1package eu.siacs.conversations.xmpp;
2
3import android.content.Context;
4import android.content.SharedPreferences;
5import android.os.Bundle;
6import android.os.Parcelable;
7import android.os.PowerManager;
8import android.os.PowerManager.WakeLock;
9import android.os.SystemClock;
10import android.preference.PreferenceManager;
11import android.util.Log;
12import android.util.SparseArray;
13
14import org.apache.http.conn.ssl.StrictHostnameVerifier;
15import org.json.JSONException;
16import org.json.JSONObject;
17import org.xmlpull.v1.XmlPullParserException;
18
19import java.io.IOException;
20import java.io.InputStream;
21import java.io.OutputStream;
22import java.math.BigInteger;
23import java.net.ConnectException;
24import java.net.IDN;
25import java.net.InetAddress;
26import java.net.InetSocketAddress;
27import java.net.Socket;
28import java.net.UnknownHostException;
29import java.security.KeyManagementException;
30import java.security.NoSuchAlgorithmException;
31import java.util.ArrayList;
32import java.util.Arrays;
33import java.util.HashMap;
34import java.util.Hashtable;
35import java.util.LinkedList;
36import java.util.List;
37import java.util.Map.Entry;
38
39import javax.net.ssl.HostnameVerifier;
40import javax.net.ssl.SSLContext;
41import javax.net.ssl.SSLSocket;
42import javax.net.ssl.SSLSocketFactory;
43import javax.net.ssl.X509TrustManager;
44
45import eu.siacs.conversations.Config;
46import eu.siacs.conversations.crypto.sasl.DigestMd5;
47import eu.siacs.conversations.crypto.sasl.Plain;
48import eu.siacs.conversations.crypto.sasl.SaslMechanism;
49import eu.siacs.conversations.crypto.sasl.ScramSha1;
50import eu.siacs.conversations.entities.Account;
51import eu.siacs.conversations.services.XmppConnectionService;
52import eu.siacs.conversations.utils.DNSHelper;
53import eu.siacs.conversations.xml.Element;
54import eu.siacs.conversations.xml.Tag;
55import eu.siacs.conversations.xml.TagWriter;
56import eu.siacs.conversations.xml.XmlReader;
57import eu.siacs.conversations.xmpp.jid.InvalidJidException;
58import eu.siacs.conversations.xmpp.jid.Jid;
59import eu.siacs.conversations.xmpp.jingle.OnJinglePacketReceived;
60import eu.siacs.conversations.xmpp.jingle.stanzas.JinglePacket;
61import eu.siacs.conversations.xmpp.stanzas.AbstractStanza;
62import eu.siacs.conversations.xmpp.stanzas.IqPacket;
63import eu.siacs.conversations.xmpp.stanzas.MessagePacket;
64import eu.siacs.conversations.xmpp.stanzas.PresencePacket;
65import eu.siacs.conversations.xmpp.stanzas.csi.ActivePacket;
66import eu.siacs.conversations.xmpp.stanzas.csi.InactivePacket;
67import eu.siacs.conversations.xmpp.stanzas.streammgmt.AckPacket;
68import eu.siacs.conversations.xmpp.stanzas.streammgmt.EnablePacket;
69import eu.siacs.conversations.xmpp.stanzas.streammgmt.RequestPacket;
70import eu.siacs.conversations.xmpp.stanzas.streammgmt.ResumePacket;
71
72public class XmppConnection implements Runnable {
73
74 private static final int PACKET_IQ = 0;
75 private static final int PACKET_MESSAGE = 1;
76 private static final int PACKET_PRESENCE = 2;
77 private final Context applicationContext;
78 protected Account account;
79 private WakeLock wakeLock;
80 private Socket socket;
81 private XmlReader tagReader;
82 private TagWriter tagWriter;
83 private Features features = new Features(this);
84 private boolean shouldBind = true;
85 private boolean shouldAuthenticate = true;
86 private Element streamFeatures;
87 private HashMap<String, List<String>> disco = new HashMap<>();
88
89 private String streamId = null;
90 private int smVersion = 3;
91 private SparseArray<String> messageReceipts = new SparseArray<>();
92
93 private boolean enabledEncryption = false;
94 private boolean enabledCarbons = false;
95
96 private int stanzasReceived = 0;
97 private int stanzasSent = 0;
98 private long lastPaketReceived = 0;
99 private long lastPingSent = 0;
100 private long lastConnect = 0;
101 private long lastSessionStarted = 0;
102 private int attempt = 0;
103 private Hashtable<String, PacketReceived> packetCallbacks = new Hashtable<>();
104 private OnPresencePacketReceived presenceListener = null;
105 private OnJinglePacketReceived jingleListener = null;
106 private OnIqPacketReceived unregisteredIqListener = null;
107 private OnMessagePacketReceived messageListener = null;
108 private OnStatusChanged statusListener = null;
109 private OnBindListener bindListener = null;
110 private ArrayList<OnAdvancedStreamFeaturesLoaded> advancedStreamFeaturesLoadedListeners = new ArrayList<>();
111 private OnMessageAcknowledged acknowledgedListener = null;
112 private XmppConnectionService mXmppConnectionService = null;
113
114 private SaslMechanism saslMechanism;
115
116 public XmppConnection(Account account, XmppConnectionService service) {
117 this.account = account;
118 this.wakeLock = service.getPowerManager().newWakeLock(
119 PowerManager.PARTIAL_WAKE_LOCK, account.getJid().toBareJid().toString());
120 tagWriter = new TagWriter();
121 mXmppConnectionService = service;
122 applicationContext = service.getApplicationContext();
123 }
124
125 protected void changeStatus(final Account.State nextStatus) {
126 if (account.getStatus() != nextStatus) {
127 if ((nextStatus == Account.State.OFFLINE)
128 && (account.getStatus() != Account.State.CONNECTING)
129 && (account.getStatus() != Account.State.ONLINE)
130 && (account.getStatus() != Account.State.DISABLED)) {
131 return;
132 }
133 if (nextStatus == Account.State.ONLINE) {
