TrustKeysActivity.java

  1package eu.siacs.conversations.ui;
  2
  3import android.app.ActionBar;
  4import android.content.Intent;
  5import android.os.Bundle;
  6import android.util.Log;
  7import android.view.Gravity;
  8import android.view.Menu;
  9import android.view.MenuItem;
 10import android.view.View;
 11import android.view.View.OnClickListener;
 12import android.widget.Button;
 13import android.widget.CompoundButton;
 14import android.widget.LinearLayout;
 15import android.widget.TextView;
 16import android.widget.Toast;
 17
 18import com.google.zxing.integration.android.IntentIntegrator;
 19
 20import org.whispersystems.libsignal.IdentityKey;
 21
 22import java.util.ArrayList;
 23import java.util.Arrays;
 24import java.util.HashMap;
 25import java.util.List;
 26import java.util.Map;
 27import java.util.Set;
 28import java.util.concurrent.atomic.AtomicBoolean;
 29
 30import eu.siacs.conversations.Config;
 31import eu.siacs.conversations.R;
 32import eu.siacs.conversations.crypto.axolotl.AxolotlService;
 33import eu.siacs.conversations.crypto.axolotl.FingerprintStatus;
 34import eu.siacs.conversations.entities.Account;
 35import eu.siacs.conversations.entities.Conversation;
 36import eu.siacs.conversations.utils.CryptoHelper;
 37import eu.siacs.conversations.utils.XmppUri;
 38import eu.siacs.conversations.xmpp.OnKeyStatusUpdated;
 39import eu.siacs.conversations.xmpp.jid.InvalidJidException;
 40import eu.siacs.conversations.xmpp.jid.Jid;
 41
 42public class TrustKeysActivity extends OmemoActivity implements OnKeyStatusUpdated {
 43	private List<Jid> contactJids;
 44
 45	private Account mAccount;
 46	private Conversation mConversation;
 47	private TextView keyErrorMessage;
 48	private LinearLayout keyErrorMessageCard;
 49	private TextView ownKeysTitle;
 50	private LinearLayout ownKeys;
 51	private LinearLayout ownKeysCard;
 52	private LinearLayout foreignKeys;
 53	private Button mSaveButton;
 54	private Button mCancelButton;
 55
 56	private AtomicBoolean mUseCameraHintShown = new AtomicBoolean(false);
 57
 58	private AxolotlService.FetchStatus lastFetchReport = AxolotlService.FetchStatus.SUCCESS;
 59
 60	private final Map<String, Boolean> ownKeysToTrust = new HashMap<>();
 61	private final Map<Jid,Map<String, Boolean>> foreignKeysToTrust = new HashMap<>();
 62
 63	private final OnClickListener mSaveButtonListener = new OnClickListener() {
 64		@Override
 65		public void onClick(View v) {
 66			commitTrusts();
 67			finishOk();
 68		}
 69	};
 70
 71	private final OnClickListener mCancelButtonListener = new OnClickListener() {
 72		@Override
 73		public void onClick(View v) {
 74			setResult(RESULT_CANCELED);
 75			finish();
 76		}
 77	};
 78	private Toast mUseCameraHintToast = null;
 79
 80	@Override
 81	protected void refreshUiReal() {
 82		invalidateOptionsMenu();
 83		populateView();
 84	}
 85
 86	@Override
 87	protected void onCreate(final Bundle savedInstanceState) {
 88		super.onCreate(savedInstanceState);
 89		setContentView(R.layout.activity_trust_keys);
 90		this.contactJids = new ArrayList<>();
 91		for(String jid : getIntent().getStringArrayExtra("contacts")) {
 92			try {
 93				this.contactJids.add(Jid.fromString(jid));
 94			} catch (InvalidJidException e) {
 95				e.printStackTrace();
 96			}
 97		}
 98
 99		keyErrorMessageCard = (LinearLayout) findViewById(R.id.key_error_message_card);
100		keyErrorMessage = (TextView) findViewById(R.id.key_error_message);
101		ownKeysTitle = (TextView) findViewById(R.id.own_keys_title);
102		ownKeys = (LinearLayout) findViewById(R.id.own_keys_details);
103		ownKeysCard = (LinearLayout) findViewById(R.id.own_keys_card);
104		foreignKeys = (LinearLayout) findViewById(R.id.foreign_keys);
105		mCancelButton = (Button) findViewById(R.id.cancel_button);
106		mCancelButton.setOnClickListener(mCancelButtonListener);
