2014-02-28 17:46:01 +00:00
package eu.siacs.conversations.xmpp ;
2014-01-30 15:42:35 +00:00
2018-03-15 07:53:19 +00:00
import android.content.Context ;
2015-10-11 11:11:50 +00:00
import android.graphics.Bitmap ;
import android.graphics.BitmapFactory ;
2014-11-03 09:03:45 +00:00
import android.os.SystemClock ;
2015-10-11 18:45:01 +00:00
import android.security.KeyChain ;
2015-10-11 11:11:50 +00:00
import android.util.Base64 ;
2014-11-03 09:03:45 +00:00
import android.util.Log ;
2014-12-30 13:50:51 +00:00
import android.util.Pair ;
2014-11-03 09:03:45 +00:00
import android.util.SparseArray ;
2021-01-23 08:25:34 +00:00
import androidx.annotation.NonNull ;
2022-06-14 06:39:55 +00:00
import com.google.common.base.Strings ;
2014-11-03 09:03:45 +00:00
import org.xmlpull.v1.XmlPullParserException ;
2015-10-11 11:11:50 +00:00
import java.io.ByteArrayInputStream ;
2014-01-30 15:42:35 +00:00
import java.io.IOException ;
import java.io.InputStream ;
2014-11-18 00:48:16 +00:00
import java.net.ConnectException ;
2017-07-10 06:50:01 +00:00
import java.net.IDN ;
2014-11-16 11:00:53 +00:00
import java.net.InetAddress ;
2014-10-27 20:48:25 +00:00
import java.net.InetSocketAddress ;
2014-01-30 15:42:35 +00:00
import java.net.Socket ;
2017-01-12 20:26:58 +00:00
import java.net.UnknownHostException ;
2014-03-06 19:03:35 +00:00
import java.security.KeyManagementException ;
import java.security.NoSuchAlgorithmException ;
2015-10-11 18:45:01 +00:00
import java.security.Principal ;
import java.security.PrivateKey ;
import java.security.cert.X509Certificate ;
2014-03-15 03:59:18 +00:00
import java.util.ArrayList ;
2016-07-25 13:57:47 +00:00
import java.util.Arrays ;
2018-07-07 09:20:39 +00:00
import java.util.Collections ;
2014-04-08 21:15:55 +00:00
import java.util.HashMap ;
2017-06-30 06:45:16 +00:00
import java.util.HashSet ;
2014-02-01 00:25:56 +00:00
import java.util.Hashtable ;
2015-08-06 12:54:37 +00:00
import java.util.Iterator ;
2014-02-09 13:10:52 +00:00
import java.util.List ;
2014-04-08 21:15:55 +00:00
import java.util.Map.Entry ;
2018-03-18 09:30:15 +00:00
import java.util.Set ;
2018-01-20 20:57:09 +00:00
import java.util.concurrent.CountDownLatch ;
import java.util.concurrent.TimeUnit ;
2016-04-04 18:06:07 +00:00
import java.util.concurrent.atomic.AtomicBoolean ;
import java.util.concurrent.atomic.AtomicInteger ;
2017-06-19 18:02:41 +00:00
import java.util.regex.Matcher ;
2014-01-30 15:42:35 +00:00
2015-10-11 18:45:01 +00:00
import javax.net.ssl.KeyManager ;
2014-03-06 19:03:35 +00:00
import javax.net.ssl.SSLContext ;
2021-05-03 06:28:03 +00:00
import javax.net.ssl.SSLPeerUnverifiedException ;
2014-01-30 15:42:35 +00:00
import javax.net.ssl.SSLSocket ;
import javax.net.ssl.SSLSocketFactory ;
2015-10-11 18:45:01 +00:00
import javax.net.ssl.X509KeyManager ;
2014-03-06 19:03:35 +00:00
import javax.net.ssl.X509TrustManager ;
2014-01-30 15:42:35 +00:00
2014-08-31 14:28:21 +00:00
import eu.siacs.conversations.Config ;
2018-02-27 19:33:21 +00:00
import eu.siacs.conversations.R ;
2015-10-15 15:08:38 +00:00
import eu.siacs.conversations.crypto.XmppDomainVerifier ;
2017-12-18 12:47:53 +00:00
import eu.siacs.conversations.crypto.axolotl.AxolotlService ;
2016-08-07 14:46:01 +00:00
import eu.siacs.conversations.crypto.sasl.Anonymous ;
2014-11-12 15:15:38 +00:00
import eu.siacs.conversations.crypto.sasl.DigestMd5 ;
2015-10-11 18:45:01 +00:00
import eu.siacs.conversations.crypto.sasl.External ;
2014-11-12 15:15:38 +00:00
import eu.siacs.conversations.crypto.sasl.Plain ;
import eu.siacs.conversations.crypto.sasl.SaslMechanism ;
2014-11-12 20:35:44 +00:00
import eu.siacs.conversations.crypto.sasl.ScramSha1 ;
2017-01-12 20:26:58 +00:00
import eu.siacs.conversations.crypto.sasl.ScramSha256 ;
2020-12-31 08:32:05 +00:00
import eu.siacs.conversations.crypto.sasl.ScramSha512 ;
2014-02-28 17:46:01 +00:00
import eu.siacs.conversations.entities.Account ;
2015-08-19 11:00:52 +00:00
import eu.siacs.conversations.entities.Message ;
2016-01-10 19:56:55 +00:00
import eu.siacs.conversations.entities.ServiceDiscoveryResult ;
2014-12-21 20:43:58 +00:00
import eu.siacs.conversations.generator.IqGenerator ;
2021-03-22 09:39:53 +00:00
import eu.siacs.conversations.http.HttpConnectionManager ;
2017-08-23 10:33:40 +00:00
import eu.siacs.conversations.persistance.FileBackend ;
2018-02-16 17:58:57 +00:00
import eu.siacs.conversations.services.MemorizingTrustManager ;
2018-07-07 09:20:39 +00:00
import eu.siacs.conversations.services.MessageArchiveService ;
2017-05-19 11:30:57 +00:00
import eu.siacs.conversations.services.NotificationService ;
2014-06-20 15:30:19 +00:00
import eu.siacs.conversations.services.XmppConnectionService ;
2017-07-30 09:39:47 +00:00
import eu.siacs.conversations.utils.CryptoHelper ;
2017-06-19 18:02:41 +00:00
import eu.siacs.conversations.utils.Patterns ;
2017-06-21 21:28:01 +00:00
import eu.siacs.conversations.utils.Resolver ;
2016-01-12 15:33:15 +00:00
import eu.siacs.conversations.utils.SSLSocketHelper ;
2015-11-29 15:31:51 +00:00
import eu.siacs.conversations.utils.SocksSocketFactory ;
2019-02-09 19:21:29 +00:00
import eu.siacs.conversations.utils.XmlHelper ;
2014-02-28 17:46:01 +00:00
import eu.siacs.conversations.xml.Element ;
2019-09-12 08:12:47 +00:00
import eu.siacs.conversations.xml.LocalizedContent ;
2018-09-26 12:39:04 +00:00
import eu.siacs.conversations.xml.Namespace ;
2014-02-28 17:46:01 +00:00
import eu.siacs.conversations.xml.Tag ;
import eu.siacs.conversations.xml.TagWriter ;
import eu.siacs.conversations.xml.XmlReader ;
2015-10-11 11:11:50 +00:00
import eu.siacs.conversations.xmpp.forms.Data ;
2014-04-08 21:15:55 +00:00
import eu.siacs.conversations.xmpp.jingle.OnJinglePacketReceived ;
import eu.siacs.conversations.xmpp.jingle.stanzas.JinglePacket ;
2015-08-13 16:25:10 +00:00
import eu.siacs.conversations.xmpp.stanzas.AbstractAcknowledgeableStanza ;
2014-03-10 18:22:13 +00:00
import eu.siacs.conversations.xmpp.stanzas.AbstractStanza ;
import eu.siacs.conversations.xmpp.stanzas.IqPacket ;
import eu.siacs.conversations.xmpp.stanzas.MessagePacket ;
import eu.siacs.conversations.xmpp.stanzas.PresencePacket ;
2014-08-26 15:43:44 +00:00
import eu.siacs.conversations.xmpp.stanzas.csi.ActivePacket ;
import eu.siacs.conversations.xmpp.stanzas.csi.InactivePacket ;
2014-03-10 18:22:13 +00:00
import eu.siacs.conversations.xmpp.stanzas.streammgmt.AckPacket ;
import eu.siacs.conversations.xmpp.stanzas.streammgmt.EnablePacket ;
import eu.siacs.conversations.xmpp.stanzas.streammgmt.RequestPacket ;
import eu.siacs.conversations.xmpp.stanzas.streammgmt.ResumePacket ;
2021-03-22 09:12:53 +00:00
import okhttp3.HttpUrl ;
2014-01-30 15:42:35 +00:00
public class XmppConnection implements Runnable {
2018-09-26 12:39:04 +00:00
private static final int PACKET_IQ = 0 ;
private static final int PACKET_MESSAGE = 1 ;
private static final int PACKET_PRESENCE = 2 ;
2020-12-31 09:27:06 +00:00
public final OnIqPacketReceived registrationResponseListener = ( account , packet ) - > {
if ( packet . getType ( ) = = IqPacket . TYPE . RESULT ) {
account . setOption ( Account . OPTION_REGISTER , false ) ;
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : successfully registered new account on server " ) ;
throw new StateChangingError ( Account . State . REGISTRATION_SUCCESSFUL ) ;
} else {
final List < String > PASSWORD_TOO_WEAK_MSGS = Arrays . asList (
" The password is too weak " ,
" Please use a longer password. " ) ;
Element error = packet . findChild ( " error " ) ;
Account . State state = Account . State . REGISTRATION_FAILED ;
if ( error ! = null ) {
if ( error . hasChild ( " conflict " ) ) {
state = Account . State . REGISTRATION_CONFLICT ;
} else if ( error . hasChild ( " resource-constraint " )
& & " wait " . equals ( error . getAttribute ( " type " ) ) ) {
state = Account . State . REGISTRATION_PLEASE_WAIT ;
} else if ( error . hasChild ( " not-acceptable " )
& & PASSWORD_TOO_WEAK_MSGS . contains ( error . findChildContent ( " text " ) ) ) {
state = Account . State . REGISTRATION_PASSWORD_TOO_WEAK ;
2018-09-26 12:39:04 +00:00
}
}
2020-12-31 09:27:06 +00:00
throw new StateChangingError ( state ) ;
2018-09-26 12:39:04 +00:00
}
} ;
protected final Account account ;
private final Features features = new Features ( this ) ;
private final HashMap < Jid , ServiceDiscoveryResult > disco = new HashMap < > ( ) ;
2020-12-01 19:31:30 +00:00
private final HashMap < String , Jid > commands = new HashMap < > ( ) ;
2018-09-26 12:39:04 +00:00
private final SparseArray < AbstractAcknowledgeableStanza > mStanzaQueue = new SparseArray < > ( ) ;
private final Hashtable < String , Pair < IqPacket , OnIqPacketReceived > > packetCallbacks = new Hashtable < > ( ) ;
private final Set < OnAdvancedStreamFeaturesLoaded > advancedStreamFeaturesLoadedListeners = new HashSet < > ( ) ;
private final XmppConnectionService mXmppConnectionService ;
private Socket socket ;
private XmlReader tagReader ;
private TagWriter tagWriter = new TagWriter ( ) ;
private boolean shouldAuthenticate = true ;
private boolean inSmacksSession = false ;
private boolean isBound = false ;
private Element streamFeatures ;
private String streamId = null ;
private int smVersion = 3 ;
private int stanzasReceived = 0 ;
private int stanzasSent = 0 ;
private long lastPacketReceived = 0 ;
private long lastPingSent = 0 ;
private long lastConnect = 0 ;
private long lastSessionStarted = 0 ;
private long lastDiscoStarted = 0 ;
2018-12-05 18:11:40 +00:00
private boolean isMamPreferenceAlways = false ;
2020-12-31 09:27:06 +00:00
private final AtomicInteger mPendingServiceDiscoveries = new AtomicInteger ( 0 ) ;
private final AtomicBoolean mWaitForDisco = new AtomicBoolean ( true ) ;
private final AtomicBoolean mWaitingForSmCatchup = new AtomicBoolean ( false ) ;
private final AtomicInteger mSmCatchupMessageCounter = new AtomicInteger ( 0 ) ;
2018-09-26 12:39:04 +00:00
private boolean mInteractive = false ;
private int attempt = 0 ;
private OnPresencePacketReceived presenceListener = null ;
private OnJinglePacketReceived jingleListener = null ;
private OnIqPacketReceived unregisteredIqListener = null ;
private OnMessagePacketReceived messageListener = null ;
private OnStatusChanged statusListener = null ;
private OnBindListener bindListener = null ;
private OnMessageAcknowledged acknowledgedListener = null ;
private SaslMechanism saslMechanism ;
2021-03-22 09:12:53 +00:00
private HttpUrl redirectionUrl = null ;
2018-09-26 12:39:04 +00:00
private String verifiedHostname = null ;
private volatile Thread mThread ;
private CountDownLatch mStreamCountDownLatch ;
public XmppConnection ( final Account account , final XmppConnectionService service ) {
this . account = account ;
this . mXmppConnectionService = service ;
}
private static void fixResource ( Context context , Account account ) {
