TrustKeysActivity.java

  1package eu.siacs.conversations.ui;
  2
  3import android.app.ActionBar;
  4import android.content.Intent;
  5import android.os.Bundle;
  6import android.util.Log;
  7import android.view.Gravity;
  8import android.view.Menu;
  9import android.view.MenuItem;
 10import android.view.View;
 11import android.view.View.OnClickListener;
 12import android.widget.Button;
 13import android.widget.CompoundButton;
 14import android.widget.LinearLayout;
 15import android.widget.TextView;
 16import android.widget.Toast;
 17
 18import com.google.zxing.integration.android.IntentIntegrator;
 19
 20import org.whispersystems.libaxolotl.IdentityKey;
 21
 22import java.util.ArrayList;
 23import java.util.Arrays;
 24import java.util.HashMap;
 25import java.util.List;
 26import java.util.Map;
 27import java.util.Set;
 28
 29import eu.siacs.conversations.Config;
 30import eu.siacs.conversations.R;
 31import eu.siacs.conversations.crypto.axolotl.AxolotlService;
 32import eu.siacs.conversations.crypto.axolotl.FingerprintStatus;
 33import eu.siacs.conversations.entities.Account;
 34import eu.siacs.conversations.entities.Conversation;
 35import eu.siacs.conversations.utils.XmppUri;
 36import eu.siacs.conversations.xmpp.OnKeyStatusUpdated;
 37import eu.siacs.conversations.xmpp.jid.InvalidJidException;
 38import eu.siacs.conversations.xmpp.jid.Jid;
 39
 40public class TrustKeysActivity extends OmemoActivity implements OnKeyStatusUpdated {
 41	private List<Jid> contactJids;
 42
 43	private Account mAccount;
 44	private Conversation mConversation;
 45	private TextView keyErrorMessage;
 46	private LinearLayout keyErrorMessageCard;
 47	private TextView ownKeysTitle;
 48	private LinearLayout ownKeys;
 49	private LinearLayout ownKeysCard;
 50	private LinearLayout foreignKeys;
 51	private Button mSaveButton;
 52	private Button mCancelButton;
 53
 54	private AxolotlService.FetchStatus lastFetchReport = AxolotlService.FetchStatus.SUCCESS;
 55
 56	private final Map<String, Boolean> ownKeysToTrust = new HashMap<>();
 57	private final Map<Jid,Map<String, Boolean>> foreignKeysToTrust = new HashMap<>();
 58
 59	private final OnClickListener mSaveButtonListener = new OnClickListener() {
 60		@Override
 61		public void onClick(View v) {
 62			commitTrusts();
 63			finishOk();
 64		}
 65	};
 66
 67	private final OnClickListener mCancelButtonListener = new OnClickListener() {
 68		@Override
 69		public void onClick(View v) {
 70			setResult(RESULT_CANCELED);
 71			finish();
 72		}
 73	};
 74	private Toast mUseCameraHintToast = null;
 75
 76	@Override
 77	protected void refreshUiReal() {
 78		invalidateOptionsMenu();
 79		populateView();
 80	}
 81
 82	@Override
 83	protected void onCreate(final Bundle savedInstanceState) {
 84		super.onCreate(savedInstanceState);
 85		setContentView(R.layout.activity_trust_keys);
 86		this.contactJids = new ArrayList<>();
 87		for(String jid : getIntent().getStringArrayExtra("contacts")) {
 88			try {
 89				this.contactJids.add(Jid.fromString(jid));
 90			} catch (InvalidJidException e) {
 91				e.printStackTrace();
 92			}
 93		}
 94
 95		keyErrorMessageCard = (LinearLayout) findViewById(R.id.key_error_message_card);
 96		keyErrorMessage = (TextView) findViewById(R.id.key_error_message);
 97		ownKeysTitle = (TextView) findViewById(R.id.own_keys_title);
 98		ownKeys = (LinearLayout) findViewById(R.id.own_keys_details);
 99		ownKeysCard = (LinearLayout) findViewById(R.id.own_keys_card);