134 this.attempt = 0;
135 }
136 account.setStatus(nextStatus);
137 if (statusListener != null) {
138 statusListener.onStatusChanged(account);
139 }
140 }
141 }
142
143 protected void connect() {
144 Log.d(Config.LOGTAG, account.getJid().toBareJid().toString() + ": connecting");
145 enabledEncryption = false;
146 lastConnect = SystemClock.elapsedRealtime();
147 lastPingSent = SystemClock.elapsedRealtime();
148 this.attempt++;
149 try {
150 shouldAuthenticate = shouldBind = !account
151 .isOptionSet(Account.OPTION_REGISTER);
152 tagReader = new XmlReader(wakeLock);
153 tagWriter = new TagWriter();
154 packetCallbacks.clear();
155 this.changeStatus(Account.State.CONNECTING);
156 Bundle result = DNSHelper.getSRVRecord(account.getServer());
157 ArrayList<Parcelable> values = result.getParcelableArrayList("values");
158 if ("timeout".equals(result.getString("error"))) {
159 throw new IOException("timeout in dns");
160 } else if (values != null) {
161 int i = 0;
162 boolean socketError = true;
163 while (socketError && values.size() > i) {
164 Bundle namePort = (Bundle) values.get(i);
165 try {
166 String srvRecordServer;
167 try {
168 srvRecordServer=IDN.toASCII(namePort.getString("name"));
169 } catch (final IllegalArgumentException e) {
170 // TODO: Handle me?`
171 srvRecordServer = "";
172 }
173 int srvRecordPort = namePort.getInt("port");
174 String srvIpServer = namePort.getString("ip");
175 InetSocketAddress addr;
176 if (srvIpServer != null) {
177 addr = new InetSocketAddress(srvIpServer, srvRecordPort);
178 Log.d(Config.LOGTAG, account.getJid().toBareJid().toString()
179 + ": using values from dns " + srvRecordServer
180 + "[" + srvIpServer + "]:" + srvRecordPort);
181 } else {
182 addr = new InetSocketAddress(srvRecordServer, srvRecordPort);
183 Log.d(Config.LOGTAG, account.getJid().toBareJid().toString()
184 + ": using values from dns "
185 + srvRecordServer + ":" + srvRecordPort);
186 }
187 socket = new Socket();
188 socket.connect(addr, 20000);
189 socketError = false;
190 } catch (UnknownHostException e) {
191 Log.d(Config.LOGTAG, account.getJid().toBareJid().toString() + ": " + e.getMessage());
192 i++;
193 } catch (IOException e) {
194 Log.d(Config.LOGTAG, account.getJid().toBareJid().toString() + ": " + e.getMessage());
195 i++;
196 }
197 }
198 if (socketError) {
199 throw new UnknownHostException();
200 }
201 } else if (result.containsKey("error")
202 && "nosrv".equals(result.getString("error", null))) {
203 socket = new Socket(account.getServer().getDomainpart(), 5222);
204 } else {
205 throw new IOException("timeout in dns");
206 }
207 OutputStream out = socket.getOutputStream();
208 tagWriter.setOutputStream(out);
209 InputStream in = socket.getInputStream();
210 tagReader.setInputStream(in);
211 tagWriter.beginDocument();
212 sendStartStream();
213 Tag nextTag;
214 while ((nextTag = tagReader.readTag()) != null) {
215 if (nextTag.isStart("stream")) {
216 processStream(nextTag);
217 break;
218 } else {
219 throw new IOException("unknown tag on connect");
220 }
221 }
222 if (socket.isConnected()) {
223 socket.close();
224 }
225 } catch (UnknownHostException e) {
226 this.changeStatus(Account.State.SERVER_NOT_FOUND);
227 } catch (final ConnectException e) {
228 this.changeStatus(Account.State.SERVER_NOT_FOUND);
229 } catch (final IOException | XmlPullParserException e) {
230 Log.d(Config.LOGTAG, account.getJid().toBareJid().toString() + ": " + e.getMessage());
231 this.changeStatus(Account.State.OFFLINE);
232 } catch (NoSuchAlgorithmException e) {
233 Log.d(Config.LOGTAG, account.getJid().toBareJid().toString() + ": " + e.getMessage());
234 this.changeStatus(Account.State.OFFLINE);
235 } finally {
236 if (wakeLock.isHeld()) {
237 try {
238 wakeLock.release();
239 } catch (final RuntimeException ignored) {
240 }
241 }
242 }
243 }
244
245 @Override
246 public void run() {
247 connect();
248 }
249
250 private void processStream(final Tag currentTag) throws XmlPullParserException,
251 IOException, NoSuchAlgorithmException {
252 Tag nextTag = tagReader.readTag();
253
254 while ((nextTag != null) && (!nextTag.isEnd("stream"))) {
255 if (nextTag.isStart("error")) {
256 processStreamError(nextTag);
257 } else if (nextTag.isStart("features")) {
258 processStreamFeatures(nextTag);
259 } else if (nextTag.isStart("proceed")) {
260 switchOverToTls(nextTag);
261 } else if (nextTag.isStart("success")) {
262 final String challenge = tagReader.readElement(nextTag).getContent();
263 try {
264 saslMechanism.getResponse(challenge);
265 } catch (final SaslMechanism.AuthenticationException e) {
266 disconnect(true);
267 Log.e(Config.LOGTAG, String.valueOf(e));
268 }
269 Log.d(Config.LOGTAG, account.getJid().toBareJid().toString() + ": logged in");
270 account.setKey(Account.PINNED_MECHANISM_KEY,
271 String.valueOf(saslMechanism.getPriority()));
272 tagReader.reset();
273 sendStartStream();
274 processStream(tagReader.readTag());
275 break;
276 } else if (nextTag.isStart("failure")) {
277 tagReader.readElement(nextTag);
278 changeStatus(Account.State.UNAUTHORIZED);
279 } else if (nextTag.isStart("challenge")) {
280 final String challenge = tagReader.readElement(nextTag).getContent();
281 final Element response = new Element("response");
282 response.setAttribute("xmlns",
283 "urn:ietf:params:xml:ns:xmpp-sasl");
284 try {
285 response.setContent(saslMechanism.getResponse(challenge));
286 } catch (final SaslMechanism.AuthenticationException e) {
287 // TODO: Send auth abort tag.