String resource = account . getResource ( ) ;
int fixedPartLength = context . getString ( R . string . app_name ) . length ( ) + 1 ; //include the trailing dot
int randomPartLength = 4 ; // 3 bytes
if ( resource ! = null & & resource . length ( ) > fixedPartLength + randomPartLength ) {
if ( validBase64 ( resource . substring ( fixedPartLength , fixedPartLength + randomPartLength ) ) ) {
account . setResource ( resource . substring ( 0 , fixedPartLength + randomPartLength ) ) ;
}
}
}
private static boolean validBase64 ( String input ) {
try {
return Base64 . decode ( input , Base64 . URL_SAFE ) . length = = 3 ;
} catch ( Throwable throwable ) {
return false ;
}
}
2018-09-27 07:59:05 +00:00
private void changeStatus ( final Account . State nextStatus ) {
2018-09-26 12:39:04 +00:00
synchronized ( this ) {
if ( Thread . currentThread ( ) . isInterrupted ( ) ) {
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : not changing status to " + nextStatus + " because thread was interrupted " ) ;
return ;
}
if ( account . getStatus ( ) ! = nextStatus ) {
if ( ( nextStatus = = Account . State . OFFLINE )
& & ( account . getStatus ( ) ! = Account . State . CONNECTING )
& & ( account . getStatus ( ) ! = Account . State . ONLINE )
& & ( account . getStatus ( ) ! = Account . State . DISABLED ) ) {
return ;
}
if ( nextStatus = = Account . State . ONLINE ) {
this . attempt = 0 ;
}
account . setStatus ( nextStatus ) ;
} else {
return ;
}
}
if ( statusListener ! = null ) {
statusListener . onStatusChanged ( account ) ;
}
}
2020-12-01 19:31:30 +00:00
public Jid getJidForCommand ( final String node ) {
synchronized ( this . commands ) {
return this . commands . get ( node ) ;
}
}
2018-09-26 12:39:04 +00:00
public void prepareNewConnection ( ) {
this . lastConnect = SystemClock . elapsedRealtime ( ) ;
this . lastPingSent = SystemClock . elapsedRealtime ( ) ;
this . lastDiscoStarted = Long . MAX_VALUE ;
this . mWaitingForSmCatchup . set ( false ) ;
this . changeStatus ( Account . State . CONNECTING ) ;
}
public boolean isWaitingForSmCatchup ( ) {
return mWaitingForSmCatchup . get ( ) ;
}
public void incrementSmCatchupMessageCounter ( ) {
this . mSmCatchupMessageCounter . incrementAndGet ( ) ;
}
protected void connect ( ) {
if ( mXmppConnectionService . areMessagesInitialized ( ) ) {
mXmppConnectionService . resetSendingToWaiting ( account ) ;
}
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) . toString ( ) + " : connecting " ) ;
features . encryptionEnabled = false ;
inSmacksSession = false ;
isBound = false ;
this . attempt + + ;
this . verifiedHostname = null ; //will be set if user entered hostname is being used or hostname was verified with dnssec
try {
Socket localSocket ;
shouldAuthenticate = ! account . isOptionSet ( Account . OPTION_REGISTER ) ;
this . changeStatus ( Account . State . CONNECTING ) ;
final boolean useTor = mXmppConnectionService . useTorToConnect ( ) | | account . isOnion ( ) ;
final boolean extended = mXmppConnectionService . showExtendedConnectionOptions ( ) ;
if ( useTor ) {
String destination ;
2019-01-25 07:48:46 +00:00
if ( account . getHostname ( ) . isEmpty ( ) | | account . isOnion ( ) ) {
2018-09-26 12:39:04 +00:00
destination = account . getServer ( ) ;
} else {
destination = account . getHostname ( ) ;
this . verifiedHostname = destination ;
}
2019-09-05 10:08:58 +00:00
final int port = account . getPort ( ) ;
final boolean directTls = Resolver . useDirectTls ( port ) ;
2020-05-22 16:23:53 +00:00
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : connect to " + destination + " via Tor. directTls= " + directTls ) ;
2019-09-05 10:08:58 +00:00
localSocket = SocksSocketFactory . createSocketOverTor ( destination , port ) ;
if ( directTls ) {
localSocket = upgradeSocketToTls ( localSocket ) ;
features . encryptionEnabled = true ;
}
2018-09-26 12:39:04 +00:00
try {
startXmpp ( localSocket ) ;
} catch ( InterruptedException e ) {
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : thread was interrupted before beginning stream " ) ;
return ;
} catch ( Exception e ) {
throw new IOException ( e . getMessage ( ) ) ;
}
} else {
2020-05-17 08:24:46 +00:00
final String domain = account . getServer ( ) ;
2018-10-01 15:07:37 +00:00
final List < Resolver . Result > results ;
final boolean hardcoded = extended & & ! account . getHostname ( ) . isEmpty ( ) ;
if ( hardcoded ) {
results = Resolver . fromHardCoded ( account . getHostname ( ) , account . getPort ( ) ) ;
} else {
results = Resolver . resolve ( domain ) ;
}
2018-09-26 12:39:04 +00:00
if ( Thread . currentThread ( ) . isInterrupted ( ) ) {
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : Thread was interrupted " ) ;
return ;
}
if ( results . size ( ) = = 0 ) {
2020-05-22 16:23:53 +00:00
Log . e ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : Resolver results were empty " ) ;
2018-09-26 12:39:04 +00:00
return ;
}
2018-10-01 15:07:37 +00:00
final Resolver . Result storedBackupResult ;
if ( hardcoded ) {
storedBackupResult = null ;
} else {
storedBackupResult = mXmppConnectionService . databaseBackend . findResolverResult ( domain ) ;
if ( storedBackupResult ! = null & & ! results . contains ( storedBackupResult ) ) {
results . add ( storedBackupResult ) ;
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : loaded backup resolver result from db: " + storedBackupResult ) ;
}
2018-09-26 12:39:04 +00:00
}
for ( Iterator < Resolver . Result > iterator = results . iterator ( ) ; iterator . hasNext ( ) ; ) {
final Resolver . Result result = iterator . next ( ) ;
if ( Thread . currentThread ( ) . isInterrupted ( ) ) {
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : Thread was interrupted " ) ;
return ;
}
try {
// if tls is true, encryption is implied and must not be started
features . encryptionEnabled = result . isDirectTls ( ) ;
verifiedHostname = result . isAuthenticated ( ) ? result . getHostname ( ) . toString ( ) : null ;
2020-05-22 16:23:53 +00:00
Log . d ( Config . LOGTAG , " verified hostname " + verifiedHostname ) ;
2018-09-26 12:39:04 +00:00
final InetSocketAddress addr ;
if ( result . getIp ( ) ! = null ) {
addr = new InetSocketAddress ( result . getIp ( ) , result . getPort ( ) ) ;
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) . toString ( )
2018-10-01 15:07:37 +00:00
+ " : using values from resolver " + ( result . getHostname ( ) = = null ? " " : result . getHostname ( ) . toString ( )
+ " / " ) + result . getIp ( ) . getHostAddress ( ) + " : " + result . getPort ( ) + " tls: " + features . encryptionEnabled ) ;
2018-09-26 12:39:04 +00:00
} else {
addr = new InetSocketAddress ( IDN . toASCII ( result . getHostname ( ) . toString ( ) ) , result . getPort ( ) ) ;
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) . toString ( )
2018-10-01 15:07:37 +00:00
+ " : using values from resolver "
2018-09-26 12:39:04 +00:00
+ result . getHostname ( ) . toString ( ) + " : " + result . getPort ( ) + " tls: " + features . encryptionEnabled ) ;
}
2019-09-05 10:08:58 +00:00
localSocket = new Socket ( ) ;
localSocket . connect ( addr , Config . SOCKET_TIMEOUT * 1000 ) ;
2018-09-26 12:39:04 +00:00
2019-09-05 10:08:58 +00:00
if ( features . encryptionEnabled ) {
localSocket = upgradeSocketToTls ( localSocket ) ;
2018-09-26 12:39:04 +00:00
}
2019-09-05 10:08:58 +00:00
2018-10-04 09:20:02 +00:00
localSocket . setSoTimeout ( Config . SOCKET_TIMEOUT * 1000 ) ;
2018-09-26 12:39:04 +00:00
if ( startXmpp ( localSocket ) ) {
2018-10-04 09:20:02 +00:00
localSocket . setSoTimeout ( 0 ) ; //reset to 0; once the connection is established we don’ t want this
2018-10-16 10:23:27 +00:00
if ( ! hardcoded & & ! result . equals ( storedBackupResult ) ) {
2018-09-26 12:39:04 +00:00
mXmppConnectionService . databaseBackend . saveResolverResult ( domain , result ) ;
}
break ; // successfully connected to server that speaks xmpp
} else {
2019-01-19 10:47:21 +00:00
FileBackend . close ( localSocket ) ;
throw new StateChangingException ( Account . State . STREAM_OPENING_ERROR ) ;
2018-09-26 12:39:04 +00:00
}
} catch ( final StateChangingException e ) {
2019-01-19 10:47:21 +00:00
if ( ! iterator . hasNext ( ) ) {
throw e ;
}
2018-09-26 12:39:04 +00:00
} catch ( InterruptedException e ) {
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : thread was interrupted before beginning stream " ) ;
return ;
} catch ( final Throwable e ) {
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) . toString ( ) + " : " + e . getMessage ( ) + " ( " + e . getClass ( ) . getName ( ) + " ) " ) ;
if ( ! iterator . hasNext ( ) ) {
throw new UnknownHostException ( ) ;
}
}
}
}
processStream ( ) ;
} catch ( final SecurityException e ) {
this . changeStatus ( Account . State . MISSING_INTERNET_PERMISSION ) ;
} catch ( final StateChangingException e ) {
this . changeStatus ( e . state ) ;
2021-03-22 09:12:53 +00:00
} catch ( final UnknownHostException | ConnectException | SocksSocketFactory . HostNotFoundException e ) {
2019-09-05 10:08:58 +00:00
this . changeStatus ( Account . State . SERVER_NOT_FOUND ) ;
2018-09-26 12:39:04 +00:00
} catch ( final SocksSocketFactory . SocksProxyNotFoundException e ) {
this . changeStatus ( Account . State . TOR_NOT_AVAILABLE ) ;
2020-05-22 16:23:53 +00:00
} catch ( final IOException | XmlPullParserException e ) {
2018-09-26 12:39:04 +00:00
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) . toString ( ) + " : " + e . getMessage ( ) ) ;
this . changeStatus ( Account . State . OFFLINE ) ;
this . attempt = Math . max ( 0 , this . attempt - 1 ) ;
} finally {
if ( ! Thread . currentThread ( ) . isInterrupted ( ) ) {
forceCloseSocket ( ) ;
} else {
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : not force closing socket because thread was interrupted " ) ;
}
}
}
/ * *
* Starts xmpp protocol , call after connecting to socket
*
* @return true if server returns with valid xmpp , false otherwise
* /
private boolean startXmpp ( Socket socket ) throws Exception {
if ( Thread . currentThread ( ) . isInterrupted ( ) ) {
throw new InterruptedException ( ) ;
}
this . socket = socket ;
tagReader = new XmlReader ( ) ;
if ( tagWriter ! = null ) {
tagWriter . forceClose ( ) ;
}
tagWriter = new TagWriter ( ) ;
tagWriter . setOutputStream ( socket . getOutputStream ( ) ) ;
tagReader . setInputStream ( socket . getInputStream ( ) ) ;
tagWriter . beginDocument ( ) ;
sendStartStream ( ) ;
final Tag tag = tagReader . readTag ( ) ;
if ( Thread . currentThread ( ) . isInterrupted ( ) ) {
throw new InterruptedException ( ) ;
}
if ( socket instanceof SSLSocket ) {
SSLSocketHelper . log ( account , ( SSLSocket ) socket ) ;
}
return tag ! = null & & tag . isStart ( " stream " ) ;
}
2021-04-30 07:53:19 +00:00
