1package eu.siacs.conversations.ui;
2
3import android.app.ActionBar;
4import android.content.Intent;
5import android.os.Bundle;
6import android.util.Log;
7import android.view.Gravity;
8import android.view.Menu;
9import android.view.MenuItem;
10import android.view.View;
11import android.view.View.OnClickListener;
12import android.widget.Button;
13import android.widget.CompoundButton;
14import android.widget.LinearLayout;
15import android.widget.TextView;
16import android.widget.Toast;
17
18import com.google.zxing.integration.android.IntentIntegrator;
19
20import org.whispersystems.libaxolotl.IdentityKey;
21
22import java.util.ArrayList;
23import java.util.Arrays;
24import java.util.HashMap;
25import java.util.List;
26import java.util.Map;
27import java.util.Set;
28
29import eu.siacs.conversations.Config;
30import eu.siacs.conversations.R;
31import eu.siacs.conversations.crypto.axolotl.AxolotlService;
32import eu.siacs.conversations.crypto.axolotl.FingerprintStatus;
33import eu.siacs.conversations.entities.Account;
34import eu.siacs.conversations.entities.Conversation;
35import eu.siacs.conversations.utils.XmppUri;
36import eu.siacs.conversations.xmpp.OnKeyStatusUpdated;
37import eu.siacs.conversations.xmpp.jid.InvalidJidException;
38import eu.siacs.conversations.xmpp.jid.Jid;
39
40public class TrustKeysActivity extends OmemoActivity implements OnKeyStatusUpdated {
41 private List<Jid> contactJids;
42
43 private Account mAccount;
44 private Conversation mConversation;
45 private TextView keyErrorMessage;
46 private LinearLayout keyErrorMessageCard;
47 private TextView ownKeysTitle;
48 private LinearLayout ownKeys;
49 private LinearLayout ownKeysCard;
50 private LinearLayout foreignKeys;
51 private Button mSaveButton;
52 private Button mCancelButton;
53
54 private AxolotlService.FetchStatus lastFetchReport = AxolotlService.FetchStatus.SUCCESS;
55
56 private final Map<String, Boolean> ownKeysToTrust = new HashMap<>();
57 private final Map<Jid,Map<String, Boolean>> foreignKeysToTrust = new HashMap<>();
58
59 private final OnClickListener mSaveButtonListener = new OnClickListener() {
60 @Override
61 public void onClick(View v) {
62 commitTrusts();
63 finishOk();
64 }
65 };
66
67 private final OnClickListener mCancelButtonListener = new OnClickListener() {
68 @Override
69 public void onClick(View v) {
70 setResult(RESULT_CANCELED);
71 finish();
72 }
73 };
74 private Toast mUseCameraHintToast = null;
75
76 @Override
77 protected void refreshUiReal() {
78 invalidateOptionsMenu();
79 populateView();
80 }
81
82 @Override
83 protected void onCreate(final Bundle savedInstanceState) {
84 super.onCreate(savedInstanceState);
85 setContentView(R.layout.activity_trust_keys);
86 this.contactJids = new ArrayList<>();
87 for(String jid : getIntent().getStringArrayExtra("contacts")) {
88 try {
89 this.contactJids.add(Jid.fromString(jid));
90 } catch (InvalidJidException e) {
91 e.printStackTrace();
92 }
93 }
94
95 keyErrorMessageCard = (LinearLayout) findViewById(R.id.key_error_message_card);
96 keyErrorMessage = (TextView) findViewById(R.id.key_error_message);
97 ownKeysTitle = (TextView) findViewById(R.id.own_keys_title);
98 ownKeys = (LinearLayout) findViewById(R.id.own_keys_details);
99 ownKeysCard = (LinearLayout) findViewById(R.id.own_keys_card);
100 foreignKeys = (LinearLayout) findViewById(R.id.foreign_keys);