288 Log.e(Config.LOGTAG, e.toString());
289 }
290 tagWriter.writeElement(response);
291 } else if (nextTag.isStart("enabled")) {
292 Element enabled = tagReader.readElement(nextTag);
293 if ("true".equals(enabled.getAttribute("resume"))) {
294 this.streamId = enabled.getAttribute("id");
295 Log.d(Config.LOGTAG, account.getJid().toBareJid().toString()
296 + ": stream managment(" + smVersion
297 + ") enabled (resumable)");
298 } else {
299 Log.d(Config.LOGTAG, account.getJid().toBareJid().toString()
300 + ": stream managment(" + smVersion + ") enabled");
301 }
302 this.lastSessionStarted = SystemClock.elapsedRealtime();
303 this.stanzasReceived = 0;
304 RequestPacket r = new RequestPacket(smVersion);
305 tagWriter.writeStanzaAsync(r);
306 } else if (nextTag.isStart("resumed")) {
307 lastPaketReceived = SystemClock.elapsedRealtime();
308 Element resumed = tagReader.readElement(nextTag);
309 String h = resumed.getAttribute("h");
310 try {
311 int serverCount = Integer.parseInt(h);
312 if (serverCount != stanzasSent) {
313 Log.d(Config.LOGTAG, account.getJid().toBareJid().toString()
314 + ": session resumed with lost packages");
315 stanzasSent = serverCount;
316 } else {
317 Log.d(Config.LOGTAG, account.getJid().toBareJid().toString()
318 + ": session resumed");
319 }
320 if (acknowledgedListener != null) {
321 for (int i = 0; i < messageReceipts.size(); ++i) {
322 if (serverCount >= messageReceipts.keyAt(i)) {
323 acknowledgedListener.onMessageAcknowledged(
324 account, messageReceipts.valueAt(i));
325 }
326 }
327 }
328 messageReceipts.clear();
329 } catch (final NumberFormatException ignored) {
330
331 }
332 sendServiceDiscoveryInfo(account.getServer());
333 sendServiceDiscoveryItems(account.getServer());
334 sendInitialPing();
335 } else if (nextTag.isStart("r")) {
336 tagReader.readElement(nextTag);
337 AckPacket ack = new AckPacket(this.stanzasReceived, smVersion);
338 tagWriter.writeStanzaAsync(ack);
339 } else if (nextTag.isStart("a")) {
340 Element ack = tagReader.readElement(nextTag);
341 lastPaketReceived = SystemClock.elapsedRealtime();
342 int serverSequence = Integer.parseInt(ack.getAttribute("h"));
343 String msgId = this.messageReceipts.get(serverSequence);
344 if (msgId != null) {
345 if (this.acknowledgedListener != null) {
346 this.acknowledgedListener.onMessageAcknowledged(
347 account, msgId);
348 }
349 this.messageReceipts.remove(serverSequence);
350 }
351 } else if (nextTag.isStart("failed")) {
352 tagReader.readElement(nextTag);
353 Log.d(Config.LOGTAG, account.getJid().toBareJid().toString() + ": resumption failed");
354 streamId = null;
355 if (account.getStatus() != Account.State.ONLINE) {
356 sendBindRequest();
357 }
358 } else if (nextTag.isStart("iq")) {
359 processIq(nextTag);
360 } else if (nextTag.isStart("message")) {
361 processMessage(nextTag);
362 } else if (nextTag.isStart("presence")) {
363 processPresence(nextTag);
364 }
365 nextTag = tagReader.readTag();
366 }
367 if (account.getStatus() == Account.State.ONLINE) {
368 account. setStatus(Account.State.OFFLINE);
369 if (statusListener != null) {
370 statusListener.onStatusChanged(account);
371 }
372 }
373 }
374
375 private void sendInitialPing() {
376 Log.d(Config.LOGTAG, account.getJid().toBareJid().toString() + ": sending intial ping");
377 IqPacket iq = new IqPacket(IqPacket.TYPE_GET);
378 iq.setFrom(account.getJid());
379 iq.addChild("ping", "urn:xmpp:ping");
380 this.sendIqPacket(iq, new OnIqPacketReceived() {
381
382 @Override
383 public void onIqPacketReceived(Account account, IqPacket packet) {
384 Log.d(Config.LOGTAG, account.getJid().toBareJid().toString()
385 + ": online with resource " + account.getResource());
386 changeStatus(Account.State.ONLINE);
387 }
388 });
389 }
390
391 private Element processPacket(Tag currentTag, int packetType)
392 throws XmlPullParserException, IOException {
393 Element element;
394 switch (packetType) {
395 case PACKET_IQ:
396 element = new IqPacket();
397 break;
398 case PACKET_MESSAGE:
399 element = new MessagePacket();
400 break;
401 case PACKET_PRESENCE:
402 element = new PresencePacket();
403 break;
404 default:
405 return null;
406 }
407 element.setAttributes(currentTag.getAttributes());
408 Tag nextTag = tagReader.readTag();
409 if (nextTag == null) {
410 throw new IOException("interrupted mid tag");
411 }
412 while (!nextTag.isEnd(element.getName())) {
413 if (!nextTag.isNo()) {
