Reworked axolotl protocol layer
Numerous fixes
This commit is contained in:
parent
077932eb55
commit
f73aa1a200
|
@ -1,15 +1,29 @@
|
||||||
package eu.siacs.conversations.crypto.axolotl;
|
package eu.siacs.conversations.crypto.axolotl;
|
||||||
|
|
||||||
|
import android.util.Base64;
|
||||||
import android.util.Log;
|
import android.util.Log;
|
||||||
|
|
||||||
import org.whispersystems.libaxolotl.AxolotlAddress;
|
import org.whispersystems.libaxolotl.AxolotlAddress;
|
||||||
|
import org.whispersystems.libaxolotl.DuplicateMessageException;
|
||||||
import org.whispersystems.libaxolotl.IdentityKey;
|
import org.whispersystems.libaxolotl.IdentityKey;
|
||||||
import org.whispersystems.libaxolotl.IdentityKeyPair;
|
import org.whispersystems.libaxolotl.IdentityKeyPair;
|
||||||
import org.whispersystems.libaxolotl.InvalidKeyException;
|
import org.whispersystems.libaxolotl.InvalidKeyException;
|
||||||
import org.whispersystems.libaxolotl.InvalidKeyIdException;
|
import org.whispersystems.libaxolotl.InvalidKeyIdException;
|
||||||
|
import org.whispersystems.libaxolotl.InvalidMessageException;
|
||||||
|
import org.whispersystems.libaxolotl.InvalidVersionException;
|
||||||
|
import org.whispersystems.libaxolotl.LegacyMessageException;
|
||||||
|
import org.whispersystems.libaxolotl.NoSessionException;
|
||||||
|
import org.whispersystems.libaxolotl.SessionBuilder;
|
||||||
|
import org.whispersystems.libaxolotl.SessionCipher;
|
||||||
|
import org.whispersystems.libaxolotl.UntrustedIdentityException;
|
||||||
import org.whispersystems.libaxolotl.ecc.Curve;
|
import org.whispersystems.libaxolotl.ecc.Curve;
|
||||||
import org.whispersystems.libaxolotl.ecc.ECKeyPair;
|
import org.whispersystems.libaxolotl.ecc.ECKeyPair;
|
||||||
|
import org.whispersystems.libaxolotl.ecc.ECPublicKey;
|
||||||
|
import org.whispersystems.libaxolotl.protocol.CiphertextMessage;
|
||||||
|
import org.whispersystems.libaxolotl.protocol.PreKeyWhisperMessage;
|
||||||
|
import org.whispersystems.libaxolotl.protocol.WhisperMessage;
|
||||||
import org.whispersystems.libaxolotl.state.AxolotlStore;
|
import org.whispersystems.libaxolotl.state.AxolotlStore;
|
||||||
|
import org.whispersystems.libaxolotl.state.PreKeyBundle;
|
||||||
import org.whispersystems.libaxolotl.state.PreKeyRecord;
|
import org.whispersystems.libaxolotl.state.PreKeyRecord;
|
||||||
import org.whispersystems.libaxolotl.state.SessionRecord;
|
import org.whispersystems.libaxolotl.state.SessionRecord;
|
||||||
import org.whispersystems.libaxolotl.state.SignedPreKeyRecord;
|
import org.whispersystems.libaxolotl.state.SignedPreKeyRecord;
|
||||||
|
@ -17,43 +31,50 @@ import org.whispersystems.libaxolotl.util.KeyHelper;
|
||||||
|
|
||||||
import java.util.ArrayList;
|
import java.util.ArrayList;
|
||||||
import java.util.HashMap;
|
import java.util.HashMap;
|
||||||
|
import java.util.HashSet;
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
import java.util.Map;
|
import java.util.Map;
|
||||||
|
import java.util.Random;
|
||||||
|
import java.util.Set;
|
||||||
|
|
||||||
import eu.siacs.conversations.Config;
|
import eu.siacs.conversations.Config;
|
||||||
import eu.siacs.conversations.entities.Account;
|
import eu.siacs.conversations.entities.Account;
|
||||||
|
import eu.siacs.conversations.entities.Contact;
|
||||||
import eu.siacs.conversations.entities.Conversation;
|
import eu.siacs.conversations.entities.Conversation;
|
||||||
import eu.siacs.conversations.entities.Message;
|
|
||||||
import eu.siacs.conversations.services.XmppConnectionService;
|
import eu.siacs.conversations.services.XmppConnectionService;
|
||||||
import eu.siacs.conversations.xmpp.jid.InvalidJidException;
|
import eu.siacs.conversations.xmpp.jid.InvalidJidException;
|
||||||
import eu.siacs.conversations.xmpp.jid.Jid;
|
import eu.siacs.conversations.xmpp.jid.Jid;
|
||||||
|
|
||||||
public class AxolotlService {
|
public class AxolotlService {
|
||||||
|
|
||||||
private Account account;
|
private final Account account;
|
||||||
private XmppConnectionService mXmppConnectionService;
|
private final XmppConnectionService mXmppConnectionService;
|
||||||
private SQLiteAxolotlStore axolotlStore;
|
private final SQLiteAxolotlStore axolotlStore;
|
||||||
private Map<Jid,XmppAxolotlSession> sessions;
|
private final SessionMap sessions;
|
||||||
|
private int ownDeviceId;
|
||||||
|
|
||||||
public static class SQLiteAxolotlStore implements AxolotlStore {
|
public static class SQLiteAxolotlStore implements AxolotlStore {
|
||||||
|
|
||||||
public static final String PREKEY_TABLENAME = "prekeys";
|
public static final String PREKEY_TABLENAME = "prekeys";
|
||||||
public static final String SIGNED_PREKEY_TABLENAME = "signed_prekeys";
|
public static final String SIGNED_PREKEY_TABLENAME = "signed_prekeys";
|
||||||
public static final String SESSION_TABLENAME = "signed_prekeys";
|
public static final String SESSION_TABLENAME = "sessions";
|
||||||
public static final String NAME = "name";
|
public static final String ACCOUNT = "account";
|
||||||
public static final String DEVICE_ID = "device_id";
|
public static final String DEVICE_ID = "device_id";
|
||||||
public static final String ID = "id";
|
public static final String ID = "id";
|
||||||
public static final String KEY = "key";
|
public static final String KEY = "key";
|
||||||
public static final String ACCOUNT = "account";
|
public static final String NAME = "name";
|
||||||
|
public static final String TRUSTED = "trusted";
|
||||||
|
|
||||||
public static final String JSONKEY_IDENTITY_KEY_PAIR = "axolotl_key";
|
public static final String JSONKEY_IDENTITY_KEY_PAIR = "axolotl_key";
|
||||||
public static final String JSONKEY_REGISTRATION_ID = "axolotl_reg_id";
|
public static final String JSONKEY_REGISTRATION_ID = "axolotl_reg_id";
|
||||||
|
public static final String JSONKEY_CURRENT_PREKEY_ID = "axolotl_cur_prekey_id";
|
||||||
|
|
||||||
private final Account account;
|
private final Account account;
|
||||||
private final XmppConnectionService mXmppConnectionService;
|
private final XmppConnectionService mXmppConnectionService;
|
||||||
|
|
||||||
private final IdentityKeyPair identityKeyPair;
|
private final IdentityKeyPair identityKeyPair;
|
||||||
private final int localRegistrationId;
|
private final int localRegistrationId;
|
||||||
|
private int currentPreKeyId = 0;
|
||||||
|
|
||||||
|
|
||||||
private static IdentityKeyPair generateIdentityKeyPair() {
|
private static IdentityKeyPair generateIdentityKeyPair() {
|
||||||
|
@ -75,6 +96,14 @@ public class AxolotlService {
|
||||||
this.mXmppConnectionService = service;
|
this.mXmppConnectionService = service;
|
||||||
this.identityKeyPair = loadIdentityKeyPair();
|
this.identityKeyPair = loadIdentityKeyPair();
|
||||||
this.localRegistrationId = loadRegistrationId();
|
this.localRegistrationId = loadRegistrationId();
|
||||||
|
this.currentPreKeyId = loadCurrentPreKeyId();
|
||||||
|
for( SignedPreKeyRecord record:loadSignedPreKeys()) {
|
||||||
|
Log.d(Config.LOGTAG, "Got Axolotl signed prekey record:" + record.getId());
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
public int getCurrentPreKeyId() {
|
||||||
|
return currentPreKeyId;
|
||||||
}
|
}
|
||||||
|
|
||||||
// --------------------------------------
|
// --------------------------------------
|
||||||
|
@ -86,21 +115,22 @@ public class AxolotlService {
|
||||||
IdentityKeyPair ownKey;
|
IdentityKeyPair ownKey;
|
||||||
if( serializedKey != null ) {
|
if( serializedKey != null ) {
|
||||||
try {
|
try {
|
||||||
ownKey = new IdentityKeyPair(serializedKey.getBytes());
|
ownKey = new IdentityKeyPair(Base64.decode(serializedKey,Base64.DEFAULT));
|
||||||
|
return ownKey;
|
||||||
} catch (InvalidKeyException e) {
|
} catch (InvalidKeyException e) {
|
||||||
Log.d(Config.LOGTAG, "Invalid key stored for account " + account.getJid() + ": " + e.getMessage());
|
Log.d(Config.LOGTAG, "Invalid key stored for account " + account.getJid() + ": " + e.getMessage());
|
||||||
return null;
|
// return null;
|
||||||
}
|
}
|
||||||
} else {
|
} //else {
|
||||||
Log.d(Config.LOGTAG, "Could not retrieve axolotl key for account " + account.getJid());
|
Log.d(Config.LOGTAG, "Could not retrieve axolotl key for account " + account.getJid());
|
||||||
ownKey = generateIdentityKeyPair();
|
ownKey = generateIdentityKeyPair();
|
||||||
boolean success = this.account.setKey(JSONKEY_IDENTITY_KEY_PAIR, new String(ownKey.serialize()));
|
boolean success = this.account.setKey(JSONKEY_IDENTITY_KEY_PAIR, Base64.encodeToString(ownKey.serialize(), Base64.DEFAULT));
|
||||||
if(success) {
|
if(success) {
|
||||||
mXmppConnectionService.databaseBackend.updateAccount(account);
|
mXmppConnectionService.databaseBackend.updateAccount(account);
|
||||||
} else {
|
} else {
|
||||||
Log.e(Config.LOGTAG, "Failed to write new key to the database!");
|
Log.e(Config.LOGTAG, "Failed to write new key to the database!");
|
||||||
}
|
}
|
||||||
}
|
//}
|
||||||
return ownKey;
|
return ownKey;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -122,6 +152,19 @@ public class AxolotlService {
|
||||||
return reg_id;
|
return reg_id;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
private int loadCurrentPreKeyId() {
|
||||||
|
String regIdString = this.account.getKey(JSONKEY_CURRENT_PREKEY_ID);
|
||||||
|
int reg_id;
|
||||||
|
if (regIdString != null) {
|
||||||
|
reg_id = Integer.valueOf(regIdString);
|
||||||
|
} else {
|
||||||
|
Log.d(Config.LOGTAG, "Could not retrieve current prekey id for account " + account.getJid());
|
||||||
|
reg_id = 0;
|
||||||
|
}
|
||||||
|
return reg_id;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Get the local client's identity key pair.