101 mCancelButton = (Button) findViewById(R.id.cancel_button);
102 mCancelButton.setOnClickListener(mCancelButtonListener);
103 mSaveButton = (Button) findViewById(R.id.save_button);
104 mSaveButton.setOnClickListener(mSaveButtonListener);
105
106
107 if (getActionBar() != null) {
108 getActionBar().setHomeButtonEnabled(true);
109 getActionBar().setDisplayHomeAsUpEnabled(true);
110 }
111 }
112
113 @Override
114 public boolean onCreateOptionsMenu(Menu menu) {
115 getMenuInflater().inflate(R.menu.trust_keys, menu);
116 mUseCameraHintToast = Toast.makeText(this,R.string.use_camera_icon_to_scan_barcode,Toast.LENGTH_LONG);
117 ActionBar actionBar = getActionBar();
118 mUseCameraHintToast.setGravity(Gravity.TOP | Gravity.END, 0 ,actionBar == null ? 0 : actionBar.getHeight());
119 mUseCameraHintToast.show();
120 return super.onCreateOptionsMenu(menu);
121 }
122
123 @Override
124 public boolean onOptionsItemSelected(MenuItem item) {
125 switch (item.getItemId()) {
126 case R.id.action_scan_qr_code:
127 if (hasPendingKeyFetches()) {
128 Toast.makeText(this, R.string.please_wait_for_keys_to_be_fetched, Toast.LENGTH_SHORT).show();
129 } else {
130 new IntentIntegrator(this).initiateScan(Arrays.asList("AZTEC","QR_CODE"));
131 return true;
132 }
133 }
134 return super.onOptionsItemSelected(item);
135 }
136
137 @Override
138 protected void onStop() {
139 super.onStop();
140 if (mUseCameraHintToast != null) {
141 mUseCameraHintToast.cancel();
142 }
143 }
144
145 @Override
146 protected void processFingerprintVerification(XmppUri uri) {
147 if (mConversation != null
148 && mAccount != null
149 && uri.hasFingerprints()
150 && mAccount.getAxolotlService().getCryptoTargets(mConversation).contains(uri.getJid())) {
151 boolean performedVerification = xmppConnectionService.verifyFingerprints(mAccount.getRoster().getContact(uri.getJid()),uri.getFingerprints());
152 boolean keys = reloadFingerprints();
153 if (performedVerification && !keys && !hasNoOtherTrustedKeys() && !hasPendingKeyFetches()) {
154 Toast.makeText(this,R.string.all_omemo_keys_have_been_verified, Toast.LENGTH_SHORT).show();
155 finishOk();
156 return;
157 } else if (performedVerification) {
158 Toast.makeText(this,R.string.verified_fingerprints,Toast.LENGTH_SHORT).show();
159 }
160 } else {
161 reloadFingerprints();
162 Log.d(Config.LOGTAG,"xmpp uri was: "+uri.getJid()+" has Fingerprints: "+Boolean.toString(uri.hasFingerprints()));
163 Toast.makeText(this,R.string.barcode_does_not_contain_fingerprints_for_this_conversation,Toast.LENGTH_SHORT).show();
164 }
165 populateView();
166 }
167
168 private void populateView() {
169 setTitle(getString(R.string.trust_omemo_fingerprints));
170 ownKeys.removeAllViews();
171 foreignKeys.removeAllViews();
172 boolean hasOwnKeys = false;
173 boolean hasForeignKeys = false;
174 for(final String fingerprint : ownKeysToTrust.keySet()) {
175 hasOwnKeys = true;
176 addFingerprintRowWithListeners(ownKeys, mAccount, fingerprint, false,
177 FingerprintStatus.createActive(ownKeysToTrust.get(fingerprint)), false, false,
178 new CompoundButton.OnCheckedChangeListener() {
179 @Override
180 public void onCheckedChanged(CompoundButton buttonView, boolean isChecked) {
181 ownKeysToTrust.put(fingerprint, isChecked);
182 // own fingerprints have no impact on locked status.
