1package eu.siacs.conversations.ui;
2
3import android.app.AlertDialog;
4import android.content.Intent;
5import android.os.Bundle;
6import android.util.Log;
7import android.view.Gravity;
8import android.view.Menu;
9import android.view.MenuItem;
10import android.view.View;
11import android.view.View.OnClickListener;
12import android.widget.Toast;
13
14import androidx.appcompat.app.ActionBar;
15import androidx.databinding.DataBindingUtil;
16
17import org.whispersystems.libsignal.IdentityKey;
18
19import java.util.ArrayList;
20import java.util.HashMap;
21import java.util.List;
22import java.util.Map;
23import java.util.Set;
24import java.util.concurrent.atomic.AtomicBoolean;
25
26import eu.siacs.conversations.Config;
27import eu.siacs.conversations.R;
28import eu.siacs.conversations.crypto.OmemoSetting;
29import eu.siacs.conversations.crypto.axolotl.AxolotlService;
30import eu.siacs.conversations.crypto.axolotl.FingerprintStatus;
31import eu.siacs.conversations.databinding.ActivityTrustKeysBinding;
32import eu.siacs.conversations.databinding.KeysCardBinding;
33import eu.siacs.conversations.entities.Account;
34import eu.siacs.conversations.entities.Contact;
35import eu.siacs.conversations.entities.Conversation;
36import eu.siacs.conversations.entities.Message;
37import eu.siacs.conversations.utils.CryptoHelper;
38import eu.siacs.conversations.utils.IrregularUnicodeDetector;
39import eu.siacs.conversations.utils.XmppUri;
40import eu.siacs.conversations.xmpp.Jid;
41import eu.siacs.conversations.xmpp.OnKeyStatusUpdated;
42
43
44public class TrustKeysActivity extends OmemoActivity implements OnKeyStatusUpdated {
45 private final Map<String, Boolean> ownKeysToTrust = new HashMap<>();
46 private final Map<Jid, Map<String, Boolean>> foreignKeysToTrust = new HashMap<>();
47 private final OnClickListener mCancelButtonListener = v -> {
48 setResult(RESULT_CANCELED);
49 finish();
50 };
51 private List<Jid> contactJids;
52 private Account mAccount;
53 private Conversation mConversation;
54 private final OnClickListener mSaveButtonListener = v -> {
55 commitTrusts();
56 finishOk(false);
57 };
58 private final AtomicBoolean mUseCameraHintShown = new AtomicBoolean(false);
59 private AxolotlService.FetchStatus lastFetchReport = AxolotlService.FetchStatus.SUCCESS;
60 private Toast mUseCameraHintToast = null;
61 private ActivityTrustKeysBinding binding;
62
63 @Override
64 protected void refreshUiReal() {
65 invalidateOptionsMenu();
66 populateView();
67 }
68
69 @Override
70 protected void onCreate(final Bundle savedInstanceState) {
71 super.onCreate(savedInstanceState);
72 this.binding = DataBindingUtil.setContentView(this, R.layout.activity_trust_keys);
73 this.contactJids = new ArrayList<>();
74 for (String jid : getIntent().getStringArrayExtra("contacts")) {
75 try {
76 this.contactJids.add(Jid.of(jid));
77 } catch (IllegalArgumentException e) {
78 e.printStackTrace();
79 }
80 }
81
82 binding.cancelButton.setOnClickListener(mCancelButtonListener);
83 binding.saveButton.setOnClickListener(mSaveButtonListener);
84
85 setSupportActionBar(binding.toolbar);
86 configureActionBar(getSupportActionBar());
87
88 if (savedInstanceState != null) {
89 mUseCameraHintShown.set(savedInstanceState.getBoolean("camera_hint_shown", false));
90 }
91 }
92
93 @Override