|
* Get the local client's identity key pair.
|
||||||
*
|
*
|
||||||
|
@ -159,7 +202,7 @@ public class AxolotlService {
|
||||||
Jid contactJid = Jid.fromString(name);
|
Jid contactJid = Jid.fromString(name);
|
||||||
Conversation conversation = this.mXmppConnectionService.find(this.account, contactJid);
|
Conversation conversation = this.mXmppConnectionService.find(this.account, contactJid);
|
||||||
if (conversation != null) {
|
if (conversation != null) {
|
||||||
conversation.getContact().addAxolotlIdentityKey(identityKey, false);
|
conversation.getContact().addAxolotlIdentityKey(identityKey);
|
||||||
mXmppConnectionService.updateConversationUi();
|
mXmppConnectionService.updateConversationUi();
|
||||||
mXmppConnectionService.syncRosterToDisk(conversation.getAccount());
|
mXmppConnectionService.syncRosterToDisk(conversation.getAccount());
|
||||||
}
|
}
|
||||||
|
@ -188,8 +231,8 @@ public class AxolotlService {
|
||||||
Jid contactJid = Jid.fromString(name);
|
Jid contactJid = Jid.fromString(name);
|
||||||
Conversation conversation = this.mXmppConnectionService.find(this.account, contactJid);
|
Conversation conversation = this.mXmppConnectionService.find(this.account, contactJid);
|
||||||
if (conversation != null) {
|
if (conversation != null) {
|
||||||
List<IdentityKey> trustedKeys = conversation.getContact().getTrustedAxolotlIdentityKeys();
|
List<IdentityKey> trustedKeys = conversation.getContact().getAxolotlIdentityKeys();
|
||||||
return trustedKeys.contains(identityKey);
|
return trustedKeys.isEmpty() || trustedKeys.contains(identityKey);
|
||||||
} else {
|
} else {
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
@ -274,7 +317,15 @@ public class AxolotlService {
|
||||||
@Override
|
@Override
|
||||||
public void deleteAllSessions(String name) {
|
public void deleteAllSessions(String name) {
|
||||||
mXmppConnectionService.databaseBackend.deleteAllSessions(account,
|
mXmppConnectionService.databaseBackend.deleteAllSessions(account,
|
||||||
new AxolotlAddress(name,0));
|
new AxolotlAddress(name, 0));
|
||||||
|
}
|
||||||
|
|
||||||
|
public boolean isTrustedSession(AxolotlAddress address) {
|
||||||
|
return mXmppConnectionService.databaseBackend.isTrustedSession(this.account, address);
|
||||||
|
}
|
||||||
|
|
||||||
|
public void setTrustedSession(AxolotlAddress address, boolean trusted) {
|
||||||
|
mXmppConnectionService.databaseBackend.setTrustedSession(this.account, address,trusted);
|
||||||
}
|
}
|
||||||
|
|
||||||
// --------------------------------------
|
// --------------------------------------
|
||||||
|
@ -292,7 +343,7 @@ public class AxolotlService {
|
||||||
public PreKeyRecord loadPreKey(int preKeyId) throws InvalidKeyIdException {
|
public PreKeyRecord loadPreKey(int preKeyId) throws InvalidKeyIdException {
|
||||||
PreKeyRecord record = mXmppConnectionService.databaseBackend.loadPreKey(account, preKeyId);
|
PreKeyRecord record = mXmppConnectionService.databaseBackend.loadPreKey(account, preKeyId);
|
||||||
if(record == null) {
|
if(record == null) {
|
||||||
throw new InvalidKeyIdException("No such PreKeyRecord!");
|
throw new InvalidKeyIdException("No such PreKeyRecord: " + preKeyId);
|
||||||
}
|
}
|
||||||
return record;
|
return record;
|
||||||
}
|
}
|
||||||
|
@ -306,6 +357,13 @@ public class AxolotlService {
|
||||||
@Override
|
@Override
|
||||||
public void storePreKey(int preKeyId, PreKeyRecord record) {
|
public void storePreKey(int preKeyId, PreKeyRecord record) {
|
||||||
mXmppConnectionService.databaseBackend.storePreKey(account, record);
|
mXmppConnectionService.databaseBackend.storePreKey(account, record);
|
||||||
|
currentPreKeyId = preKeyId;
|
||||||
|
boolean success = this.account.setKey(JSONKEY_CURRENT_PREKEY_ID,Integer.toString(preKeyId));
|
||||||
|
if(success) {
|
||||||
|
mXmppConnectionService.databaseBackend.updateAccount(account);
|
||||||
|
} else {
|
||||||
|
Log.e(Config.LOGTAG, "Failed to write new prekey id to the database!");
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
@ -342,7 +400,7 @@ public class AxolotlService {
|
||||||
public SignedPreKeyRecord loadSignedPreKey(int signedPreKeyId) throws InvalidKeyIdException {
|
public SignedPreKeyRecord loadSignedPreKey(int signedPreKeyId) throws InvalidKeyIdException {
|
||||||
SignedPreKeyRecord record = mXmppConnectionService.databaseBackend.loadSignedPreKey(account, signedPreKeyId);
|
SignedPreKeyRecord record = mXmppConnectionService.databaseBackend.loadSignedPreKey(account, signedPreKeyId);
|
||||||
if(record == null) {
|
if(record == null) {
|
||||||
throw new InvalidKeyIdException("No such PreKeyRecord!");
|
throw new InvalidKeyIdException("No such SignedPreKeyRecord: " + signedPreKeyId);
|
||||||
}
|
}
|
||||||
return record;
|
return record;
|
||||||
}
|
}
|
||||||
|
@ -388,53 +446,229 @@ public class AxolotlService {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
private static class XmppAxolotlSession {
|
public static class XmppAxolotlSession {
|
||||||
private List<Message> untrustedMessages;
|
private SessionCipher cipher;
|
||||||
private AxolotlStore axolotlStore;
|
private boolean isTrusted = false;
|
||||||
|
private SQLiteAxolotlStore sqLiteAxolotlStore;
|
||||||
|
private AxolotlAddress remoteAddress;
|
||||||
|
|
||||||
public XmppAxolotlSession(SQLiteAxolotlStore axolotlStore) {
|
public XmppAxolotlSession(SQLiteAxolotlStore store, AxolotlAddress remoteAddress) {
|
||||||
this.untrustedMessages = new ArrayList<>();
|
this.cipher = new SessionCipher(store, remoteAddress);
|
||||||
this.axolotlStore = axolotlStore;
|
this.remoteAddress = remoteAddress;
|
||||||
|
this.sqLiteAxolotlStore = store;
|
||||||
|
this.isTrusted = sqLiteAxolotlStore.isTrustedSession(remoteAddress);
|
||||||
}
|
}
|
||||||
|
|
||||||
public void trust() {
|
public void trust() {
|
||||||
for (Message message : this.untrustedMessages) {
|
sqLiteAxolotlStore.setTrustedSession(remoteAddress, true);
|
||||||
message.trust();
|
this.isTrusted = true;
|
||||||
}
|
|
||||||
this.untrustedMessages = null;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
public boolean isTrusted() {
|
public boolean isTrusted() {
|
||||||
return (this.untrustedMessages == null);
|
return this.isTrusted;
|
||||||
}
|
}
|
||||||
|
|
||||||
public String processReceiving(XmppAxolotlMessage incomingMessage) {
|
public byte[] processReceiving(XmppAxolotlMessage.XmppAxolotlMessageHeader incomingHeader) {
|
||||||
return null;
|
byte[] plaintext = null;
|
||||||
|
try {
|
||||||
|
try {
|
||||||
|
PreKeyWhisperMessage message = new PreKeyWhisperMessage(incomingHeader.getContents());
|
||||||
|
Log.d(Config.LOGTAG,"PreKeyWhisperMessage ID:" + message.getSignedPreKeyId() + "/" + message.getPreKeyId());
|
||||||
|
plaintext = cipher.decrypt(message);
|
||||||
|
} catch (InvalidMessageException|InvalidVersionException e) {
|
||||||
|
WhisperMessage message = new WhisperMessage(incomingHeader.getContents());
|
||||||
|
plaintext = cipher.decrypt(message);
|
||||||
|