private SSLSocketFactory getSSLSocketFactory ( ) throws NoSuchAlgorithmException , KeyManagementException {
2018-09-26 12:39:04 +00:00
final SSLContext sc = SSLSocketHelper . getSSLContext ( ) ;
2020-05-13 07:38:30 +00:00
final MemorizingTrustManager trustManager = this . mXmppConnectionService . getMemorizingTrustManager ( ) ;
final KeyManager [ ] keyManager ;
if ( account . getPrivateKeyAlias ( ) ! = null ) {
2018-09-26 12:39:04 +00:00
keyManager = new KeyManager [ ] { new MyKeyManager ( ) } ;
} else {
keyManager = null ;
}
2020-05-17 08:24:46 +00:00
final String domain = account . getServer ( ) ;
2018-09-26 12:39:04 +00:00
sc . init ( keyManager , new X509TrustManager [ ] { mInteractive ? trustManager . getInteractive ( domain ) : trustManager . getNonInteractive ( domain ) } , mXmppConnectionService . getRNG ( ) ) ;
2021-04-30 07:53:19 +00:00
return sc . getSocketFactory ( ) ;
2018-09-26 12:39:04 +00:00
}
@Override
public void run ( ) {
synchronized ( this ) {
this . mThread = Thread . currentThread ( ) ;
if ( this . mThread . isInterrupted ( ) ) {
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : aborting connect because thread was interrupted " ) ;
return ;
}
forceCloseSocket ( ) ;
}
connect ( ) ;
}
private void processStream ( ) throws XmlPullParserException , IOException {
final CountDownLatch streamCountDownLatch = new CountDownLatch ( 1 ) ;
this . mStreamCountDownLatch = streamCountDownLatch ;
Tag nextTag = tagReader . readTag ( ) ;
while ( nextTag ! = null & & ! nextTag . isEnd ( " stream " ) ) {
if ( nextTag . isStart ( " error " ) ) {
processStreamError ( nextTag ) ;
} else if ( nextTag . isStart ( " features " ) ) {
processStreamFeatures ( nextTag ) ;
} else if ( nextTag . isStart ( " proceed " ) ) {
2018-09-27 07:59:05 +00:00
switchOverToTls ( ) ;
2018-09-26 12:39:04 +00:00
} else if ( nextTag . isStart ( " success " ) ) {
final String challenge = tagReader . readElement ( nextTag ) . getContent ( ) ;
try {
saslMechanism . getResponse ( challenge ) ;
} catch ( final SaslMechanism . AuthenticationException e ) {
Log . e ( Config . LOGTAG , String . valueOf ( e ) ) ;
throw new StateChangingException ( Account . State . UNAUTHORIZED ) ;
}
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) . toString ( ) + " : logged in " ) ;
account . setKey ( Account . PINNED_MECHANISM_KEY ,
String . valueOf ( saslMechanism . getPriority ( ) ) ) ;
tagReader . reset ( ) ;
sendStartStream ( ) ;
final Tag tag = tagReader . readTag ( ) ;
if ( tag ! = null & & tag . isStart ( " stream " ) ) {
processStream ( ) ;
} else {
2018-09-27 15:39:49 +00:00
throw new StateChangingException ( Account . State . STREAM_OPENING_ERROR ) ;
2018-09-26 12:39:04 +00:00
}
break ;
} else if ( nextTag . isStart ( " failure " ) ) {
final Element failure = tagReader . readElement ( nextTag ) ;
if ( Namespace . SASL . equals ( failure . getNamespace ( ) ) ) {
2022-06-14 06:39:55 +00:00
if ( failure . hasChild ( " temporary-auth-failure " ) ) {
throw new StateChangingException ( Account . State . TEMPORARY_AUTH_FAILURE ) ;
} else if ( failure . hasChild ( " account-disabled " ) ) {
final String text = failure . findChildContent ( " text " ) ;
if ( Strings . isNullOrEmpty ( text ) ) {
throw new StateChangingException ( Account . State . UNAUTHORIZED ) ;
}
final Matcher matcher = Patterns . AUTOLINK_WEB_URL . matcher ( text ) ;
2018-09-26 12:39:04 +00:00
if ( matcher . find ( ) ) {
2021-03-22 09:12:53 +00:00
final HttpUrl url ;
2018-09-26 12:39:04 +00:00
try {
2021-03-22 09:12:53 +00:00
url = HttpUrl . get ( text . substring ( matcher . start ( ) , matcher . end ( ) ) ) ;
2022-06-14 06:39:55 +00:00
} catch ( final IllegalArgumentException e ) {
2018-09-26 12:39:04 +00:00
throw new StateChangingException ( Account . State . UNAUTHORIZED ) ;
}
2022-06-14 06:39:55 +00:00
if ( url . isHttps ( ) ) {
this . redirectionUrl = url ;
throw new StateChangingException ( Account . State . PAYMENT_REQUIRED ) ;
}
2018-09-26 12:39:04 +00:00
}
}
throw new StateChangingException ( Account . State . UNAUTHORIZED ) ;
} else if ( Namespace . TLS . equals ( failure . getNamespace ( ) ) ) {
throw new StateChangingException ( Account . State . TLS_ERROR ) ;
} else {
throw new StateChangingException ( Account . State . INCOMPATIBLE_SERVER ) ;
}
} else if ( nextTag . isStart ( " challenge " ) ) {
final String challenge = tagReader . readElement ( nextTag ) . getContent ( ) ;
final Element response = new Element ( " response " , Namespace . SASL ) ;
try {
response . setContent ( saslMechanism . getResponse ( challenge ) ) ;
} catch ( final SaslMechanism . AuthenticationException e ) {
// TODO: Send auth abort tag.
Log . e ( Config . LOGTAG , e . toString ( ) ) ;
}
tagWriter . writeElement ( response ) ;
} else if ( nextTag . isStart ( " enabled " ) ) {
final Element enabled = tagReader . readElement ( nextTag ) ;
if ( " true " . equals ( enabled . getAttribute ( " resume " ) ) ) {
this . streamId = enabled . getAttribute ( " id " ) ;
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) . toString ( )
+ " : stream management( " + smVersion
+ " ) enabled (resumable) " ) ;
} else {
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) . toString ( )
+ " : stream management( " + smVersion + " ) enabled " ) ;
}
this . stanzasReceived = 0 ;
this . inSmacksSession = true ;
final RequestPacket r = new RequestPacket ( smVersion ) ;
tagWriter . writeStanzaAsync ( r ) ;
} else if ( nextTag . isStart ( " resumed " ) ) {
this . inSmacksSession = true ;
this . isBound = true ;
this . tagWriter . writeStanzaAsync ( new RequestPacket ( smVersion ) ) ;
lastPacketReceived = SystemClock . elapsedRealtime ( ) ;
final Element resumed = tagReader . readElement ( nextTag ) ;
final String h = resumed . getAttribute ( " h " ) ;
try {
ArrayList < AbstractAcknowledgeableStanza > failedStanzas = new ArrayList < > ( ) ;
final boolean acknowledgedMessages ;
synchronized ( this . mStanzaQueue ) {
final int serverCount = Integer . parseInt ( h ) ;
if ( serverCount < stanzasSent ) {
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) . toString ( )
+ " : session resumed with lost packages " ) ;
stanzasSent = serverCount ;
} else {
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) . toString ( ) + " : session resumed " ) ;
}
acknowledgedMessages = acknowledgeStanzaUpTo ( serverCount ) ;
for ( int i = 0 ; i < this . mStanzaQueue . size ( ) ; + + i ) {
failedStanzas . add ( mStanzaQueue . valueAt ( i ) ) ;
}
mStanzaQueue . clear ( ) ;
}
if ( acknowledgedMessages ) {
mXmppConnectionService . updateConversationUi ( ) ;
}
Log . d ( Config . LOGTAG , " resending " + failedStanzas . size ( ) + " stanzas " ) ;
for ( AbstractAcknowledgeableStanza packet : failedStanzas ) {
if ( packet instanceof MessagePacket ) {
MessagePacket message = ( MessagePacket ) packet ;
mXmppConnectionService . markMessage ( account ,
message . getTo ( ) . asBareJid ( ) ,
message . getId ( ) ,
Message . STATUS_UNSEND ) ;
}
sendPacket ( packet ) ;
}
} catch ( final NumberFormatException ignored ) {
}
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : online with resource " + account . getResource ( ) ) ;
changeStatus ( Account . State . ONLINE ) ;
} else if ( nextTag . isStart ( " r " ) ) {
tagReader . readElement ( nextTag ) ;
if ( Config . EXTENDED_SM_LOGGING ) {
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : acknowledging stanza # " + this . stanzasReceived ) ;
}
final AckPacket ack = new AckPacket ( this . stanzasReceived , smVersion ) ;
tagWriter . writeStanzaAsync ( ack ) ;
} else if ( nextTag . isStart ( " a " ) ) {
boolean accountUiNeedsRefresh = false ;
synchronized ( NotificationService . CATCHUP_LOCK ) {
if ( mWaitingForSmCatchup . compareAndSet ( true , false ) ) {
2018-12-22 12:00:40 +00:00
final int messageCount = mSmCatchupMessageCounter . get ( ) ;
final int pendingIQs = packetCallbacks . size ( ) ;
2020-05-22 16:23:53 +00:00
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : SM catchup complete (messages= " + messageCount + " , pending IQs= " + pendingIQs + " ) " ) ;
2018-09-26 12:39:04 +00:00
accountUiNeedsRefresh = true ;
2018-12-22 12:00:40 +00:00
if ( messageCount > 0 ) {
2018-09-26 12:39:04 +00:00
mXmppConnectionService . getNotificationService ( ) . finishBacklog ( true , account ) ;
}
}
}
if ( accountUiNeedsRefresh ) {
mXmppConnectionService . updateAccountUi ( ) ;
}
final Element ack = tagReader . readElement ( nextTag ) ;
lastPacketReceived = SystemClock . elapsedRealtime ( ) ;
try {
final boolean acknowledgedMessages ;
synchronized ( this . mStanzaQueue ) {
final int serverSequence = Integer . parseInt ( ack . getAttribute ( " h " ) ) ;
acknowledgedMessages = acknowledgeStanzaUpTo ( serverSequence ) ;
}
if ( acknowledgedMessages ) {
mXmppConnectionService . updateConversationUi ( ) ;
}
} catch ( NumberFormatException | NullPointerException e ) {
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : server send ack without sequence number " ) ;
}
} else if ( nextTag . isStart ( " failed " ) ) {
Element failed = tagReader . readElement ( nextTag ) ;
try {
final int serverCount = Integer . parseInt ( failed . getAttribute ( " h " ) ) ;
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : resumption failed but server acknowledged stanza # " + serverCount ) ;
final boolean acknowledgedMessages ;
synchronized ( this . mStanzaQueue ) {
acknowledgedMessages = acknowledgeStanzaUpTo ( serverCount ) ;
}
if ( acknowledgedMessages ) {
mXmppConnectionService . updateConversationUi ( ) ;
}
} catch ( NumberFormatException | NullPointerException e ) {
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : resumption failed " ) ;
}
resetStreamId ( ) ;
sendBindRequest ( ) ;
} else if ( nextTag . isStart ( " iq " ) ) {
processIq ( nextTag ) ;
} else if ( nextTag . isStart ( " message " ) ) {
processMessage ( nextTag ) ;
} else if ( nextTag . isStart ( " presence " ) ) {
processPresence ( nextTag ) ;
}
nextTag = tagReader . readTag ( ) ;
}
if ( nextTag ! = null & & nextTag . isEnd ( " stream " ) ) {
streamCountDownLatch . countDown ( ) ;
}
}
private boolean acknowledgeStanzaUpTo ( int serverCount ) {
if ( serverCount > stanzasSent ) {
Log . e ( Config . LOGTAG , " server acknowledged more stanzas than we sent. serverCount= " + serverCount + " , ourCount= " + stanzasSent ) ;
}
boolean acknowledgedMessages = false ;
for ( int i = 0 ; i < mStanzaQueue . size ( ) ; + + i ) {
if ( serverCount > = mStanzaQueue . keyAt ( i ) ) {
if ( Config . EXTENDED_SM_LOGGING ) {
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : server acknowledged stanza # " + mStanzaQueue . keyAt ( i ) ) ;
}
2021-02-12 09:35:13 +00:00
final AbstractAcknowledgeableStanza stanza = mStanzaQueue . valueAt ( i ) ;
2018-09-26 12:39:04 +00:00
if ( stanza instanceof MessagePacket & & acknowledgedListener ! = null ) {