183 }
184 }
185 );
186 }
187
188 synchronized (this.foreignKeysToTrust) {
189 for (Map.Entry<Jid, Map<String, Boolean>> entry : foreignKeysToTrust.entrySet()) {
190 hasForeignKeys = true;
191 final LinearLayout layout = (LinearLayout) getLayoutInflater().inflate(R.layout.keys_card, foreignKeys, false);
192 final Jid jid = entry.getKey();
193 final TextView header = (TextView) layout.findViewById(R.id.foreign_keys_title);
194 final LinearLayout keysContainer = (LinearLayout) layout.findViewById(R.id.foreign_keys_details);
195 final TextView informNoKeys = (TextView) layout.findViewById(R.id.no_keys_to_accept);
196 header.setText(jid.toString());
197 final Map<String, Boolean> fingerprints = entry.getValue();
198 for (final String fingerprint : fingerprints.keySet()) {
199 addFingerprintRowWithListeners(keysContainer, mAccount, fingerprint, false,
200 FingerprintStatus.createActive(fingerprints.get(fingerprint)), false, false,
201 new CompoundButton.OnCheckedChangeListener() {
202 @Override
203 public void onCheckedChanged(CompoundButton buttonView, boolean isChecked) {
204 fingerprints.put(fingerprint, isChecked);
205 lockOrUnlockAsNeeded();
206 }
207 }
208 );
209 }
210 if (fingerprints.size() == 0) {
211 informNoKeys.setVisibility(View.VISIBLE);
212 informNoKeys.setText(getString(R.string.no_keys_just_confirm,mAccount.getRoster().getContact(jid).getDisplayName()));
213 } else {
214 informNoKeys.setVisibility(View.GONE);
215 }
216 foreignKeys.addView(layout);
217 }
218 }
219
220 ownKeysTitle.setText(mAccount.getJid().toBareJid().toString());
221 ownKeysCard.setVisibility(hasOwnKeys ? View.VISIBLE : View.GONE);
222 foreignKeys.setVisibility(hasForeignKeys ? View.VISIBLE : View.GONE);
223 if(hasPendingKeyFetches()) {
224 setFetching();
225 lock();
226 } else {
227 if (!hasForeignKeys && hasNoOtherTrustedKeys()) {
228 keyErrorMessageCard.setVisibility(View.VISIBLE);
229 if (lastFetchReport == AxolotlService.FetchStatus.ERROR
230 || mAccount.getAxolotlService().fetchMapHasErrors(contactJids)) {
231 keyErrorMessage.setText(R.string.error_no_keys_to_trust_server_error);
232 } else {
233 keyErrorMessage.setText(R.string.error_no_keys_to_trust);
234 }
235 ownKeys.removeAllViews();
236 ownKeysCard.setVisibility(View.GONE);
237 foreignKeys.removeAllViews();
238 foreignKeys.setVisibility(View.GONE);
239 }
240 lockOrUnlockAsNeeded();
241 setDone();
242 }
243 }
244
245 private boolean reloadFingerprints() {
246 List<Jid> acceptedTargets = mConversation == null ? new ArrayList<Jid>() : mConversation.getAcceptedCryptoTargets();
247 ownKeysToTrust.clear();
248 AxolotlService service = this.mAccount.getAxolotlService();
249 Set<IdentityKey> ownKeysSet = service.getKeysWithTrust(FingerprintStatus.createActiveUndecided());
250 for(final IdentityKey identityKey : ownKeysSet) {
251 if(!ownKeysToTrust.containsKey(identityKey)) {
252 ownKeysToTrust.put(identityKey.getFingerprint().replaceAll("\\s", ""), false);
253 }
254 }
255 synchronized (this.foreignKeysToTrust) {
256 foreignKeysToTrust.clear();
257 for (Jid jid : contactJids) {
258 Set<IdentityKey> foreignKeysSet = service.getKeysWithTrust(FingerprintStatus.createActiveUndecided(), jid);
259 if (hasNoOtherTrustedKeys(jid) && ownKeysSet.size() == 0) {
260 foreignKeysSet.addAll(service.getKeysWithTrust(FingerprintStatus.createActive(false), jid));
261 }
262 Map<String, Boolean> foreignFingerprints = new HashMap<>();
263 for (final IdentityKey identityKey : foreignKeysSet) {
264 if (!foreignFingerprints.containsKey(identityKey)) {
265 foreignFingerprints.put(identityKey.getFingerprint().replaceAll("\\s", ""), false);
266 }
267 }
268 if (foreignFingerprints.size() > 0 || !acceptedTargets.contains(jid)) {
269 foreignKeysToTrust.put(jid, foreignFingerprints);
270 }
271 }
272 }
273 return ownKeysSet.size() + foreignKeysToTrust.size() > 0;
274 }
275
276 public void onBackendConnected() {
277 Intent intent = getIntent();
278 this.mAccount = extractAccount(intent);
279 if (this.mAccount != null && intent != null) {
280 String uuid = intent.getStringExtra("conversation");