107		mSaveButton = (Button) findViewById(R.id.save_button);
108		mSaveButton.setOnClickListener(mSaveButtonListener);
109
110
111		if (getActionBar() != null) {
112			getActionBar().setHomeButtonEnabled(true);
113			getActionBar().setDisplayHomeAsUpEnabled(true);
114		}
115
116		if (savedInstanceState != null) {
117			mUseCameraHintShown.set(savedInstanceState.getBoolean("camera_hint_shown",false));
118		}
119	}
120
121	@Override
122	public void onSaveInstanceState(Bundle savedInstanceState) {
123		savedInstanceState.putBoolean("camera_hint_shown", mUseCameraHintShown.get());
124		super.onSaveInstanceState(savedInstanceState);
125	}
126
127	@Override
128	public boolean onCreateOptionsMenu(Menu menu) {
129		getMenuInflater().inflate(R.menu.trust_keys, menu);
130		MenuItem scanQrCode = menu.findItem(R.id.action_scan_qr_code);
131		scanQrCode.setVisible(ownKeysToTrust.size() > 0 || foreignActuallyHasKeys());
132		return super.onCreateOptionsMenu(menu);
133	}
134
135	private void showCameraToast() {
136		mUseCameraHintToast = Toast.makeText(this,R.string.use_camera_icon_to_scan_barcode,Toast.LENGTH_LONG);
137		ActionBar actionBar = getActionBar();
138		mUseCameraHintToast.setGravity(Gravity.TOP | Gravity.END, 0 ,actionBar == null ? 0 : actionBar.getHeight());
139		mUseCameraHintToast.show();
140	}
141
142	@Override
143	public boolean onOptionsItemSelected(MenuItem item) {
144		switch (item.getItemId()) {
145			case R.id.action_scan_qr_code:
146				if (hasPendingKeyFetches()) {
147					Toast.makeText(this, R.string.please_wait_for_keys_to_be_fetched, Toast.LENGTH_SHORT).show();
148				} else {
149					new IntentIntegrator(this).initiateScan(Arrays.asList("AZTEC","QR_CODE"));
150					return true;
151				}
152		}
153		return super.onOptionsItemSelected(item);
154	}
155
156	@Override
157	protected void onStop() {
158		super.onStop();
159		if (mUseCameraHintToast != null) {
160			mUseCameraHintToast.cancel();
161		}
162	}
163
164	@Override
165	protected void processFingerprintVerification(XmppUri uri) {
166		if (mConversation != null
167				&& mAccount != null
168				&& uri.hasFingerprints()
169				&& mAccount.getAxolotlService().getCryptoTargets(mConversation).contains(uri.getJid())) {
170			boolean performedVerification = xmppConnectionService.verifyFingerprints(mAccount.getRoster().getContact(uri.getJid()),uri.getFingerprints());
171			boolean keys = reloadFingerprints();
172			if (performedVerification && !keys && !hasNoOtherTrustedKeys() && !hasPendingKeyFetches()) {
173				Toast.makeText(this,R.string.all_omemo_keys_have_been_verified, Toast.LENGTH_SHORT).show();
174				finishOk();
175				return;
176			} else if (performedVerification) {
177				Toast.makeText(this,R.string.verified_fingerprints,Toast.LENGTH_SHORT).show();
178			}
179		} else {
180			reloadFingerprints();
181			Log.d(Config.LOGTAG,"xmpp uri was: "+uri.getJid()+" has Fingerprints: "+Boolean.toString(uri.hasFingerprints()));
182			Toast.makeText(this,R.string.barcode_does_not_contain_fingerprints_for_this_conversation,Toast.LENGTH_SHORT).show();
183		}
184		populateView();
185	}
186
187	private void populateView() {
188		setTitle(getString(R.string.trust_omemo_fingerprints));
189		ownKeys.removeAllViews();
190		foreignKeys.removeAllViews();
191		boolean hasOwnKeys = false;
192		boolean hasForeignKeys = false;
193		for(final String fingerprint : ownKeysToTrust.keySet()) {
194			hasOwnKeys = true;
195			addFingerprintRowWithListeners(ownKeys, mAccount, fingerprint, false,
196					FingerprintStatus.createActive(ownKeysToTrust.get(fingerprint)), false, false,
197					new CompoundButton.OnCheckedChangeListener() {
198						@Override
199						public void onCheckedChanged(CompoundButton buttonView, boolean isChecked) {
200							ownKeysToTrust.put(fingerprint, isChecked);
201							// own fingerprints have no impact on locked status.
