1package eu.siacs.conversations.ui;
2
3import android.content.Intent;
4import android.databinding.DataBindingUtil;
5import android.os.Bundle;
6import android.support.v7.app.ActionBar;
7import android.util.Log;
8import android.view.Gravity;
9import android.view.Menu;
10import android.view.MenuItem;
11import android.view.View;
12import android.view.View.OnClickListener;
13import android.widget.CompoundButton;
14import android.widget.Toast;
15
16import org.whispersystems.libsignal.IdentityKey;
17
18import java.util.ArrayList;
19import java.util.HashMap;
20import java.util.List;
21import java.util.Map;
22import java.util.Set;
23import java.util.concurrent.atomic.AtomicBoolean;
24
25import eu.siacs.conversations.Config;
26import eu.siacs.conversations.R;
27import eu.siacs.conversations.crypto.axolotl.AxolotlService;
28import eu.siacs.conversations.crypto.axolotl.FingerprintStatus;
29import eu.siacs.conversations.databinding.ActivityTrustKeysBinding;
30import eu.siacs.conversations.databinding.KeysCardBinding;
31import eu.siacs.conversations.entities.Account;
32import eu.siacs.conversations.entities.Conversation;
33import eu.siacs.conversations.utils.CryptoHelper;
34import eu.siacs.conversations.utils.IrregularUnicodeDetector;
35import eu.siacs.conversations.utils.XmppUri;
36import eu.siacs.conversations.xmpp.OnKeyStatusUpdated;
37import rocks.xmpp.addr.Jid;
38
39
40public class TrustKeysActivity extends OmemoActivity implements OnKeyStatusUpdated {
41 private List<Jid> contactJids;
42
43 private Account mAccount;
44 private Conversation mConversation;
45
46 private AtomicBoolean mUseCameraHintShown = new AtomicBoolean(false);
47
48 private AxolotlService.FetchStatus lastFetchReport = AxolotlService.FetchStatus.SUCCESS;
49
50 private final Map<String, Boolean> ownKeysToTrust = new HashMap<>();
51 private final Map<Jid,Map<String, Boolean>> foreignKeysToTrust = new HashMap<>();
52
53 private final OnClickListener mSaveButtonListener = new OnClickListener() {
54 @Override
55 public void onClick(View v) {
56 commitTrusts();
57 finishOk();
58 }
59 };
60
61 private final OnClickListener mCancelButtonListener = new OnClickListener() {
62 @Override
63 public void onClick(View v) {
64 setResult(RESULT_CANCELED);
65 finish();
66 }
67 };
68 private Toast mUseCameraHintToast = null;
69 private ActivityTrustKeysBinding binding;
70
71 @Override
72 protected void refreshUiReal() {
73 invalidateOptionsMenu();
74 populateView();
75 }
76
77 @Override
78 protected void onCreate(final Bundle savedInstanceState) {
79 super.onCreate(savedInstanceState);
80 this.binding = DataBindingUtil.setContentView(this,R.layout.activity_trust_keys);
81 this.contactJids = new ArrayList<>();
82 for(String jid : getIntent().getStringArrayExtra("contacts")) {
83 try {
84 this.contactJids.add(Jid.of(jid));
85 } catch (IllegalArgumentException e) {
86 e.printStackTrace();
87 }
88 }
89
90 binding.cancelButton.setOnClickListener(mCancelButtonListener);
91 binding.saveButton.setOnClickListener(mSaveButtonListener);
92
93
94 if (getSupportActionBar() != null) {
95 getSupportActionBar().setHomeButtonEnabled(true);
96 getSupportActionBar().setDisplayHomeAsUpEnabled(true);
97 }
98
99 if (savedInstanceState != null) {
100 mUseCameraHintShown.set(savedInstanceState.getBoolean("camera_hint_shown",false));
101 }
102 }
103
104 @Override
105 public void onSaveInstanceState(Bundle savedInstanceState) {