281 this.mConversation = xmppConnectionService.findConversationByUuid(uuid);
282 if (this.mPendingFingerprintVerificationUri != null) {
283 processFingerprintVerification(this.mPendingFingerprintVerificationUri);
284 this.mPendingFingerprintVerificationUri = null;
285 } else {
286 reloadFingerprints();
287 populateView();
288 }
289 }
290 }
291
292 private boolean hasNoOtherTrustedKeys() {
293 return mAccount == null || mAccount.getAxolotlService().anyTargetHasNoTrustedKeys(contactJids);
294 }
295
296 private boolean hasNoOtherTrustedKeys(Jid contact) {
297 return mAccount == null || mAccount.getAxolotlService().getNumTrustedKeys(contact) == 0;
298 }
299
300 private boolean hasPendingKeyFetches() {
301 return mAccount != null && mAccount.getAxolotlService().hasPendingKeyFetches(mAccount, contactJids);
302 }
303
304
305 @Override
306 public void onKeyStatusUpdated(final AxolotlService.FetchStatus report) {
307 final boolean keysToTrust = reloadFingerprints();
308 if (report != null) {
309 lastFetchReport = report;
310 runOnUiThread(new Runnable() {
311 @Override
312 public void run() {
313 if (mUseCameraHintToast != null && !keysToTrust) {
314 mUseCameraHintToast.cancel();
315 }
316 switch (report) {
317 case ERROR:
318 Toast.makeText(TrustKeysActivity.this,R.string.error_fetching_omemo_key,Toast.LENGTH_SHORT).show();
319 break;
320 case SUCCESS_TRUSTED:
321 Toast.makeText(TrustKeysActivity.this,R.string.blindly_trusted_omemo_keys,Toast.LENGTH_LONG).show();
322 break;
323 case SUCCESS_VERIFIED:
324 Toast.makeText(TrustKeysActivity.this,
325 Config.X509_VERIFICATION ? R.string.verified_omemo_key_with_certificate : R.string.all_omemo_keys_have_been_verified,
326 Toast.LENGTH_LONG).show();
327 break;
328 }
329 }
330 });
331
332 }
333 if (keysToTrust || hasPendingKeyFetches() || hasNoOtherTrustedKeys()) {
334 refreshUi();
335 } else {
336 runOnUiThread(new Runnable() {
337 @Override
338 public void run() {
339 finishOk();
340 }
341 });
342
343 }
344 }
345
346 private void finishOk() {
347 Intent data = new Intent();
348 data.putExtra("choice", getIntent().getIntExtra("choice", ConversationActivity.ATTACHMENT_CHOICE_INVALID));
349 setResult(RESULT_OK, data);
350 finish();
351 }
352
353 private void commitTrusts() {
354 for(final String fingerprint :ownKeysToTrust.keySet()) {
355 mAccount.getAxolotlService().setFingerprintTrust(
356 fingerprint,
357 FingerprintStatus.createActive(ownKeysToTrust.get(fingerprint)));
358 }
359 List<Jid> acceptedTargets = mConversation == null ? new ArrayList<Jid>() : mConversation.getAcceptedCryptoTargets();
360 synchronized (this.foreignKeysToTrust) {
361 for (Map.Entry<Jid, Map<String, Boolean>> entry : foreignKeysToTrust.entrySet()) {
362 Jid jid = entry.getKey();
363 Map<String, Boolean> value = entry.getValue();
364 if (!acceptedTargets.contains(jid)) {
365 acceptedTargets.add(jid);
366 }
367 for (final String fingerprint : value.keySet()) {
368 mAccount.getAxolotlService().setFingerprintTrust(
369 fingerprint,
370 FingerprintStatus.createActive(value.get(fingerprint)));
371 }
372 }
373 }
374 if (mConversation != null && mConversation.getMode() == Conversation.MODE_MULTI) {
375 mConversation.setAcceptedCryptoTargets(acceptedTargets);
376 xmppConnectionService.updateConversation(mConversation);
377 }
378 }
379
380 private void unlock() {
381 mSaveButton.setEnabled(true);
382 mSaveButton.setTextColor(getPrimaryTextColor());
383 }
384
385 private void lock() {
386 mSaveButton.setEnabled(false);
387 mSaveButton.setTextColor(getSecondaryTextColor());
388 }
389
390 private void lockOrUnlockAsNeeded() {
391 synchronized (this.foreignKeysToTrust) {
392 for (Jid jid : contactJids) {
393 Map<String, Boolean> fingerprints = foreignKeysToTrust.get(jid);
394 if (hasNoOtherTrustedKeys(jid) && (fingerprints == null || !fingerprints.values().contains(true))) {
395 lock();
396 return;
397 }
398 }
399 }
400 unlock();
401
402 }
403
404 private void setDone() {
405 mSaveButton.setText(getString(R.string.done));
406 }
407
408 private void setFetching() {
409 mSaveButton.setText(getString(R.string.fetching_keys));
410 }
411}