202						}
203					}
204			);
205		}
206
207		synchronized (this.foreignKeysToTrust) {
208			for (Map.Entry<Jid, Map<String, Boolean>> entry : foreignKeysToTrust.entrySet()) {
209				hasForeignKeys = true;
210				final LinearLayout layout = (LinearLayout) getLayoutInflater().inflate(R.layout.keys_card, foreignKeys, false);
211				final Jid jid = entry.getKey();
212				final TextView header = (TextView) layout.findViewById(R.id.foreign_keys_title);
213				final LinearLayout keysContainer = (LinearLayout) layout.findViewById(R.id.foreign_keys_details);
214				final TextView informNoKeys = (TextView) layout.findViewById(R.id.no_keys_to_accept);
215				header.setText(jid.toString());
216				header.setOnClickListener(new OnClickListener() {
217					@Override
218					public void onClick(View v) {
219						switchToContactDetails(mAccount.getRoster().getContact(jid));
220					}
221				});
222				final Map<String, Boolean> fingerprints = entry.getValue();
223				for (final String fingerprint : fingerprints.keySet()) {
224					addFingerprintRowWithListeners(keysContainer, mAccount, fingerprint, false,
225							FingerprintStatus.createActive(fingerprints.get(fingerprint)), false, false,
226							new CompoundButton.OnCheckedChangeListener() {
227								@Override
228								public void onCheckedChanged(CompoundButton buttonView, boolean isChecked) {
229									fingerprints.put(fingerprint, isChecked);
230									lockOrUnlockAsNeeded();
231								}
232							}
233					);
234				}
235				if (fingerprints.size() == 0) {
236					informNoKeys.setVisibility(View.VISIBLE);
237					if (hasNoOtherTrustedKeys(jid)) {
238						if (!mAccount.getRoster().getContact(jid).mutualPresenceSubscription()) {
239							informNoKeys.setText(R.string.error_no_keys_to_trust_presence);
240						} else {
241							informNoKeys.setText(R.string.error_no_keys_to_trust_server_error);
242						}
243					} else {
244						informNoKeys.setText(getString(R.string.no_keys_just_confirm, mAccount.getRoster().getContact(jid).getDisplayName()));
245					}
246				} else {
247					informNoKeys.setVisibility(View.GONE);
248				}
249				foreignKeys.addView(layout);
250			}
251		}
252
253		if ((hasOwnKeys || foreignActuallyHasKeys()) && mUseCameraHintShown.compareAndSet(false,true)) {
254			showCameraToast();
255		}
256
257		ownKeysTitle.setText(mAccount.getJid().toBareJid().toString());
258		ownKeysCard.setVisibility(hasOwnKeys ? View.VISIBLE : View.GONE);
259		foreignKeys.setVisibility(hasForeignKeys ? View.VISIBLE : View.GONE);
260		if(hasPendingKeyFetches()) {
261			setFetching();
262			lock();
263		} else {
264			if (!hasForeignKeys && hasNoOtherTrustedKeys()) {
265				keyErrorMessageCard.setVisibility(View.VISIBLE);
266				if (lastFetchReport == AxolotlService.FetchStatus.ERROR
267						|| mAccount.getAxolotlService().fetchMapHasErrors(contactJids)) {
268					if (anyWithoutMutualPresenceSubscription(contactJids)) {
269						keyErrorMessage.setText(R.string.error_no_keys_to_trust_presence);
270					} else {
271						keyErrorMessage.setText(R.string.error_no_keys_to_trust_server_error);
272					}
273				} else {
274					keyErrorMessage.setText(R.string.error_no_keys_to_trust);
275				}
276				ownKeys.removeAllViews();
277				ownKeysCard.setVisibility(View.GONE);
278				foreignKeys.removeAllViews();
279				foreignKeys.setVisibility(View.GONE);
280			}
281			lockOrUnlockAsNeeded();
282			setDone();
