1package eu.siacs.conversations.ui;
2
3import android.app.ActionBar;
4import android.content.Intent;
5import android.os.Bundle;
6import android.util.Log;
7import android.view.Gravity;
8import android.view.Menu;
9import android.view.MenuItem;
10import android.view.View;
11import android.view.View.OnClickListener;
12import android.widget.Button;
13import android.widget.CompoundButton;
14import android.widget.LinearLayout;
15import android.widget.TextView;
16import android.widget.Toast;
17
18import com.google.zxing.integration.android.IntentIntegrator;
19
20import org.whispersystems.libsignal.IdentityKey;
21
22import java.util.ArrayList;
23import java.util.Arrays;
24import java.util.HashMap;
25import java.util.List;
26import java.util.Map;
27import java.util.Set;
28
29import eu.siacs.conversations.Config;
30import eu.siacs.conversations.R;
31import eu.siacs.conversations.crypto.axolotl.AxolotlService;
32import eu.siacs.conversations.crypto.axolotl.FingerprintStatus;
33import eu.siacs.conversations.entities.Account;
34import eu.siacs.conversations.entities.Conversation;
35import eu.siacs.conversations.utils.CryptoHelper;
36import eu.siacs.conversations.utils.XmppUri;
37import eu.siacs.conversations.xmpp.OnKeyStatusUpdated;
38import eu.siacs.conversations.xmpp.jid.InvalidJidException;
39import eu.siacs.conversations.xmpp.jid.Jid;
40
41public class TrustKeysActivity extends OmemoActivity implements OnKeyStatusUpdated {
42 private List<Jid> contactJids;
43
44 private Account mAccount;
45 private Conversation mConversation;
46 private TextView keyErrorMessage;
47 private LinearLayout keyErrorMessageCard;
48 private TextView ownKeysTitle;
49 private LinearLayout ownKeys;
50 private LinearLayout ownKeysCard;
51 private LinearLayout foreignKeys;
52 private Button mSaveButton;
53 private Button mCancelButton;
54
55 private AxolotlService.FetchStatus lastFetchReport = AxolotlService.FetchStatus.SUCCESS;
56
57 private final Map<String, Boolean> ownKeysToTrust = new HashMap<>();
58 private final Map<Jid,Map<String, Boolean>> foreignKeysToTrust = new HashMap<>();
59
60 private final OnClickListener mSaveButtonListener = new OnClickListener() {
61 @Override
62 public void onClick(View v) {
63 commitTrusts();
64 finishOk();
65 }
66 };
67
68 private final OnClickListener mCancelButtonListener = new OnClickListener() {
69 @Override
70 public void onClick(View v) {
71 setResult(RESULT_CANCELED);
72 finish();
73 }
74 };
75 private Toast mUseCameraHintToast = null;
76
77 @Override
78 protected void refreshUiReal() {
79 invalidateOptionsMenu();
80 populateView();
81 }
82
83 @Override
84 protected void onCreate(final Bundle savedInstanceState) {
85 super.onCreate(savedInstanceState);
86 setContentView(R.layout.activity_trust_keys);
87 this.contactJids = new ArrayList<>();
88 for(String jid : getIntent().getStringArrayExtra("contacts")) {
89 try {
90 this.contactJids.add(Jid.fromString(jid));
91 } catch (InvalidJidException e) {
92 e.printStackTrace();
93 }
94 }
95
96 keyErrorMessageCard = (LinearLayout) findViewById(R.id.key_error_message_card);
97 keyErrorMessage = (TextView) findViewById(R.id.key_error_message);
98 ownKeysTitle = (TextView) findViewById(R.id.own_keys_title);
99 ownKeys = (LinearLayout) findViewById(R.id.own_keys_details);
100 ownKeysCard = (LinearLayout) findViewById(R.id.own_keys_card);
