TrustKeysActivity.java

  1package eu.siacs.conversations.ui;
  2
  3import android.content.Intent;
  4import android.databinding.DataBindingUtil;
  5import android.os.Bundle;
  6import android.support.v7.app.ActionBar;
  7import android.util.Log;
  8import android.view.Gravity;
  9import android.view.Menu;
 10import android.view.MenuItem;
 11import android.view.View;
 12import android.view.View.OnClickListener;
 13import android.widget.Button;
 14import android.widget.CompoundButton;
 15import android.widget.LinearLayout;
 16import android.widget.TextView;
 17import android.widget.Toast;
 18
 19import org.whispersystems.libsignal.IdentityKey;
 20
 21import java.util.ArrayList;
 22import java.util.Arrays;
 23import java.util.HashMap;
 24import java.util.List;
 25import java.util.Map;
 26import java.util.Set;
 27import java.util.concurrent.atomic.AtomicBoolean;
 28
 29import eu.siacs.conversations.Config;
 30import eu.siacs.conversations.R;
 31import eu.siacs.conversations.crypto.axolotl.AxolotlService;
 32import eu.siacs.conversations.crypto.axolotl.FingerprintStatus;
 33import eu.siacs.conversations.databinding.ActivityTrustKeysBinding;
 34import eu.siacs.conversations.databinding.KeysCardBinding;
 35import eu.siacs.conversations.entities.Account;
 36import eu.siacs.conversations.entities.Conversation;
 37import eu.siacs.conversations.utils.CryptoHelper;
 38import eu.siacs.conversations.utils.XmppUri;
 39import eu.siacs.conversations.xmpp.OnKeyStatusUpdated;
 40import eu.siacs.conversations.xmpp.jid.InvalidJidException;
 41import eu.siacs.conversations.xmpp.jid.Jid;
 42
 43
 44public class TrustKeysActivity extends OmemoActivity implements OnKeyStatusUpdated {
 45	private List<Jid> contactJids;
 46
 47	private Account mAccount;
 48	private Conversation mConversation;
 49
 50	private AtomicBoolean mUseCameraHintShown = new AtomicBoolean(false);
 51
 52	private AxolotlService.FetchStatus lastFetchReport = AxolotlService.FetchStatus.SUCCESS;
 53
 54	private final Map<String, Boolean> ownKeysToTrust = new HashMap<>();
 55	private final Map<Jid,Map<String, Boolean>> foreignKeysToTrust = new HashMap<>();
 56
 57	private final OnClickListener mSaveButtonListener = new OnClickListener() {
 58		@Override
 59		public void onClick(View v) {
 60			commitTrusts();
 61			finishOk();
 62		}
 63	};
 64
 65	private final OnClickListener mCancelButtonListener = new OnClickListener() {
 66		@Override
 67		public void onClick(View v) {
 68			setResult(RESULT_CANCELED);
 69			finish();
 70		}
 71	};
 72	private Toast mUseCameraHintToast = null;
 73	private ActivityTrustKeysBinding binding;
 74
 75	@Override
 76	protected void refreshUiReal() {
 77		invalidateOptionsMenu();
 78		populateView();
 79	}
 80
 81	@Override
 82	protected void onCreate(final Bundle savedInstanceState) {
 83		super.onCreate(savedInstanceState);
 84		this.binding = DataBindingUtil.setContentView(this,R.layout.activity_trust_keys);
 85		this.contactJids = new ArrayList<>();
 86		for(String jid : getIntent().getStringArrayExtra("contacts")) {
 87			try {
 88				this.contactJids.add(Jid.fromString(jid));
 89			} catch (InvalidJidException e) {
 90				e.printStackTrace();
 91			}
 92		}
 93
 94		binding.cancelButton.setOnClickListener(mCancelButtonListener);
 95		binding.saveButton.setOnClickListener(mSaveButtonListener);
 96
 97
 98		if (getSupportActionBar() != null) {
 99			getSupportActionBar().setHomeButtonEnabled(true);
100			getSupportActionBar().setDisplayHomeAsUpEnabled(true);
101		}
102
103		if (savedInstanceState != null) {