106 savedInstanceState.putBoolean("camera_hint_shown", mUseCameraHintShown.get());
107 super.onSaveInstanceState(savedInstanceState);
108 }
109
110 @Override
111 public boolean onCreateOptionsMenu(Menu menu) {
112 getMenuInflater().inflate(R.menu.trust_keys, menu);
113 MenuItem scanQrCode = menu.findItem(R.id.action_scan_qr_code);
114 scanQrCode.setVisible((ownKeysToTrust.size() > 0 || foreignActuallyHasKeys()) && isCameraFeatureAvailable());
115 return super.onCreateOptionsMenu(menu);
116 }
117
118 private void showCameraToast() {
119 mUseCameraHintToast = Toast.makeText(this,R.string.use_camera_icon_to_scan_barcode,Toast.LENGTH_LONG);
120 ActionBar actionBar = getSupportActionBar();
121 mUseCameraHintToast.setGravity(Gravity.TOP | Gravity.END, 0 ,actionBar == null ? 0 : actionBar.getHeight());
122 mUseCameraHintToast.show();
123 }
124
125 @Override
126 public boolean onOptionsItemSelected(MenuItem item) {
127 switch (item.getItemId()) {
128 case R.id.action_scan_qr_code:
129 if (hasPendingKeyFetches()) {
130 Toast.makeText(this, R.string.please_wait_for_keys_to_be_fetched, Toast.LENGTH_SHORT).show();
131 } else {
132 ScanActivity.scan(this);
133 //new IntentIntegrator(this).initiateScan(Arrays.asList("AZTEC","QR_CODE"));
134 return true;
135 }
136 }
137 return super.onOptionsItemSelected(item);
138 }
139
140 @Override
141 protected void onStop() {
142 super.onStop();
143 if (mUseCameraHintToast != null) {
144 mUseCameraHintToast.cancel();
145 }
146 }
147
148 @Override
149 protected void processFingerprintVerification(XmppUri uri) {
150 if (mConversation != null
151 && mAccount != null
152 && uri.hasFingerprints()
153 && mAccount.getAxolotlService().getCryptoTargets(mConversation).contains(uri.getJid())) {
154 boolean performedVerification = xmppConnectionService.verifyFingerprints(mAccount.getRoster().getContact(uri.getJid()),uri.getFingerprints());
155 boolean keys = reloadFingerprints();
156 if (performedVerification && !keys && !hasNoOtherTrustedKeys() && !hasPendingKeyFetches()) {
157 Toast.makeText(this,R.string.all_omemo_keys_have_been_verified, Toast.LENGTH_SHORT).show();
158 finishOk();
159 return;
160 } else if (performedVerification) {
161 Toast.makeText(this,R.string.verified_fingerprints,Toast.LENGTH_SHORT).show();
162 }
163 } else {
164 reloadFingerprints();
165 Log.d(Config.LOGTAG,"xmpp uri was: "+uri.getJid()+" has Fingerprints: "+Boolean.toString(uri.hasFingerprints()));
166 Toast.makeText(this,R.string.barcode_does_not_contain_fingerprints_for_this_conversation,Toast.LENGTH_SHORT).show();
167 }
168 populateView();
169 }
170
171 private void populateView() {
172 setTitle(getString(R.string.trust_omemo_fingerprints));
173 binding.ownKeysDetails.removeAllViews();
174 binding.foreignKeys.removeAllViews();
175 boolean hasOwnKeys = false;
176 boolean hasForeignKeys = false;
177 for(final String fingerprint : ownKeysToTrust.keySet()) {
178 hasOwnKeys = true;
179 addFingerprintRowWithListeners(binding.ownKeysDetails, mAccount, fingerprint, false,
180 FingerprintStatus.createActive(ownKeysToTrust.get(fingerprint)), false, false,
181 new CompoundButton.OnCheckedChangeListener() {
182 @Override
183 public void onCheckedChanged(CompoundButton buttonView, boolean isChecked) {
184 ownKeysToTrust.put(fingerprint, isChecked);
185 // own fingerprints have no impact on locked status.