283		}
284	}
285
286	private boolean anyWithoutMutualPresenceSubscription(List<Jid> contactJids){
287		for(Jid jid : contactJids) {
288			if (!mAccount.getRoster().getContact(jid).mutualPresenceSubscription()) {
289				return true;
290			}
291		}
292		return false;
293	}
294
295	private boolean foreignActuallyHasKeys() {
296		synchronized (this.foreignKeysToTrust) {
297			for (Map.Entry<Jid, Map<String, Boolean>> entry : foreignKeysToTrust.entrySet()) {
298				if (entry.getValue().size() > 0) {
299					return true;
300				}
301			}
302		}
303		return false;
304	}
305
306	private boolean reloadFingerprints() {
307		List<Jid> acceptedTargets = mConversation == null ? new ArrayList<Jid>() : mConversation.getAcceptedCryptoTargets();
308		ownKeysToTrust.clear();
309		AxolotlService service = this.mAccount.getAxolotlService();
310		Set<IdentityKey> ownKeysSet = service.getKeysWithTrust(FingerprintStatus.createActiveUndecided());
311		for(final IdentityKey identityKey : ownKeysSet) {
312			final String fingerprint = CryptoHelper.bytesToHex(identityKey.getPublicKey().serialize());
313			if(!ownKeysToTrust.containsKey(fingerprint)) {
314				ownKeysToTrust.put(fingerprint, false);
315			}
316		}
317		synchronized (this.foreignKeysToTrust) {
318			foreignKeysToTrust.clear();
319			for (Jid jid : contactJids) {
320				Set<IdentityKey> foreignKeysSet = service.getKeysWithTrust(FingerprintStatus.createActiveUndecided(), jid);
321				if (hasNoOtherTrustedKeys(jid) && ownKeysSet.size() == 0) {
322					foreignKeysSet.addAll(service.getKeysWithTrust(FingerprintStatus.createActive(false), jid));
323				}
324				Map<String, Boolean> foreignFingerprints = new HashMap<>();
325				for (final IdentityKey identityKey : foreignKeysSet) {
326					final String fingerprint = CryptoHelper.bytesToHex(identityKey.getPublicKey().serialize());
327					if (!foreignFingerprints.containsKey(fingerprint)) {
328						foreignFingerprints.put(fingerprint, false);
329					}
330				}
331				if (foreignFingerprints.size() > 0 || !acceptedTargets.contains(jid)) {
332					foreignKeysToTrust.put(jid, foreignFingerprints);
333				}
334			}
335		}
336		return ownKeysSet.size() + foreignKeysToTrust.size() > 0;
337	}
338
339	public void onBackendConnected() {
340		Intent intent = getIntent();
341		this.mAccount = extractAccount(intent);
342		if (this.mAccount != null && intent != null) {
343			String uuid = intent.getStringExtra("conversation");
344			this.mConversation = xmppConnectionService.findConversationByUuid(uuid);
345			if (this.mPendingFingerprintVerificationUri != null) {
346				processFingerprintVerification(this.mPendingFingerprintVerificationUri);
347				this.mPendingFingerprintVerificationUri = null;
348			} else {
349				reloadFingerprints();
350				populateView();
351				invalidateOptionsMenu();
352			}
353		}
354	}
355
356	private boolean hasNoOtherTrustedKeys() {
357		return mAccount == null || mAccount.getAxolotlService().anyTargetHasNoTrustedKeys(contactJids);
358	}
359
360	private boolean hasNoOtherTrustedKeys(Jid contact) {
361		return mAccount == null || mAccount.getAxolotlService().getNumTrustedKeys(contact) == 0;
362	}
363
364	private boolean hasPendingKeyFetches() {
365		return mAccount != null && mAccount.getAxolotlService().hasPendingKeyFetches(mAccount, contactJids);
366	}
367
368
369	@Override
370	public void onKeyStatusUpdated(final AxolotlService.FetchStatus report) {