2021-02-12 09:35:13 +00:00
final MessagePacket packet = ( MessagePacket ) stanza ;
final String id = packet . getId ( ) ;
final Jid to = packet . getTo ( ) ;
if ( id ! = null & & to ! = null ) {
acknowledgedMessages | = acknowledgedListener . onMessageAcknowledged ( account , to , id ) ;
}
2018-09-26 12:39:04 +00:00
}
mStanzaQueue . removeAt ( i ) ;
i - - ;
}
}
return acknowledgedMessages ;
}
private @NonNull
2020-04-01 11:25:52 +00:00
Element processPacket ( final Tag currentTag , final int packetType ) throws IOException {
final Element element ;
2018-09-26 12:39:04 +00:00
switch ( packetType ) {
case PACKET_IQ :
element = new IqPacket ( ) ;
break ;
case PACKET_MESSAGE :
element = new MessagePacket ( ) ;
break ;
case PACKET_PRESENCE :
element = new PresencePacket ( ) ;
break ;
default :
throw new AssertionError ( " Should never encounter invalid type " ) ;
}
element . setAttributes ( currentTag . getAttributes ( ) ) ;
Tag nextTag = tagReader . readTag ( ) ;
if ( nextTag = = null ) {
throw new IOException ( " interrupted mid tag " ) ;
}
while ( ! nextTag . isEnd ( element . getName ( ) ) ) {
if ( ! nextTag . isNo ( ) ) {
2020-04-01 11:25:52 +00:00
element . addChild ( tagReader . readElement ( nextTag ) ) ;
2018-09-26 12:39:04 +00:00
}
nextTag = tagReader . readTag ( ) ;
if ( nextTag = = null ) {
throw new IOException ( " interrupted mid tag " ) ;
}
}
if ( stanzasReceived = = Integer . MAX_VALUE ) {
resetStreamId ( ) ;
throw new IOException ( " time to restart the session. cant handle >2 billion pcks " ) ;
}
if ( inSmacksSession ) {
+ + stanzasReceived ;
} else if ( features . sm ( ) ) {
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : not counting stanza( " + element . getClass ( ) . getSimpleName ( ) + " ). Not in smacks session. " ) ;
}
lastPacketReceived = SystemClock . elapsedRealtime ( ) ;
if ( Config . BACKGROUND_STANZA_LOGGING & & mXmppConnectionService . checkListeners ( ) ) {
Log . d ( Config . LOGTAG , " [background stanza] " + element ) ;
}
2020-07-18 14:14:05 +00:00
if ( element instanceof IqPacket
& & ( ( ( IqPacket ) element ) . getType ( ) = = IqPacket . TYPE . SET )
& & element . hasChild ( " jingle " , Namespace . JINGLE ) ) {
2020-04-01 11:25:52 +00:00
return JinglePacket . upgrade ( ( IqPacket ) element ) ;
} else {
return element ;
}
2018-09-26 12:39:04 +00:00
}
2020-04-02 09:50:09 +00:00
private void processIq ( final Tag currentTag ) throws IOException {
2018-09-26 12:39:04 +00:00
final IqPacket packet = ( IqPacket ) processPacket ( currentTag , PACKET_IQ ) ;
if ( ! packet . valid ( ) ) {
Log . e ( Config . LOGTAG , " encountered invalid iq from=' " + packet . getFrom ( ) + " ' to=' " + packet . getTo ( ) + " ' " ) ;
return ;
}
if ( packet instanceof JinglePacket ) {
if ( this . jingleListener ! = null ) {
this . jingleListener . onJinglePacketReceived ( account , ( JinglePacket ) packet ) ;
}
} else {
OnIqPacketReceived callback = null ;
synchronized ( this . packetCallbacks ) {
2020-04-02 09:50:09 +00:00
final Pair < IqPacket , OnIqPacketReceived > packetCallbackDuple = packetCallbacks . get ( packet . getId ( ) ) ;
if ( packetCallbackDuple ! = null ) {
2018-09-26 12:39:04 +00:00
// Packets to the server should have responses from the server
if ( packetCallbackDuple . first . toServer ( account ) ) {
if ( packet . fromServer ( account ) ) {
callback = packetCallbackDuple . second ;
packetCallbacks . remove ( packet . getId ( ) ) ;
} else {
Log . e ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) . toString ( ) + " : ignoring spoofed iq packet " ) ;
}
} else {
if ( packet . getFrom ( ) ! = null & & packet . getFrom ( ) . equals ( packetCallbackDuple . first . getTo ( ) ) ) {
callback = packetCallbackDuple . second ;
packetCallbacks . remove ( packet . getId ( ) ) ;
} else {
Log . e ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) . toString ( ) + " : ignoring spoofed iq packet " ) ;
}
}
} else if ( packet . getType ( ) = = IqPacket . TYPE . GET | | packet . getType ( ) = = IqPacket . TYPE . SET ) {
callback = this . unregisteredIqListener ;
}
}
if ( callback ! = null ) {
try {
callback . onIqPacketReceived ( account , packet ) ;
} catch ( StateChangingError error ) {
throw new StateChangingException ( error . state ) ;
}
}
}
}
2020-12-31 09:27:06 +00:00
private void processMessage ( final Tag currentTag ) throws IOException {
2018-09-26 12:39:04 +00:00
final MessagePacket packet = ( MessagePacket ) processPacket ( currentTag , PACKET_MESSAGE ) ;
if ( ! packet . valid ( ) ) {
Log . e ( Config . LOGTAG , " encountered invalid message from=' " + packet . getFrom ( ) + " ' to=' " + packet . getTo ( ) + " ' " ) ;
return ;
}
this . messageListener . onMessagePacketReceived ( account , packet ) ;
}
2020-12-31 09:27:06 +00:00
private void processPresence ( final Tag currentTag ) throws IOException {
2018-09-26 12:39:04 +00:00
PresencePacket packet = ( PresencePacket ) processPacket ( currentTag , PACKET_PRESENCE ) ;
if ( ! packet . valid ( ) ) {
Log . e ( Config . LOGTAG , " encountered invalid presence from=' " + packet . getFrom ( ) + " ' to=' " + packet . getTo ( ) + " ' " ) ;
return ;
}
this . presenceListener . onPresencePacketReceived ( account , packet ) ;
}
private void sendStartTLS ( ) throws IOException {
final Tag startTLS = Tag . empty ( " starttls " ) ;
startTLS . setAttribute ( " xmlns " , Namespace . TLS ) ;
tagWriter . writeTag ( startTLS ) ;
}
2018-09-27 07:59:05 +00:00
private void switchOverToTls ( ) throws XmlPullParserException , IOException {
2018-09-26 12:39:04 +00:00
tagReader . readTag ( ) ;
2019-09-05 10:08:58 +00:00
final Socket socket = this . socket ;
final SSLSocket sslSocket = upgradeSocketToTls ( socket ) ;
tagReader . setInputStream ( sslSocket . getInputStream ( ) ) ;
tagWriter . setOutputStream ( sslSocket . getOutputStream ( ) ) ;
sendStartStream ( ) ;
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : TLS connection established " ) ;
features . encryptionEnabled = true ;
final Tag tag = tagReader . readTag ( ) ;
if ( tag ! = null & & tag . isStart ( " stream " ) ) {
SSLSocketHelper . log ( account , sslSocket ) ;
processStream ( ) ;
} else {
throw new StateChangingException ( Account . State . STREAM_OPENING_ERROR ) ;
}
sslSocket . close ( ) ;
}
2018-09-26 12:39:04 +00:00
2019-09-05 10:08:58 +00:00
private SSLSocket upgradeSocketToTls ( final Socket socket ) throws IOException {
2021-04-30 07:53:19 +00:00
final SSLSocketFactory sslSocketFactory ;
2019-09-05 10:08:58 +00:00
try {
2021-04-30 07:53:19 +00:00
sslSocketFactory = getSSLSocketFactory ( ) ;
2019-09-05 10:08:58 +00:00
} catch ( final NoSuchAlgorithmException | KeyManagementException e ) {
throw new StateChangingException ( Account . State . TLS_ERROR ) ;
}
final InetAddress address = socket . getInetAddress ( ) ;
2021-04-30 07:53:19 +00:00
final SSLSocket sslSocket = ( SSLSocket ) sslSocketFactory . createSocket ( socket , address . getHostAddress ( ) , socket . getPort ( ) , true ) ;
2019-09-05 10:08:58 +00:00
SSLSocketHelper . setSecurity ( sslSocket ) ;
2021-02-07 08:38:55 +00:00
SSLSocketHelper . setHostname ( sslSocket , IDN . toASCII ( account . getServer ( ) ) ) ;
2019-09-05 10:08:58 +00:00
SSLSocketHelper . setApplicationProtocol ( sslSocket , " xmpp-client " ) ;
2021-04-30 07:53:19 +00:00
final XmppDomainVerifier xmppDomainVerifier = new XmppDomainVerifier ( ) ;
2021-05-03 06:28:03 +00:00
try {
if ( ! xmppDomainVerifier . verify ( account . getServer ( ) , this . verifiedHostname , sslSocket . getSession ( ) ) ) {
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : TLS certificate domain verification failed " ) ;
FileBackend . close ( sslSocket ) ;
throw new StateChangingException ( Account . State . TLS_ERROR_DOMAIN ) ;
}
} catch ( final SSLPeerUnverifiedException e ) {
2019-09-05 10:08:58 +00:00
FileBackend . close ( sslSocket ) ;
2021-05-03 06:28:03 +00:00
throw new StateChangingException ( Account . State . TLS_ERROR ) ;
2018-09-26 12:39:04 +00:00
}
2019-09-05 10:08:58 +00:00
return sslSocket ;
2018-09-26 12:39:04 +00:00
}
2020-12-31 09:27:06 +00:00
private void processStreamFeatures ( final Tag currentTag ) throws IOException {
2018-09-26 12:39:04 +00:00
this . streamFeatures = tagReader . readElement ( currentTag ) ;
2019-01-25 07:48:46 +00:00
final boolean isSecure = features . encryptionEnabled | | Config . ALLOW_NON_TLS_CONNECTIONS | | account . isOnion ( ) ;
2018-09-26 12:39:04 +00:00
final boolean needsBinding = ! isBound & & ! account . isOptionSet ( Account . OPTION_REGISTER ) ;
if ( this . streamFeatures . hasChild ( " starttls " ) & & ! features . encryptionEnabled ) {
sendStartTLS ( ) ;
} else if ( this . streamFeatures . hasChild ( " register " ) & & account . isOptionSet ( Account . OPTION_REGISTER ) ) {
if ( isSecure ) {
2020-01-09 13:13:05 +00:00
register ( ) ;
2018-09-26 12:39:04 +00:00
} else {
2020-05-22 16:23:53 +00:00
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : unable to find STARTTLS for registration process " + XmlHelper . printElementNames ( this . streamFeatures ) ) ;
2018-09-26 12:39:04 +00:00
throw new StateChangingException ( Account . State . INCOMPATIBLE_SERVER ) ;
}
} else if ( ! this . streamFeatures . hasChild ( " register " ) & & account . isOptionSet ( Account . OPTION_REGISTER ) ) {
throw new StateChangingException ( Account . State . REGISTRATION_NOT_SUPPORTED ) ;
} else if ( this . streamFeatures . hasChild ( " mechanisms " ) & & shouldAuthenticate & & isSecure ) {
authenticate ( ) ;
} else if ( this . streamFeatures . hasChild ( " sm " , " urn:xmpp:sm: " + smVersion ) & & streamId ! = null ) {
if ( Config . EXTENDED_SM_LOGGING ) {
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : resuming after stanza # " + stanzasReceived ) ;
}
final ResumePacket resume = new ResumePacket ( this . streamId , stanzasReceived , smVersion ) ;
this . mSmCatchupMessageCounter . set ( 0 ) ;
this . mWaitingForSmCatchup . set ( true ) ;
this . tagWriter . writeStanzaAsync ( resume ) ;
} else if ( needsBinding ) {
if ( this . streamFeatures . hasChild ( " bind " ) & & isSecure ) {
sendBindRequest ( ) ;
} else {
2020-05-22 16:23:53 +00:00
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : unable to find bind feature " + XmlHelper . printElementNames ( this . streamFeatures ) ) ;
2018-09-26 12:39:04 +00:00
throw new StateChangingException ( Account . State . INCOMPATIBLE_SERVER ) ;
}
}
}
private void authenticate ( ) throws IOException {
2020-12-31 08:32:05 +00:00
final List < String > mechanisms = extractMechanisms ( streamFeatures . findChild ( " mechanisms " ) ) ;
2018-09-26 12:39:04 +00:00
final Element auth = new Element ( " auth " , Namespace . SASL ) ;
2020-12-31 08:32:05 +00:00
if ( mechanisms . contains ( External . MECHANISM ) & & account . getPrivateKeyAlias ( ) ! = null ) {