186 }
187 }
188 );
189 }
190
191 synchronized (this.foreignKeysToTrust) {
192 for (Map.Entry<Jid, Map<String, Boolean>> entry : foreignKeysToTrust.entrySet()) {
193 hasForeignKeys = true;
194 KeysCardBinding keysCardBinding = DataBindingUtil.inflate(getLayoutInflater(),R.layout.keys_card, binding.foreignKeys,false);
195 final Jid jid = entry.getKey();
196 keysCardBinding.foreignKeysTitle.setText(IrregularUnicodeDetector.style(this,jid));
197 keysCardBinding.foreignKeysTitle.setOnClickListener(v -> switchToContactDetails(mAccount.getRoster().getContact(jid)));
198 final Map<String, Boolean> fingerprints = entry.getValue();
199 for (final String fingerprint : fingerprints.keySet()) {
200 addFingerprintRowWithListeners(keysCardBinding.foreignKeysDetails, mAccount, fingerprint, false,
201 FingerprintStatus.createActive(fingerprints.get(fingerprint)), false, false,
202 (buttonView, isChecked) -> {
203 fingerprints.put(fingerprint, isChecked);
204 lockOrUnlockAsNeeded();
205 }
206 );
207 }
208 if (fingerprints.size() == 0) {
209 keysCardBinding.noKeysToAccept.setVisibility(View.VISIBLE);
210 if (hasNoOtherTrustedKeys(jid)) {
211 if (!mAccount.getRoster().getContact(jid).mutualPresenceSubscription()) {
212 keysCardBinding.noKeysToAccept.setText(R.string.error_no_keys_to_trust_presence);
213 } else {
214 keysCardBinding.noKeysToAccept.setText(R.string.error_no_keys_to_trust_server_error);
215 }
216 } else {
217 keysCardBinding.noKeysToAccept.setText(getString(R.string.no_keys_just_confirm, mAccount.getRoster().getContact(jid).getDisplayName()));
218 }
219 } else {
220 keysCardBinding.noKeysToAccept.setVisibility(View.GONE);
221 }
222 binding.foreignKeys.addView(keysCardBinding.foreignKeysCard);
223 }
224 }
225
226 if ((hasOwnKeys || foreignActuallyHasKeys()) && isCameraFeatureAvailable() && mUseCameraHintShown.compareAndSet(false,true)) {
227 showCameraToast();
228 }
229
230 binding.ownKeysTitle.setText(mAccount.getJid().asBareJid().toString());
231 binding.ownKeysCard.setVisibility(hasOwnKeys ? View.VISIBLE : View.GONE);
232 binding.foreignKeys.setVisibility(hasForeignKeys ? View.VISIBLE : View.GONE);
233 if(hasPendingKeyFetches()) {
234 setFetching();
235 lock();
236 } else {
237 if (!hasForeignKeys && hasNoOtherTrustedKeys()) {
238 binding.keyErrorMessageCard.setVisibility(View.VISIBLE);
239 if (lastFetchReport == AxolotlService.FetchStatus.ERROR
240 || mAccount.getAxolotlService().fetchMapHasErrors(contactJids)) {
241 if (anyWithoutMutualPresenceSubscription(contactJids)) {
242 binding.keyErrorMessage.setText(R.string.error_no_keys_to_trust_presence);
243 } else {
244 binding.keyErrorMessage.setText(R.string.error_no_keys_to_trust_server_error);
245 }
246 } else {
247 binding.keyErrorMessage.setText(R.string.error_no_keys_to_trust);
248 }
249 binding.ownKeysDetails.removeAllViews();
250 binding.ownKeysCard.setVisibility(View.GONE);
251 binding.foreignKeys.removeAllViews();
252 binding.foreignKeys.setVisibility(View.GONE);
253 }
254 lockOrUnlockAsNeeded();
255 setDone();
256 }
257 }
258
259 private boolean anyWithoutMutualPresenceSubscription(List<Jid> contactJids){
260 for(Jid jid : contactJids) {