104			mUseCameraHintShown.set(savedInstanceState.getBoolean("camera_hint_shown",false));
105		}
106	}
107
108	@Override
109	public void onSaveInstanceState(Bundle savedInstanceState) {
110		savedInstanceState.putBoolean("camera_hint_shown", mUseCameraHintShown.get());
111		super.onSaveInstanceState(savedInstanceState);
112	}
113
114	@Override
115	public boolean onCreateOptionsMenu(Menu menu) {
116		getMenuInflater().inflate(R.menu.trust_keys, menu);
117		MenuItem scanQrCode = menu.findItem(R.id.action_scan_qr_code);
118		scanQrCode.setVisible(ownKeysToTrust.size() > 0 || foreignActuallyHasKeys());
119		return super.onCreateOptionsMenu(menu);
120	}
121
122	private void showCameraToast() {
123		mUseCameraHintToast = Toast.makeText(this,R.string.use_camera_icon_to_scan_barcode,Toast.LENGTH_LONG);
124		ActionBar actionBar = getSupportActionBar();
125		mUseCameraHintToast.setGravity(Gravity.TOP | Gravity.END, 0 ,actionBar == null ? 0 : actionBar.getHeight());
126		mUseCameraHintToast.show();
127	}
128
129	@Override
130	public boolean onOptionsItemSelected(MenuItem item) {
131		switch (item.getItemId()) {
132			case R.id.action_scan_qr_code:
133				if (hasPendingKeyFetches()) {
134					Toast.makeText(this, R.string.please_wait_for_keys_to_be_fetched, Toast.LENGTH_SHORT).show();
135				} else {
136					ScanActivity.scan(this);
137					//new IntentIntegrator(this).initiateScan(Arrays.asList("AZTEC","QR_CODE"));
138					return true;
139				}
140		}
141		return super.onOptionsItemSelected(item);
142	}
143
144	@Override
145	protected void onStop() {
146		super.onStop();
147		if (mUseCameraHintToast != null) {
148			mUseCameraHintToast.cancel();
149		}
150	}
151
152	@Override
153	protected void processFingerprintVerification(XmppUri uri) {
154		if (mConversation != null
155				&& mAccount != null
156				&& uri.hasFingerprints()
157				&& mAccount.getAxolotlService().getCryptoTargets(mConversation).contains(uri.getJid())) {
158			boolean performedVerification = xmppConnectionService.verifyFingerprints(mAccount.getRoster().getContact(uri.getJid()),uri.getFingerprints());
159			boolean keys = reloadFingerprints();
160			if (performedVerification && !keys && !hasNoOtherTrustedKeys() && !hasPendingKeyFetches()) {
161				Toast.makeText(this,R.string.all_omemo_keys_have_been_verified, Toast.LENGTH_SHORT).show();
162				finishOk();
163				return;
164			} else if (performedVerification) {
165				Toast.makeText(this,R.string.verified_fingerprints,Toast.LENGTH_SHORT).show();
166			}
167		} else {
168			reloadFingerprints();
169			Log.d(Config.LOGTAG,"xmpp uri was: "+uri.getJid()+" has Fingerprints: "+Boolean.toString(uri.hasFingerprints()));
170			Toast.makeText(this,R.string.barcode_does_not_contain_fingerprints_for_this_conversation,Toast.LENGTH_SHORT).show();
171		}
172		populateView();
173	}
174
175	private void populateView() {
176		setTitle(getString(R.string.trust_omemo_fingerprints));
177		binding.ownKeysDetails.removeAllViews();
178		binding.foreignKeys.removeAllViews();
179		boolean hasOwnKeys = false;
180		boolean hasForeignKeys = false;
181		for(final String fingerprint : ownKeysToTrust.keySet()) {
182			hasOwnKeys = true;
183			addFingerprintRowWithListeners(binding.ownKeysDetails, mAccount, fingerprint, false,
184					FingerprintStatus.createActive(ownKeysToTrust.get(fingerprint)), false, false,
185					new CompoundButton.OnCheckedChangeListener() {
186						@Override
187						public void onCheckedChanged(CompoundButton buttonView, boolean isChecked) {
188							ownKeysToTrust.put(fingerprint, isChecked);
189							// own fingerprints have no impact on locked status.
