diff --git a/briar-android/res/values/strings.xml b/briar-android/res/values/strings.xml index 5881c29be047db3d0d2085ac01b2ab7d62306ab9..550e381e74593eb97a2e02aa84abebbf5c52da62 100644 --- a/briar-android/res/values/strings.xml +++ b/briar-android/res/values/strings.xml @@ -13,7 +13,7 @@ <string name="contact_connected">Connected</string> <string name="format_contact_last_connected">Last connected <br /> %1$s</string> <string name="add_contact_title">Add a Contact</string> - <string name="same_network">Briar can add contacts via Wi-Fi or Bluetooth. To use Wi-Fi you must both be connected to the same network.</string> + <string name="choose_identity">Choose an identity to use with this contact:</string> <string name="wifi_not_available">Wi-Fi is not available on this device</string> <string name="wifi_disabled">Wi-Fi is OFF</string> <string name="wifi_disconnected">Wi-Fi is DISCONNECTED</string> diff --git a/briar-android/src/net/sf/briar/android/contact/ContactListActivity.java b/briar-android/src/net/sf/briar/android/contact/ContactListActivity.java index 5b01e6bb4fa69ae8ede754686b2d10c8d4ec82b7..784233dd36caddea9c42dbf94ff8159d9cd161e8 100644 --- a/briar-android/src/net/sf/briar/android/contact/ContactListActivity.java +++ b/briar-android/src/net/sf/briar/android/contact/ContactListActivity.java @@ -19,8 +19,8 @@ import net.sf.briar.android.widgets.CommonLayoutParams; import net.sf.briar.android.widgets.HorizontalBorder; import net.sf.briar.api.Contact; import net.sf.briar.api.ContactId; +import net.sf.briar.api.android.DatabaseUiExecutor; import net.sf.briar.api.db.DatabaseComponent; -import net.sf.briar.api.db.DatabaseExecutor; import net.sf.briar.api.db.DbException; import net.sf.briar.api.db.event.ContactAddedEvent; import net.sf.briar.api.db.event.ContactRemovedEvent; @@ -52,7 +52,7 @@ implements OnClickListener, DatabaseListener, ConnectionListener { // Fields that are accessed from DB threads must be volatile @Inject private volatile DatabaseComponent db; - @Inject @DatabaseExecutor private volatile Executor dbExecutor; + @Inject @DatabaseUiExecutor private volatile Executor dbUiExecutor; @Override public void onCreate(Bundle state) { @@ -87,36 +87,6 @@ implements OnClickListener, DatabaseListener, ConnectionListener { // Bind to the service so we can wait for the DB to be opened bindService(new Intent(BriarService.class.getName()), serviceConnection, 0); - - // Add some fake contacts to the database in a background thread - insertFakeContacts(); - } - - // FIXME: Remove this - private void insertFakeContacts() { - dbExecutor.execute(new Runnable() { - public void run() { - try { - // Wait for the service to be bound and started - serviceConnection.waitForStartup(); - // If there are no contacts in the DB, create some fake ones - Collection<Contact> contacts = db.getContacts(); - if(contacts.isEmpty()) { - if(LOG.isLoggable(INFO)) - LOG.info("Inserting fake contacts"); - db.addContact("Alice"); - db.addContact("Bob"); - } - } catch(DbException e) { - if(LOG.isLoggable(WARNING)) - LOG.log(WARNING, e.toString(), e); - } catch(InterruptedException e) { - if(LOG.isLoggable(INFO)) - LOG.info("Interrupted while waiting for service"); - Thread.currentThread().interrupt(); - } - } - }); } @Override @@ -126,7 +96,7 @@ implements OnClickListener, DatabaseListener, ConnectionListener { } private void loadContacts() { - dbExecutor.execute(new Runnable() { + dbUiExecutor.execute(new Runnable() { public void run() { try { // Wait for the service to be bound and started diff --git a/briar-android/src/net/sf/briar/android/contact/ContactListItem.java b/briar-android/src/net/sf/briar/android/contact/ContactListItem.java index 0b030f2f96a4dad832dc1de2b73ea2e6649fba3f..de867e7dcac0c21154225f4b6419a67ad2b98da1 100644 --- a/briar-android/src/net/sf/briar/android/contact/ContactListItem.java +++ b/briar-android/src/net/sf/briar/android/contact/ContactListItem.java @@ -19,7 +19,7 @@ class ContactListItem { } String getContactName() { - return contact.getName(); + return contact.getAuthor().getName(); } long getLastConnected() { diff --git a/briar-android/src/net/sf/briar/android/groups/GroupActivity.java b/briar-android/src/net/sf/briar/android/groups/GroupActivity.java index 43af87cf9d2afbf06942ff05c3f4b6cc4eb8a839..294f18da96e86ff7a9f136a7b87e5e5afb3b1a84 100644 --- a/briar-android/src/net/sf/briar/android/groups/GroupActivity.java +++ b/briar-android/src/net/sf/briar/android/groups/GroupActivity.java @@ -17,6 +17,7 @@ import net.sf.briar.android.BriarService; import net.sf.briar.android.BriarService.BriarServiceConnection; import net.sf.briar.android.widgets.CommonLayoutParams; import net.sf.briar.android.widgets.HorizontalBorder; +import net.sf.briar.api.Author; import net.sf.briar.api.android.DatabaseUiExecutor; import net.sf.briar.api.db.DatabaseComponent; import net.sf.briar.api.db.DbException; @@ -28,7 +29,6 @@ import net.sf.briar.api.db.event.GroupMessageAddedEvent; import net.sf.briar.api.db.event.MessageExpiredEvent; import net.sf.briar.api.db.event.RatingChangedEvent; import net.sf.briar.api.db.event.SubscriptionRemovedEvent; -import net.sf.briar.api.messaging.Author; import net.sf.briar.api.messaging.GroupId; import android.content.Intent; import android.os.Bundle; diff --git a/briar-android/src/net/sf/briar/android/groups/GroupAdapter.java b/briar-android/src/net/sf/briar/android/groups/GroupAdapter.java index d214f47bb45ff9548d002c9e6d6050e20ffbe688..87930d39d34399a01e66f3f1311df14e86bdb629 100644 --- a/briar-android/src/net/sf/briar/android/groups/GroupAdapter.java +++ b/briar-android/src/net/sf/briar/android/groups/GroupAdapter.java @@ -6,17 +6,17 @@ import static android.view.View.INVISIBLE; import static android.widget.LinearLayout.HORIZONTAL; import static android.widget.LinearLayout.VERTICAL; import static java.text.DateFormat.SHORT; -import static net.sf.briar.api.Rating.GOOD; -import static net.sf.briar.api.Rating.UNRATED; +import static net.sf.briar.api.messaging.Rating.GOOD; +import static net.sf.briar.api.messaging.Rating.UNRATED; import java.util.ArrayList; import net.sf.briar.R; import net.sf.briar.android.widgets.CommonLayoutParams; import net.sf.briar.android.widgets.HorizontalSpace; -import net.sf.briar.api.Rating; +import net.sf.briar.api.Author; import net.sf.briar.api.db.GroupMessageHeader; -import net.sf.briar.api.messaging.Author; +import net.sf.briar.api.messaging.Rating; import net.sf.briar.util.StringUtils; import android.content.Context; import android.content.res.Resources; diff --git a/briar-android/src/net/sf/briar/android/groups/GroupListActivity.java b/briar-android/src/net/sf/briar/android/groups/GroupListActivity.java index 70d797bb358e958e1854c008ee910c37413f2b47..f173274fa882f27e3e2296acc42cbcfe97f6420d 100644 --- a/briar-android/src/net/sf/briar/android/groups/GroupListActivity.java +++ b/briar-android/src/net/sf/briar/android/groups/GroupListActivity.java @@ -6,15 +6,8 @@ import static android.widget.LinearLayout.HORIZONTAL; import static android.widget.LinearLayout.VERTICAL; import static java.util.logging.Level.INFO; import static java.util.logging.Level.WARNING; -import static net.sf.briar.api.Rating.BAD; -import static net.sf.briar.api.Rating.GOOD; -import java.io.IOException; -import java.security.GeneralSecurityException; -import java.security.KeyPair; -import java.security.PrivateKey; import java.util.ArrayList; -import java.util.Arrays; import java.util.Collection; import java.util.Comparator; import java.util.List; @@ -29,11 +22,8 @@ import net.sf.briar.android.BriarService.BriarServiceConnection; import net.sf.briar.android.widgets.CommonLayoutParams; import net.sf.briar.android.widgets.HorizontalBorder; import net.sf.briar.android.widgets.HorizontalSpace; -import net.sf.briar.api.ContactId; import net.sf.briar.api.android.DatabaseUiExecutor; -import net.sf.briar.api.crypto.CryptoComponent; import net.sf.briar.api.db.DatabaseComponent; -import net.sf.briar.api.db.DatabaseExecutor; import net.sf.briar.api.db.DbException; import net.sf.briar.api.db.GroupMessageHeader; import net.sf.briar.api.db.NoSuchSubscriptionException; @@ -42,13 +32,8 @@ import net.sf.briar.api.db.event.DatabaseListener; import net.sf.briar.api.db.event.GroupMessageAddedEvent; import net.sf.briar.api.db.event.MessageExpiredEvent; import net.sf.briar.api.db.event.SubscriptionRemovedEvent; -import net.sf.briar.api.messaging.Author; -import net.sf.briar.api.messaging.AuthorFactory; import net.sf.briar.api.messaging.Group; -import net.sf.briar.api.messaging.GroupFactory; import net.sf.briar.api.messaging.GroupId; -import net.sf.briar.api.messaging.Message; -import net.sf.briar.api.messaging.MessageFactory; import android.content.Intent; import android.os.Bundle; import android.view.View; @@ -73,13 +58,8 @@ implements OnClickListener, DatabaseListener { private ImageButton newGroupButton = null, composeButton = null; // Fields that are accessed from DB threads must be volatile - @Inject private volatile CryptoComponent crypto; @Inject private volatile DatabaseComponent db; - @Inject @DatabaseExecutor private volatile Executor dbExecutor; @Inject @DatabaseUiExecutor private volatile Executor dbUiExecutor; - @Inject private volatile AuthorFactory authorFactory; - @Inject private volatile GroupFactory groupFactory; - @Inject private volatile MessageFactory messageFactory; private volatile boolean restricted = false; @Override @@ -134,154 +114,6 @@ implements OnClickListener, DatabaseListener { // Bind to the service so we can wait for the DB to be opened bindService(new Intent(BriarService.class.getName()), serviceConnection, 0); - - // Add some fake messages to the database in a background thread - insertFakeMessages(); - } - - // FIXME: Remove this - private void insertFakeMessages() { - dbExecutor.execute(new Runnable() { - public void run() { - try { - // Wait for the service to be bound and started - serviceConnection.waitForStartup(); - // If there are no groups in the DB, create some fake ones - Collection<Group> groups = db.getSubscriptions(); - if(!groups.isEmpty()) return; - if(LOG.isLoggable(INFO)) - LOG.info("Inserting fake groups and messages"); - // We'll also need a contact to receive messages from - ContactId contactId = db.addContact("Dave"); - // Finally, we'll need some authors for the messages - long now = System.currentTimeMillis(); - KeyPair keyPair = crypto.generateSignatureKeyPair(); - long duration = System.currentTimeMillis() - now; - if(LOG.isLoggable(INFO)) - LOG.info("Key generation took " + duration + " ms"); - byte[] publicKey = keyPair.getPublic().getEncoded(); - PrivateKey privateKey = keyPair.getPrivate(); - Author author = authorFactory.createAuthor("Batman", - publicKey); - db.setRating(author.getId(), BAD); - Author author1 = authorFactory.createAuthor("Duckman", - publicKey); - db.setRating(author1.getId(), GOOD); - // Insert some fake groups and make them visible - Group group = groupFactory.createGroup("DisneyLeaks"); - db.subscribe(group); - db.setVisibility(group.getId(), Arrays.asList(contactId)); - Group group1 = groupFactory.createGroup("Godwin's Lore"); - db.subscribe(group1); - db.setVisibility(group1.getId(), Arrays.asList(contactId)); - Group group2 = groupFactory.createGroup( - "All Kids Love Blog", publicKey); - db.subscribe(group2); - db.setVisibility(group2.getId(), Arrays.asList(contactId)); - // Insert some text messages to the unrestricted groups - for(int i = 0; i < 20; i++) { - String body; - if(i % 3 == 0) { - body = "Message " + i + " is short."; - } else { - body = "Message " + i + " is long enough to wrap" - + " onto a second line on some screens."; - } - Group g = i % 2 == 0 ? group : group1; - Message m; - now = System.currentTimeMillis(); - if(i % 5 == 0) { - m = messageFactory.createAnonymousMessage(null, g, - "text/plain", body.getBytes("UTF-8")); - } else if(i % 5 == 2) { - m = messageFactory.createPseudonymousMessage(null, - g, author, privateKey, "text/plain", - body.getBytes("UTF-8")); - } else { - m = messageFactory.createPseudonymousMessage(null, - g, author1, privateKey, "text/plain", - body.getBytes("UTF-8")); - } - duration = System.currentTimeMillis() - now; - if(LOG.isLoggable(INFO)) { - LOG.info("Message creation took " + - duration + " ms"); - } - now = System.currentTimeMillis(); - if(Math.random() < 0.5) db.addLocalGroupMessage(m); - else db.receiveMessage(contactId, m); - db.setReadFlag(m.getId(), i % 4 == 0); - duration = System.currentTimeMillis() - now; - if(LOG.isLoggable(INFO)) { - LOG.info("Message storage took " + - duration + " ms"); - } - } - // Insert a non-text message - Message m = messageFactory.createAnonymousMessage(null, - group, "image/jpeg", new byte[1000]); - db.receiveMessage(contactId, m); - // Insert a long text message - StringBuilder s = new StringBuilder(); - for(int i = 0; i < 100; i++) - s.append("This is a very tedious message. "); - String body = s.toString(); - m = messageFactory.createAnonymousMessage(m.getId(), - group1, "text/plain", body.getBytes("UTF-8")); - db.addLocalGroupMessage(m); - // Insert some text messages to the restricted group - for(int i = 0; i < 20; i++) { - if(i % 3 == 0) { - body = "Message " + i + " is short."; - } else { - body = "Message " + i + " is long enough to wrap" - + " onto a second line on some screens."; - } - now = System.currentTimeMillis(); - if(i % 5 == 0) { - m = messageFactory.createAnonymousMessage(null, - group2, privateKey, "text/plain", - body.getBytes("UTF-8")); - } else if(i % 5 == 2) { - m = messageFactory.createPseudonymousMessage(null, - group2, privateKey, author, privateKey, - "text/plain", body.getBytes("UTF-8")); - } else { - m = messageFactory.createPseudonymousMessage(null, - group2, privateKey, author1, privateKey, - "text/plain", body.getBytes("UTF-8")); - } - duration = System.currentTimeMillis() - now; - if(LOG.isLoggable(INFO)) { - LOG.info("Message creation took " + - duration + " ms"); - } - now = System.currentTimeMillis(); - if(Math.random() < 0.5) db.addLocalGroupMessage(m); - else db.receiveMessage(contactId, m); - db.setReadFlag(m.getId(), i % 4 == 0); - duration = System.currentTimeMillis() - now; - if(LOG.isLoggable(INFO)) { - LOG.info("Message storage took " + - duration + " ms"); - } - } - } catch(DbException e) { - if(LOG.isLoggable(WARNING)) - LOG.log(WARNING, e.toString(), e); - } catch(GeneralSecurityException e) { - if(LOG.isLoggable(WARNING)) - LOG.log(WARNING, e.toString(), e); - } catch(InterruptedException e) { - if(LOG.isLoggable(INFO)) - LOG.info("Interrupted while waiting for service"); - Thread.currentThread().interrupt(); - } catch(IOException e) { - if(LOG.isLoggable(WARNING)) - LOG.log(WARNING, e.toString(), e); - } - } - }); } @Override diff --git a/briar-android/src/net/sf/briar/android/groups/GroupListItem.java b/briar-android/src/net/sf/briar/android/groups/GroupListItem.java index 36df21ec51cd64f93467e5b1c5dc294d6edfe80a..6302b51530049829ae34eca3d3576c6fdc2d91ab 100644 --- a/briar-android/src/net/sf/briar/android/groups/GroupListItem.java +++ b/briar-android/src/net/sf/briar/android/groups/GroupListItem.java @@ -4,8 +4,8 @@ import java.util.Collections; import java.util.List; import net.sf.briar.android.DescendingHeaderComparator; +import net.sf.briar.api.Author; import net.sf.briar.api.db.GroupMessageHeader; -import net.sf.briar.api.messaging.Author; import net.sf.briar.api.messaging.Group; import net.sf.briar.api.messaging.GroupId; diff --git a/briar-android/src/net/sf/briar/android/groups/ReadGroupMessageActivity.java b/briar-android/src/net/sf/briar/android/groups/ReadGroupMessageActivity.java index 4c03773933a5ef9ab8cf5aed775f98d53990b0b9..b8b33637ff9f4768df2bff11c97782d4f7bd56f8 100644 --- a/briar-android/src/net/sf/briar/android/groups/ReadGroupMessageActivity.java +++ b/briar-android/src/net/sf/briar/android/groups/ReadGroupMessageActivity.java @@ -9,9 +9,9 @@ import static android.widget.LinearLayout.VERTICAL; import static java.text.DateFormat.SHORT; import static java.util.logging.Level.INFO; import static java.util.logging.Level.WARNING; -import static net.sf.briar.api.Rating.BAD; -import static net.sf.briar.api.Rating.GOOD; -import static net.sf.briar.api.Rating.UNRATED; +import static net.sf.briar.api.messaging.Rating.BAD; +import static net.sf.briar.api.messaging.Rating.GOOD; +import static net.sf.briar.api.messaging.Rating.UNRATED; import java.io.UnsupportedEncodingException; import java.util.concurrent.Executor; @@ -24,15 +24,15 @@ import net.sf.briar.android.BriarService.BriarServiceConnection; import net.sf.briar.android.widgets.CommonLayoutParams; import net.sf.briar.android.widgets.HorizontalBorder; import net.sf.briar.android.widgets.HorizontalSpace; -import net.sf.briar.api.Rating; +import net.sf.briar.api.AuthorId; import net.sf.briar.api.android.BundleEncrypter; import net.sf.briar.api.db.DatabaseComponent; import net.sf.briar.api.db.DatabaseExecutor; import net.sf.briar.api.db.DbException; import net.sf.briar.api.db.NoSuchMessageException; -import net.sf.briar.api.messaging.AuthorId; import net.sf.briar.api.messaging.GroupId; import net.sf.briar.api.messaging.MessageId; +import net.sf.briar.api.messaging.Rating; import android.content.Intent; import android.content.res.Resources; import android.os.Bundle; diff --git a/briar-android/src/net/sf/briar/android/helloworld/HelloWorldModule.java b/briar-android/src/net/sf/briar/android/helloworld/HelloWorldModule.java index c96fec94f1f49e7e8eae76670feb7ab475c55774..74234a1a74d4577a7233c6bf08df3bb4349b5765 100644 --- a/briar-android/src/net/sf/briar/android/helloworld/HelloWorldModule.java +++ b/briar-android/src/net/sf/briar/android/helloworld/HelloWorldModule.java @@ -4,7 +4,6 @@ import static android.content.Context.MODE_PRIVATE; import java.io.File; -import net.sf.briar.api.crypto.Password; import net.sf.briar.api.db.DatabaseConfig; import net.sf.briar.api.ui.UiCallback; import android.app.Application; @@ -39,13 +38,8 @@ public class HelloWorldModule extends AbstractModule { return app.getApplicationContext().getDir("db", MODE_PRIVATE); } - public Password getPassword() { - return new Password() { - - public char[] getPassword() { - return "foo bar".toCharArray(); - } - }; + public char[] getPassword() { + return "foo bar".toCharArray(); } public long getMaxSize() { diff --git a/briar-android/src/net/sf/briar/android/invitation/AddContactActivity.java b/briar-android/src/net/sf/briar/android/invitation/AddContactActivity.java index 6bc03686f8711cc1432e094ac1da96c21c87a8dd..5d2fb02ad9401fc633984fb3816931fd84218386 100644 --- a/briar-android/src/net/sf/briar/android/invitation/AddContactActivity.java +++ b/briar-android/src/net/sf/briar/android/invitation/AddContactActivity.java @@ -1,25 +1,14 @@ package net.sf.briar.android.invitation; -import static java.util.logging.Level.INFO; -import static java.util.logging.Level.WARNING; - -import java.util.concurrent.Executor; -import java.util.logging.Logger; - import net.sf.briar.android.BriarActivity; -import net.sf.briar.android.BriarService; -import net.sf.briar.android.BriarService.BriarServiceConnection; +import net.sf.briar.api.AuthorId; import net.sf.briar.api.android.BundleEncrypter; import net.sf.briar.api.android.ReferenceManager; import net.sf.briar.api.crypto.CryptoComponent; -import net.sf.briar.api.db.DatabaseComponent; -import net.sf.briar.api.db.DatabaseExecutor; -import net.sf.briar.api.db.DbException; import net.sf.briar.api.invitation.InvitationListener; import net.sf.briar.api.invitation.InvitationState; import net.sf.briar.api.invitation.InvitationTask; import net.sf.briar.api.invitation.InvitationTaskFactory; -import android.content.Intent; import android.os.Bundle; import com.google.inject.Inject; @@ -27,12 +16,6 @@ import com.google.inject.Inject; public class AddContactActivity extends BriarActivity implements InvitationListener { - private static final Logger LOG = - Logger.getLogger(AddContactActivity.class.getName()); - - private final BriarServiceConnection serviceConnection = - new BriarServiceConnection(); - @Inject private BundleEncrypter bundleEncrypter; @Inject private CryptoComponent crypto; @Inject private InvitationTaskFactory invitationTaskFactory; @@ -40,6 +23,7 @@ implements InvitationListener { private AddContactView view = null; private InvitationTask task = null; private long taskHandle = -1; + private AuthorId localAuthorId = null; private String networkName = null; private boolean useBluetooth = false; private int localInvitationCode = -1, remoteInvitationCode = -1; @@ -47,10 +31,7 @@ implements InvitationListener { private boolean connectionFailed = false; private boolean localCompared = false, remoteCompared = false; private boolean localMatched = false, remoteMatched = false; - - // Fields that are accessed from DB threads must be volatile - @Inject private volatile DatabaseComponent db; - @Inject @DatabaseExecutor private volatile Executor dbExecutor; + private String contactName = null; @Override public void onCreate(Bundle state) { @@ -60,6 +41,8 @@ implements InvitationListener { setView(new NetworkSetupView(this)); } else { // Restore the activity's state + byte[] id = state.getByteArray("net.sf.briar.LOCAL_AUTHOR_ID"); + if(id != null) localAuthorId = new AuthorId(id); networkName = state.getString("net.sf.briar.NETWORK_NAME"); useBluetooth = state.getBoolean("net.sf.briar.USE_BLUETOOTH"); taskHandle = state.getLong("net.sf.briar.TASK_HANDLE", -1); @@ -70,7 +53,8 @@ implements InvitationListener { localInvitationCode = state.getInt("net.sf.briar.LOCAL_CODE"); remoteInvitationCode = state.getInt("net.sf.briar.REMOTE_CODE"); connectionFailed = state.getBoolean("net.sf.briar.FAILED"); - if(state.getBoolean("net.sf.briar.MATCHED")) { + contactName = state.getString("net.sf.briar.CONTACT_NAME"); + if(contactName != null) { localCompared = remoteCompared = true; localMatched = remoteMatched = true; } @@ -81,10 +65,10 @@ implements InvitationListener { setView(new InvitationCodeView(this)); } else if(connectionFailed) { setView(new ConnectionFailedView(this)); - } else if(localMatched && remoteMatched) { - setView(new ContactAddedView(this)); - } else { + } else if(contactName == null) { setView(new CodesDoNotMatchView(this)); + } else { + setView(new ContactAddedView(this)); } } else { // A background task exists - listen to it and get its state @@ -98,6 +82,7 @@ implements InvitationListener { remoteCompared = s.getRemoteCompared(); localMatched = s.getLocalMatched(); remoteMatched = s.getRemoteMatched(); + contactName = s.getContactName(); // Set the appropriate view for the state if(localInvitationCode == -1) { setView(new NetworkSetupView(this)); @@ -112,15 +97,14 @@ implements InvitationListener { } else if(!remoteCompared) { setView(new WaitForContactView(this)); } else if(localMatched && remoteMatched) { - setView(new ContactAddedView(this)); + if(contactName == null) + setView(new WaitForContactView(this)); + else setView(new ContactAddedView(this)); } else { setView(new CodesDoNotMatchView(this)); } } } - // Bind to the service so we can wait for the DB to be opened - bindService(new Intent(BriarService.class.getName()), - serviceConnection, 0); } @Override @@ -131,12 +115,16 @@ implements InvitationListener { @Override public void onSaveInstanceState(Bundle state) { + if(localAuthorId != null) { + state.putByteArray("net.sf.briar.LOCAL_AUTHOR_ID", + localAuthorId.getBytes()); + } state.putString("net.sf.briar.NETWORK_NAME", networkName); state.putBoolean("net.sf.briar.USE_BLUETOOTH", useBluetooth); state.putInt("net.sf.briar.LOCAL_CODE", localInvitationCode); state.putInt("net.sf.briar.REMOTE_CODE", remoteInvitationCode); state.putBoolean("net.sf.briar.FAILED", connectionFailed); - state.putBoolean("net.sf.briar.MATCHED", localMatched && remoteMatched); + state.putString("net.sf.briar.CONTACT_NAME", contactName); if(task != null) state.putLong("net.sf.briar.TASK_HANDLE", taskHandle); bundleEncrypter.encrypt(state); } @@ -145,7 +133,6 @@ implements InvitationListener { public void onDestroy() { super.onDestroy(); if(task != null) task.removeListener(this); - unbindService(serviceConnection); } void setView(AddContactView view) { @@ -157,6 +144,7 @@ implements InvitationListener { void reset(AddContactView view) { task = null; taskHandle = -1; + localAuthorId = null; networkName = null; useBluetooth = false; localInvitationCode = -1; @@ -164,9 +152,14 @@ implements InvitationListener { connectionFailed = false; localCompared = remoteCompared = false; localMatched = remoteMatched = false; + contactName = null; setView(view); } + void setLocalAuthorId(AuthorId localAuthorId) { + this.localAuthorId = localAuthorId; + } + void setNetworkName(String networkName) { this.networkName = networkName; } @@ -191,8 +184,10 @@ implements InvitationListener { void remoteInvitationCodeEntered(int code) { setView(new ConnectionView(this)); - // FIXME: These calls are blocking the UI thread for too long - task = invitationTaskFactory.createTask(localInvitationCode, code); + if(localAuthorId == null) throw new IllegalStateException(); + if(localInvitationCode == -1) throw new IllegalStateException(); + task = invitationTaskFactory.createTask(localAuthorId, + localInvitationCode, code); taskHandle = referenceManager.putReference(task, InvitationTask.class); task.addListener(AddContactActivity.this); task.addListener(new ReferenceCleaner(referenceManager, taskHandle)); @@ -204,11 +199,10 @@ implements InvitationListener { } void remoteConfirmationCodeEntered(int code) { + localCompared = true; if(code == remoteConfirmationCode) { localMatched = true; - if(remoteMatched) setView(new ContactAddedView(this)); - else if(remoteCompared) setView(new CodesDoNotMatchView(this)); - else setView(new WaitForContactView(this)); + setView(new WaitForContactView(this)); task.localConfirmationSucceeded(); } else { setView(new CodesDoNotMatchView(this)); @@ -216,23 +210,8 @@ implements InvitationListener { } } - void addContactAndFinish(final String nickname) { - dbExecutor.execute(new Runnable() { - public void run() { - try { - serviceConnection.waitForStartup(); - db.addContact(nickname); - } catch(DbException e) { - if(LOG.isLoggable(WARNING)) - LOG.log(WARNING, e.toString(), e); - } catch(InterruptedException e) { - if(LOG.isLoggable(INFO)) - LOG.info("Interrupted while waiting for service"); - Thread.currentThread().interrupt(); - } - } - }); - finish(); + String getContactName() { + return contactName; } public void connectionSucceeded(final int localCode, final int remoteCode) { @@ -259,8 +238,6 @@ implements InvitationListener { public void run() { remoteCompared = true; remoteMatched = true; - if(localMatched) - setView(new ContactAddedView(AddContactActivity.this)); } }); } @@ -275,6 +252,23 @@ implements InvitationListener { }); } + public void pseudonymExchangeSucceeded(final String remoteName) { + runOnUiThread(new Runnable() { + public void run() { + contactName = remoteName; + setView(new ContactAddedView(AddContactActivity.this)); + } + }); + } + + public void pseudonymExchangeFailed() { + runOnUiThread(new Runnable() { + public void run() { + setView(new ConnectionFailedView(AddContactActivity.this)); + } + }); + } + /** * Cleans up the reference to the invitation task when the task completes. * This class is static to prevent memory leaks. @@ -299,11 +293,19 @@ implements InvitationListener { } public void remoteConfirmationSucceeded() { - referenceManager.removeReference(handle, InvitationTask.class); + // Wait for the pseudonym exchange to succeed or fail } public void remoteConfirmationFailed() { referenceManager.removeReference(handle, InvitationTask.class); } + + public void pseudonymExchangeSucceeded(String remoteName) { + referenceManager.removeReference(handle, InvitationTask.class); + } + + public void pseudonymExchangeFailed() { + referenceManager.removeReference(handle, InvitationTask.class); + } } } diff --git a/briar-android/src/net/sf/briar/android/invitation/ContactAddedView.java b/briar-android/src/net/sf/briar/android/invitation/ContactAddedView.java index 7de4ddc405eef0b20893572d484ad6b0880918cd..a2b297aa49b893fa653862a02aed1ea01cbebdf4 100644 --- a/briar-android/src/net/sf/briar/android/invitation/ContactAddedView.java +++ b/briar-android/src/net/sf/briar/android/invitation/ContactAddedView.java @@ -1,27 +1,18 @@ package net.sf.briar.android.invitation; -import static android.text.InputType.TYPE_CLASS_TEXT; -import static android.text.InputType.TYPE_TEXT_FLAG_CAP_WORDS; -import static android.text.InputType.TYPE_TEXT_VARIATION_PERSON_NAME; import static android.view.Gravity.CENTER; -import static android.view.Gravity.CENTER_HORIZONTAL; import net.sf.briar.R; import net.sf.briar.android.widgets.CommonLayoutParams; import android.content.Context; -import android.view.KeyEvent; import android.view.View; import android.view.View.OnClickListener; import android.widget.Button; -import android.widget.EditText; import android.widget.ImageView; import android.widget.LinearLayout; import android.widget.TextView; -import android.widget.TextView.OnEditorActionListener; -public class ContactAddedView extends AddContactView implements OnClickListener, -OnEditorActionListener { - - EditText nicknameEntry = null; +public class ContactAddedView extends AddContactView +implements OnClickListener { ContactAddedView(Context ctx) { super(ctx); @@ -46,50 +37,21 @@ OnEditorActionListener { innerLayout.addView(added); addView(innerLayout); - TextView enterNickname = new TextView(ctx); - enterNickname.setGravity(CENTER_HORIZONTAL); - enterNickname.setPadding(10, 0, 10, 10); - enterNickname.setText(R.string.enter_nickname); - addView(enterNickname); - - innerLayout = new LinearLayout(ctx); - innerLayout.setOrientation(HORIZONTAL); - innerLayout.setGravity(CENTER); + TextView contactName = new TextView(ctx); + contactName.setTextSize(22); + contactName.setPadding(10, 0, 10, 10); + contactName.setText(container.getContactName()); + addView(contactName); - final Button doneButton = new Button(ctx); + Button doneButton = new Button(ctx); doneButton.setLayoutParams(CommonLayoutParams.WRAP_WRAP); doneButton.setText(R.string.done_button); doneButton.setEnabled(false); doneButton.setOnClickListener(this); - - nicknameEntry = new EditText(ctx) { - @Override - protected void onTextChanged(CharSequence text, int start, - int lengthBefore, int lengthAfter) { - doneButton.setEnabled(text.length() > 0); - } - }; - nicknameEntry.setTextSize(26); - nicknameEntry.setPadding(10, 0, 10, 10); - nicknameEntry.setMinEms(5); - nicknameEntry.setMaxEms(20); - nicknameEntry.setMaxLines(1); - nicknameEntry.setInputType(TYPE_CLASS_TEXT | TYPE_TEXT_FLAG_CAP_WORDS | - TYPE_TEXT_VARIATION_PERSON_NAME); - nicknameEntry.setOnEditorActionListener(this); - innerLayout.addView(nicknameEntry); - innerLayout.addView(doneButton); - addView(innerLayout); - } - - public boolean onEditorAction(TextView textView, int actionId, KeyEvent e) { - String nickname = textView.getText().toString(); - if(nickname.length() > 0) container.addContactAndFinish(nickname); - return true; + addView(doneButton); } public void onClick(View view) { - String nickname = nicknameEntry.getText().toString(); - container.addContactAndFinish(nickname); + container.finish(); } } diff --git a/briar-android/src/net/sf/briar/android/invitation/NetworkSetupView.java b/briar-android/src/net/sf/briar/android/invitation/NetworkSetupView.java index 06d6915b0920286f2955f75640ba9927cf7dfa83..aa37cac92c17d77ac0b67a86477dc9f967ea823a 100644 --- a/briar-android/src/net/sf/briar/android/invitation/NetworkSetupView.java +++ b/briar-android/src/net/sf/briar/android/invitation/NetworkSetupView.java @@ -20,11 +20,13 @@ implements WifiStateListener, BluetoothStateListener, OnClickListener { void populate() { removeAllViews(); Context ctx = getContext(); - TextView sameNetwork = new TextView(ctx); - sameNetwork.setTextSize(14); - sameNetwork.setPadding(10, 10, 10, 10); - sameNetwork.setText(R.string.same_network); - addView(sameNetwork); + TextView chooseIdentity = new TextView(ctx); + chooseIdentity.setTextSize(14); + chooseIdentity.setPadding(10, 10, 10, 10); + chooseIdentity.setText(R.string.choose_identity); + addView(chooseIdentity); + + // FIXME: Add a spinner for choosing which identity to use WifiWidget wifi = new