1package eu.siacs.conversations.ui;
2
3import android.app.ActionBar;
4import android.content.Intent;
5import android.os.Bundle;
6import android.util.Log;
7import android.view.Gravity;
8import android.view.Menu;
9import android.view.MenuItem;
10import android.view.View;
11import android.view.View.OnClickListener;
12import android.widget.Button;
13import android.widget.CompoundButton;
14import android.widget.LinearLayout;
15import android.widget.TextView;
16import android.widget.Toast;
17
18import com.google.zxing.integration.android.IntentIntegrator;
19
20import org.whispersystems.libsignal.IdentityKey;
21
22import java.util.ArrayList;
23import java.util.Arrays;
24import java.util.HashMap;
25import java.util.List;
26import java.util.Map;
27import java.util.Set;
28import java.util.concurrent.atomic.AtomicBoolean;
29
30import eu.siacs.conversations.Config;
31import eu.siacs.conversations.R;
32import eu.siacs.conversations.crypto.axolotl.AxolotlService;
33import eu.siacs.conversations.crypto.axolotl.FingerprintStatus;
34import eu.siacs.conversations.entities.Account;
35import eu.siacs.conversations.entities.Conversation;
36import eu.siacs.conversations.utils.CryptoHelper;
37import eu.siacs.conversations.utils.XmppUri;
38import eu.siacs.conversations.xmpp.OnKeyStatusUpdated;
39import eu.siacs.conversations.xmpp.jid.InvalidJidException;
40import eu.siacs.conversations.xmpp.jid.Jid;
41
42public class TrustKeysActivity extends OmemoActivity implements OnKeyStatusUpdated {
43 private List<Jid> contactJids;
44
45 private Account mAccount;
46 private Conversation mConversation;
47 private TextView keyErrorMessage;
48 private LinearLayout keyErrorMessageCard;
49 private TextView ownKeysTitle;
50 private LinearLayout ownKeys;
51 private LinearLayout ownKeysCard;
52 private LinearLayout foreignKeys;
53 private Button mSaveButton;
54 private Button mCancelButton;
55
56 private AtomicBoolean mUseCameraHintShown = new AtomicBoolean(false);
57
58 private AxolotlService.FetchStatus lastFetchReport = AxolotlService.FetchStatus.SUCCESS;
59
60 private final Map<String, Boolean> ownKeysToTrust = new HashMap<>();
61 private final Map<Jid,Map<String, Boolean>> foreignKeysToTrust = new HashMap<>();
62
63 private final OnClickListener mSaveButtonListener = new OnClickListener() {
64 @Override
65 public void onClick(View v) {
66 commitTrusts();
67 finishOk();
68 }
69 };
70
71 private final OnClickListener mCancelButtonListener = new OnClickListener() {
72 @Override
73 public void onClick(View v) {
74 setResult(RESULT_CANCELED);
75 finish();
76 }
77 };
78 private Toast mUseCameraHintToast = null;
79
80 @Override
81 protected void refreshUiReal() {
82 invalidateOptionsMenu();
83 populateView();
84 }
85
86 @Override
87 protected void onCreate(final Bundle savedInstanceState) {
88 super.onCreate(savedInstanceState);
89 setContentView(R.layout.activity_trust_keys);
90 this.contactJids = new ArrayList<>();
91 for(String jid : getIntent().getStringArrayExtra("contacts")) {
92 try {
93 this.contactJids.add(Jid.fromString(jid));
94 } catch (InvalidJidException e) {
95 e.printStackTrace();
96 }
97 }
98
99 keyErrorMessageCard = (LinearLayout) findViewById(R.id.key_error_message_card);
100 keyErrorMessage = (TextView) findViewById(R.id.key_error_message);
101 ownKeysTitle = (TextView) findViewById(R.id.own_keys_title);
102 ownKeys = (LinearLayout) findViewById(R.id.own_keys_details);
103 ownKeysCard = (LinearLayout) findViewById(R.id.own_keys_card);
104 foreignKeys = (LinearLayout) findViewById(R.id.foreign_keys);