2018-09-26 12:39:04 +00:00
saslMechanism = new External ( tagWriter , account , mXmppConnectionService . getRNG ( ) ) ;
2020-12-31 08:32:05 +00:00
} else if ( mechanisms . contains ( ScramSha512 . MECHANISM ) ) {
saslMechanism = new ScramSha512 ( tagWriter , account , mXmppConnectionService . getRNG ( ) ) ;
} else if ( mechanisms . contains ( ScramSha256 . MECHANISM ) ) {
2018-09-26 12:39:04 +00:00
saslMechanism = new ScramSha256 ( tagWriter , account , mXmppConnectionService . getRNG ( ) ) ;
2020-12-31 08:32:05 +00:00
} else if ( mechanisms . contains ( ScramSha1 . MECHANISM ) ) {
2018-09-26 12:39:04 +00:00
saslMechanism = new ScramSha1 ( tagWriter , account , mXmppConnectionService . getRNG ( ) ) ;
2020-12-31 08:32:05 +00:00
} else if ( mechanisms . contains ( Plain . MECHANISM ) & & ! account . getJid ( ) . getDomain ( ) . toEscapedString ( ) . equals ( " nimbuzz.com " ) ) {
2018-09-26 12:39:04 +00:00
saslMechanism = new Plain ( tagWriter , account ) ;
2020-12-31 08:32:05 +00:00
} else if ( mechanisms . contains ( DigestMd5 . MECHANISM ) ) {
2018-09-26 12:39:04 +00:00
saslMechanism = new DigestMd5 ( tagWriter , account , mXmppConnectionService . getRNG ( ) ) ;
2020-12-31 08:32:05 +00:00
} else if ( mechanisms . contains ( Anonymous . MECHANISM ) ) {
2018-09-26 12:39:04 +00:00
saslMechanism = new Anonymous ( tagWriter , account , mXmppConnectionService . getRNG ( ) ) ;
}
if ( saslMechanism ! = null ) {
final int pinnedMechanism = account . getKeyAsInt ( Account . PINNED_MECHANISM_KEY , - 1 ) ;
if ( pinnedMechanism > saslMechanism . getPriority ( ) ) {
Log . e ( Config . LOGTAG , " Auth failed. Authentication mechanism " + saslMechanism . getMechanism ( ) +
2020-05-02 08:20:18 +00:00
" has lower priority ( " + saslMechanism . getPriority ( ) +
2018-09-26 12:39:04 +00:00
" ) than pinned priority ( " + pinnedMechanism +
" ). Possible downgrade attack? " ) ;
throw new StateChangingException ( Account . State . DOWNGRADE_ATTACK ) ;
}
Log . d ( Config . LOGTAG , account . getJid ( ) . toString ( ) + " : Authenticating with " + saslMechanism . getMechanism ( ) ) ;
auth . setAttribute ( " mechanism " , saslMechanism . getMechanism ( ) ) ;
if ( ! saslMechanism . getClientFirstMessage ( ) . isEmpty ( ) ) {
auth . setContent ( saslMechanism . getClientFirstMessage ( ) ) ;
}
tagWriter . writeElement ( auth ) ;
} else {
2020-05-22 16:23:53 +00:00
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : unable to find supported SASL mechanism in " + mechanisms ) ;
2018-09-26 12:39:04 +00:00
throw new StateChangingException ( Account . State . INCOMPATIBLE_SERVER ) ;
}
}
private List < String > extractMechanisms ( final Element stream ) {
final ArrayList < String > mechanisms = new ArrayList < > ( stream
. getChildren ( ) . size ( ) ) ;
for ( final Element child : stream . getChildren ( ) ) {
mechanisms . add ( child . getContent ( ) ) ;
}
return mechanisms ;
}
2020-01-09 13:13:05 +00:00
private void register ( ) {
final String preAuth = account . getKey ( Account . PRE_AUTH_REGISTRATION_TOKEN ) ;
if ( preAuth ! = null & & features . invite ( ) ) {
final IqPacket preAuthRequest = new IqPacket ( IqPacket . TYPE . SET ) ;
preAuthRequest . addChild ( " preauth " , Namespace . PARS ) . setAttribute ( " token " , preAuth ) ;
sendUnmodifiedIqPacket ( preAuthRequest , ( account , response ) - > {
if ( response . getType ( ) = = IqPacket . TYPE . RESULT ) {
sendRegistryRequest ( ) ;
} else {
2021-03-18 10:35:41 +00:00
final String error = response . getErrorCondition ( ) ;
2020-05-22 16:23:53 +00:00
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : failed to pre auth. " + error ) ;
2020-01-09 13:13:05 +00:00
throw new StateChangingError ( Account . State . REGISTRATION_INVALID_TOKEN ) ;
}
} , true ) ;
} else {
sendRegistryRequest ( ) ;
}
}
2018-09-26 12:39:04 +00:00
private void sendRegistryRequest ( ) {
final IqPacket register = new IqPacket ( IqPacket . TYPE . GET ) ;
2019-04-29 07:51:46 +00:00
register . query ( Namespace . REGISTER ) ;
2020-05-17 08:24:46 +00:00
register . setTo ( account . getDomain ( ) ) ;
2018-09-26 12:39:04 +00:00
sendUnmodifiedIqPacket ( register , ( account , packet ) - > {
if ( packet . getType ( ) = = IqPacket . TYPE . TIMEOUT ) {
return ;
}
if ( packet . getType ( ) = = IqPacket . TYPE . ERROR ) {
throw new StateChangingError ( Account . State . REGISTRATION_FAILED ) ;
}
2019-04-29 07:51:46 +00:00
final Element query = packet . query ( Namespace . REGISTER ) ;
2018-09-26 12:39:04 +00:00
if ( query . hasChild ( " username " ) & & ( query . hasChild ( " password " ) ) ) {
final IqPacket register1 = new IqPacket ( IqPacket . TYPE . SET ) ;
final Element username = new Element ( " username " ) . setContent ( account . getUsername ( ) ) ;
final Element password = new Element ( " password " ) . setContent ( account . getPassword ( ) ) ;
2019-04-29 07:51:46 +00:00
register1 . query ( Namespace . REGISTER ) . addChild ( username ) ;
2018-09-26 12:39:04 +00:00
register1 . query ( ) . addChild ( password ) ;
register1 . setFrom ( account . getJid ( ) . asBareJid ( ) ) ;
sendUnmodifiedIqPacket ( register1 , registrationResponseListener , true ) ;
} else if ( query . hasChild ( " x " , Namespace . DATA ) ) {
final Data data = Data . parse ( query . findChild ( " x " , Namespace . DATA ) ) ;
final Element blob = query . findChild ( " data " , " urn:xmpp:bob " ) ;
final String id = packet . getId ( ) ;
InputStream is ;
if ( blob ! = null ) {
try {
final String base64Blob = blob . getContent ( ) ;
final byte [ ] strBlob = Base64 . decode ( base64Blob , Base64 . DEFAULT ) ;
is = new ByteArrayInputStream ( strBlob ) ;
} catch ( Exception e ) {
is = null ;
}
} else {
2021-03-22 09:39:53 +00:00
final boolean useTor = mXmppConnectionService . useTorToConnect ( ) | | account . isOnion ( ) ;
2018-09-26 12:39:04 +00:00
try {
2021-03-22 09:39:53 +00:00
final String url = data . getValue ( " url " ) ;
final String fallbackUrl = data . getValue ( " captcha-fallback-url " ) ;
if ( url ! = null ) {
is = HttpConnectionManager . open ( url , useTor ) ;
} else if ( fallbackUrl ! = null ) {
is = HttpConnectionManager . open ( fallbackUrl , useTor ) ;
} else {
is = null ;
}
} catch ( final IOException e ) {
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : unable to fetch captcha " , e ) ;
2018-09-26 12:39:04 +00:00
is = null ;
}
}
if ( is ! = null ) {
Bitmap captcha = BitmapFactory . decodeStream ( is ) ;
try {
if ( mXmppConnectionService . displayCaptchaRequest ( account , id , data , captcha ) ) {
return ;
}
} catch ( Exception e ) {
throw new StateChangingError ( Account . State . REGISTRATION_FAILED ) ;
}
}
throw new StateChangingError ( Account . State . REGISTRATION_FAILED ) ;
} else if ( query . hasChild ( " instructions " ) | | query . hasChild ( " x " , Namespace . OOB ) ) {
final String instructions = query . findChildContent ( " instructions " ) ;
final Element oob = query . findChild ( " x " , Namespace . OOB ) ;
final String url = oob = = null ? null : oob . findChildContent ( " url " ) ;
if ( url ! = null ) {
setAccountCreationFailed ( url ) ;
} else if ( instructions ! = null ) {
2021-03-22 09:12:53 +00:00
final Matcher matcher = Patterns . AUTOLINK_WEB_URL . matcher ( instructions ) ;
2018-09-26 12:39:04 +00:00
if ( matcher . find ( ) ) {
setAccountCreationFailed ( instructions . substring ( matcher . start ( ) , matcher . end ( ) ) ) ;
}
}
throw new StateChangingError ( Account . State . REGISTRATION_FAILED ) ;
}
} , true ) ;
}
2021-03-22 09:12:53 +00:00
private void setAccountCreationFailed ( final String url ) {
final HttpUrl httpUrl = url = = null ? null : HttpUrl . parse ( url ) ;
if ( httpUrl ! = null & & httpUrl . isHttps ( ) ) {
this . redirectionUrl = httpUrl ;
throw new StateChangingError ( Account . State . REGISTRATION_WEB ) ;
2018-09-26 12:39:04 +00:00
}
throw new StateChangingError ( Account . State . REGISTRATION_FAILED ) ;
}
2021-03-22 09:12:53 +00:00
public HttpUrl getRedirectionUrl ( ) {
2018-09-26 12:39:04 +00:00
return this . redirectionUrl ;
}
public void resetEverything ( ) {
resetAttemptCount ( true ) ;
resetStreamId ( ) ;
clearIqCallbacks ( ) ;
this . stanzasSent = 0 ;
mStanzaQueue . clear ( ) ;
this . redirectionUrl = null ;
synchronized ( this . disco ) {
disco . clear ( ) ;
}
2020-12-01 19:31:30 +00:00
synchronized ( this . commands ) {
this . commands . clear ( ) ;
}
2018-09-26 12:39:04 +00:00
}
private void sendBindRequest ( ) {
try {
mXmppConnectionService . restoredFromDatabaseLatch . await ( ) ;
} catch ( InterruptedException e ) {
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : interrupted while waiting for DB restore during bind " ) ;
return ;
}
clearIqCallbacks ( ) ;
if ( account . getJid ( ) . isBareJid ( ) ) {
account . setResource ( this . createNewResource ( ) ) ;
} else {
fixResource ( mXmppConnectionService , account ) ;
}
final IqPacket iq = new IqPacket ( IqPacket . TYPE . SET ) ;
final String resource = Config . USE_RANDOM_RESOURCE_ON_EVERY_BIND ? nextRandomId ( ) : account . getResource ( ) ;
iq . addChild ( " bind " , Namespace . BIND ) . addChild ( " resource " ) . setContent ( resource ) ;
this . sendUnmodifiedIqPacket ( iq , ( account , packet ) - > {
if ( packet . getType ( ) = = IqPacket . TYPE . TIMEOUT ) {
return ;
}
final Element bind = packet . findChild ( " bind " ) ;
if ( bind ! = null & & packet . getType ( ) = = IqPacket . TYPE . RESULT ) {
isBound = true ;
final Element jid = bind . findChild ( " jid " ) ;
if ( jid ! = null & & jid . getContent ( ) ! = null ) {
try {
Jid assignedJid = Jid . ofEscaped ( jid . getContent ( ) ) ;
if ( ! account . getJid ( ) . getDomain ( ) . equals ( assignedJid . getDomain ( ) ) ) {
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : server tried to re-assign domain to " + assignedJid . getDomain ( ) ) ;
throw new StateChangingError ( Account . State . BIND_FAILURE ) ;
}
if ( account . setJid ( assignedJid ) ) {
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : jid changed during bind. updating database " ) ;
mXmppConnectionService . databaseBackend . updateAccount ( account ) ;
}
if ( streamFeatures . hasChild ( " session " )
& & ! streamFeatures . findChild ( " session " ) . hasChild ( " optional " ) ) {
sendStartSession ( ) ;
} else {
sendPostBindInitialization ( ) ;
}
return ;
} catch ( final IllegalArgumentException e ) {
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : server reported invalid jid ( " + jid . getContent ( ) + " ) on bind " ) ;
}
} else {
Log . d ( Config . LOGTAG , account . getJid ( ) + " : disconnecting because of bind failure. (no jid) " ) ;
}
} else {
Log . d ( Config . LOGTAG , account . getJid ( ) + " : disconnecting because of bind failure ( " + packet . toString ( ) ) ;
}