WifiWidget(ctx); wifi.init(this); diff --git a/briar-android/src/net/sf/briar/android/messages/ContactNameSpinnerAdapter.java b/briar-android/src/net/sf/briar/android/messages/ContactNameSpinnerAdapter.java index 18c4d00e7da665af939054442d5b261cd63906b7..2694f37a4a21458f4c8ea94a51c2a7f5be77416f 100644 --- a/briar-android/src/net/sf/briar/android/messages/ContactNameSpinnerAdapter.java +++ b/briar-android/src/net/sf/briar/android/messages/ContactNameSpinnerAdapter.java @@ -10,7 +10,7 @@ import android.widget.ArrayAdapter; import android.widget.SpinnerAdapter; import android.widget.TextView; -class ContactNameSpinnerAdapter extends ArrayAdapter<Contact> +public class ContactNameSpinnerAdapter extends ArrayAdapter<Contact> implements SpinnerAdapter { ContactNameSpinnerAdapter(Context context) { @@ -24,7 +24,7 @@ implements SpinnerAdapter { name.setTextSize(18); name.setMaxLines(1); name.setPadding(10, 10, 10, 10); - name.setText(getItem(position).getName()); + name.setText(getItem(position).getAuthor().getName()); return name; } diff --git a/briar-android/src/net/sf/briar/android/messages/ConversationListActivity.java b/briar-android/src/net/sf/briar/android/messages/ConversationListActivity.java index 2078a521c526909089af404195678a16ae79455c..3c2938da420510c94cf01914094fcddc4244df48 100644 --- a/briar-android/src/net/sf/briar/android/messages/ConversationListActivity.java +++ b/briar-android/src/net/sf/briar/android/messages/ConversationListActivity.java @@ -5,8 +5,6 @@ import static android.widget.LinearLayout.VERTICAL; import static java.util.logging.Level.INFO; import static java.util.logging.Level.WARNING; -import java.io.IOException; -import java.security.GeneralSecurityException; import java.util.ArrayList; import java.util.Collection; import java.util.Comparator; @@ -25,7 +23,6 @@ import net.sf.briar.api.Contact; import net.sf.briar.api.ContactId; import net.sf.briar.api.android.DatabaseUiExecutor; import net.sf.briar.api.db.DatabaseComponent; -import net.sf.briar.api.db.DatabaseExecutor; import net.sf.briar.api.db.DbException; import net.sf.briar.api.db.NoSuchContactException; import net.sf.briar.api.db.PrivateMessageHeader; @@ -34,8 +31,6 @@ import net.sf.briar.api.db.event.DatabaseEvent; import net.sf.briar.api.db.event.DatabaseListener; import net.sf.briar.api.db.event.MessageExpiredEvent; import net.sf.briar.api.db.event.PrivateMessageAddedEvent; -import net.sf.briar.api.messaging.Message; -import net.sf.briar.api.messaging.MessageFactory; import android.content.Intent; import android.os.Bundle; import android.view.View; @@ -60,9 +55,7 @@ implements OnClickListener, DatabaseListener { // Fields that are accessed from DB threads must be volatile @Inject private volatile DatabaseComponent db; - @Inject @DatabaseExecutor private volatile Executor dbExecutor; @Inject @DatabaseUiExecutor private volatile Executor dbUiExecutor; - @Inject private volatile MessageFactory messageFactory; @Override public void onCreate(Bundle state) { @@ -93,70 +86,6 @@ implements OnClickListener, DatabaseListener { // Bind to the service so we can wait for the DB to be opened bindService(new Intent(BriarService.class.getName()), serviceConnection, 0); - - // Add some fake messages to the database in a background thread - insertFakeMessages(); - } - - // FIXME: Remove this - private void insertFakeMessages() { - dbExecutor.execute(new Runnable() { - public void run() { - try { - // Wait for the service to be bound and started - serviceConnection.waitForStartup(); - // If there are no messages in the DB, create some fake ones - Collection<PrivateMessageHeader> headers = - db.getPrivateMessageHeaders(); - if(!headers.isEmpty()) return; - if(LOG.isLoggable(INFO)) - LOG.info("Inserting fake private messages"); - // We'll also need a contact to exchange messages with - ContactId contactId = db.addContact("Carol"); - // Insert some text messages to and from the contact - for(int i = 0; i < 20; i++) { - String body; - if(i % 3 == 0) { - body = "Message " + i + " is short."; - } else { - body = "Message " + i + " is long enough to" - + " wrap onto a second line on some" - + " screens."; - } - Message m = messageFactory.createPrivateMessage(null, - "text/plain", body.getBytes("UTF-8")); - if(Math.random() < 0.5) - db.addLocalPrivateMessage(m, contactId); - else db.receiveMessage(contactId, m); - db.setReadFlag(m.getId(), i % 4 == 0); - } - // Insert a non-text message - Message m = messageFactory.createPrivateMessage(null, - "image/jpeg", new byte[1000]); - db.receiveMessage(contactId, m); - // Insert a long text message - StringBuilder s = new StringBuilder(); - for(int i = 0; i < 100; i++) - s.append("This is a very tedious message. "); - m = messageFactory.createPrivateMessage(m.getId(), - "text/plain", s.toString().getBytes("UTF-8")); - db.addLocalPrivateMessage(m, contactId); - } catch(DbException e) { - if(LOG.isLoggable(WARNING)) - LOG.log(WARNING, e.toString(), e); - } catch(GeneralSecurityException e) { - if(LOG.isLoggable(WARNING)) - LOG.log(WARNING, e.toString(), e); - } catch(InterruptedException e) { - if(LOG.isLoggable(INFO)) - LOG.info("Interrupted while waiting for service"); - Thread.currentThread().interrupt(); - } catch(IOException e) { - if(LOG.isLoggable(WARNING)) - LOG.log(WARNING, e.toString(), e); - } - } - }); } @Override diff --git a/briar-android/src/net/sf/briar/android/messages/ConversationListItem.java b/briar-android/src/net/sf/briar/android/messages/ConversationListItem.java index eec30a91c80947d7cd4142db16e009f7c4c50991..7dd10c32b7e4e4ab8c7904dae5f3bd29340fc9b4 100644 --- a/briar-android/src/net/sf/briar/android/messages/ConversationListItem.java +++ b/briar-android/src/net/sf/briar/android/messages/ConversationListItem.java @@ -31,7 +31,7 @@ class ConversationListItem { } String getContactName() { - return contact.getName(); + return contact.getAuthor().getName(); } String getSubject() { diff --git a/briar-api/src/net/sf/briar/api/messaging/Author.java b/briar-api/src/net/sf/briar/api/Author.java similarity index 78% rename from briar-api/src/net/sf/briar/api/messaging/Author.java rename to briar-api/src/net/sf/briar/api/Author.java index 3621fbd84f063f4a0b6ba57b25d7571525dbe7e6..3866460242341476408f3093efd98aa029b4ddc2 100644 --- a/briar-api/src/net/sf/briar/api/messaging/Author.java +++ b/briar-api/src/net/sf/briar/api/Author.java @@ -1,6 +1,6 @@ -package net.sf.briar.api.messaging; +package net.sf.briar.api; -/** A pseudonymous author of {@link Message}s. */ +/** A pseudonym for a user. */ public class Author { private final AuthorId id; @@ -23,10 +23,7 @@ public class Author { return name; } - /** - * Returns the public key that is used to verify messages signed by the - * author. - */ + /** Returns the public key used to verify the pseudonym's signatures. */ public byte[] getPublicKey() { return publicKey; } diff --git a/briar-api/src/net/sf/briar/api/messaging/AuthorFactory.java b/briar-api/src/net/sf/briar/api/AuthorFactory.java similarity index 79% rename from briar-api/src/net/sf/briar/api/messaging/AuthorFactory.java rename to briar-api/src/net/sf/briar/api/AuthorFactory.java index d1708340a5cc296ab7d76702ed034b81230ea377..f9c50ca838ad1dafed5246d5c900851d119698d5 100644 --- a/briar-api/src/net/sf/briar/api/messaging/AuthorFactory.java +++ b/briar-api/src/net/sf/briar/api/AuthorFactory.java @@ -1,4 +1,4 @@ -package net.sf.briar.api.messaging; +package net.sf.briar.api; import java.io.IOException; diff --git a/briar-api/src/net/sf/briar/api/messaging/AuthorId.java b/briar-api/src/net/sf/briar/api/AuthorId.java similarity index 90% rename from briar-api/src/net/sf/briar/api/messaging/AuthorId.java rename to briar-api/src/net/sf/briar/api/AuthorId.java index 25360a3255f1f7ac94942a3cdf2b48e0d6f8c535..263962963078e241b82062fddde1278d07071d0a 100644 --- a/briar-api/src/net/sf/briar/api/messaging/AuthorId.java +++ b/briar-api/src/net/sf/briar/api/AuthorId.java @@ -1,4 +1,4 @@ -package net.sf.briar.api.messaging; +package net.sf.briar.api; import java.util.Arrays; diff --git a/briar-api/src/net/sf/briar/api/Contact.java b/briar-api/src/net/sf/briar/api/Contact.java index bbac1dc99bdebb7d720cf4fd63586e7adf72321a..c86708276ed5f68d3096ad24943bfe42fe855b4d 100644 --- a/briar-api/src/net/sf/briar/api/Contact.java +++ b/briar-api/src/net/sf/briar/api/Contact.java @@ -3,12 +3,12 @@ package net.sf.briar.api; public class Contact { private final ContactId id; - private final String name; + private final Author author; private final long lastConnected; - public Contact(ContactId id, String name, long lastConnected) { + public Contact(ContactId id, Author author, long lastConnected) { this.id = id; - this.name = name; + this.author = author; this.lastConnected = lastConnected; } @@ -16,8 +16,8 @@ public class Contact { return id; } - public String getName() { - return name; + public Author getAuthor() { + return author; } public long getLastConnected() { diff --git a/briar-api/src/net/sf/briar/api/messaging/LocalAuthor.java b/briar-api/src/net/sf/briar/api/LocalAuthor.java similarity index 63% rename from briar-api/src/net/sf/briar/api/messaging/LocalAuthor.java rename to briar-api/src/net/sf/briar/api/LocalAuthor.java index d60f44b4559f6c51374ac2fd8c04ad87c1f4b36c..365c92326ac748071001e71d288fda7708aa1b2f 100644 --- a/briar-api/src/net/sf/briar/api/messaging/LocalAuthor.java +++ b/briar-api/src/net/sf/briar/api/LocalAuthor.java @@ -1,6 +1,6 @@ -package net.sf.briar.api.messaging; +package net.sf.briar.api; -/** A pseudonym that the user can use to sign {@link Message}s. */ +/** A pseudonym for the local user. */ public class LocalAuthor extends Author { private final byte[] privateKey; @@ -11,7 +11,7 @@ public class LocalAuthor extends Author { this.privateKey = privateKey; } - /** Returns the private key that is used to sign messages. */ + /** Returns the private key used to generate the pseudonym's signatures. */ public byte[] getPrivateKey() { return privateKey; } diff --git a/briar-api/src/net/sf/briar/api/messaging/TransportId.java b/briar-api/src/net/sf/briar/api/TransportId.java similarity index 91% rename from briar-api/src/net/sf/briar/api/messaging/TransportId.java rename to briar-api/src/net/sf/briar/api/TransportId.java index 3d546f4cba2473aa0536a818826e9d4647dc1e2f..bcc8519508a088b4f4aa0f13b36da60cf5861bee 100644 --- a/briar-api/src/net/sf/briar/api/messaging/TransportId.java +++ b/briar-api/src/net/sf/briar/api/TransportId.java @@ -1,4 +1,4 @@ -package net.sf.briar.api.messaging; +package net.sf.briar.api; import java.util.Arrays; diff --git a/briar-api/src/net/sf/briar/api/messaging/UniqueId.java b/briar-api/src/net/sf/briar/api/UniqueId.java similarity index 94% rename from briar-api/src/net/sf/briar/api/messaging/UniqueId.java rename to briar-api/src/net/sf/briar/api/UniqueId.java index a15573e9aa01d3f4a517cf12c698d998cdda758d..f86c873fa1c6406cbd1c4f8e4082adcc38b84db3 100644 --- a/briar-api/src/net/sf/briar/api/messaging/UniqueId.java +++ b/briar-api/src/net/sf/briar/api/UniqueId.java @@ -1,4 +1,4 @@ -package net.sf.briar.api.messaging; +package net.sf.briar.api; import java.util.Arrays; diff --git a/briar-api/src/net/sf/briar/api/crypto/CryptoComponent.java b/briar-api/src/net/sf/briar/api/crypto/CryptoComponent.java index aa88207c16e496ff737c10371a3b51aaf207230c..c500cc3ccc13394a617d9a1e9d2634fc0e737983 100644 --- a/briar-api/src/net/sf/briar/api/crypto/CryptoComponent.java +++ b/briar-api/src/net/sf/briar/api/crypto/CryptoComponent.java @@ -9,75 +9,91 @@ import javax.crypto.Cipher; public interface CryptoComponent { + ErasableKey generateSecretKey(); + + MessageDigest getMessageDigest(); + + PseudoRandom getPseudoRandom(int seed1, int seed2); + + SecureRandom getSecureRandom(); + + Signature getSignature(); + + KeyPair generateAgreementKeyPair(); + + KeyParser getAgreementKeyParser(); + + KeyPair generateSignatureKeyPair(); + + KeyParser getSignatureKeyParser(); + + /** Generates a random invitation code. */ + int generateInvitationCode(); + /** - * Derives a tag key from the given temporary secret. - * @param alice indicates whether the key is for connections initiated by - * Alice or Bob. + * Derives two confirmation codes from the given master secret. The first + * code is for Alice to give to Bob; the second is for Bob to give to + * Alice. */ - ErasableKey deriveTagKey(byte[] secret, boolean alice); + int[] deriveConfirmationCodes(byte[] secret); /** - * Derives a frame key from the given temporary secret and connection - * number. - * @param alice indicates whether the key is for a connection initiated by - * Alice or Bob. - * @param initiator indicates whether the key is for the initiator's or the - * responder's side of the connection. + * Derives two nonces from the given master secret. The first nonce is for + * Alice to sign; the second is for Bob to sign. */ - ErasableKey deriveFrameKey(byte[] secret, long connection, boolean alice, - boolean initiator); + byte[][] deriveInvitationNonces(byte[] secret); /** - * Derives an initial shared secret from two public keys and one of the + * Derives a shared master secret from two public keys and one of the * corresponding private keys. * @param alice indicates whether the private key belongs to Alice or Bob. */ - byte[] deriveInitialSecret(byte[] theirPublicKey, KeyPair ourKeyPair, + byte[] deriveMasterSecret(byte[] theirPublicKey, KeyPair ourKeyPair, boolean alice) throws GeneralSecurityException; /** - * Generates a random invitation code. + * Derives an initial secret for the given transport from the given master + * secret. */ - int generateInvitationCode(); + byte[] deriveInitialSecret(byte[] secret, int transportIndex); /** - * Derives two confirmation codes from the given initial shared secret. The - * first code is for Alice to give to Bob; the second is for Bob to give to - * Alice. + * Derives a temporary secret for the given period from the given secret, + * which is either the initial shared secret or the previous period's + * temporary secret. */ - int[] deriveConfirmationCodes(byte[] secret); + byte[] deriveNextSecret(byte[] secret, long period); /** - * Derives a temporary secret for the given period from the previous - * period's temporary secret. + * Derives a tag key from the given temporary secret. + * @param alice indicates whether the key is for connections initiated by + * Alice or Bob. */ - byte[] deriveNextSecret(byte[] secret, long period); - - /** Encodes the pseudo-random tag that is used to recognise a connection. */ - void encodeTag(byte[] tag, Cipher tagCipher, ErasableKey tagKey, - long connection); - - KeyPair generateAgreementKeyPair(); - - KeyParser getAgreementKeyParser(); - - KeyPair generateSignatureKeyPair(); - - KeyParser getSignatureKeyParser(); - - ErasableKey generateSecretKey(); - - MessageDigest getMessageDigest(); - - PseudoRandom getPseudoRandom(int seed1, int seed2); + ErasableKey deriveTagKey(byte[] secret, boolean alice); - SecureRandom getSecureRandom(); + /** + * Derives a frame key from the given temporary secret and connection + * number. + * @param alice indicates whether the key is for a connection initiated by + * Alice or Bob. + * @param initiator indicates whether the key is for the initiator's or the + * responder's side of the connection. + */ + ErasableKey deriveFrameKey(byte[] secret, long connection, boolean alice, + boolean initiator); + /** + * Returns a cipher for generating the pseudo-random tags that are used to + * recognise connections. + */ Cipher getTagCipher(); + /** Returns a cipher for encrypting and authenticating connections. */ AuthenticatedCipher getFrameCipher(); - Signature getSignature(); + /** Encodes the pseudo-random tag that is used to recognise a connection. */ + void encodeTag(byte[] tag, Cipher tagCipher, ErasableKey tagKey, + long connection); /** * Encrypts the given plaintext so it can be written to temporary storage. diff --git a/briar-api/src/net/sf/briar/api/crypto/KeyManager.java b/briar-api/src/net/sf/briar/api/crypto/KeyManager.java index e1ebbf512e3152a31bc140cf9159104b1f015466..8964f665f808e1be61180f98272538a207e88a04 100644 --- a/briar-api/src/net/sf/briar/api/crypto/KeyManager.java +++ b/briar-api/src/net/sf/briar/api/crypto/KeyManager.java @@ -1,7 +1,7 @@ package net.sf.briar.api.crypto; import net.sf.briar.api.ContactId; -import net.sf.briar.api.messaging.TransportId; +import net.sf.briar.api.TransportId; import net.sf.briar.api.transport.ConnectionContext; import net.sf.briar.api.transport.Endpoint; diff --git a/briar-api/src/net/sf/briar/api/crypto/KeyParser.java b/briar-api/src/net/sf/briar/api/crypto/KeyParser.java index 599c900828ccde04dbf9f24080c34c9c910648a0..da47281a822d2ed0144dd1548863986ac18e3517 100644 --- a/briar-api/src/net/sf/briar/api/crypto/KeyParser.java +++ b/briar-api/src/net/sf/briar/api/crypto/KeyParser.java @@ -1,9 +1,13 @@ package net.sf.briar.api.crypto; +import java.security.PrivateKey; import java.security.PublicKey; import java.security.spec.InvalidKeySpecException; public interface KeyParser { PublicKey parsePublicKey(byte[] encodedKey) throws InvalidKeySpecException; + + PrivateKey parsePrivateKey(byte[] encodedKey) + throws InvalidKeySpecException; } diff --git a/briar-api/src/net/sf/briar/api/crypto/Password.java b/briar-api/src/net/sf/briar/api/crypto/Password.java deleted file mode 100644 index f26b68ef34174490f4fcd24b4c5d563be5b021cc..0000000000000000000000000000000000000000 --- a/briar-api/src/net/sf/briar/api/crypto/Password.java +++ /dev/null @@ -1,14 +0,0 @@ -package net.sf.briar.api.crypto; - -/** - * Encapsulates a password. Implementations may keep the password encrypted in - * memory to reduce the chances of writing it to the swapfile in plaintext. - */ -public interface Password { - - /** - * Returns the password as a character array, which should be filled with - * zeroes as soon as it has been used. - */ - char[] getPassword(); -} diff --git a/briar-api/src/net/sf/briar/api/crypto/PseudoRandom.java b/briar-api/src/net/sf/briar/api/crypto/PseudoRandom.java index 6abca7c506ed2e559f843c7e87787f91ce076a68..0985fec3de661ebc72b1e26e86df372b725d43e6 100644 --- a/briar-api/src/net/sf/briar/api/crypto/PseudoRandom.java +++ b/briar-api/src/net/sf/briar/api/crypto/PseudoRandom.java @@ -1,5 +1,6 @@ package net.sf.briar.api.crypto; +/** A deterministic PRNG. */ public interface PseudoRandom { byte[] nextBytes(int bytes); diff --git a/briar-api/src/net/sf/briar/api/db/ContactExistsException.java b/briar-api/src/net/sf/briar/api/db/ContactExistsException.java new file mode 100644 index 0000000000000000000000000000000000000000..33b11d6d1fea17133e48166b902fcc065794f631 --- /dev/null +++ b/briar-api/src/net/sf/briar/api/db/ContactExistsException.java @@ -0,0 +1,10 @@ +package net.sf.briar.api.db; + +/** + * Thrown when a duplicate contact is added to the database. This exception may + * occur due to concurrent updates and does not indicate a database error. + */ +public class ContactExistsException extends DbException { + + private static final long serialVersionUID = -6658762011691502411L; +} diff --git a/briar-api/src/net/sf/briar/api/db/DatabaseComponent.java b/briar-api/src/net/sf/briar/api/db/DatabaseComponent.java index ba5f1848e9bb7fe29144e0f13c37e83d6b8a5203..f261eac0aac5b2c56ae2bd3daff94a9a02ad662f 100644 --- a/briar-api/src/net/sf/briar/api/db/DatabaseComponent.java +++ b/briar-api/src/net/sf/briar/api/db/DatabaseComponent.java @@ -4,28 +4,29 @@ import java.io.IOException; import java.util.Collection; import java.util.Map; +import net.sf.briar.api.Author; +import net.sf.briar.api.AuthorId; import net.sf.briar.api.Contact; import net.sf.briar.api.ContactId; -import net.sf.briar.api.Rating; +import net.sf.briar.api.LocalAuthor; import net.sf.briar.api.TransportConfig; +import net.sf.briar.api.TransportId; import net.sf.briar.api.TransportProperties; import net.sf.briar.api.db.event.DatabaseListener; import net.sf.briar.api.messaging.Ack; -import net.sf.briar.api.messaging.AuthorId; import net.sf.briar.api.messaging.Group; import net.sf.briar.api.messaging.GroupId; -import net.sf.briar.api.messaging.LocalAuthor; import net.sf.briar.api.messaging.LocalGroup; import net.sf.briar.api.messaging.Message; import net.sf.briar.api.messaging.MessageId; import net.sf.briar.api.messaging.Offer; +import net.sf.briar.api.messaging.Rating; import net.sf.briar.api.messaging.Request; import net.sf.briar.api.messaging.RetentionAck; import net.sf.briar.api.messaging.RetentionUpdate; import net.sf.briar.api.messaging.SubscriptionAck; import net.sf.briar.api.messaging.SubscriptionUpdate; import net.sf.briar.api.messaging.TransportAck; -import net.sf.briar.api.messaging.TransportId; import net.sf.briar.api.messaging.TransportUpdate; import net.sf.briar.api.transport.Endpoint; import net.sf.briar.api.transport.TemporarySecret; @@ -53,9 +54,10 @@ public interface DatabaseComponent { void removeListener(DatabaseListener d); /** - * Stores a contact with the given name and returns an ID for the contact. + * Stores a contact with the given pseudonym, associated with the given + * local pseudonym, and returns an ID for the contact. */ - ContactId addContact(String name) throws DbException; + ContactId addContact(Author remote, AuthorId local) throws DbException; /** Stores an endpoint. */ void addEndpoint(Endpoint ep) throws DbException; @@ -85,7 +87,7 @@ public interface DatabaseComponent { * Stores a transport and returns true if the transport was not previously * in the database. */ - boolean addTransport(TransportId t) throws DbException; + boolean addTransport(TransportId t, long maxLatency) throws DbException; /** * Generates an acknowledgement for the given contact, or returns null if @@ -176,12 +178,19 @@ public interface DatabaseComponent { /** Returns the group with the given ID, if the user subscribes to it. */ Group getGroup(GroupId g) throws DbException; + /** Returns the pseudonym with the given ID. */ + LocalAuthor getLocalAuthor(AuthorId a) throws DbException; + /** Returns all pseudonyms that the user can use to sign messages. */ Collection<LocalAuthor> getLocalAuthors() throws DbException; /** Returns all restricted groups to which the user can post messages. */ Collection<LocalGroup> getLocalGroups() throws DbException; + /** Returns the local transport properties for all transports. */ + Map<TransportId, TransportProperties> getLocalProperties() + throws DbException; + /** Returns the local transport properties for the given transport. */ TransportProperties getLocalProperties(TransportId t) throws DbException; @@ -222,6 +231,9 @@ public interface DatabaseComponent { /** Returns the set of groups to which the user subscribes. */ Collection<Group> getSubscriptions() throws DbException; + /** Returns the maximum latencies of all local transports. */ + Map<TransportId, Long> getTransportLatencies() throws DbException; + /** Returns the number of unread messages in each subscribed group. */ Map<GroupId, Integer> getUnreadMessageCounts() throws DbException; @@ -317,6 +329,13 @@ public interface DatabaseComponent { */ boolean setReadFlag(MessageId m, boolean read) throws DbException; + /** + * Sets the remote transport properties for the given contact, replacing + * any existing properties. + */ + void setRemoteProperties(ContactId c, + Map<TransportId, TransportProperties> p) throws DbException; + /** Records the given messages as having been seen by the given contact. */ void setSeen(ContactId c, Collection<MessageId> seen) throws DbException; diff --git a/briar-api/src/net/sf/briar/api/db/DatabaseConfig.java b/briar-api/src/net/sf/briar/api/db/DatabaseConfig.java index 74fdb0c76e21ec481b7ab2e33aa16d7fbd657c34..64a99275998858f29a7157470153c25ce2aac9b4 100644 --- a/briar-api/src/net/sf/briar/api/db/DatabaseConfig.java +++ b/briar-api/src/net/sf/briar/api/db/DatabaseConfig.java @@ -2,13 +2,11 @@ package net.sf.briar.api.db; import java.io.File; -import net.sf.briar.api.crypto.Password; - public interface DatabaseConfig { File getDataDirectory(); - Password getPassword(); + char[] getPassword(); long getMaxSize(); } diff --git a/briar-api/src/net/sf/briar/api/db/GroupMessageHeader.java b/briar-api/src/net/sf/briar/api/db/GroupMessageHeader.java index a994de1bd4d6abf190c5ca18d253a19f8273a240..7e6d98cee65318cda02311afb654ec5a7b0e4f8b 100644 --- a/briar-api/src/net/sf/briar/api/db/GroupMessageHeader.java +++ b/briar-api/src/net/sf/briar/api/db/GroupMessageHeader.java @@ -1,9 +1,9 @@ package net.sf.briar.api.db; -import net.sf.briar.api.Rating; -import net.sf.briar.api.messaging.Author; +import net.sf.briar.api.Author; import net.sf.briar.api.messaging.GroupId; import net.sf.briar.api.messaging.MessageId; +import net.sf.briar.api.messaging.Rating; public class GroupMessageHeader extends MessageHeader { diff --git a/briar-api/src/net/sf/briar/api/db/event/RatingChangedEvent.java b/briar-api/src/net/sf/briar/api/db/event/RatingChangedEvent.java index 2c2bf6d7aa8a5da1bab7e3bf1f58b0d3d6275f55..bc47937221925d0742a187b11be13ebfb57a6658 100644 --- a/briar-api/src/net/sf/briar/api/db/event/RatingChangedEvent.java +++ b/briar-api/src/net/sf/briar/api/db/event/RatingChangedEvent.java @@ -1,7 +1,7 @@ package net.sf.briar.api.db.event; -import net.sf.briar.api.Rating; -import net.sf.briar.api.messaging.AuthorId; +import net.sf.briar.api.AuthorId; +import net.sf.briar.api.messaging.Rating; public class RatingChangedEvent extends DatabaseEvent { diff --git a/briar-api/src/net/sf/briar/api/db/event/RemoteTransportsUpdatedEvent.java b/briar-api/src/net/sf/briar/api/db/event/RemoteTransportsUpdatedEvent.java index afb2f4a2680b0378df9cbef597fcc5b3fa391f24..b2f66008a95a9f6b79a83d9531299b6f0107487f 100644 --- a/briar-api/src/net/sf/briar/api/db/event/RemoteTransportsUpdatedEvent.java +++ b/briar-api/src/net/sf/briar/api/db/event/RemoteTransportsUpdatedEvent.java @@ -1,7 +1,7 @@ package net.sf.briar.api.db.event; import net.sf.briar.api.ContactId; -import net.sf.briar.api.messaging.TransportId; +import net.sf.briar.api.TransportId; /** * An event that is broadcast when a contact's remote transport properties diff --git a/briar-api/src/net/sf/briar/api/db/event/TransportAddedEvent.java b/briar-api/src/net/sf/briar/api/db/event/TransportAddedEvent.java index 02d5b6b3b24c15b5620857fdea7c963ccfbf1ef1..f1e7dc62c9825386d0efae7a8bf22a30eeb67b6a 100644 --- a/briar-api/src/net/sf/briar/api/db/event/TransportAddedEvent.java +++ b/briar-api/src/net/sf/briar/api/db/event/TransportAddedEvent.java @@ -1,17 +1,23 @@ package net.sf.briar.api.db.event; -import net.sf.briar.api.messaging.TransportId; +import net.sf.briar.api.TransportId; -/** An event that is broadcast when a transport is added. */ +/** An event that is broadcast when a transport is added to the database. */ public class TransportAddedEvent extends DatabaseEvent { private final TransportId transportId; + private final long maxLatency; - public TransportAddedEvent(TransportId transportId) { + public TransportAddedEvent(TransportId transportId, long maxLatency) { this.transportId = transportId; + this.maxLatency = maxLatency; } public TransportId getTransportId() { return transportId; } + + public long getMaxLatency() { + return maxLatency; + } } diff --git a/briar-api/src/net/sf/briar/api/db/event/TransportRemovedEvent.java b/briar-api/src/net/sf/briar/api/db/event/TransportRemovedEvent.java index 3381b63da81e0b25a0ee39a03e4b61fe66bdd753..b5e4ee0f0e46d9bfc968cacb4fc1c7919cb6e378 100644 --- a/briar-api/src/net/sf/briar/api/db/event/TransportRemovedEvent.java +++ b/briar-api/src/net/sf/briar/api/db/event/TransportRemovedEvent.java @@ -1,6 +1,6 @@ package net.sf.briar.api.db.event; -import net.sf.briar.api.messaging.TransportId; +import net.sf.briar.api.TransportId; /** An event that is broadcast when a transport is removed. */ public class TransportRemovedEvent extends DatabaseEvent { diff --git a/briar-api/src/net/sf/briar/api/invitation/InvitationListener.java b/briar-api/src/net/sf/briar/api/invitation/InvitationListener.java index 1f5ecddb80a133eaff0a5401f17510f17054dde6..b7c3ccd2fc62e2ca7ef306e16f19b1a830c103bf 100644 --- a/briar-api/src/net/sf/briar/api/invitation/InvitationListener.java +++ b/briar-api/src/net/sf/briar/api/invitation/InvitationListener.java @@ -9,7 +9,10 @@ public interface InvitationListener { /** Called if a connection is established and key agreement succeeds. */ void connectionSucceeded(int localCode, int remoteCode); - /** Called if a connection cannot be established. */ + /** + * Called if a connection cannot be established. This indicates that the + * protocol has ended unsuccessfully. + */ void connectionFailed(); /** @@ -20,7 +23,21 @@ public interface InvitationListener { /** * Informs the local peer that the remote peer's confirmation check did - * not succeed, or the connection was lost during confirmation. + * not succeed, or the connection was lost during confirmation. This + * indicates that the protocol has ended unsuccessfully. */ void remoteConfirmationFailed(); + + /** + * Informs the local peer of the name used by the remote peer. Called if + * the exchange of pseudonyms succeeds. This indicates that the protocol + * has ended successfully. + */ + void pseudonymExchangeSucceeded(String remoteName); + + /** + * Called if the exchange of pseudonyms fails. This indicates that the + * protocol has ended unsuccessfully. + */ + void pseudonymExchangeFailed(); } diff --git a/briar-api/src/net/sf/briar/api/invitation/InvitationState.java b/briar-api/src/net/sf/briar/api/invitation/InvitationState.java index 8862e3b6664bb14cb8324957a2f489747e068b8f..0a65863d38d680a551a2173b539cd2aaac9790df 100644 --- a/briar-api/src/net/sf/briar/api/invitation/InvitationState.java +++ b/briar-api/src/net/sf/briar/api/invitation/InvitationState.java @@ -7,12 +7,13 @@ public class InvitationState { private final boolean connectionFailed; private final boolean localCompared, remoteCompared; private final boolean localMatched, remoteMatched; + private final String contactName; public InvitationState(int localInvitationCode, int remoteInvitationCode, int localConfirmationCode, int remoteConfirmationCode, boolean connectionFailed, boolean localCompared, boolean remoteCompared, boolean localMatched, - boolean remoteMatched) { + boolean remoteMatched, String contactName) { this.localInvitationCode = localInvitationCode; this.remoteInvitationCode = remoteInvitationCode; this.localConfirmationCode = localConfirmationCode; @@ -22,6 +23,7 @@ public class InvitationState { this.remoteCompared = remoteCompared; this.localMatched = localMatched; this.remoteMatched = remoteMatched; + this.contactName = contactName; } public int getLocalInvitationCode() { @@ -59,4 +61,8 @@ public class InvitationState { public boolean getRemoteMatched() { return remoteMatched; } + + public String getContactName() { + return contactName; + } } diff --git a/briar-api/src/net/sf/briar/api/invitation/InvitationTaskFactory.java b/briar-api/src/net/sf/briar/api/invitation/InvitationTaskFactory.java index 5e61986ff5b92bb7d1b48f57b82c6156aefa267c..7d6ccca93b16f8bea54ab7aa978b942b49c48c48 100644 --- a/briar-api/src/net/sf/briar/api/invitation/InvitationTaskFactory.java +++ b/briar-api/src/net/sf/briar/api/invitation/InvitationTaskFactory.java @@ -1,8 +1,11 @@ package net.sf.briar.api.invitation; +import net.sf.briar.api.AuthorId; + /** Creates tasks for exchanging invitations with remote peers. */ public interface InvitationTaskFactory { - /** Creates a task using the given invitation codes. */ - InvitationTask createTask(int localCode, int remoteCode); + /** Creates a task using the given pseudonym and invitation codes. */ + InvitationTask createTask(AuthorId localAuthorId, int localCode, + int remoteCode); } diff --git a/briar-api/src/net/sf/briar/api/messaging/Group.java b/briar-api/src/net/sf/briar/api/messaging/Group.java index 71d260ac8439699e43f4c5175cf0b1ed0b6a1b5f..eed2421f8483879c5cf8b8f02d5442a7bd15838c 100644 --- a/briar-api/src/net/sf/briar/api/messaging/Group.java +++ b/briar-api/src/net/sf/briar/api/messaging/Group.java @@ -29,8 +29,9 @@ public class Group { } /** - * If the group is restricted, returns the public key that is used to - * authorise all messages sent to the group. Otherwise returns null. + * If the group is restricted, returns the public key used to verify the + * signatures