100		foreignKeys = (LinearLayout) findViewById(R.id.foreign_keys);
101		mCancelButton = (Button) findViewById(R.id.cancel_button);
102		mCancelButton.setOnClickListener(mCancelButtonListener);
103		mSaveButton = (Button) findViewById(R.id.save_button);
104		mSaveButton.setOnClickListener(mSaveButtonListener);
105
106
107		if (getActionBar() != null) {
108			getActionBar().setHomeButtonEnabled(true);
109			getActionBar().setDisplayHomeAsUpEnabled(true);
110		}
111	}
112
113	@Override
114	public boolean onCreateOptionsMenu(Menu menu) {
115		getMenuInflater().inflate(R.menu.trust_keys, menu);
116		mUseCameraHintToast = Toast.makeText(this,R.string.use_camera_icon_to_scan_barcode,Toast.LENGTH_LONG);
117		ActionBar actionBar = getActionBar();
118		mUseCameraHintToast.setGravity(Gravity.TOP | Gravity.END, 0 ,actionBar == null ? 0 : actionBar.getHeight());
119		mUseCameraHintToast.show();
120		return super.onCreateOptionsMenu(menu);
121	}
122
123	@Override
124	public boolean onOptionsItemSelected(MenuItem item) {
125		switch (item.getItemId()) {
126			case R.id.action_scan_qr_code:
127				if (hasPendingKeyFetches()) {
128					Toast.makeText(this, R.string.please_wait_for_keys_to_be_fetched, Toast.LENGTH_SHORT).show();
129				} else {
130					new IntentIntegrator(this).initiateScan(Arrays.asList("AZTEC","QR_CODE"));
131					return true;
132				}
133		}
134		return super.onOptionsItemSelected(item);
135	}
136
137	@Override
138	protected void onStop() {
139		super.onStop();
140		if (mUseCameraHintToast != null) {
141			mUseCameraHintToast.cancel();
142		}
143	}
144
145	@Override
146	protected void processFingerprintVerification(XmppUri uri) {
147		if (mConversation != null
148				&& mAccount != null
149				&& uri.hasFingerprints()
150				&& mAccount.getAxolotlService().getCryptoTargets(mConversation).contains(uri.getJid())) {
151			boolean performedVerification = xmppConnectionService.verifyFingerprints(mAccount.getRoster().getContact(uri.getJid()),uri.getFingerprints());
152			boolean keys = reloadFingerprints();
153			if (performedVerification && !keys && !hasNoOtherTrustedKeys() && !hasPendingKeyFetches()) {
154				Toast.makeText(this,R.string.all_omemo_keys_have_been_verified, Toast.LENGTH_SHORT).show();
155				finishOk();
156				return;
157			} else if (performedVerification) {
158				Toast.makeText(this,R.string.verified_fingerprints,Toast.LENGTH_SHORT).show();
159			}
160		} else {
161			reloadFingerprints();
162			Log.d(Config.LOGTAG,"xmpp uri was: "+uri.getJid()+" has Fingerprints: "+Boolean.toString(uri.hasFingerprints()));
163			Toast.makeText(this,R.string.barcode_does_not_contain_fingerprints_for_this_conversation,Toast.LENGTH_SHORT).show();
164		}
165		populateView();
166	}
167
168	private void populateView() {
169		setTitle(getString(R.string.trust_omemo_fingerprints));
170		ownKeys.removeAllViews();
171		foreignKeys.removeAllViews();
172		boolean hasOwnKeys = false;
173		boolean hasForeignKeys = false;
174		for(final String fingerprint : ownKeysToTrust.keySet()) {
175			hasOwnKeys = true;
176			addFingerprintRowWithListeners(ownKeys, mAccount, fingerprint, false,
177					FingerprintStatus.createActive(ownKeysToTrust.get(fingerprint)), false, false,
178					new CompoundButton.OnCheckedChangeListener() {
179						@Override
180						public void onCheckedChanged(CompoundButton buttonView, boolean isChecked) {
181							ownKeysToTrust.put(fingerprint, isChecked);
182							// own fingerprints have no impact on locked status.
