendingKeyFetches()) {
238 setFetching();
239 lock();
240 } else {
241 if (!hasForeignKeys && hasNoOtherTrustedKeys()) {
242 binding.keyErrorMessageCard.setVisibility(View.VISIBLE);
243 if (lastFetchReport == AxolotlService.FetchStatus.ERROR
244 || mAccount.getAxolotlService().fetchMapHasErrors(contactJids)) {
245 if (anyWithoutMutualPresenceSubscription(contactJids)) {
246 binding.keyErrorMessage.setText(R.string.error_no_keys_to_trust_presence);
247 } else {
248 binding.keyErrorMessage.setText(R.string.error_no_keys_to_trust_server_error);
249 }
250 } else {
251 binding.keyErrorMessage.setText(R.string.error_no_keys_to_trust);
252 }
253 binding.ownKeysDetails.removeAllViews();
254 binding.ownKeysCard.setVisibility(View.GONE);
255 binding.foreignKeys.removeAllViews();
256 binding.foreignKeys.setVisibility(View.GONE);
257 }
258 lockOrUnlockAsNeeded();
259 setDone();
260 }
261 }
262
263 private boolean anyWithoutMutualPresenceSubscription(List<Jid> contactJids){
264 for(Jid jid : contactJids) {
265 if (!mAccount.getRoster().getContact(jid).mutualPresenceSubscription()) {
266 return true;
267 }
268 }
269 return false;
270 }
271
272 private boolean foreignActuallyHasKeys() {
273 synchronized (this.foreignKeysToTrust) {
274 for (Map.Entry<Jid, Map<String, Boolean>> entry : foreignKeysToTrust.entrySet()) {
275 if (entry.getValue().size() > 0) {
276 return true;
277 }
278 }
279 }
280 return false;
281 }
282
283 private boolean reloadFingerprints() {
284 List<Jid> acceptedTargets = mConversation == null ? new ArrayList<Jid>() : mConversation.getAcceptedCryptoTargets();
285 ownKeysToTrust.clear();
286 AxolotlService service = this.mAccount.getAxolotlService();
287 Set<IdentityKey> ownKeysSet = service.getKeysWithTrust(FingerprintStatus.createActiveUndecided());
288 for(final IdentityKey identityKey : ownKeysSet) {
289 final String fingerprint = CryptoHelper.bytesToHex(identityKey.getPublicKey().serialize());
290 if(!ownKeysToTrust.containsKey(fingerprint)) {
291 ownKeysToTrust.put(fingerprint, false);
292 }
293 }
294 synchronized (this.foreignKeysToTrust) {
295 foreignKeysToTrust.clear();
296 for (Jid jid : contactJids) {
297 Set<IdentityKey> foreignKeysSet = service.getKeysWithTrust(FingerprintStatus.createActiveUndecided(), jid);
298 if (hasNoOtherTrustedKeys(jid) && ownKeysSet.size() == 0) {
299 foreignKeysSet.addAll(service.getKeysWithTrust(FingerprintStatus.createActive(false), jid));
300 }
301 Map<String, Boolean> foreignFingerprints = new HashMap<>();
302 for (final IdentityKey identityKey : foreignKeysSet) {
303 final String fingerprint = CryptoHelper.bytesToHex(identityKey.getPublicKey().serialize());
304 if (!foreignFingerprints.containsKey(fingerprint)) {
305 foreignFingerprints.put(fingerprint, false);
306 }
307 }
308 if (foreignFingerprints.size() > 0 || !acceptedTargets.contains(jid)) {
309 foreignKeysToTrust.put(jid, foreignFingerprints);
310 }
311 }
312 }
313 return ownKeysSet.size() + foreignKeysToTrust.size() > 0;
314 }
315
316 public void onBackendConnected() {
317 Intent intent = getIntent();
318 this.mAccount = extractAccount(intent);
319 if (this.mAccount != null && intent != null) {
320 String uuid = intent.getStringExtra("conversation");
321 this.mConversation = xmppConnectionService.findConversationByUuid(uuid);
322 if (this.mPendingFingerprintVerificationUri != null) {
323 processFingerprintVerification(this.mPendingFingerprintVerificationUri);
324 this.mPendingFingerprintVerificationUri = null;
325 } else {
326 reloadFingerprints();
327 populateView();
328 invalidateOptionsMenu();
329 }
330 }
331 }
332
333 private boolean hasNoOtherTrustedKeys() {