on all messages sent to the group. If the group is + * unrestricted, returns null. */ public byte[] getPublicKey() { return publicKey; diff --git a/briar-api/src/net/sf/briar/api/messaging/GroupId.java b/briar-api/src/net/sf/briar/api/messaging/GroupId.java index ea2eb546b4b2949795a9762aa8261d88aad10b35..428726d7e01c880c35d3113e992edfe428cf3c81 100644 --- a/briar-api/src/net/sf/briar/api/messaging/GroupId.java +++ b/briar-api/src/net/sf/briar/api/messaging/GroupId.java @@ -2,6 +2,8 @@ package net.sf.briar.api.messaging; import java.util.Arrays; +import net.sf.briar.api.UniqueId; + /** * Type-safe wrapper for a byte array that uniquely identifies a {@link Group}. */ diff --git a/briar-api/src/net/sf/briar/api/messaging/LocalGroup.java b/briar-api/src/net/sf/briar/api/messaging/LocalGroup.java index 27bdca0fad7f04103c45842f40bfe42e0d369311..3b4e4ae5d4de2a13f253bede9f03335035a097c5 100644 --- a/briar-api/src/net/sf/briar/api/messaging/LocalGroup.java +++ b/briar-api/src/net/sf/briar/api/messaging/LocalGroup.java @@ -1,6 +1,6 @@ package net.sf.briar.api.messaging; -/** A restricted group to which the user can post messages. */ +/** A restricted group to which the local user can post messages. */ public class LocalGroup extends Group { private final byte[] privateKey; @@ -11,7 +11,7 @@ public class LocalGroup extends Group { this.privateKey = privateKey; } - /** Returns the private key that is used to sign messages. */ + /** Returns the private key used to sign all messages sent to the group. */ public byte[] getPrivateKey() { return privateKey; } diff --git a/briar-api/src/net/sf/briar/api/messaging/Message.java b/briar-api/src/net/sf/briar/api/messaging/Message.java index b48d54cc061380af1a8e9d4c5fdb7240a8e6847f..06bcffe4a0238f6413fa5ca253b81f54f6ec3914 100644 --- a/briar-api/src/net/sf/briar/api/messaging/Message.java +++ b/briar-api/src/net/sf/briar/api/messaging/Message.java @@ -1,5 +1,7 @@ package net.sf.briar.api.messaging; +import net.sf.briar.api.Author; + public interface Message { /** Returns the message's unique identifier. */ @@ -18,8 +20,8 @@ public interface Message { Group getGroup(); /** - * Returns the message's {@link Author}, or null if this is an anonymous - * message. + * Returns the message's {@link net.sf.briar.api.Author Author}, or null + * if this is an anonymous message. */ Author getAuthor(); @@ -33,7 +35,7 @@ public interface Message { */ String getSubject(); - /** Returns the timestamp created by the message's {@link Author}. */ + /** Returns the message's timestamp. */ long getTimestamp(); /** Returns the serialised message. */ diff --git a/briar-api/src/net/sf/briar/api/messaging/MessageFactory.java b/briar-api/src/net/sf/briar/api/messaging/MessageFactory.java index 85cc33b661ce6db027366bbe4c3ba07dfe0d9359..a18b24df92f1387528ec99a470740719209ab6b0 100644 --- a/briar-api/src/net/sf/briar/api/messaging/MessageFactory.java +++ b/briar-api/src/net/sf/briar/api/messaging/MessageFactory.java @@ -4,6 +4,8 @@ import java.io.IOException; import java.security.GeneralSecurityException; import java.security.PrivateKey; +import net.sf.briar.api.Author; + public interface MessageFactory { /** Creates a private message. */ diff --git a/briar-api/src/net/sf/briar/api/messaging/MessageId.java b/briar-api/src/net/sf/briar/api/messaging/MessageId.java index e0acc7d7a1bcce4bab9d3df235244126fea25d5c..35ae7e8f2184315cd509650aa4df60029ac2e863 100644 --- a/briar-api/src/net/sf/briar/api/messaging/MessageId.java +++ b/briar-api/src/net/sf/briar/api/messaging/MessageId.java @@ -2,6 +2,8 @@ package net.sf.briar.api.messaging; import java.util.Arrays; +import net.sf.briar.api.UniqueId; + /** * Type-safe wrapper for a byte array that uniquely identifies a * {@link Message}. diff --git a/briar-api/src/net/sf/briar/api/messaging/MessagingConstants.java b/briar-api/src/net/sf/briar/api/messaging/MessagingConstants.java index 4ddcedf2c5d6c87046b80ab78037f993e1470cc1..5373427cc004f02f8ff4416a0ca0c48b65882245 100644 --- a/briar-api/src/net/sf/briar/api/messaging/MessagingConstants.java +++ b/briar-api/src/net/sf/briar/api/messaging/MessagingConstants.java @@ -52,5 +52,5 @@ public interface MessagingConstants { * The timestamp of the oldest message in the database is rounded using * this modulus to avoid revealing the presence of any particular message. */ - long RETENTION_MODULUS = 60 * 60 * 1000; // 1 hour + int RETENTION_MODULUS = 60 * 60 * 1000; // 1 hour } diff --git a/briar-api/src/net/sf/briar/api/Rating.java b/briar-api/src/net/sf/briar/api/messaging/Rating.java similarity index 76% rename from briar-api/src/net/sf/briar/api/Rating.java rename to briar-api/src/net/sf/briar/api/messaging/Rating.java index a3ddb57c4d5595216a0cefaccc7f51cf2cec3e42..045de8fe7a00b14d3ef85bc1bacb12c24f07ba85 100644 --- a/briar-api/src/net/sf/briar/api/Rating.java +++ b/briar-api/src/net/sf/briar/api/messaging/Rating.java @@ -1,4 +1,4 @@ -package net.sf.briar.api; +package net.sf.briar.api.messaging; /** The ratings that may be applied to an author in peer moderation. */ public enum Rating { diff --git a/briar-api/src/net/sf/briar/api/messaging/TransportAck.java b/briar-api/src/net/sf/briar/api/messaging/TransportAck.java index f336945569aade80f37691656a95862223c1b93e..e9b0e19a4281e0743b0ab5aad430a1f6bb153eaa 100644 --- a/briar-api/src/net/sf/briar/api/messaging/TransportAck.java +++ b/briar-api/src/net/sf/briar/api/messaging/TransportAck.java @@ -1,5 +1,7 @@ package net.sf.briar.api.messaging; +import net.sf.briar.api.TransportId; + /** A packet acknowledging a {@link TransportUpdate}. */ public class TransportAck { diff --git a/briar-api/src/net/sf/briar/api/messaging/TransportUpdate.java b/briar-api/src/net/sf/briar/api/messaging/TransportUpdate.java index 56ed14f2ad8b04e39553cc740edd203d8dff1e18..d192b200abb12bdc34818e80d9ff7472939a0a44 100644 --- a/briar-api/src/net/sf/briar/api/messaging/TransportUpdate.java +++ b/briar-api/src/net/sf/briar/api/messaging/TransportUpdate.java @@ -1,5 +1,6 @@ package net.sf.briar.api.messaging; +import net.sf.briar.api.TransportId; import net.sf.briar.api.TransportProperties; /** diff --git a/briar-api/src/net/sf/briar/api/messaging/UnverifiedMessage.java b/briar-api/src/net/sf/briar/api/messaging/UnverifiedMessage.java index 83c81e55558b401053461987f7cd14eea8672a0c..bdb9ecf04876d1db503d6f7c109e5c95275244a8 100644 --- a/briar-api/src/net/sf/briar/api/messaging/UnverifiedMessage.java +++ b/briar-api/src/net/sf/briar/api/messaging/UnverifiedMessage.java @@ -1,6 +1,8 @@ package net.sf.briar.api.messaging; -/** A {@link Message} that has not yet had its signatures verified. */ +import net.sf.briar.api.Author; + +/** A {@link Message} that has not yet had its signatures (if any) verified. */ public class UnverifiedMessage { private final MessageId parent; @@ -47,8 +49,8 @@ public class UnverifiedMessage { } /** - * Returns the message's {@link Author}, or null if this is an anonymous - * message. + * Returns the message's {@link net.sf.briar.api.Author Author}, or null + * if this is an anonymous message. */ public Author getAuthor() { return author; @@ -68,7 +70,7 @@ public class UnverifiedMessage { return subject; } - /** Returns the timestamp created by the message's {@link Author}. */ + /** Returns the message's timestamp. */ public long getTimestamp() { return timestamp; } diff --git a/briar-api/src/net/sf/briar/api/messaging/duplex/DuplexConnectionFactory.java b/briar-api/src/net/sf/briar/api/messaging/duplex/DuplexConnectionFactory.java index 8b85de2a6540540c880aa34f0c9f97e196d5668e..3c8451b3f822079bacb47b6111acc1f47acd69e8 100644 --- a/briar-api/src/net/sf/briar/api/messaging/duplex/DuplexConnectionFactory.java +++ b/briar-api/src/net/sf/briar/api/messaging/duplex/DuplexConnectionFactory.java @@ -1,13 +1,14 @@ package net.sf.briar.api.messaging.duplex; import net.sf.briar.api.ContactId; -import net.sf.briar.api.messaging.TransportId; +import net.sf.briar.api.TransportId; import net.sf.briar.api.plugins.duplex.DuplexTransportConnection; import net.sf.briar.api.transport.ConnectionContext; public interface DuplexConnectionFactory { - void createIncomingConnection(ConnectionContext ctx, DuplexTransportConnection d); + void createIncomingConnection(ConnectionContext ctx, + DuplexTransportConnection d); void createOutgoingConnection(ContactId c, TransportId t, DuplexTransportConnection d); diff --git a/briar-api/src/net/sf/briar/api/messaging/simplex/SimplexConnectionFactory.java b/briar-api/src/net/sf/briar/api/messaging/simplex/SimplexConnectionFactory.java index 6f39db80ed3c0f88ba7175c196ef2bdf3dea8e0c..2eac7b0e268620cbb35a7b01e9af1b0778aba82e 100644 --- a/briar-api/src/net/sf/briar/api/messaging/simplex/SimplexConnectionFactory.java +++ b/briar-api/src/net/sf/briar/api/messaging/simplex/SimplexConnectionFactory.java @@ -1,14 +1,15 @@ package net.sf.briar.api.messaging.simplex; import net.sf.briar.api.ContactId; -import net.sf.briar.api.messaging.TransportId; +import net.sf.briar.api.TransportId; import net.sf.briar.api.plugins.simplex.SimplexTransportReader; import net.sf.briar.api.plugins.simplex.SimplexTransportWriter; import net.sf.briar.api.transport.ConnectionContext; public interface SimplexConnectionFactory { - void createIncomingConnection(ConnectionContext ctx, SimplexTransportReader r); + void createIncomingConnection(ConnectionContext ctx, + SimplexTransportReader r); void createOutgoingConnection(ContactId c, TransportId t, SimplexTransportWriter w); diff --git a/briar-api/src/net/sf/briar/api/plugins/Plugin.java b/briar-api/src/net/sf/briar/api/plugins/Plugin.java index 0d91e824b15eda935f9909d48f39c55476810548..a332eb63dca5f465163d13675409bbeb3035b1ea 100644 --- a/briar-api/src/net/sf/briar/api/plugins/Plugin.java +++ b/briar-api/src/net/sf/briar/api/plugins/Plugin.java @@ -4,7 +4,7 @@ import java.io.IOException; import java.util.Collection; import net.sf.briar.api.ContactId; -import net.sf.briar.api.messaging.TransportId; +import net.sf.briar.api.TransportId; public interface Plugin { diff --git a/briar-api/src/net/sf/briar/api/plugins/PluginManager.java b/briar-api/src/net/sf/briar/api/plugins/PluginManager.java index 77bc1dc982fea2c6fc1f224c4e1e2342fbf72f61..61c7678a21dd54c124484c2b7c27be331879e03b 100644 --- a/briar-api/src/net/sf/briar/api/plugins/PluginManager.java +++ b/briar-api/src/net/sf/briar/api/plugins/PluginManager.java @@ -23,6 +23,6 @@ public interface PluginManager { */ int stop(); - /** Returns any duplex plugins that support invitations. */ + /** Returns any running duplex plugins that support invitations. */ Collection<DuplexPlugin> getInvitationPlugins(); } diff --git a/briar-api/src/net/sf/briar/api/plugins/duplex/DuplexPluginFactory.java b/briar-api/src/net/sf/briar/api/plugins/duplex/DuplexPluginFactory.java index 5cdd8e768322001c5bc0a9e8e3cd0af298f294fc..2fb2accf0e2b9b6329ea1d47dd91fc71a07804ed 100644 --- a/briar-api/src/net/sf/briar/api/plugins/duplex/DuplexPluginFactory.java +++ b/briar-api/src/net/sf/briar/api/plugins/duplex/DuplexPluginFactory.java @@ -1,6 +1,6 @@ package net.sf.briar.api.plugins.duplex; -import net.sf.briar.api.messaging.TransportId; +import net.sf.briar.api.TransportId; public interface DuplexPluginFactory { diff --git a/briar-api/src/net/sf/briar/api/plugins/simplex/SimplexPluginFactory.java b/briar-api/src/net/sf/briar/api/plugins/simplex/SimplexPluginFactory.java index 5a842fdc1c95d35ec77fa657da128513e5b15cec..59f606118250cddac8bec93c021d551948ee15af 100644 --- a/briar-api/src/net/sf/briar/api/plugins/simplex/SimplexPluginFactory.java +++ b/briar-api/src/net/sf/briar/api/plugins/simplex/SimplexPluginFactory.java @@ -1,6 +1,6 @@ package net.sf.briar.api.plugins.simplex; -import net.sf.briar.api.messaging.TransportId; +import net.sf.briar.api.TransportId; public interface SimplexPluginFactory { diff --git a/briar-api/src/net/sf/briar/api/transport/ConnectionContext.java b/briar-api/src/net/sf/briar/api/transport/ConnectionContext.java index ad7c329d210f3553d4ab0df4567f4872891d95fe..9c62ab1abeb5e60d4b712f1211a06bb737445e0d 100644 --- a/briar-api/src/net/sf/briar/api/transport/ConnectionContext.java +++ b/briar-api/src/net/sf/briar/api/transport/ConnectionContext.java @@ -1,7 +1,7 @@ package net.sf.briar.api.transport; import net.sf.briar.api.ContactId; -import net.sf.briar.api.messaging.TransportId; +import net.sf.briar.api.TransportId; public class ConnectionContext { diff --git a/briar-api/src/net/sf/briar/api/transport/ConnectionDispatcher.java b/briar-api/src/net/sf/briar/api/transport/ConnectionDispatcher.java index a11b28ef2c53b541617379fac20c312bb3bd9dd6..6301eaece5249ce65de682327072e6f358875a7e 100644 --- a/briar-api/src/net/sf/briar/api/transport/ConnectionDispatcher.java +++ b/briar-api/src/net/sf/briar/api/transport/ConnectionDispatcher.java @@ -1,7 +1,7 @@ package net.sf.briar.api.transport; import net.sf.briar.api.ContactId; -import net.sf.briar.api.messaging.TransportId; +import net.sf.briar.api.TransportId; import net.sf.briar.api.plugins.duplex.DuplexTransportConnection; import net.sf.briar.api.plugins.simplex.SimplexTransportReader; import net.sf.briar.api.plugins.simplex.SimplexTransportWriter; diff --git a/briar-api/src/net/sf/briar/api/transport/ConnectionReaderFactory.java b/briar-api/src/net/sf/briar/api/transport/ConnectionReaderFactory.java index 148e07256ad14effbb0bb2daafd7e09f1f78feb4..518578c39cdea2b40b81991528ec7e2217d7a5f0 100644 --- a/briar-api/src/net/sf/briar/api/transport/ConnectionReaderFactory.java +++ b/briar-api/src/net/sf/briar/api/transport/ConnectionReaderFactory.java @@ -4,9 +4,11 @@ import java.io.InputStream; public interface ConnectionReaderFactory { - /** - * Creates a connection reader for one side of a connection. - */ + /** Creates a connection reader for one side of a connection. */ ConnectionReader createConnectionReader(InputStream in, ConnectionContext ctx, boolean incoming, boolean initiator); + + /** Creates a connection reader for one side of an invitation connection. */ + ConnectionReader createInvitationConnectionReader(InputStream in, + byte[] secret, boolean alice); } diff --git a/briar-api/src/net/sf/briar/api/transport/ConnectionRecogniser.java b/briar-api/src/net/sf/briar/api/transport/ConnectionRecogniser.java index 1114d848c8a203137c11913b297ddfbdc81cd7fd..12903ac219c5d0402bdc2cbe3eeffb0e55cfece7 100644 --- a/briar-api/src/net/sf/briar/api/transport/ConnectionRecogniser.java +++ b/briar-api/src/net/sf/briar/api/transport/ConnectionRecogniser.java @@ -1,8 +1,8 @@ package net.sf.briar.api.transport; import net.sf.briar.api.ContactId; +import net.sf.briar.api.TransportId; import net.sf.briar.api.db.DbException; -import net.sf.briar.api.messaging.TransportId; /** * Maintains the connection reordering windows and decides whether incoming diff --git a/briar-api/src/net/sf/briar/api/transport/ConnectionRegistry.java b/briar-api/src/net/sf/briar/api/transport/ConnectionRegistry.java index fd3759613a59aa1b5d1888da01bd7c7d79cd2992..fa211f559f2a86e9715685a92c0852b8b8c0640e 100644 --- a/briar-api/src/net/sf/briar/api/transport/ConnectionRegistry.java +++ b/briar-api/src/net/sf/briar/api/transport/ConnectionRegistry.java @@ -3,7 +3,7 @@ package net.sf.briar.api.transport; import java.util.Collection; import net.sf.briar.api.ContactId; -import net.sf.briar.api.messaging.TransportId; +import net.sf.briar.api.TransportId; /** * Keeps track of which contacts are currently connected by which transports. diff --git a/briar-api/src/net/sf/briar/api/transport/ConnectionWriterFactory.java b/briar-api/src/net/sf/briar/api/transport/ConnectionWriterFactory.java index 217d2ec8113c9713aec15ef0c2fcc0b481224966..4bff478a34c9c07c58d5d15880ebc3d388d267f1 100644 --- a/briar-api/src/net/sf/briar/api/transport/ConnectionWriterFactory.java +++ b/briar-api/src/net/sf/briar/api/transport/ConnectionWriterFactory.java @@ -4,9 +4,11 @@ import java.io.OutputStream; public interface ConnectionWriterFactory { - /** - * Creates a connection writer for one side of a connection. - */ + /** Creates a connection writer for one side of a connection. */ ConnectionWriter createConnectionWriter(OutputStream out, long capacity, ConnectionContext ctx, boolean incoming, boolean initiator); + + /** Creates a connection writer for one side of an invitation connection. */ + ConnectionWriter createInvitationConnectionWriter(OutputStream out, + byte[] secret, boolean alice); } diff --git a/briar-api/src/net/sf/briar/api/transport/Endpoint.java b/briar-api/src/net/sf/briar/api/transport/Endpoint.java index 0b66b6477618192eeb7aefa5c6a096caa953f501..2b69df41e5a80651f8754dc5629f31fe9ae33c72 100644 --- a/briar-api/src/net/sf/briar/api/transport/Endpoint.java +++ b/briar-api/src/net/sf/briar/api/transport/Endpoint.java @@ -1,22 +1,20 @@ package net.sf.briar.api.transport; import net.sf.briar.api.ContactId; -import net.sf.briar.api.messaging.TransportId; +import net.sf.briar.api.TransportId; public class Endpoint { private final ContactId contactId; private final TransportId transportId; - private final long epoch, clockDiff, latency; + private final long epoch; private final boolean alice; - public Endpoint(ContactId contactId, TransportId transportId, - long epoch, long clockDiff, long latency, boolean alice) { + public Endpoint(ContactId contactId, TransportId transportId, long epoch, + boolean alice) { this.contactId = contactId; this.transportId = transportId; this.epoch = epoch; - this.clockDiff = clockDiff; - this.latency = latency; this.alice = alice; } @@ -32,14 +30,6 @@ public class Endpoint { return epoch; } - public long getClockDifference() { - return clockDiff; - } - - public long getLatency() { - return latency; - } - public boolean getAlice() { return alice; } diff --git a/briar-api/src/net/sf/briar/api/transport/TemporarySecret.java b/briar-api/src/net/sf/briar/api/transport/TemporarySecret.java index d39866d98475594e11ed549b924b495747c86808..6629565b74b73c0779a04279c9b27fdc05e2208e 100644 --- a/briar-api/src/net/sf/briar/api/transport/TemporarySecret.java +++ b/briar-api/src/net/sf/briar/api/transport/TemporarySecret.java @@ -2,7 +2,7 @@ package net.sf.briar.api.transport; import static net.sf.briar.api.transport.TransportConstants.CONNECTION_WINDOW_SIZE; import net.sf.briar.api.ContactId; -import net.sf.briar.api.messaging.TransportId; +import net.sf.briar.api.TransportId; public class TemporarySecret extends Endpoint { @@ -11,10 +11,9 @@ public class TemporarySecret extends Endpoint { /** Creates a temporary secret with the given connection window. */ public TemporarySecret(ContactId contactId, TransportId transportId, - long epoch, long clockDiff, long latency, boolean alice, - long period, byte[] secret, long outgoing, long centre, - byte[] bitmap) { - super(contactId, transportId, epoch, clockDiff, latency, alice); + long epoch, boolean alice, long period, byte[] secret, + long outgoing, long centre, byte[] bitmap) { + super(contactId, transportId, epoch, alice); this.period = period; this.secret = secret; this.outgoing = outgoing; @@ -24,17 +23,15 @@ public class TemporarySecret extends Endpoint { /** Creates a temporary secret with a new connection window. */ public TemporarySecret(ContactId contactId, TransportId transportId, - long epoch, long clockDiff, long latency, boolean alice, - long period, byte[] secret) { - this(contactId, transportId, epoch, clockDiff, latency, alice, period, - secret, 0, 0, new byte[CONNECTION_WINDOW_SIZE / 8]); + long epoch, boolean alice, long period, byte[] secret) { + this(contactId, transportId, epoch, alice, period, secret, 0, 0, + new byte[CONNECTION_WINDOW_SIZE / 8]); } /** Creates a temporary secret derived from the given endpoint. */ public TemporarySecret(Endpoint ep, long period, byte[] secret) { this(ep.getContactId(), ep.getTransportId(), ep.getEpoch(), - ep.getClockDifference(), ep.getLatency(), ep.getAlice(), - period, secret); + ep.getAlice(), period, secret); } public long getPeriod() { diff --git a/briar-api/src/net/sf/briar/api/transport/TransportConstants.java b/briar-api/src/net/sf/briar/api/transport/TransportConstants.java index 8068263017c825b9d71ef7588bfd08fda2da4fee..fe5df78fd94c9c9fbb7d01616fb9e7ef0d2d5dc4 100644 --- a/briar-api/src/net/sf/briar/api/transport/TransportConstants.java +++ b/briar-api/src/net/sf/briar/api/transport/TransportConstants.java @@ -27,6 +27,9 @@ public interface TransportConstants { */ int MIN_CONNECTION_LENGTH = 1024 * 1024; // 2^20, 1 MiB + /** The maximum difference between two communicating devices' clocks. */ + int MAX_CLOCK_DIFFERENCE = 60 * 60 * 1000; // 1 hour + /** The size of the connection reordering window. */ int CONNECTION_WINDOW_SIZE = 32; } diff --git a/briar-core/src/net/sf/briar/crypto/CryptoComponentImpl.java b/briar-core/src/net/sf/briar/crypto/CryptoComponentImpl.java index 8938bd120f1ea47aec8d66772080a8dd29da5308..cbe3a978dc14d1901cd90d195d21921314c88f75 100644 --- a/briar-core/src/net/sf/briar/crypto/CryptoComponentImpl.java +++ b/briar-core/src/net/sf/briar/crypto/CryptoComponentImpl.java @@ -11,10 +11,12 @@ import java.security.GeneralSecurityException; import java.security.KeyFactory; import java.security.KeyPair; import java.security.KeyPairGenerator; +import java.security.PrivateKey; import java.security.PublicKey; import java.security.SecureRandom; import java.security.Security; import java.security.Signature; +import java.security.interfaces.ECPrivateKey; import java.security.interfaces.ECPublicKey; import java.security.spec.ECField; import java.security.spec.ECFieldFp; @@ -39,27 +41,33 @@ import org.spongycastle.crypto.modes.AEADBlockCipher; import org.spongycastle.crypto.modes.GCMBlockCipher; import org.spongycastle.jce.provider.BouncyCastleProvider; -import com.google.inject.Inject; - class CryptoComponentImpl implements CryptoComponent { private static final String PROVIDER = "SC"; // Spongy Castle - private static final String AGREEMENT_KEY_PAIR_ALGO = "ECDH"; - private static final int AGREEMENT_KEY_PAIR_BITS = 384; - private static final String AGREEMENT_ALGO = "ECDHC"; private static final String SECRET_KEY_ALGO = "AES"; private static final int SECRET_KEY_BYTES = 32; // 256 bits - private static final String KEY_DERIVATION_ALGO = "AES/CTR/NoPadding"; - private static final int KEY_DERIVATION_IV_BYTES = 16; // 128 bits private static final String DIGEST_ALGO = "SHA-384"; + private static final String AGREEMENT_ALGO = "ECDHC"; + private static final String AGREEMENT_KEY_PAIR_ALGO = "ECDH"; + private static final int AGREEMENT_KEY_PAIR_BITS = 384; + private static final String SIGNATURE_ALGO = "ECDSA"; private static final String SIGNATURE_KEY_PAIR_ALGO = "ECDSA"; private static final int SIGNATURE_KEY_PAIR_BITS = 384; - private static final String SIGNATURE_ALGO = "ECDSA"; private static final String TAG_CIPHER_ALGO = "AES/ECB/NoPadding"; private static final int GCM_MAC_LENGTH = 16; // 128 bits private static final String STORAGE_CIPHER_ALGO = "AES/GCM/NoPadding"; private static final int STORAGE_IV_LENGTH = 32; // 256 bits + private static final String KEY_DERIVATION_ALGO = "AES/CTR/NoPadding"; + private static final int KEY_DERIVATION_IV_BYTES = 16; // 128 bits + // Labels for secret derivation + private static final byte[] MASTER = { 'M', 'A', 'S', 'T', 'E', 'R', '\0' }; + private static final byte[] FIRST = { 'F', 'I', 'R', 'S', 'T', '\0' }; + private static final byte[] ROTATE = { 'R', 'O', 'T', 'A', 'T', 'E', '\0' }; + // Label for confirmation code derivation + private static final byte[] CODE = { 'C', 'O', 'D', 'E', '\0' }; + // Label for invitation nonce derivation + private static final byte[] NONCE = { 'N', 'O', 'N', 'C', 'E', '\0' }; // Labels for key derivation private static final byte[] A_TAG = { 'A', '_', 'T', 'A', 'G', '\0' }; private static final byte[] B_TAG = { 'B', '_', 'T', 'A', 'G', '\0' }; @@ -71,11 +79,6 @@ class CryptoComponentImpl implements CryptoComponent { { 'B', '_', 'F', 'R', 'A', 'M', 'E', '_', 'A', '\0' }; private static final byte[] B_FRAME_B = { 'B', '_', 'F', 'R', 'A', 'M', 'E', '_', 'B', '\0' }; - // Labels for secret derivation - private static final byte[] FIRST = { 'F', 'I', 'R', 'S', 'T', '\0' }; - private static final byte[] ROTATE = { 'R', 'O', 'T', 'A', 'T', 'E', '\0' }; - // Label for confirmation code derivation - private static final byte[] CODE = { 'C', 'O', 'D', 'E', '\0' }; // Blank plaintext for key derivation private static final byte[] KEY_DERIVATION_BLANK_PLAINTEXT = new byte[SECRET_KEY_BYTES]; @@ -121,7 +124,6 @@ class CryptoComponentImpl implements CryptoComponent { private final SecureRandom secureRandom; private final ErasableKey temporaryStorageKey; - @Inject CryptoComponentImpl() { Security.addProvider(new BouncyCastleProvider()); try { @@ -146,134 +148,65 @@ class CryptoComponentImpl implements CryptoComponent { temporaryStorageKey = generateSecretKey(); } - public ErasableKey deriveTagKey(byte[] secret, boolean alice) { - if(alice) return deriveKey(secret, A_TAG, 0); - else return deriveKey(secret, B_TAG, 0); + public ErasableKey generateSecretKey() { + byte[] b = new byte[SECRET_KEY_BYTES]; + secureRandom.nextBytes(b); + return new ErasableKeyImpl(b, SECRET_KEY_ALGO); } - public ErasableKey deriveFrameKey(byte[] secret, long connection, - boolean alice, boolean initiator) { - if(alice) { - if(initiator) return deriveKey(secret, A_FRAME_A, connection); - else return deriveKey(secret, A_FRAME_B, connection); - } else { - if(initiator) return deriveKey(secret, B_FRAME_A, connection); - else return deriveKey(secret, B_FRAME_B, connection); + public MessageDigest getMessageDigest() { + try { + return new DoubleDigest(java.security.MessageDigest.getInstance( + DIGEST_ALGO, PROVIDER)); + } catch(GeneralSecurityException e) { + throw new RuntimeException(e); } } - private ErasableKey deriveKey(byte[] secret, byte[] label, long context) { - byte[] key = counterModeKdf(secret, label, context); - return new ErasableKeyImpl(key, SECRET_KEY_ALGO); + public PseudoRandom getPseudoRandom(int seed1, int seed2) { + return new PseudoRandomImpl(getMessageDigest(), seed1, seed2); } - // Key derivation function based on a block cipher in CTR mode - see - // NIST SP 800-108, section 5.1 - private byte[] counterModeKdf(byte[] secret, byte[] label, long context) { - // The secret must be usable as a key - if(secret.length != SECRET_KEY_BYTES) - throw new IllegalArgumentException(); - // The label and context must leave a byte free for the counter - if(label.length + 4 >= KEY_DERIVATION_IV_BYTES) - throw new IllegalArgumentException(); - byte[] ivBytes = new byte[KEY_DERIVATION_IV_BYTES]; - System.arraycopy(label, 0, ivBytes, 0, label.length); - ByteUtils.writeUint32(context, ivBytes, label.length); - // Use the secret and the IV to encrypt a blank plaintext - IvParameterSpec iv = new IvParameterSpec(ivBytes); - ErasableKey key = new ErasableKeyImpl(secret, SECRET_KEY_ALGO); + public SecureRandom getSecureRandom() { + return secureRandom; + } + + public Signature getSignature() { try { - Cipher cipher = Cipher.getInstance(KEY_DERIVATION_ALGO, PROVIDER); - cipher.init(Cipher.ENCRYPT_MODE, key, iv); - byte[] output = cipher.doFinal(KEY_DERIVATION_BLANK_PLAINTEXT); - assert output.length == SECRET_KEY_BYTES; - return output; + return Signature.getInstance(SIGNATURE_ALGO, PROVIDER); } catch(GeneralSecurityException e) { throw new RuntimeException(e); } } - public byte[] deriveInitialSecret(byte[] theirPublicKey, - KeyPair ourKeyPair, boolean alice) throws GeneralSecurityException { - PublicKey theirPublic = agreementKeyParser.parsePublicKey( - theirPublicKey); - MessageDigest messageDigest = getMessageDigest(); - byte[] ourPublicKey = ourKeyPair.getPublic().getEncoded(); - byte[] ourHash = messageDigest.digest(ourPublicKey); - byte[] theirHash = messageDigest.digest(theirPublicKey); - byte[] aliceInfo, bobInfo; - if(alice) { - aliceInfo = ourHash; - bobInfo = theirHash; - } else { - aliceInfo = theirHash; - bobInfo = ourHash; - } - // The raw secret comes from the key agreement algorithm - KeyAgreement keyAgreement = KeyAgreement.getInstance(AGREEMENT_ALGO, - PROVIDER); - keyAgreement.init(ourKeyPair.getPrivate()); - keyAgreement.doPhase(theirPublic, true); - byte[] rawSecret = keyAgreement.generateSecret(); - // Derive the cooked secret from the raw secret using the - // concatenation KDF - byte[] cookedSecret = concatenationKdf(rawSecret, FIRST, aliceInfo, - bobInfo); - ByteUtils.erase(rawSecret); - return cookedSecret; + public KeyPair generateAgreementKeyPair() { + KeyPair keyPair = agreementKeyPairGenerator.generateKeyPair(); + // Check that the key pair uses NIST curve P-384 + ECPublicKey publicKey = checkP384Params(keyPair.getPublic()); + // Return a wrapper that uses the SEC 1 encoding + publicKey = new Sec1PublicKey(publicKey, AGREEMENT_KEY_PAIR_BITS); + ECPrivateKey privateKey = (ECPrivateKey) keyPair.getPrivate(); + privateKey = new Sec1PrivateKey(privateKey, AGREEMENT_KEY_PAIR_BITS); + return new KeyPair(publicKey, privateKey); } - // Key derivation function based on a hash function - see NIST SP 800-56A, - // section 5.8 - private byte[] concatenationKdf(byte[] rawSecret, byte[] label, - byte[] initiatorInfo, byte[] responderInfo) { - // The output of the hash function must be long enough to use as a key - MessageDigest messageDigest = getMessageDigest(); - if(messageDigest.getDigestLength() < SECRET_KEY_BYTES) - throw new RuntimeException(); - // All fields are length-prefixed - byte[] length = new byte[1]; - ByteUtils.writeUint8(rawSecret.length, length, 0); - messageDigest.update(length); - messageDigest.update(rawSecret); - ByteUtils.writeUint8(label.length, length, 0); - messageDigest.update(length); - messageDigest.update(label); - ByteUtils.writeUint8(initiatorInfo.length, length, 0); - messageDigest.update(length); - messageDigest.update(initiatorInfo); - ByteUtils.writeUint8(responderInfo.length, length, 0); - messageDigest.update(length); - messageDigest.update(responderInfo); - byte[] hash = messageDigest.digest(); - // The secret is the first SECRET_KEY_BYTES bytes of the hash - byte[] output = new byte[SECRET_KEY_BYTES]; - System.arraycopy(hash, 0, output, 0, SECRET_KEY_BYTES); - ByteUtils.erase(hash); - return output; + public KeyParser getAgreementKeyParser() { + return agreementKeyParser; } - public byte[] deriveNextSecret(byte[] secret, long period) { - if(period < 0 || period > MAX_32_BIT_UNSIGNED) - throw new IllegalArgumentException(); - return counterModeKdf(secret, ROTATE, period); + public KeyPair generateSignatureKeyPair() { + KeyPair keyPair = signatureKeyPairGenerator.generateKeyPair(); + // Check that the key pair uses NIST curve P-384 + ECPublicKey publicKey = checkP384Params(keyPair.getPublic()); + // Return a wrapper that uses the SEC 1 encoding + publicKey = new Sec1PublicKey(publicKey, SIGNATURE_KEY_PAIR_BITS); + ECPrivateKey privateKey = (ECPrivateKey) keyPair.getPrivate(); + privateKey = new Sec1PrivateKey(privateKey, SIGNATURE_KEY_PAIR_BITS); + return new KeyPair(publicKey, privateKey); } - public void encodeTag(byte[] tag, Cipher tagCipher, ErasableKey tagKey, - long connection) { - if(tag.length < TAG_LENGTH) throw new IllegalArgumentException(); - if(connection < 0 || connection > MAX_32_BIT_UNSIGNED) - throw new IllegalArgumentException(); - for(int i = 0; i < TAG_LENGTH; i++) tag[i] = 0; - ByteUtils.writeUint32(connection, tag, 0); - try { - tagCipher.init(ENCRYPT_MODE, tagKey); - int encrypted = tagCipher.doFinal(tag, 0, TAG_LENGTH, tag); - if(encrypted != TAG_LENGTH) throw new IllegalArgumentException(); - } catch(GeneralSecurityException e) { - // Unsuitable cipher or key - throw new IllegalArgumentException(e); - } + public KeyParser getSignatureKeyParser() { + return signatureKeyParser; } public int generateInvitationCode() { @@ -294,78 +227,77 @@ class CryptoComponentImpl implements CryptoComponent { return codes; } - public KeyPair generateAgreementKeyPair() { - KeyPair keyPair = agreementKeyPairGenerator.generateKeyPair(); - // Check that the key pair uses NIST curve P-384 - ECPublicKey ecPublicKey = checkP384Params(keyPair.getPublic()); - // Return a public key that uses the SEC 1 encoding - ecPublicKey = new Sec1PublicKey(ecPublicKey, AGREEMENT_KEY_PAIR_BITS); - return new KeyPair(ecPublicKey, keyPair.getPrivate()); + public byte[][] deriveInvitationNonces(byte[] secret) { + byte[] alice = counterModeKdf(secret, NONCE, 0); + byte[] bob = counterModeKdf(secret, NONCE, 1); + return new byte[][] { alice, bob }; } - private ECPublicKey checkP384Params(PublicKey publicKey) { - if(!