94 public void onSaveInstanceState(Bundle savedInstanceState) {
95 savedInstanceState.putBoolean("camera_hint_shown", mUseCameraHintShown.get());
96 super.onSaveInstanceState(savedInstanceState);
97 }
98
99 @Override
100 public boolean onCreateOptionsMenu(Menu menu) {
101 getMenuInflater().inflate(R.menu.trust_keys, menu);
102 MenuItem scanQrCode = menu.findItem(R.id.action_scan_qr_code);
103 scanQrCode.setVisible((ownKeysToTrust.size() > 0 || foreignActuallyHasKeys()) && isCameraFeatureAvailable());
104 return super.onCreateOptionsMenu(menu);
105 }
106
107 private void showCameraToast() {
108 mUseCameraHintToast = Toast.makeText(this, R.string.use_camera_icon_to_scan_barcode, Toast.LENGTH_LONG);
109 ActionBar actionBar = getSupportActionBar();
110 mUseCameraHintToast.setGravity(Gravity.TOP | Gravity.END, 0, actionBar == null ? 0 : actionBar.getHeight());
111 mUseCameraHintToast.show();
112 }
113
114 @Override
115 public boolean onOptionsItemSelected(MenuItem item) {
116 switch (item.getItemId()) {
117 case R.id.action_scan_qr_code:
118 if (hasPendingKeyFetches()) {
119 Toast.makeText(this, R.string.please_wait_for_keys_to_be_fetched, Toast.LENGTH_SHORT).show();
120 } else {
121 ScanActivity.scan(this);
122 //new IntentIntegrator(this).initiateScan(Arrays.asList("AZTEC","QR_CODE"));
123 return true;
124 }
125 }
126 return super.onOptionsItemSelected(item);
127 }
128
129 @Override
130 protected void onStop() {
131 super.onStop();
132 if (mUseCameraHintToast != null) {
133 mUseCameraHintToast.cancel();
134 }
135 }
136
137 @Override
138 protected void processFingerprintVerification(XmppUri uri) {
139 if (mConversation != null
140 && mAccount != null
141 && uri.hasFingerprints()
142 && mAccount.getAxolotlService().getCryptoTargets(mConversation).contains(uri.getJid())) {
143 boolean performedVerification = xmppConnectionService.verifyFingerprints(mAccount.getRoster().getContact(uri.getJid()), uri.getFingerprints());
144 boolean keys = reloadFingerprints();
145 if (performedVerification && !keys && !hasNoOtherTrustedKeys() && !hasPendingKeyFetches()) {
146 Toast.makeText(this, R.string.all_omemo_keys_have_been_verified, Toast.LENGTH_SHORT).show();
147 finishOk(false);
148 return;
149 } else if (performedVerification) {
150 Toast.makeText(this, R.string.verified_fingerprints, Toast.LENGTH_SHORT).show();
151 }
152 } else {
153 reloadFingerprints();
154 Log.d(Config.LOGTAG, "xmpp uri was: " + uri.getJid() + " has Fingerprints: " + uri.hasFingerprints());
155 Toast.makeText(this, R.string.barcode_does_not_contain_fingerprints_for_this_conversation, Toast.LENGTH_SHORT).show();
156 }
157 populateView();
158 }
159
160 private void populateView() {
161 setTitle(getString(R.string.trust_omemo_fingerprints));
162 binding.ownKeysDetails.removeAllViews();
163 binding.foreignKeys.removeAllViews();
164 boolean hasOwnKeys = false;
165 boolean hasForeignKeys = false;
166 for (final String fingerprint : ownKeysToTrust.keySet()) {
167 hasOwnKeys = true;
168 addFingerprintRowWithListeners(binding.ownKeysDetails, mAccount, fingerprint, false,
169 FingerprintStatus.createActive(ownKeysToTrust.get(fingerprint)), false, false,
170 (buttonView, isChecked) -> {
171 ownKeysToTrust.put(fingerprint, isChecked);
172 // own fingerprints have no impact on locked status.
