X-Git-Url: https://git.nmode.ca/signal-cli/blobdiff_plain/1b0df2c7e727a2a88d50799852b49508128822b8..e1b584ab84373455ccd95b0cc9224c926aef9343:/src/main/java/cli/Manager.java diff --git a/src/main/java/cli/Manager.java b/src/main/java/cli/Manager.java index 7fe551a4..49043832 100644 --- a/src/main/java/cli/Manager.java +++ b/src/main/java/cli/Manager.java @@ -1,16 +1,16 @@ /** * Copyright (C) 2015 AsamK - *

+ * * This program is free software: you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation, either version 3 of the License, or * (at your option) any later version. - *

+ * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. - *

+ * * You should have received a copy of the GNU General Public License * along with this program. If not, see . */ @@ -18,9 +18,9 @@ package cli; import org.apache.commons.io.IOUtils; import org.json.JSONObject; -import org.whispersystems.libaxolotl.IdentityKeyPair; -import org.whispersystems.libaxolotl.InvalidKeyException; -import org.whispersystems.libaxolotl.InvalidVersionException; +import org.whispersystems.libaxolotl.*; +import org.whispersystems.libaxolotl.ecc.Curve; +import org.whispersystems.libaxolotl.ecc.ECKeyPair; import org.whispersystems.libaxolotl.state.PreKeyRecord; import org.whispersystems.libaxolotl.state.SignedPreKeyRecord; import org.whispersystems.libaxolotl.util.KeyHelper; @@ -31,14 +31,18 @@ import org.whispersystems.textsecure.api.TextSecureMessagePipe; import org.whispersystems.textsecure.api.TextSecureMessageReceiver; import org.whispersystems.textsecure.api.TextSecureMessageSender; import org.whispersystems.textsecure.api.crypto.TextSecureCipher; +import org.whispersystems.textsecure.api.messages.TextSecureAttachmentPointer; import org.whispersystems.textsecure.api.messages.TextSecureContent; +import org.whispersystems.textsecure.api.messages.TextSecureDataMessage; import org.whispersystems.textsecure.api.messages.TextSecureEnvelope; import org.whispersystems.textsecure.api.push.TextSecureAddress; import org.whispersystems.textsecure.api.push.TrustStore; +import org.whispersystems.textsecure.api.push.exceptions.EncapsulatedExceptions; import org.whispersystems.textsecure.api.util.InvalidNumberException; import org.whispersystems.textsecure.api.util.PhoneNumberFormatter; import java.io.*; +import java.util.LinkedList; import java.util.List; import java.util.concurrent.TimeUnit; import java.util.concurrent.TimeoutException; @@ -48,10 +52,14 @@ public class Manager { private final static TrustStore TRUST_STORE = new WhisperTrustStore(); private final static String settingsPath = System.getProperty("user.home") + "/.config/textsecure"; + private final static String dataPath = settingsPath + "/data"; + private final static String attachmentsPath = settingsPath + "/attachments"; private String username; private String password; private String signalingKey; + private int preKeyIdOffset; + private int nextSignedPreKeyId; private boolean registered = false; @@ -62,10 +70,9 @@ public class Manager { this.username = username; } - private String getFileName() { - String path = settingsPath + "/data"; - new File(path).mkdirs(); - return path + "/" + username; + public String getFileName() { + new File(dataPath).mkdirs(); + return dataPath + "/" + username; } public boolean userExists() { @@ -87,6 +94,16 @@ public class Manager { if (in.has("signalingKey")) { signalingKey = in.getString("signalingKey"); } + if (in.has("preKeyIdOffset")) { + preKeyIdOffset = in.getInt("preKeyIdOffset"); + } else { + preKeyIdOffset = 0; + } + if (in.has("nextSignedPreKeyId")) { + nextSignedPreKeyId = in.getInt("nextSignedPreKeyId"); + } else { + nextSignedPreKeyId = 0; + } axolotlStore = new JsonAxolotlStore(in.getJSONObject("axolotlStore")); registered = in.getBoolean("registered"); accountManager = new TextSecureAccountManager(URL, TRUST_STORE, username, password); @@ -96,6 +113,8 @@ public class Manager { String out = new JSONObject().put("username", username) .put("password", password) .put("signalingKey", signalingKey) + .put("preKeyIdOffset", preKeyIdOffset) + .put("nextSignedPreKeyId", nextSignedPreKeyId) .put("axolotlStore", axolotlStore.getJson()) .put("registered", registered).toString(); try { @@ -133,6 +152,56 @@ public class Manager { registered = false; } + private static final int BATCH_SIZE = 100; + + private List generatePreKeys() { + List records = new LinkedList<>(); + + for (int i = 0; i < BATCH_SIZE; i++) { + int preKeyId = (preKeyIdOffset + i) % Medium.MAX_VALUE; + ECKeyPair keyPair = Curve.generateKeyPair(); + PreKeyRecord record = new PreKeyRecord(preKeyId, keyPair); + + axolotlStore.storePreKey(preKeyId, record); + records.add(record); + } + + preKeyIdOffset = (preKeyIdOffset + BATCH_SIZE + 1) % Medium.MAX_VALUE; + return records; + } + + private PreKeyRecord generateLastResortPreKey() { + if (axolotlStore.containsPreKey(Medium.MAX_VALUE)) { + try { + return axolotlStore.loadPreKey(Medium.MAX_VALUE); + } catch (InvalidKeyIdException e) { + axolotlStore.removePreKey(Medium.MAX_VALUE); + } + } + + ECKeyPair keyPair = Curve.generateKeyPair(); + PreKeyRecord record = new PreKeyRecord(Medium.MAX_VALUE, keyPair); + + axolotlStore.storePreKey(Medium.MAX_VALUE, record); + + return record; + } + + private SignedPreKeyRecord generateSignedPreKey(IdentityKeyPair identityKeyPair) { + try { + ECKeyPair keyPair = Curve.generateKeyPair(); + byte[] signature = Curve.calculateSignature(identityKeyPair.getPrivateKey(), keyPair.getPublicKey().serialize()); + SignedPreKeyRecord record = new SignedPreKeyRecord(nextSignedPreKeyId, System.currentTimeMillis(), keyPair, signature); + + axolotlStore.storeSignedPreKey(nextSignedPreKeyId, record); + nextSignedPreKeyId = (nextSignedPreKeyId + 1) % Medium.MAX_VALUE; + + return record; + } catch (InvalidKeyException e) { + throw new AssertionError(e); + } + } + public void verifyAccount(String verificationCode) throws IOException { verificationCode = verificationCode.replace("-", ""); signalingKey = Util.getSecret(52); @@ -141,31 +210,20 @@ public class Manager { //accountManager.setGcmId(Optional.of(GoogleCloudMessaging.getInstance(this).register(REGISTRATION_ID))); registered = true; - int start = 0; - List oneTimePreKeys = KeyHelper.generatePreKeys(start, 100); - for (int i = start; i < oneTimePreKeys.size(); i++) { - axolotlStore.storePreKey(i, oneTimePreKeys.get(i)); - } + List oneTimePreKeys = generatePreKeys(); - PreKeyRecord lastResortKey = KeyHelper.generateLastResortPreKey(); - axolotlStore.storePreKey(Medium.MAX_VALUE, lastResortKey); + PreKeyRecord lastResortKey = generateLastResortPreKey(); + + SignedPreKeyRecord signedPreKeyRecord = generateSignedPreKey(axolotlStore.getIdentityKeyPair()); - int signedPreKeyId = 0; - SignedPreKeyRecord signedPreKeyRecord; - try { - signedPreKeyRecord = KeyHelper.generateSignedPreKey(axolotlStore.getIdentityKeyPair(), signedPreKeyId); - axolotlStore.storeSignedPreKey(signedPreKeyId, signedPreKeyRecord); - } catch (InvalidKeyException e) { - // Should really not happen - System.out.println("invalid key"); - return; - } accountManager.setPreKeys(axolotlStore.getIdentityKeyPair().getPublicKey(), lastResortKey, signedPreKeyRecord, oneTimePreKeys); } - public TextSecureMessageSender getMessageSender() { - return new TextSecureMessageSender(URL, TRUST_STORE, username, password, + public void sendMessage(List recipients, TextSecureDataMessage message) + throws IOException, EncapsulatedExceptions { + TextSecureMessageSender messageSender = new TextSecureMessageSender(URL, TRUST_STORE, username, password, axolotlStore, Optional.absent()); + messageSender.sendMessage(recipients, message); } public TextSecureContent decryptMessage(TextSecureEnvelope envelope) { @@ -187,8 +245,8 @@ public class Manager { void handleMessage(TextSecureEnvelope envelope); } - public void receiveMessages(ReceiveMessageHandler handler) throws IOException { - TextSecureMessageReceiver messageReceiver = new TextSecureMessageReceiver(URL, TRUST_STORE, username, password, signalingKey); + public void receiveMessages(int timeoutSeconds, boolean returnOnTimeout, ReceiveMessageHandler handler) throws IOException { + final TextSecureMessageReceiver messageReceiver = new TextSecureMessageReceiver(URL, TRUST_STORE, username, password, signalingKey); TextSecureMessagePipe messagePipe = null; try { @@ -197,9 +255,11 @@ public class Manager { while (true) { TextSecureEnvelope envelope; try { - envelope = messagePipe.read(1, TimeUnit.MINUTES); + envelope = messagePipe.read(timeoutSeconds, TimeUnit.SECONDS); handler.handleMessage(envelope); } catch (TimeoutException e) { + if (returnOnTimeout) + return; } catch (InvalidVersionException e) { System.out.println("Ignoring error: " + e.getMessage()); } @@ -211,6 +271,35 @@ public class Manager { } } + public File retrieveAttachment(TextSecureAttachmentPointer pointer) throws IOException, InvalidMessageException { + final TextSecureMessageReceiver messageReceiver = new TextSecureMessageReceiver(URL, TRUST_STORE, username, password, signalingKey); + + File tmpFile = File.createTempFile("ts_attach_" + pointer.getId(), ".tmp"); + InputStream input = messageReceiver.retrieveAttachment(pointer, tmpFile); + + new File(attachmentsPath).mkdirs(); + File outputFile = new File(attachmentsPath + "/" + pointer.getId()); + OutputStream output = null; + try { + output = new FileOutputStream(outputFile); + byte[] buffer = new byte[4096]; + int read; + + while ((read = input.read(buffer)) != -1) { + output.write(buffer, 0, read); + } + } catch (FileNotFoundException e) { + e.printStackTrace(); + return null; + } finally { + if (output != null) { + output.close(); + } + tmpFile.delete(); + } + return outputFile; + } + public String canonicalizeNumber(String number) throws InvalidNumberException { String localNumber = username; return PhoneNumberFormatter.formatNumber(number, localNumber);