371		final boolean keysToTrust = reloadFingerprints();
372		if (report != null) {
373			lastFetchReport = report;
374			runOnUiThread(new Runnable() {
375				@Override
376				public void run() {
377					if (mUseCameraHintToast != null && !keysToTrust) {
378						mUseCameraHintToast.cancel();
379					}
380					switch (report) {
381						case ERROR:
382							Toast.makeText(TrustKeysActivity.this,R.string.error_fetching_omemo_key,Toast.LENGTH_SHORT).show();
383							break;
384						case SUCCESS_TRUSTED:
385							Toast.makeText(TrustKeysActivity.this,R.string.blindly_trusted_omemo_keys,Toast.LENGTH_LONG).show();
386							break;
387						case SUCCESS_VERIFIED:
388							Toast.makeText(TrustKeysActivity.this,
389									Config.X509_VERIFICATION ? R.string.verified_omemo_key_with_certificate : R.string.all_omemo_keys_have_been_verified,
390									Toast.LENGTH_LONG).show();
391							break;
392					}
393				}
394			});
395
396		}
397		if (keysToTrust || hasPendingKeyFetches() || hasNoOtherTrustedKeys()) {
398			refreshUi();
399		} else {
400			runOnUiThread(new Runnable() {
401				@Override
402				public void run() {
403					finishOk();
404				}
405			});
406
407		}
408	}
409
410	private void finishOk() {
411		Intent data = new Intent();
412		data.putExtra("choice", getIntent().getIntExtra("choice", ConversationActivity.ATTACHMENT_CHOICE_INVALID));
413		setResult(RESULT_OK, data);
414		finish();
415	}
416
417	private void commitTrusts() {
418		for(final String fingerprint :ownKeysToTrust.keySet()) {
419			mAccount.getAxolotlService().setFingerprintTrust(
420					fingerprint,
421					FingerprintStatus.createActive(ownKeysToTrust.get(fingerprint)));
422		}
423		List<Jid> acceptedTargets = mConversation == null ? new ArrayList<Jid>() : mConversation.getAcceptedCryptoTargets();
424		synchronized (this.foreignKeysToTrust) {
425			for (Map.Entry<Jid, Map<String, Boolean>> entry : foreignKeysToTrust.entrySet()) {
426				Jid jid = entry.getKey();
427				Map<String, Boolean> value = entry.getValue();
428				if (!acceptedTargets.contains(jid)) {
429					acceptedTargets.add(jid);
430				}
431				for (final String fingerprint : value.keySet()) {
432					mAccount.getAxolotlService().setFingerprintTrust(
433							fingerprint,
434							FingerprintStatus.createActive(value.get(fingerprint)));
435				}
436			}
437		}
438		if (mConversation != null && mConversation.getMode() == Conversation.MODE_MULTI) {
439			mConversation.setAcceptedCryptoTargets(acceptedTargets);
440			xmppConnectionService.updateConversation(mConversation);
441		}
442	}
443
444	private void unlock() {
445		mSaveButton.setEnabled(true);
446		mSaveButton.setTextColor(getPrimaryTextColor());
447	}
448
449	private void lock() {
450		mSaveButton.setEnabled(false);
451		mSaveButton.setTextColor(getSecondaryTextColor());
452	}
453
454	private void lockOrUnlockAsNeeded() {
455		synchronized (this.foreignKeysToTrust) {
456			for (Jid jid : contactJids) {
457				Map<String, Boolean> fingerprints = foreignKeysToTrust.get(jid);
458				if (hasNoOtherTrustedKeys(jid) && (fingerprints == null || !fingerprints.values().contains(true))) {
459					lock();
460					return;
461				}
462			}
463		}
464		unlock();
465
466	}
467
468	private void setDone() {
469		mSaveButton.setText(getString(R.string.done));
470	}
471
472	private void setFetching() {
473		mSaveButton.setText(getString(R.string.fetching_keys));
474	}
475}