final Element error = packet . findChild ( " error " ) ;
if ( packet . getType ( ) = = IqPacket . TYPE . ERROR & & error ! = null & & error . hasChild ( " conflict " ) ) {
account . setResource ( createNewResource ( ) ) ;
}
throw new StateChangingError ( Account . State . BIND_FAILURE ) ;
} , true ) ;
}
private void clearIqCallbacks ( ) {
final IqPacket failurePacket = new IqPacket ( IqPacket . TYPE . TIMEOUT ) ;
final ArrayList < OnIqPacketReceived > callbacks = new ArrayList < > ( ) ;
synchronized ( this . packetCallbacks ) {
if ( this . packetCallbacks . size ( ) = = 0 ) {
return ;
}
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : clearing " + this . packetCallbacks . size ( ) + " iq callbacks " ) ;
final Iterator < Pair < IqPacket , OnIqPacketReceived > > iterator = this . packetCallbacks . values ( ) . iterator ( ) ;
while ( iterator . hasNext ( ) ) {
Pair < IqPacket , OnIqPacketReceived > entry = iterator . next ( ) ;
callbacks . add ( entry . second ) ;
iterator . remove ( ) ;
}
}
for ( OnIqPacketReceived callback : callbacks ) {
try {
callback . onIqPacketReceived ( account , failurePacket ) ;
} catch ( StateChangingError error ) {
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : caught StateChangingError( " + error . state . toString ( ) + " ) while clearing callbacks " ) ;
//ignore
}
}
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : done clearing iq callbacks. " + this . packetCallbacks . size ( ) + " left " ) ;
}
public void sendDiscoTimeout ( ) {
if ( mWaitForDisco . compareAndSet ( true , false ) ) {
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : finalizing bind after disco timeout " ) ;
finalizeBind ( ) ;
}
}
private void sendStartSession ( ) {
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : sending legacy session to outdated server " ) ;
final IqPacket startSession = new IqPacket ( IqPacket . TYPE . SET ) ;
startSession . addChild ( " session " , " urn:ietf:params:xml:ns:xmpp-session " ) ;
this . sendUnmodifiedIqPacket ( startSession , ( account , packet ) - > {
if ( packet . getType ( ) = = IqPacket . TYPE . RESULT ) {
sendPostBindInitialization ( ) ;
} else if ( packet . getType ( ) ! = IqPacket . TYPE . TIMEOUT ) {
throw new StateChangingError ( Account . State . SESSION_FAILURE ) ;
}
} , true ) ;
}
private void sendPostBindInitialization ( ) {
smVersion = 0 ;
if ( streamFeatures . hasChild ( " sm " , " urn:xmpp:sm:3 " ) ) {
smVersion = 3 ;
} else if ( streamFeatures . hasChild ( " sm " , " urn:xmpp:sm:2 " ) ) {
smVersion = 2 ;
}
if ( smVersion ! = 0 ) {
synchronized ( this . mStanzaQueue ) {
final EnablePacket enable = new EnablePacket ( smVersion ) ;
tagWriter . writeStanzaAsync ( enable ) ;
stanzasSent = 0 ;
mStanzaQueue . clear ( ) ;
}
}
features . carbonsEnabled = false ;
features . blockListRequested = false ;
synchronized ( this . disco ) {
this . disco . clear ( ) ;
}
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : starting service discovery " ) ;
mPendingServiceDiscoveries . set ( 0 ) ;
2020-05-21 05:57:57 +00:00
if ( smVersion = = 0 | | Patches . DISCO_EXCEPTIONS . contains ( account . getJid ( ) . getDomain ( ) . toEscapedString ( ) ) ) {
2018-09-26 12:39:04 +00:00
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : do not wait for service discovery " ) ;
mWaitForDisco . set ( false ) ;
} else {
mWaitForDisco . set ( true ) ;
}
lastDiscoStarted = SystemClock . elapsedRealtime ( ) ;
mXmppConnectionService . scheduleWakeUpCall ( Config . CONNECT_DISCO_TIMEOUT , account . getUuid ( ) . hashCode ( ) ) ;
Element caps = streamFeatures . findChild ( " c " ) ;
final String hash = caps = = null ? null : caps . getAttribute ( " hash " ) ;
final String ver = caps = = null ? null : caps . getAttribute ( " ver " ) ;
ServiceDiscoveryResult discoveryResult = null ;
if ( hash ! = null & & ver ! = null ) {
discoveryResult = mXmppConnectionService . getCachedServiceDiscoveryResult ( new Pair < > ( hash , ver ) ) ;
}
final boolean requestDiscoItemsFirst = ! account . isOptionSet ( Account . OPTION_LOGGED_IN_SUCCESSFULLY ) ;
if ( requestDiscoItemsFirst ) {
2020-05-17 08:24:46 +00:00
sendServiceDiscoveryItems ( account . getDomain ( ) ) ;
2018-09-26 12:39:04 +00:00
}
if ( discoveryResult = = null ) {
2020-05-17 08:24:46 +00:00
sendServiceDiscoveryInfo ( account . getDomain ( ) ) ;
2018-09-26 12:39:04 +00:00
} else {
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : server caps came from cache " ) ;
2020-05-17 08:24:46 +00:00
disco . put ( account . getDomain ( ) , discoveryResult ) ;
2018-09-26 12:39:04 +00:00
}
2018-12-05 18:11:40 +00:00
discoverMamPreferences ( ) ;
2018-09-26 12:39:04 +00:00
sendServiceDiscoveryInfo ( account . getJid ( ) . asBareJid ( ) ) ;
if ( ! requestDiscoItemsFirst ) {
2020-05-17 08:24:46 +00:00
sendServiceDiscoveryItems ( account . getDomain ( ) ) ;
2018-09-26 12:39:04 +00:00
}
if ( ! mWaitForDisco . get ( ) ) {
finalizeBind ( ) ;
}
this . lastSessionStarted = SystemClock . elapsedRealtime ( ) ;
}
private void sendServiceDiscoveryInfo ( final Jid jid ) {
mPendingServiceDiscoveries . incrementAndGet ( ) ;
final IqPacket iq = new IqPacket ( IqPacket . TYPE . GET ) ;
iq . setTo ( jid ) ;
iq . query ( " http://jabber.org/protocol/disco#info " ) ;
this . sendIqPacket ( iq , ( account , packet ) - > {
if ( packet . getType ( ) = = IqPacket . TYPE . RESULT ) {
boolean advancedStreamFeaturesLoaded ;
synchronized ( XmppConnection . this . disco ) {
ServiceDiscoveryResult result = new ServiceDiscoveryResult ( packet ) ;
2020-05-17 08:24:46 +00:00
if ( jid . equals ( account . getDomain ( ) ) ) {
2018-09-26 12:39:04 +00:00
mXmppConnectionService . databaseBackend . insertDiscoveryResult ( result ) ;
}
disco . put ( jid , result ) ;
2020-05-17 08:24:46 +00:00
advancedStreamFeaturesLoaded = disco . containsKey ( account . getDomain ( ) )
2018-09-26 12:39:04 +00:00
& & disco . containsKey ( account . getJid ( ) . asBareJid ( ) ) ;
}
2020-05-17 08:24:46 +00:00
if ( advancedStreamFeaturesLoaded & & ( jid . equals ( account . getDomain ( ) ) | | jid . equals ( account . getJid ( ) . asBareJid ( ) ) ) ) {
2018-09-26 12:39:04 +00:00
enableAdvancedStreamFeatures ( ) ;
}
2019-08-13 19:18:32 +00:00
} else if ( packet . getType ( ) = = IqPacket . TYPE . ERROR ) {
2018-09-26 12:39:04 +00:00
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : could not query disco info for " + jid . toString ( ) ) ;
2020-05-17 08:24:46 +00:00
final boolean serverOrAccount = jid . equals ( account . getDomain ( ) ) | | jid . equals ( account . getJid ( ) . asBareJid ( ) ) ;
2019-08-13 19:18:32 +00:00
final boolean advancedStreamFeaturesLoaded ;
if ( serverOrAccount ) {
synchronized ( XmppConnection . this . disco ) {
disco . put ( jid , ServiceDiscoveryResult . empty ( ) ) ;
2020-05-17 08:24:46 +00:00
advancedStreamFeaturesLoaded = disco . containsKey ( account . getDomain ( ) ) & & disco . containsKey ( account . getJid ( ) . asBareJid ( ) ) ;
2019-08-13 19:18:32 +00:00
}
} else {
advancedStreamFeaturesLoaded = false ;
}
if ( advancedStreamFeaturesLoaded ) {
enableAdvancedStreamFeatures ( ) ;
}
2018-09-26 12:39:04 +00:00
}
if ( packet . getType ( ) ! = IqPacket . TYPE . TIMEOUT ) {
if ( mPendingServiceDiscoveries . decrementAndGet ( ) = = 0
& & mWaitForDisco . compareAndSet ( true , false ) ) {
finalizeBind ( ) ;
}
}
} ) ;
}
2018-12-05 18:11:40 +00:00
private void discoverMamPreferences ( ) {
IqPacket request = new IqPacket ( IqPacket . TYPE . GET ) ;
request . addChild ( " prefs " , MessageArchiveService . Version . MAM_2 . namespace ) ;
sendIqPacket ( request , ( account , response ) - > {
2020-05-22 16:23:53 +00:00
if ( response . getType ( ) = = IqPacket . TYPE . RESULT ) {
Element prefs = response . findChild ( " prefs " , MessageArchiveService . Version . MAM_2 . namespace ) ;
isMamPreferenceAlways = " always " . equals ( prefs = = null ? null : prefs . getAttribute ( " default " ) ) ;
}
2018-12-05 18:11:40 +00:00
} ) ;
}
2020-12-01 19:31:30 +00:00
private void discoverCommands ( ) {
final IqPacket request = new IqPacket ( IqPacket . TYPE . GET ) ;
request . setTo ( account . getDomain ( ) ) ;
request . addChild ( " query " , Namespace . DISCO_ITEMS ) . setAttribute ( " node " , Namespace . COMMANDS ) ;
sendIqPacket ( request , ( account , response ) - > {
2020-12-31 08:32:05 +00:00
if ( response . getType ( ) = = IqPacket . TYPE . RESULT ) {
final Element query = response . findChild ( " query " , Namespace . DISCO_ITEMS ) ;
if ( query = = null ) {
return ;
}
final HashMap < String , Jid > commands = new HashMap < > ( ) ;
for ( final Element child : query . getChildren ( ) ) {
if ( " item " . equals ( child . getName ( ) ) ) {
final String node = child . getAttribute ( " node " ) ;
final Jid jid = child . getAttributeAsJid ( " jid " ) ;
if ( node ! = null & & jid ! = null ) {
commands . put ( node , jid ) ;
}
}
}
Log . d ( Config . LOGTAG , commands . toString ( ) ) ;
synchronized ( this . commands ) {
this . commands . clear ( ) ;
this . commands . putAll ( commands ) ;
}
}
2020-12-01 19:31:30 +00:00
} ) ;
}
2018-12-05 18:11:40 +00:00
public boolean isMamPreferenceAlways ( ) {
return isMamPreferenceAlways ;
}
2018-09-26 12:39:04 +00:00
private void finalizeBind ( ) {
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : online with resource " + account . getResource ( ) ) ;
if ( bindListener ! = null ) {
bindListener . onBind ( account ) ;
}
changeStatus ( Account . State . ONLINE ) ;
}
private void enableAdvancedStreamFeatures ( ) {
if ( getFeatures ( ) . blocking ( ) & & ! features . blockListRequested ) {
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : Requesting block list " ) ;
this . sendIqPacket ( getIqGenerator ( ) . generateGetBlockList ( ) , mXmppConnectionService . getIqParser ( ) ) ;
}
for ( final OnAdvancedStreamFeaturesLoaded listener : advancedStreamFeaturesLoadedListeners ) {
listener . onAdvancedStreamFeaturesAvailable ( account ) ;
}
2019-08-22 07:57:39 +00:00
if ( getFeatures ( ) . carbons ( ) & & ! features . carbonsEnabled ) {
sendEnableCarbons ( ) ;
}
2020-12-01 19:31:30 +00:00
if ( getFeatures ( ) . commands ( ) ) {
discoverCommands ( ) ;
}
2018-09-26 12:39:04 +00:00
}
private void sendServiceDiscoveryItems ( final Jid server ) {
mPendingServiceDiscoveries . incrementAndGet ( ) ;
final IqPacket iq = new IqPacket ( IqPacket . TYPE . GET ) ;
2020-05-18 07:14:57 +00:00
iq . setTo ( server . getDomain ( ) ) ;
2018-09-26 12:39:04 +00:00
iq . query ( " http://jabber.org/protocol/disco#items " ) ;
this . sendIqPacket ( iq , ( account , packet ) - > {
if ( packet . getType ( ) = = IqPacket . TYPE . RESULT ) {
2020-12-31 09:27:06 +00:00
final HashSet < Jid > items = new HashSet < > ( ) ;
2018-09-26 12:39:04 +00:00
final List < Element > elements = packet . query ( ) . getChildren ( ) ;