414 Element child = tagReader.readElement(nextTag);
415 String type = currentTag.getAttribute("type");
416 if (packetType == PACKET_IQ
417 && "jingle".equals(child.getName())
418 && ("set".equalsIgnoreCase(type) || "get"
419 .equalsIgnoreCase(type))) {
420 element = new JinglePacket();
421 element.setAttributes(currentTag.getAttributes());
422 }
423 element.addChild(child);
424 }
425 nextTag = tagReader.readTag();
426 if (nextTag == null) {
427 throw new IOException("interrupted mid tag");
428 }
429 }
430 ++stanzasReceived;
431 lastPaketReceived = SystemClock.elapsedRealtime();
432 return element;
433 }
434
435 private void processIq(Tag currentTag) throws XmlPullParserException,
436 IOException {
437 IqPacket packet = (IqPacket) processPacket(currentTag, PACKET_IQ);
438
439 if (packet.getId() == null) {
440 return; // an iq packet without id is definitely invalid
441 }
442
443 if (packet instanceof JinglePacket) {
444 if (this.jingleListener != null) {
445 this.jingleListener.onJinglePacketReceived(account,
446 (JinglePacket) packet);
447 }
448 } else {
449 if (packetCallbacks.containsKey(packet.getId())) {
450 if (packetCallbacks.get(packet.getId()) instanceof OnIqPacketReceived) {
451 ((OnIqPacketReceived) packetCallbacks.get(packet.getId()))
452 .onIqPacketReceived(account, packet);
453 }
454
455 packetCallbacks.remove(packet.getId());
456 } else if ((packet.getType() == IqPacket.TYPE_GET || packet
457 .getType() == IqPacket.TYPE_SET)
458 && this.unregisteredIqListener != null) {
459 this.unregisteredIqListener.onIqPacketReceived(account, packet);
460 }
461 }
462 }
463
464 private void processMessage(Tag currentTag) throws XmlPullParserException,
465 IOException {
466 MessagePacket packet = (MessagePacket) processPacket(currentTag,
467 PACKET_MESSAGE);
468 String id = packet.getAttribute("id");
469 if ((id != null) && (packetCallbacks.containsKey(id))) {
470 if (packetCallbacks.get(id) instanceof OnMessagePacketReceived) {
471 ((OnMessagePacketReceived) packetCallbacks.get(id))
472 .onMessagePacketReceived(account, packet);
473 }
474 packetCallbacks.remove(id);
475 } else if (this.messageListener != null) {
476 this.messageListener.onMessagePacketReceived(account, packet);
477 }
478 }
479
480 private void processPresence(Tag currentTag) throws XmlPullParserException,
481 IOException {
482 PresencePacket packet = (PresencePacket) processPacket(currentTag,
483 PACKET_PRESENCE);
484 String id = packet.getAttribute("id");
485 if ((id != null) && (packetCallbacks.containsKey(id))) {
486 if (packetCallbacks.get(id) instanceof OnPresencePacketReceived) {
487 ((OnPresencePacketReceived) packetCallbacks.get(id))
488 .onPresencePacketReceived(account, packet);
489 }
490 packetCallbacks.remove(id);
491 } else if (this.presenceListener != null) {
492 this.presenceListener.onPresencePacketReceived(account, packet);
493 }
494 }
495
496 private void sendStartTLS() throws IOException {
497 Tag startTLS = Tag.empty("starttls");
498 startTLS.setAttribute("xmlns", "urn:ietf:params:xml:ns:xmpp-tls");
499 tagWriter.writeTag(startTLS);
500 }
501
502 private SharedPreferences getPreferences() {
503 return PreferenceManager
504 .getDefaultSharedPreferences(applicationContext);
505 }
506
507 private boolean enableLegacySSL() {
508 return getPreferences().getBoolean("enable_legacy_ssl", false);
509 }
510
511 private void switchOverToTls(final Tag currentTag) throws XmlPullParserException,
512 IOException {
513 tagReader.readTag();
514 try {
515 SSLContext sc = SSLContext.getInstance("TLS");
516 sc.init(null,
517 new X509TrustManager[]{this.mXmppConnectionService.getMemorizingTrustManager()},
518 mXmppConnectionService.getRNG());
519 SSLSocketFactory factory = sc.getSocketFactory();
520
521 if (factory == null) {
522 throw new IOException("SSLSocketFactory was null");
523 }
524
525 final HostnameVerifier verifier = this.mXmppConnectionService.getMemorizingTrustManager().wrapHostnameVerifier(new StrictHostnameVerifier());
526
527 if (socket == null || socket.isClosed()) {
528 throw new IOException("socket null or closed");
529 }
530 final InetAddress address = socket.getInetAddress();
531 if (address == null) {
532 throw new IOException("socket address was null");
533 }
534
535 final SSLSocket sslSocket = (SSLSocket) factory.createSocket(socket,address.getHostAddress(), socket.getPort(),true);
536
537 // Support all protocols except legacy SSL.