173 }
174 );
175 }
176
177 synchronized (this.foreignKeysToTrust) {
178 for (Map.Entry<Jid, Map<String, Boolean>> entry : foreignKeysToTrust.entrySet()) {
179 hasForeignKeys = true;
180 KeysCardBinding keysCardBinding = DataBindingUtil.inflate(getLayoutInflater(), R.layout.keys_card, binding.foreignKeys, false);
181 final Jid jid = entry.getKey();
182 keysCardBinding.foreignKeysTitle.setText(IrregularUnicodeDetector.style(this, jid));
183 keysCardBinding.foreignKeysTitle.setOnClickListener(v -> switchToContactDetails(mAccount.getRoster().getContact(jid)));
184 final Map<String, Boolean> fingerprints = entry.getValue();
185 for (final String fingerprint : fingerprints.keySet()) {
186 addFingerprintRowWithListeners(keysCardBinding.foreignKeysDetails, mAccount, fingerprint, false,
187 FingerprintStatus.createActive(fingerprints.get(fingerprint)), false, false,
188 (buttonView, isChecked) -> {
189 fingerprints.put(fingerprint, isChecked);
190 lockOrUnlockAsNeeded();
191 }
192 );
193 }
194 if (fingerprints.size() == 0) {
195 keysCardBinding.noKeysToAccept.setVisibility(View.VISIBLE);
196 if (hasNoOtherTrustedKeys(jid)) {
197 if (!mAccount.getRoster().getContact(jid).mutualPresenceSubscription()) {
198 keysCardBinding.noKeysToAccept.setText(R.string.error_no_keys_to_trust_presence);
199 } else {
200 keysCardBinding.noKeysToAccept.setText(R.string.error_no_keys_to_trust_server_error);
201 }
202 } else {
203 keysCardBinding.noKeysToAccept.setText(getString(R.string.no_keys_just_confirm, mAccount.getRoster().getContact(jid).getDisplayName()));
204 }
205 } else {
206 keysCardBinding.noKeysToAccept.setVisibility(View.GONE);
207 }
208 binding.foreignKeys.addView(keysCardBinding.foreignKeysCard);
209 }
210 }
211
212 if ((hasOwnKeys || foreignActuallyHasKeys()) && isCameraFeatureAvailable() && mUseCameraHintShown.compareAndSet(false, true)) {
213 showCameraToast();
214 }
215
216 binding.ownKeysTitle.setText(mAccount.getJid().asBareJid().toEscapedString());
217 binding.ownKeysCard.setVisibility(hasOwnKeys ? View.VISIBLE : View.GONE);
218 binding.foreignKeys.setVisibility(hasForeignKeys ? View.VISIBLE : View.GONE);
219 if (hasPendingKeyFetches()) {
220 setFetching();
221 lock();
222 } else {
223 if (!hasForeignKeys && hasNoOtherTrustedKeys()) {
224 binding.keyErrorMessageCard.setVisibility(View.VISIBLE);
225 boolean lastReportWasError = lastFetchReport == AxolotlService.FetchStatus.ERROR;
226 boolean errorFetchingBundle = mAccount.getAxolotlService().fetchMapHasErrors(contactJids);
227 boolean errorFetchingDeviceList = mAccount.getAxolotlService().hasErrorFetchingDeviceList(contactJids);
228 boolean anyWithoutMutualPresenceSubscription = anyWithoutMutualPresenceSubscription(contactJids);
229 if (errorFetchingDeviceList) {
230 binding.keyErrorMessage.setVisibility(View.VISIBLE);
231 binding.keyErrorMessage.setText(R.string.error_trustkey_device_list);
232 } else if (errorFetchingBundle || lastReportWasError) {
233 binding.keyErrorMessage.setVisibility(View.VISIBLE);
234 binding.keyErrorMessage.setText(R.string.error_trustkey_bundle);
235 } else {
236 binding.keyErrorMessage.setVisibility(View.GONE);
237 }
238 this.binding.keyErrorHintMutual.setVisibility(anyWithoutMutualPresenceSubscription ? View.VISIBLE : View.GONE);
239 Contact contact = mAccount.getRoster().getContact(contactJids.get(0));
240 binding.keyErrorGeneral.setText(getString(R.string.error_trustkey_general, getString(R.string.app_name), contact.getDisplayName()));
241 binding.ownKeysDetails.removeAllViews();
242 if (OmemoSetting.isAlways()) {
243 binding.disableButton.setVisibility(View.GONE);
244 } else {
245 binding.disableButton.setVisibility(View.VISIBLE);
