TrustKeysActivity.java

  1package eu.siacs.conversations.ui;
  2
  3import android.app.ActionBar;
  4import android.content.Intent;
  5import android.os.Bundle;
  6import android.util.Log;
  7import android.view.Gravity;
  8import android.view.Menu;
  9import android.view.MenuItem;
 10import android.view.View;
 11import android.view.View.OnClickListener;
 12import android.widget.Button;
 13import android.widget.CompoundButton;
 14import android.widget.LinearLayout;
 15import android.widget.TextView;
 16import android.widget.Toast;
 17
 18import com.google.zxing.integration.android.IntentIntegrator;
 19
 20import org.whispersystems.libsignal.IdentityKey;
 21
 22import java.util.ArrayList;
 23import java.util.Arrays;
 24import java.util.HashMap;
 25import java.util.List;
 26import java.util.Map;
 27import java.util.Set;
 28
 29import eu.siacs.conversations.Config;
 30import eu.siacs.conversations.R;
 31import eu.siacs.conversations.crypto.axolotl.AxolotlService;
 32import eu.siacs.conversations.crypto.axolotl.FingerprintStatus;
 33import eu.siacs.conversations.entities.Account;
 34import eu.siacs.conversations.entities.Conversation;
 35import eu.siacs.conversations.utils.CryptoHelper;
 36import eu.siacs.conversations.utils.XmppUri;
 37import eu.siacs.conversations.xmpp.OnKeyStatusUpdated;
 38import eu.siacs.conversations.xmpp.jid.InvalidJidException;
 39import eu.siacs.conversations.xmpp.jid.Jid;
 40
 41public class TrustKeysActivity extends OmemoActivity implements OnKeyStatusUpdated {
 42	private List<Jid> contactJids;
 43
 44	private Account mAccount;
 45	private Conversation mConversation;
 46	private TextView keyErrorMessage;
 47	private LinearLayout keyErrorMessageCard;
 48	private TextView ownKeysTitle;
 49	private LinearLayout ownKeys;
 50	private LinearLayout ownKeysCard;
 51	private LinearLayout foreignKeys;
 52	private Button mSaveButton;
 53	private Button mCancelButton;
 54
 55	private AxolotlService.FetchStatus lastFetchReport = AxolotlService.FetchStatus.SUCCESS;
 56
 57	private final Map<String, Boolean> ownKeysToTrust = new HashMap<>();
 58	private final Map<Jid,Map<String, Boolean>> foreignKeysToTrust = new HashMap<>();
 59
 60	private final OnClickListener mSaveButtonListener = new OnClickListener() {
 61		@Override
 62		public void onClick(View v) {
 63			commitTrusts();
 64			finishOk();
 65		}
 66	};
 67
 68	private final OnClickListener mCancelButtonListener = new OnClickListener() {
 69		@Override
 70		public void onClick(View v) {
 71			setResult(RESULT_CANCELED);
 72			finish();
 73		}
 74	};
 75	private Toast mUseCameraHintToast = null;
 76
 77	@Override
 78	protected void refreshUiReal() {
 79		invalidateOptionsMenu();
 80		populateView();
 81	}
 82
 83	@Override
 84	protected void onCreate(final Bundle savedInstanceState) {
 85		super.onCreate(savedInstanceState);
 86		setContentView(R.layout.activity_trust_keys);
 87		this.contactJids = new ArrayList<>();
 88		for(String jid : getIntent().getStringArrayExtra("contacts")) {
 89			try {
 90				this.contactJids.add(Jid.fromString(jid));
 91			} catch (InvalidJidException e) {
 92				e.printStackTrace();
 93			}
 94		}
 95
 96		keyErrorMessageCard = (LinearLayout) findViewById(R.id.key_error_message_card);
 97		keyErrorMessage = (TextView) findViewById(R.id.key_error_message);
 98		ownKeysTitle = (TextView) findViewById(R.id.own_keys_title);
 99		ownKeys = (LinearLayout) findViewById(R.id.own_keys_details);
100		ownKeysCard = (LinearLayout) findViewById(R.id.own_keys_card);