(publicKey instanceof ECPublicKey)) throw new RuntimeException(); - ECPublicKey ecPublicKey = (ECPublicKey) publicKey; - ECParameterSpec params = ecPublicKey.getParams(); - EllipticCurve curve = params.getCurve(); - ECField field = curve.getField(); - if(!(field instanceof ECFieldFp)) throw new RuntimeException(); - BigInteger q = ((ECFieldFp) field).getP(); - if(!q.equals(P_384_Q)) throw new RuntimeException(); - if(!curve.getA().equals(P_384_A)) throw new RuntimeException(); - if(!curve.getB().equals(P_384_B)) throw new RuntimeException(); - if(!params.getGenerator().equals(P_384_G)) throw new RuntimeException(); - if(!params.getOrder().equals(P_384_N)) throw new RuntimeException(); - if(!(params.getCofactor() == P_384_H)) throw new RuntimeException(); - return ecPublicKey; + public byte[] deriveMasterSecret(byte[] theirPublicKey, + KeyPair ourKeyPair, boolean alice) throws GeneralSecurityException { + PublicKey theirPub = agreementKeyParser.parsePublicKey(theirPublicKey); + MessageDigest messageDigest = getMessageDigest(); + byte[] ourPublicKey = ourKeyPair.getPublic().getEncoded(); + byte[] ourHash = messageDigest.digest(ourPublicKey); + byte[] theirHash = messageDigest.digest(theirPublicKey); + byte[] aliceInfo, bobInfo; + if(alice) { + aliceInfo = ourHash; + bobInfo = theirHash; + } else { + aliceInfo = theirHash; + bobInfo = ourHash; + } + PrivateKey ourPriv = ourKeyPair.getPrivate(); + // The raw secret comes from the key agreement algorithm + byte[] raw = deriveSharedSecret(ourPriv, theirPub); + // Derive the cooked secret from the raw secret using the + // concatenation KDF + byte[] cooked = concatenationKdf(raw, MASTER, aliceInfo, bobInfo); + ByteUtils.erase(raw); + return cooked; } - public KeyParser getAgreementKeyParser() { - return agreementKeyParser; + // Package access for testing + byte[] deriveSharedSecret(PrivateKey priv, PublicKey pub) + throws GeneralSecurityException { + KeyAgreement keyAgreement = KeyAgreement.getInstance(AGREEMENT_ALGO, + PROVIDER); + keyAgreement.init(priv); + keyAgreement.doPhase(pub, true); + return keyAgreement.generateSecret(); } - public KeyPair generateSignatureKeyPair() { - KeyPair keyPair = signatureKeyPairGenerator.generateKeyPair(); - // Check that the key pair uses NIST curve P-384 - ECPublicKey ecPublicKey = checkP384Params(keyPair.getPublic()); - // Return a public key that uses the SEC 1 encoding - ecPublicKey = new Sec1PublicKey(ecPublicKey, SIGNATURE_KEY_PAIR_BITS); - return new KeyPair(ecPublicKey, keyPair.getPrivate()); + public byte[] deriveInitialSecret(byte[] secret, int transportIndex) { + if(transportIndex < 0) throw new IllegalArgumentException(); + return counterModeKdf(secret, FIRST, transportIndex); } - public KeyParser getSignatureKeyParser() { - return signatureKeyParser; + public byte[] deriveNextSecret(byte[] secret, long period) { + if(period < 0 || period > MAX_32_BIT_UNSIGNED) + throw new IllegalArgumentException(); + return counterModeKdf(secret, ROTATE, period); } - public ErasableKey generateSecretKey() { - byte[] b = new byte[SECRET_KEY_BYTES]; - secureRandom.nextBytes(b); - return new ErasableKeyImpl(b, SECRET_KEY_ALGO); + public ErasableKey deriveTagKey(byte[] secret, boolean alice) { + if(alice) return deriveKey(secret, A_TAG, 0); + else return deriveKey(secret, B_TAG, 0); } - public MessageDigest getMessageDigest() { - try { - return new DoubleDigest(java.security.MessageDigest.getInstance( - DIGEST_ALGO, PROVIDER)); - } catch(GeneralSecurityException e) { - throw new RuntimeException(e); + public ErasableKey deriveFrameKey(byte[] secret, long connection, + boolean alice, boolean initiator) { + if(alice) { + if(initiator) return deriveKey(secret, A_FRAME_A, connection); + else return deriveKey(secret, A_FRAME_B, connection); + } else { + if(initiator) return deriveKey(secret, B_FRAME_A, connection); + else return deriveKey(secret, B_FRAME_B, connection); } } - public PseudoRandom getPseudoRandom(int seed1, int seed2) { - return new PseudoRandomImpl(getMessageDigest(), seed1, seed2); - } - - public SecureRandom getSecureRandom() { - return secureRandom; - } - - public Signature getSignature() { - try { - return Signature.getInstance(SIGNATURE_ALGO, PROVIDER); - } catch(GeneralSecurityException e) { - throw new RuntimeException(e); - } + private ErasableKey deriveKey(byte[] secret, byte[] label, long context) { + byte[] key = counterModeKdf(secret, label, context); + return new ErasableKeyImpl(key, SECRET_KEY_ALGO); } public Cipher getTagCipher() { @@ -377,12 +309,28 @@ class CryptoComponentImpl implements CryptoComponent { } public AuthenticatedCipher getFrameCipher() { - // This code is specific to BouncyCastle because javax.crypto.Cipher + // This code is specific to Spongy Castle because javax.crypto.Cipher // doesn't support additional authenticated data until Java 7 AEADBlockCipher cipher = new GCMBlockCipher(new AESEngine()); return new AuthenticatedCipherImpl(cipher, GCM_MAC_LENGTH); } + public void encodeTag(byte[] tag, Cipher tagCipher, ErasableKey tagKey, + long connection) { + if(tag.length < TAG_LENGTH) throw new IllegalArgumentException(); + if(connection < 0 || connection > MAX_32_BIT_UNSIGNED) + throw new IllegalArgumentException(); + for(int i = 0; i < TAG_LENGTH; i++) tag[i] = 0; + ByteUtils.writeUint32(connection, tag, 0); + try { + tagCipher.init(ENCRYPT_MODE, tagKey); + int encrypted = tagCipher.doFinal(tag, 0, TAG_LENGTH, tag); + if(encrypted != TAG_LENGTH) throw new IllegalArgumentException(); + } catch(GeneralSecurityException e) { + throw new IllegalArgumentException(e); // Unsuitable cipher or key + } + } + public byte[] encryptTemporaryStorage(byte[] input) { // Generate a random IV byte[] ivBytes = new byte[STORAGE_IV_LENGTH]; @@ -425,4 +373,77 @@ class CryptoComponentImpl implements CryptoComponent { return null; // Invalid } } + + private ECPublicKey checkP384Params(PublicKey publicKey) { + if(!(publicKey instanceof ECPublicKey)) throw new RuntimeException(); + ECPublicKey ecPublicKey = (ECPublicKey) publicKey; + ECParameterSpec params = ecPublicKey.getParams(); + EllipticCurve curve = params.getCurve(); + ECField field = curve.getField(); + if(!(field instanceof ECFieldFp)) throw new RuntimeException(); + BigInteger q = ((ECFieldFp) field).getP(); + if(!q.equals(P_384_Q)) throw new RuntimeException(); + if(!curve.getA().equals(P_384_A)) throw new RuntimeException(); + if(!curve.getB().equals(P_384_B)) throw new RuntimeException(); + if(!params.getGenerator().equals(P_384_G)) throw new RuntimeException(); + if(!params.getOrder().equals(P_384_N)) throw new RuntimeException(); + if(!(params.getCofactor() == P_384_H)) throw new RuntimeException(); + return ecPublicKey; + } + + // Key derivation function based on a hash function - see NIST SP 800-56A, + // section 5.8 + private byte[] concatenationKdf(byte[] rawSecret, byte[] label, + byte[] initiatorInfo, byte[] responderInfo) { + // The output of the hash function must be long enough to use as a key + MessageDigest messageDigest = getMessageDigest(); + if(messageDigest.getDigestLength() < SECRET_KEY_BYTES) + throw new RuntimeException(); + // All fields are length-prefixed + byte[] length = new byte[1]; + ByteUtils.writeUint8(rawSecret.length, length, 0); + messageDigest.update(length); + messageDigest.update(rawSecret); + ByteUtils.writeUint8(label.length, length, 0); + messageDigest.update(length); + messageDigest.update(label); + ByteUtils.writeUint8(initiatorInfo.length, length, 0); + messageDigest.update(length); + messageDigest.update(initiatorInfo); + ByteUtils.writeUint8(responderInfo.length, length, 0); + messageDigest.update(length); + messageDigest.update(responderInfo); + byte[] hash = messageDigest.digest(); + // The secret is the first SECRET_KEY_BYTES bytes of the hash + byte[] output = new byte[SECRET_KEY_BYTES]; + System.arraycopy(hash, 0, output, 0, SECRET_KEY_BYTES); + ByteUtils.erase(hash); + return output; + } + + // Key derivation function based on a block cipher in CTR mode - see + // NIST SP 800-108, section 5.1 + private byte[] counterModeKdf(byte[] secret, byte[] label, long context) { + // The secret must be usable as a key + if(secret.length != SECRET_KEY_BYTES) + throw new IllegalArgumentException(); + // The label and context must leave a byte free for the counter + if(label.length + 4 >= KEY_DERIVATION_IV_BYTES) + throw new IllegalArgumentException(); + byte[] ivBytes = new byte[KEY_DERIVATION_IV_BYTES]; + System.arraycopy(label, 0, ivBytes, 0, label.length); + ByteUtils.writeUint32(context, ivBytes, label.length); + // Use the secret and the IV to encrypt a blank plaintext + IvParameterSpec iv = new IvParameterSpec(ivBytes); + ErasableKey key = new ErasableKeyImpl(secret, SECRET_KEY_ALGO); + try { + Cipher cipher = Cipher.getInstance(KEY_DERIVATION_ALGO, PROVIDER); + cipher.init(Cipher.ENCRYPT_MODE, key, iv); + byte[] output = cipher.doFinal(KEY_DERIVATION_BLANK_PLAINTEXT); + assert output.length == SECRET_KEY_BYTES; + return output; + } catch(GeneralSecurityException e) { + throw new RuntimeException(e); + } + } } diff --git a/briar-core/src/net/sf/briar/crypto/Sec1KeyParser.java b/briar-core/src/net/sf/briar/crypto/Sec1KeyParser.java index a3014e95f9a41f3cc4657bb651aeb7c8a9f3b876..6759d7a42c6731b7c5067563e96a6432b244b414 100644 --- a/briar-core/src/net/sf/briar/crypto/Sec1KeyParser.java +++ b/briar-core/src/net/sf/briar/crypto/Sec1KeyParser.java @@ -2,9 +2,13 @@ package net.sf.briar.crypto; import java.math.BigInteger; import java.security.KeyFactory; +import java.security.PrivateKey; import java.security.PublicKey; +import java.security.interfaces.ECPrivateKey; +import java.security.interfaces.ECPublicKey; import java.security.spec.ECParameterSpec; import java.security.spec.ECPoint; +import java.security.spec.ECPrivateKeySpec; import java.security.spec.ECPublicKeySpec; import java.security.spec.InvalidKeySpecException; @@ -20,20 +24,22 @@ class Sec1KeyParser implements KeyParser { private final KeyFactory keyFactory; private final ECParameterSpec params; private final BigInteger modulus; - private final int bytesPerInt, encodedKeyLength; + private final int keyBits, bytesPerInt, publicKeyBytes, privateKeyBytes; Sec1KeyParser(KeyFactory keyFactory, ECParameterSpec params, BigInteger modulus, int keyBits) { this.keyFactory = keyFactory; this.params = params; this.modulus = modulus; + this.keyBits = keyBits; bytesPerInt = (int) Math.ceil(keyBits / 8.0); - encodedKeyLength = 1 + 2 * bytesPerInt; + publicKeyBytes = 1 + 2 * bytesPerInt; + privateKeyBytes = bytesPerInt; } public PublicKey parsePublicKey(byte[] encodedKey) throws InvalidKeySpecException { - if(encodedKey.length != encodedKeyLength) + if(encodedKey.length != publicKeyBytes) throw new InvalidKeySpecException(); // The first byte must be 0x04 if(encodedKey[0] != 4) throw new InvalidKeySpecException(); @@ -52,9 +58,23 @@ class Sec1KeyParser implements KeyParser { BigInteger lhs = y.multiply(y).mod(modulus); BigInteger rhs = x.multiply(x).add(a).multiply(x).add(b).mod(modulus); if(!lhs.equals(rhs)) throw new InvalidKeySpecException(); + // FIXME: Verify that n times the point (x, y) = the point at infinity // Construct a public key from the point (x, y) and the params ECPoint pub = new ECPoint(x, y); ECPublicKeySpec keySpec = new ECPublicKeySpec(pub, params); - return keyFactory.generatePublic(keySpec); + ECPublicKey k = (ECPublicKey) keyFactory.generatePublic(keySpec); + return new Sec1PublicKey(k, keyBits); + } + + public PrivateKey parsePrivateKey(byte[] encodedKey) + throws InvalidKeySpecException { + if(encodedKey.length != privateKeyBytes) + throw new InvalidKeySpecException(); + BigInteger s = new BigInteger(1, encodedKey); // Positive signum + if(s.compareTo(params.getOrder()) >= 0) + throw new InvalidKeySpecException(); + ECPrivateKeySpec keySpec = new ECPrivateKeySpec(s, params); + ECPrivateKey k = (ECPrivateKey) keyFactory.generatePrivate(keySpec); + return new Sec1PrivateKey(k, keyBits); } } diff --git a/briar-core/src/net/sf/briar/crypto/Sec1PrivateKey.java b/briar-core/src/net/sf/briar/crypto/Sec1PrivateKey.java new file mode 100644 index 0000000000000000000000000000000000000000..c590975cc64366027cdb49e64a704c2b7287bc6f --- /dev/null +++ b/briar-core/src/net/sf/briar/crypto/Sec1PrivateKey.java @@ -0,0 +1,57 @@ +package net.sf.briar.crypto; + +import java.math.BigInteger; +import java.security.interfaces.ECPrivateKey; +import java.security.spec.ECParameterSpec; + +class Sec1PrivateKey implements ECPrivateKey, +org.spongycastle.jce.interfaces.ECPrivateKey { + + private static final long serialVersionUID = -493100835871466670L; + + private final ECPrivateKey key; + private final int privateKeyBytes; + + Sec1PrivateKey(ECPrivateKey key, int keyBits) { + // Spongy Castle only accepts instances of its own interface, so we + // have to wrap an instance of that interface and delegate to it + if(!(key instanceof org.spongycastle.jce.interfaces.ECPrivateKey)) + throw new IllegalArgumentException(); + this.key = key; + privateKeyBytes = (int) Math.ceil(keyBits / 8.0); + } + + public String getAlgorithm() { + return key.getAlgorithm(); + } + + public byte[] getEncoded() { + byte[] encodedKey = new byte[privateKeyBytes]; + BigInteger s = key.getS(); + // Copy up to privateKeyBytes bytes into exactly privateKeyBytes bytes + byte[] sBytes = s.toByteArray(); + for(int i = 0; i < sBytes.length && i < privateKeyBytes; i++) + encodedKey[privateKeyBytes - 1 - i] = sBytes[sBytes.length - 1 - i]; + return encodedKey; + } + + public String getFormat() { + return "SEC1"; + } + + public ECParameterSpec getParams() { + return key.getParams(); + } + + public BigInteger getS() { + return key.getS(); + } + + public org.spongycastle.jce.spec.ECParameterSpec getParameters() { + return ((org.spongycastle.jce.interfaces.ECPrivateKey) key).getParameters(); + } + + public BigInteger getD() { + return ((org.spongycastle.jce.interfaces.ECPrivateKey) key).getD(); + } +} diff --git a/briar-core/src/net/sf/briar/crypto/Sec1PublicKey.java b/briar-core/src/net/sf/briar/crypto/Sec1PublicKey.java index 10170e53935c71a862ac8ee5f6c0c942e8ff6684..e3c2e32263bc87fdd99aea75d71ba432c00c2b63 100644 --- a/briar-core/src/net/sf/briar/crypto/Sec1PublicKey.java +++ b/briar-core/src/net/sf/briar/crypto/Sec1PublicKey.java @@ -10,17 +10,22 @@ import java.security.spec.ECPoint; * Elliptic Curve Cryptography", section 2.3 (Certicom Corporation, May 2009). * Point compression is not used. */ -class Sec1PublicKey implements ECPublicKey { +class Sec1PublicKey implements ECPublicKey, +org.spongycastle.jce.interfaces.ECPublicKey { private static final long serialVersionUID = -2722797033851423987L; private final ECPublicKey key; - private final int bytesPerInt, encodedKeyLength; + private final int bytesPerInt, publicKeyBytes; Sec1PublicKey(ECPublicKey key, int keyBits) { + // Spongy Castle only accepts instances of its own interface, so we + // have to wrap an instance of that interface and delegate to it + if(!(key instanceof org.spongycastle.jce.interfaces.ECPublicKey)) + throw new IllegalArgumentException(); this.key = key; bytesPerInt = (int) Math.ceil(keyBits / 8.0); - encodedKeyLength = 1 + 2 * bytesPerInt; + publicKeyBytes = 1 + 2 * bytesPerInt; } public String getAlgorithm() { @@ -28,9 +33,10 @@ class Sec1PublicKey implements ECPublicKey { } public byte[] getEncoded() { - byte[] encodedKey = new byte[encodedKeyLength]; + byte[] encodedKey = new byte[publicKeyBytes]; encodedKey[0] = 4; - BigInteger x = key.getW().getAffineX(), y = key.getW().getAffineY(); + BigInteger x = key.getW().getAffineX(); + BigInteger y = key.getW().getAffineY(); // Copy up to bytesPerInt bytes into exactly bytesPerInt bytes byte[] xBytes = x.toByteArray(); for(int i = 0; i < xBytes.length && i < bytesPerInt; i++) @@ -52,4 +58,12 @@ class Sec1PublicKey implements ECPublicKey { public ECPoint getW() { return key.getW(); } + + public org.spongycastle.jce.spec.ECParameterSpec getParameters() { + return ((org.spongycastle.jce.interfaces.ECPublicKey) key).getParameters(); + } + + public org.spongycastle.math.ec.ECPoint getQ() { + return ((org.spongycastle.jce.interfaces.ECPublicKey) key).getQ(); + } } diff --git a/briar-core/src/net/sf/briar/db/Database.java b/briar-core/src/net/sf/briar/db/Database.java index f3cd30c36c35001a1ceceb2a8d3016d82fa4962f..c76e9255076c684d116af9da25cfaee57b8c81e9 100644 --- a/briar-core/src/net/sf/briar/db/Database.java +++ b/briar-core/src/net/sf/briar/db/Database.java @@ -4,27 +4,28 @@ import java.io.IOException; import java.util.Collection; import java.util.Map; +import net.sf.briar.api.Author; +import net.sf.briar.api.AuthorId; import net.sf.briar.api.Contact; import net.sf.briar.api.ContactId; -import net.sf.briar.api.Rating; +import net.sf.briar.api.LocalAuthor; import net.sf.briar.api.TransportConfig; +import net.sf.briar.api.TransportId; import net.sf.briar.api.TransportProperties; import net.sf.briar.api.db.DbException; import net.sf.briar.api.db.GroupMessageHeader; import net.sf.briar.api.db.PrivateMessageHeader; -import net.sf.briar.api.messaging.AuthorId; import net.sf.briar.api.messaging.Group; import net.sf.briar.api.messaging.GroupId; -import net.sf.briar.api.messaging.LocalAuthor; import net.sf.briar.api.messaging.LocalGroup; import net.sf.briar.api.messaging.Message; import net.sf.briar.api.messaging.MessageId; +import net.sf.briar.api.messaging.Rating; import net.sf.briar.api.messaging.RetentionAck; import net.sf.briar.api.messaging.RetentionUpdate; import net.sf.briar.api.messaging.SubscriptionAck; import net.sf.briar.api.messaging.SubscriptionUpdate; import net.sf.briar.api.messaging.TransportAck; -import net.sf.briar.api.messaging.TransportId; import net.sf.briar.api.messaging.TransportUpdate; import net.sf.briar.api.transport.Endpoint; import net.sf.briar.api.transport.TemporarySecret; @@ -82,16 +83,17 @@ interface Database<T> { void commitTransaction(T txn) throws DbException; /** - * Adds a contact with the given name to the database and returns an ID for - * the contact. + * Stores a contact with the given pseudonym, associated with the given + * local pseudonym, and returns an ID for the contact. * <p> * Locking: contact write, retention write, subscription write, transport * write, window write. */ - ContactId addContact(T txn, String name) throws DbException; + ContactId addContact(T txn, Author remote, AuthorId local) + throws DbException; /** - * Adds an endpoint to the database. + * Stores an endpoint. * <p> * Locking: window write. */ @@ -108,7 +110,7 @@ interface Database<T> { /** * Stores a pseudonym that the user can use to sign messages. * <p> - * Locking: identity write. + * Locking: contact write, identity write. */ void addLocalAuthor(T txn, LocalAuthor a) throws DbException; @@ -162,12 +164,13 @@ interface Database<T> { boolean addSubscription(T txn, Group g) throws DbException; /** - * Adds a new transport to the database and returns true if the transport - * was not previously in the database. + * Stores a transport and returns true if the transport was not previously + * in the database. * <p> * Locking: transport write, window write. */ - boolean addTransport(T txn, TransportId t) throws DbException; + boolean addTransport(T txn, TransportId t, long maxLatency) + throws DbException; /** * Makes the given group visible to the given contact. @@ -176,6 +179,13 @@ interface Database<T> { */ void addVisibility(T txn, ContactId c, GroupId g) throws DbException; + /** + * Returns true if the database contains the given contact. + * <p> + * Locking: contact read. + */ + boolean containsContact(T txn, AuthorId a) throws DbException; + /** * Returns true if the database contains the given contact. * <p> @@ -277,6 +287,13 @@ interface Database<T> { */ long getLastConnected(T txn, ContactId c) throws DbException; + /** + * Returns the pseudonym with the given ID. + * <p> + * Locking: identitiy read. + */ + LocalAuthor getLocalAuthor(T txn, AuthorId a) throws DbException; + /** * Returns all pseudonyms that the user can use to sign messages. * <p> @@ -291,6 +308,14 @@ interface Database<T> { */ Collection<LocalGroup> getLocalGroups(T txn) throws DbException; + /** + * Returns the local transport properties for all transports. + * <p> + * Locking: transport read. + */ + Map<TransportId, TransportProperties> getLocalProperties(T txn) + throws DbException; + /** * Returns the local transport properties for the given transport. * <p> @@ -509,6 +534,13 @@ interface Database<T> { Collection<TransportAck> getTransportAcks(T txn, ContactId c) throws DbException; + /** + * Returns the maximum latencies of all local transports. + * <p> + * Locking: transport read. + */ + Map<TransportId, Long> getTransportLatencies(T txn) throws DbException; + /** * Returns a collection of transport updates for the given contact and * updates their expiry times using the given latency. Returns null if no @@ -669,6 +701,15 @@ interface Database<T> { */ boolean setReadFlag(T txn, MessageId m, boolean read) throws DbException; + /** + * Sets the remote transport properties for the given contact, replacing + * any existing properties. + * <p> + * Locking: transport write. + */ + void setRemoteProperties(T txn, ContactId c, + Map<TransportId, TransportProperties> p) throws DbException; + /** * Updates the remote transport properties for the given contact and the * given transport, replacing any existing properties, unless an update diff --git a/briar-core/src/net/sf/briar/db/DatabaseComponentImpl.java b/briar-core/src/net/sf/briar/db/DatabaseComponentImpl.java index a4edf9750aec385dc6c6580d00e8dfd5925cf664..eb4da283ddcd2971533631b64c548a958012362c 100644 --- a/briar-core/src/net/sf/briar/db/DatabaseComponentImpl.java +++ b/briar-core/src/net/sf/briar/db/DatabaseComponentImpl.java @@ -2,7 +2,7 @@ package net.sf.briar.db; import static java.util.logging.Level.INFO; import static java.util.logging.Level.WARNING; -import static net.sf.briar.api.Rating.GOOD; +import static net.sf.briar.api.messaging.Rating.GOOD; import static net.sf.briar.db.DatabaseConstants.BYTES_PER_SWEEP; import static net.sf.briar.db.DatabaseConstants.CRITICAL_FREE_SPACE; import static net.sf.briar.db.DatabaseConstants.MAX_BYTES_BETWEEN_SPACE_CHECKS; @@ -23,12 +23,16 @@ import java.util.concurrent.CopyOnWriteArrayList; import java.util.concurrent.locks.ReentrantReadWriteLock; import java.util.logging.Logger; +import net.sf.briar.api.Author; +import net.sf.briar.api.AuthorId; import net.sf.briar.api.Contact; import net.sf.briar.api.ContactId; -import net.sf.briar.api.Rating; +import net.sf.briar.api.LocalAuthor; import net.sf.briar.api.TransportConfig; +import net.sf.briar.api.TransportId; import net.sf.briar.api.TransportProperties; import net.sf.briar.api.clock.Clock; +import net.sf.briar.api.db.ContactExistsException; import net.sf.briar.api.db.DatabaseComponent; import net.sf.briar.api.db.DbException; import net.sf.briar.api.db.GroupMessageHeader; @@ -57,22 +61,19 @@ import net.sf.briar.api.db.event.TransportAddedEvent; import net.sf.briar.api.db.event.TransportRemovedEvent; import net.sf.briar.api.lifecycle.ShutdownManager; import net.sf.briar.api.messaging.Ack; -import net.sf.briar.api.messaging.Author; -import net.sf.briar.api.messaging.AuthorId; import net.sf.briar.api.messaging.Group; import net.sf.briar.api.messaging.GroupId; -import net.sf.briar.api.messaging.LocalAuthor; import net.sf.briar.api.messaging.LocalGroup; import net.sf.briar.api.messaging.Message; import net.sf.briar.api.messaging.MessageId; import net.sf.briar.api.messaging.Offer; +import net.sf.briar.api.messaging.Rating; import net.sf.briar.api.messaging.Request; import net.sf.briar.api.messaging.RetentionAck; import net.sf.briar.api.messaging.RetentionUpdate; import net.sf.briar.api.messaging.SubscriptionAck; import net.sf.briar.api.messaging.SubscriptionUpdate; import net.sf.briar.api.messaging.TransportAck; -import net.sf.briar.api.messaging.TransportId; import net.sf.briar.api.messaging.TransportUpdate; import net.sf.briar.api.transport.Endpoint; import net.sf.briar.api.transport.TemporarySecret; @@ -183,7 +184,8 @@ DatabaseCleaner.Callback { listeners.remove(d); } - public ContactId addContact(String name) throws DbException { + public ContactId addContact(Author remote, AuthorId local) + throws DbException { ContactId c; contactLock.writeLock().lock(); try { @@ -197,7 +199,9 @@ DatabaseCleaner.Callback { try { T txn = db.startTransaction(); try { - c = db.addContact(txn, name); + if(db.containsContact(txn, remote.getId())) + throw new ContactExistsException(); + c = db.addContact(txn, remote, local); db.commitTransaction(txn); } catch(DbException e) { db.abortTransaction(txn); @@ -257,6 +261,43 @@ DatabaseCleaner.Callback { } } + public void addLocalAuthor(LocalAuthor a) throws DbException { + contactLock.writeLock().lock(); + try { + identityLock.writeLock().lock(); + try { + T txn = db.startTransaction(); + try { + db.addLocalAuthor(txn, a); + db.commitTransaction(txn); + } catch(DbException e) { + db.abortTransaction(txn); + throw e; + } + } finally { + identityLock.writeLock().unlock(); + } + } finally { + contactLock.writeLock().unlock(); + } + } + + public void addLocalGroup(LocalGroup g) throws DbException { + identityLock.writeLock().lock(); + try { + T txn = db.startTransaction(); + try { + db.addLocalGroup(txn, g); + db.commitTransaction(txn); + } catch(DbException e) { + db.abortTransaction(txn); + throw e; + } + } finally { + identityLock.writeLock().unlock(); + } + } + public void addLocalGroupMessage(Message m) throws DbException { boolean added = false; contactLock.readLock().lock(); @@ -430,38 +471,6 @@ DatabaseCleaner.Callback { return true; } - public void addLocalAuthor(LocalAuthor a) throws DbException { - identityLock.writeLock().lock(); - try { - T txn = db.startTransaction(); - try { - db.addLocalAuthor(txn, a); - db.commitTransaction(txn); - } catch(DbException e) { - db.abortTransaction(txn); - throw e; - } - } finally { - identityLock.writeLock().unlock(); - } - } - - public void addLocalGroup(LocalGroup g) throws DbException { - identityLock.writeLock().lock(); - try { - T txn = db.startTransaction(); - try { - db.addLocalGroup(txn, g); - db.commitTransaction(txn); - } catch(DbException e) { - db.abortTransaction(txn); - throw e; - } - } finally { - identityLock.writeLock().unlock(); - } - } - public void addSecrets(Collection<TemporarySecret> secrets) throws DbException { contactLock.readLock().lock(); @@ -498,7 +507,8 @@ DatabaseCleaner.Callback { } } - public boolean addTransport(TransportId t) throws DbException { + public boolean addTransport(TransportId t, long maxLatency) + throws DbException { boolean added; transportLock.writeLock().lock(); try { @@ -506,7 +516,7 @@ DatabaseCleaner.Callback { try { T txn = db.startTransaction(); try { - added = db.addTransport(txn, t); + added = db.addTransport(txn, t, maxLatency); db.commitTransaction(txn); } catch(DbException e) { db.abortTransaction(txn); @@ -518,7 +528,7 @@ DatabaseCleaner.Callback { } finally { transportLock.writeLock().unlock(); } - if(added) callListeners(new TransportAddedEvent(t)); + if(added) callListeners(new TransportAddedEvent(t, maxLatency)); return added; } @@ -947,6 +957,23 @@ DatabaseCleaner.Callback { } } + public LocalAuthor getLocalAuthor(AuthorId a) throws DbException { + identityLock.readLock().lock(); + try { + T txn = db.startTransaction(); + try { + LocalAuthor localAuthor = db.getLocalAuthor(txn, a); + db.commitTransaction(txn); + return localAuthor; + } catch(DbException e) { + db.abortTransaction(txn); + throw e; + } + } finally { + identityLock.readLock().unlock(); + } + } + public Collection<LocalAuthor> getLocalAuthors() throws DbException { identityLock.readLock().lock(); try { @@ -981,6 +1008,25 @@ DatabaseCleaner.Callback { } } + public Map<TransportId, TransportProperties> getLocalProperties() + throws DbException { + transportLock.readLock().lock(); + try { + T txn = db.startTransaction(); + try { + Map<TransportId, TransportProperties> properties = + db.getLocalProperties(txn); + db.commitTransaction(txn); + return properties; + } catch(DbException e) { + db.abortTransaction(txn); + throw e; + } + } finally { + transportLock.readLock().unlock(); + } + } + public TransportProperties getLocalProperties(TransportId t) throws DbException { transportLock.readLock().lock(); @@ -1197,6 +1243,24 @@ DatabaseCleaner.Callback { } } + public Map<TransportId, Long> getTransportLatencies() throws DbException { + transportLock.readLock().lock(); + try { + T txn = db.startTransaction(); + try { + Map<TransportId, Long> latencies = + db.getTransportLatencies(txn); + db.commitTransaction(txn); + return latencies; + } catch(DbException e) { + db.abortTransaction(txn); + throw e; + } + } finally { + transportLock.readLock().unlock(); + } + } + public Map<GroupId, Integer> getUnreadMessageCounts() throws DbException { messageLock.readLock().lock(); try { @@ -1785,6 +1849,30 @@ DatabaseCleaner.Callback { } } + public void setRemoteProperties(ContactId c, + Map<TransportId, TransportProperties> p) throws DbException { + contactLock.readLock().lock(); + try { + transportLock.writeLock().lock(); + try { + T txn = db.startTransaction(); + try { + if(!db.containsContact(txn, c)) + throw new NoSuchContactException(); + db.setRemoteProperties(txn, c, p); + db.commitTransaction(txn); + } catch(DbException e) { + db.abortTransaction(txn); + throw e; + } + } finally { + transportLock.writeLock().unlock(); + } + } finally { + contactLock.readLock().unlock(); + } + } + public void setSeen(ContactId c, Collection<MessageId> seen) throws DbException { contactLock.readLock().lock(); diff --git a/briar-core/src/net/sf/briar/db/H2Database.java b/briar-core/src/net/sf/briar/db/H2Database.java index 6c28bc77958a84b8fec70adc8e115e52136d5bba..5bb1dcc52561f6e246dbc9efc5414f2b0739ca29 100644 --- a/briar-core/src/net/sf/briar/db/H2Database.java +++ b/briar-core/src/net/sf/briar/db/H2Database.java @@ -9,7 +9,6 @@ import java.util.Arrays; import java.util.Properties; import net.sf.briar.api.clock.Clock; -import net.sf.briar.api.crypto.Password; import net.sf.briar.api.db.DatabaseConfig; import net.sf.briar.api.db.DbException; import net.sf.briar.util.FileUtils; @@ -26,7 +25,7 @@ class H2Database extends JdbcDatabase { private final File home; private final String url; - private final Password password; + private final char[] password; private final long maxSize; @Inject @@ -76,13 +75,12 @@ class H2Database extends JdbcDatabase { @Override protected Connection createConnection() throws SQLException { Properties props = new Properties(); - props.setProperty("user", "b"); - char[] passwordArray = password.getPassword(); - props.put("password", passwordArray); + props.setProperty("user", "user"); + props.put("password", password); try { return DriverManager.getConnection(url, props); } finally { - Arrays.fill(passwordArray, (char) 0); + Arrays.fill(password, (char) 0); } } } diff --git a/briar-core/src/net/sf/briar/db/JdbcDatabase.java b/briar-core/src/net/sf/briar/db/JdbcDatabase.java index d4dec6b438cbff6f21027803f91f2344ebaac5e3..59747daba35d71ef1b1a6b630867933179838c45 100644 --- a/briar-core/src/net/sf/briar/db/JdbcDatabase.java +++ b/briar-core/src/net/sf/briar/db/JdbcDatabase.java @@ -4,9 +4,9 @@ import static java.sql.Types.BINARY; import static java.sql.Types.VARCHAR; import static java.util.logging.Level.INFO; import static java.util.logging.Level.WARNING; -import static net.sf.briar.api.Rating.UNRATED; import static net.sf.briar.api.messaging.MessagingConstants.MAX_SUBSCRIPTIONS; import static net.sf.briar.api.messaging.MessagingConstants.RETENTION_MODULUS; +import static net.sf.briar.api.messaging.Rating.UNRATED; import static net.sf.briar.db.ExponentialBackoff.calculateExpiry; import java.io.File; @@ -27,30 +27,30 @@ import java.util.Map; import java.util.Map.Entry; import java.util.logging.Logger; +import net.sf.briar.api.Author; +import net.sf.briar.api.AuthorId; import net.sf.briar.api.Contact; import net.sf.briar.api.ContactId; -import net.sf.briar.api.Rating; +import