246 binding.disableButton.setOnClickListener(this::disableEncryptionDialog);
247 }
248 binding.ownKeysCard.setVisibility(View.GONE);
249 binding.foreignKeys.removeAllViews();
250 binding.foreignKeys.setVisibility(View.GONE);
251 }
252 lockOrUnlockAsNeeded();
253 setDone();
254 }
255 }
256
257 private void disableEncryptionDialog(View view) {
258 AlertDialog.Builder builder = new AlertDialog.Builder(this);
259 builder.setTitle(R.string.disable_encryption);
260 builder.setMessage(R.string.disable_encryption_message);
261 builder.setPositiveButton(R.string.disable_now, (dialog, which) -> {
262 mConversation.setNextEncryption(Message.ENCRYPTION_NONE);
263 xmppConnectionService.updateConversation(mConversation);
264 finishOk(true);
265 });
266 builder.setNegativeButton(R.string.cancel, null);
267 builder.create().show();
268 }
269
270 private boolean anyWithoutMutualPresenceSubscription(List<Jid> contactJids) {
271 for (Jid jid : contactJids) {
272 if (!mAccount.getRoster().getContact(jid).mutualPresenceSubscription()) {
273 return true;
274 }
275 }
276 return false;
277 }
278
279 private boolean foreignActuallyHasKeys() {
280 synchronized (this.foreignKeysToTrust) {
281 for (Map.Entry<Jid, Map<String, Boolean>> entry : foreignKeysToTrust.entrySet()) {
282 if (entry.getValue().size() > 0) {
283 return true;
284 }
285 }
286 }
287 return false;
288 }
289
290 private boolean reloadFingerprints() {
291 List<Jid> acceptedTargets = mConversation == null ? new ArrayList<>() : mConversation.getAcceptedCryptoTargets();
292 ownKeysToTrust.clear();
293 if (this.mAccount == null) {
294 return false;
295 }
296 AxolotlService service = this.mAccount.getAxolotlService();
297 Set<IdentityKey> ownKeysSet = service.getKeysWithTrust(FingerprintStatus.createActiveUndecided());
298 for (final IdentityKey identityKey : ownKeysSet) {
299 final String fingerprint = CryptoHelper.bytesToHex(identityKey.getPublicKey().serialize());
300 if (!ownKeysToTrust.containsKey(fingerprint)) {
301 ownKeysToTrust.put(fingerprint, false);
302 }
303 }
304 synchronized (this.foreignKeysToTrust) {
305 foreignKeysToTrust.clear();
306 for (Jid jid : contactJids) {
307 Set<IdentityKey> foreignKeysSet = service.getKeysWithTrust(FingerprintStatus.createActiveUndecided(), jid);
308 if (hasNoOtherTrustedKeys(jid) && ownKeysSet.size() == 0) {
309 foreignKeysSet.addAll(service.getKeysWithTrust(FingerprintStatus.createActive(false), jid));
310 }
311 Map<String, Boolean> foreignFingerprints = new HashMap<>();
312 for (final IdentityKey identityKey : foreignKeysSet) {
313 final String fingerprint = CryptoHelper.bytesToHex(identityKey.getPublicKey().serialize());
314 if (!foreignFingerprints.containsKey(fingerprint)) {
315 foreignFingerprints.put(fingerprint, false);
316 }
317 }
318 if (foreignFingerprints.size() > 0 || !acceptedTargets.contains(jid)) {
319 foreignKeysToTrust.put(jid, foreignFingerprints);
320 }
321 }
322 }
323 return ownKeysSet.size() + foreignKeysToTrust.size() > 0;
324 }
325
326 public void onBackendConnected() {
327 Intent intent = getIntent();
328 this.mAccount = extractAccount(intent);
329 if (this.mAccount != null && intent != null) {
330 String uuid = intent.getStringExtra("conversation");
331 this.mConversation = xmppConnectionService.findConversationByUuid(uuid);
332 if (this.mPendingFingerprintVerificationUri != null) {
333 processFingerprintVerification(this.mPendingFingerprintVerificationUri);
334 this.mPendingFingerprintVerificationUri = null;
335 } else {
336 final boolean keysToTrust = reloadFingerprints();
337 if (keysToTrust || hasPendingKeyFetches() || hasNoOtherTrustedKeys()) {
338 populateView();
339 invalidateOptionsMenu();