for ( final Element element : elements ) {
if ( element . getName ( ) . equals ( " item " ) ) {
final Jid jid = InvalidJid . getNullForInvalid ( element . getAttributeAsJid ( " jid " ) ) ;
2020-05-17 08:24:46 +00:00
if ( jid ! = null & & ! jid . equals ( account . getDomain ( ) ) ) {
2018-09-26 12:39:04 +00:00
items . add ( jid ) ;
}
}
}
for ( Jid jid : items ) {
sendServiceDiscoveryInfo ( jid ) ;
}
} else {
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : could not query disco items of " + server ) ;
}
if ( packet . getType ( ) ! = IqPacket . TYPE . TIMEOUT ) {
if ( mPendingServiceDiscoveries . decrementAndGet ( ) = = 0
& & mWaitForDisco . compareAndSet ( true , false ) ) {
finalizeBind ( ) ;
}
}
} ) ;
}
private void sendEnableCarbons ( ) {
final IqPacket iq = new IqPacket ( IqPacket . TYPE . SET ) ;
iq . addChild ( " enable " , " urn:xmpp:carbons:2 " ) ;
2020-12-31 09:27:06 +00:00
this . sendIqPacket ( iq , ( account , packet ) - > {
if ( ! packet . hasChild ( " error " ) ) {
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( )
+ " : successfully enabled carbons " ) ;
features . carbonsEnabled = true ;
} else {
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( )
+ " : error enableing carbons " + packet . toString ( ) ) ;
2018-09-26 12:39:04 +00:00
}
} ) ;
}
2020-12-31 09:27:06 +00:00
private void processStreamError ( final Tag currentTag ) throws IOException {
2018-09-26 12:39:04 +00:00
final Element streamError = tagReader . readElement ( currentTag ) ;
if ( streamError = = null ) {
return ;
}
if ( streamError . hasChild ( " conflict " ) ) {
account . setResource ( createNewResource ( ) ) ;
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : switching resource due to conflict ( " + account . getResource ( ) + " ) " ) ;
throw new IOException ( ) ;
} else if ( streamError . hasChild ( " host-unknown " ) ) {
throw new StateChangingException ( Account . State . HOST_UNKNOWN ) ;
2019-08-14 16:44:57 +00:00
} else if ( streamError . hasChild ( " policy-violation " ) ) {
2019-08-16 13:00:26 +00:00
this . lastConnect = SystemClock . elapsedRealtime ( ) ;
2018-12-18 10:02:25 +00:00
final String text = streamError . findChildContent ( " text " ) ;
2020-05-22 16:23:53 +00:00
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : policy violation. " + text ) ;
failPendingMessages ( text ) ;
2018-09-26 12:39:04 +00:00
throw new StateChangingException ( Account . State . POLICY_VIOLATION ) ;
} else {
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : stream error " + streamError . toString ( ) ) ;
throw new StateChangingException ( Account . State . STREAM_ERROR ) ;
}
}
2020-05-22 16:23:53 +00:00
private void failPendingMessages ( final String error ) {
synchronized ( this . mStanzaQueue ) {
for ( int i = 0 ; i < mStanzaQueue . size ( ) ; + + i ) {
final AbstractAcknowledgeableStanza stanza = mStanzaQueue . valueAt ( i ) ;
if ( stanza instanceof MessagePacket ) {
final MessagePacket packet = ( MessagePacket ) stanza ;
final String id = packet . getId ( ) ;
final Jid to = packet . getTo ( ) ;
mXmppConnectionService . markMessage ( account ,
to . asBareJid ( ) ,
id ,
Message . STATUS_SEND_FAILED ,
error ) ;
}
}
}
}
2018-09-26 12:39:04 +00:00
private void sendStartStream ( ) throws IOException {
final Tag stream = Tag . start ( " stream:stream " ) ;
stream . setAttribute ( " to " , account . getServer ( ) ) ;
stream . setAttribute ( " version " , " 1.0 " ) ;
2019-09-12 08:12:47 +00:00
stream . setAttribute ( " xml:lang " , LocalizedContent . STREAM_LANGUAGE ) ;
2018-09-26 12:39:04 +00:00
stream . setAttribute ( " xmlns " , " jabber:client " ) ;
stream . setAttribute ( " xmlns:stream " , " http://etherx.jabber.org/streams " ) ;
tagWriter . writeTag ( stream ) ;
}
private String createNewResource ( ) {
return mXmppConnectionService . getString ( R . string . app_name ) + '.' + nextRandomId ( true ) ;
}
private String nextRandomId ( ) {
return nextRandomId ( false ) ;
}
private String nextRandomId ( boolean s ) {
return CryptoHelper . random ( s ? 3 : 9 , mXmppConnectionService . getRNG ( ) ) ;
}
public String sendIqPacket ( final IqPacket packet , final OnIqPacketReceived callback ) {
packet . setFrom ( account . getJid ( ) ) ;
return this . sendUnmodifiedIqPacket ( packet , callback , false ) ;
}
public synchronized String sendUnmodifiedIqPacket ( final IqPacket packet , final OnIqPacketReceived callback , boolean force ) {
if ( packet . getId ( ) = = null ) {
packet . setAttribute ( " id " , nextRandomId ( ) ) ;
}
if ( callback ! = null ) {
synchronized ( this . packetCallbacks ) {
packetCallbacks . put ( packet . getId ( ) , new Pair < > ( packet , callback ) ) ;
}
}
this . sendPacket ( packet , force ) ;
return packet . getId ( ) ;
}
public void sendMessagePacket ( final MessagePacket packet ) {
this . sendPacket ( packet ) ;
}
public void sendPresencePacket ( final PresencePacket packet ) {
this . sendPacket ( packet ) ;
}
private synchronized void sendPacket ( final AbstractStanza packet ) {
sendPacket ( packet , false ) ;
}
private synchronized void sendPacket ( final AbstractStanza packet , final boolean force ) {
if ( stanzasSent = = Integer . MAX_VALUE ) {
resetStreamId ( ) ;
disconnect ( true ) ;
return ;
}
synchronized ( this . mStanzaQueue ) {
if ( force | | isBound ) {
tagWriter . writeStanzaAsync ( packet ) ;
} else {
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " do not write stanza to unbound stream " + packet . toString ( ) ) ;
}
if ( packet instanceof AbstractAcknowledgeableStanza ) {
AbstractAcknowledgeableStanza stanza = ( AbstractAcknowledgeableStanza ) packet ;
if ( this . mStanzaQueue . size ( ) ! = 0 ) {
int currentHighestKey = this . mStanzaQueue . keyAt ( this . mStanzaQueue . size ( ) - 1 ) ;
if ( currentHighestKey ! = stanzasSent ) {
throw new AssertionError ( " Stanza count messed up " ) ;
}
}
+ + stanzasSent ;
this . mStanzaQueue . append ( stanzasSent , stanza ) ;
if ( stanza instanceof MessagePacket & & stanza . getId ( ) ! = null & & inSmacksSession ) {
if ( Config . EXTENDED_SM_LOGGING ) {
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : requesting ack for message stanza # " + stanzasSent ) ;
}
tagWriter . writeStanzaAsync ( new RequestPacket ( this . smVersion ) ) ;
}
}
}
}
public void sendPing ( ) {
if ( ! r ( ) ) {
final IqPacket iq = new IqPacket ( IqPacket . TYPE . GET ) ;
iq . setFrom ( account . getJid ( ) ) ;
2019-06-18 11:20:24 +00:00
iq . addChild ( " ping " , Namespace . PING ) ;
2018-09-26 12:39:04 +00:00
this . sendIqPacket ( iq , null ) ;
}
this . lastPingSent = SystemClock . elapsedRealtime ( ) ;
}
public void setOnMessagePacketReceivedListener (
final OnMessagePacketReceived listener ) {
this . messageListener = listener ;
}
public void setOnUnregisteredIqPacketReceivedListener (
final OnIqPacketReceived listener ) {
this . unregisteredIqListener = listener ;
}
public void setOnPresencePacketReceivedListener (
final OnPresencePacketReceived listener ) {
this . presenceListener = listener ;
}
public void setOnJinglePacketReceivedListener (
final OnJinglePacketReceived listener ) {
this . jingleListener = listener ;
}
public void setOnStatusChangedListener ( final OnStatusChanged listener ) {
this . statusListener = listener ;
}
public void setOnBindListener ( final OnBindListener listener ) {
this . bindListener = listener ;
}
public void setOnMessageAcknowledgeListener ( final OnMessageAcknowledged listener ) {
this . acknowledgedListener = listener ;
}
public void addOnAdvancedStreamFeaturesAvailableListener ( final OnAdvancedStreamFeaturesLoaded listener ) {
this . advancedStreamFeaturesLoadedListeners . add ( listener ) ;
}
private void forceCloseSocket ( ) {
2019-07-04 08:12:08 +00:00
FileBackend . close ( this . socket ) ;
FileBackend . close ( this . tagReader ) ;
2018-09-26 12:39:04 +00:00
}
public void interrupt ( ) {
if ( this . mThread ! = null ) {
this . mThread . interrupt ( ) ;
}
}
public void disconnect ( final boolean force ) {
interrupt ( ) ;
2019-07-04 08:12:08 +00:00
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : disconnecting force= " + force ) ;
2018-09-26 12:39:04 +00:00
if ( force ) {
forceCloseSocket ( ) ;
} else {
final TagWriter currentTagWriter = this . tagWriter ;
if ( currentTagWriter . isActive ( ) ) {
currentTagWriter . finish ( ) ;
final Socket currentSocket = this . socket ;
final CountDownLatch streamCountDownLatch = this . mStreamCountDownLatch ;
try {
currentTagWriter . await ( 1 , TimeUnit . SECONDS ) ;
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : closing stream " ) ;
currentTagWriter . writeTag ( Tag . end ( " stream:stream " ) ) ;
if ( streamCountDownLatch ! = null ) {
if ( streamCountDownLatch . await ( 1 , TimeUnit . SECONDS ) ) {
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : remote ended stream " ) ;
} else {
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : remote has not closed socket. force closing " ) ;
}
}
} catch ( InterruptedException e ) {
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : interrupted while gracefully closing stream " ) ;
} catch ( final IOException e ) {
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : io exception during disconnect ( " + e . getMessage ( ) + " ) " ) ;
} finally {
FileBackend . close ( currentSocket ) ;
}
} else {
forceCloseSocket ( ) ;
}
}
}
private void resetStreamId ( ) {
this . streamId = null ;
}
private List < Entry < Jid , ServiceDiscoveryResult > > findDiscoItemsByFeature ( final String feature ) {
synchronized ( this . disco ) {
final List < Entry < Jid , ServiceDiscoveryResult > > items = new ArrayList < > ( ) ;
for ( final Entry < Jid , ServiceDiscoveryResult > cursor : this . disco . entrySet ( ) ) {
if ( cursor . getValue ( ) . getFeatures ( ) . contains ( feature ) ) {
items . add ( cursor ) ;
}
}
return items ;
}
}
public Jid findDiscoItemByFeature ( final String feature ) {
final List < Entry < Jid , ServiceDiscoveryResult > > items = findDiscoItemsByFeature ( feature ) ;
if ( items . size ( ) > = 1 ) {
return items . get ( 0 ) . getKey ( ) ;
}
return null ;
}
public boolean r ( ) {
if ( getFeatures ( ) . sm ( ) ) {
this . tagWriter . writeStanzaAsync ( new RequestPacket ( smVersion ) ) ;
return true ;
} else {
return false ;
}
}
public List < String > getMucServersWithholdAccount ( ) {
2020-12-31 09:27:06 +00:00
final List < String > servers = getMucServers ( ) ;
servers . remove ( account . getDomain ( ) . toEscapedString ( ) ) ;
2018-09-26 12:39:04 +00:00
return servers ;
}
public List < String > getMucServers ( ) {
List < String > servers = new ArrayList < > ( ) ;
synchronized ( this . disco ) {
for ( final Entry < Jid , ServiceDiscoveryResult > cursor : disco . entrySet ( ) ) {
final ServiceDiscoveryResult value = cursor . getValue ( ) ;