101 foreignKeys = (LinearLayout) findViewById(R.id.foreign_keys);
102 mCancelButton = (Button) findViewById(R.id.cancel_button);
103 mCancelButton.setOnClickListener(mCancelButtonListener);
104 mSaveButton = (Button) findViewById(R.id.save_button);
105 mSaveButton.setOnClickListener(mSaveButtonListener);
106
107
108 if (getActionBar() != null) {
109 getActionBar().setHomeButtonEnabled(true);
110 getActionBar().setDisplayHomeAsUpEnabled(true);
111 }
112 }
113
114 @Override
115 public boolean onCreateOptionsMenu(Menu menu) {
116 getMenuInflater().inflate(R.menu.trust_keys, menu);
117 mUseCameraHintToast = Toast.makeText(this,R.string.use_camera_icon_to_scan_barcode,Toast.LENGTH_LONG);
118 ActionBar actionBar = getActionBar();
119 mUseCameraHintToast.setGravity(Gravity.TOP | Gravity.END, 0 ,actionBar == null ? 0 : actionBar.getHeight());
120 mUseCameraHintToast.show();
121 return super.onCreateOptionsMenu(menu);
122 }
123
124 @Override
125 public boolean onOptionsItemSelected(MenuItem item) {
126 switch (item.getItemId()) {
127 case R.id.action_scan_qr_code:
128 if (hasPendingKeyFetches()) {
129 Toast.makeText(this, R.string.please_wait_for_keys_to_be_fetched, Toast.LENGTH_SHORT).show();
130 } else {
131 new IntentIntegrator(this).initiateScan(Arrays.asList("AZTEC","QR_CODE"));
132 return true;
133 }
134 }
135 return super.onOptionsItemSelected(item);
136 }
137
138 @Override
139 protected void onStop() {
140 super.onStop();
141 if (mUseCameraHintToast != null) {
142 mUseCameraHintToast.cancel();
143 }
144 }
145
146 @Override
147 protected void processFingerprintVerification(XmppUri uri) {
148 if (mConversation != null
149 && mAccount != null
150 && uri.hasFingerprints()
151 && mAccount.getAxolotlService().getCryptoTargets(mConversation).contains(uri.getJid())) {
152 boolean performedVerification = xmppConnectionService.verifyFingerprints(mAccount.getRoster().getContact(uri.getJid()),uri.getFingerprints());
153 boolean keys = reloadFingerprints();
154 if (performedVerification && !keys && !hasNoOtherTrustedKeys() && !hasPendingKeyFetches()) {
155 Toast.makeText(this,R.string.all_omemo_keys_have_been_verified, Toast.LENGTH_SHORT).show();
156 finishOk();
157 return;
158 } else if (performedVerification) {
159 Toast.makeText(this,R.string.verified_fingerprints,Toast.LENGTH_SHORT).show();
160 }
161 } else {
162 reloadFingerprints();
163 Log.d(Config.LOGTAG,"xmpp uri was: "+uri.getJid()+" has Fingerprints: "+Boolean.toString(uri.hasFingerprints()));
164 Toast.makeText(this,R.string.barcode_does_not_contain_fingerprints_for_this_conversation,Toast.LENGTH_SHORT).show();
165 }
166 populateView();
167 }
168
169 private void populateView() {
170 setTitle(getString(R.string.trust_omemo_fingerprints));
171 ownKeys.removeAllViews();
172 foreignKeys.removeAllViews();
173 boolean hasOwnKeys = false;
174 boolean hasForeignKeys = false;
175 for(final String fingerprint : ownKeysToTrust.keySet()) {
176 hasOwnKeys = true;
177 addFingerprintRowWithListeners(ownKeys, mAccount, fingerprint, false,
178 FingerprintStatus.createActive(ownKeysToTrust.get(fingerprint)), false, false,
179 new CompoundButton.OnCheckedChangeListener() {
180 @Override
181 public void onCheckedChanged(CompoundButton buttonView, boolean isChecked) {
182 ownKeysToTrust.put(fingerprint, isChecked);
183 // own fingerprints have no impact on locked status.