} catch (InvalidKeyException|InvalidKeyIdException| UntrustedIdentityException e) {
|
||||||
|
Log.d(Config.LOGTAG, "Error decrypting axolotl header: " + e.getMessage());
|
||||||
|
}
|
||||||
|
} catch (LegacyMessageException|InvalidMessageException e) {
|
||||||
|
Log.d(Config.LOGTAG, "Error decrypting axolotl header: " + e.getMessage());
|
||||||
|
} catch (DuplicateMessageException|NoSessionException e) {
|
||||||
|
Log.d(Config.LOGTAG, "Error decrypting axolotl header: " + e.getMessage());
|
||||||
|
}
|
||||||
|
return plaintext;
|
||||||
}
|
}
|
||||||
|
|
||||||
public XmppAxolotlMessage processSending(String outgoingMessage) {
|
public XmppAxolotlMessage.XmppAxolotlMessageHeader processSending(byte[] outgoingMessage) {
|
||||||
|
CiphertextMessage ciphertextMessage = cipher.encrypt(outgoingMessage);
|
||||||
|
XmppAxolotlMessage.XmppAxolotlMessageHeader header =
|
||||||
|
new XmppAxolotlMessage.XmppAxolotlMessageHeader(remoteAddress.getDeviceId(),
|
||||||
|
ciphertextMessage.serialize());
|
||||||
|
return header;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
private static class AxolotlAddressMap<T> {
|
||||||
|
protected Map<String, Map<Integer,T>> map;
|
||||||
|
protected final Object MAP_LOCK = new Object();
|
||||||
|
|
||||||
|
public AxolotlAddressMap() {
|
||||||
|
this.map = new HashMap<>();
|
||||||
|
}
|
||||||
|
|
||||||
|
public void put(AxolotlAddress address, T value) {
|
||||||
|
synchronized (MAP_LOCK) {
|
||||||
|
Map<Integer, T> devices = map.get(address.getName());
|
||||||
|
if (devices == null) {
|
||||||
|
devices = new HashMap<>();
|
||||||
|
map.put(address.getName(), devices);
|
||||||
|
}
|
||||||
|
devices.put(address.getDeviceId(), value);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
public T get(AxolotlAddress address) {
|
||||||
|
synchronized (MAP_LOCK) {
|
||||||
|
Map<Integer, T> devices = map.get(address.getName());
|
||||||
|
if(devices == null) {
|
||||||
return null;
|
return null;
|
||||||
}
|
}
|
||||||
|
return devices.get(address.getDeviceId());
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
public Map<Integer, T> getAll(AxolotlAddress address) {
|
||||||
|
synchronized (MAP_LOCK) {
|
||||||
|
Map<Integer, T> devices = map.get(address.getName());
|
||||||
|
if(devices == null) {
|
||||||
|
return new HashMap<>();
|
||||||
|
}
|
||||||
|
return devices;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
public boolean hasAny(AxolotlAddress address) {
|
||||||
|
synchronized (MAP_LOCK) {
|
||||||
|
Map<Integer, T> devices = map.get(address.getName());
|
||||||
|
return devices != null && !devices.isEmpty();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
private static class SessionMap extends AxolotlAddressMap<XmppAxolotlSession> {
|
||||||
|
|
||||||
|
public SessionMap(SQLiteAxolotlStore store, Account account) {
|
||||||
|
super();
|
||||||
|
this.fillMap(store, account);
|
||||||
|
}
|
||||||
|
|
||||||
|
private void fillMap(SQLiteAxolotlStore store, Account account) {
|
||||||
|
for(Contact contact:account.getRoster().getContacts()){
|
||||||
|
Jid bareJid = contact.getJid().toBareJid();
|
||||||
|
if(bareJid == null) {
|
||||||
|
continue; // FIXME: handle this?
|
||||||
|
}
|
||||||
|
String address = bareJid.toString();
|
||||||
|
List<Integer> deviceIDs = store.getSubDeviceSessions(address);
|
||||||
|
for(Integer deviceId:deviceIDs) {
|
||||||
|
AxolotlAddress axolotlAddress = new AxolotlAddress(address, deviceId);
|
||||||
|
this.put(axolotlAddress, new XmppAxolotlSession(store, axolotlAddress));
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
public AxolotlService(Account account, XmppConnectionService connectionService) {
|
public AxolotlService(Account account, XmppConnectionService connectionService) {
|
||||||
this.mXmppConnectionService = connectionService;
|
this.mXmppConnectionService = connectionService;
|
||||||
this.account = account;
|
this.account = account;
|
||||||
this.axolotlStore = new SQLiteAxolotlStore(this.account, this.mXmppConnectionService);
|
this.axolotlStore = new SQLiteAxolotlStore(this.account, this.mXmppConnectionService);
|
||||||
this.sessions = new HashMap<>();
|
this.sessions = new SessionMap(axolotlStore, account);
|
||||||
|
this.ownDeviceId = axolotlStore.getLocalRegistrationId();
|
||||||
}
|
}
|
||||||
|
|
||||||
public void trustSession(Jid counterpart) {
|
public void trustSession(AxolotlAddress counterpart) {
|
||||||
XmppAxolotlSession session = sessions.get(counterpart);
|
XmppAxolotlSession session = sessions.get(counterpart);
|
||||||
if(session != null) {
|
if(session != null) {
|
||||||
session.trust();
|
session.trust();
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
public boolean isTrustedSession(Jid counterpart) {
|
public boolean isTrustedSession(AxolotlAddress counterpart) {
|
||||||
XmppAxolotlSession session = sessions.get(counterpart);
|
XmppAxolotlSession session = sessions.get(counterpart);
|
||||||
return session != null && session.isTrusted();
|
return session != null && session.isTrusted();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
private AxolotlAddress getAddressForJid(Jid jid) {
|
||||||
|
return new AxolotlAddress(jid.toString(), 0);
|
||||||
|
}
|
||||||
|
|
||||||
|
private Set<XmppAxolotlSession> findOwnSessions() {
|
||||||
|
AxolotlAddress ownAddress = getAddressForJid(account.getJid());
|
||||||
|
Set<XmppAxolotlSession> ownDeviceSessions = new HashSet<>(this.sessions.getAll(ownAddress).values());
|
||||||
|
return ownDeviceSessions;
|
||||||
|
}
|
||||||
|
|
||||||
|
private Set<XmppAxolotlSession> findSessionsforContact(Contact contact) {
|
||||||
|
AxolotlAddress contactAddress = getAddressForJid(contact.getJid());
|
||||||
|
Set<XmppAxolotlSession> sessions = new HashSet<>(this.sessions.getAll(contactAddress).values());
|
||||||
|
return sessions;
|
||||||
|
}
|
||||||
|
|
||||||
|
private boolean hasAny(Contact contact) {
|
||||||
|
AxolotlAddress contactAddress = getAddressForJid(contact.getJid());
|
||||||
|
return sessions.hasAny(contactAddress);
|
||||||
|
}
|
||||||
|
|
||||||
|
public int getOwnDeviceId() {
|
||||||
|
return ownDeviceId;
|
||||||
|
}
|
||||||
|
|
||||||
|
private void createSessionsIfNeeded(Contact contact) throws NoSessionsCreatedException {
|
||||||
|
}
|
||||||
|
|
||||||
|
public XmppAxolotlMessage processSending(Contact contact, String outgoingMessage) throws NoSessionsCreatedException {
|
||||||
|
XmppAxolotlMessage message = new XmppAxolotlMessage(contact, ownDeviceId, outgoingMessage);
|
||||||
|
createSessionsIfNeeded(contact);
|
||||||
|
Log.d(Config.LOGTAG, "Building axolotl foreign headers...");
|
||||||
|
|
||||||
|
for(XmppAxolotlSession session : findSessionsforContact(contact)) {
|
||||||
|
// if(!session.isTrusted()) {
|
||||||
|
// TODO: handle this properly
|
||||||
|
// continue;
|
||||||
|
// }
|
||||||
|
message.addHeader(session.processSending(message.getInnerKey()));
|
||||||
|
}
|
||||||
|
Log.d(Config.LOGTAG, "Building axolotl own headers...");