190						}
191					}
192			);
193		}
194
195		synchronized (this.foreignKeysToTrust) {
196			for (Map.Entry<Jid, Map<String, Boolean>> entry : foreignKeysToTrust.entrySet()) {
197				hasForeignKeys = true;
198				KeysCardBinding keysCardBinding =  DataBindingUtil.inflate(getLayoutInflater(),R.layout.keys_card, binding.foreignKeys,false);
199				//final LinearLayout layout = (LinearLayout) getLayoutInflater().inflate(R.layout.keys_card, foreignKeys, false);
200				final Jid jid = entry.getKey();
201				keysCardBinding.foreignKeysTitle.setText(jid.toString());
202				keysCardBinding.foreignKeysTitle.setOnClickListener(v -> switchToContactDetails(mAccount.getRoster().getContact(jid)));
203				final Map<String, Boolean> fingerprints = entry.getValue();
204				for (final String fingerprint : fingerprints.keySet()) {
205					addFingerprintRowWithListeners(keysCardBinding.foreignKeysDetails, mAccount, fingerprint, false,
206							FingerprintStatus.createActive(fingerprints.get(fingerprint)), false, false,
207							(buttonView, isChecked) -> {
208								fingerprints.put(fingerprint, isChecked);
209								lockOrUnlockAsNeeded();
210							}
211					);
212				}
213				if (fingerprints.size() == 0) {
214					keysCardBinding.noKeysToAccept.setVisibility(View.VISIBLE);
215					if (hasNoOtherTrustedKeys(jid)) {
216						if (!mAccount.getRoster().getContact(jid).mutualPresenceSubscription()) {
217							keysCardBinding.noKeysToAccept.setText(R.string.error_no_keys_to_trust_presence);
218						} else {
219							keysCardBinding.noKeysToAccept.setText(R.string.error_no_keys_to_trust_server_error);
220						}
221					} else {
222						keysCardBinding.noKeysToAccept.setText(getString(R.string.no_keys_just_confirm, mAccount.getRoster().getContact(jid).getDisplayName()));
223					}
224				} else {
225					keysCardBinding.noKeysToAccept.setVisibility(View.GONE);
226				}
227				binding.foreignKeys.addView(keysCardBinding.foreignKeysCard);
228			}
229		}
230
231		if ((hasOwnKeys || foreignActuallyHasKeys()) && mUseCameraHintShown.compareAndSet(false,true)) {
232			showCameraToast();
233		}
234
235		binding.ownKeysTitle.setText(mAccount.getJid().toBareJid().toString());
236		binding.ownKeysCard.setVisibility(hasOwnKeys ? View.VISIBLE : View.GONE);
237		binding.foreignKeys.setVisibility(hasForeignKeys ? View.VISIBLE : View.GONE);
238		if(hasPendingKeyFetches()) {
239			setFetching();
240			lock();
241		} else {
242			if (!hasForeignKeys && hasNoOtherTrustedKeys()) {
243				binding.keyErrorMessageCard.setVisibility(View.VISIBLE);
244				if (lastFetchReport == AxolotlService.FetchStatus.ERROR
245						|| mAccount.getAxolotlService().fetchMapHasErrors(contactJids)) {
246					if (anyWithoutMutualPresenceSubscription(contactJids)) {
247						binding.keyErrorMessage.setText(R.string.error_no_keys_to_trust_presence);
248					} else {
249						binding.keyErrorMessage.setText(R.string.error_no_keys_to_trust_server_error);
250					}
251				} else {
252					binding.keyErrorMessage.setText(R.string.error_no_keys_to_trust);
253				}
254				binding.ownKeysDetails.removeAllViews();
255				binding.ownKeysCard.setVisibility(View.GONE);
256				binding.foreignKeys.removeAllViews();
257				binding.foreignKeys.setVisibility(View.GONE);
258			}
259			lockOrUnlockAsNeeded();
260			setDone();
261		}
262	}
263
264	private boolean anyWithoutMutualPresenceSubscription(List<Jid> contactJids){