538 // The min SDK version prevents us having to worry about SSLv2. In
539 // future, this may be true of SSLv3 as well.
540 final String[] supportProtocols;
541 if (enableLegacySSL()) {
542 supportProtocols = sslSocket.getSupportedProtocols();
543 } else {
544 final List<String> supportedProtocols = new LinkedList<>(
545 Arrays.asList(sslSocket.getSupportedProtocols()));
546 supportedProtocols.remove("SSLv3");
547 supportProtocols = new String[supportedProtocols.size()];
548 supportedProtocols.toArray(supportProtocols);
549 }
550 sslSocket.setEnabledProtocols(supportProtocols);
551
552 if (verifier != null
553 && !verifier.verify(account.getServer().getDomainpart(),
554 sslSocket.getSession())) {
555 Log.d(Config.LOGTAG,account.getJid().toBareJid()+": TLS certificate verification failed");
556 disconnect(true);
557 changeStatus(Account.State.SECURITY_ERROR);
558 }
559 tagReader.setInputStream(sslSocket.getInputStream());
560 tagWriter.setOutputStream(sslSocket.getOutputStream());
561 sendStartStream();
562 Log.d(Config.LOGTAG, account.getJid().toBareJid()
563 + ": TLS connection established");
564 enabledEncryption = true;
565 processStream(tagReader.readTag());
566 sslSocket.close();
567 } catch (final NoSuchAlgorithmException | KeyManagementException e1) {
568 e1.printStackTrace();
569 }
570 }
571
572 private void processStreamFeatures(Tag currentTag)
573 throws XmlPullParserException, IOException {
574 this.streamFeatures = tagReader.readElement(currentTag);
575 if (this.streamFeatures.hasChild("starttls") && !enabledEncryption) {
576 sendStartTLS();
577 } else if (this.streamFeatures.hasChild("register")
578 && account.isOptionSet(Account.OPTION_REGISTER)
579 && enabledEncryption) {
580 sendRegistryRequest();
581 } else if (!this.streamFeatures.hasChild("register")
582 && account.isOptionSet(Account.OPTION_REGISTER)) {
583 changeStatus(Account.State.REGISTRATION_NOT_SUPPORTED);
584 disconnect(true);
585 } else if (this.streamFeatures.hasChild("mechanisms")
586 && shouldAuthenticate && enabledEncryption) {
587 final List<String> mechanisms = extractMechanisms(streamFeatures
588 .findChild("mechanisms"));
589 final Element auth = new Element("auth");
590 auth.setAttribute("xmlns", "urn:ietf:params:xml:ns:xmpp-sasl");
591 if (mechanisms.contains("SCRAM-SHA-1")) {
592 saslMechanism = new ScramSha1(tagWriter, account, mXmppConnectionService.getRNG());
593 } else if (mechanisms.contains("DIGEST-MD5")) {
594 saslMechanism = new DigestMd5(tagWriter, account, mXmppConnectionService.getRNG());
595 } else if (mechanisms.contains("PLAIN")) {
596 saslMechanism = new Plain(tagWriter, account);
597 }
598 final JSONObject keys = account.getKeys();
599 try {
600 if (keys.has(Account.PINNED_MECHANISM_KEY) &&
601 keys.getInt(Account.PINNED_MECHANISM_KEY) > saslMechanism.getPriority() ) {
602 Log.e(Config.LOGTAG, "Auth failed. Authentication mechanism " + saslMechanism.getMechanism() +
603 " has lower priority (" + String.valueOf(saslMechanism.getPriority()) +
604 ") than pinned priority (" + keys.getInt(Account.PINNED_MECHANISM_KEY) +
605 "). Possible downgrade attack?");
606 disconnect(true);
607 changeStatus(Account.State.SECURITY_ERROR);
608 }
609 } catch (final JSONException e) {
610 Log.d(Config.LOGTAG, "Parse error while checking pinned auth mechanism");
611 }
612 Log.d(Config.LOGTAG,account.getJid().toString()+": Authenticating with " + saslMechanism.getMechanism());
613 auth.setAttribute("mechanism", saslMechanism.getMechanism());
614 if (!saslMechanism.getClientFirstMessage().isEmpty()) {
615 auth.setContent(saslMechanism.getClientFirstMessage());
616 }
617 tagWriter.writeElement(auth);
618 } else if (this.streamFeatures.hasChild("sm", "urn:xmpp:sm:"
619 + smVersion)
620 && streamId != null) {
621 ResumePacket resume = new ResumePacket(this.streamId,
622 stanzasReceived, smVersion);
623 this.tagWriter.writeStanzaAsync(resume);
624 } else if (this.streamFeatures.hasChild("bind") && shouldBind) {
625 sendBindRequest();
626 } else {
627 disconnect(true);
628 changeStatus(Account.State.INCOMPATIBLE_SERVER);
629 }
630 }
631
632 private List<String> extractMechanisms(Element stream) {
633 ArrayList<String> mechanisms = new ArrayList<>(stream
634 .getChildren().size());
635 for (Element child : stream.getChildren()) {
636 mechanisms.add(child.getContent());
637 }
638 return mechanisms;
639 }
640
641 private void sendRegistryRequest() {
642 IqPacket register = new IqPacket(IqPacket.TYPE_GET);
643 register.query("jabber:iq:register");
644 register.setTo(account.getServer());
645 sendIqPacket(register, new OnIqPacketReceived() {
646
647 @Override
648 public void onIqPacketReceived(Account account, IqPacket packet) {
649 Element instructions = packet.query().findChild("instructions");
650 if (packet.query().hasChild("username")
651 && (packet.query().hasChild("password"))) {