|
||||||
|
for(XmppAxolotlSession session : findOwnSessions()) {
|
||||||
|
// if(!session.isTrusted()) {
|
||||||
|
// TODO: handle this properly
|
||||||
|
// continue;
|
||||||
|
// }
|
||||||
|
message.addHeader(session.processSending(message.getInnerKey()));
|
||||||
|
}
|
||||||
|
|
||||||
|
return message;
|
||||||
|
}
|
||||||
|
|
||||||
|
public XmppAxolotlMessage.XmppAxolotlPlaintextMessage processReceiving(XmppAxolotlMessage message) {
|
||||||
|
XmppAxolotlMessage.XmppAxolotlPlaintextMessage plaintextMessage = null;
|
||||||
|
AxolotlAddress senderAddress = new AxolotlAddress(message.getContact().getJid().toBareJid().toString(),
|
||||||
|
message.getSenderDeviceId());
|
||||||
|
|
||||||
|
XmppAxolotlSession session = sessions.get(senderAddress);
|
||||||
|
if (session == null) {
|
||||||
|
Log.d(Config.LOGTAG, "No axolotl session found while parsing received message " + message);
|
||||||
|
// TODO: handle this properly
|
||||||
|
session = new XmppAxolotlSession(axolotlStore, senderAddress);
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
for(XmppAxolotlMessage.XmppAxolotlMessageHeader header : message.getHeaders()) {
|
||||||
|
if (header.getRecipientDeviceId() == ownDeviceId) {
|
||||||
|
Log.d(Config.LOGTAG, "Found axolotl header matching own device ID, processing...");
|
||||||
|
byte[] payloadKey = session.processReceiving(header);
|
||||||
|
if (payloadKey != null) {
|
||||||
|
Log.d(Config.LOGTAG, "Got payload key from axolotl header. Decrypting message...");
|
||||||
|
plaintextMessage = message.decrypt(session, payloadKey);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return plaintextMessage;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -0,0 +1,4 @@
|
||||||
|
package eu.siacs.conversations.crypto.axolotl;
|
||||||
|
|
||||||
|
public class NoSessionsCreatedException extends Throwable{
|
||||||
|
}
|
|
@ -1,4 +1,184 @@
|
||||||
package eu.siacs.conversations.crypto.axolotl;
|
package eu.siacs.conversations.crypto.axolotl;
|
||||||
|
|
||||||
|
import android.util.Base64;
|
||||||
|
|
||||||
|
import java.security.InvalidAlgorithmParameterException;
|
||||||
|
import java.security.NoSuchAlgorithmException;
|
||||||
|
import java.security.InvalidKeyException;
|
||||||
|
import java.util.HashSet;
|
||||||
|
import java.util.Set;
|
||||||
|
|
||||||
|
import javax.crypto.BadPaddingException;
|
||||||
|
import javax.crypto.Cipher;
|
||||||
|
import javax.crypto.IllegalBlockSizeException;
|
||||||
|
import javax.crypto.KeyGenerator;
|
||||||
|
import javax.crypto.NoSuchPaddingException;
|
||||||
|
import javax.crypto.SecretKey;
|
||||||
|
import javax.crypto.spec.IvParameterSpec;
|
||||||
|
import javax.crypto.spec.SecretKeySpec;
|
||||||
|
|
||||||
|
import eu.siacs.conversations.entities.Contact;
|
||||||
|
import eu.siacs.conversations.xml.Element;
|
||||||
|
|
||||||
public class XmppAxolotlMessage {
|
public class XmppAxolotlMessage {
|
||||||
|
private byte[] innerKey;
|
||||||
|
private byte[] ciphertext;
|
||||||
|
private byte[] iv;
|
||||||
|
private final Set<XmppAxolotlMessageHeader> headers;
|
||||||
|
private final Contact contact;
|
||||||
|
private final int sourceDeviceId;
|
||||||
|
|
||||||
|
public static class XmppAxolotlMessageHeader {
|
||||||
|
private final int recipientDeviceId;
|
||||||
|
private final byte[] content;
|
||||||
|
|
||||||
|
public XmppAxolotlMessageHeader(int deviceId, byte[] content) {
|
||||||
|
this.recipientDeviceId = deviceId;
|
||||||
|
this.content = content;
|
||||||
|
}
|
||||||
|
|
||||||
|
public XmppAxolotlMessageHeader(Element header) {
|
||||||
|
if("header".equals(header.getName())) {
|
||||||
|
this.recipientDeviceId = Integer.parseInt(header.getAttribute("rid"));
|
||||||
|
this.content = Base64.decode(header.getContent(),Base64.DEFAULT);
|
||||||
|
} else {
|
||||||
|
throw new IllegalArgumentException("Argument not a <header> Element!");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
public int getRecipientDeviceId() {
|
||||||
|
return recipientDeviceId;
|
||||||
|
}
|
||||||
|
|
||||||
|
public byte[] getContents() {
|
||||||
|
return content;
|
||||||
|
}
|
||||||
|
|
||||||
|
public Element toXml() {
|
||||||
|
Element headerElement = new Element("header");
|
||||||
|
// TODO: generate XML
|
||||||
|
headerElement.setAttribute("rid", getRecipientDeviceId());
|
||||||
|
headerElement.setContent(Base64.encodeToString(getContents(), Base64.DEFAULT));
|
||||||
|
return headerElement;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
public static class XmppAxolotlPlaintextMessage {
|
||||||
|
private final AxolotlService.XmppAxolotlSession session;
|
||||||
|
private final String plaintext;
|
||||||
|
|
||||||
|
public XmppAxolotlPlaintextMessage(AxolotlService.XmppAxolotlSession session, String plaintext) {
|
||||||
|
this.session = session;
|
||||||
|
this.plaintext = plaintext;
|
||||||
|
}
|
||||||
|
|
||||||
|
public String getPlaintext() {
|
||||||
|
return plaintext;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
public XmppAxolotlMessage(Contact contact, Element axolotlMessage) {
|
||||||
|
this.contact = contact;
|
||||||
|
this.sourceDeviceId = Integer.parseInt(axolotlMessage.getAttribute("id"));
|
||||||
|
this.headers = new HashSet<>();
|
||||||
|
for(Element child:axolotlMessage.getChildren()) {
|
||||||
|
switch(child.getName()) {
|
||||||
|
case "header":
|
||||||
|
headers.add(new XmppAxolotlMessageHeader(child));
|
||||||
|
break;
|
||||||
|
case "message":
|
||||||
|
iv = Base64.decode(child.getAttribute("iv"),Base64.DEFAULT);
|
||||||
|
ciphertext = Base64.decode(child.getContent(),Base64.DEFAULT);
|
||||||
|
break;
|
||||||
|
default:
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
public XmppAxolotlMessage(Contact contact, int sourceDeviceId, String plaintext) {
|
||||||
|
this.contact = contact;
|
||||||
|
this.sourceDeviceId = sourceDeviceId;
|
||||||
|
this.headers = new HashSet<>();
|
||||||
|
this.encrypt(plaintext);
|
||||||
|
}
|
||||||
|
|
||||||
|
private void encrypt(String plaintext) {
|
||||||
|
try {
|
||||||
|
KeyGenerator generator = KeyGenerator.getInstance("AES");
|
||||||
|
generator.init(128);
|
||||||
|
SecretKey secretKey = generator.generateKey();
|
||||||
|
Cipher cipher = Cipher.getInstance("AES/CTR/NoPadding");
|
||||||
|
cipher.init(Cipher.ENCRYPT_MODE, secretKey);
|
||||||
|
this.innerKey = secretKey.getEncoded();
|
||||||
|
this.iv = cipher.getIV();
|
||||||
|
this.ciphertext = cipher.doFinal(plaintext.getBytes());
|
||||||
|
} catch (NoSuchAlgorithmException | NoSuchPaddingException | InvalidKeyException
|
||||||
|
| IllegalBlockSizeException | BadPaddingException e) {
|
||||||
|
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
public Contact getContact() {
|
||||||
|
return this.contact;
|
||||||
|
}
|
||||||
|
|
||||||
|
public int getSenderDeviceId() {
|
||||||
|
return sourceDeviceId;
|
||||||
|
}
|
||||||
|
|
||||||
|
public byte[] getCiphertext() {
|
||||||
|
return ciphertext;