105 mCancelButton = (Button) findViewById(R.id.cancel_button);
106 mCancelButton.setOnClickListener(mCancelButtonListener);
107 mSaveButton = (Button) findViewById(R.id.save_button);
108 mSaveButton.setOnClickListener(mSaveButtonListener);
109
110
111 if (getActionBar() != null) {
112 getActionBar().setHomeButtonEnabled(true);
113 getActionBar().setDisplayHomeAsUpEnabled(true);
114 }
115 }
116
117 @Override
118 public boolean onCreateOptionsMenu(Menu menu) {
119 getMenuInflater().inflate(R.menu.trust_keys, menu);
120 MenuItem scanQrCode = menu.findItem(R.id.action_scan_qr_code);
121 scanQrCode.setVisible(ownKeysToTrust.size() > 0 || foreignActuallyHasKeys());
122 return super.onCreateOptionsMenu(menu);
123 }
124
125 private void showCameraToast() {
126 mUseCameraHintToast = Toast.makeText(this,R.string.use_camera_icon_to_scan_barcode,Toast.LENGTH_LONG);
127 ActionBar actionBar = getActionBar();
128 mUseCameraHintToast.setGravity(Gravity.TOP | Gravity.END, 0 ,actionBar == null ? 0 : actionBar.getHeight());
129 mUseCameraHintToast.show();
130 }
131
132 @Override
133 public boolean onOptionsItemSelected(MenuItem item) {
134 switch (item.getItemId()) {
135 case R.id.action_scan_qr_code:
136 if (hasPendingKeyFetches()) {
137 Toast.makeText(this, R.string.please_wait_for_keys_to_be_fetched, Toast.LENGTH_SHORT).show();
138 } else {
139 new IntentIntegrator(this).initiateScan(Arrays.asList("AZTEC","QR_CODE"));
140 return true;
141 }
142 }
143 return super.onOptionsItemSelected(item);
144 }
145
146 @Override
147 protected void onStop() {
148 super.onStop();
149 if (mUseCameraHintToast != null) {
150 mUseCameraHintToast.cancel();
151 }
152 }
153
154 @Override
155 protected void processFingerprintVerification(XmppUri uri) {
156 if (mConversation != null
157 && mAccount != null
158 && uri.hasFingerprints()
159 && mAccount.getAxolotlService().getCryptoTargets(mConversation).contains(uri.getJid())) {
160 boolean performedVerification = xmppConnectionService.verifyFingerprints(mAccount.getRoster().getContact(uri.getJid()),uri.getFingerprints());
161 boolean keys = reloadFingerprints();
162 if (performedVerification && !keys && !hasNoOtherTrustedKeys() && !hasPendingKeyFetches()) {
163 Toast.makeText(this,R.string.all_omemo_keys_have_been_verified, Toast.LENGTH_SHORT).show();
164 finishOk();
165 return;
166 } else if (performedVerification) {
167 Toast.makeText(this,R.string.verified_fingerprints,Toast.LENGTH_SHORT).show();
168 }
169 } else {
170 reloadFingerprints();
171 Log.d(Config.LOGTAG,"xmpp uri was: "+uri.getJid()+" has Fingerprints: "+Boolean.toString(uri.hasFingerprints()));
172 Toast.makeText(this,R.string.barcode_does_not_contain_fingerprints_for_this_conversation,Toast.LENGTH_SHORT).show();
173 }
174 populateView();
175 }
176
177 private void populateView() {
178 setTitle(getString(R.string.trust_omemo_fingerprints));
179 ownKeys.removeAllViews();
180 foreignKeys.removeAllViews();
181 boolean hasOwnKeys = false;
182 boolean hasForeignKeys = false;
183 for(final String fingerprint : ownKeysToTrust.keySet()) {
184 hasOwnKeys = true;
185 addFingerprintRowWithListeners(ownKeys, mAccount, fingerprint, false,
186 FingerprintStatus.createActive(ownKeysToTrust.get(fingerprint)), false, false,
187 new CompoundButton.OnCheckedChangeListener() {
188 @Override
189 public void onCheckedChanged(CompoundButton buttonView, boolean isChecked) {
190 ownKeysToTrust.put(fingerprint, isChecked);
191 // own fingerprints have no impact on locked status.