101		foreignKeys = (LinearLayout) findViewById(R.id.foreign_keys);
102		mCancelButton = (Button) findViewById(R.id.cancel_button);
103		mCancelButton.setOnClickListener(mCancelButtonListener);
104		mSaveButton = (Button) findViewById(R.id.save_button);
105		mSaveButton.setOnClickListener(mSaveButtonListener);
106
107
108		if (getActionBar() != null) {
109			getActionBar().setHomeButtonEnabled(true);
110			getActionBar().setDisplayHomeAsUpEnabled(true);
111		}
112	}
113
114	@Override
115	public boolean onCreateOptionsMenu(Menu menu) {
116		getMenuInflater().inflate(R.menu.trust_keys, menu);
117		mUseCameraHintToast = Toast.makeText(this,R.string.use_camera_icon_to_scan_barcode,Toast.LENGTH_LONG);
118		ActionBar actionBar = getActionBar();
119		mUseCameraHintToast.setGravity(Gravity.TOP | Gravity.END, 0 ,actionBar == null ? 0 : actionBar.getHeight());
120		mUseCameraHintToast.show();
121		return super.onCreateOptionsMenu(menu);
122	}
123
124	@Override
125	public boolean onOptionsItemSelected(MenuItem item) {
126		switch (item.getItemId()) {
127			case R.id.action_scan_qr_code:
128				if (hasPendingKeyFetches()) {
129					Toast.makeText(this, R.string.please_wait_for_keys_to_be_fetched, Toast.LENGTH_SHORT).show();
130				} else {
131					new IntentIntegrator(this).initiateScan(Arrays.asList("AZTEC","QR_CODE"));
132					return true;
133				}
134		}
135		return super.onOptionsItemSelected(item);
136	}
137
138	@Override
139	protected void onStop() {
140		super.onStop();
141		if (mUseCameraHintToast != null) {
142			mUseCameraHintToast.cancel();
143		}
144	}
145
146	@Override
147	protected void processFingerprintVerification(XmppUri uri) {
148		if (mConversation != null
149				&& mAccount != null
150				&& uri.hasFingerprints()
151				&& mAccount.getAxolotlService().getCryptoTargets(mConversation).contains(uri.getJid())) {
152			boolean performedVerification = xmppConnectionService.verifyFingerprints(mAccount.getRoster().getContact(uri.getJid()),uri.getFingerprints());
153			boolean keys = reloadFingerprints();
154			if (performedVerification && !keys && !hasNoOtherTrustedKeys() && !hasPendingKeyFetches()) {
155				Toast.makeText(this,R.string.all_omemo_keys_have_been_verified, Toast.LENGTH_SHORT).show();
156				finishOk();
157				return;
158			} else if (performedVerification) {
159				Toast.makeText(this,R.string.verified_fingerprints,Toast.LENGTH_SHORT).show();
160			}
161		} else {
162			reloadFingerprints();
163			Log.d(Config.LOGTAG,"xmpp uri was: "+uri.getJid()+" has Fingerprints: "+Boolean.toString(uri.hasFingerprints()));
164			Toast.makeText(this,R.string.barcode_does_not_contain_fingerprints_for_this_conversation,Toast.LENGTH_SHORT).show();
165		}
166		populateView();
167	}
168
169	private void populateView() {
170		setTitle(getString(R.string.trust_omemo_fingerprints));
171		ownKeys.removeAllViews();
172		foreignKeys.removeAllViews();
173		boolean hasOwnKeys = false;
174		boolean hasForeignKeys = false;
175		for(final String fingerprint : ownKeysToTrust.keySet()) {
176			hasOwnKeys = true;
177			addFingerprintRowWithListeners(ownKeys, mAccount, fingerprint, false,
178					FingerprintStatus.createActive(ownKeysToTrust.get(fingerprint)), false, false,
179					new CompoundButton.OnCheckedChangeListener() {
180						@Override
181						public void onCheckedChanged(CompoundButton buttonView, boolean isChecked) {
182							ownKeysToTrust.put(fingerprint, isChecked);
183							// own fingerprints have no impact on locked status.