|
||||||
|
}
|
||||||
|
|
||||||
|
public Set<XmppAxolotlMessageHeader> getHeaders() {
|
||||||
|
return headers;
|
||||||
|
}
|
||||||
|
|
||||||
|
public void addHeader(XmppAxolotlMessageHeader header) {
|
||||||
|
headers.add(header);
|
||||||
|
}
|
||||||
|
|
||||||
|
public byte[] getInnerKey(){
|
||||||
|
return innerKey;
|
||||||
|
}
|
||||||
|
|
||||||
|
public byte[] getIV() {
|
||||||
|
return this.iv;
|
||||||
|
}
|
||||||
|
|
||||||
|
public Element toXml() {
|
||||||
|
// TODO: generate outer XML, add in header XML
|
||||||
|
Element message= new Element("axolotl_message", AxolotlService.PEP_PREFIX);
|
||||||
|
message.setAttribute("id", sourceDeviceId);
|
||||||
|
for(XmppAxolotlMessageHeader header: headers) {
|
||||||
|
message.addChild(header.toXml());
|
||||||
|
}
|
||||||
|
Element payload = message.addChild("message");
|
||||||
|
payload.setAttribute("iv",Base64.encodeToString(iv, Base64.DEFAULT));
|
||||||
|
payload.setContent(Base64.encodeToString(ciphertext,Base64.DEFAULT));
|
||||||
|
return message;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
public XmppAxolotlPlaintextMessage decrypt(AxolotlService.XmppAxolotlSession session, byte[] key) {
|
||||||
|
XmppAxolotlPlaintextMessage plaintextMessage = null;
|
||||||
|
try {
|
||||||
|
|
||||||
|
Cipher cipher = Cipher.getInstance("AES/CTR/NoPadding");
|
||||||
|
SecretKeySpec keySpec = new SecretKeySpec(key, "AES");
|
||||||
|
IvParameterSpec ivSpec = new IvParameterSpec(iv);
|
||||||
|
|
||||||
|
cipher.init(Cipher.DECRYPT_MODE, keySpec, ivSpec);
|
||||||
|
|
||||||
|
String plaintext = new String(cipher.doFinal(ciphertext));
|
||||||
|
plaintextMessage = new XmppAxolotlPlaintextMessage(session, plaintext);
|
||||||
|
|
||||||
|
} catch (NoSuchAlgorithmException | NoSuchPaddingException | InvalidKeyException
|
||||||
|
| InvalidAlgorithmParameterException | IllegalBlockSizeException
|
||||||
|
| BadPaddingException e) {
|
||||||
|
throw new AssertionError(e);
|
||||||
|
}
|
||||||
|
return plaintextMessage;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -20,6 +20,7 @@ import java.util.concurrent.CopyOnWriteArraySet;
|
||||||
import eu.siacs.conversations.Config;
|
import eu.siacs.conversations.Config;
|
||||||
import eu.siacs.conversations.R;
|
import eu.siacs.conversations.R;
|
||||||
import eu.siacs.conversations.crypto.OtrService;
|
import eu.siacs.conversations.crypto.OtrService;
|
||||||
|
import eu.siacs.conversations.crypto.axolotl.AxolotlService;
|
||||||
import eu.siacs.conversations.services.XmppConnectionService;
|
import eu.siacs.conversations.services.XmppConnectionService;
|
||||||
import eu.siacs.conversations.xmpp.XmppConnection;
|
import eu.siacs.conversations.xmpp.XmppConnection;
|
||||||
import eu.siacs.conversations.xmpp.jid.InvalidJidException;
|
import eu.siacs.conversations.xmpp.jid.InvalidJidException;
|
||||||
|
@ -122,6 +123,7 @@ public class Account extends AbstractEntity {
|
||||||
protected String avatar;
|
protected String avatar;
|
||||||
protected boolean online = false;
|
protected boolean online = false;
|
||||||
private OtrService mOtrService = null;
|
private OtrService mOtrService = null;
|
||||||
|
private AxolotlService axolotlService = null;
|
||||||
private XmppConnection xmppConnection = null;
|
private XmppConnection xmppConnection = null;
|
||||||
private long mEndGracePeriod = 0L;
|
private long mEndGracePeriod = 0L;
|
||||||
private String otrFingerprint;
|
private String otrFingerprint;
|
||||||
|
@ -281,8 +283,13 @@ public class Account extends AbstractEntity {
|
||||||
return values;
|
return values;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
public AxolotlService getAxolotlService() {
|
||||||
|
return axolotlService;
|
||||||
|
}
|
||||||
|
|
||||||
public void initAccountServices(final XmppConnectionService context) {
|
public void initAccountServices(final XmppConnectionService context) {
|
||||||
this.mOtrService = new OtrService(context, this);
|
this.mOtrService = new OtrService(context, this);
|
||||||
|
this.axolotlService = new AxolotlService(this, context);
|
||||||
}
|
}
|
||||||
|
|
||||||
public OtrService getOtrService() {
|
public OtrService getOtrService() {
|
||||||
|
|
|
@ -2,6 +2,7 @@ package eu.siacs.conversations.entities;
|
||||||
|
|
||||||
import android.content.ContentValues;
|
import android.content.ContentValues;
|
||||||
import android.database.Cursor;
|
import android.database.Cursor;
|
||||||
|
import android.util.Base64;
|
||||||
import android.util.Log;
|
import android.util.Log;
|
||||||
|
|
||||||
import org.json.JSONArray;
|
import org.json.JSONArray;
|
||||||
|
@ -349,20 +350,38 @@ public class Contact implements ListItem, Blockable {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
public List<IdentityKey> getTrustedAxolotlIdentityKeys() {
|
public List<IdentityKey> getAxolotlIdentityKeys() {
|
||||||
synchronized (this.keys) {
|
synchronized (this.keys) {
|
||||||
JSONArray serializedKeyItems = this.keys.optJSONArray("axolotl_identity_key");
|
JSONArray serializedKeyItems = this.keys.optJSONArray("axolotl_identity_key");
|
||||||
List<IdentityKey> identityKeys = new ArrayList<>();
|
List<IdentityKey> identityKeys = new ArrayList<>();
|
||||||
|
List<Integer> toDelete = new ArrayList<>();
|
||||||
if(serializedKeyItems != null) {
|
if(serializedKeyItems != null) {
|
||||||
for(int i = 0; i<serializedKeyItems.length();++i) {
|
for(int i = 0; i<serializedKeyItems.length();++i) {
|
||||||
try {
|
try {
|
||||||
String serializedKeyItem = serializedKeyItems.getString(i);
|
String serializedKeyItem = serializedKeyItems.getString(i);
|
||||||
IdentityKey identityKey = new IdentityKey(serializedKeyItem.getBytes(), 0);
|
IdentityKey identityKey = new IdentityKey(Base64.decode(serializedKeyItem, Base64.DEFAULT), 0);
|
||||||
identityKeys.add(identityKey);
|
identityKeys.add(identityKey);
|
||||||
} catch (InvalidKeyException e) {
|
} catch (InvalidKeyException e) {
|
||||||
Log.e(Config.LOGTAG, "Invalid axolotl identity key encountered at" + this.getJid() + ": " + e.getMessage());
|
Log.e(Config.LOGTAG, "Invalid axolotl identity key encountered at contact" + this.getJid() + ": " + e.getMessage() + ", marking for deletion...");
|
||||||
|
toDelete.add(i);
|
||||||
} catch (JSONException e) {
|
} catch (JSONException e) {
|
||||||
Log.e(Config.LOGTAG, "Error retrieving axolotl identity key at" + this.getJid() + ": " + e.getMessage());
|
Log.e(Config.LOGTAG, "Error retrieving axolotl identity key at contact " + this.getJid() + ": " + e.getMessage());
|
||||||
|
} catch (IllegalArgumentException e) {
|
||||||
|
Log.e(Config.LOGTAG, "Encountered malformed identity key for contact" + this.getJid() + ": " + e.getMessage() + ", marking for deletion... ");
|
||||||
|
toDelete.add(i);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if(!toDelete.isEmpty()) {
|
||||||
|
try {
|
||||||
|
JSONArray filteredKeyItems = new JSONArray();
|
||||||
|
for (int i = 0; i < serializedKeyItems.length(); ++i) {