192 }
193 }
194 );
195 }
196
197 synchronized (this.foreignKeysToTrust) {
198 for (Map.Entry<Jid, Map<String, Boolean>> entry : foreignKeysToTrust.entrySet()) {
199 hasForeignKeys = true;
200 final LinearLayout layout = (LinearLayout) getLayoutInflater().inflate(R.layout.keys_card, foreignKeys, false);
201 final Jid jid = entry.getKey();
202 final TextView header = (TextView) layout.findViewById(R.id.foreign_keys_title);
203 final LinearLayout keysContainer = (LinearLayout) layout.findViewById(R.id.foreign_keys_details);
204 final TextView informNoKeys = (TextView) layout.findViewById(R.id.no_keys_to_accept);
205 header.setText(jid.toString());
206 final Map<String, Boolean> fingerprints = entry.getValue();
207 for (final String fingerprint : fingerprints.keySet()) {
208 addFingerprintRowWithListeners(keysContainer, mAccount, fingerprint, false,
209 FingerprintStatus.createActive(fingerprints.get(fingerprint)), false, false,
210 new CompoundButton.OnCheckedChangeListener() {
211 @Override
212 public void onCheckedChanged(CompoundButton buttonView, boolean isChecked) {
213 fingerprints.put(fingerprint, isChecked);
214 lockOrUnlockAsNeeded();
215 }
216 }
217 );
218 }
219 if (fingerprints.size() == 0) {
220 informNoKeys.setVisibility(View.VISIBLE);
221 informNoKeys.setText(getString(R.string.no_keys_just_confirm,mAccount.getRoster().getContact(jid).getDisplayName()));
222 } else {
223 informNoKeys.setVisibility(View.GONE);
224 }
225 foreignKeys.addView(layout);
226 }
227 }
228
229 if ((hasOwnKeys || foreignActuallyHasKeys()) && mUseCameraHintShown.compareAndSet(false,true)) {
230 showCameraToast();
231 }
232
233 ownKeysTitle.setText(mAccount.getJid().toBareJid().toString());
234 ownKeysCard.setVisibility(hasOwnKeys ? View.VISIBLE : View.GONE);
235 foreignKeys.setVisibility(hasForeignKeys ? View.VISIBLE : View.GONE);
236 if(hasPendingKeyFetches()) {
237 setFetching();
238 lock();
239 } else {
240 if (!hasForeignKeys && hasNoOtherTrustedKeys()) {
241 keyErrorMessageCard.setVisibility(View.VISIBLE);
242 if (lastFetchReport == AxolotlService.FetchStatus.ERROR
243 || mAccount.getAxolotlService().fetchMapHasErrors(contactJids)) {
244 keyErrorMessage.setText(R.string.error_no_keys_to_trust_server_error);
245 } else {
246 keyErrorMessage.setText(R.string.error_no_keys_to_trust);
247 }
248 ownKeys.removeAllViews();
249 ownKeysCard.setVisibility(View.GONE);
250 foreignKeys.removeAllViews();
251 foreignKeys.setVisibility(View.GONE);
252 }
253 lockOrUnlockAsNeeded();
254 setDone();
255 }
256 }
257
258 private boolean foreignActuallyHasKeys() {
259 synchronized (this.foreignKeysToTrust) {
260 for (Map.Entry<Jid, Map<String, Boolean>> entry : foreignKeysToTrust.entrySet()) {
261 if (entry.getValue().size() > 0) {
262 return true;
263 }
264 }
265 }
266 return false;
267 }
268
269 private boolean reloadFingerprints() {
270 List<Jid> acceptedTargets = mConversation == null ? new ArrayList<Jid>() : mConversation.getAcceptedCryptoTargets();
271 ownKeysToTrust.clear();
272 AxolotlService service = this.mAccount.getAxolotlService();
273 Set<IdentityKey> ownKeysSet = service.getKeysWithTrust(FingerprintStatus.createActiveUndecided());
274 for(final IdentityKey identityKey : ownKeysSet) {
275 final String fingerprint = CryptoHelper.bytesToHex(identityKey.getPublicKey().serialize());
276 if(!ownKeysToTrust.containsKey(fingerprint)) {
277 ownKeysToTrust.put(fingerprint, false);
278 }
279 }
280 synchronized (this.foreignKeysToTrust) {
281 foreignKeysToTrust.clear();
282 for (Jid jid : contactJids) {
283 Set<IdentityKey> foreignKeysSet = service.getKeysWithTrust(FingerprintStatus.createActiveUndecided(), jid);
284 if (hasNoOtherTrustedKeys(jid) && ownKeysSet.size() == 0) {
285 foreignKeysSet.addAll(service.getKeysWithTrust(FingerprintStatus.createActive(false), jid));
286 }
287 Map<String, Boolean> foreignFingerprints = new HashMap<>();
288 for (final IdentityKey identityKey : foreignKeysSet) {
289 final String fingerprint = CryptoHelper.bytesToHex(identityKey.getPublicKey().serialize());
290 if (!foreignFingerprints.containsKey(fingerprint)) {
291 foreignFingerprints.put(fingerprint, false);
292 }
293 }
294 if (foreignFingerprints.size() > 0 || !acceptedTargets.contains(jid)) {
295 foreignKeysToTrust.put(jid, foreignFingerprints);
296 }
297 }
298 }
299 return ownKeysSet.size() + foreignKeysToTrust.size() > 0;