184						}
185					}
186			);
187		}
188
189		synchronized (this.foreignKeysToTrust) {
190			for (Map.Entry<Jid, Map<String, Boolean>> entry : foreignKeysToTrust.entrySet()) {
191				hasForeignKeys = true;
192				final LinearLayout layout = (LinearLayout) getLayoutInflater().inflate(R.layout.keys_card, foreignKeys, false);
193				final Jid jid = entry.getKey();
194				final TextView header = (TextView) layout.findViewById(R.id.foreign_keys_title);
195				final LinearLayout keysContainer = (LinearLayout) layout.findViewById(R.id.foreign_keys_details);
196				final TextView informNoKeys = (TextView) layout.findViewById(R.id.no_keys_to_accept);
197				header.setText(jid.toString());
198				final Map<String, Boolean> fingerprints = entry.getValue();
199				for (final String fingerprint : fingerprints.keySet()) {
200					addFingerprintRowWithListeners(keysContainer, mAccount, fingerprint, false,
201							FingerprintStatus.createActive(fingerprints.get(fingerprint)), false, false,
202							new CompoundButton.OnCheckedChangeListener() {
203								@Override
204								public void onCheckedChanged(CompoundButton buttonView, boolean isChecked) {
205									fingerprints.put(fingerprint, isChecked);
206									lockOrUnlockAsNeeded();
207								}
208							}
209					);
210				}
211				if (fingerprints.size() == 0) {
212					informNoKeys.setVisibility(View.VISIBLE);
213					informNoKeys.setText(getString(R.string.no_keys_just_confirm,mAccount.getRoster().getContact(jid).getDisplayName()));
214				} else {
215					informNoKeys.setVisibility(View.GONE);
216				}
217				foreignKeys.addView(layout);
218			}
219		}
220
221		ownKeysTitle.setText(mAccount.getJid().toBareJid().toString());
222		ownKeysCard.setVisibility(hasOwnKeys ? View.VISIBLE : View.GONE);
223		foreignKeys.setVisibility(hasForeignKeys ? View.VISIBLE : View.GONE);
224		if(hasPendingKeyFetches()) {
225			setFetching();
226			lock();
227		} else {
228			if (!hasForeignKeys && hasNoOtherTrustedKeys()) {
229				keyErrorMessageCard.setVisibility(View.VISIBLE);
230				if (lastFetchReport == AxolotlService.FetchStatus.ERROR
231						|| mAccount.getAxolotlService().fetchMapHasErrors(contactJids)) {
232					keyErrorMessage.setText(R.string.error_no_keys_to_trust_server_error);
233				} else {
234					keyErrorMessage.setText(R.string.error_no_keys_to_trust);
235				}
236				ownKeys.removeAllViews();
237				ownKeysCard.setVisibility(View.GONE);
238				foreignKeys.removeAllViews();
239				foreignKeys.setVisibility(View.GONE);
240			}
241			lockOrUnlockAsNeeded();
242			setDone();
243		}
244	}
245
246	private boolean reloadFingerprints() {
247		List<Jid> acceptedTargets = mConversation == null ? new ArrayList<Jid>() : mConversation.getAcceptedCryptoTargets();
248		ownKeysToTrust.clear();
249		AxolotlService service = this.mAccount.getAxolotlService();
250		Set<IdentityKey> ownKeysSet = service.getKeysWithTrust(FingerprintStatus.createActiveUndecided());
251		for(final IdentityKey identityKey : ownKeysSet) {
252			final String fingerprint = CryptoHelper.bytesToHex(identityKey.getPublicKey().serialize());
253			if(!ownKeysToTrust.containsKey(fingerprint)) {
254				ownKeysToTrust.put(fingerprint, false);
255			}
256		}
257		synchronized (this.foreignKeysToTrust) {
258			foreignKeysToTrust.clear();
259			for (Jid jid : contactJids) {
260				Set<IdentityKey> foreignKeysSet = service.getKeysWithTrust(FingerprintStatus.createActiveUndecided(), jid);
261				if (hasNoOtherTrustedKeys(jid) && ownKeysSet.size() == 0) {
262					foreignKeysSet.addAll(service.getKeysWithTrust(FingerprintStatus.createActive(false), jid));
263				}
264				Map<String, Boolean> foreignFingerprints = new HashMap<>();
265				for (final IdentityKey identityKey : foreignKeysSet) {
266					final String fingerprint = CryptoHelper.bytesToHex(identityKey.getPublicKey().serialize());
267					if (!foreignFingerprints.containsKey(fingerprint)) {
268						foreignFingerprints.put(fingerprint, false);
269					}
270				}
271				if (foreignFingerprints.size() > 0 || !acceptedTargets.contains(jid)) {
272					foreignKeysToTrust.put(jid, foreignFingerprints);
273				}
274			}
275		}
276		return ownKeysSet.size() + foreignKeysToTrust.size() > 0;
277	}
278
279	public void onBackendConnected() {
280		Intent intent = getIntent();
281		this.mAccount = extractAccount(intent);
282		if (this.mAccount != null && intent != null) {