|
||||||
|
if (!toDelete.contains(i)) {
|
||||||
|
filteredKeyItems.put(serializedKeyItems.get(i));
|
||||||
|
}
|
||||||
|
}
|
||||||
|
this.keys.put("axolotl_identity_key", filteredKeyItems);
|
||||||
|
} catch (JSONException e) {
|
||||||
|
//should never happen
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -370,23 +389,28 @@ public class Contact implements ListItem, Blockable {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
public boolean addAxolotlIdentityKey(IdentityKey identityKey, boolean trusted) {
|
public boolean addAxolotlIdentityKey(IdentityKey identityKey) {
|
||||||
synchronized (this.keys) {
|
synchronized (this.keys) {
|
||||||
|
if(!getAxolotlIdentityKeys().contains(identityKey)) {
|
||||||
JSONArray keysList;
|
JSONArray keysList;
|
||||||
try {
|
try {
|
||||||
keysList = this.keys.getJSONArray("axolotl_identity_key");
|
keysList = this.keys.getJSONArray("axolotl_identity_key");
|
||||||
} catch (JSONException e) {
|
} catch (JSONException e) {
|
||||||
keysList = new JSONArray();
|
keysList = new JSONArray();
|
||||||
}
|
}
|
||||||
keysList.put(new String(identityKey.serialize()));
|
|
||||||
|
keysList.put(Base64.encodeToString(identityKey.serialize(), Base64.DEFAULT));
|
||||||
try {
|
try {
|
||||||
this.keys.put("axolotl_identity_key", keysList);
|
this.keys.put("axolotl_identity_key", keysList);
|
||||||
} catch (JSONException e) {
|
} catch (JSONException e) {
|
||||||
Log.e(Config.LOGTAG, "Error adding Identity Key to Contact " + this.getJid() + ": " + e.getMessage());
|
Log.e(Config.LOGTAG, "Error adding Identity Key to Contact " + this.getJid() + ": " + e.getMessage());
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
}
|
|
||||||
return true;
|
return true;
|
||||||
|
} else {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
|
@ -8,6 +8,7 @@ import java.net.URL;
|
||||||
import java.util.Arrays;
|
import java.util.Arrays;
|
||||||
|
|
||||||
import eu.siacs.conversations.Config;
|
import eu.siacs.conversations.Config;
|
||||||
|
import eu.siacs.conversations.crypto.axolotl.AxolotlService;
|
||||||
import eu.siacs.conversations.utils.GeoHelper;
|
import eu.siacs.conversations.utils.GeoHelper;
|
||||||
import eu.siacs.conversations.utils.MimeUtils;
|
import eu.siacs.conversations.utils.MimeUtils;
|
||||||
import eu.siacs.conversations.utils.UIHelper;
|
import eu.siacs.conversations.utils.UIHelper;
|
||||||
|
@ -34,6 +35,7 @@ public class Message extends AbstractEntity {
|
||||||
public static final int ENCRYPTION_OTR = 2;
|
public static final int ENCRYPTION_OTR = 2;
|
||||||
public static final int ENCRYPTION_DECRYPTED = 3;
|
public static final int ENCRYPTION_DECRYPTED = 3;
|
||||||
public static final int ENCRYPTION_DECRYPTION_FAILED = 4;
|
public static final int ENCRYPTION_DECRYPTION_FAILED = 4;
|
||||||
|
public static final int ENCRYPTION_AXOLOTL = 5;
|
||||||
|
|
||||||
public static final int TYPE_TEXT = 0;
|
public static final int TYPE_TEXT = 0;
|
||||||
public static final int TYPE_IMAGE = 1;
|
public static final int TYPE_IMAGE = 1;
|
||||||
|
@ -65,7 +67,7 @@ public class Message extends AbstractEntity {
|
||||||
protected int encryption;
|
protected int encryption;
|
||||||
protected int status;
|
protected int status;
|
||||||
protected int type;
|
protected int type;
|
||||||
private boolean isTrusted = true;
|
private AxolotlService.XmppAxolotlSession axolotlSession = null;
|
||||||
protected String relativeFilePath;
|
protected String relativeFilePath;
|
||||||
protected boolean read = true;
|
protected boolean read = true;
|
||||||
protected String remoteMsgId = null;
|
protected String remoteMsgId = null;
|
||||||
|
@ -665,15 +667,7 @@ public class Message extends AbstractEntity {
|
||||||
public int height = 0;
|
public int height = 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
public void trust() {
|
|
||||||
this.isTrusted = true;
|
|
||||||
}
|
|
||||||
|
|
||||||
public void distrust() {
|
|
||||||
this.isTrusted = false;
|
|
||||||
}
|
|
||||||
|
|
||||||
public boolean isTrusted() {
|
public boolean isTrusted() {
|
||||||
return this.isTrusted;
|
return this.axolotlSession != null && this.axolotlSession.isTrusted();
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,5 +1,19 @@
|
||||||
package eu.siacs.conversations.persistance;
|
package eu.siacs.conversations.persistance;
|
||||||
|
|
||||||
|
import android.content.ContentValues;
|
||||||
|
import android.content.Context;
|
||||||
|
import android.database.Cursor;
|
||||||
|
import android.database.sqlite.SQLiteCantOpenDatabaseException;
|
||||||
|
import android.database.sqlite.SQLiteDatabase;
|
||||||
|
import android.database.sqlite.SQLiteOpenHelper;
|
||||||
|
import android.util.Base64;
|
||||||
|
import android.util.Log;
|
||||||
|
|
||||||
|
import org.whispersystems.libaxolotl.AxolotlAddress;
|
||||||
|
import org.whispersystems.libaxolotl.state.PreKeyRecord;
|
||||||
|
import org.whispersystems.libaxolotl.state.SessionRecord;
|
||||||
|
import org.whispersystems.libaxolotl.state.SignedPreKeyRecord;
|
||||||
|
|
||||||
import java.io.IOException;
|
import java.io.IOException;
|
||||||
import java.util.ArrayList;
|
import java.util.ArrayList;
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
|
@ -15,25 +29,12 @@ import eu.siacs.conversations.entities.Roster;
|
||||||
import eu.siacs.conversations.xmpp.jid.InvalidJidException;
|
import eu.siacs.conversations.xmpp.jid.InvalidJidException;
|
||||||
import eu.siacs.conversations.xmpp.jid.Jid;
|
import eu.siacs.conversations.xmpp.jid.Jid;
|
||||||
|
|
||||||
import android.content.ContentValues;
|
|
||||||
import android.content.Context;
|
|
||||||
import android.database.Cursor;
|
|
||||||
import android.database.sqlite.SQLiteCantOpenDatabaseException;
|
|
||||||
import android.database.sqlite.SQLiteDatabase;
|
|
||||||
import android.database.sqlite.SQLiteOpenHelper;
|
|
||||||
import android.util.Log;
|
|
||||||
|
|
||||||
import org.whispersystems.libaxolotl.AxolotlAddress;
|
|
||||||
import org.whispersystems.libaxolotl.state.PreKeyRecord;
|
|
||||||
import org.whispersystems.libaxolotl.state.SessionRecord;
|
|
||||||
import org.whispersystems.libaxolotl.state.SignedPreKeyRecord;
|
|
||||||
|
|
||||||
public class DatabaseBackend extends SQLiteOpenHelper {
|
public class DatabaseBackend extends SQLiteOpenHelper {
|
||||||
|
|
||||||
private static DatabaseBackend instance = null;
|
private static DatabaseBackend instance = null;
|
||||||
|
|
||||||
private static final String DATABASE_NAME = "history";
|
private static final String DATABASE_NAME = "history";
|
||||||
private static final int DATABASE_VERSION = 14;
|
private static final int DATABASE_VERSION = 15;
|
||||||
|
|
||||||
private static String CREATE_CONTATCS_STATEMENT = "create table "
|
private static String CREATE_CONTATCS_STATEMENT = "create table "
|
||||||
+ Contact.TABLENAME + "(" + Contact.ACCOUNT + " TEXT, "
|
+ Contact.TABLENAME + "(" + Contact.ACCOUNT + " TEXT, "
|
||||||
|