if ( value . getFeatures ( ) . contains ( " http://jabber.org/protocol/muc " )
& & value . hasIdentity ( " conference " , " text " )
& & ! value . getFeatures ( ) . contains ( " jabber:iq:gateway " )
& & ! value . hasIdentity ( " conference " , " irc " ) ) {
servers . add ( cursor . getKey ( ) . toString ( ) ) ;
}
}
}
return servers ;
}
public String getMucServer ( ) {
List < String > servers = getMucServers ( ) ;
return servers . size ( ) > 0 ? servers . get ( 0 ) : null ;
}
public int getTimeToNextAttempt ( ) {
2019-08-16 13:00:26 +00:00
final int additionalTime = account . getLastErrorStatus ( ) = = Account . State . POLICY_VIOLATION ? 3 : 0 ;
final int interval = Math . min ( ( int ) ( 25 * Math . pow ( 1 . 3 , ( additionalTime + attempt ) ) ) , 300 ) ;
2018-09-26 12:39:04 +00:00
final int secondsSinceLast = ( int ) ( ( SystemClock . elapsedRealtime ( ) - this . lastConnect ) / 1000 ) ;
return interval - secondsSinceLast ;
}
public int getAttempt ( ) {
return this . attempt ;
}
public Features getFeatures ( ) {
return this . features ;
}
public long getLastSessionEstablished ( ) {
final long diff = SystemClock . elapsedRealtime ( ) - this . lastSessionStarted ;
return System . currentTimeMillis ( ) - diff ;
}
public long getLastConnect ( ) {
return this . lastConnect ;
}
public long getLastPingSent ( ) {
return this . lastPingSent ;
}
public long getLastDiscoStarted ( ) {
return this . lastDiscoStarted ;
}
public long getLastPacketReceived ( ) {
return this . lastPacketReceived ;
}
public void sendActive ( ) {
this . sendPacket ( new ActivePacket ( ) ) ;
}
public void sendInactive ( ) {
this . sendPacket ( new InactivePacket ( ) ) ;
}
public void resetAttemptCount ( boolean resetConnectTime ) {
this . attempt = 0 ;
if ( resetConnectTime ) {
this . lastConnect = 0 ;
}
}
public void setInteractive ( boolean interactive ) {
this . mInteractive = interactive ;
}
public Identity getServerIdentity ( ) {
synchronized ( this . disco ) {
2020-05-18 07:14:57 +00:00
ServiceDiscoveryResult result = disco . get ( account . getJid ( ) . getDomain ( ) ) ;
2018-09-26 12:39:04 +00:00
if ( result = = null ) {
return Identity . UNKNOWN ;
}
for ( final ServiceDiscoveryResult . Identity id : result . getIdentities ( ) ) {
if ( id . getType ( ) . equals ( " im " ) & & id . getCategory ( ) . equals ( " server " ) & & id . getName ( ) ! = null ) {
switch ( id . getName ( ) ) {
case " Prosody " :
return Identity . PROSODY ;
case " ejabberd " :
return Identity . EJABBERD ;
case " Slack-XMPP " :
return Identity . SLACK ;
}
}
}
}
return Identity . UNKNOWN ;
}
private IqGenerator getIqGenerator ( ) {
return mXmppConnectionService . getIqGenerator ( ) ;
}
public enum Identity {
FACEBOOK ,
SLACK ,
EJABBERD ,
PROSODY ,
NIMBUZZ ,
UNKNOWN
}
private class MyKeyManager implements X509KeyManager {
@Override
public String chooseClientAlias ( String [ ] strings , Principal [ ] principals , Socket socket ) {
return account . getPrivateKeyAlias ( ) ;
}
@Override
public String chooseServerAlias ( String s , Principal [ ] principals , Socket socket ) {
return null ;
}
@Override
public X509Certificate [ ] getCertificateChain ( String alias ) {
Log . d ( Config . LOGTAG , " getting certificate chain " ) ;
try {
return KeyChain . getCertificateChain ( mXmppConnectionService , alias ) ;
} catch ( Exception e ) {
Log . d ( Config . LOGTAG , e . getMessage ( ) ) ;
return new X509Certificate [ 0 ] ;
}
}
@Override
public String [ ] getClientAliases ( String s , Principal [ ] principals ) {
final String alias = account . getPrivateKeyAlias ( ) ;
return alias ! = null ? new String [ ] { alias } : new String [ 0 ] ;
}
@Override
public String [ ] getServerAliases ( String s , Principal [ ] principals ) {
return new String [ 0 ] ;
}
@Override
public PrivateKey getPrivateKey ( String alias ) {
try {
return KeyChain . getPrivateKey ( mXmppConnectionService , alias ) ;
} catch ( Exception e ) {
return null ;
}
}
}
2020-12-31 09:27:06 +00:00
private static class StateChangingError extends Error {
2018-09-26 12:39:04 +00:00
private final Account . State state ;
public StateChangingError ( Account . State state ) {
this . state = state ;
}
}
2020-12-31 09:27:06 +00:00
private static class StateChangingException extends IOException {
2018-09-26 12:39:04 +00:00
private final Account . State state ;
public StateChangingException ( Account . State state ) {
this . state = state ;
}
}
public class Features {
XmppConnection connection ;
private boolean carbonsEnabled = false ;
private boolean encryptionEnabled = false ;
private boolean blockListRequested = false ;
public Features ( final XmppConnection connection ) {
this . connection = connection ;
}
private boolean hasDiscoFeature ( final Jid server , final String feature ) {
synchronized ( XmppConnection . this . disco ) {
return connection . disco . containsKey ( server ) & &
connection . disco . get ( server ) . getFeatures ( ) . contains ( feature ) ;
}
}
public boolean carbons ( ) {
2020-05-17 08:24:46 +00:00
return hasDiscoFeature ( account . getDomain ( ) , " urn:xmpp:carbons:2 " ) ;
2018-09-26 12:39:04 +00:00
}
2020-12-01 19:31:30 +00:00
public boolean commands ( ) {
return hasDiscoFeature ( account . getDomain ( ) , Namespace . COMMANDS ) ;
}
public boolean easyOnboardingInvites ( ) {
synchronized ( commands ) {
return commands . containsKey ( Namespace . EASY_ONBOARDING_INVITE ) ;
}
}
2018-09-26 12:39:04 +00:00
public boolean bookmarksConversion ( ) {
return hasDiscoFeature ( account . getJid ( ) . asBareJid ( ) , Namespace . BOOKMARKS_CONVERSION ) & & pepPublishOptions ( ) ;
}
2019-01-17 16:55:47 +00:00
public boolean avatarConversion ( ) {
return hasDiscoFeature ( account . getJid ( ) . asBareJid ( ) , Namespace . AVATAR_CONVERSION ) & & pepPublishOptions ( ) ;
}
2018-09-26 12:39:04 +00:00
public boolean blocking ( ) {
2020-05-17 08:24:46 +00:00
return hasDiscoFeature ( account . getDomain ( ) , Namespace . BLOCKING ) ;
2018-09-26 12:39:04 +00:00
}
public boolean spamReporting ( ) {
2020-05-17 08:24:46 +00:00
return hasDiscoFeature ( account . getDomain ( ) , " urn:xmpp:reporting:reason:spam:0 " ) ;
2018-09-26 12:39:04 +00:00
}
public boolean flexibleOfflineMessageRetrieval ( ) {
2020-05-17 08:24:46 +00:00
return hasDiscoFeature ( account . getDomain ( ) , Namespace . FLEXIBLE_OFFLINE_MESSAGE_RETRIEVAL ) ;
2018-09-26 12:39:04 +00:00
}
public boolean register ( ) {
2020-05-17 08:24:46 +00:00
return hasDiscoFeature ( account . getDomain ( ) , Namespace . REGISTER ) ;
2018-09-26 12:39:04 +00:00
}
2020-01-09 13:13:05 +00:00
public boolean invite ( ) {
return connection . streamFeatures ! = null & & connection . streamFeatures . hasChild ( " register " , Namespace . INVITE ) ;
}
2018-09-26 12:39:04 +00:00
public boolean sm ( ) {
return streamId ! = null
| | ( connection . streamFeatures ! = null & & connection . streamFeatures . hasChild ( " sm " ) ) ;
}
public boolean csi ( ) {
return connection . streamFeatures ! = null & & connection . streamFeatures . hasChild ( " csi " , " urn:xmpp:csi:0 " ) ;
}
public boolean pep ( ) {
synchronized ( XmppConnection . this . disco ) {
ServiceDiscoveryResult info = disco . get ( account . getJid ( ) . asBareJid ( ) ) ;
return info ! = null & & info . hasIdentity ( " pubsub " , " pep " ) ;
}
}
public boolean pepPersistent ( ) {
synchronized ( XmppConnection . this . disco ) {
ServiceDiscoveryResult info = disco . get ( account . getJid ( ) . asBareJid ( ) ) ;
return info ! = null & & info . getFeatures ( ) . contains ( " http://jabber.org/protocol/pubsub#persistent-items " ) ;
}
}
public boolean pepPublishOptions ( ) {
return hasDiscoFeature ( account . getJid ( ) . asBareJid ( ) , Namespace . PUBSUB_PUBLISH_OPTIONS ) ;
}
public boolean pepOmemoWhitelisted ( ) {
return hasDiscoFeature ( account . getJid ( ) . asBareJid ( ) , AxolotlService . PEP_OMEMO_WHITELISTED ) ;
}
public boolean mam ( ) {
return MessageArchiveService . Version . has ( getAccountFeatures ( ) ) ;
}
public List < String > getAccountFeatures ( ) {
ServiceDiscoveryResult result = connection . disco . get ( account . getJid ( ) . asBareJid ( ) ) ;
return result = = null ? Collections . emptyList ( ) : result . getFeatures ( ) ;
}
public boolean push ( ) {
2019-06-24 16:16:03 +00:00
return hasDiscoFeature ( account . getJid ( ) . asBareJid ( ) , Namespace . PUSH )
2020-05-17 08:24:46 +00:00
| | hasDiscoFeature ( account . getDomain ( ) , Namespace . PUSH ) ;
2018-09-26 12:39:04 +00:00
}
public boolean rosterVersioning ( ) {
return connection . streamFeatures ! = null & & connection . streamFeatures . hasChild ( " ver " ) ;
}
public void setBlockListRequested ( boolean value ) {
this . blockListRequested = value ;
}
public boolean httpUpload ( long filesize ) {
if ( Config . DISABLE_HTTP_UPLOAD ) {
return false ;
} else {
for ( String namespace : new String [ ] { Namespace . HTTP_UPLOAD , Namespace . HTTP_UPLOAD_LEGACY } ) {
List < Entry < Jid , ServiceDiscoveryResult > > items = findDiscoItemsByFeature ( namespace ) ;
if ( items . size ( ) > 0 ) {
try {
long maxsize = Long . parseLong ( items . get ( 0 ) . getValue ( ) . getExtendedDiscoInformation ( namespace , " max-file-size " ) ) ;
if ( filesize < = maxsize ) {
return true ;
} else {
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : http upload is not available for files with size " + filesize + " (max is " + maxsize + " ) " ) ;
return false ;
}
} catch ( Exception e ) {
return true ;
}
}
}
return false ;
}
}
public boolean useLegacyHttpUpload ( ) {
return findDiscoItemByFeature ( Namespace . HTTP_UPLOAD ) = = null & & findDiscoItemByFeature ( Namespace . HTTP_UPLOAD_LEGACY ) ! = null ;
}
public long getMaxHttpUploadSize ( ) {
for ( String namespace : new String [ ] { Namespace . HTTP_UPLOAD , Namespace . HTTP_UPLOAD_LEGACY } ) {
List < Entry < Jid , ServiceDiscoveryResult > > items = findDiscoItemsByFeature ( namespace ) ;
if ( items . size ( ) > 0 ) {
try {
return Long . parseLong ( items . get ( 0 ) . getValue ( ) . getExtendedDiscoInformation ( namespace , " max-file-size " ) ) ;
} catch ( Exception e ) {
//ignored
}
}
}
return - 1 ;
}
public boolean stanzaIds ( ) {
return hasDiscoFeature ( account . getJid ( ) . asBareJid ( ) , Namespace . STANZA_IDS ) ;
}
2019-09-27 23:21:19 +00:00
public boolean bookmarks2 ( ) {
2019-10-07 07:51:03 +00:00
return Config . USE_BOOKMARKS2 /* || hasDiscoFeature(account.getJid().asBareJid(), Namespace.BOOKMARKS2_COMPAT)*/ ;
2019-09-27 23:21:19 +00:00
}
2020-04-08 15:52:47 +00:00
2020-04-21 09:40:05 +00:00
public boolean externalServiceDiscovery ( ) {
2020-05-22 16:23:53 +00:00
return hasDiscoFeature ( account . getDomain ( ) , Namespace . EXTERNAL_SERVICE_DISCOVERY ) ;
2020-04-08 15:52:47 +00:00
}
2018-09-26 12:39:04 +00:00
}
2014-01-30 15:42:35 +00:00
}