340 } else {
341 finishOk(false);
342 }
343 }
344 }
345 }
346
347 private boolean hasNoOtherTrustedKeys() {
348 return mAccount == null || mAccount.getAxolotlService().anyTargetHasNoTrustedKeys(contactJids);
349 }
350
351 private boolean hasNoOtherTrustedKeys(Jid contact) {
352 return mAccount == null || mAccount.getAxolotlService().getNumTrustedKeys(contact) == 0;
353 }
354
355 private boolean hasPendingKeyFetches() {
356 return mAccount != null && mAccount.getAxolotlService().hasPendingKeyFetches(contactJids);
357 }
358
359
360 @Override
361 public void onKeyStatusUpdated(final AxolotlService.FetchStatus report) {
362 final boolean keysToTrust = reloadFingerprints();
363 if (report != null) {
364 lastFetchReport = report;
365 runOnUiThread(() -> {
366 if (mUseCameraHintToast != null && !keysToTrust) {
367 mUseCameraHintToast.cancel();
368 }
369 switch (report) {
370 case ERROR:
371 Toast.makeText(TrustKeysActivity.this, R.string.error_fetching_omemo_key, Toast.LENGTH_SHORT).show();
372 break;
373 case SUCCESS_TRUSTED:
374 Toast.makeText(TrustKeysActivity.this, R.string.blindly_trusted_omemo_keys, Toast.LENGTH_LONG).show();
375 break;
376 case SUCCESS_VERIFIED:
377 Toast.makeText(TrustKeysActivity.this,
378 Config.X509_VERIFICATION ? R.string.verified_omemo_key_with_certificate : R.string.all_omemo_keys_have_been_verified,
379 Toast.LENGTH_LONG).show();
380 break;
381 }
382 });
383
384 }
385 if (keysToTrust || hasPendingKeyFetches() || hasNoOtherTrustedKeys()) {
386 refreshUi();
387 } else {
388 runOnUiThread(() -> finishOk(false));
389
390 }
391 }
392
393 private void finishOk(boolean disabled) {
394 Intent data = new Intent();
395 data.putExtra("choice", getIntent().getIntExtra("choice", ConversationFragment.ATTACHMENT_CHOICE_INVALID));
396 data.putExtra("disabled", disabled);
397 setResult(RESULT_OK, data);
398 finish();
399 }
400
401 private void commitTrusts() {
402 for (final String fingerprint : ownKeysToTrust.keySet()) {
403 mAccount.getAxolotlService().setFingerprintTrust(
404 fingerprint,
405 FingerprintStatus.createActive(ownKeysToTrust.get(fingerprint)));
406 }
407 List<Jid> acceptedTargets = mConversation == null ? new ArrayList<>() : mConversation.getAcceptedCryptoTargets();
408 synchronized (this.foreignKeysToTrust) {
409 for (Map.Entry<Jid, Map<String, Boolean>> entry : foreignKeysToTrust.entrySet()) {
410 Jid jid = entry.getKey();
411 Map<String, Boolean> value = entry.getValue();
412 if (!acceptedTargets.contains(jid)) {
413 acceptedTargets.add(jid);
414 }
415 for (final String fingerprint : value.keySet()) {
416 mAccount.getAxolotlService().setFingerprintTrust(
417 fingerprint,
418 FingerprintStatus.createActive(value.get(fingerprint)));
419 }
420 }
421 }
422 if (mConversation != null && mConversation.getMode() == Conversation.MODE_MULTI) {
423 mConversation.setAcceptedCryptoTargets(acceptedTargets);
424 xmppConnectionService.updateConversation(mConversation);
425 }
426 }
427
428 private void unlock() {
429 binding.saveButton.setEnabled(true);
430 }
431
432 private void lock() {
433 binding.saveButton.setEnabled(false);
434 }
435
436 private void lockOrUnlockAsNeeded() {
437 synchronized (this.foreignKeysToTrust) {
438 for (Jid jid : contactJids) {
439 Map<String, Boolean> fingerprints = foreignKeysToTrust.get(jid);
440 if (hasNoOtherTrustedKeys(jid) && (fingerprints == null || !fingerprints.containsValue(true))) {
441 lock();
442 return;
443 }
444 }
445 }
446 unlock();
447
448 }
449
450 private void setDone() {
451 binding.saveButton.setText(getString(R.string.done));
452 }
453
454 private void setFetching() {
455 binding.saveButton.setText(getString(R.string.fetching_keys));
456 }
457}