183						}
184					}
185			);
186		}
187
188		synchronized (this.foreignKeysToTrust) {
189			for (Map.Entry<Jid, Map<String, Boolean>> entry : foreignKeysToTrust.entrySet()) {
190				hasForeignKeys = true;
191				final LinearLayout layout = (LinearLayout) getLayoutInflater().inflate(R.layout.keys_card, foreignKeys, false);
192				final Jid jid = entry.getKey();
193				final TextView header = (TextView) layout.findViewById(R.id.foreign_keys_title);
194				final LinearLayout keysContainer = (LinearLayout) layout.findViewById(R.id.foreign_keys_details);
195				final TextView informNoKeys = (TextView) layout.findViewById(R.id.no_keys_to_accept);
196				header.setText(jid.toString());
197				final Map<String, Boolean> fingerprints = entry.getValue();
198				for (final String fingerprint : fingerprints.keySet()) {
199					addFingerprintRowWithListeners(keysContainer, mAccount, fingerprint, false,
200							FingerprintStatus.createActive(fingerprints.get(fingerprint)), false, false,
201							new CompoundButton.OnCheckedChangeListener() {
202								@Override
203								public void onCheckedChanged(CompoundButton buttonView, boolean isChecked) {
204									fingerprints.put(fingerprint, isChecked);
205									lockOrUnlockAsNeeded();
206								}
207							}
208					);
209				}
210				if (fingerprints.size() == 0) {
211					informNoKeys.setVisibility(View.VISIBLE);
212					informNoKeys.setText(getString(R.string.no_keys_just_confirm,mAccount.getRoster().getContact(jid).getDisplayName()));
213				} else {
214					informNoKeys.setVisibility(View.GONE);
215				}
216				foreignKeys.addView(layout);
217			}
218		}
219
220		ownKeysTitle.setText(mAccount.getJid().toBareJid().toString());
221		ownKeysCard.setVisibility(hasOwnKeys ? View.VISIBLE : View.GONE);
222		foreignKeys.setVisibility(hasForeignKeys ? View.VISIBLE : View.GONE);
223		if(hasPendingKeyFetches()) {
224			setFetching();
225			lock();
226		} else {
227			if (!hasForeignKeys && hasNoOtherTrustedKeys()) {
228				keyErrorMessageCard.setVisibility(View.VISIBLE);
229				if (lastFetchReport == AxolotlService.FetchStatus.ERROR
230						|| mAccount.getAxolotlService().fetchMapHasErrors(contactJids)) {
231					keyErrorMessage.setText(R.string.error_no_keys_to_trust_server_error);
232				} else {
233					keyErrorMessage.setText(R.string.error_no_keys_to_trust);
234				}
235				ownKeys.removeAllViews();
236				ownKeysCard.setVisibility(View.GONE);
237				foreignKeys.removeAllViews();
238				foreignKeys.setVisibility(View.GONE);
239			}
240			lockOrUnlockAsNeeded();
241			setDone();
242		}
243	}
244
245	private boolean reloadFingerprints() {
246		List<Jid> acceptedTargets = mConversation == null ? new ArrayList<Jid>() : mConversation.getAcceptedCryptoTargets();
247		ownKeysToTrust.clear();
248		AxolotlService service = this.mAccount.getAxolotlService();
249		Set<IdentityKey> ownKeysSet = service.getKeysWithTrust(FingerprintStatus.createActiveUndecided());
250		for(final IdentityKey identityKey : ownKeysSet) {
251			if(!ownKeysToTrust.containsKey(identityKey)) {
252				ownKeysToTrust.put(identityKey.getFingerprint().replaceAll("\\s", ""), false);
253			}
254		}
255		synchronized (this.foreignKeysToTrust) {
256			foreignKeysToTrust.clear();
257			for (Jid jid : contactJids) {
258				Set<IdentityKey> foreignKeysSet = service.getKeysWithTrust(FingerprintStatus.createActiveUndecided(), jid);
259				if (hasNoOtherTrustedKeys(jid) && ownKeysSet.size() == 0) {
260					foreignKeysSet.addAll(service.getKeysWithTrust(FingerprintStatus.createActive(false), jid));
261				}
262				Map<String, Boolean> foreignFingerprints = new HashMap<>();
263				for (final IdentityKey identityKey : foreignKeysSet) {
264					if (!foreignFingerprints.containsKey(identityKey)) {
265						foreignFingerprints.put(identityKey.getFingerprint().replaceAll("\\s", ""), false);
266					}
267				}
268				if (foreignFingerprints.size() > 0 || !acceptedTargets.contains(jid)) {
269					foreignKeysToTrust.put(jid, foreignFingerprints);
270				}
271			}
272		}
273		return ownKeysSet.size() + foreignKeysToTrust.size() > 0;
274	}
275
276	public void onBackendConnected() {
277		Intent intent = getIntent();
278		this.mAccount = extractAccount(intent);
279		if (this.mAccount != null && intent != null) {
280			String uuid = intent.getStringExtra("conversation");