@ -49,8 +50,9 @@ public class DatabaseBackend extends SQLiteOpenHelper {
|
||||||
|
|
||||||
private static String CREATE_PREKEYS_STATEMENT = "CREATE TABLE "
|
private static String CREATE_PREKEYS_STATEMENT = "CREATE TABLE "
|
||||||
+ AxolotlService.SQLiteAxolotlStore.PREKEY_TABLENAME + "("
|
+ AxolotlService.SQLiteAxolotlStore.PREKEY_TABLENAME + "("
|
||||||
|
+ AxolotlService.SQLiteAxolotlStore.ACCOUNT + " TEXT, "
|
||||||
+ AxolotlService.SQLiteAxolotlStore.ID + " INTEGER, "
|
+ AxolotlService.SQLiteAxolotlStore.ID + " INTEGER, "
|
||||||
+ AxolotlService.SQLiteAxolotlStore.KEY + "TEXT, FOREIGN KEY("
|
+ AxolotlService.SQLiteAxolotlStore.KEY + " TEXT, FOREIGN KEY("
|
||||||
+ AxolotlService.SQLiteAxolotlStore.ACCOUNT
|
+ AxolotlService.SQLiteAxolotlStore.ACCOUNT
|
||||||
+ ") REFERENCES " + Account.TABLENAME + "(" + Account.UUID + ") ON DELETE CASCADE, "
|
+ ") REFERENCES " + Account.TABLENAME + "(" + Account.UUID + ") ON DELETE CASCADE, "
|
||||||
+ "UNIQUE( " + AxolotlService.SQLiteAxolotlStore.ACCOUNT + ", "
|
+ "UNIQUE( " + AxolotlService.SQLiteAxolotlStore.ACCOUNT + ", "
|
||||||
|
@ -60,8 +62,9 @@ public class DatabaseBackend extends SQLiteOpenHelper {
|
||||||
|
|
||||||
private static String CREATE_SIGNED_PREKEYS_STATEMENT = "CREATE TABLE "
|
private static String CREATE_SIGNED_PREKEYS_STATEMENT = "CREATE TABLE "
|
||||||
+ AxolotlService.SQLiteAxolotlStore.SIGNED_PREKEY_TABLENAME + "("
|
+ AxolotlService.SQLiteAxolotlStore.SIGNED_PREKEY_TABLENAME + "("
|
||||||
|
+ AxolotlService.SQLiteAxolotlStore.ACCOUNT + " TEXT, "
|
||||||
+ AxolotlService.SQLiteAxolotlStore.ID + " INTEGER, "
|
+ AxolotlService.SQLiteAxolotlStore.ID + " INTEGER, "
|
||||||
+ AxolotlService.SQLiteAxolotlStore.KEY + "TEXT, FOREIGN KEY("
|
+ AxolotlService.SQLiteAxolotlStore.KEY + " TEXT, FOREIGN KEY("
|
||||||
+ AxolotlService.SQLiteAxolotlStore.ACCOUNT
|
+ AxolotlService.SQLiteAxolotlStore.ACCOUNT
|
||||||
+ ") REFERENCES " + Account.TABLENAME + "(" + Account.UUID + ") ON DELETE CASCADE, "
|
+ ") REFERENCES " + Account.TABLENAME + "(" + Account.UUID + ") ON DELETE CASCADE, "
|
||||||
+ "UNIQUE( " + AxolotlService.SQLiteAxolotlStore.ACCOUNT + ", "
|
+ "UNIQUE( " + AxolotlService.SQLiteAxolotlStore.ACCOUNT + ", "
|
||||||
|
@ -71,13 +74,16 @@ public class DatabaseBackend extends SQLiteOpenHelper {
|
||||||
|
|
||||||
private static String CREATE_SESSIONS_STATEMENT = "CREATE TABLE "
|
private static String CREATE_SESSIONS_STATEMENT = "CREATE TABLE "
|
||||||
+ AxolotlService.SQLiteAxolotlStore.SESSION_TABLENAME + "("
|
+ AxolotlService.SQLiteAxolotlStore.SESSION_TABLENAME + "("
|
||||||
|
+ AxolotlService.SQLiteAxolotlStore.ACCOUNT + " TEXT, "
|
||||||
+ AxolotlService.SQLiteAxolotlStore.NAME + " TEXT, "
|
+ AxolotlService.SQLiteAxolotlStore.NAME + " TEXT, "
|
||||||
+ AxolotlService.SQLiteAxolotlStore.DEVICE_ID+ " INTEGER, "
|
+ AxolotlService.SQLiteAxolotlStore.DEVICE_ID + " INTEGER, "
|
||||||
+ AxolotlService.SQLiteAxolotlStore.KEY + "TEXT, FOREIGN KEY("
|
+ AxolotlService.SQLiteAxolotlStore.TRUSTED + " INTEGER, "
|
||||||
|
+ AxolotlService.SQLiteAxolotlStore.KEY + " TEXT, FOREIGN KEY("
|
||||||
+ AxolotlService.SQLiteAxolotlStore.ACCOUNT
|
+ AxolotlService.SQLiteAxolotlStore.ACCOUNT
|
||||||
+ ") REFERENCES " + Account.TABLENAME + "(" + Account.UUID + ") ON DELETE CASCADE, "
|
+ ") REFERENCES " + Account.TABLENAME + "(" + Account.UUID + ") ON DELETE CASCADE, "
|
||||||
+ "UNIQUE( " + AxolotlService.SQLiteAxolotlStore.ACCOUNT + ", "
|
+ "UNIQUE( " + AxolotlService.SQLiteAxolotlStore.ACCOUNT + ", "
|
||||||
+ AxolotlService.SQLiteAxolotlStore.NAME
|
+ AxolotlService.SQLiteAxolotlStore.NAME + ", "
|
||||||
|
+ AxolotlService.SQLiteAxolotlStore.DEVICE_ID
|
||||||
+ ") ON CONFLICT REPLACE"
|
+ ") ON CONFLICT REPLACE"
|
||||||
+");";
|
+");";
|
||||||
|
|
||||||
|
@ -257,6 +263,14 @@ public class DatabaseBackend extends SQLiteOpenHelper {
|
||||||
}
|
}
|
||||||
cursor.close();
|
cursor.close();
|
||||||
}
|
}
|
||||||
|
if (oldVersion < 15 && newVersion >= 15) {
|
||||||
|
db.execSQL("DROP TABLE IF EXISTS " + AxolotlService.SQLiteAxolotlStore.SESSION_TABLENAME);
|
||||||
|
db.execSQL(CREATE_SESSIONS_STATEMENT);
|
||||||
|
db.execSQL("DROP TABLE IF EXISTS " + AxolotlService.SQLiteAxolotlStore.PREKEY_TABLENAME);
|
||||||
|
db.execSQL(CREATE_PREKEYS_STATEMENT);
|
||||||
|
db.execSQL("DROP TABLE IF EXISTS " + AxolotlService.SQLiteAxolotlStore.SIGNED_PREKEY_TABLENAME);
|
||||||
|
db.execSQL(CREATE_SIGNED_PREKEYS_STATEMENT);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
public static synchronized DatabaseBackend getInstance(Context context) {
|
public static synchronized DatabaseBackend getInstance(Context context) {
|
||||||
|
@ -547,7 +561,7 @@ public class DatabaseBackend extends SQLiteOpenHelper {
|
||||||
if(cursor.getCount() != 0) {
|
if(cursor.getCount() != 0) {
|
||||||
cursor.moveToFirst();
|
cursor.moveToFirst();
|
||||||
try {
|
try {
|
||||||
session = new SessionRecord(cursor.getString(cursor.getColumnIndex(AxolotlService.SQLiteAxolotlStore.KEY)).getBytes());
|
session = new SessionRecord(Base64.decode(cursor.getString(cursor.getColumnIndex(AxolotlService.SQLiteAxolotlStore.KEY)),Base64.DEFAULT));
|
||||||
} catch (IOException e) {
|
} catch (IOException e) {
|
||||||
throw new AssertionError(e);
|
throw new AssertionError(e);
|
||||||
}
|
}
|
||||||
|
@ -590,7 +604,7 @@ public class DatabaseBackend extends SQLiteOpenHelper {
|
||||||
ContentValues values = new ContentValues();
|
ContentValues values = new ContentValues();
|
||||||
values.put(AxolotlService.SQLiteAxolotlStore.NAME, contact.getName());
|
values.put(AxolotlService.SQLiteAxolotlStore.NAME, contact.getName());
|
||||||
values.put(AxolotlService.SQLiteAxolotlStore.DEVICE_ID, contact.getDeviceId());
|
values.put(AxolotlService.SQLiteAxolotlStore.DEVICE_ID, contact.getDeviceId());
|
||||||
values.put(AxolotlService.SQLiteAxolotlStore.KEY, session.serialize());
|
values.put(AxolotlService.SQLiteAxolotlStore.KEY, Base64.encodeToString(session.serialize(),Base64.DEFAULT));
|
||||||
values.put(AxolotlService.SQLiteAxolotlStore.ACCOUNT, account.getUuid());
|
values.put(AxolotlService.SQLiteAxolotlStore.ACCOUNT, account.getUuid());
|
||||||
db.insert(AxolotlService.SQLiteAxolotlStore.SESSION_TABLENAME, null, values);
|
db.insert(AxolotlService.SQLiteAxolotlStore.SESSION_TABLENAME, null, values);
|
||||||
}
|
}
|
||||||
|
@ -616,6 +630,28 @@ public class DatabaseBackend extends SQLiteOpenHelper {
|
||||||
args);
|
args);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
public boolean isTrustedSession(Account account, AxolotlAddress contact) {
|
||||||
|
boolean trusted = false;
|
||||||
|
Cursor cursor = getCursorForSession(account, contact);
|
||||||
|
if(cursor.getCount() != 0) {
|
||||||
|
cursor.moveToFirst();
|
||||||
|
trusted = cursor.getInt(cursor.getColumnIndex(
|
||||||
|
AxolotlService.SQLiteAxolotlStore.TRUSTED)) > 0;
|
||||||
|
}
|
||||||
|
cursor.close();
|
||||||
|
return trusted;
|
||||||
|
}
|
||||||
|
|
||||||
|