261 if (!mAccount.getRoster().getContact(jid).mutualPresenceSubscription()) {
262 return true;
263 }
264 }
265 return false;
266 }
267
268 private boolean foreignActuallyHasKeys() {
269 synchronized (this.foreignKeysToTrust) {
270 for (Map.Entry<Jid, Map<String, Boolean>> entry : foreignKeysToTrust.entrySet()) {
271 if (entry.getValue().size() > 0) {
272 return true;
273 }
274 }
275 }
276 return false;
277 }
278
279 private boolean reloadFingerprints() {
280 List<Jid> acceptedTargets = mConversation == null ? new ArrayList<Jid>() : mConversation.getAcceptedCryptoTargets();
281 ownKeysToTrust.clear();
282 AxolotlService service = this.mAccount.getAxolotlService();
283 Set<IdentityKey> ownKeysSet = service.getKeysWithTrust(FingerprintStatus.createActiveUndecided());
284 for(final IdentityKey identityKey : ownKeysSet) {
285 final String fingerprint = CryptoHelper.bytesToHex(identityKey.getPublicKey().serialize());
286 if(!ownKeysToTrust.containsKey(fingerprint)) {
287 ownKeysToTrust.put(fingerprint, false);
288 }
289 }
290 synchronized (this.foreignKeysToTrust) {
291 foreignKeysToTrust.clear();
292 for (Jid jid : contactJids) {
293 Set<IdentityKey> foreignKeysSet = service.getKeysWithTrust(FingerprintStatus.createActiveUndecided(), jid);
294 if (hasNoOtherTrustedKeys(jid) && ownKeysSet.size() == 0) {
295 foreignKeysSet.addAll(service.getKeysWithTrust(FingerprintStatus.createActive(false), jid));
296 }
297 Map<String, Boolean> foreignFingerprints = new HashMap<>();
298 for (final IdentityKey identityKey : foreignKeysSet) {
299 final String fingerprint = CryptoHelper.bytesToHex(identityKey.getPublicKey().serialize());
300 if (!foreignFingerprints.containsKey(fingerprint)) {
301 foreignFingerprints.put(fingerprint, false);
302 }
303 }
304 if (foreignFingerprints.size() > 0 || !acceptedTargets.contains(jid)) {
305 foreignKeysToTrust.put(jid, foreignFingerprints);
306 }
307 }
308 }
309 return ownKeysSet.size() + foreignKeysToTrust.size() > 0;
310 }
311
312 public void onBackendConnected() {
313 Intent intent = getIntent();
314 this.mAccount = extractAccount(intent);
315 if (this.mAccount != null && intent != null) {
316 String uuid = intent.getStringExtra("conversation");
317 this.mConversation = xmppConnectionService.findConversationByUuid(uuid);
318 if (this.mPendingFingerprintVerificationUri != null) {
319 processFingerprintVerification(this.mPendingFingerprintVerificationUri);
320 this.mPendingFingerprintVerificationUri = null;
321 } else {
322 reloadFingerprints();
323 populateView();
324 invalidateOptionsMenu();
325 }
326 }
327 }
328
329 private boolean hasNoOtherTrustedKeys() {
330 return mAccount == null || mAccount.getAxolotlService().anyTargetHasNoTrustedKeys(contactJids);
331 }
332
333 private boolean hasNoOtherTrustedKeys(Jid contact) {
334 return mAccount == null || mAccount.getAxolotlService().getNumTrustedKeys(contact) == 0;
335 }
336
337 private boolean hasPendingKeyFetches() {
338 return mAccount != null && mAccount.getAxolotlService().hasPendingKeyFetches(mAccount, contactJids);
339 }
340
341
342 @Override
343 public void onKeyStatusUpdated(final AxolotlService.FetchStatus report) {