265		for(Jid jid : contactJids) {
266			if (!mAccount.getRoster().getContact(jid).mutualPresenceSubscription()) {
267				return true;
268			}
269		}
270		return false;
271	}
272
273	private boolean foreignActuallyHasKeys() {
274		synchronized (this.foreignKeysToTrust) {
275			for (Map.Entry<Jid, Map<String, Boolean>> entry : foreignKeysToTrust.entrySet()) {
276				if (entry.getValue().size() > 0) {
277					return true;
278				}
279			}
280		}
281		return false;
282	}
283
284	private boolean reloadFingerprints() {
285		List<Jid> acceptedTargets = mConversation == null ? new ArrayList<Jid>() : mConversation.getAcceptedCryptoTargets();
286		ownKeysToTrust.clear();
287		AxolotlService service = this.mAccount.getAxolotlService();
288		Set<IdentityKey> ownKeysSet = service.getKeysWithTrust(FingerprintStatus.createActiveUndecided());
289		for(final IdentityKey identityKey : ownKeysSet) {
290			final String fingerprint = CryptoHelper.bytesToHex(identityKey.getPublicKey().serialize());
291			if(!ownKeysToTrust.containsKey(fingerprint)) {
292				ownKeysToTrust.put(fingerprint, false);
293			}
294		}
295		synchronized (this.foreignKeysToTrust) {
296			foreignKeysToTrust.clear();
297			for (Jid jid : contactJids) {
298				Set<IdentityKey> foreignKeysSet = service.getKeysWithTrust(FingerprintStatus.createActiveUndecided(), jid);
299				if (hasNoOtherTrustedKeys(jid) && ownKeysSet.size() == 0) {
300					foreignKeysSet.addAll(service.getKeysWithTrust(FingerprintStatus.createActive(false), jid));
301				}
302				Map<String, Boolean> foreignFingerprints = new HashMap<>();
303				for (final IdentityKey identityKey : foreignKeysSet) {
304					final String fingerprint = CryptoHelper.bytesToHex(identityKey.getPublicKey().serialize());
305					if (!foreignFingerprints.containsKey(fingerprint)) {
306						foreignFingerprints.put(fingerprint, false);
307					}
308				}
309				if (foreignFingerprints.size() > 0 || !acceptedTargets.contains(jid)) {
310					foreignKeysToTrust.put(jid, foreignFingerprints);
311				}
312			}
313		}
314		return ownKeysSet.size() + foreignKeysToTrust.size() > 0;
315	}
316
317	public void onBackendConnected() {
318		Intent intent = getIntent();
319		this.mAccount = extractAccount(intent);
320		if (this.mAccount != null && intent != null) {
321			String uuid = intent.getStringExtra("conversation");
322			this.mConversation = xmppConnectionService.findConversationByUuid(uuid);
323			if (this.mPendingFingerprintVerificationUri != null) {
324				processFingerprintVerification(this.mPendingFingerprintVerificationUri);
325				this.mPendingFingerprintVerificationUri = null;
326			} else {
327				reloadFingerprints();
328				populateView();
329				invalidateOptionsMenu();
330			}
331		}
332	}
333
334	private boolean hasNoOtherTrustedKeys() {
335		return mAccount == null || mAccount.getAxolotlService().anyTargetHasNoTrustedKeys(contactJids);
336	}
337
338	private boolean hasNoOtherTrustedKeys(Jid contact) {
339		return mAccount == null || mAccount.getAxolotlService().getNumTrustedKeys(contact) == 0;
340	}
341
342	private boolean hasPendingKeyFetches() {
343		return mAccount != null && mAccount.getAxolotlService().hasPendingKeyFetches(mAccount, contactJids);
344	}
345
346
347	@Override
348	public void onKeyStatusUpdated(final AxolotlService.FetchStatus report) {
349		final boolean keysToTrust = reloadFingerprints();
