]> nmode's Git Repositories - signal-cli/blob - src/main/java/org/asamk/signal/storage/protocol/JsonIdentityKeyStore.java
7c069c8b821a6c5749f2aeb53f2c331e5ee0be9b
[signal-cli] / src / main / java / org / asamk / signal / storage / protocol / JsonIdentityKeyStore.java
1 package org.asamk.signal.storage.protocol;
2
3 import com.fasterxml.jackson.core.JsonGenerator;
4 import com.fasterxml.jackson.core.JsonParser;
5 import com.fasterxml.jackson.core.JsonProcessingException;
6 import com.fasterxml.jackson.databind.*;
7 import org.asamk.signal.TrustLevel;
8 import org.whispersystems.libsignal.IdentityKey;
9 import org.whispersystems.libsignal.IdentityKeyPair;
10 import org.whispersystems.libsignal.InvalidKeyException;
11 import org.whispersystems.libsignal.SignalProtocolAddress;
12 import org.whispersystems.libsignal.state.IdentityKeyStore;
13 import org.whispersystems.signalservice.internal.util.Base64;
14
15 import java.io.IOException;
16 import java.util.*;
17
18 public class JsonIdentityKeyStore implements IdentityKeyStore {
19
20 private final Map<String, List<Identity>> trustedKeys = new HashMap<>();
21
22 private final IdentityKeyPair identityKeyPair;
23 private final int localRegistrationId;
24
25
26 public JsonIdentityKeyStore(IdentityKeyPair identityKeyPair, int localRegistrationId) {
27 this.identityKeyPair = identityKeyPair;
28 this.localRegistrationId = localRegistrationId;
29 }
30
31 @Override
32 public IdentityKeyPair getIdentityKeyPair() {
33 return identityKeyPair;
34 }
35
36 @Override
37 public int getLocalRegistrationId() {
38 return localRegistrationId;
39 }
40
41 @Override
42 public boolean saveIdentity(SignalProtocolAddress address, IdentityKey identityKey) {
43 return saveIdentity(address.getName(), identityKey, TrustLevel.TRUSTED_UNVERIFIED, null);
44 }
45
46 /**
47 * Adds or updates the given identityKey for the user name and sets the trustLevel and added timestamp.
48 *
49 * @param name User name, i.e. phone number
50 * @param identityKey The user's public key
51 * @param trustLevel
52 * @param added Added timestamp, if null and the key is newly added, the current time is used.
53 */
54 public boolean saveIdentity(String name, IdentityKey identityKey, TrustLevel trustLevel, Date added) {
55 List<Identity> identities = trustedKeys.get(name);
56 if (identities == null) {
57 identities = new ArrayList<>();
58 trustedKeys.put(name, identities);
59 } else {
60 for (Identity id : identities) {
61 if (!id.identityKey.equals(identityKey))
62 continue;
63
64 if (id.trustLevel.compareTo(trustLevel) < 0) {
65 id.trustLevel = trustLevel;
66 }
67 if (added != null) {
68 id.added = added;
69 }
70 return true;
71 }
72 }
73 identities.add(new Identity(identityKey, trustLevel, added != null ? added : new Date()));
74 return false;
75 }
76
77 @Override
78 public boolean isTrustedIdentity(SignalProtocolAddress address, IdentityKey identityKey, Direction direction) {
79 // TODO implement possibility for different handling of incoming/outgoing trust decisions
80 List<Identity> identities = trustedKeys.get(address.getName());
81 if (identities == null) {
82 // Trust on first use
83 return true;
84 }
85
86 for (Identity id : identities) {
87 if (id.identityKey.equals(identityKey)) {
88 return id.isTrusted();
89 }
90 }
91
92 return false;
93 }
94
95 public Map<String, List<Identity>> getIdentities() {
96 // TODO deep copy
97 return trustedKeys;
98 }
99
100 public List<Identity> getIdentities(String name) {
101 // TODO deep copy
102 return trustedKeys.get(name);
103 }
104
105 public static class JsonIdentityKeyStoreDeserializer extends JsonDeserializer<JsonIdentityKeyStore> {