net.sf.briar.api.LocalAuthor; import net.sf.briar.api.TransportConfig; +import net.sf.briar.api.TransportId; import net.sf.briar.api.TransportProperties; import net.sf.briar.api.clock.Clock; import net.sf.briar.api.db.DbClosedException; import net.sf.briar.api.db.DbException; import net.sf.briar.api.db.GroupMessageHeader; import net.sf.briar.api.db.PrivateMessageHeader; -import net.sf.briar.api.messaging.Author; -import net.sf.briar.api.messaging.AuthorId; import net.sf.briar.api.messaging.Group; import net.sf.briar.api.messaging.GroupId; -import net.sf.briar.api.messaging.LocalAuthor; import net.sf.briar.api.messaging.LocalGroup; import net.sf.briar.api.messaging.Message; import net.sf.briar.api.messaging.MessageId; +import net.sf.briar.api.messaging.Rating; import net.sf.briar.api.messaging.RetentionAck; import net.sf.briar.api.messaging.RetentionUpdate; import net.sf.briar.api.messaging.SubscriptionAck; import net.sf.briar.api.messaging.SubscriptionUpdate; import net.sf.briar.api.messaging.TransportAck; -import net.sf.briar.api.messaging.TransportId; import net.sf.briar.api.messaging.TransportUpdate; import net.sf.briar.api.transport.Endpoint; import net.sf.briar.api.transport.TemporarySecret; @@ -85,8 +85,18 @@ abstract class JdbcDatabase implements Database<Connection> { private static final String CREATE_CONTACTS = "CREATE TABLE contacts" + " (contactId COUNTER," + + " authorId HASH NOT NULL," + " name VARCHAR NOT NULL," - + " PRIMARY KEY (contactId))"; + + " publicKey BINARY NOT NULL," + + " localAuthorId HASH NOT NULL," + + " PRIMARY KEY (contactId)," + + " UNIQUE (authorId)," + + " FOREIGN KEY (localAuthorId)" + + " REFERENCES localAuthors (authorId)" + + " ON DELETE RESTRICT)"; // Deletion not allowed + + private static final String INDEX_CONTACTS_BY_AUTHOR = + "CREATE INDEX contactsByAuthor ON contacts (authorId)"; // Locking: subscription // Dependents: message @@ -234,7 +244,10 @@ abstract class JdbcDatabase implements Database<Connection> { // Locking: transport // Dependents: window private static final String CREATE_TRANSPORTS = - "CREATE TABLE transports (transportId HASH NOT NULL)"; + "CREATE TABLE transports" + + " (transportId HASH NOT NULL," + + " maxLatency BIGINT NOT NULL," + + " PRIMARY KEY (transportId))"; // Locking: transport private static final String CREATE_TRANSPORT_CONFIGS = @@ -305,8 +318,6 @@ abstract class JdbcDatabase implements Database<Connection> { + " (contactId INT NOT NULL," + " transportId HASH NOT NULL," + " epoch BIGINT NOT NULL," - + " clockDiff BIGINT NOT NULL," - + " latency BIGINT NOT NULL," + " alice BOOLEAN NOT NULL," + " PRIMARY KEY (contactId, transportId)," + " FOREIGN KEY (contactId)" @@ -401,6 +412,7 @@ abstract class JdbcDatabase implements Database<Connection> { s.executeUpdate(insertTypeNames(CREATE_LOCAL_AUTHORS)); s.executeUpdate(insertTypeNames(CREATE_LOCAL_GROUPS)); s.executeUpdate(insertTypeNames(CREATE_CONTACTS)); + s.executeUpdate(INDEX_CONTACTS_BY_AUTHOR); s.executeUpdate(insertTypeNames(CREATE_GROUPS)); s.executeUpdate(insertTypeNames(CREATE_GROUP_VISIBILITIES)); s.executeUpdate(insertTypeNames(CREATE_CONTACT_GROUPS)); @@ -538,15 +550,20 @@ abstract class JdbcDatabase implements Database<Connection> { if(interrupted) Thread.currentThread().interrupt(); } - public ContactId addContact(Connection txn, String name) + public ContactId addContact(Connection txn, Author remote, AuthorId local) throws DbException { PreparedStatement ps = null; ResultSet rs = null; try { // Create a contact row - String sql = "INSERT INTO contacts (name) VALUES (?)"; + String sql = "INSERT INTO contacts" + + " (authorId, name, publicKey, localAuthorId)" + + " VALUES (?, ?, ?, ?)"; ps = txn.prepareStatement(sql); - ps.setString(1, name); + ps.setBytes(1, remote.getId().getBytes()); + ps.setString(2, remote.getName()); + ps.setBytes(3, remote.getPublicKey()); + ps.setBytes(4, local.getBytes()); int affected = ps.executeUpdate(); if(affected != 1) throw new DbStateException(); ps.close(); @@ -612,11 +629,11 @@ abstract class JdbcDatabase implements Database<Connection> { ps.setBytes(2, t); ps.addBatch(); } - int[] affectedBatch = ps.executeBatch(); - if(affectedBatch.length != transports.size()) + int[] batchAffected = ps.executeBatch(); + if(batchAffected.length != transports.size()) throw new DbStateException(); - for(int i = 0; i < affectedBatch.length; i++) { - if(affectedBatch[i] != 1) throw new DbStateException(); + for(int i = 0; i < batchAffected.length; i++) { + if(batchAffected[i] != 1) throw new DbStateException(); } ps.close(); return c; @@ -630,16 +647,14 @@ abstract class JdbcDatabase implements Database<Connection> { public void addEndpoint(Connection txn, Endpoint ep) throws DbException { PreparedStatement ps = null; try { - String sql = "INSERT INTO endpoints (contactId, transportId," - + " epoch, clockDiff, latency, alice)" - + " VALUES (?, ?, ?, ?, ?, ?)"; + String sql = "INSERT INTO endpoints" + + " (contactId, transportId, epoch, alice)" + + " VALUES (?, ?, ?, ?)"; ps = txn.prepareStatement(sql); ps.setInt(1, ep.getContactId().getInt()); ps.setBytes(2, ep.getTransportId().getBytes()); ps.setLong(3, ep.getEpoch()); - ps.setLong(4, ep.getClockDifference()); - ps.setLong(5, ep.getLatency()); - ps.setBoolean(6, ep.getAlice()); + ps.setBoolean(4, ep.getAlice()); int affected = ps.executeUpdate(); if(affected != 1) throw new DbStateException(); ps.close(); @@ -900,7 +915,7 @@ abstract class JdbcDatabase implements Database<Connection> { } } - public boolean addTransport(Connection txn, TransportId t) + public boolean addTransport(Connection txn, TransportId t, long maxLatency) throws DbException { PreparedStatement ps = null; ResultSet rs = null; @@ -916,9 +931,11 @@ abstract class JdbcDatabase implements Database<Connection> { ps.close(); if(found) return false; // Create a transport row - sql = "INSERT INTO transports (transportId) VALUES (?)"; + sql = "INSERT INTO transports (transportId, maxLatency)" + + " VALUES (?, ?)"; ps = txn.prepareStatement(sql); ps.setBytes(1, t.getBytes()); + ps.setLong(2, maxLatency); int affected = ps.executeUpdate(); if(affected != 1) throw new DbStateException(); ps.close(); @@ -984,6 +1001,27 @@ abstract class JdbcDatabase implements Database<Connection> { } } + public boolean containsContact(Connection txn, AuthorId a) + throws DbException { + PreparedStatement ps = null; + ResultSet rs = null; + try { + String sql = "SELECT NULL FROM contacts WHERE authorId = ?"; + ps = txn.prepareStatement(sql); + ps.setBytes(1, a.getBytes()); + rs = ps.executeQuery(); + boolean found = rs.next(); + if(rs.next()) throw new DbStateException(); + rs.close(); + ps.close(); + return found; + } catch(SQLException e) { + tryToClose(rs); + tryToClose(ps); + throw new DbException(e); + } + } + public boolean containsContact(Connection txn, ContactId c) throws DbException { PreparedStatement ps = null; @@ -1117,7 +1155,7 @@ abstract class JdbcDatabase implements Database<Connection> { PreparedStatement ps = null; ResultSet rs = null; try { - String sql = "SELECT name, lastConnected" + String sql = "SELECT authorId, name, publicKey, lastConnected" + " FROM contacts AS c" + " JOIN connectionTimes AS ct" + " ON c.contactId = ct.contactId" @@ -1126,11 +1164,14 @@ abstract class JdbcDatabase implements Database<Connection> { ps.setInt(1, c.getInt()); rs = ps.executeQuery(); if(!rs.next()) throw new DbStateException(); - String name = rs.getString(1); - long lastConnected = rs.getLong(2); + AuthorId authorId = new AuthorId(rs.getBytes(1)); + String name = rs.getString(2); + byte[] publicKey = rs.getBytes(3); + long lastConnected = rs.getLong(4); rs.close(); ps.close(); - return new Contact(c, name, lastConnected); + Author author = new Author(authorId, name, publicKey); + return new Contact(c, author, lastConnected); } catch(SQLException e) { tryToClose(rs); tryToClose(ps); @@ -1163,7 +1204,8 @@ abstract class JdbcDatabase implements Database<Connection> { PreparedStatement ps = null; ResultSet rs = null; try { - String sql = "SELECT c.contactId, name, lastConnected" + String sql = "SELECT c.contactId, authorId, name, publicKey," + + " lastConnected" + " FROM contacts AS c" + " JOIN connectionTimes AS ct" + " ON c.contactId = ct.contactId"; @@ -1171,10 +1213,13 @@ abstract class JdbcDatabase implements Database<Connection> { rs = ps.executeQuery(); List<Contact> contacts = new ArrayList<Contact>(); while(rs.next()) { - ContactId id = new ContactId(rs.getInt(1)); - String name = rs.getString(2); - long lastConnected = rs.getLong(3); - contacts.add(new Contact(id, name, lastConnected)); + ContactId contactId = new ContactId(rs.getInt(1)); + AuthorId authorId = new AuthorId(rs.getBytes(2)); + String name = rs.getString(3); + byte[] publicKey = rs.getBytes(4); + long lastConnected = rs.getLong(5); + Author author = new Author(authorId, name, publicKey); + contacts.add(new Contact(contactId, author, lastConnected)); } rs.close(); ps.close(); @@ -1191,8 +1236,7 @@ abstract class JdbcDatabase implements Database<Connection> { PreparedStatement ps = null; ResultSet rs = null; try { - String sql = "SELECT contactId, transportId, epoch, clockDiff," - + " latency, alice" + String sql = "SELECT contactId, transportId, epoch, alice" + " FROM endpoints"; ps = txn.prepareStatement(sql); rs = ps.executeQuery(); @@ -1201,11 +1245,8 @@ abstract class JdbcDatabase implements Database<Connection> { ContactId c = new ContactId(rs.getInt(1)); TransportId t = new TransportId(rs.getBytes(2)); long epoch = rs.getLong(3); - long clockDiff = rs.getLong(4); - long latency = rs.getLong(5); - boolean alice = rs.getBoolean(6); - endpoints.add(new Endpoint(c, t, epoch, clockDiff, latency, - alice)); + boolean alice = rs.getBoolean(4); + endpoints.add(new Endpoint(c, t, epoch, alice)); } return Collections.unmodifiableList(endpoints); } catch(SQLException e) { @@ -1287,6 +1328,30 @@ abstract class JdbcDatabase implements Database<Connection> { } } + public LocalAuthor getLocalAuthor(Connection txn, AuthorId a) + throws DbException { + PreparedStatement ps = null; + ResultSet rs = null; + try { + String sql = "SELECT name, publicKey, privateKey FROM localAuthors" + + " WHERE authorId = ?"; + ps = txn.prepareStatement(sql); + rs = ps.executeQuery(); + if(!rs.next()) throw new DbStateException(); + AuthorId id = new AuthorId(rs.getBytes(1)); + LocalAuthor localAuthor = new LocalAuthor(id, rs.getString(2), + rs.getBytes(3), rs.getBytes(4)); + if(rs.next()) throw new DbStateException(); + rs.close(); + ps.close(); + return localAuthor; + } catch(SQLException e) { + tryToClose(rs); + tryToClose(ps); + throw new DbException(e); + } + } + public Collection<LocalAuthor> getLocalAuthors(Connection txn) throws DbException { PreparedStatement ps = null; @@ -1337,6 +1402,40 @@ abstract class JdbcDatabase implements Database<Connection> { } } + public Map<TransportId, TransportProperties> getLocalProperties( + Connection txn) throws DbException { + PreparedStatement ps = null; + ResultSet rs = null; + try { + String sql = "SELECT transportId, key, value" + + " FROM transportProperties" + + " ORDER BY transportId"; + ps = txn.prepareStatement(sql); + rs = ps.executeQuery(); + Map<TransportId, TransportProperties> properties = + new HashMap<TransportId, TransportProperties>(); + TransportId lastId = null; + TransportProperties p = null; + while(rs.next()) { + TransportId id = new TransportId(rs.getBytes(1)); + String key = rs.getString(2), value = rs.getString(3); + if(!id.equals(lastId)) { + p = new TransportProperties(); + properties.put(id, p); + lastId = id; + } + p.put(key, value); + } + rs.close(); + ps.close(); + return Collections.unmodifiableMap(properties); + } catch(SQLException e) { + tryToClose(rs); + tryToClose(ps); + throw new DbException(e); + } + } + public TransportProperties getLocalProperties(Connection txn, TransportId t) throws DbException { PreparedStatement ps = null; @@ -1437,86 +1536,6 @@ abstract class JdbcDatabase implements Database<Connection> { } } - public Collection<PrivateMessageHeader> getPrivateMessageHeaders( - Connection txn) throws DbException { - PreparedStatement ps = null; - ResultSet rs = null; - try { - String sql = "SELECT m.messageId, parentId, contentType, subject," - + " timestamp, m.contactId, read, starred, seen" - + " FROM messages AS m" - + " JOIN statuses AS s" - + " ON m.messageId = s.messageId" - + " AND m.contactId = s.contactId" - + " WHERE groupId IS NULL"; - ps = txn.prepareStatement(sql); - rs = ps.executeQuery(); - List<PrivateMessageHeader> headers = - new ArrayList<PrivateMessageHeader>(); - while(rs.next()) { - MessageId id = new MessageId(rs.getBytes(1)); - byte[] b = rs.getBytes(2); - MessageId parent = b == null ? null : new MessageId(b); - String contentType = rs.getString(3); - String subject = rs.getString(4); - long timestamp = rs.getLong(5); - ContactId contactId = new ContactId(rs.getInt(6)); - boolean read = rs.getBoolean(7); - boolean starred = rs.getBoolean(8); - boolean seen = rs.getBoolean(9); - headers.add(new PrivateMessageHeader(id, parent, contentType, - subject, timestamp, read, starred, contactId, seen)); - } - rs.close(); - ps.close(); - return Collections.unmodifiableList(headers); - } catch(SQLException e) { - tryToClose(rs); - tryToClose(ps); - throw new DbException(e); - } - } - - public Collection<PrivateMessageHeader> getPrivateMessageHeaders( - Connection txn, ContactId c) throws DbException { - PreparedStatement ps = null; - ResultSet rs = null; - try { - String sql = "SELECT m.messageId, parentId, contentType, subject," - + " timestamp, read, starred, seen" - + " FROM messages AS m" - + " JOIN statuses AS s" - + " ON m.messageId = s.messageId" - + " AND m.contactId = s.contactId" - + " WHERE m.contactId = ? AND groupId IS NULL"; - ps = txn.prepareStatement(sql); - ps.setInt(1, c.getInt()); - rs = ps.executeQuery(); - List<PrivateMessageHeader> headers = - new ArrayList<PrivateMessageHeader>(); - while(rs.next()) { - MessageId id = new MessageId(rs.getBytes(1)); - byte[] b = rs.getBytes(2); - MessageId parent = b == null ? null : new MessageId(b); - String contentType = rs.getString(3); - String subject = rs.getString(4); - long timestamp = rs.getLong(5); - boolean read = rs.getBoolean(6); - boolean starred = rs.getBoolean(7); - boolean seen = rs.getBoolean(8); - headers.add(new PrivateMessageHeader(id, parent, contentType, - subject, timestamp, read, starred, c, seen)); - } - rs.close(); - ps.close(); - return Collections.unmodifiableList(headers); - } catch(SQLException e) { - tryToClose(rs); - tryToClose(ps); - throw new DbException(e); - } - } - public Collection<MessageId> getMessagesByAuthor(Connection txn, AuthorId a) throws DbException { PreparedStatement ps = null; @@ -1680,6 +1699,86 @@ abstract class JdbcDatabase implements Database<Connection> { } } + public Collection<PrivateMessageHeader> getPrivateMessageHeaders( + Connection txn) throws DbException { + PreparedStatement ps = null; + ResultSet rs = null; + try { + String sql = "SELECT m.messageId, parentId, contentType, subject," + + " timestamp, m.contactId, read, starred, seen" + + " FROM messages AS m" + + " JOIN statuses AS s" + + " ON m.messageId = s.messageId" + + " AND m.contactId = s.contactId" + + " WHERE groupId IS NULL"; + ps = txn.prepareStatement(sql); + rs = ps.executeQuery(); + List<PrivateMessageHeader> headers = + new ArrayList<PrivateMessageHeader>(); + while(rs.next()) { + MessageId id = new MessageId(rs.getBytes(1)); + byte[] b = rs.getBytes(2); + MessageId parent = b == null ? null : new MessageId(b); + String contentType = rs.getString(3); + String subject = rs.getString(4); + long timestamp = rs.getLong(5); + ContactId contactId = new ContactId(rs.getInt(6)); + boolean read = rs.getBoolean(7); + boolean starred = rs.getBoolean(8); + boolean seen = rs.getBoolean(9); + headers.add(new PrivateMessageHeader(id, parent, contentType, + subject, timestamp, read, starred, contactId, seen)); + } + rs.close(); + ps.close(); + return Collections.unmodifiableList(headers); + } catch(SQLException e) { + tryToClose(rs); + tryToClose(ps); + throw new DbException(e); + } + } + + public Collection<PrivateMessageHeader> getPrivateMessageHeaders( + Connection txn, ContactId c) throws DbException { + PreparedStatement ps = null; + ResultSet rs = null; + try { + String sql = "SELECT m.messageId, parentId, contentType, subject," + + " timestamp, read, starred, seen" + + " FROM messages AS m" + + " JOIN statuses AS s" + + " ON m.messageId = s.messageId" + + " AND m.contactId = s.contactId" + + " WHERE m.contactId = ? AND groupId IS NULL"; + ps = txn.prepareStatement(sql); + ps.setInt(1, c.getInt()); + rs = ps.executeQuery(); + List<PrivateMessageHeader> headers = + new ArrayList<PrivateMessageHeader>(); + while(rs.next()) { + MessageId id = new MessageId(rs.getBytes(1)); + byte[] b = rs.getBytes(2); + MessageId parent = b == null ? null : new MessageId(b); + String contentType = rs.getString(3); + String subject = rs.getString(4); + long timestamp = rs.getLong(5); + boolean read = rs.getBoolean(6); + boolean starred = rs.getBoolean(7); + boolean seen = rs.getBoolean(8); + headers.add(new PrivateMessageHeader(id, parent, contentType, + subject, timestamp, read, starred, c, seen)); + } + rs.close(); + ps.close(); + return Collections.unmodifiableList(headers); + } catch(SQLException e) { + tryToClose(rs); + tryToClose(ps); + throw new DbException(e); + } + } + public Rating getRating(Connection txn, AuthorId a) throws DbException { PreparedStatement ps = null; ResultSet rs = null; @@ -1834,6 +1933,7 @@ abstract class JdbcDatabase implements Database<Connection> { if(!id.equals(lastId)) { p = new TransportProperties(); properties.put(id, p); + lastId = id; } p.put(key, value); } @@ -1934,9 +2034,8 @@ abstract class JdbcDatabase implements Database<Connection> { PreparedStatement ps = null; ResultSet rs = null; try { - String sql = "SELECT e.contactId, e.transportId, epoch," - + " clockDiff, latency, alice, period, secret, outgoing," - + " centre, bitmap" + String sql = "SELECT e.contactId, e.transportId, epoch, alice," + + " period, secret, outgoing, centre, bitmap" + " FROM endpoints AS e" + " JOIN secrets AS s" + " ON e.contactId = s.contactId" @@ -1948,16 +2047,14 @@ abstract class JdbcDatabase implements Database<Connection> { ContactId c = new ContactId(rs.getInt(1)); TransportId t = new TransportId(rs.getBytes(2)); long epoch = rs.getLong(3); - long clockDiff = rs.getLong(4); - long latency = rs.getLong(5); - boolean alice = rs.getBoolean(6); - long period = rs.getLong(7); - byte[] secret = rs.getBytes(8); - long outgoing = rs.getLong(9); - long centre = rs.getLong(10); - byte[] bitmap = rs.getBytes(11); - secrets.add(new TemporarySecret(c, t, epoch, clockDiff, latency, - alice, period, secret, outgoing, centre, bitmap)); + boolean alice = rs.getBoolean(4); + long period = rs.getLong(5); + byte[] secret = rs.getBytes(6); + long outgoing = rs.getLong(7); + long centre = rs.getLong(8); + byte[] bitmap = rs.getBytes(9); + secrets.add(new TemporarySecret(c, t, epoch, alice, period, + secret, outgoing, centre, bitmap)); } rs.close(); ps.close(); @@ -2265,11 +2362,11 @@ abstract class JdbcDatabase implements Database<Connection> { ps.setBytes(2, a.getId().getBytes()); ps.addBatch(); } - int[] affectedBatch = ps.executeBatch(); - if(affectedBatch.length != acks.size()) + int[] batchAffected = ps.executeBatch(); + if(batchAffected.length != acks.size()) throw new DbStateException(); - for(int i = 0; i < affectedBatch.length; i++) { - if(affectedBatch[i] < 1) throw new DbStateException(); + for(int i = 0; i < batchAffected.length; i++) { + if(batchAffected[i] < 1) throw new DbStateException(); } ps.close(); return Collections.unmodifiableList(acks); @@ -2280,6 +2377,29 @@ abstract class JdbcDatabase implements Database<Connection> { } } + public Map<TransportId, Long> getTransportLatencies(Connection txn) + throws DbException { + PreparedStatement ps = null; + ResultSet rs = null; + try { + String sql = "SELECT transportId, maxLatency FROM transports"; + ps = txn.prepareStatement(sql); + rs = ps.executeQuery(); + Map<TransportId, Long> latencies = new HashMap<TransportId, Long>(); + while(rs.next()){ + TransportId id = new TransportId(rs.getBytes(1)); + latencies.put(id, rs.getLong(2)); + } + rs.close(); + ps.close(); + return Collections.unmodifiableMap(latencies); + } catch(SQLException e) { + tryToClose(rs); + tryToClose(ps); + throw new DbException(e); + } + } + public Collection<TransportUpdate> getTransportUpdates(Connection txn, ContactId c, long maxLatency) throws DbException { long now = clock.currentTimeMillis(); @@ -2642,11 +2762,11 @@ abstract class JdbcDatabase implements Database<Connection> { ps.setInt(2, c); ps.addBatch(); } - int[] affectedBatch = ps.executeBatch(); - if(affectedBatch.length != visible.size()) + int[] batchAffected = ps.executeBatch(); + if(batchAffected.length != visible.size()) throw new DbStateException(); - for(int i = 0; i < affectedBatch.length; i++) { - if(affectedBatch[i] != 1) throw new DbStateException(); + for(int i = 0; i < batchAffected.length; i++) { + if(batchAffected[i] != 1) throw new DbStateException(); } ps.close(); } catch(SQLException e) { @@ -2891,6 +3011,45 @@ abstract class JdbcDatabase implements Database<Connection> { } } + public void setRemoteProperties(Connection txn, ContactId c, + Map<TransportId, TransportProperties> p) throws DbException { + PreparedStatement ps = null; + try { + // Delete the existing properties, if any + String sql = "DELETE FROM contactTransportProperties" + + " WHERE contactId = ?"; + ps = txn.prepareStatement(sql); + ps.setInt(1, c.getInt()); + ps.executeUpdate(); + ps.close(); + // Store the new properties + sql = "INSERT INTO contactTransportProperties" + + " (contactId, transportId, key, value)" + + " VALUES (?, ?, ?, ?)"; + ps = txn.prepareStatement(sql); + ps.setInt(1, c.getInt()); + int batchSize = 0; + for(Entry<TransportId, TransportProperties> e : p.entrySet()) { + ps.setBytes(2, e.getKey().getBytes()); + for(Entry<String, String> e1 : e.getValue().entrySet()) { + ps.setString(3, e1.getKey()); + ps.setString(4, e1.getValue()); + ps.addBatch(); + batchSize++; + } + } + int[] batchAffected = ps.executeBatch(); + if(batchAffected.length != batchSize) throw new DbStateException(); + for(int i = 0; i < batchAffected.length; i++) { + if(batchAffected[i] != 1) throw new DbStateException(); + } + ps.close(); + } catch(SQLException e) { + tryToClose(ps); + throw new DbException(e); + } + } + public void setRemoteProperties(Connection txn, ContactId c, TransportId t, TransportProperties p, long version) throws DbException { PreparedStatement ps = null; @@ -3151,11 +3310,11 @@ abstract class JdbcDatabase implements Database<Connection> { else ps.setNull(4, BINARY); ps.addBatch(); } - int[] affectedBatch = ps.executeBatch(); - if(affectedBatch.length != subs.size()) + int[] batchAffected = ps.executeBatch(); + if(batchAffected.length != subs.size()) throw new DbStateException(); - for(int i = 0; i < affectedBatch.length; i++) { - if(affectedBatch[i] != 1) throw new DbStateException(); + for(int i = 0; i < batchAffected.length; i++) { + if(batchAffected[i] != 1) throw new DbStateException(); } ps.close(); } catch(SQLException e) { diff --git a/briar-core/src/net/sf/briar/invitation/AliceConnector.java b/briar-core/src/net/sf/briar/invitation/AliceConnector.java index 84d486d19d7dbe35036ab2745a6bdddc25416158..fc3ae0fdf25f14c344f32c5825632295571f924a 100644 --- a/briar-core/src/net/sf/briar/invitation/AliceConnector.java +++ b/briar-core/src/net/sf/briar/invitation/AliceConnector.java @@ -8,16 +8,30 @@ import java.io.IOException; import java.io.InputStream; import java.io.OutputStream; import java.security.GeneralSecurityException; +import java.util.Map; import java.util.logging.Logger; +import net.sf.briar.api.Author; +import net.sf.briar.api.AuthorFactory; +import net.sf.briar.api.LocalAuthor; +import net.sf.briar.api.TransportId; +import net.sf.briar.api.TransportProperties; import net.sf.briar.api.clock.Clock; import net.sf.briar.api.crypto.CryptoComponent; +import net.sf.briar.api.crypto.KeyManager; +import net.sf.briar.api.crypto.PseudoRandom; +import net.sf.briar.api.db.DatabaseComponent; +import net.sf.briar.api.db.DbException; import net.sf.briar.api.plugins.duplex.DuplexPlugin; import net.sf.briar.api.plugins.duplex.DuplexTransportConnection; import net.sf.briar.api.serial.Reader; import net.sf.briar.api.serial.ReaderFactory; import net.sf.briar.api.serial.Writer; import net.sf.briar.api.serial.WriterFactory; +import net.sf.briar.api.transport.ConnectionReader; +import net.sf.briar.api.transport.ConnectionReaderFactory; +import net.sf.briar.api.transport.ConnectionWriter; +import net.sf.briar.api.transport.ConnectionWriterFactory; /** A connection thread for the peer being Alice in the invitation protocol. */ class AliceConnector extends Connector { @@ -25,11 +39,17 @@ class AliceConnector extends Connector { private static final Logger LOG = Logger.getLogger(AliceConnector.class.getName()); - AliceConnector(CryptoComponent crypto, ReaderFactory readerFactory, - WriterFactory writerFactory, Clock clock, ConnectorGroup group, - DuplexPlugin plugin, int localCode, int remoteCode) { - super(crypto, readerFactory, writerFactory, clock, group, plugin, - crypto.getPseudoRandom(localCode, remoteCode)); + AliceConnector(CryptoComponent crypto, DatabaseComponent db, + ReaderFactory readerFactory, WriterFactory writerFactory, + ConnectionReaderFactory connectionReaderFactory, + ConnectionWriterFactory connectionWriterFactory, + AuthorFactory authorFactory, KeyManager keyManager, Clock clock, + ConnectorGroup group, DuplexPlugin plugin, LocalAuthor localAuthor, + Map<TransportId, TransportProperties> localProps, + PseudoRandom random) { + super(crypto, db, readerFactory, writerFactory, connectionReaderFactory, + connectionWriterFactory, authorFactory, keyManager, clock, + group, plugin, localAuthor, localProps, random); } @Override @@ -65,7 +85,7 @@ class AliceConnector extends Connector { byte[] hash = receivePublicKeyHash(r); sendPublicKey(w); byte[] key = receivePublicKey(r); - secret = deriveSharedSecret(hash, key, true); + secret = deriveMasterSecret(hash, key, true); } catch(IOException e) { if(LOG.isLoggable(WARNING)) LOG.log(WARNING, e.toString(), e); tryToClose(conn, true); @@ -76,9 +96,10 @@ class AliceConnector extends Connector { return; } // The key agreement succeeded - derive the confirmation codes - if(LOG.isLoggable(INFO)) LOG.info(pluginName + " succeeded"); + if(LOG.isLoggable(INFO)) LOG.info(pluginName + " agreement succeeded"); int[] codes = crypto.deriveConfirmationCodes(secret); - group.connectionSucceeded(codes[0], codes[1]); + int aliceCode = codes[0], bobCode = codes[1]; + group.connectionSucceeded(aliceCode, bobCode); // Exchange confirmation results try { sendConfirmation(w); @@ -97,7 +118,59 @@ class AliceConnector extends Connector { Thread.currentThread().interrupt(); return; } - // That's all, folks! + // The timestamp is taken after exhanging confirmation results + long localTimestamp = clock.currentTimeMillis(); + // Confirmation succeeded - upgrade to a secure connection + if(LOG.isLoggable(INFO)) + LOG.info(pluginName + " confirmation succeeded"); + ConnectionReader connectionReader = + connectionReaderFactory.createInvitationConnectionReader(in, + secret, false); + r = readerFactory.createReader(connectionReader.getInputStream()); + ConnectionWriter connectionWriter = + connectionWriterFactory.createInvitationConnectionWriter(out, + secret, true); + w = writerFactory.createWriter(connectionWriter.getOutputStream()); + // Derive the invitation nonces + byte[][] nonces = crypto.deriveInvitationNonces(secret); + byte[] aliceNonce = nonces[0], bobNonce = nonces[1]; + // Exchange pseudonyms, signed nonces, timestamps and transports + Author remoteAuthor; + long remoteTimestamp; + Map<TransportId, TransportProperties> remoteProps; + try { + sendPseudonym(w, aliceNonce); + sendTimestamp(w, localTimestamp); + sendTransportProperties(w); + remoteAuthor = receivePseudonym(r, bobNonce); + remoteTimestamp = receiveTimestamp(r); + remoteProps = receiveTransportProperties(r); + } catch(GeneralSecurityException e) { + if(LOG.isLoggable(WARNING)) LOG.log(WARNING, e.toString(), e); + tryToClose(conn, true); + group.pseudonymExchangeFailed(); + return; + } catch(IOException e) { + if(LOG.isLoggable(WARNING)) LOG.log(WARNING, e.toString(), e); + tryToClose(conn, true); + group.pseudonymExchangeFailed(); + return; + } + // The epoch is the minimum of the peers' timestamps + long epoch = Math.min(localTimestamp, remoteTimestamp); + // Add the contact and store the transports + try { + addContact(remoteAuthor, remoteProps, secret, epoch, true); + } catch(DbException e) { + if(LOG.isLoggable(WARNING)) LOG.log(WARNING, e.toString(), e); + tryToClose(conn, true); + group.pseudonymExchangeFailed(); + return; + } + // Pseudonym exchange succeeded + if(LOG.isLoggable(INFO)) + LOG.info(pluginName + " pseudonym exchange succeeded"); + group.pseudonymExchangeSucceeded(remoteAuthor); tryToClose(conn, false); } } \ No newline at end of file diff --git a/briar-core/src/net/sf/briar/invitation/BobConnector.java b/briar-core/src/net/sf/briar/invitation/BobConnector.java index 10c15bfe78ab638f2a7abceabec6bdc2c12598b2..da574f2badb293ec39855bcbcc24e998915d6222 100644 --- a/briar-core/src/net/sf/briar/invitation/BobConnector.java +++ b/briar-core/src/net/sf/briar/invitation/BobConnector.java @@ -8,16 +8,30 @@ import java.io.IOException; import java.io.InputStream; import java.io.OutputStream; import java.security.GeneralSecurityException; +import java.util.Map; import java.util.logging.Logger; +import net.sf.briar.api.Author; +import net.sf.briar.api.AuthorFactory; +import net.sf.briar.api.LocalAuthor; +import net.sf.briar.api.TransportId; +import net.sf.briar.api.TransportProperties; import net.sf.briar.api.clock.Clock; import net.sf.briar.api.crypto.CryptoComponent; +import net.sf.briar.api.crypto.KeyManager; +import net.sf.briar.api.crypto.PseudoRandom; +import net.sf.briar.api.db.DatabaseComponent; +import net.sf.briar.api.db.DbException; import net.sf.briar.api.plugins.duplex.DuplexPlugin; import net.sf.briar.api.plugins.duplex.DuplexTransportConnection; import net.sf.briar.api.serial.Reader; import net.sf.briar.api.serial.ReaderFactory; import net.sf.briar.api.serial.Writer; import net.sf.briar.api.serial.WriterFactory; +import net.sf.briar.api.transport.ConnectionReader; +import net.sf.briar.api.transport.ConnectionReaderFactory; +import net.sf.briar.api.transport.ConnectionWriter; +import net.sf.briar.api.transport.ConnectionWriterFactory; /** A connection thread for the peer being Bob in the invitation protocol. */ class BobConnector extends Connector { @@ -25,11 +39,17 @@ class BobConnector extends Connector { private static final Logger LOG = Logger.getLogger(BobConnector.class.getName()); - BobConnector(CryptoComponent crypto, ReaderFactory readerFactory, - WriterFactory writerFactory, Clock clock, ConnectorGroup group, - DuplexPlugin plugin, int localCode, int remoteCode) { - super(crypto, readerFactory, writerFactory, clock, group, plugin, - crypto.getPseudoRandom(remoteCode, localCode)); + BobConnector(CryptoComponent crypto, DatabaseComponent db, + ReaderFactory readerFactory, WriterFactory writerFactory, + ConnectionReaderFactory connectionReaderFactory, + ConnectionWriterFactory connectionWriterFactory, + AuthorFactory authorFactory, KeyManager keyManager, Clock clock, + ConnectorGroup group, DuplexPlugin plugin, LocalAuthor localAuthor, + Map<TransportId, TransportProperties> localProps, + PseudoRandom random) { + super(crypto, db, readerFactory, writerFactory, connectionReaderFactory, + connectionWriterFactory, authorFactory, keyManager, clock, + group, plugin, localAuthor, localProps, random); } @Override @@ -65,7 +85,7 @@ class BobConnector extends Connector { sendPublicKeyHash(w); byte[] key = receivePublicKey(r); sendPublicKey(w); - secret = deriveSharedSecret(hash, key, false); + secret = deriveMasterSecret(hash, key, false); } catch(IOException e) { if(LOG.isLoggable(WARNING)) LOG.log(WARNING, e.toString(), e); tryToClose(conn, true); @@ -76,14 +96,15 @@ class BobConnector extends Connector { return; } // The key agreement succeeded - derive the confirmation codes - if(LOG.isLoggable(INFO)) LOG.info(pluginName + " succeeded"); + if(LOG.isLoggable(INFO)) LOG.info(pluginName + " agreement succeeded"); int[] codes = crypto.deriveConfirmationCodes(secret); - group.connectionSucceeded(codes[1], codes[0]); + int aliceCode = codes[0], bobCode = codes[1]; + group.connectionSucceeded(bobCode, aliceCode); // Exchange confirmation results try { - sendConfirmation(w); if(receiveConfirmation(r)) group.remoteConfirmationSucceeded(); else group.remoteConfirmationFailed(); + sendConfirmation(w); } catch(IOException e) { if(LOG.isLoggable(WARNING)) LOG.log(WARNING, e.toString(), e); tryToClose(conn, true); @@ -97,7 +118,59 @@ class BobConnector extends Connector { Thread.currentThread().interrupt(); return; } - // That's all, folks! + // The timestamp is taken after exhanging confirmation results + long localTimestamp = clock.currentTimeMillis(); + // Confirmation succeeded - upgrade to a secure connection + if(LOG.isLoggable(INFO)) + LOG.info(pluginName + " confirmation succeeded"); + ConnectionReader connectionReader = + connectionReaderFactory.createInvitationConnectionReader(in, + secret, true); + r = readerFactory.createReader(connectionReader.getInputStream()); + ConnectionWriter connectionWriter = + connectionWriterFactory.createInvitationConnectionWriter(out, + secret, false); + w = writerFactory.createWriter(connectionWriter.getOutputStream()); + // Derive the nonces + byte[][] nonces = crypto.deriveInvitationNonces(secret); + byte[] aliceNonce = nonces[0], bobNonce = nonces[1]; + // Exchange pseudonyms, signed nonces, timestamps and transports + Author remoteAuthor; + long remoteTimestamp; + Map<TransportId, TransportProperties> remoteProps; + try { + remoteAuthor = receivePseudonym(r, aliceNonce); + remoteTimestamp = receiveTimestamp(r); + remoteProps = receiveTransportProperties(r); + sendPseudonym(w, bobNonce); + sendTimestamp(w, localTimestamp); + sendTransportProperties(w); + } catch(GeneralSecurityException e) { + if(LOG.isLoggable(WARNING)) LOG.log(WARNING, e.toString(), e); + tryToClose(conn, true); + group.pseudonymExchangeFailed(); + return; + } catch(IOException e) { + if(LOG.isLoggable(WARNING)) LOG.log(WARNING, e.toString(), e); + tryToClose(conn, true); + group.pseudonymExchangeFailed(); + return; + } + // The epoch is the minimum of the peers' timestamps + long epoch = Math.min(localTimestamp, remoteTimestamp); + // Add the contact and store the transports + try { + addContact(remoteAuthor, remoteProps, secret, epoch, true); + } catch(DbException e) { + if(LOG.isLoggable(WARNING)) LOG.log(WARNING, e.toString(), e); + tryToClose(conn, true); + group.pseudonymExchangeFailed(); + return; + } + // Pseudonym exchange succeeded + if(LOG.isLoggable(INFO)) + LOG.info(pluginName + " pseudonym exchange succeeded"); + group.pseudonymExchangeSucceeded(remoteAuthor); tryToClose(conn, false); } } diff --git a/briar-core/src/net/sf/briar/invitation/Connector.java b/briar-core/src/net/sf/briar/invitation/Connector.java index 67895642f3bb592299e42414b5d1c92f6aa85ec5..4dcf3c3d0c21ce1f862baa32688143faa193d776 100644 --- a/briar-core/src/net/sf/briar/invitation/Connector.java +++ b/briar-core/src/net/sf/briar/invitation/Connector.java @@ -2,28 +2,53 @@ package net.sf.briar.invitation; import static java.util.logging.Level.INFO; import static java.util.logging.Level.WARNING; +import static net.sf.briar.api.messaging.MessagingConstants.MAX_AUTHOR_NAME_LENGTH; +import static net.sf.briar.api.messaging.MessagingConstants.MAX_PROPERTY_LENGTH; +import static net.sf.briar.api.messaging.MessagingConstants.MAX_PUBLIC_KEY_LENGTH; +import static net.sf.briar.api.messaging.MessagingConstants.MAX_SIGNATURE_LENGTH; import static net.sf.briar.api.plugins.InvitationConstants.CONNECTION_TIMEOUT; import static net.sf.briar.api.plugins.InvitationConstants.HASH_LENGTH; -import static net.sf.briar.api.plugins.InvitationConstants.MAX_PUBLIC_KEY_LENGTH; import java.io.IOException; import java.security.GeneralSecurityException; import java.security.KeyPair; +import java.security.Signature; +import java.util.ArrayList; import java.util.Arrays; +import java.util.Collections; +import java.util.Comparator; +import java.util.HashMap; +import java.util.List; +import java.util.Map; +import java.util.Map.Entry; import java.util.logging.Logger; +import net.sf.briar.api.Author; +import net.sf.briar.api.AuthorFactory; +import net.sf.briar.api.ContactId; import net.sf.briar.api.FormatException; +import net.sf.briar.api.LocalAuthor; +import net.sf.briar.api.TransportId; +import net.sf.briar.api.TransportProperties; +import net.sf.briar.api.UniqueId; import net.sf.briar.api.clock.Clock; import net.sf.briar.api.crypto.CryptoComponent; +import net.sf.briar.api.crypto.KeyManager; import net.sf.briar.api.crypto.KeyParser; import net.sf.briar.api.crypto.MessageDigest; import net.sf.briar.api.crypto.PseudoRandom; +import net.sf.briar.api.db.DatabaseComponent; +import net.sf.briar.api.db.DbException; +import net.sf.briar.api.db.NoSuchTransportException; import net.sf.briar.api.plugins.duplex.DuplexPlugin; import net.sf.briar.api.plugins.duplex.DuplexTransportConnection; import net.sf.briar.api.serial.Reader; import net.sf.briar.api.serial.ReaderFactory; import net.sf.briar.api.serial.Writer; import net.sf.briar.api.serial.WriterFactory; +import net.sf.briar.api.transport.ConnectionReaderFactory; +import net.sf.briar.api.transport.ConnectionWriterFactory; +import net.sf.briar.api.transport.Endpoint; abstract class Connector extends Thread { @@ -31,11 +56,18 @@ abstract class Connector extends Thread { Logger.getLogger(Connector.class.getName()); protected final CryptoComponent crypto; + protected final DatabaseComponent db; protected final ReaderFactory readerFactory; protected final WriterFactory writerFactory; + protected final ConnectionReaderFactory connectionReaderFactory; + protected final ConnectionWriterFactory connectionWriterFactory; + protected final AuthorFactory authorFactory; + protected final KeyManager keyManager; protected final Clock clock; protected final ConnectorGroup group; protected final DuplexPlugin plugin; + protected final LocalAuthor localAuthor; + protected final Map<TransportId, TransportProperties> localProps; protected final PseudoRandom random; protected final String pluginName; @@ -43,16 +75,28 @@ abstract class Connector extends Thread { private final KeyParser keyParser; private final MessageDigest messageDigest; - Connector(CryptoComponent crypto, ReaderFactory readerFactory, - WriterFactory writerFactory, Clock clock, ConnectorGroup group, - DuplexPlugin plugin, PseudoRandom random) { + Connector(CryptoComponent crypto, DatabaseComponent db, + ReaderFactory readerFactory, WriterFactory writerFactory, + ConnectionReaderFactory connectionReaderFactory, + ConnectionWriterFactory connectionWriterFactory, + AuthorFactory authorFactory, KeyManager keyManager, Clock clock, + ConnectorGroup group, DuplexPlugin plugin, LocalAuthor localAuthor, + Map<TransportId, TransportProperties> localProps, + PseudoRandom random) { super("Connector"); this.crypto = crypto; + this.db = db; this.readerFactory = readerFactory; this.writerFactory = writerFactory; + this.connectionReaderFactory = connectionReaderFactory; + this.connectionWriterFactory = connectionWriterFactory; + this.authorFactory = authorFactory; + this.keyManager = keyManager; this.clock = clock; this.group = group; this.plugin = plugin; + this.localAuthor = localAuthor; + this.localProps = localProps; this.random = random; pluginName = plugin.getClass().getName(); keyPair = crypto.generateAgreementKeyPair(); @@ -87,16 +131,6 @@ abstract class Connector extends Thread { } } - protected void tryToClose(DuplexTransportConnection conn, - boolean exception) { - try { - if(LOG.isLoggable(INFO)) LOG.info("Closing connection"); - conn.dispose(exception, true); - } catch(IOException e) { - if(LOG.isLoggable(WARNING)) LOG.log(WARNING, e.toString(), e); - } - } - protected void sendPublicKeyHash(Writer w) throws IOException { w.writeBytes(messageDigest.digest(keyPair.getPublic().getEncoded())); w.flush(); @@ -116,18 +150,15 @@ abstract class Connector extends Thread { if(LOG.isLoggable(INFO)) LOG.info(pluginName + " sent key"); } - protected byte[] receivePublicKey(Reader r) throws IOException { + protected byte[] receivePublicKey(Reader r) throws GeneralSecurityException, + IOException { byte[] b = r.readBytes(MAX_PUBLIC_KEY_LENGTH); - try { - keyParser.parsePublicKey(b); - } catch(GeneralSecurityException e) { - throw new FormatException(); - } + keyParser.parsePublicKey(b); if(LOG.isLoggable(INFO)) LOG.info(pluginName + " received key"); return b; } - protected byte[] deriveSharedSecret(byte[] hash, byte[] key, boolean alice) + protected byte[] deriveMasterSecret(byte[] hash, byte[] key, boolean alice) throws GeneralSecurityException { // Check that the hash matches the key if(!Arrays.equals(hash, messageDigest.digest(key))) { @@ -135,16 +166,16 @@ abstract class Connector extends Thread { LOG.info(pluginName + " hash does not match key"); throw new GeneralSecurityException(); } - // Derive the shared secret - return crypto.deriveInitialSecret(key, keyPair, alice); + // Derive the master secret + return crypto.deriveMasterSecret(key, keyPair, alice); } protected void sendConfirmation(Writer w) throws IOException, InterruptedException { boolean matched = group.waitForLocalConfirmationResult(); - if(LOG.isLoggable(INFO)) LOG.info(pluginName + " sent confirmation"); w.writeBoolean(matched); w.flush(); + if(LOG.isLoggable(INFO)) LOG.info(pluginName + " sent confirmation"); } protected boolean receiveConfirmation(Reader r) throws IOException { @@ -153,4 +184,137 @@ abstract class Connector extends Thread { LOG.info(pluginName + " received confirmation"); return matched; } + + protected void sendPseudonym(Writer w, byte[] nonce) + throws GeneralSecurityException, IOException { + // Sign the nonce + Signature signature = crypto.getSignature(); + KeyParser keyParser = crypto.getSignatureKeyParser(); + byte[] privateKey = localAuthor.getPrivateKey(); + signature.initSign(keyParser.parsePrivateKey(privateKey)); + signature.update(nonce); + byte[] sig = signature.sign(); + // Write the name, public key and signature + w.writeString(localAuthor.getName()); + w.writeBytes(localAuthor.getPublicKey()); + w.writeBytes(sig); + w.flush(); + if(LOG.isLoggable(INFO)) LOG.info(pluginName + " sent pseudonym"); + } + + protected Author receivePseudonym(Reader r, byte[] nonce) + throws GeneralSecurityException, IOException { + // Read the name, public key and signature + String name = r.readString(MAX_AUTHOR_NAME_LENGTH); + byte[] publicKey = r.readBytes(MAX_PUBLIC_KEY_LENGTH); + byte[] sig = r.readBytes(MAX_SIGNATURE_LENGTH); + if(LOG.isLoggable(INFO)) LOG.info(pluginName + " received pseudonym"); + // Verify the signature + Signature signature = crypto.getSignature(); + KeyParser keyParser = crypto.getSignatureKeyParser(); + signature.initVerify(keyParser.parsePublicKey(publicKey)); + signature.update(nonce); + if(!signature.verify(sig)) { + if(LOG.isLoggable(INFO)) + LOG.info(pluginName + " invalid signature"); + throw new GeneralSecurityException(); + } + return authorFactory.createAuthor(name, publicKey); + } + + protected void sendTimestamp(Writer w, long timestamp) throws IOException { + w.writeInt64(timestamp); + w.flush(); + if(LOG.isLoggable(INFO)) LOG.info(pluginName + " sent timestamp"); + } + + protected long receiveTimestamp(Reader r) throws IOException { + long timestamp = r.readInt64(); + if(timestamp < 0) throw new FormatException(); + if(LOG.isLoggable(INFO)) LOG.info(pluginName + " received timestamp"); + return timestamp; + } + + protected void sendTransportProperties(Writer w) throws IOException { + w.writeListStart(); + for(Entry<TransportId, TransportProperties> e : localProps.entrySet()) { + w.writeBytes(e.getKey().getBytes()); + w.writeMap(e.getValue()); + } + w.writeListEnd(); + w.flush(); + if(LOG.isLoggable(INFO)) + LOG.info(pluginName + " sent transport properties"); + } + + protected Map<TransportId, TransportProperties> receiveTransportProperties( + Reader r) throws IOException { + Map<TransportId, TransportProperties> remoteProps = + new HashMap<TransportId, TransportProperties>(); + r.readListStart(); + while(!r.hasListEnd()) { + byte[] b = r.readBytes(UniqueId.LENGTH); + if(b.length != UniqueId.LENGTH) throw new FormatException(); + TransportId id = new TransportId(b); + r.setMaxStringLength(MAX_PROPERTY_LENGTH); + Map<String, String> p = r.readMap(String.class, String.class); + r.resetMaxStringLength(); + remoteProps.put(id, new TransportProperties(p)); + } + r.readListEnd(); + if(LOG.isLoggable(INFO)) + LOG.info(pluginName + " received transport properties"); + return remoteProps; + } + + protected void addContact(Author remoteAuthor, + Map<TransportId, TransportProperties> remoteProps, byte[] secret, + long epoch, boolean alice) throws DbException { + // Add the contact to the database + ContactId c = db.addContact(remoteAuthor, localAuthor.getId()); + // Store the remote transport properties + db.setRemoteProperties(c, remoteProps); + // Create an endpoint for each transport shared with the contact + List<TransportId> ids = new ArrayList<TransportId>(); + for(TransportId id : localProps.keySet()) + if(remoteProps.containsKey(id)) ids.add(id); + // Assign indices to the transports in a deterministic way + Collections.sort(ids, TransportIdComparator.INSTANCE); + int size = ids.size(); + for(int i = 0; i < size; i++) { + Endpoint ep = new Endpoint(c, ids.get(i), epoch, alice); + try { + db.addEndpoint(ep); + } catch(NoSuchTransportException e) { + continue; + } + keyManager.endpointAdded(ep, crypto.deriveInitialSecret(secret, i)); + } + } + + protected void tryToClose(DuplexTransportConnection conn, + boolean exception) { + try { + if(LOG.isLoggable(INFO)) LOG.info("Closing connection"); + conn.dispose(exception, true); + } catch(IOException e) { + if(LOG.isLoggable(WARNING)) LOG.log(WARNING, e.toString(), e); + } + } + + private static class TransportIdComparator + implements Comparator<TransportId> { + + private static final TransportIdComparator INSTANCE = + new TransportIdComparator(); + + public int compare(TransportId t1, TransportId t2) { + byte[] b1 = t1.getBytes(), b2 = t2.getBytes(); + for(int i = 0; i < UniqueId.LENGTH; i++) { + if((b1[i] & 0xff) < (b2[i] & 0xff)) return -1; + if((b1[i] & 0xff) > (b2[i] & 0xff)) return 1; + } + return 0; + } + } } diff --git a/briar-core/src/net/sf/briar/invitation/ConnectorGroup.java b/briar-core/src/net/sf/briar/invitation/ConnectorGroup.java index 1076f026b431640fafa2e1690070eccbc0a3924c..19033ca576a83f6214936fbdee3e8f0e015311cd 100644 --- a/briar-core/src/net/sf/briar/invitation/ConnectorGroup.java +++ b/briar-core/src/net/sf/briar/invitation/ConnectorGroup.java @@ -6,13 +6,24 @@ import static net.sf.briar.api.plugins.InvitationConstants.CONFIRMATION_TIMEOUT; import java.util.ArrayList; import java.util.Collection; +import java.util.Map; import java.util.concurrent.CopyOnWriteArrayList; import java.util.concurrent.CountDownLatch; import java.util.concurrent.atomic.AtomicBoolean; import java.util.logging.Logger; +import net.sf.briar.api.Author; +import net.sf.briar.api.AuthorFactory; +import net.sf.briar.api.AuthorId; +import net.sf.briar.api.LocalAuthor; +import net.sf.briar.api.TransportId; +import net.sf.briar.api.TransportProperties; import net.sf.briar.api.clock.Clock; import net.sf.briar.api.crypto.CryptoComponent; +import net.sf.briar.api.crypto.KeyManager; +import net.sf.briar.api.crypto.PseudoRandom; +import net.sf.briar.api.db.DatabaseComponent; +import net.sf.briar.api.db.DbException; import net.sf.briar.api.invitation.InvitationListener; import net.sf.briar.api.invitation.InvitationState; import net.sf.briar.api.invitation.InvitationTask; @@ -20,6 +31,8 @@ import net.sf.briar.api.plugins.PluginManager; import net.sf.briar.api.plugins.duplex.DuplexPlugin; import net.sf.briar.api.serial.ReaderFactory; import net.sf.briar.api.serial.WriterFactory; +import net.sf.briar.api.transport.ConnectionReaderFactory; +import net.sf.briar.api.transport.ConnectionWriterFactory; /** A task consisting of one or more parallel connection attempts. */ class ConnectorGroup extends Thread implements InvitationTask { @@ -28,10 +41,16 @@ class ConnectorGroup extends Thread implements InvitationTask { Logger.getLogger(ConnectorGroup.class.getName()); private final CryptoComponent crypto; + private final DatabaseComponent db; private final ReaderFactory readerFactory; private final WriterFactory writerFactory; + private final ConnectionReaderFactory connectionReaderFactory; + private final ConnectionWriterFactory connectionWriterFactory; + private final AuthorFactory authorFactory; + private final KeyManager keyManager; private final Clock clock; private final PluginManager pluginManager; + private final AuthorId localAuthorId; private final int localInvitationCode, remoteInvitationCode; private final Collection<InvitationListener> listeners; private final AtomicBoolean connected; @@ -47,17 +66,27 @@ class ConnectorGroup extends Thread implements InvitationTask { private boolean connectionFailed = false; private boolean localCompared = false, remoteCompared = false; private boolean localMatched = false, remoteMatched = false; - - ConnectorGroup(CryptoComponent crypto, ReaderFactory readerFactory, - WriterFactory writerFactory, Clock clock, - PluginManager pluginManager, int localInvitationCode, - int remoteInvitationCode) { + private String remoteName = null; + + ConnectorGroup(CryptoComponent crypto, DatabaseComponent db, + ReaderFactory readerFactory, WriterFactory writerFactory, + ConnectionReaderFactory connectionReaderFactory, + ConnectionWriterFactory connectionWriterFactory, + AuthorFactory authorFactory, KeyManager keyManager, Clock clock, + PluginManager pluginManager, AuthorId localAuthorId, + int localInvitationCode, int remoteInvitationCode) { super("ConnectorGroup"); this.crypto = crypto; + this.db = db; this.readerFactory = readerFactory; this.writerFactory = writerFactory; + this.connectionReaderFactory = connectionReaderFactory; + this.connectionWriterFactory = connectionWriterFactory; + this.authorFactory = authorFactory; + this.keyManager = keyManager; this.clock = clock; this.pluginManager = pluginManager; + this.localAuthorId = localAuthorId; this.localInvitationCode = localInvitationCode; this.remoteInvitationCode = remoteInvitationCode; listeners = new CopyOnWriteArrayList<InvitationListener>(); @@ -68,8 +97,9 @@ class ConnectorGroup extends Thread implements InvitationTask { public synchronized InvitationState addListener(InvitationListener l) { listeners.add(l); return new InvitationState(localInvitationCode, remoteInvitationCode, - localConfirmationCode, remoteConfirmationCode, connectionFailed, - localCompared, remoteCompared, localMatched, remoteMatched); + localConfirmationCode, remoteConfirmationCode, + connectionFailed, localCompared, remoteCompared, localMatched, + remoteMatched, remoteName); } public void removeListener(InvitationListener l) { @@ -82,22 +112,34 @@ class ConnectorGroup extends Thread implements InvitationTask { @Override public void run() { + LocalAuthor localAuthor; + Map<TransportId, TransportProperties> localProps; + // Load the local pseudonym and transport properties + try { + localAuthor = db.getLocalAuthor(localAuthorId); + localProps = db.getLocalProperties(); + } catch(DbException e) { + if(LOG.isLoggable(WARNING)) LOG.log(WARNING, e.toString(), e); + synchronized(this) { + connectionFailed = true; + } + for(InvitationListener l : listeners) l.connectionFailed(); + return; + } // Start the connection threads Collection<Connector> connectors = new ArrayList<Connector>(); // Alice is the party with the smaller invitation code if(localInvitationCode < remoteInvitationCode) { for(DuplexPlugin plugin : pluginManager.getInvitationPlugins()) { - Connector c = new AliceConnector(crypto, readerFactory, - writerFactory, clock, this, plugin, localInvitationCode, - remoteInvitationCode); + Connector c = createAliceConnector(plugin, localAuthor, + localProps); connectors.add(c); c.start(); } } else { for(DuplexPlugin plugin: pluginManager.getInvitationPlugins()) { - Connector c = (new BobConnector(crypto, readerFactory, - writerFactory, clock, this, plugin, localInvitationCode, - remoteInvitationCode)); + Connector c = createBobConnector(plugin, localAuthor, + localProps); connectors.add(c); c.start(); } @@ -118,6 +160,28 @@ class ConnectorGroup extends Thread implements InvitationTask { } } + private Connector createAliceConnector(DuplexPlugin plugin, + LocalAuthor localAuthor, + Map<TransportId, TransportProperties> localProps) { + PseudoRandom random = crypto.getPseudoRandom(localInvitationCode, + remoteInvitationCode); + return new AliceConnector(crypto, db, readerFactory, writerFactory, + connectionReaderFactory, connectionWriterFactory, authorFactory, + keyManager, clock, this, plugin, localAuthor, localProps, + random); + } + + private Connector createBobConnector(DuplexPlugin plugin, + LocalAuthor localAuthor, + Map<TransportId, TransportProperties> localProps) { + PseudoRandom random = crypto.getPseudoRandom(remoteInvitationCode, + localInvitationCode); + return new BobConnector(crypto, db, readerFactory, writerFactory, + connectionReaderFactory, connectionWriterFactory, authorFactory, + keyManager, clock, this, plugin, localAuthor, localProps, + random); + } + public void localConfirmationSucceeded() { synchronized(this) { localCompared = true; @@ -167,4 +231,17 @@ class ConnectorGroup extends Thread implements InvitationTask { return localMatched; } } + + void pseudonymExchangeSucceeded(Author remoteAuthor) { + String name = remoteAuthor.getName(); + synchronized(this) { + remoteName = name; + } + for(InvitationListener l : listeners) + l.pseudonymExchangeSucceeded(name); + } + + void pseudonymExchangeFailed() { + for(InvitationListener l : listeners) l.pseudonymExchangeFailed(); + } } diff --git a/briar-core/src/net/sf/briar/invitation/InvitationTaskFactoryImpl.java b/briar-core/src/net/sf/briar/invitation/InvitationTaskFactoryImpl.java index 2debc5e7eb4f36ec7a25ddafd975660e8a90f191..62ffa37cf2b11a5ed12e01c41c7bd907d0ba2afa 100644 --- a/briar-core/src/net/sf/briar/invitation/InvitationTaskFactoryImpl.java +++ b/briar-core/src/net/sf/briar/invitation/InvitationTaskFactoryImpl.java @@ -1,36 +1,58 @@ package net.sf.briar.invitation; +import net.sf.briar.api.AuthorFactory; +import net.sf.briar.api.AuthorId; import net.sf.briar.api.clock.Clock; import net.sf.briar.api.crypto.CryptoComponent; +import net.sf.briar.api.crypto.KeyManager; +import net.sf.briar.api.db.DatabaseComponent; import net.sf.briar.api.invitation.InvitationTask; import net.sf.briar.api.invitation.InvitationTaskFactory; import net.sf.briar.api.plugins.PluginManager; import net.sf.briar.api.serial.ReaderFactory; import net.sf.briar.api.serial.WriterFactory; +import net.sf.briar.api.transport.ConnectionReaderFactory; +import net.sf.briar.api.transport.ConnectionWriterFactory; import com.google.inject.Inject; class InvitationTaskFactoryImpl implements InvitationTaskFactory { private final CryptoComponent crypto; + private final DatabaseComponent db; private final ReaderFactory readerFactory; private final WriterFactory writerFactory; + private final ConnectionReaderFactory connectionReaderFactory; + private final ConnectionWriterFactory connectionWriterFactory; + private final AuthorFactory authorFactory; + private final KeyManager keyManager; private final Clock clock; private final PluginManager pluginManager; @Inject - InvitationTaskFactoryImpl(CryptoComponent crypto, + InvitationTaskFactoryImpl(CryptoComponent crypto, DatabaseComponent db, ReaderFactory readerFactory, WriterFactory writerFactory, - Clock clock, PluginManager pluginManager) { + ConnectionReaderFactory connectionReaderFactory, + ConnectionWriterFactory connectionWriterFactory, + AuthorFactory authorFactory, KeyManager keyManager, Clock clock, + PluginManager pluginManager) { this.crypto = crypto; + this.db = db; this.readerFactory = readerFactory; this.writerFactory = writerFactory; + this.connectionReaderFactory = connectionReaderFactory; + this.connectionWriterFactory = connectionWriterFactory; + this.authorFactory = authorFactory; + this.keyManager = keyManager; this.clock = clock; this.pluginManager = pluginManager; } - public InvitationTask createTask(int localCode, int remoteCode) { - return new ConnectorGroup(crypto, readerFactory, writerFactory, clock, - pluginManager, localCode, remoteCode); + public InvitationTask createTask(AuthorId localAuthorId, int localCode, + int remoteCode) { + return new ConnectorGroup(crypto, db, readerFactory, writerFactory, + connectionReaderFactory, connectionWriterFactory, + authorFactory, keyManager, clock, pluginManager, localAuthorId, + localCode, remoteCode); } } diff --git a/briar-core/src/net/sf/briar/messaging/AuthorFactoryImpl.java b/briar-core/src/net/sf/briar/messaging/AuthorFactoryImpl.java index 407cc9ebb491a82ff3a38f0fd58481b594e31d89..976094a1971d9861b6c0067ed20dd47f5f40a49a 100644 --- a/briar-core/src/net/sf/briar/messaging/AuthorFactoryImpl.java +++ b/briar-core/src/net/sf/briar/messaging/AuthorFactoryImpl.java @@ -5,11 +5,11 @@ import static net.sf.briar.api.messaging.Types.AUTHOR; import java.io.ByteArrayOutputStream; import java.io.IOException; +import net.sf.briar.api.Author; +import net.sf.briar.api.AuthorFactory; +import net.sf.briar.api.AuthorId; import net.sf.briar.api.crypto.CryptoComponent; import net.sf.briar.api.crypto.MessageDigest; -import net.sf.briar.api.messaging.Author; -import net.sf.briar.api.messaging.AuthorFactory; -import net.sf.briar.api.messaging.AuthorId; import net.sf.briar.api.serial.Writer; import net.sf.briar.api.serial.WriterFactory; diff --git a/briar-core/src/net/sf/briar/messaging/AuthorReader.java b/briar-core/src/net/sf/briar/messaging/AuthorReader.java index 410fdbb772d6798c93a239fd6bdb125160f9c0ac..6a04f0d5e18ab318e185edef403eba0d8da4ca28 100644 --- a/briar-core/src/net/sf/briar/messaging/AuthorReader.java +++ b/briar-core/src/net/sf/briar/messaging/AuthorReader.java @@ -6,10 +6,10 @@ import static net.sf.briar.api.messaging.Types.AUTHOR; import java.io.IOException; +import net.sf.briar.api.Author; +import net.sf.briar.api.AuthorId; import net.sf.briar.api.crypto.CryptoComponent; import net.sf.briar.api.crypto.MessageDigest; -import net.sf.briar.api.messaging.Author; -import net.sf.briar.api.messaging.AuthorId; import net.sf.briar.api.serial.DigestingConsumer; import net.sf.briar.api.serial.Reader; import net.sf.briar.api.serial.StructReader; diff --git a/briar-core/src/net/sf/briar/messaging/MessageFactoryImpl.java b/briar-core/src/net/sf/briar/messaging/MessageFactoryImpl.java index a6c93b06ed8c720c69f979363a4bcc670364e0a7..5eb28cc36462d5595ea9bbd28883b1bcef94d548 100644 --- a/briar-core/src/net/sf/briar/messaging/MessageFactoryImpl.java +++ b/briar-core/src/net/sf/briar/messaging/MessageFactoryImpl.java @@ -20,10 +20,10 @@ import java.security.PrivateKey; import java.security.SecureRandom; import java.security.Signature; +import net.sf.briar.api.Author; import net.sf.briar.api.clock.Clock; import net.sf.briar.api.crypto.CryptoComponent; import net.sf.briar.api.crypto.MessageDigest; -import net.sf.briar.api.messaging.Author; import net.sf.briar.api.messaging.Group; import net.sf.briar.api.messaging.Message; import net.sf.briar.api.messaging.MessageFactory; diff --git a/briar-core/src/net/sf/briar/messaging/MessageImpl.java b/briar-core/src/net/sf/briar/messaging/MessageImpl.java index 4ff50f31024ae6b4a78a821fc211949108132607..5fb145bec57f7bcb4ba964529557a6548de88158 100644 --- a/briar-core/src/net/sf/briar/messaging/MessageImpl.java +++ b/briar-core/src/net/sf/briar/messaging/MessageImpl.java @@ -1,7 +1,7 @@ package net.sf.briar.messaging; import static net.sf.briar.api.messaging.MessagingConstants.MAX_BODY_LENGTH; -import net.sf.briar.api.messaging.Author; +import net.sf.briar.api.Author; import net.sf.briar.api.messaging.Group; import net.sf.briar.api.messaging.Message; import net.sf.briar.api.messaging.MessageId; diff --git a/briar-core/src/net/sf/briar/messaging/MessageReader.java b/briar-core/src/net/sf/briar/messaging/MessageReader.java index 73c05505160e0bb0e66f548322f25ff94bcaab74..5c39e0eede79cbdfcf25887044a3aec177b132d8 100644 --- a/briar-core/src/net/sf/briar/messaging/MessageReader.java +++ b/briar-core/src/net/sf/briar/messaging/MessageReader.java @@ -13,11 +13,11 @@ import java.nio.ByteBuffer; import java.nio.charset.Charset; import java.nio.charset.CharsetDecoder; +import net.sf.briar.api.Author; import net.sf.briar.api.FormatException; -import net.sf.briar.api.messaging.Author; +import net.sf.briar.api.UniqueId; import net.sf.briar.api.messaging.Group; import net.sf.briar.api.messaging.MessageId; -import net.sf.briar.api.messaging.UniqueId; import net.sf.briar.api.messaging.UnverifiedMessage; import net.sf.briar.api.serial.CopyingConsumer; import net.sf.briar.api.serial.CountingConsumer; diff --git a/briar-core/src/net/sf/briar/messaging/MessageVerifierImpl.java b/briar-core/src/net/sf/briar/messaging/MessageVerifierImpl.java index de57bbb3a1e8a8164723aae7a0c9aea747a4a84e..eeaece89ab7ec9d95e3c0d83eb0d2b93aa132040 100644 --- a/briar-core/src/net/sf/briar/messaging/MessageVerifierImpl.java +++ b/briar-core/src/net/sf/briar/messaging/MessageVerifierImpl.java @@ -4,10 +4,10 @@ import java.security.GeneralSecurityException; import java.security.PublicKey; import java.security.Signature; +import net.sf.briar.api.Author; import net.sf.briar.api.crypto.CryptoComponent; import net.sf.briar.api.crypto.KeyParser; import net.sf.briar.api.crypto.MessageDigest; -import net.sf.briar.api.messaging.Author; import net.sf.briar.api.messaging.Group; import net.sf.briar.api.messaging.Message; import net.sf.briar.api.messaging.MessageId; diff --git a/briar-core/src/net/sf/briar/messaging/MessagingModule.java b/briar-core/src/net/sf/briar/messaging/MessagingModule.java index c98dd04675ef925d8646987cf149d5646871ffc8..a92c75e459ebea9597deed2b87e7660fc5f00600 100644 --- a/briar-core/src/net/sf/briar/messaging/MessagingModule.java +++ b/briar-core/src/net/sf/briar/messaging/MessagingModule.java @@ -1,8 +1,8 @@ package net.sf.briar.messaging; +import net.sf.briar.api.Author; +import net.sf.briar.api.AuthorFactory; import net.sf.briar.api.crypto.CryptoComponent; -import net.sf.briar.api.messaging.Author; -import net.sf.briar.api.messaging.AuthorFactory; import net.sf.briar.api.messaging.Group; import net.sf.briar.api.messaging.GroupFactory; import net.sf.briar.api.messaging.MessageFactory; diff --git a/briar-core/src/net/sf/briar/messaging/PacketReaderImpl.java b/briar-core/src/net/sf/briar/messaging/PacketReaderImpl.java index 9795dfe78132d562f7f440e782f851c6ecfd209c..f5eaa98e48be9a3d017fc7cdd2f6f44fbed3b7f6 100644 --- a/briar-core/src/net/sf/briar/messaging/PacketReaderImpl.java +++ b/briar-core/src/net/sf/briar/messaging/PacketReaderImpl.java @@ -24,7 +24,9 @@ import java.util.Map; import net.sf.briar.api.Bytes; import net.sf.briar.api.FormatException; +import net.sf.briar.api.TransportId; import net.sf.briar.api.TransportProperties; +import net.sf.briar.api.UniqueId; import net.sf.briar.api.messaging.Ack; import net.sf.briar.api.messaging.MessageId; import net.sf.briar.api.messaging.Offer; @@ -35,9 +37,7 @@ import net.sf.briar.api.messaging.RetentionUpdate; import net.sf.briar.api.messaging.SubscriptionAck; import net.sf.briar.api.messaging.SubscriptionUpdate; import net.sf.briar.api.messaging.TransportAck; -import net.sf.briar.api.messaging.TransportId; import net.sf.briar.api.messaging.TransportUpdate; -import net.sf.briar.api.messaging.UniqueId; import net.sf.briar.api.messaging.UnverifiedMessage; import net.sf.briar.api.serial.Consumer; import net.sf.briar.api.serial.CountingConsumer; diff --git a/briar-core/src/net/sf/briar/messaging/duplex/DuplexConnection.java b/briar-core/src/net/sf/briar/messaging/duplex/DuplexConnection.java index