public void setTrustedSession(Account account, AxolotlAddress contact, boolean trusted) {
|
||||||
|
SQLiteDatabase db = this.getWritableDatabase();
|
||||||
|
ContentValues values = new ContentValues();
|
||||||
|
values.put(AxolotlService.SQLiteAxolotlStore.NAME, contact.getName());
|
||||||
|
values.put(AxolotlService.SQLiteAxolotlStore.DEVICE_ID, contact.getDeviceId());
|
||||||
|
values.put(AxolotlService.SQLiteAxolotlStore.ACCOUNT, account.getUuid());
|
||||||
|
values.put(AxolotlService.SQLiteAxolotlStore.TRUSTED, trusted?1:0);
|
||||||
|
db.insert(AxolotlService.SQLiteAxolotlStore.SESSION_TABLENAME, null, values);
|
||||||
|
}
|
||||||
|
|
||||||
private Cursor getCursorForPreKey(Account account, int preKeyId) {
|
private Cursor getCursorForPreKey(Account account, int preKeyId) {
|
||||||
SQLiteDatabase db = this.getReadableDatabase();
|
SQLiteDatabase db = this.getReadableDatabase();
|
||||||
String[] columns = {AxolotlService.SQLiteAxolotlStore.KEY};
|
String[] columns = {AxolotlService.SQLiteAxolotlStore.KEY};
|
||||||
|
@ -636,7 +672,7 @@ public class DatabaseBackend extends SQLiteOpenHelper {
|
||||||
if(cursor.getCount() != 0) {
|
if(cursor.getCount() != 0) {
|
||||||
cursor.moveToFirst();
|
cursor.moveToFirst();
|
||||||
try {
|
try {
|
||||||
record = new PreKeyRecord(cursor.getString(cursor.getColumnIndex(AxolotlService.SQLiteAxolotlStore.KEY)).getBytes());
|
record = new PreKeyRecord(Base64.decode(cursor.getString(cursor.getColumnIndex(AxolotlService.SQLiteAxolotlStore.KEY)),Base64.DEFAULT));
|
||||||
} catch (IOException e ) {
|
} catch (IOException e ) {
|
||||||
throw new AssertionError(e);
|
throw new AssertionError(e);
|
||||||
}
|
}
|
||||||
|
@ -656,7 +692,7 @@ public class DatabaseBackend extends SQLiteOpenHelper {
|
||||||
SQLiteDatabase db = this.getWritableDatabase();
|
SQLiteDatabase db = this.getWritableDatabase();
|
||||||
ContentValues values = new ContentValues();
|
ContentValues values = new ContentValues();
|
||||||
values.put(AxolotlService.SQLiteAxolotlStore.ID, record.getId());
|
values.put(AxolotlService.SQLiteAxolotlStore.ID, record.getId());
|
||||||
values.put(AxolotlService.SQLiteAxolotlStore.KEY, record.serialize());
|
values.put(AxolotlService.SQLiteAxolotlStore.KEY, Base64.encodeToString(record.serialize(),Base64.DEFAULT));
|
||||||
values.put(AxolotlService.SQLiteAxolotlStore.ACCOUNT, account.getUuid());
|
values.put(AxolotlService.SQLiteAxolotlStore.ACCOUNT, account.getUuid());
|
||||||
db.insert(AxolotlService.SQLiteAxolotlStore.PREKEY_TABLENAME, null, values);
|
db.insert(AxolotlService.SQLiteAxolotlStore.PREKEY_TABLENAME, null, values);
|
||||||
}
|
}
|
||||||
|
@ -685,11 +721,11 @@ public class DatabaseBackend extends SQLiteOpenHelper {
|
||||||
|
|
||||||
public SignedPreKeyRecord loadSignedPreKey(Account account, int signedPreKeyId) {
|
public SignedPreKeyRecord loadSignedPreKey(Account account, int signedPreKeyId) {
|
||||||
SignedPreKeyRecord record = null;
|
SignedPreKeyRecord record = null;
|
||||||
Cursor cursor = getCursorForPreKey(account, signedPreKeyId);
|
Cursor cursor = getCursorForSignedPreKey(account, signedPreKeyId);
|
||||||
if(cursor.getCount() != 0) {
|
if(cursor.getCount() != 0) {
|
||||||
cursor.moveToFirst();
|
cursor.moveToFirst();
|
||||||
try {
|
try {
|
||||||
record = new SignedPreKeyRecord(cursor.getString(cursor.getColumnIndex(AxolotlService.SQLiteAxolotlStore.KEY)).getBytes());
|
record = new SignedPreKeyRecord(Base64.decode(cursor.getString(cursor.getColumnIndex(AxolotlService.SQLiteAxolotlStore.KEY)),Base64.DEFAULT));
|
||||||
} catch (IOException e ) {
|
} catch (IOException e ) {
|
||||||
throw new AssertionError(e);
|
throw new AssertionError(e);
|
||||||
}
|
}
|
||||||
|
@ -711,7 +747,7 @@ public class DatabaseBackend extends SQLiteOpenHelper {
|
||||||
|
|
||||||
while(cursor.moveToNext()) {
|
while(cursor.moveToNext()) {
|
||||||
try {
|
try {
|
||||||
prekeys.add(new SignedPreKeyRecord(cursor.getString(cursor.getColumnIndex(AxolotlService.SQLiteAxolotlStore.KEY)).getBytes()));
|
prekeys.add(new SignedPreKeyRecord(Base64.decode(cursor.getString(cursor.getColumnIndex(AxolotlService.SQLiteAxolotlStore.KEY)), Base64.DEFAULT)));
|
||||||
} catch (IOException ignored) {
|
} catch (IOException ignored) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -729,7 +765,7 @@ public class DatabaseBackend extends SQLiteOpenHelper {
|
||||||
SQLiteDatabase db = this.getWritableDatabase();
|
SQLiteDatabase db = this.getWritableDatabase();
|
||||||
ContentValues values = new ContentValues();
|
ContentValues values = new ContentValues();
|
||||||
values.put(AxolotlService.SQLiteAxolotlStore.ID, record.getId());
|
values.put(AxolotlService.SQLiteAxolotlStore.ID, record.getId());
|
||||||
values.put(AxolotlService.SQLiteAxolotlStore.KEY, record.serialize());
|
values.put(AxolotlService.SQLiteAxolotlStore.KEY, Base64.encodeToString(record.serialize(),Base64.DEFAULT));
|
||||||
values.put(AxolotlService.SQLiteAxolotlStore.ACCOUNT, account.getUuid());
|
values.put(AxolotlService.SQLiteAxolotlStore.ACCOUNT, account.getUuid());
|
||||||
db.insert(AxolotlService.SQLiteAxolotlStore.SIGNED_PREKEY_TABLENAME, null, values);
|
db.insert(AxolotlService.SQLiteAxolotlStore.SIGNED_PREKEY_TABLENAME, null, values);
|
||||||
}
|
}
|
||||||
|
|
|
@ -52,6 +52,7 @@ import de.duenndns.ssl.MemorizingTrustManager;
|
||||||
import eu.siacs.conversations.Config;
|
import eu.siacs.conversations.Config;
|
||||||
import eu.siacs.conversations.R;
|
import eu.siacs.conversations.R;
|
||||||
import eu.siacs.conversations.crypto.PgpEngine;
|
import eu.siacs.conversations.crypto.PgpEngine;
|
||||||
|
import eu.siacs.conversations.crypto.axolotl.NoSessionsCreatedException;
|
||||||
import eu.siacs.conversations.entities.Account;
|
import eu.siacs.conversations.entities.Account;
|
||||||
import eu.siacs.conversations.entities.Blockable;
|
import eu.siacs.conversations.entities.Blockable;
|
||||||
import eu.siacs.conversations.entities.Bookmark;
|
import eu.siacs.conversations.entities.Bookmark;
|
||||||
|
@ -273,7 +274,11 @@ public class XmppConnectionService extends Service implements OnPhoneContactsLoa
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
syncDirtyContacts(account);
|
syncDirtyContacts(account);
|
||||||
scheduleWakeUpCall(Config.PING_MAX_INTERVAL,account.getUuid().hashCode());
|
account.getAxolotlService().publishOwnDeviceIdIfNeeded();
|
||||||
|
account.getAxolotlService().publishBundleIfNeeded();
|
||||||
|
account.getAxolotlService().publishPreKeysIfNeeded();
|
||||||
|
|
||||||
|
scheduleWakeUpCall(Config.PING_MAX_INTERVAL, account.getUuid().hashCode());
|
||||||
} else if (account.getStatus() == Account.State.OFFLINE) {
|
} else if (account.getStatus() == Account.State.OFFLINE) {
|
||||||
resetSendingToWaiting(account);
|
resetSendingToWaiting(account);
|
||||||
if (!account.isOptionSet(Account.OPTION_DISABLED)) {
|
if (!account.isOptionSet(Account.OPTION_DISABLED)) {
|
||||||
|
|
Loading…
Reference in a new issue