300 }
301
302 public void onBackendConnected() {
303 Intent intent = getIntent();
304 this.mAccount = extractAccount(intent);
305 if (this.mAccount != null && intent != null) {
306 String uuid = intent.getStringExtra("conversation");
307 this.mConversation = xmppConnectionService.findConversationByUuid(uuid);
308 if (this.mPendingFingerprintVerificationUri != null) {
309 processFingerprintVerification(this.mPendingFingerprintVerificationUri);
310 this.mPendingFingerprintVerificationUri = null;
311 } else {
312 reloadFingerprints();
313 populateView();
314 }
315 }
316 }
317
318 private boolean hasNoOtherTrustedKeys() {
319 return mAccount == null || mAccount.getAxolotlService().anyTargetHasNoTrustedKeys(contactJids);
320 }
321
322 private boolean hasNoOtherTrustedKeys(Jid contact) {
323 return mAccount == null || mAccount.getAxolotlService().getNumTrustedKeys(contact) == 0;
324 }
325
326 private boolean hasPendingKeyFetches() {
327 return mAccount != null && mAccount.getAxolotlService().hasPendingKeyFetches(mAccount, contactJids);
328 }
329
330
331 @Override
332 public void onKeyStatusUpdated(final AxolotlService.FetchStatus report) {
333 final boolean keysToTrust = reloadFingerprints();
334 if (report != null) {
335 lastFetchReport = report;
336 runOnUiThread(new Runnable() {
337 @Override
338 public void run() {
339 if (mUseCameraHintToast != null && !keysToTrust) {
340 mUseCameraHintToast.cancel();
341 }
342 switch (report) {
343 case ERROR:
344 Toast.makeText(TrustKeysActivity.this,R.string.error_fetching_omemo_key,Toast.LENGTH_SHORT).show();
345 break;
346 case SUCCESS_TRUSTED:
347 Toast.makeText(TrustKeysActivity.this,R.string.blindly_trusted_omemo_keys,Toast.LENGTH_LONG).show();
348 break;
349 case SUCCESS_VERIFIED:
350 Toast.makeText(TrustKeysActivity.this,
351 Config.X509_VERIFICATION ? R.string.verified_omemo_key_with_certificate : R.string.all_omemo_keys_have_been_verified,
352 Toast.LENGTH_LONG).show();
353 break;
354 }
355 }
356 });
357
358 }
359 if (keysToTrust || hasPendingKeyFetches() || hasNoOtherTrustedKeys()) {
360 refreshUi();
361 } else {
362 runOnUiThread(new Runnable() {
363 @Override
364 public void run() {
365 finishOk();
366 }
367 });
368
369 }
370 }
371
372 private void finishOk() {
373 Intent data = new Intent();
374 data.putExtra("choice", getIntent().getIntExtra("choice", ConversationActivity.ATTACHMENT_CHOICE_INVALID));
375 setResult(RESULT_OK, data);
376 finish();
377 }
378
379 private void commitTrusts() {
380 for(final String fingerprint :ownKeysToTrust.keySet()) {
381 mAccount.getAxolotlService().setFingerprintTrust(
382 fingerprint,
383 FingerprintStatus.createActive(ownKeysToTrust.get(fingerprint)));
384 }
385 List<Jid> acceptedTargets = mConversation == null ? new ArrayList<Jid>() : mConversation.getAcceptedCryptoTargets();
386 synchronized (this.foreignKeysToTrust) {
387 for (Map.Entry<Jid, Map<String, Boolean>> entry : foreignKeysToTrust.entrySet()) {
388 Jid jid = entry.getKey();
389 Map<String, Boolean> value = entry.getValue();
390 if (!acceptedTargets.contains(jid)) {
391 acceptedTargets.add(jid);
392 }
393 for (final String fingerprint : value.keySet()) {
394 mAccount.getAxolotlService().setFingerprintTrust(
395 fingerprint,
396 FingerprintStatus.createActive(value.get(fingerprint)));
397 }
398 }
399 }
400 if (mConversation != null && mConversation.getMode() == Conversation.MODE_MULTI) {
401 mConversation.setAcceptedCryptoTargets(acceptedTargets);
402 xmppConnectionService.updateConversation(mConversation);
403 }
404 }
405
406 private void unlock() {
407 mSaveButton.setEnabled(true);
408 mSaveButton.setTextColor(getPrimaryTextColor());
409 }
410
411 private void lock() {
412 mSaveButton.setEnabled(false);
413 mSaveButton.setTextColor(getSecondaryTextColor());
414 }
415
416 private void lockOrUnlockAsNeeded() {
417 synchronized (this.foreignKeysToTrust) {
418 for (Jid jid : contactJids) {
419 Map<String, Boolean> fingerprints = foreignKeysToTrust.get(jid);
420 if (hasNoOtherTrustedKeys(jid) && (fingerprints == null || !fingerprints.values().contains(true))) {
421 lock();
422 return;
423 }
424 }
425 }
426 unlock();
427
428 }
429
430 private void setDone() {
431 mSaveButton.setText(getString(R.string.done));
432 }
433
434 private void setFetching() {
435 mSaveButton.setText(getString(R.string.fetching_keys));
436 }
437}