c0604546f76b93f697afadca3f5ed2817a0ddf0d..18000e59c12152ed9c015367cbe4c80344eb522f 100644 --- a/briar-core/src/net/sf/briar/messaging/duplex/DuplexConnection.java +++ b/briar-core/src/net/sf/briar/messaging/duplex/DuplexConnection.java @@ -2,8 +2,8 @@ package net.sf.briar.messaging.duplex; import static java.util.logging.Level.INFO; import static java.util.logging.Level.WARNING; -import static net.sf.briar.api.Rating.GOOD; import static net.sf.briar.api.messaging.MessagingConstants.MAX_PACKET_LENGTH; +import static net.sf.briar.api.messaging.Rating.GOOD; import java.io.IOException; import java.io.InputStream; @@ -23,6 +23,7 @@ import java.util.logging.Logger; import net.sf.briar.api.ContactId; import net.sf.briar.api.FormatException; +import net.sf.briar.api.TransportId; import net.sf.briar.api.crypto.CryptoExecutor; import net.sf.briar.api.db.DatabaseComponent; import net.sf.briar.api.db.DatabaseExecutor; @@ -55,7 +56,6 @@ import net.sf.briar.api.messaging.RetentionUpdate; import net.sf.briar.api.messaging.SubscriptionAck; import net.sf.briar.api.messaging.SubscriptionUpdate; import net.sf.briar.api.messaging.TransportAck; -import net.sf.briar.api.messaging.TransportId; import net.sf.briar.api.messaging.TransportUpdate; import net.sf.briar.api.messaging.UnverifiedMessage; import net.sf.briar.api.plugins.duplex.DuplexTransportConnection; diff --git a/briar-core/src/net/sf/briar/messaging/duplex/DuplexConnectionFactoryImpl.java b/briar-core/src/net/sf/briar/messaging/duplex/DuplexConnectionFactoryImpl.java index f141fce031e54e0f3658207fe0a6e3bcb8dd8873..aaea38cbaba01bbdec92f06452682318b5780196 100644 --- a/briar-core/src/net/sf/briar/messaging/duplex/DuplexConnectionFactoryImpl.java +++ b/briar-core/src/net/sf/briar/messaging/duplex/DuplexConnectionFactoryImpl.java @@ -6,6 +6,7 @@ import java.util.concurrent.Executor; import java.util.logging.Logger; import net.sf.briar.api.ContactId; +import net.sf.briar.api.TransportId; import net.sf.briar.api.crypto.CryptoExecutor; import net.sf.briar.api.crypto.KeyManager; import net.sf.briar.api.db.DatabaseComponent; @@ -13,7 +14,6 @@ import net.sf.briar.api.db.DatabaseExecutor; import net.sf.briar.api.messaging.MessageVerifier; import net.sf.briar.api.messaging.PacketReaderFactory; import net.sf.briar.api.messaging.PacketWriterFactory; -import net.sf.briar.api.messaging.TransportId; import net.sf.briar.api.messaging.duplex.DuplexConnectionFactory; import net.sf.briar.api.plugins.duplex.DuplexTransportConnection; import net.sf.briar.api.transport.ConnectionContext; diff --git a/briar-core/src/net/sf/briar/messaging/simplex/IncomingSimplexConnection.java b/briar-core/src/net/sf/briar/messaging/simplex/IncomingSimplexConnection.java index cfb18c5039fba8c6b1d44b1c25f77cacf4cc9525..2ec4cd2d3be0d9282d4d2f48b905af3b22614841 100644 --- a/briar-core/src/net/sf/briar/messaging/simplex/IncomingSimplexConnection.java +++ b/briar-core/src/net/sf/briar/messaging/simplex/IncomingSimplexConnection.java @@ -10,6 +10,7 @@ import java.util.logging.Logger; import net.sf.briar.api.ContactId; import net.sf.briar.api.FormatException; +import net.sf.briar.api.TransportId; import net.sf.briar.api.crypto.CryptoExecutor; import net.sf.briar.api.db.DatabaseComponent; import net.sf.briar.api.db.DatabaseExecutor; @@ -24,7 +25,6 @@ import net.sf.briar.api.messaging.RetentionUpdate; import net.sf.briar.api.messaging.SubscriptionAck; import net.sf.briar.api.messaging.SubscriptionUpdate; import net.sf.briar.api.messaging.TransportAck; -import net.sf.briar.api.messaging.TransportId; import net.sf.briar.api.messaging.TransportUpdate; import net.sf.briar.api.messaging.UnverifiedMessage; import net.sf.briar.api.plugins.simplex.SimplexTransportReader; diff --git a/briar-core/src/net/sf/briar/messaging/simplex/OutgoingSimplexConnection.java b/briar-core/src/net/sf/briar/messaging/simplex/OutgoingSimplexConnection.java index 920a7724427cae909edafb250cad20db7361e710..759c085c329e544735372b88f654f9484d6cec12 100644 --- a/briar-core/src/net/sf/briar/messaging/simplex/OutgoingSimplexConnection.java +++ b/briar-core/src/net/sf/briar/messaging/simplex/OutgoingSimplexConnection.java @@ -10,6 +10,7 @@ import java.util.Collection; import java.util.logging.Logger; import net.sf.briar.api.ContactId; +import net.sf.briar.api.TransportId; import net.sf.briar.api.db.DatabaseComponent; import net.sf.briar.api.db.DbException; import net.sf.briar.api.messaging.Ack; @@ -20,7 +21,6 @@ import net.sf.briar.api.messaging.RetentionUpdate; import net.sf.briar.api.messaging.SubscriptionAck; import net.sf.briar.api.messaging.SubscriptionUpdate; import net.sf.briar.api.messaging.TransportAck; -import net.sf.briar.api.messaging.TransportId; import net.sf.briar.api.messaging.TransportUpdate; import net.sf.briar.api.plugins.simplex.SimplexTransportWriter; import net.sf.briar.api.transport.ConnectionContext; diff --git a/briar-core/src/net/sf/briar/messaging/simplex/SimplexConnectionFactoryImpl.java b/briar-core/src/net/sf/briar/messaging/simplex/SimplexConnectionFactoryImpl.java index b7f5ecdd3b11b688624532fecd65f0ccfe3b78d0..aed86936a68b2531e39ea2f2a3041080ff907017 100644 --- a/briar-core/src/net/sf/briar/messaging/simplex/SimplexConnectionFactoryImpl.java +++ b/briar-core/src/net/sf/briar/messaging/simplex/SimplexConnectionFactoryImpl.java @@ -6,6 +6,7 @@ import java.util.concurrent.Executor; import java.util.logging.Logger; import net.sf.briar.api.ContactId; +import net.sf.briar.api.TransportId; import net.sf.briar.api.crypto.CryptoExecutor; import net.sf.briar.api.crypto.KeyManager; import net.sf.briar.api.db.DatabaseComponent; @@ -13,7 +14,6 @@ import net.sf.briar.api.db.DatabaseExecutor; import net.sf.briar.api.messaging.MessageVerifier; import net.sf.briar.api.messaging.PacketReaderFactory; import net.sf.briar.api.messaging.PacketWriterFactory; -import net.sf.briar.api.messaging.TransportId; import net.sf.briar.api.messaging.simplex.SimplexConnectionFactory; import net.sf.briar.api.plugins.simplex.SimplexTransportReader; import net.sf.briar.api.plugins.simplex.SimplexTransportWriter; diff --git a/briar-core/src/net/sf/briar/plugins/PluginManagerImpl.java b/briar-core/src/net/sf/briar/plugins/PluginManagerImpl.java index 902fbbd9c63db2b814133ae8f8fb4feba8bdc233..e7d6f070aea2308637f1ce133b16a499292c31cf 100644 --- a/briar-core/src/net/sf/briar/plugins/PluginManagerImpl.java +++ b/briar-core/src/net/sf/briar/plugins/PluginManagerImpl.java @@ -16,11 +16,11 @@ import java.util.logging.Logger; import net.sf.briar.api.ContactId; import net.sf.briar.api.TransportConfig; +import net.sf.briar.api.TransportId; import net.sf.briar.api.TransportProperties; import net.sf.briar.api.android.AndroidExecutor; import net.sf.briar.api.db.DatabaseComponent; import net.sf.briar.api.db.DbException; -import net.sf.briar.api.messaging.TransportId; import net.sf.briar.api.plugins.Plugin; import net.sf.briar.api.plugins.PluginCallback; import net.sf.briar.api.plugins.PluginExecutor; @@ -88,12 +88,6 @@ class PluginManagerImpl implements PluginManager { LOG.warning("Duplicate transport ID: " + id); continue; } - try { - db.addTransport(id); - } catch(DbException e) { - if(LOG.isLoggable(WARNING)) LOG.log(WARNING, e.toString(), e); - continue; - } SimplexCallback callback = new SimplexCallback(id); SimplexPlugin plugin = factory.createPlugin(callback); if(plugin == null) { @@ -103,6 +97,12 @@ class PluginManagerImpl implements PluginManager { } continue; } + try { + db.addTransport(id, plugin.getMaxLatency()); + } catch(DbException e) { + if(LOG.isLoggable(WARNING)) LOG.log(WARNING, e.toString(), e); + continue; + } try { if(plugin.start()) { simplexPlugins.add(plugin); @@ -124,12 +124,6 @@ class PluginManagerImpl implements PluginManager { LOG.warning("Duplicate transport ID: " + id); continue; } - try { - db.addTransport(id); - } catch(DbException e) { - if(LOG.isLoggable(WARNING)) LOG.log(WARNING, e.toString(), e); - continue; - } DuplexCallback callback = new DuplexCallback(id); DuplexPlugin plugin = factory.createPlugin(callback); if(plugin == null) { @@ -139,6 +133,12 @@ class PluginManagerImpl implements PluginManager { } continue; } + try { + db.addTransport(id, plugin.getMaxLatency()); + } catch(DbException e) { + if(LOG.isLoggable(WARNING)) LOG.log(WARNING, e.toString(), e); + continue; + } try { if(plugin.start()) { duplexPlugins.add(plugin); @@ -197,10 +197,10 @@ class PluginManagerImpl implements PluginManager { } public synchronized Collection<DuplexPlugin> getInvitationPlugins() { - Collection<DuplexPlugin> supported = new ArrayList<DuplexPlugin>(); + List<DuplexPlugin> supported = new ArrayList<DuplexPlugin>(); for(DuplexPlugin d : duplexPlugins) if(d.supportsInvitations()) supported.add(d); - return supported; + return Collections.unmodifiableList(supported); } private abstract class PluginCallbackImpl implements PluginCallback { diff --git a/briar-core/src/net/sf/briar/plugins/bluetooth/BluetoothPlugin.java b/briar-core/src/net/sf/briar/plugins/bluetooth/BluetoothPlugin.java index d8fa83b7af7ba5b5b697d7d75229dfb66beaa466..61ae77f5196bb0dacd5307620e5a35dbb9f911ac 100644 --- a/briar-core/src/net/sf/briar/plugins/bluetooth/BluetoothPlugin.java +++ b/briar-core/src/net/sf/briar/plugins/bluetooth/BluetoothPlugin.java @@ -26,10 +26,10 @@ import javax.microedition.io.StreamConnection; import javax.microedition.io.StreamConnectionNotifier; import net.sf.briar.api.ContactId; +import net.sf.briar.api.TransportId; import net.sf.briar.api.TransportProperties; import net.sf.briar.api.clock.Clock; import net.sf.briar.api.crypto.PseudoRandom; -import net.sf.briar.api.messaging.TransportId; import net.sf.briar.api.plugins.PluginExecutor; import net.sf.briar.api.plugins.duplex.DuplexPlugin; import net.sf.briar.api.plugins.duplex.DuplexPluginCallback; diff --git a/briar-core/src/net/sf/briar/plugins/bluetooth/BluetoothPluginFactory.java b/briar-core/src/net/sf/briar/plugins/bluetooth/BluetoothPluginFactory.java index b3e225cdc6c8ec6332e48c70cd4a64fdd995f134..4a07399189a1962f785dbc3ef05b306e34cd71f1 100644 --- a/briar-core/src/net/sf/briar/plugins/bluetooth/BluetoothPluginFactory.java +++ b/briar-core/src/net/sf/briar/plugins/bluetooth/BluetoothPluginFactory.java @@ -3,9 +3,9 @@ package net.sf.briar.plugins.bluetooth; import java.security.SecureRandom; import java.util.concurrent.Executor; +import net.sf.briar.api.TransportId; import net.sf.briar.api.clock.Clock; import net.sf.briar.api.clock.SystemClock; -import net.sf.briar.api.messaging.TransportId; import net.sf.briar.api.plugins.PluginExecutor; import net.sf.briar.api.plugins.duplex.DuplexPlugin; import net.sf.briar.api.plugins.duplex.DuplexPluginCallback; diff --git a/briar-core/src/net/sf/briar/plugins/droidtooth/DroidtoothPlugin.java b/briar-core/src/net/sf/briar/plugins/droidtooth/DroidtoothPlugin.java index 099d98ec1334a98b0f85577e2ca0e51fbe5811c5..25e3b673d852062b342285010fded74dd4afe501 100644 --- a/briar-core/src/net/sf/briar/plugins/droidtooth/DroidtoothPlugin.java +++ b/briar-core/src/net/sf/briar/plugins/droidtooth/DroidtoothPlugin.java @@ -24,10 +24,10 @@ import java.util.concurrent.Executor; import java.util.logging.Logger; import net.sf.briar.api.ContactId; +import net.sf.briar.api.TransportId; import net.sf.briar.api.TransportProperties; import net.sf.briar.api.android.AndroidExecutor; import net.sf.briar.api.crypto.PseudoRandom; -import net.sf.briar.api.messaging.TransportId; import net.sf.briar.api.plugins.PluginExecutor; import net.sf.briar.api.plugins.duplex.DuplexPlugin; import net.sf.briar.api.plugins.duplex.DuplexPluginCallback; diff --git a/briar-core/src/net/sf/briar/plugins/droidtooth/DroidtoothPluginFactory.java b/briar-core/src/net/sf/briar/plugins/droidtooth/DroidtoothPluginFactory.java index 9c0cc7cf4c3c1bf81ee329216c69f60b5d46b9e6..078b8b8cde8478bf6214964f7a876c1a0feea4e2 100644 --- a/briar-core/src/net/sf/briar/plugins/droidtooth/DroidtoothPluginFactory.java +++ b/briar-core/src/net/sf/briar/plugins/droidtooth/DroidtoothPluginFactory.java @@ -3,8 +3,8 @@ package net.sf.briar.plugins.droidtooth; import java.security.SecureRandom; import java.util.concurrent.Executor; +import net.sf.briar.api.TransportId; import net.sf.briar.api.android.AndroidExecutor; -import net.sf.briar.api.messaging.TransportId; import net.sf.briar.api.plugins.PluginExecutor; import net.sf.briar.api.plugins.duplex.DuplexPlugin; import net.sf.briar.api.plugins.duplex.DuplexPluginCallback; diff --git a/briar-core/src/net/sf/briar/plugins/file/RemovableDrivePlugin.java b/briar-core/src/net/sf/briar/plugins/file/RemovableDrivePlugin.java index fecb1dfe7157ccbe73529470931d32513cec92c6..112377f23697c4153454a06382bb5163a822e336 100644 --- a/briar-core/src/net/sf/briar/plugins/file/RemovableDrivePlugin.java +++ b/briar-core/src/net/sf/briar/plugins/file/RemovableDrivePlugin.java @@ -12,7 +12,7 @@ import java.util.concurrent.Executor; import java.util.logging.Logger; import net.sf.briar.api.ContactId; -import net.sf.briar.api.messaging.TransportId; +import net.sf.briar.api.TransportId; import net.sf.briar.api.plugins.PluginExecutor; import net.sf.briar.api.plugins.simplex.SimplexPluginCallback; import net.sf.briar.util.StringUtils; diff --git a/briar-core/src/net/sf/briar/plugins/file/RemovableDrivePluginFactory.java b/briar-core/src/net/sf/briar/plugins/file/RemovableDrivePluginFactory.java index 845c38d9c40f4954191467f402b65c27138fc704..41e909825db053f0da71a6bdf31ac8b85581822c 100644 --- a/briar-core/src/net/sf/briar/plugins/file/RemovableDrivePluginFactory.java +++ b/briar-core/src/net/sf/briar/plugins/file/RemovableDrivePluginFactory.java @@ -2,7 +2,7 @@ package net.sf.briar.plugins.file; import java.util.concurrent.Executor; -import net.sf.briar.api.messaging.TransportId; +import net.sf.briar.api.TransportId; import net.sf.briar.api.plugins.PluginExecutor; import net.sf.briar.api.plugins.simplex.SimplexPlugin; import net.sf.briar.api.plugins.simplex.SimplexPluginCallback; diff --git a/briar-core/src/net/sf/briar/plugins/modem/ModemPlugin.java b/briar-core/src/net/sf/briar/plugins/modem/ModemPlugin.java index cb838c5988a4cce7438570bbf30f01af25a6008f..b0f245fb8005cbea01a6945948109da23563f607 100644 --- a/briar-core/src/net/sf/briar/plugins/modem/ModemPlugin.java +++ b/briar-core/src/net/sf/briar/plugins/modem/ModemPlugin.java @@ -17,9 +17,9 @@ import java.util.concurrent.Executor; import java.util.logging.Logger; import net.sf.briar.api.ContactId; +import net.sf.briar.api.TransportId; import net.sf.briar.api.TransportProperties; import net.sf.briar.api.crypto.PseudoRandom; -import net.sf.briar.api.messaging.TransportId; import net.sf.briar.api.plugins.PluginExecutor; import net.sf.briar.api.plugins.duplex.DuplexPlugin; import net.sf.briar.api.plugins.duplex.DuplexPluginCallback; diff --git a/briar-core/src/net/sf/briar/plugins/modem/ModemPluginFactory.java b/briar-core/src/net/sf/briar/plugins/modem/ModemPluginFactory.java index 6a63508df3575a5acf58a96a25abcc11b878638e..d753fb88647f860532bd3962467680380b46bca6 100644 --- a/briar-core/src/net/sf/briar/plugins/modem/ModemPluginFactory.java +++ b/briar-core/src/net/sf/briar/plugins/modem/ModemPluginFactory.java @@ -2,7 +2,7 @@ package net.sf.briar.plugins.modem; import java.util.concurrent.Executor; -import net.sf.briar.api.messaging.TransportId; +import net.sf.briar.api.TransportId; import net.sf.briar.api.plugins.PluginExecutor; import net.sf.briar.api.plugins.duplex.DuplexPlugin; import net.sf.briar.api.plugins.duplex.DuplexPluginCallback; diff --git a/briar-core/src/net/sf/briar/plugins/tcp/LanTcpPlugin.java b/briar-core/src/net/sf/briar/plugins/tcp/LanTcpPlugin.java index 8b82d7e75038c5371ceec577e46d67bc02d83027..d0df485d8e3de42dd27fcf0d4b024fe2393c8cb1 100644 --- a/briar-core/src/net/sf/briar/plugins/tcp/LanTcpPlugin.java +++ b/briar-core/src/net/sf/briar/plugins/tcp/LanTcpPlugin.java @@ -21,10 +21,10 @@ import java.util.List; import java.util.concurrent.Executor; import java.util.logging.Logger; +import net.sf.briar.api.TransportId; import net.sf.briar.api.TransportProperties; import net.sf.briar.api.clock.Clock; import net.sf.briar.api.crypto.PseudoRandom; -import net.sf.briar.api.messaging.TransportId; import net.sf.briar.api.plugins.PluginExecutor; import net.sf.briar.api.plugins.duplex.DuplexPluginCallback; import net.sf.briar.api.plugins.duplex.DuplexTransportConnection; diff --git a/briar-core/src/net/sf/briar/plugins/tcp/LanTcpPluginFactory.java b/briar-core/src/net/sf/briar/plugins/tcp/LanTcpPluginFactory.java index d743a4831e84788b54f2025ff7383501f3028f6d..89d836199f6b8464bd80976e611a0fa0ecd95d3d 100644 --- a/briar-core/src/net/sf/briar/plugins/tcp/LanTcpPluginFactory.java +++ b/briar-core/src/net/sf/briar/plugins/tcp/LanTcpPluginFactory.java @@ -2,9 +2,9 @@ package net.sf.briar.plugins.tcp; import java.util.concurrent.Executor; +import net.sf.briar.api.TransportId; import net.sf.briar.api.clock.Clock; import net.sf.briar.api.clock.SystemClock; -import net.sf.briar.api.messaging.TransportId; import net.sf.briar.api.plugins.PluginExecutor; import net.sf.briar.api.plugins.duplex.DuplexPlugin; import net.sf.briar.api.plugins.duplex.DuplexPluginCallback; diff --git a/briar-core/src/net/sf/briar/plugins/tcp/WanTcpPlugin.java b/briar-core/src/net/sf/briar/plugins/tcp/WanTcpPlugin.java index 19bfb3321c69a3e63c83424095655586d356529e..f133b5fa34e16679343c4fccb73c311aea3af8f4 100644 --- a/briar-core/src/net/sf/briar/plugins/tcp/WanTcpPlugin.java +++ b/briar-core/src/net/sf/briar/plugins/tcp/WanTcpPlugin.java @@ -14,9 +14,9 @@ import java.util.List; import java.util.concurrent.Executor; import java.util.logging.Logger; +import net.sf.briar.api.TransportId; import net.sf.briar.api.TransportProperties; import net.sf.briar.api.crypto.PseudoRandom; -import net.sf.briar.api.messaging.TransportId; import net.sf.briar.api.plugins.PluginExecutor; import net.sf.briar.api.plugins.duplex.DuplexPluginCallback; import net.sf.briar.api.plugins.duplex.DuplexTransportConnection; diff --git a/briar-core/src/net/sf/briar/plugins/tcp/WanTcpPluginFactory.java b/briar-core/src/net/sf/briar/plugins/tcp/WanTcpPluginFactory.java index 52dfd215761b29bb42ed830a5e717d9562d444ae..33f3f5abf7e3c9bcea87081aba68eb3d00beb4c3 100644 --- a/briar-core/src/net/sf/briar/plugins/tcp/WanTcpPluginFactory.java +++ b/briar-core/src/net/sf/briar/plugins/tcp/WanTcpPluginFactory.java @@ -2,8 +2,8 @@ package net.sf.briar.plugins.tcp; import java.util.concurrent.Executor; +import net.sf.briar.api.TransportId; import net.sf.briar.api.lifecycle.ShutdownManager; -import net.sf.briar.api.messaging.TransportId; import net.sf.briar.api.plugins.PluginExecutor; import net.sf.briar.api.plugins.duplex.DuplexPlugin; import net.sf.briar.api.plugins.duplex.DuplexPluginCallback; diff --git a/briar-core/src/net/sf/briar/serial/SerialComponentImpl.java b/briar-core/src/net/sf/briar/serial/SerialComponentImpl.java index bf64c7fd2e486237183cd243782a1c598b4e5234..e55e94db0e991684097a0c9944e10b3723a4e143 100644 --- a/briar-core/src/net/sf/briar/serial/SerialComponentImpl.java +++ b/briar-core/src/net/sf/briar/serial/SerialComponentImpl.java @@ -1,6 +1,6 @@ package net.sf.briar.serial; -import net.sf.briar.api.messaging.UniqueId; +import net.sf.briar.api.UniqueId; import net.sf.briar.api.serial.SerialComponent; class SerialComponentImpl implements SerialComponent { diff --git a/briar-core/src/net/sf/briar/transport/ConnectionDispatcherImpl.java b/briar-core/src/net/sf/briar/transport/ConnectionDispatcherImpl.java index c8e0de79b0944a24d78895fcae48aedc97168eb2..ecd57aa2b73f5846223b77ac95d4137b006cc293 100644 --- a/briar-core/src/net/sf/briar/transport/ConnectionDispatcherImpl.java +++ b/briar-core/src/net/sf/briar/transport/ConnectionDispatcherImpl.java @@ -10,8 +10,8 @@ import java.util.concurrent.Executor; import java.util.logging.Logger; import net.sf.briar.api.ContactId; +import net.sf.briar.api.TransportId; import net.sf.briar.api.db.DbException; -import net.sf.briar.api.messaging.TransportId; import net.sf.briar.api.messaging.duplex.DuplexConnectionFactory; import net.sf.briar.api.messaging.simplex.SimplexConnectionFactory; import net.sf.briar.api.plugins.duplex.DuplexTransportConnection; diff --git a/briar-core/src/net/sf/briar/transport/ConnectionReaderFactoryImpl.java b/briar-core/src/net/sf/briar/transport/ConnectionReaderFactoryImpl.java index dd31f3fe83da03795301ce2a1ca5d435cfa71508..1af211a5326f9073dc3322d0819e64c90f7058ec 100644 --- a/briar-core/src/net/sf/briar/transport/ConnectionReaderFactoryImpl.java +++ b/briar-core/src/net/sf/briar/transport/ConnectionReaderFactoryImpl.java @@ -33,4 +33,12 @@ class ConnectionReaderFactoryImpl implements ConnectionReaderFactory { crypto.getFrameCipher(), frameKey, MAX_FRAME_LENGTH); return new ConnectionReaderImpl(encryption, MAX_FRAME_LENGTH); } + + public ConnectionReader createInvitationConnectionReader(InputStream in, + byte[] secret, boolean alice) { + ErasableKey frameKey = crypto.deriveFrameKey(secret, 0, true, alice); + FrameReader encryption = new IncomingEncryptionLayer(in, + crypto.getFrameCipher(), frameKey, MAX_FRAME_LENGTH); + return new ConnectionReaderImpl(encryption, MAX_FRAME_LENGTH); + } } diff --git a/briar-core/src/net/sf/briar/transport/ConnectionRecogniserImpl.java b/briar-core/src/net/sf/briar/transport/ConnectionRecogniserImpl.java index 9a4af1ec5db0216f3c71e04b084049666777e776..080860b5b98e35501bd11c89652d3f97c78451c3 100644 --- a/briar-core/src/net/sf/briar/transport/ConnectionRecogniserImpl.java +++ b/briar-core/src/net/sf/briar/transport/ConnectionRecogniserImpl.java @@ -4,10 +4,10 @@ import java.util.HashMap; import java.util.Map; import net.sf.briar.api.ContactId; +import net.sf.briar.api.TransportId; import net.sf.briar.api.crypto.CryptoComponent; import net.sf.briar.api.db.DatabaseComponent; import net.sf.briar.api.db.DbException; -import net.sf.briar.api.messaging.TransportId; import net.sf.briar.api.transport.ConnectionContext; import net.sf.briar.api.transport.ConnectionRecogniser; import net.sf.briar.api.transport.TemporarySecret; diff --git a/briar-core/src/net/sf/briar/transport/ConnectionRegistryImpl.java b/briar-core/src/net/sf/briar/transport/ConnectionRegistryImpl.java index d1a5b48a64126977fcb5207fe89abd3221a99844..fc919d6a83f28047ae77ab5ca52fa3f657de6eb9 100644 --- a/briar-core/src/net/sf/briar/transport/ConnectionRegistryImpl.java +++ b/briar-core/src/net/sf/briar/transport/ConnectionRegistryImpl.java @@ -9,7 +9,7 @@ import java.util.Map; import java.util.concurrent.CopyOnWriteArrayList; import net.sf.briar.api.ContactId; -import net.sf.briar.api.messaging.TransportId; +import net.sf.briar.api.TransportId; import net.sf.briar.api.transport.ConnectionListener; import net.sf.briar.api.transport.ConnectionRegistry; diff --git a/briar-core/src/net/sf/briar/transport/ConnectionWriterFactoryImpl.java b/briar-core/src/net/sf/briar/transport/ConnectionWriterFactoryImpl.java index 9e57870a233a840aac73635e4d939a5f0bbbd4ca..2d8a74dca485a00687a95b30659b12b59303d757 100644 --- a/briar-core/src/net/sf/briar/transport/ConnectionWriterFactoryImpl.java +++ b/briar-core/src/net/sf/briar/transport/ConnectionWriterFactoryImpl.java @@ -13,7 +13,6 @@ import net.sf.briar.api.transport.ConnectionContext; import net.sf.briar.api.transport.ConnectionWriter; import net.sf.briar.api.transport.ConnectionWriterFactory; - import com.google.inject.Inject; class ConnectionWriterFactoryImpl implements ConnectionWriterFactory { @@ -48,4 +47,13 @@ class ConnectionWriterFactoryImpl implements ConnectionWriterFactory { } return new ConnectionWriterImpl(encryption, MAX_FRAME_LENGTH); } + + public ConnectionWriter createInvitationConnectionWriter(OutputStream out, + byte[] secret, boolean alice) { + ErasableKey frameKey = crypto.deriveFrameKey(secret, 0, true, alice); + FrameWriter encryption = new OutgoingEncryptionLayer(out, + Long.MAX_VALUE, crypto.getFrameCipher(), frameKey, + MAX_FRAME_LENGTH); + return new ConnectionWriterImpl(encryption, MAX_FRAME_LENGTH); + } } \ No newline at end of file diff --git a/briar-core/src/net/sf/briar/transport/ConnectionWriterImpl.java b/briar-core/src/net/sf/briar/transport/ConnectionWriterImpl.java index 4d1b2c571a79bb756c8c6e32a52de70ee5fe376e..7b75d36d6203a6a7267200aa6035505fa3d17eaa 100644 --- a/briar-core/src/net/sf/briar/transport/ConnectionWriterImpl.java +++ b/briar-core/src/net/sf/briar/transport/ConnectionWriterImpl.java @@ -6,7 +6,6 @@ import static net.sf.briar.api.transport.TransportConstants.MAC_LENGTH; import java.io.IOException; import java.io.OutputStream; - import net.sf.briar.api.transport.ConnectionWriter; /** diff --git a/briar-core/src/net/sf/briar/transport/KeyManagerImpl.java b/briar-core/src/net/sf/briar/transport/KeyManagerImpl.java index b80a3605b359ca3cdeded3d136c0ec1c717368b6..9c51a19181576b85249ab4b97d489204b4d79a5d 100644 --- a/briar-core/src/net/sf/briar/transport/KeyManagerImpl.java +++ b/briar-core/src/net/sf/briar/transport/KeyManagerImpl.java @@ -1,6 +1,7 @@ package net.sf.briar.transport; import static java.util.logging.Level.WARNING; +import static net.sf.briar.api.transport.TransportConstants.MAX_CLOCK_DIFFERENCE; import java.util.ArrayList; import java.util.Arrays; @@ -12,6 +13,7 @@ import java.util.TimerTask; import java.util.logging.Logger; import net.sf.briar.api.ContactId; +import net.sf.briar.api.TransportId; import net.sf.briar.api.clock.Clock; import net.sf.briar.api.clock.Timer; import net.sf.briar.api.crypto.CryptoComponent; @@ -21,8 +23,8 @@ import net.sf.briar.api.db.DbException; import net.sf.briar.api.db.event.ContactRemovedEvent; import net.sf.briar.api.db.event.DatabaseEvent; import net.sf.briar.api.db.event.DatabaseListener; +import net.sf.briar.api.db.event.TransportAddedEvent; import net.sf.briar.api.db.event.TransportRemovedEvent; -import net.sf.briar.api.messaging.TransportId; import net.sf.briar.api.transport.ConnectionContext; import net.sf.briar.api.transport.ConnectionRecogniser; import net.sf.briar.api.transport.Endpoint; @@ -31,6 +33,7 @@ import net.sf.briar.util.ByteUtils; import com.google.inject.Inject; +// FIXME: Don't make alien calls with a lock held class KeyManagerImpl extends TimerTask implements KeyManager, DatabaseListener { private static final int MS_BETWEEN_CHECKS = 60 * 1000; @@ -40,34 +43,38 @@ class KeyManagerImpl extends TimerTask implements KeyManager, DatabaseListener { private final CryptoComponent crypto; private final DatabaseComponent db; - private final ConnectionRecogniser recogniser; + private final ConnectionRecogniser connectionRecogniser; private final Clock clock; private final Timer timer; - // Locking: this + + // All of the following are locking: this + private final Map<TransportId, Long> maxLatencies; private final Map<EndpointKey, TemporarySecret> outgoing; - // Locking: this private final Map<EndpointKey, TemporarySecret> incomingOld; - // Locking: this private final Map<EndpointKey, TemporarySecret> incomingNew; @Inject KeyManagerImpl(CryptoComponent crypto, DatabaseComponent db, - ConnectionRecogniser recogniser, Clock clock, Timer timer) { + ConnectionRecogniser connectionRecogniser, Clock clock, + Timer timer) { this.crypto = crypto; this.db = db; - this.recogniser = recogniser; + this.connectionRecogniser = connectionRecogniser; this.clock = clock; this.timer = timer; + maxLatencies = new HashMap<TransportId, Long>(); outgoing = new HashMap<EndpointKey, TemporarySecret>(); incomingOld = new HashMap<EndpointKey, TemporarySecret>(); incomingNew = new HashMap<EndpointKey, TemporarySecret>(); } public synchronized boolean start() { - // Load the temporary secrets and the storage key from the database + db.addListener(this); + // Load the temporary secrets and transport latencies from the database Collection<TemporarySecret> secrets; try { secrets = db.getSecrets(); + maxLatencies.putAll(db.getTransportLatencies()); } catch(DbException e) { if(LOG.isLoggable(WARNING)) LOG.log(WARNING, e.toString(), e); return false; @@ -87,129 +94,111 @@ class KeyManagerImpl extends TimerTask implements KeyManager, DatabaseListener { } } // Pass the current incoming secrets to the recogniser - for(TemporarySecret s : incomingOld.values()) recogniser.addSecret(s); - for(TemporarySecret s : incomingNew.values()) recogniser.addSecret(s); + for(TemporarySecret s : incomingOld.values()) + connectionRecogniser.addSecret(s); + for(TemporarySecret s : incomingNew.values()) + connectionRecogniser.addSecret(s); // Schedule periodic key rotation timer.scheduleAtFixedRate(this, MS_BETWEEN_CHECKS, MS_BETWEEN_CHECKS); return true; } // Assigns secrets to the appropriate maps and returns any dead secrets + // Locking: this private Collection<TemporarySecret> assignSecretsToMaps(long now, Collection<TemporarySecret> secrets) { Collection<TemporarySecret> dead = new ArrayList<TemporarySecret>(); for(TemporarySecret s : secrets) { + // Discard the secret if the transport has been removed + if(!maxLatencies.containsKey(s.getTransportId())) { + ByteUtils.erase(s.getSecret()); + continue; + } EndpointKey k = new EndpointKey(s); long rotationPeriod = getRotationPeriod(s); long creationTime = getCreationTime(s); - long activationTime = creationTime + s.getClockDifference(); + long activationTime = creationTime + MAX_CLOCK_DIFFERENCE; long successorCreationTime = creationTime + rotationPeriod; long deactivationTime = activationTime + rotationPeriod; long destructionTime = successorCreationTime + rotationPeriod; - TemporarySecret dupe; // There should not be any duplicate keys if(now >= destructionTime) { dead.add(s); } else if(now >= deactivationTime) { - dupe = incomingOld.put(k, s); - if(dupe != null) throw new IllegalStateException(); + incomingOld.put(k, s); } else if(now >= successorCreationTime) { - dupe = incomingOld.put(k, s); - if(dupe != null) throw new IllegalStateException(); - dupe = outgoing.put(k, s); - if(dupe != null) throw new IllegalStateException(); + incomingOld.put(k, s); + outgoing.put(k, s); } else if(now >= activationTime) { - dupe = incomingNew.put(k, s); - if(dupe != null) throw new IllegalStateException(); - dupe = outgoing.put(k, s); - if(dupe != null) throw new IllegalStateException(); + incomingNew.put(k, s); + outgoing.put(k, s); } else if(now >= creationTime) { - dupe = incomingNew.put(k, s); - if(dupe != null) throw new IllegalStateException(); + incomingNew.put(k, s); } else { - // FIXME: What should we do if the clock moves backwards? - throw new IllegalStateException(); + throw new Error("Clock has moved backwards"); } } return dead; } // Replaces and erases the given secrets and returns any secrets created + // Locking: this private Collection<TemporarySecret> replaceDeadSecrets(long now, Collection<TemporarySecret> dead) { Collection<TemporarySecret> created = new ArrayList<TemporarySecret>(); for(TemporarySecret s : dead) { + // Work out which rotation period we're in + long rotationPeriod = getRotationPeriod(s); + long elapsed = now - s.getEpoch(); + long period = (elapsed / rotationPeriod) + 1; + if(period <= s.getPeriod()) throw new IllegalStateException(); + // Derive the two current incoming secrets + byte[] secret1 = s.getSecret(); + for(long p = s.getPeriod(); p < period; p++) { + byte[] temp = crypto.deriveNextSecret(secret1, p); + ByteUtils.erase(secret1); + secret1 = temp; + } + byte[] secret2 = crypto.deriveNextSecret(secret1, period); + // Add the incoming secrets to their respective maps - the older + // may already exist if the dead secret has a living successor EndpointKey k = new EndpointKey(s); - if(incomingNew.containsKey(k)) throw new IllegalStateException(); - byte[] secret = s.getSecret(); - long period = s.getPeriod(); - TemporarySecret dupe; // There should not be any duplicate keys - if(incomingOld.containsKey(k)) { - // The dead secret's successor is still alive - byte[] secret1 = crypto.deriveNextSecret(secret, period + 1); - TemporarySecret s1 = new TemporarySecret(s, period + 1, - secret1); - created.add(s1); - dupe = incomingNew.put(k, s1); - if(dupe != null) throw new IllegalStateException(); - long creationTime = getCreationTime(s1); - long activationTime = creationTime + s1.getClockDifference(); - if(now >= activationTime) { - dupe = outgoing.put(k, s1); - if(dupe != null) throw new IllegalStateException(); - } - } else { - // The dead secret has no living successor - long rotationPeriod = getRotationPeriod(s); - long