184 }
185 }
186 );
187 }
188
189 synchronized (this.foreignKeysToTrust) {
190 for (Map.Entry<Jid, Map<String, Boolean>> entry : foreignKeysToTrust.entrySet()) {
191 hasForeignKeys = true;
192 final LinearLayout layout = (LinearLayout) getLayoutInflater().inflate(R.layout.keys_card, foreignKeys, false);
193 final Jid jid = entry.getKey();
194 final TextView header = (TextView) layout.findViewById(R.id.foreign_keys_title);
195 final LinearLayout keysContainer = (LinearLayout) layout.findViewById(R.id.foreign_keys_details);
196 final TextView informNoKeys = (TextView) layout.findViewById(R.id.no_keys_to_accept);
197 header.setText(jid.toString());
198 final Map<String, Boolean> fingerprints = entry.getValue();
199 for (final String fingerprint : fingerprints.keySet()) {
200 addFingerprintRowWithListeners(keysContainer, mAccount, fingerprint, false,
201 FingerprintStatus.createActive(fingerprints.get(fingerprint)), false, false,
202 new CompoundButton.OnCheckedChangeListener() {
203 @Override
204 public void onCheckedChanged(CompoundButton buttonView, boolean isChecked) {
205 fingerprints.put(fingerprint, isChecked);
206 lockOrUnlockAsNeeded();
207 }
208 }
209 );
210 }
211 if (fingerprints.size() == 0) {
212 informNoKeys.setVisibility(View.VISIBLE);
213 informNoKeys.setText(getString(R.string.no_keys_just_confirm,mAccount.getRoster().getContact(jid).getDisplayName()));
214 } else {
215 informNoKeys.setVisibility(View.GONE);
216 }
217 foreignKeys.addView(layout);
218 }
219 }
220
221 ownKeysTitle.setText(mAccount.getJid().toBareJid().toString());
222 ownKeysCard.setVisibility(hasOwnKeys ? View.VISIBLE : View.GONE);
223 foreignKeys.setVisibility(hasForeignKeys ? View.VISIBLE : View.GONE);
224 if(hasPendingKeyFetches()) {
225 setFetching();
226 lock();
227 } else {
228 if (!hasForeignKeys && hasNoOtherTrustedKeys()) {
229 keyErrorMessageCard.setVisibility(View.VISIBLE);
230 if (lastFetchReport == AxolotlService.FetchStatus.ERROR
231 || mAccount.getAxolotlService().fetchMapHasErrors(contactJids)) {
232 keyErrorMessage.setText(R.string.error_no_keys_to_trust_server_error);
233 } else {
234 keyErrorMessage.setText(R.string.error_no_keys_to_trust);
235 }
236 ownKeys.removeAllViews();
237 ownKeysCard.setVisibility(View.GONE);
238 foreignKeys.removeAllViews();
239 foreignKeys.setVisibility(View.GONE);
240 }
241 lockOrUnlockAsNeeded();
242 setDone();
243 }
244 }
245
246 private boolean reloadFingerprints() {
247 List<Jid> acceptedTargets = mConversation == null ? new ArrayList<Jid>() : mConversation.getAcceptedCryptoTargets();
248 ownKeysToTrust.clear();
249 AxolotlService service = this.mAccount.getAxolotlService();
250 Set<IdentityKey> ownKeysSet = service.getKeysWithTrust(FingerprintStatus.createActiveUndecided());
251 for(final IdentityKey identityKey : ownKeysSet) {
252 final String fingerprint = CryptoHelper.bytesToHex(identityKey.getPublicKey().serialize());
253 if(!ownKeysToTrust.containsKey(fingerprint)) {
254 ownKeysToTrust.put(fingerprint, false);
255 }
256 }
257 synchronized (this.foreignKeysToTrust) {
258 foreignKeysToTrust.clear();
259 for (Jid jid : contactJids) {
260 Set<IdentityKey> foreignKeysSet = service.getKeysWithTrust(FingerprintStatus.createActiveUndecided(), jid);
261 if (hasNoOtherTrustedKeys(jid) && ownKeysSet.size() == 0) {
262 foreignKeysSet.addAll(service.getKeysWithTrust(FingerprintStatus.createActive(false), jid));
263 }
264 Map<String, Boolean> foreignFingerprints = new HashMap<>();
265 for (final IdentityKey identityKey : foreignKeysSet) {
266 final String fingerprint = CryptoHelper.bytesToHex(identityKey.getPublicKey().serialize());
267 if (!foreignFingerprints.containsKey(fingerprint)) {
268 foreignFingerprints.put(fingerprint, false);
269 }
270 }
271 if (foreignFingerprints.size() > 0 || !acceptedTargets.contains(jid)) {
272 foreignKeysToTrust.put(jid, foreignFingerprints);
273 }
274 }
275 }
276 return ownKeysSet.size() + foreignKeysToTrust.size() > 0;
277 }
278
279 public void onBackendConnected() {
280 Intent intent = getIntent();
281 this.mAccount = extractAccount(intent);
282 if (this.mAccount != null && intent != null) {