344 final boolean keysToTrust = reloadFingerprints();
345 if (report != null) {
346 lastFetchReport = report;
347 runOnUiThread(new Runnable() {
348 @Override
349 public void run() {
350 if (mUseCameraHintToast != null && !keysToTrust) {
351 mUseCameraHintToast.cancel();
352 }
353 switch (report) {
354 case ERROR:
355 Toast.makeText(TrustKeysActivity.this,R.string.error_fetching_omemo_key,Toast.LENGTH_SHORT).show();
356 break;
357 case SUCCESS_TRUSTED:
358 Toast.makeText(TrustKeysActivity.this,R.string.blindly_trusted_omemo_keys,Toast.LENGTH_LONG).show();
359 break;
360 case SUCCESS_VERIFIED:
361 Toast.makeText(TrustKeysActivity.this,
362 Config.X509_VERIFICATION ? R.string.verified_omemo_key_with_certificate : R.string.all_omemo_keys_have_been_verified,
363 Toast.LENGTH_LONG).show();
364 break;
365 }
366 }
367 });
368
369 }
370 if (keysToTrust || hasPendingKeyFetches() || hasNoOtherTrustedKeys()) {
371 refreshUi();
372 } else {
373 runOnUiThread(new Runnable() {
374 @Override
375 public void run() {
376 finishOk();
377 }
378 });
379
380 }
381 }
382
383 private void finishOk() {
384 Intent data = new Intent();
385 data.putExtra("choice", getIntent().getIntExtra("choice", ConversationFragment.ATTACHMENT_CHOICE_INVALID));
386 setResult(RESULT_OK, data);
387 finish();
388 }
389
390 private void commitTrusts() {
391 for(final String fingerprint :ownKeysToTrust.keySet()) {
392 mAccount.getAxolotlService().setFingerprintTrust(
393 fingerprint,
394 FingerprintStatus.createActive(ownKeysToTrust.get(fingerprint)));
395 }
396 List<Jid> acceptedTargets = mConversation == null ? new ArrayList<>() : mConversation.getAcceptedCryptoTargets();
397 synchronized (this.foreignKeysToTrust) {
398 for (Map.Entry<Jid, Map<String, Boolean>> entry : foreignKeysToTrust.entrySet()) {
399 Jid jid = entry.getKey();
400 Map<String, Boolean> value = entry.getValue();
401 if (!acceptedTargets.contains(jid)) {
402 acceptedTargets.add(jid);
403 }
404 for (final String fingerprint : value.keySet()) {
405 mAccount.getAxolotlService().setFingerprintTrust(
406 fingerprint,
407 FingerprintStatus.createActive(value.get(fingerprint)));
408 }
409 }
410 }
411 if (mConversation != null && mConversation.getMode() == Conversation.MODE_MULTI) {
412 mConversation.setAcceptedCryptoTargets(acceptedTargets);
413 xmppConnectionService.updateConversation(mConversation);
414 }
415 }
416
417 private void unlock() {
418 binding.saveButton.setEnabled(true);
419 }
420
421 private void lock() {
422 binding.saveButton.setEnabled(false);
423 }
424
425 private void lockOrUnlockAsNeeded() {
426 synchronized (this.foreignKeysToTrust) {
427 for (Jid jid : contactJids) {
428 Map<String, Boolean> fingerprints = foreignKeysToTrust.get(jid);
429 if (hasNoOtherTrustedKeys(jid) && (fingerprints == null || !fingerprints.values().contains(true))) {
430 lock();
431 return;
432 }
433 }
434 }
435 unlock();
436
437 }
438
439 private void setDone() {
440 binding.saveButton.setText(getString(R.string.done));
441 }
442
443 private void setFetching() {
444 binding.saveButton.setText(getString(R.string.fetching_keys));
445 }
446}