652 IqPacket register = new IqPacket(IqPacket.TYPE_SET);
653 Element username = new Element("username")
654 .setContent(account.getUsername());
655 Element password = new Element("password")
656 .setContent(account.getPassword());
657 register.query("jabber:iq:register").addChild(username);
658 register.query().addChild(password);
659 sendIqPacket(register, new OnIqPacketReceived() {
660
661 @Override
662 public void onIqPacketReceived(Account account,
663 IqPacket packet) {
664 if (packet.getType() == IqPacket.TYPE_RESULT) {
665 account.setOption(Account.OPTION_REGISTER,
666 false);
667 changeStatus(Account.State.REGISTRATION_SUCCESSFUL);
668 } else if (packet.hasChild("error")
669 && (packet.findChild("error")
670 .hasChild("conflict"))) {
671 changeStatus(Account.State.REGISTRATION_CONFLICT);
672 } else {
673 changeStatus(Account.State.REGISTRATION_FAILED);
674 Log.d(Config.LOGTAG, packet.toString());
675 }
676 disconnect(true);
677 }
678 });
679 } else {
680 changeStatus(Account.State.REGISTRATION_FAILED);
681 disconnect(true);
682 Log.d(Config.LOGTAG, account.getJid().toBareJid()
683 + ": could not register. instructions are"
684 + instructions.getContent());
685 }
686 }
687 });
688 }
689
690 private void sendBindRequest() throws IOException {
691 IqPacket iq = new IqPacket(IqPacket.TYPE_SET);
692 iq.addChild("bind", "urn:ietf:params:xml:ns:xmpp-bind")
693 .addChild("resource").setContent(account.getResource());
694 this.sendUnboundIqPacket(iq, new OnIqPacketReceived() {
695 @Override
696 public void onIqPacketReceived(Account account, IqPacket packet) {
697 Element bind = packet.findChild("bind");
698 if (bind != null) {
699 final Element jid = bind.findChild("jid");
700 if (jid != null && jid.getContent() != null) {
701 try {
702 account.setResource(Jid.fromString(jid.getContent()).getResourcepart());
703 } catch (final InvalidJidException e) {
704 // TODO: Handle the case where an external JID is technically invalid?
705 }
706 if (streamFeatures.hasChild("sm", "urn:xmpp:sm:3")) {
707 smVersion = 3;
708 EnablePacket enable = new EnablePacket(smVersion);
709 tagWriter.writeStanzaAsync(enable);
710 stanzasSent = 0;
711 messageReceipts.clear();
712 } else if (streamFeatures.hasChild("sm",
713 "urn:xmpp:sm:2")) {
714 smVersion = 2;
715 EnablePacket enable = new EnablePacket(smVersion);
716 tagWriter.writeStanzaAsync(enable);
717 stanzasSent = 0;
718 messageReceipts.clear();
719 }
720 enabledCarbons = false;
721 disco.clear();
722 sendServiceDiscoveryInfo(account.getServer());
723 sendServiceDiscoveryItems(account.getServer());
724 if (bindListener != null) {
725 bindListener.onBind(account);
726 }
727 sendInitialPing();
728 } else {
729 disconnect(true);
730 }
731 } else {
732 disconnect(true);
733 }
734 }
735 });
736 if (this.streamFeatures.hasChild("session")) {
737 Log.d(Config.LOGTAG, account.getJid().toBareJid()
738 + ": sending deprecated session");
739 IqPacket startSession = new IqPacket(IqPacket.TYPE_SET);
740 startSession.addChild("session",
741 "urn:ietf:params:xml:ns:xmpp-session");
742 this.sendUnboundIqPacket(startSession, null);
743 }
744 }
745
746 private void sendServiceDiscoveryInfo(final Jid server) {
747 if (disco.containsKey(server.toDomainJid().toString())) {
748 if (account.getServer().equals(server.toDomainJid())) {
749 enableAdvancedStreamFeatures();
750 }
751 } else {
752 final IqPacket iq = new IqPacket(IqPacket.TYPE_GET);
753 iq.setTo(server.toDomainJid());
754 iq.query("http://jabber.org/protocol/disco#info");
755 this.sendIqPacket(iq, new OnIqPacketReceived() {
756
757 @Override
758 public void onIqPacketReceived(Account account, IqPacket packet) {
759 final List<Element> elements = packet.query().getChildren();
760 final List<String> features = new ArrayList<>();
761 for (Element element : elements) {
762 if (element.getName().equals("identity")) {
763 if ("irc".equals(element.getAttribute("type"))) {
764 //add fake feature to not confuse irc and real muc
765 features.add("siacs:no:muc");
766 }
767 } else if (element.getName().equals("feature")) {
768 features.add(element.getAttribute("var"));
769 }
770 }
771 disco.put(server.toDomainJid().toString(), features);
772
773 if (account.getServer().equals(server.toDomainJid())) {
774 enableAdvancedStreamFeatures();
775 for(OnAdvancedStreamFeaturesLoaded listener : advancedStreamFeaturesLoadedListeners) {
776 listener.onAdvancedStreamFeaturesAvailable(account);
777 }
778 }
779 }
780 });
781 }
782 }
783
784 private void enableAdvancedStreamFeatures() {
785 if (getFeatures().carbons()) {
786 if (!enabledCarbons) {
787 sendEnableCarbons();
788 }
789 }
790 }
791
792 private void sendServiceDiscoveryItems(final Jid server) {
793 final IqPacket iq = new IqPacket(IqPacket.TYPE_GET);
794 iq.setTo(server.toDomainJid());
795 iq.query("http://jabber.org/protocol/disco#items");