106
107 @Override
108 public JsonIdentityKeyStore deserialize(JsonParser jsonParser, DeserializationContext deserializationContext) throws IOException, JsonProcessingException {
109 JsonNode node = jsonParser.getCodec().readTree(jsonParser);
110
111 try {
112 int localRegistrationId = node.get("registrationId").asInt();
113 IdentityKeyPair identityKeyPair = new IdentityKeyPair(Base64.decode(node.get("identityKey").asText()));
114
115
116 JsonIdentityKeyStore keyStore = new JsonIdentityKeyStore(identityKeyPair, localRegistrationId);
117
118 JsonNode trustedKeysNode = node.get("trustedKeys");
119 if (trustedKeysNode.isArray()) {
120 for (JsonNode trustedKey : trustedKeysNode) {
121 String trustedKeyName = trustedKey.get("name").asText();
122 try {
123 IdentityKey id = new IdentityKey(Base64.decode(trustedKey.get("identityKey").asText()), 0);
124 TrustLevel trustLevel = trustedKey.has("trustLevel") ? TrustLevel.fromInt(trustedKey.get("trustLevel").asInt()) : TrustLevel.TRUSTED_UNVERIFIED;
125 Date added = trustedKey.has("addedTimestamp") ? new Date(trustedKey.get("addedTimestamp").asLong()) : new Date();
126 keyStore.saveIdentity(trustedKeyName, id, trustLevel, added);
127 } catch (InvalidKeyException | IOException e) {
128 System.out.println(String.format("Error while decoding key for: %s", trustedKeyName));
129 }
130 }
131 }
132
133 return keyStore;
134 } catch (InvalidKeyException e) {
135 throw new IOException(e);
136 }
137 }
138 }
139
140 public static class JsonIdentityKeyStoreSerializer extends JsonSerializer<JsonIdentityKeyStore> {
141
142 @Override
143 public void serialize(JsonIdentityKeyStore jsonIdentityKeyStore, JsonGenerator json, SerializerProvider serializerProvider) throws IOException, JsonProcessingException {
144 json.writeStartObject();
145 json.writeNumberField("registrationId", jsonIdentityKeyStore.getLocalRegistrationId());
146 json.writeStringField("identityKey", Base64.encodeBytes(jsonIdentityKeyStore.getIdentityKeyPair().serialize()));
147 json.writeArrayFieldStart("trustedKeys");
148 for (Map.Entry<String, List<Identity>> trustedKey : jsonIdentityKeyStore.trustedKeys.entrySet()) {
149 for (Identity id : trustedKey.getValue()) {
150 json.writeStartObject();
151 json.writeStringField("name", trustedKey.getKey());
152 json.writeStringField("identityKey", Base64.encodeBytes(id.identityKey.serialize()));
153 json.writeNumberField("trustLevel", id.trustLevel.ordinal());
154 json.writeNumberField("addedTimestamp", id.added.getTime());
155 json.writeEndObject();
156 }
157 }
158 json.writeEndArray();
159 json.writeEndObject();
160 }
161 }
162
163 public class Identity {
164 IdentityKey identityKey;
165 TrustLevel trustLevel;
166 Date added;
167
168 public Identity(IdentityKey identityKey, TrustLevel trustLevel) {
169 this.identityKey = identityKey;
170 this.trustLevel = trustLevel;
171 this.added = new Date();
172 }
173
174 public Identity(IdentityKey identityKey, TrustLevel trustLevel, Date added) {
175 this.identityKey = identityKey;
176 this.trustLevel = trustLevel;
177 this.added = added;
178 }
179
180 public boolean isTrusted() {
181 return trustLevel == TrustLevel.TRUSTED_UNVERIFIED ||
182 trustLevel == TrustLevel.TRUSTED_VERIFIED;
183 }
184
185 public IdentityKey getIdentityKey() {
186 return this.identityKey;
187 }
188
189 public TrustLevel getTrustLevel() {
190 return this.trustLevel;
191 }
192
193 public Date getDateAdded() {
194 return this.added;
195 }
196
197 public byte[] getFingerprint() {
198 return identityKey.getPublicKey().serialize();
199 }
200 }
201 }