350		if (report != null) {
351			lastFetchReport = report;
352			runOnUiThread(new Runnable() {
353				@Override
354				public void run() {
355					if (mUseCameraHintToast != null && !keysToTrust) {
356						mUseCameraHintToast.cancel();
357					}
358					switch (report) {
359						case ERROR:
360							Toast.makeText(TrustKeysActivity.this,R.string.error_fetching_omemo_key,Toast.LENGTH_SHORT).show();
361							break;
362						case SUCCESS_TRUSTED:
363							Toast.makeText(TrustKeysActivity.this,R.string.blindly_trusted_omemo_keys,Toast.LENGTH_LONG).show();
364							break;
365						case SUCCESS_VERIFIED:
366							Toast.makeText(TrustKeysActivity.this,
367									Config.X509_VERIFICATION ? R.string.verified_omemo_key_with_certificate : R.string.all_omemo_keys_have_been_verified,
368									Toast.LENGTH_LONG).show();
369							break;
370					}
371				}
372			});
373
374		}
375		if (keysToTrust || hasPendingKeyFetches() || hasNoOtherTrustedKeys()) {
376			refreshUi();
377		} else {
378			runOnUiThread(new Runnable() {
379				@Override
380				public void run() {
381					finishOk();
382				}
383			});
384
385		}
386	}
387
388	private void finishOk() {
389		Intent data = new Intent();
390		data.putExtra("choice", getIntent().getIntExtra("choice", ConversationFragment.ATTACHMENT_CHOICE_INVALID));
391		setResult(RESULT_OK, data);
392		finish();
393	}
394
395	private void commitTrusts() {
396		for(final String fingerprint :ownKeysToTrust.keySet()) {
397			mAccount.getAxolotlService().setFingerprintTrust(
398					fingerprint,
399					FingerprintStatus.createActive(ownKeysToTrust.get(fingerprint)));
400		}
401		List<Jid> acceptedTargets = mConversation == null ? new ArrayList<Jid>() : mConversation.getAcceptedCryptoTargets();
402		synchronized (this.foreignKeysToTrust) {
403			for (Map.Entry<Jid, Map<String, Boolean>> entry : foreignKeysToTrust.entrySet()) {
404				Jid jid = entry.getKey();
405				Map<String, Boolean> value = entry.getValue();
406				if (!acceptedTargets.contains(jid)) {
407					acceptedTargets.add(jid);
408				}
409				for (final String fingerprint : value.keySet()) {
410					mAccount.getAxolotlService().setFingerprintTrust(
411							fingerprint,
412							FingerprintStatus.createActive(value.get(fingerprint)));
413				}
414			}
415		}
416		if (mConversation != null && mConversation.getMode() == Conversation.MODE_MULTI) {
417			mConversation.setAcceptedCryptoTargets(acceptedTargets);
418			xmppConnectionService.updateConversation(mConversation);
419		}
420	}
421
422	private void unlock() {
423		binding.saveButton.setEnabled(true);
424		binding.saveButton.setTextColor(getPrimaryTextColor());
425	}
426
427	private void lock() {
428		binding.saveButton.setEnabled(false);
429		binding.saveButton.setTextColor(getSecondaryTextColor());
430	}
431
432	private void lockOrUnlockAsNeeded() {
433		synchronized (this.foreignKeysToTrust) {
434			for (Jid jid : contactJids) {
435				Map<String, Boolean> fingerprints = foreignKeysToTrust.get(jid);
436				if (hasNoOtherTrustedKeys(jid) && (fingerprints == null || !fingerprints.values().contains(true))) {
437					lock();
438					return;
439				}
440			}
441		}
442		unlock();
443
444	}
445
446	private void setDone() {
447		binding.saveButton.setText(getString(R.string.done));
448	}
449
450	private void setFetching() {
451		binding.saveButton.setText(getString(R.string.fetching_keys));
452	}
453}