281			this.mConversation = xmppConnectionService.findConversationByUuid(uuid);
282			if (this.mPendingFingerprintVerificationUri != null) {
283				processFingerprintVerification(this.mPendingFingerprintVerificationUri);
284				this.mPendingFingerprintVerificationUri = null;
285			} else {
286				reloadFingerprints();
287				populateView();
288			}
289		}
290	}
291
292	private boolean hasNoOtherTrustedKeys() {
293		return mAccount == null || mAccount.getAxolotlService().anyTargetHasNoTrustedKeys(contactJids);
294	}
295
296	private boolean hasNoOtherTrustedKeys(Jid contact) {
297		return mAccount == null || mAccount.getAxolotlService().getNumTrustedKeys(contact) == 0;
298	}
299
300	private boolean hasPendingKeyFetches() {
301		return mAccount != null && mAccount.getAxolotlService().hasPendingKeyFetches(mAccount, contactJids);
302	}
303
304
305	@Override
306	public void onKeyStatusUpdated(final AxolotlService.FetchStatus report) {
307		final boolean keysToTrust = reloadFingerprints();
308		if (report != null) {
309			lastFetchReport = report;
310			runOnUiThread(new Runnable() {
311				@Override
312				public void run() {
313					if (mUseCameraHintToast != null && !keysToTrust) {
314						mUseCameraHintToast.cancel();
315					}
316					switch (report) {
317						case ERROR:
318							Toast.makeText(TrustKeysActivity.this,R.string.error_fetching_omemo_key,Toast.LENGTH_SHORT).show();
319							break;
320						case SUCCESS_TRUSTED:
321							Toast.makeText(TrustKeysActivity.this,R.string.blindly_trusted_omemo_keys,Toast.LENGTH_LONG).show();
322							break;
323						case SUCCESS_VERIFIED:
324							Toast.makeText(TrustKeysActivity.this,
325									Config.X509_VERIFICATION ? R.string.verified_omemo_key_with_certificate : R.string.all_omemo_keys_have_been_verified,
326									Toast.LENGTH_LONG).show();
327							break;
328					}
329				}
330			});
331
332		}
333		if (keysToTrust || hasPendingKeyFetches() || hasNoOtherTrustedKeys()) {
334			refreshUi();
335		} else {
336			runOnUiThread(new Runnable() {
337				@Override
338				public void run() {
339					finishOk();
340				}
341			});
342
343		}
344	}
345
346	private void finishOk() {
347		Intent data = new Intent();
348		data.putExtra("choice", getIntent().getIntExtra("choice", ConversationActivity.ATTACHMENT_CHOICE_INVALID));
349		setResult(RESULT_OK, data);
350		finish();
351	}
352
353	private void commitTrusts() {
354		for(final String fingerprint :ownKeysToTrust.keySet()) {
355			mAccount.getAxolotlService().setFingerprintTrust(
356					fingerprint,
357					FingerprintStatus.createActive(ownKeysToTrust.get(fingerprint)));
358		}
359		List<Jid> acceptedTargets = mConversation == null ? new ArrayList<Jid>() : mConversation.getAcceptedCryptoTargets();
360		synchronized (this.foreignKeysToTrust) {
361			for (Map.Entry<Jid, Map<String, Boolean>> entry : foreignKeysToTrust.entrySet()) {
362				Jid jid = entry.getKey();
363				Map<String, Boolean> value = entry.getValue();
364				if (!acceptedTargets.contains(jid)) {
365					acceptedTargets.add(jid);
366				}
367				for (final String fingerprint : value.keySet()) {
368					mAccount.getAxolotlService().setFingerprintTrust(
369							fingerprint,
370							FingerprintStatus.createActive(value.get(fingerprint)));
371				}
372			}
373		}
374		if (mConversation != null && mConversation.getMode() == Conversation.MODE_MULTI) {
375			mConversation.setAcceptedCryptoTargets(acceptedTargets);
376			xmppConnectionService.updateConversation(mConversation);
377		}
378	}
379
380	private void unlock() {
381		mSaveButton.setEnabled(true);
382		mSaveButton.setTextColor(getPrimaryTextColor());
383	}
384
385	private void lock() {
386		mSaveButton.setEnabled(false);
387		mSaveButton.setTextColor(getSecondaryTextColor());
388	}
389
390	private void lockOrUnlockAsNeeded() {
391		synchronized (this.foreignKeysToTrust) {
392			for (Jid jid : contactJids) {
393				Map<String, Boolean> fingerprints = foreignKeysToTrust.get(jid);
394				if (hasNoOtherTrustedKeys(jid) && (fingerprints == null || !fingerprints.values().contains(true))) {
395					lock();
396					return;
397				}
398			}
399		}
400		unlock();
401
402	}
403
404	private void setDone() {
405		mSaveButton.setText(getString(R.string.done));
406	}
407
408	private void setFetching() {
409		mSaveButton.setText(getString(R.string.fetching_keys));
410	}
411}