283 String uuid = intent.getStringExtra("conversation");
284 this.mConversation = xmppConnectionService.findConversationByUuid(uuid);
285 if (this.mPendingFingerprintVerificationUri != null) {
286 processFingerprintVerification(this.mPendingFingerprintVerificationUri);
287 this.mPendingFingerprintVerificationUri = null;
288 } else {
289 reloadFingerprints();
290 populateView();
291 }
292 }
293 }
294
295 private boolean hasNoOtherTrustedKeys() {
296 return mAccount == null || mAccount.getAxolotlService().anyTargetHasNoTrustedKeys(contactJids);
297 }
298
299 private boolean hasNoOtherTrustedKeys(Jid contact) {
300 return mAccount == null || mAccount.getAxolotlService().getNumTrustedKeys(contact) == 0;
301 }
302
303 private boolean hasPendingKeyFetches() {
304 return mAccount != null && mAccount.getAxolotlService().hasPendingKeyFetches(mAccount, contactJids);
305 }
306
307
308 @Override
309 public void onKeyStatusUpdated(final AxolotlService.FetchStatus report) {
310 final boolean keysToTrust = reloadFingerprints();
311 if (report != null) {
312 lastFetchReport = report;
313 runOnUiThread(new Runnable() {
314 @Override
315 public void run() {
316 if (mUseCameraHintToast != null && !keysToTrust) {
317 mUseCameraHintToast.cancel();
318 }
319 switch (report) {
320 case ERROR:
321 Toast.makeText(TrustKeysActivity.this,R.string.error_fetching_omemo_key,Toast.LENGTH_SHORT).show();
322 break;
323 case SUCCESS_TRUSTED:
324 Toast.makeText(TrustKeysActivity.this,R.string.blindly_trusted_omemo_keys,Toast.LENGTH_LONG).show();
325 break;
326 case SUCCESS_VERIFIED:
327 Toast.makeText(TrustKeysActivity.this,
328 Config.X509_VERIFICATION ? R.string.verified_omemo_key_with_certificate : R.string.all_omemo_keys_have_been_verified,
329 Toast.LENGTH_LONG).show();
330 break;
331 }
332 }
333 });
334
335 }
336 if (keysToTrust || hasPendingKeyFetches() || hasNoOtherTrustedKeys()) {
337 refreshUi();
338 } else {
339 runOnUiThread(new Runnable() {
340 @Override
341 public void run() {
342 finishOk();
343 }
344 });
345
346 }
347 }
348
349 private void finishOk() {
350 Intent data = new Intent();
351 data.putExtra("choice", getIntent().getIntExtra("choice", ConversationActivity.ATTACHMENT_CHOICE_INVALID));
352 setResult(RESULT_OK, data);
353 finish();
354 }
355
356 private void commitTrusts() {
357 for(final String fingerprint :ownKeysToTrust.keySet()) {
358 mAccount.getAxolotlService().setFingerprintTrust(
359 fingerprint,
360 FingerprintStatus.createActive(ownKeysToTrust.get(fingerprint)));
361 }
362 List<Jid> acceptedTargets = mConversation == null ? new ArrayList<Jid>() : mConversation.getAcceptedCryptoTargets();
363 synchronized (this.foreignKeysToTrust) {
364 for (Map.Entry<Jid, Map<String, Boolean>> entry : foreignKeysToTrust.entrySet()) {
365 Jid jid = entry.getKey();
366 Map<String, Boolean> value = entry.getValue();
367 if (!acceptedTargets.contains(jid)) {
368 acceptedTargets.add(jid);
369 }
370 for (final String fingerprint : value.keySet()) {
371 mAccount.getAxolotlService().setFingerprintTrust(
372 fingerprint,
373 FingerprintStatus.createActive(value.get(fingerprint)));
374 }
375 }
376 }
377 if (mConversation != null && mConversation.getMode() == Conversation.MODE_MULTI) {
378 mConversation.setAcceptedCryptoTargets(acceptedTargets);
379 xmppConnectionService.updateConversation(mConversation);
380 }
381 }
382
383 private void unlock() {
384 mSaveButton.setEnabled(true);
385 mSaveButton.setTextColor(getPrimaryTextColor());
386 }
387
388 private void lock() {
389 mSaveButton.setEnabled(false);
390 mSaveButton.setTextColor(getSecondaryTextColor());
391 }
392
393 private void lockOrUnlockAsNeeded() {
394 synchronized (this.foreignKeysToTrust) {
395 for (Jid jid : contactJids) {
396 Map<String, Boolean> fingerprints = foreignKeysToTrust.get(jid);
397 if (hasNoOtherTrustedKeys(jid) && (fingerprints == null || !fingerprints.values().contains(true))) {
398 lock();
399 return;
400 }
401 }
402 }
403 unlock();
404
405 }
406
407 private void setDone() {
408 mSaveButton.setText(getString(R.string.done));
409 }
410
411 private void setFetching() {
412 mSaveButton.setText(getString(R.string.fetching_keys));
413 }
414}