796 this.sendIqPacket(iq, new OnIqPacketReceived() {
797
798 @Override
799 public void onIqPacketReceived(Account account, IqPacket packet) {
800 List<Element> elements = packet.query().getChildren();
801 for (Element element : elements) {
802 if (element.getName().equals("item")) {
803 final Jid jid = element.getAttributeAsJid("jid");
804 if (jid != null && !jid.equals(account.getServer())) {
805 sendServiceDiscoveryInfo(jid);
806 }
807 }
808 }
809 }
810 });
811 }
812
813 private void sendEnableCarbons() {
814 IqPacket iq = new IqPacket(IqPacket.TYPE_SET);
815 iq.addChild("enable", "urn:xmpp:carbons:2");
816 this.sendIqPacket(iq, new OnIqPacketReceived() {
817
818 @Override
819 public void onIqPacketReceived(Account account, IqPacket packet) {
820 if (!packet.hasChild("error")) {
821 Log.d(Config.LOGTAG, account.getJid().toBareJid()
822 + ": successfully enabled carbons");
823 enabledCarbons = true;
824 } else {
825 Log.d(Config.LOGTAG, account.getJid().toBareJid()
826 + ": error enableing carbons " + packet.toString());
827 }
828 }
829 });
830 }
831
832 private void processStreamError(Tag currentTag)
833 throws XmlPullParserException, IOException {
834 Element streamError = tagReader.readElement(currentTag);
835 if (streamError != null && streamError.hasChild("conflict")) {
836 final String resource = account.getResource().split("\\.")[0];
837 account.setResource(resource + "." + nextRandomId());
838 Log.d(Config.LOGTAG,
839 account.getJid().toBareJid() + ": switching resource due to conflict ("
840 + account.getResource() + ")");
841 }
842 }
843
844 private void sendStartStream() throws IOException {
845 Tag stream = Tag.start("stream:stream");
846 stream.setAttribute("from", account.getJid().toBareJid().toString());
847 stream.setAttribute("to", account.getServer().toString());
848 stream.setAttribute("version", "1.0");
849 stream.setAttribute("xml:lang", "en");
850 stream.setAttribute("xmlns", "jabber:client");
851 stream.setAttribute("xmlns:stream", "http://etherx.jabber.org/streams");
852 tagWriter.writeTag(stream);
853 }
854
855 private String nextRandomId() {
856 return new BigInteger(50, mXmppConnectionService.getRNG()).toString(32);
857 }
858
859 public void sendIqPacket(IqPacket packet, OnIqPacketReceived callback) {
860 if (packet.getId() == null) {
861 String id = nextRandomId();
862 packet.setAttribute("id", id);
863 }
864 packet.setFrom(account.getJid());
865 this.sendPacket(packet, callback);
866 }
867
868 public void sendUnboundIqPacket(IqPacket packet, OnIqPacketReceived callback) {
869 if (packet.getId() == null) {
870 String id = nextRandomId();
871 packet.setAttribute("id", id);
872 }
873 this.sendPacket(packet, callback);
874 }
875
876 public void sendMessagePacket(MessagePacket packet) {
877 this.sendPacket(packet, null);
878 }
879
880 public void sendPresencePacket(PresencePacket packet) {
881 this.sendPacket(packet, null);
882 }
883
884 private synchronized void sendPacket(final AbstractStanza packet,
885 PacketReceived callback) {
886 if (packet.getName().equals("iq") || packet.getName().equals("message")
887 || packet.getName().equals("presence")) {
888 ++stanzasSent;
889 }
890 tagWriter.writeStanzaAsync(packet);
891 if (packet instanceof MessagePacket && packet.getId() != null
892 && this.streamId != null) {
893 Log.d(Config.LOGTAG, "request delivery report for stanza "
894 + stanzasSent);
895 this.messageReceipts.put(stanzasSent, packet.getId());
896 tagWriter.writeStanzaAsync(new RequestPacket(this.smVersion));
897 }
898 if (callback != null) {
899 if (packet.getId() == null) {
900 packet.setId(nextRandomId());
901 }
902 packetCallbacks.put(packet.getId(), callback);
903 }
904 }
905
906 public void sendPing() {
907 if (streamFeatures.hasChild("sm")) {
908 tagWriter.writeStanzaAsync(new RequestPacket(smVersion));
909 } else {
910 IqPacket iq = new IqPacket(IqPacket.TYPE_GET);
911 iq.setFrom(account.getJid());
912 iq.addChild("ping", "urn:xmpp:ping");
913 this.sendIqPacket(iq, null);
914 }
915 this.lastPingSent = SystemClock.elapsedRealtime();
916 }
917
918 public void setOnMessagePacketReceivedListener(
919 OnMessagePacketReceived listener) {
920 this.messageListener = listener;
921 }
922
923 public void setOnUnregisteredIqPacketReceivedListener(
924 OnIqPacketReceived listener) {
925 this.unregisteredIqListener = listener;
926 }
927
928 public void setOnPresencePacketReceivedListener(
929 OnPresencePacketReceived listener) {
930 this.presenceListener = listener;
931 }
932
933 public void setOnJinglePacketReceivedListener(
934 OnJinglePacketReceived listener) {
935 this.jingleListener = listener;
936 }
937
938 public void setOnStatusChangedListener(OnStatusChanged listener) {
939 this.statusListener = listener;
940 }
941
942 public void setOnBindListener(OnBindListener listener) {
943 this.bindListener = listener;