283			String uuid = intent.getStringExtra("conversation");
284			this.mConversation = xmppConnectionService.findConversationByUuid(uuid);
285			if (this.mPendingFingerprintVerificationUri != null) {
286				processFingerprintVerification(this.mPendingFingerprintVerificationUri);
287				this.mPendingFingerprintVerificationUri = null;
288			} else {
289				reloadFingerprints();
290				populateView();
291			}
292		}
293	}
294
295	private boolean hasNoOtherTrustedKeys() {
296		return mAccount == null || mAccount.getAxolotlService().anyTargetHasNoTrustedKeys(contactJids);
297	}
298
299	private boolean hasNoOtherTrustedKeys(Jid contact) {
300		return mAccount == null || mAccount.getAxolotlService().getNumTrustedKeys(contact) == 0;
301	}
302
303	private boolean hasPendingKeyFetches() {
304		return mAccount != null && mAccount.getAxolotlService().hasPendingKeyFetches(mAccount, contactJids);
305	}
306
307
308	@Override
309	public void onKeyStatusUpdated(final AxolotlService.FetchStatus report) {
310		final boolean keysToTrust = reloadFingerprints();
311		if (report != null) {
312			lastFetchReport = report;
313			runOnUiThread(new Runnable() {
314				@Override
315				public void run() {
316					if (mUseCameraHintToast != null && !keysToTrust) {
317						mUseCameraHintToast.cancel();
318					}
319					switch (report) {
320						case ERROR:
321							Toast.makeText(TrustKeysActivity.this,R.string.error_fetching_omemo_key,Toast.LENGTH_SHORT).show();
322							break;
323						case SUCCESS_TRUSTED:
324							Toast.makeText(TrustKeysActivity.this,R.string.blindly_trusted_omemo_keys,Toast.LENGTH_LONG).show();
325							break;
326						case SUCCESS_VERIFIED:
327							Toast.makeText(TrustKeysActivity.this,
328									Config.X509_VERIFICATION ? R.string.verified_omemo_key_with_certificate : R.string.all_omemo_keys_have_been_verified,
329									Toast.LENGTH_LONG).show();
330							break;
331					}
332				}
333			});
334
335		}
336		if (keysToTrust || hasPendingKeyFetches() || hasNoOtherTrustedKeys()) {
337			refreshUi();
338		} else {
339			runOnUiThread(new Runnable() {
340				@Override
341				public void run() {
342					finishOk();
343				}
344			});
345
346		}
347	}
348
349	private void finishOk() {
350		Intent data = new Intent();
351		data.putExtra("choice", getIntent().getIntExtra("choice", ConversationActivity.ATTACHMENT_CHOICE_INVALID));
352		setResult(RESULT_OK, data);
353		finish();
354	}
355
356	private void commitTrusts() {
357		for(final String fingerprint :ownKeysToTrust.keySet()) {
358			mAccount.getAxolotlService().setFingerprintTrust(
359					fingerprint,
360					FingerprintStatus.createActive(ownKeysToTrust.get(fingerprint)));
361		}
362		List<Jid> acceptedTargets = mConversation == null ? new ArrayList<Jid>() : mConversation.getAcceptedCryptoTargets();
363		synchronized (this.foreignKeysToTrust) {
364			for (Map.Entry<Jid, Map<String, Boolean>> entry : foreignKeysToTrust.entrySet()) {
365				Jid jid = entry.getKey();
366				Map<String, Boolean> value = entry.getValue();
367				if (!acceptedTargets.contains(jid)) {
368					acceptedTargets.add(jid);
369				}
370				for (final String fingerprint : value.keySet()) {
371					mAccount.getAxolotlService().setFingerprintTrust(
372							fingerprint,
373							FingerprintStatus.createActive(value.get(fingerprint)));
374				}
375			}
376		}
377		if (mConversation != null && mConversation.getMode() == Conversation.MODE_MULTI) {
378			mConversation.setAcceptedCryptoTargets(acceptedTargets);
379			xmppConnectionService.updateConversation(mConversation);
380		}
381	}
382
383	private void unlock() {
384		mSaveButton.setEnabled(true);
385		mSaveButton.setTextColor(getPrimaryTextColor());
386	}
387
388	private void lock() {
389		mSaveButton.setEnabled(false);
390		mSaveButton.setTextColor(getSecondaryTextColor());
391	}
392
393	private void lockOrUnlockAsNeeded() {
394		synchronized (this.foreignKeysToTrust) {
395			for (Jid jid : contactJids) {
396				Map<String, Boolean> fingerprints = foreignKeysToTrust.get(jid);
397				if (hasNoOtherTrustedKeys(jid) && (fingerprints == null || !fingerprints.values().contains(true))) {
398					lock();
399					return;
400				}
401			}
402		}
403		unlock();
404
405	}
406
407	private void setDone() {
408		mSaveButton.setText(getString(R.string.done));
409	}
410
411	private void setFetching() {
412		mSaveButton.setText(getString(R.string.fetching_keys));
413	}
414}