334 return mAccount == null || mAccount.getAxolotlService().anyTargetHasNoTrustedKeys(contactJids);
335 }
336
337 private boolean hasNoOtherTrustedKeys(Jid contact) {
338 return mAccount == null || mAccount.getAxolotlService().getNumTrustedKeys(contact) == 0;
339 }
340
341 private boolean hasPendingKeyFetches() {
342 return mAccount != null && mAccount.getAxolotlService().hasPendingKeyFetches(mAccount, contactJids);
343 }
344
345
346 @Override
347 public void onKeyStatusUpdated(final AxolotlService.FetchStatus report) {
348 final boolean keysToTrust = reloadFingerprints();
349 if (report != null) {
350 lastFetchReport = report;
351 runOnUiThread(new Runnable() {
352 @Override
353 public void run() {
354 if (mUseCameraHintToast != null && !keysToTrust) {
355 mUseCameraHintToast.cancel();
356 }
357 switch (report) {
358 case ERROR:
359 Toast.makeText(TrustKeysActivity.this,R.string.error_fetching_omemo_key,Toast.LENGTH_SHORT).show();
360 break;
361 case SUCCESS_TRUSTED:
362 Toast.makeText(TrustKeysActivity.this,R.string.blindly_trusted_omemo_keys,Toast.LENGTH_LONG).show();
363 break;
364 case SUCCESS_VERIFIED:
365 Toast.makeText(TrustKeysActivity.this,
366 Config.X509_VERIFICATION ? R.string.verified_omemo_key_with_certificate : R.string.all_omemo_keys_have_been_verified,
367 Toast.LENGTH_LONG).show();
368 break;
369 }
370 }
371 });
372
373 }
374 if (keysToTrust || hasPendingKeyFetches() || hasNoOtherTrustedKeys()) {
375 refreshUi();
376 } else {
377 runOnUiThread(new Runnable() {
378 @Override
379 public void run() {
380 finishOk();
381 }
382 });
383
384 }
385 }
386
387 private void finishOk() {
388 Intent data = new Intent();
389 data.putExtra("choice", getIntent().getIntExtra("choice", ConversationFragment.ATTACHMENT_CHOICE_INVALID));
390 setResult(RESULT_OK, data);
391 finish();
392 }
393
394 private void commitTrusts() {
395 for(final String fingerprint :ownKeysToTrust.keySet()) {
396 mAccount.getAxolotlService().setFingerprintTrust(
397 fingerprint,
398 FingerprintStatus.createActive(ownKeysToTrust.get(fingerprint)));
399 }
400 List<Jid> acceptedTargets = mConversation == null ? new ArrayList<Jid>() : mConversation.getAcceptedCryptoTargets();
401 synchronized (this.foreignKeysToTrust) {
402 for (Map.Entry<Jid, Map<String, Boolean>> entry : foreignKeysToTrust.entrySet()) {
403 Jid jid = entry.getKey();
404 Map<String, Boolean> value = entry.getValue();
405 if (!acceptedTargets.contains(jid)) {
406 acceptedTargets.add(jid);
407 }
408 for (final String fingerprint : value.keySet()) {
409 mAccount.getAxolotlService().setFingerprintTrust(
410 fingerprint,
411 FingerprintStatus.createActive(value.get(fingerprint)));
412 }
413 }
414 }
415 if (mConversation != null && mConversation.getMode() == Conversation.MODE_MULTI) {
416 mConversation.setAcceptedCryptoTargets(acceptedTargets);
417 xmppConnectionService.updateConversation(mConversation);
418 }
419 }
420
421 private void unlock() {
422 binding.saveButton.setEnabled(true);
423 }
424
425 private void lock() {
426 binding.saveButton.setEnabled(false);
427 }
428
429 private void lockOrUnlockAsNeeded() {
430 synchronized (this.foreignKeysToTrust) {
431 for (Jid jid : contactJids) {
432 Map<String, Boolean> fingerprints = foreignKeysToTrust.get(jid);
433 if (hasNoOtherTrustedKeys(jid) && (fingerprints == null || !fingerprints.values().contains(true))) {
434 lock();
435 return;
436 }
437 }
438 }
439 unlock();
440
441 }
442
443 private void setDone() {
444 binding.saveButton.setText(getString(R.string.done));
445 }
446
447 private void setFetching() {
448 binding.saveButton.setText(getString(R.string.fetching_keys));
449 }
450}