944 }
945
946 public void setOnMessageAcknowledgeListener(OnMessageAcknowledged listener) {
947 this.acknowledgedListener = listener;
948 }
949
950 public void addOnAdvancedStreamFeaturesAvailableListener(OnAdvancedStreamFeaturesLoaded listener) {
951 if (!this.advancedStreamFeaturesLoadedListeners.contains(listener)) {
952 this.advancedStreamFeaturesLoadedListeners.add(listener);
953 }
954 }
955
956 public void disconnect(boolean force) {
957 Log.d(Config.LOGTAG, account.getJid().toBareJid() + ": disconnecting");
958 try {
959 if (force) {
960 socket.close();
961 return;
962 }
963 new Thread(new Runnable() {
964
965 @Override
966 public void run() {
967 if (tagWriter.isActive()) {
968 tagWriter.finish();
969 try {
970 while (!tagWriter.finished()) {
971 Log.d(Config.LOGTAG, "not yet finished");
972 Thread.sleep(100);
973 }
974 tagWriter.writeTag(Tag.end("stream:stream"));
975 socket.close();
976 } catch (IOException e) {
977 Log.d(Config.LOGTAG,
978 "io exception during disconnect");
979 } catch (InterruptedException e) {
980 Log.d(Config.LOGTAG, "interrupted");
981 }
982 }
983 }
984 }).start();
985 } catch (IOException e) {
986 Log.d(Config.LOGTAG, "io exception during disconnect");
987 }
988 }
989
990 public List<String> findDiscoItemsByFeature(String feature) {
991 final List<String> items = new ArrayList<>();
992 for (Entry<String, List<String>> cursor : disco.entrySet()) {
993 if (cursor.getValue().contains(feature)) {
994 items.add(cursor.getKey());
995 }
996 }
997 return items;
998 }
999
1000 public String findDiscoItemByFeature(String feature) {
1001 List<String> items = findDiscoItemsByFeature(feature);
1002 if (items.size() >= 1) {
1003 return items.get(0);
1004 }
1005 return null;
1006 }
1007
1008 public void r() {
1009 this.tagWriter.writeStanzaAsync(new RequestPacket(smVersion));
1010 }
1011
1012 public String getMucServer() {
1013 final List<String> items = new ArrayList<>();
1014 for (Entry<String, List<String>> cursor : disco.entrySet()) {
1015 final List<String> value = cursor.getValue();
1016 if (value.contains("http://jabber.org/protocol/muc") && !value.contains("jabber:iq:gateway") && !value.contains("siacs:no:muc")) {
1017 return cursor.getKey();
1018 }
1019 }
1020 return null;
1021 }
1022
1023 public int getTimeToNextAttempt() {
1024 int interval = (int) (25 * Math.pow(1.5, attempt));
1025 int secondsSinceLast = (int) ((SystemClock.elapsedRealtime() - this.lastConnect) / 1000);
1026 return interval - secondsSinceLast;
1027 }
1028
1029 public int getAttempt() {
1030 return this.attempt;
1031 }
1032
1033 public Features getFeatures() {
1034 return this.features;
1035 }
1036
1037 public long getLastSessionEstablished() {
1038 long diff;
1039 if (this.lastSessionStarted == 0) {
1040 diff = SystemClock.elapsedRealtime() - this.lastConnect;
1041 } else {
1042 diff = SystemClock.elapsedRealtime() - this.lastSessionStarted;
1043 }
1044 return System.currentTimeMillis() - diff;
1045 }
1046
1047 public long getLastConnect() {
1048 return this.lastConnect;
1049 }
1050
1051 public long getLastPingSent() {
1052 return this.lastPingSent;
1053 }
1054
1055 public long getLastPacketReceived() {
1056 return this.lastPaketReceived;
1057 }
1058
1059 public void sendActive() {
1060 this.sendPacket(new ActivePacket(), null);
1061 }
1062
1063 public void sendInactive() {
1064 this.sendPacket(new InactivePacket(), null);
1065 }
1066
1067 public class Features {
1068 XmppConnection connection;
1069
1070 public Features(XmppConnection connection) {
1071 this.connection = connection;
1072 }
1073
1074 private boolean hasDiscoFeature(final Jid server, final String feature) {
1075 return connection.disco.containsKey(server.toDomainJid().toString()) &&
1076 connection.disco.get(server.toDomainJid().toString()).contains(feature);
1077 }
1078
1079 public boolean carbons() {
1080 return hasDiscoFeature(account.getServer(), "urn:xmpp:carbons:2");
1081 }
1082
1083 public boolean sm() {
1084 return streamId != null;
1085 }
1086
1087 public boolean csi() {
1088 return connection.streamFeatures != null && connection.streamFeatures.hasChild("csi", "urn:xmpp:csi:0");
1089 }
1090
1091 public boolean pubsub() {
1092 return hasDiscoFeature(account.getServer(),
1093 "http://jabber.org/protocol/pubsub#publish");
1094 }
1095
1096 public boolean mam() {
1097 return hasDiscoFeature(account.getServer(), "urn:xmpp:mam:0");
1098 }
1099
1100 public boolean advancedStreamFeaturesLoaded() {
1101 return disco.containsKey(account.getServer().toString());
1102 }
1103
1104 public boolean rosterVersioning() {
1105 return connection.streamFeatures != null && connection.streamFeatures.hasChild("ver");
1106 }
1107
1108 public boolean streamhost() {
1109 return connection
1110 .findDiscoItemByFeature("http://jabber.org/protocol/bytestreams") != null;
1111 }
1112 }
1113}