elapsed = now - s.getEpoch(); - long currentPeriod = elapsed / rotationPeriod; - if(currentPeriod <= period) throw new IllegalStateException(); - // Derive the two current incoming secrets - byte[] secret1, secret2; - secret1 = secret; - for(long p = period; p < currentPeriod; p++) { - byte[] temp = crypto.deriveNextSecret(secret1, p); - ByteUtils.erase(secret1); - secret1 = temp; - } - secret2 = crypto.deriveNextSecret(secret1, currentPeriod); - // One of the incoming secrets is the current outgoing secret - TemporarySecret s1, s2; - s1 = new TemporarySecret(s, currentPeriod - 1, secret1); - created.add(s1); - dupe = incomingOld.put(k, s1); - if(dupe != null) throw new IllegalStateException(); - s2 = new TemporarySecret(s, currentPeriod, secret2); - created.add(s2); - dupe = incomingNew.put(k, s2); - if(dupe != null) throw new IllegalStateException(); - if(elapsed % rotationPeriod < s.getClockDifference()) { - // The outgoing secret is the newer incoming secret - dupe = outgoing.put(k, s2); - if(dupe != null) throw new IllegalStateException(); - } else { - // The outgoing secret is the older incoming secret - dupe = outgoing.put(k, s1); - if(dupe != null) throw new IllegalStateException(); - } + TemporarySecret s1 = new TemporarySecret(s, period - 1, secret1); + created.add(s1); + TemporarySecret exists = incomingOld.put(k, s1); + if(exists != null) ByteUtils.erase(exists.getSecret()); + TemporarySecret s2 = new TemporarySecret(s, period, secret2); + created.add(s2); + incomingNew.put(k, s2); + // One of the incoming secrets is the current outgoing secret + if(elapsed % rotationPeriod < MAX_CLOCK_DIFFERENCE) { + // The outgoing secret is the older incoming secret + outgoing.put(k, s1); + } else { + // The outgoing secret is the newer incoming secret + outgoing.put(k, s2); } - // Erase the dead secret - ByteUtils.erase(secret); } return created; } + // Locking: this private long getRotationPeriod(Endpoint ep) { - return 2 * ep.getClockDifference() + ep.getLatency(); + Long maxLatency = maxLatencies.get(ep.getTransportId()); + if(maxLatency == null) throw new IllegalStateException(); + return 2 * MAX_CLOCK_DIFFERENCE + maxLatency; } + // Locking: this private long getCreationTime(TemporarySecret s) { long rotationPeriod = getRotationPeriod(s); return s.getEpoch() + rotationPeriod * s.getPeriod(); } public synchronized void stop() { + db.removeListener(this); timer.cancel(); - recogniser.removeSecrets(); + connectionRecogniser.removeSecrets(); + maxLatencies.clear(); removeAndEraseSecrets(outgoing); removeAndEraseSecrets(incomingOld); removeAndEraseSecrets(incomingNew); @@ -236,50 +225,49 @@ class KeyManagerImpl extends TimerTask implements KeyManager, DatabaseListener { return new ConnectionContext(c, t, secret, connection, s.getAlice()); } - public synchronized void endpointAdded(Endpoint ep, byte[] initialSecret) { + public synchronized void endpointAdded(Endpoint ep, byte[] initialSecret) { + if(!maxLatencies.containsKey(ep.getTransportId())) { + if(LOG.isLoggable(WARNING)) LOG.warning("No such transport"); + return; + } + // Work out which rotation period we're in long now = clock.currentTimeMillis(); long rotationPeriod = getRotationPeriod(ep); long elapsed = now - ep.getEpoch(); - long currentPeriod = elapsed / rotationPeriod; - if(currentPeriod < 1) throw new IllegalArgumentException(); + long period = (elapsed / rotationPeriod) + 1; + if(period < 1) throw new IllegalStateException(); // Derive the two current incoming secrets - byte[] secret1, secret2; - secret1 = initialSecret; - for(long p = 0; p < currentPeriod; p++) { + byte[] secret1 = initialSecret; + for(long p = 0; p < period; p++) { byte[] temp = crypto.deriveNextSecret(secret1, p); ByteUtils.erase(secret1); secret1 = temp; } - secret2 = crypto.deriveNextSecret(secret1, currentPeriod); - // One of the incoming secrets is the current outgoing secret + byte[] secret2 = crypto.deriveNextSecret(secret1, period); + // Add the incoming secrets to their respective maps EndpointKey k = new EndpointKey(ep); - TemporarySecret s1, s2, dupe; - s1 = new TemporarySecret(ep, currentPeriod - 1, secret1); - dupe = incomingOld.put(k, s1); - if(dupe != null) throw new IllegalStateException(); - s2 = new TemporarySecret(ep, currentPeriod, secret2); - dupe = incomingNew.put(k, s2); - if(dupe != null) throw new IllegalStateException(); - if(elapsed % rotationPeriod < ep.getClockDifference()) { - // The outgoing secret is the newer incoming secret - dupe = outgoing.put(k, s2); - if(dupe != null) throw new IllegalStateException(); - } else { + TemporarySecret s1 = new TemporarySecret(ep, period - 1, secret1); + incomingOld.put(k, s1); + TemporarySecret s2 = new TemporarySecret(ep, period, secret2); + incomingNew.put(k, s2); + // One of the incoming secrets is the current outgoing secret + if(elapsed % rotationPeriod < MAX_CLOCK_DIFFERENCE) { // The outgoing secret is the older incoming secret - dupe = outgoing.put(k, s1); - if(dupe != null) throw new IllegalStateException(); + outgoing.put(k, s1); + } else { + // The outgoing secret is the newer incoming secret + outgoing.put(k, s2); } // Store the new secrets try { db.addSecrets(Arrays.asList(s1, s2)); } catch(DbException e) { if(LOG.isLoggable(WARNING)) LOG.log(WARNING, e.toString(), e); + return; } // Pass the new secrets to the recogniser - recogniser.addSecret(s1); - recogniser.addSecret(s2); - // Erase the initial secret - ByteUtils.erase(initialSecret); + connectionRecogniser.addSecret(s1); + connectionRecogniser.addSecret(s2); } @Override @@ -299,7 +287,7 @@ class KeyManagerImpl extends TimerTask implements KeyManager, DatabaseListener { ContactId c = s.getContactId(); TransportId t = s.getTransportId(); long period = s.getPeriod(); - recogniser.removeSecret(c, t, period); + connectionRecogniser.removeSecret(c, t, period); } // Replace any dead secrets Collection<TemporarySecret> created = replaceDeadSecrets(now, dead); @@ -311,23 +299,29 @@ class KeyManagerImpl extends TimerTask implements KeyManager, DatabaseListener { if(LOG.isLoggable(WARNING)) LOG.log(WARNING, e.toString(), e); } // Pass any secrets that have been created to the recogniser - for(TemporarySecret s : created) recogniser.addSecret(s); + for(TemporarySecret s : created) connectionRecogniser.addSecret(s); } } public void eventOccurred(DatabaseEvent e) { if(e instanceof ContactRemovedEvent) { ContactId c = ((ContactRemovedEvent) e).getContactId(); - recogniser.removeSecrets(c); + connectionRecogniser.removeSecrets(c); synchronized(this) { removeAndEraseSecrets(c, outgoing); removeAndEraseSecrets(c, incomingOld); removeAndEraseSecrets(c, incomingNew); } + } else if(e instanceof TransportAddedEvent) { + TransportAddedEvent t = (TransportAddedEvent) e; + synchronized(this) { + maxLatencies.put(t.getTransportId(), t.getMaxLatency()); + } } else if(e instanceof TransportRemovedEvent) { TransportId t = ((TransportRemovedEvent) e).getTransportId(); - recogniser.removeSecrets(t); + connectionRecogniser.removeSecrets(t); synchronized(this) { + maxLatencies.remove(t); removeAndEraseSecrets(t, outgoing); removeAndEraseSecrets(t, incomingOld); removeAndEraseSecrets(t, incomingNew); diff --git a/briar-core/src/net/sf/briar/transport/OutgoingEncryptionLayer.java b/briar-core/src/net/sf/briar/transport/OutgoingEncryptionLayer.java index 658c4a26eaa6fc2a8046520b6a9baa60d48c7731..49203a107f9e6923bf3b5ab64996c9ce946742a6 100644 --- a/briar-core/src/net/sf/briar/transport/OutgoingEncryptionLayer.java +++ b/briar-core/src/net/sf/briar/transport/OutgoingEncryptionLayer.java @@ -11,7 +11,6 @@ import java.io.IOException; import java.io.OutputStream; import java.security.GeneralSecurityException; - import net.sf.briar.api.crypto.AuthenticatedCipher; import net.sf.briar.api.crypto.ErasableKey; diff --git a/briar-core/src/net/sf/briar/transport/TransportConnectionRecogniser.java b/briar-core/src/net/sf/briar/transport/TransportConnectionRecogniser.java index 761f846a390a433d18fa3c403f8fd373003c7f6f..93de724c68707cec6d5ec59085f31cab0601ed18 100644 --- a/briar-core/src/net/sf/briar/transport/TransportConnectionRecogniser.java +++ b/briar-core/src/net/sf/briar/transport/TransportConnectionRecogniser.java @@ -11,11 +11,11 @@ import javax.crypto.Cipher; import net.sf.briar.api.Bytes; import net.sf.briar.api.ContactId; +import net.sf.briar.api.TransportId; import net.sf.briar.api.crypto.CryptoComponent; import net.sf.briar.api.crypto.ErasableKey; import net.sf.briar.api.db.DatabaseComponent; import net.sf.briar.api.db.DbException; -import net.sf.briar.api.messaging.TransportId; import net.sf.briar.api.transport.ConnectionContext; import net.sf.briar.api.transport.TemporarySecret; import net.sf.briar.util.ByteUtils; diff --git a/briar-tests/build.xml b/briar-tests/build.xml index a6e8c05845ae4560f84d66ebcbbf0375d41c9d25..455a843144d9aa867c088a4703f0cedfab26b3a0 100644 --- a/briar-tests/build.xml +++ b/briar-tests/build.xml @@ -74,6 +74,7 @@ <test name='net.sf.briar.crypto.ErasableKeyTest'/> <test name='net.sf.briar.crypto.KeyAgreementTest'/> <test name='net.sf.briar.crypto.KeyDerivationTest'/> + <test name='net.sf.briar.crypto.KeyEncodingAndParsingTest'/> <test name='net.sf.briar.db.BasicH2Test'/> <test name='net.sf.briar.db.DatabaseCleanerImplTest'/> <test name='net.sf.briar.db.DatabaseComponentImplTest'/> diff --git a/briar-tests/src/net/sf/briar/ProtocolIntegrationTest.java b/briar-tests/src/net/sf/briar/ProtocolIntegrationTest.java index fff45ea22d559dc5b9063b8011072a3b2c928ebc..76e5fecb386037b6e2d3b1cdfc2b93ec4f19ab99 100644 --- a/briar-tests/src/net/sf/briar/ProtocolIntegrationTest.java +++ b/briar-tests/src/net/sf/briar/ProtocolIntegrationTest.java @@ -14,12 +14,13 @@ import java.util.Collection; import java.util.Collections; import java.util.Random; +import net.sf.briar.api.Author; +import net.sf.briar.api.AuthorFactory; import net.sf.briar.api.ContactId; +import net.sf.briar.api.TransportId; import net.sf.briar.api.TransportProperties; import net.sf.briar.api.crypto.CryptoComponent; import net.sf.briar.api.messaging.Ack; -import net.sf.briar.api.messaging.Author; -import net.sf.briar.api.messaging.AuthorFactory; import net.sf.briar.api.messaging.Group; import net.sf.briar.api.messaging.GroupFactory; import net.sf.briar.api.messaging.Message; @@ -33,7 +34,6 @@ import net.sf.briar.api.messaging.PacketWriter; import net.sf.briar.api.messaging.PacketWriterFactory; import net.sf.briar.api.messaging.Request; import net.sf.briar.api.messaging.SubscriptionUpdate; -import net.sf.briar.api.messaging.TransportId; import net.sf.briar.api.messaging.TransportUpdate; import net.sf.briar.api.messaging.UnverifiedMessage; import net.sf.briar.api.transport.ConnectionContext; diff --git a/briar-tests/src/net/sf/briar/TestDatabaseConfig.java b/briar-tests/src/net/sf/briar/TestDatabaseConfig.java index fdfedb413f245fa2bd9095d184a7ec0a125c9129..614fadc863363a9929c52f2a17f62fa6ce3a78ef 100644 --- a/briar-tests/src/net/sf/briar/TestDatabaseConfig.java +++ b/briar-tests/src/net/sf/briar/TestDatabaseConfig.java @@ -2,7 +2,6 @@ package net.sf.briar; import java.io.File; -import net.sf.briar.api.crypto.Password; import net.sf.briar.api.db.DatabaseConfig; public class TestDatabaseConfig implements DatabaseConfig { @@ -19,12 +18,8 @@ public class TestDatabaseConfig implements DatabaseConfig { return dir; } - public Password getPassword() { - return new Password() { - public char[] getPassword() { - return "foo bar".toCharArray(); - } - }; + public char[] getPassword() { + return "foo bar".toCharArray(); } public long getMaxSize() { diff --git a/briar-tests/src/net/sf/briar/TestMessage.java b/briar-tests/src/net/sf/briar/TestMessage.java index 9a8283505eb4c893b50e30bbdbfc8cea89cdc27b..b390bd7ffe3cd5df937f0d45e426056f451e8ce6 100644 --- a/briar-tests/src/net/sf/briar/TestMessage.java +++ b/briar-tests/src/net/sf/briar/TestMessage.java @@ -3,7 +3,7 @@ package net.sf.briar; import java.io.ByteArrayInputStream; import java.io.InputStream; -import net.sf.briar.api.messaging.Author; +import net.sf.briar.api.Author; import net.sf.briar.api.messaging.Group; import net.sf.briar.api.messaging.Message; import net.sf.briar.api.messaging.MessageId; diff --git a/briar-tests/src/net/sf/briar/TestUtils.java b/briar-tests/src/net/sf/briar/TestUtils.java index 21c4beff9334ffe07d2e604767cf5bc9c287ed7f..cedb5d4281ff39c0cef14a020edb83388c7e1ec8 100644 --- a/briar-tests/src/net/sf/briar/TestUtils.java +++ b/briar-tests/src/net/sf/briar/TestUtils.java @@ -10,7 +10,7 @@ import java.util.Random; import java.util.concurrent.atomic.AtomicInteger; import junit.framework.TestCase; -import net.sf.briar.api.messaging.UniqueId; +import net.sf.briar.api.UniqueId; public class TestUtils { diff --git a/briar-tests/src/net/sf/briar/crypto/KeyAgreementTest.java b/briar-tests/src/net/sf/briar/crypto/KeyAgreementTest.java index 01a8939409f95afe8e3244eb452f54818a2ded0a..d328c35e7aea3a3c5e343a1bb148d35c350d6e35 100644 --- a/briar-tests/src/net/sf/briar/crypto/KeyAgreementTest.java +++ b/briar-tests/src/net/sf/briar/crypto/KeyAgreementTest.java @@ -14,12 +14,12 @@ public class KeyAgreementTest extends BriarTestCase { @Test public void testKeyAgreement() throws Exception { CryptoComponent crypto = new CryptoComponentImpl(); - KeyPair a = crypto.generateAgreementKeyPair(); - byte[] aPub = a.getPublic().getEncoded(); - KeyPair b = crypto.generateAgreementKeyPair(); - byte[] bPub = b.getPublic().getEncoded(); - byte[] aSecret = crypto.deriveInitialSecret(aPub, b, true); - byte[] bSecret = crypto.deriveInitialSecret(bPub, a, false); + KeyPair aPair = crypto.generateAgreementKeyPair(); + byte[] aPub = aPair.getPublic().getEncoded(); + KeyPair bPair = crypto.generateAgreementKeyPair(); + byte[] bPub = bPair.getPublic().getEncoded(); + byte[] aSecret = crypto.deriveMasterSecret(aPub, bPair, true); + byte[] bSecret = crypto.deriveMasterSecret(bPub, aPair, false); assertArrayEquals(aSecret, bSecret); } } diff --git a/briar-tests/src/net/sf/briar/crypto/KeyEncodingAndParsingTest.java b/briar-tests/src/net/sf/briar/crypto/KeyEncodingAndParsingTest.java new file mode 100644 index 0000000000000000000000000000000000000000..d327d6b83eb02f00735296d59ff38b87cb920038 --- /dev/null +++ b/briar-tests/src/net/sf/briar/crypto/KeyEncodingAndParsingTest.java @@ -0,0 +1,85 @@ +package net.sf.briar.crypto; + +import static org.junit.Assert.assertArrayEquals; + +import java.security.KeyPair; +import java.security.PrivateKey; +import java.security.PublicKey; + +import net.sf.briar.BriarTestCase; +import net.sf.briar.api.crypto.KeyParser; + +import org.junit.Test; + +public class KeyEncodingAndParsingTest extends BriarTestCase { + + private final CryptoComponentImpl crypto = new CryptoComponentImpl(); + + @Test + public void testAgreementPublicKeyEncodingAndParsing() throws Exception { + KeyParser parser = crypto.getAgreementKeyParser(); + // Generate two key pairs + KeyPair aPair = crypto.generateAgreementKeyPair(); + KeyPair bPair = crypto.generateAgreementKeyPair(); + // Derive the shared secret + PublicKey aPub = aPair.getPublic(); + byte[] secret = crypto.deriveSharedSecret(bPair.getPrivate(), aPub); + // Encode and parse the public key - no exceptions should be thrown + aPub = parser.parsePublicKey(aPub.getEncoded()); + aPub = parser.parsePublicKey(aPub.getEncoded()); + // Derive the shared secret again - it should be the same + byte[] secret1 = crypto.deriveSharedSecret(bPair.getPrivate(), aPub); + assertArrayEquals(secret, secret1); + } + + @Test + public void testAgreementPrivateKeyEncodingAndParsing() throws Exception { + KeyParser parser = crypto.getAgreementKeyParser(); + // Generate two key pairs + KeyPair aPair = crypto.generateAgreementKeyPair(); + KeyPair bPair = crypto.generateAgreementKeyPair(); + // Derive the shared secret + PrivateKey bPriv = bPair.getPrivate(); + byte[] secret = crypto.deriveSharedSecret(bPriv, aPair.getPublic()); + // Encode and parse the private key - no exceptions should be thrown + bPriv = parser.parsePrivateKey(bPriv.getEncoded()); + bPriv = parser.parsePrivateKey(bPriv.getEncoded()); + // Derive the shared secret again - it should be the same + byte[] secret1 = crypto.deriveSharedSecret(bPriv, aPair.getPublic()); + assertArrayEquals(secret, secret1); + } + + @Test + public void testSignaturePublicKeyEncodingAndParsing() throws Exception { + KeyParser parser = crypto.getSignatureKeyParser(); + // Generate two key pairs + KeyPair aPair = crypto.generateSignatureKeyPair(); + KeyPair bPair = crypto.generateSignatureKeyPair(); + // Derive the shared secret + PublicKey aPub = aPair.getPublic(); + byte[] secret = crypto.deriveSharedSecret(bPair.getPrivate(), aPub); + // Encode and parse the public key - no exceptions should be thrown + aPub = parser.parsePublicKey(aPub.getEncoded()); + aPub = parser.parsePublicKey(aPub.getEncoded()); + // Derive the shared secret again - it should be the same + byte[] secret1 = crypto.deriveSharedSecret(bPair.getPrivate(), aPub); + assertArrayEquals(secret, secret1); + } + + @Test + public void testSignaturePrivateKeyEncodingAndParsing() throws Exception { + KeyParser parser = crypto.getSignatureKeyParser(); + // Generate two key pairs + KeyPair aPair = crypto.generateSignatureKeyPair(); + KeyPair bPair = crypto.generateSignatureKeyPair(); + // Derive the shared secret + PrivateKey bPriv = bPair.getPrivate(); + byte[] secret = crypto.deriveSharedSecret(bPriv, aPair.getPublic()); + // Encode and parse the private key - no exceptions should be thrown + bPriv = parser.parsePrivateKey(bPriv.getEncoded()); + bPriv = parser.parsePrivateKey(bPriv.getEncoded()); + // Derive the shared secret again - it should be the same + byte[] secret1 = crypto.deriveSharedSecret(bPriv, aPair.getPublic()); + assertArrayEquals(secret, secret1); + } +} diff --git a/briar-tests/src/net/sf/briar/db/DatabaseComponentTest.java b/briar-tests/src/net/sf/briar/db/DatabaseComponentTest.java index 61bc729a9d6a7d6707b970c0f932ae25c305c84c..7eeb1021a5823c6b59088a7fc896ecbe035fccf5 100644 --- a/briar-tests/src/net/sf/briar/db/DatabaseComponentTest.java +++ b/briar-tests/src/net/sf/briar/db/DatabaseComponentTest.java @@ -1,7 +1,7 @@ package net.sf.briar.db; -import static net.sf.briar.api.Rating.GOOD; -import static net.sf.briar.api.Rating.UNRATED; +import static net.sf.briar.api.messaging.Rating.GOOD; +import static net.sf.briar.api.messaging.Rating.UNRATED; import java.util.ArrayList; import java.util.Arrays; @@ -14,9 +14,13 @@ import java.util.Map; import net.sf.briar.BriarTestCase; import net.sf.briar.TestMessage; import net.sf.briar.TestUtils; +import net.sf.briar.api.Author; +import net.sf.briar.api.AuthorId; import net.sf.briar.api.Contact; import net.sf.briar.api.ContactId; +import net.sf.briar.api.LocalAuthor; import net.sf.briar.api.TransportConfig; +import net.sf.briar.api.TransportId; import net.sf.briar.api.TransportProperties; import net.sf.briar.api.db.DatabaseComponent; import net.sf.briar.api.db.NoSuchContactException; @@ -33,8 +37,6 @@ import net.sf.briar.api.db.event.SubscriptionAddedEvent; import net.sf.briar.api.db.event.SubscriptionRemovedEvent; import net.sf.briar.api.lifecycle.ShutdownManager; import net.sf.briar.api.messaging.Ack; -import net.sf.briar.api.messaging.Author; -import net.sf.briar.api.messaging.AuthorId; import net.sf.briar.api.messaging.Group; import net.sf.briar.api.messaging.GroupId; import net.sf.briar.api.messaging.Message; @@ -46,7 +48,6 @@ import net.sf.briar.api.messaging.RetentionUpdate; import net.sf.briar.api.messaging.SubscriptionAck; import net.sf.briar.api.messaging.SubscriptionUpdate; import net.sf.briar.api.messaging.TransportAck; -import net.sf.briar.api.messaging.TransportId; import net.sf.briar.api.messaging.TransportUpdate; import net.sf.briar.api.transport.Endpoint; import net.sf.briar.api.transport.TemporarySecret; @@ -62,6 +63,8 @@ public abstract class DatabaseComponentTest extends BriarTestCase { protected final Group group; protected final AuthorId authorId; protected final Author author; + protected final AuthorId localAuthorId; + protected final LocalAuthor localAuthor; protected final MessageId messageId, messageId1; protected final String contentType, subject; protected final long timestamp; @@ -71,7 +74,6 @@ public abstract class DatabaseComponentTest extends BriarTestCase { protected final TransportId transportId; protected final TransportProperties transportProperties; protected final ContactId contactId; - protected final String contactName; protected final Contact contact; protected final Endpoint endpoint; protected final TemporarySecret temporarySecret; @@ -82,6 +84,9 @@ public abstract class DatabaseComponentTest extends BriarTestCase { group = new Group(groupId, "Group name", null); authorId = new AuthorId(TestUtils.getRandomId()); author = new Author(authorId, "Alice", new byte[60]); + localAuthorId = new AuthorId(TestUtils.getRandomId()); + localAuthor = new LocalAuthor(localAuthorId, "Bob", new byte[60], + new byte[60]); messageId = new MessageId(TestUtils.getRandomId()); messageId1 = new MessageId(TestUtils.getRandomId()); contentType = "text/plain"; @@ -97,11 +102,10 @@ public abstract class DatabaseComponentTest extends BriarTestCase { transportProperties = new TransportProperties(Collections.singletonMap( "foo", "bar")); contactId = new ContactId(234); - contactName = "Alice"; - contact = new Contact(contactId, contactName, timestamp); - endpoint = new Endpoint(contactId, transportId, 123, 234, 345, true); - temporarySecret = new TemporarySecret(contactId, transportId, 1, 2, - 3, false, 4, new byte[32], 5, 6, new byte[4]); + contact = new Contact(contactId, author, timestamp); + endpoint = new Endpoint(contactId, transportId, 123, true); + temporarySecret = new TemporarySecret(contactId, transportId, 123, + false, 234, new byte[32], 345, 456, new byte[4]); } protected abstract <T> DatabaseComponent createDatabaseComponent( @@ -118,9 +122,9 @@ public abstract class DatabaseComponentTest extends BriarTestCase { final ShutdownManager shutdown = context.mock(ShutdownManager.class); final DatabaseListener listener = context.mock(DatabaseListener.class); context.checking(new Expectations() {{ - exactly(12).of(database).startTransaction(); + exactly(13).of(database).startTransaction(); will(returnValue(txn)); - exactly(12).of(database).commitTransaction(txn); + exactly(13).of(database).commitTransaction(txn); // open(false) oneOf(database).open(false); oneOf(cleaner).startCleaning( @@ -140,8 +144,12 @@ public abstract class DatabaseComponentTest extends BriarTestCase { // setRating(authorId, GOOD) again oneOf(database).setRating(txn, authorId, GOOD); will(returnValue(GOOD)); - // addContact(contactName) - oneOf(database).addContact(txn, contactName); + // addLocalAuthor(localAuthor) + oneOf(database).addLocalAuthor(txn, localAuthor); + // addContact(author, localAuthorId) + oneOf(database).containsContact(txn, authorId); + will(returnValue(false)); + oneOf(database).addContact(txn, author, localAuthorId); will(returnValue(contactId)); oneOf(listener).eventOccurred(with(any(ContactAddedEvent.class))); // getContacts() @@ -196,7 +204,8 @@ public abstract class DatabaseComponentTest extends BriarTestCase { assertEquals(UNRATED, db.getRating(authorId)); db.setRating(authorId, GOOD); // First time - listeners called db.setRating(authorId, GOOD); // Second time - not called - assertEquals(contactId, db.addContact(contactName)); + db.addLocalAuthor(localAuthor); + assertEquals(contactId, db.addContact(author, localAuthorId)); assertEquals(Arrays.asList(contact), db.getContacts()); assertEquals(Collections.emptyMap(), db.getRemoteProperties(transportId)); @@ -723,10 +732,17 @@ public abstract class DatabaseComponentTest extends BriarTestCase { final DatabaseCleaner cleaner = context.mock(DatabaseCleaner.class); final ShutdownManager shutdown = context.mock(ShutdownManager.class); context.checking(new Expectations() {{ - // addContact() + // addLocalAuthor(localAuthor) oneOf(database).startTransaction(); will(returnValue(txn)); - oneOf(database).addContact(txn, contactName); + oneOf(database).addLocalAuthor(txn, localAuthor); + oneOf(database).commitTransaction(txn); + // addContact(author, localAuthorId) + oneOf(database).startTransaction(); + will(returnValue(txn)); + oneOf(database).containsContact(txn, authorId); + will(returnValue(false)); + oneOf(database).addContact(txn, author, localAuthorId); will(returnValue(contactId)); oneOf(database).commitTransaction(txn); // Check whether the transport is in the DB (which it's not) @@ -740,7 +756,8 @@ public abstract class DatabaseComponentTest extends BriarTestCase { }}); DatabaseComponent db = createDatabaseComponent(database, cleaner, shutdown); - assertEquals(contactId, db.addContact(contactName)); + db.addLocalAuthor(localAuthor); + assertEquals(contactId, db.addContact(author, localAuthorId)); try { db.addEndpoint(endpoint); diff --git a/briar-tests/src/net/sf/briar/db/H2DatabaseTest.java b/briar-tests/src/net/sf/briar/db/H2DatabaseTest.java index b59bdd71d1cdd945125170d8043a718fc5ee1d8b..c392f385e445c52b3df0ce7fea4ecae042ed9f76 100644 --- a/briar-tests/src/net/sf/briar/db/H2DatabaseTest.java +++ b/briar-tests/src/net/sf/briar/db/H2DatabaseTest.java @@ -1,8 +1,8 @@ package net.sf.briar.db; import static java.util.concurrent.TimeUnit.SECONDS; -import static net.sf.briar.api.Rating.GOOD; -import static net.sf.briar.api.Rating.UNRATED; +import static net.sf.briar.api.messaging.Rating.GOOD; +import static net.sf.briar.api.messaging.Rating.UNRATED; import static org.junit.Assert.assertArrayEquals; import java.io.File; @@ -23,19 +23,20 @@ import net.sf.briar.BriarTestCase; import net.sf.briar.TestDatabaseConfig; import net.sf.briar.TestMessage; import net.sf.briar.TestUtils; +import net.sf.briar.api.Author; +import net.sf.briar.api.AuthorId; import net.sf.briar.api.ContactId; +import net.sf.briar.api.LocalAuthor; import net.sf.briar.api.TransportConfig; +import net.sf.briar.api.TransportId; import net.sf.briar.api.TransportProperties; import net.sf.briar.api.clock.SystemClock; import net.sf.briar.api.db.DbException; import net.sf.briar.api.db.GroupMessageHeader; -import net.sf.briar.api.messaging.Author; -import net.sf.briar.api.messaging.AuthorId; import net.sf.briar.api.messaging.Group; import net.sf.briar.api.messaging.GroupId; import net.sf.briar.api.messaging.Message; import net.sf.briar.api.messaging.MessageId; -import net.sf.briar.api.messaging.TransportId; import net.sf.briar.api.transport.Endpoint; import net.sf.briar.api.transport.TemporarySecret; @@ -55,6 +56,8 @@ public class H2DatabaseTest extends BriarTestCase { private final Group group; private final AuthorId authorId; private final Author author; + private final AuthorId localAuthorId; + private final LocalAuthor localAuthor; private final MessageId messageId, messageId1; private final String contentType, subject; private final long timestamp; @@ -63,7 +66,6 @@ public class H2DatabaseTest extends BriarTestCase { private final Message message, privateMessage; private final TransportId transportId; private final ContactId contactId; - private final String contactName; public H2DatabaseTest() throws Exception { super(); @@ -71,6 +73,9 @@ public class H2DatabaseTest extends BriarTestCase { group = new Group(groupId, "Group name", null); authorId = new AuthorId(TestUtils.getRandomId()); author = new Author(authorId, "Alice", new byte[60]); + localAuthorId = new AuthorId(TestUtils.getRandomId()); + localAuthor = new LocalAuthor(localAuthorId, "Bob", new byte[60], + new byte[60]); messageId = new MessageId(TestUtils.getRandomId()); messageId1 = new MessageId(TestUtils.getRandomId()); contentType = "text/plain"; @@ -85,7 +90,6 @@ public class H2DatabaseTest extends BriarTestCase { contentType, subject, timestamp, raw); transportId = new TransportId(TestUtils.getRandomId()); contactId = new ContactId(1); - contactName = "Alice"; } @Before @@ -99,7 +103,8 @@ public class H2DatabaseTest extends BriarTestCase { Database<Connection> db = open(false); Connection txn = db.startTransaction(); assertFalse(db.containsContact(txn, contactId)); - assertEquals(contactId, db.addContact(txn, contactName)); + db.addLocalAuthor(txn, localAuthor); + assertEquals(contactId, db.addContact(txn, author, localAuthorId)); assertTrue(db.containsContact(txn, contactId)); assertFalse(db.containsSubscription(txn, groupId)); db.addSubscription(txn, group); @@ -145,36 +150,6 @@ public class H2DatabaseTest extends BriarTestCase { db.close(); } - @Test - public void testContactIdsIncrease() throws Exception { - ContactId contactId1 = new ContactId(2); - ContactId contactId2 = new ContactId(3); - ContactId contactId3 = new ContactId(4); - Database<Connection> db = open(false); - Connection txn = db.startTransaction(); - - // Create three contacts, all with the same name - assertFalse(db.containsContact(txn, contactId)); - assertEquals(contactId, db.addContact(txn, contactName)); - assertTrue(db.containsContact(txn, contactId)); - assertFalse(db.containsContact(txn, contactId1)); - assertEquals(contactId1, db.addContact(txn, contactName)); - assertTrue(db.containsContact(txn, contactId1)); - assertFalse(db.containsContact(txn, contactId2)); - assertEquals(contactId2, db.addContact(txn, contactName)); - assertTrue(db.containsContact(txn, contactId2)); - // Delete the contact with the highest ID - db.removeContact(txn, contactId2); - assertFalse(db.containsContact(txn, contactId2)); - // Add another contact (same name again) - a new ID should be created - assertFalse(db.containsContact(txn, contactId3)); - assertEquals(contactId3, db.addContact(txn, contactName)); - assertTrue(db.containsContact(txn, contactId3)); - - db.commitTransaction(txn); - db.close(); - } - @Test public void testRatings() throws Exception { Database<Connection> db = open(false); @@ -215,7 +190,8 @@ public class H2DatabaseTest extends BriarTestCase { Connection txn = db.startTransaction(); // Add a contact and store a private message - assertEquals(contactId, db.addContact(txn, contactName)); + db.addLocalAuthor(txn, localAuthor); + assertEquals(contactId, db.addContact(txn, author, localAuthorId)); db.addPrivateMessage(txn, privateMessage, contactId); // Removing the contact should remove the message @@ -234,7 +210,8 @@ public class H2DatabaseTest extends BriarTestCase { Connection txn = db.startTransaction(); // Add a contact and store a private message - assertEquals(contactId, db.addContact(txn, contactName)); + db.addLocalAuthor(txn, localAuthor); + assertEquals(contactId, db.addContact(txn, author, localAuthorId)); db.addPrivateMessage(txn, privateMessage, contactId); // The message has no status yet, so it should not be sendable @@ -262,7 +239,8 @@ public class H2DatabaseTest extends BriarTestCase { Connection txn = db.startTransaction(); // Add a contact and store a private message - assertEquals(contactId, db.addContact(txn, contactName)); + db.addLocalAuthor(txn, localAuthor); + assertEquals(contactId, db.addContact(txn, author, localAuthorId)); db.addPrivateMessage(txn, privateMessage, contactId); db.addStatus(txn, contactId, messageId1, false); @@ -290,7 +268,8 @@ public class H2DatabaseTest extends BriarTestCase { Connection txn = db.startTransaction(); // Add a contact, subscribe to a group and store a message - assertEquals(contactId, db.addContact(txn, contactName)); + db.addLocalAuthor(txn, localAuthor); + assertEquals(contactId, db.addContact(txn, author, localAuthorId)); db.addSubscription(txn, group); db.addVisibility(txn, contactId, groupId); db.setSubscriptions(txn, contactId, Arrays.asList(group), 1); @@ -328,7 +307,8 @@ public class H2DatabaseTest extends BriarTestCase { Connection txn = db.startTransaction(); // Add a contact, subscribe to a group and store a message - assertEquals(contactId, db.addContact(txn, contactName)); + db.addLocalAuthor(txn, localAuthor); + assertEquals(contactId, db.addContact(txn, author, localAuthorId)); db.addSubscription(txn, group); db.addVisibility(txn, contactId, groupId); db.setSubscriptions(txn, contactId, Arrays.asList(group), 1); @@ -365,7 +345,8 @@ public class H2DatabaseTest extends BriarTestCase { Connection txn = db.startTransaction(); // Add a contact, subscribe to a group and store a message - assertEquals(contactId, db.addContact(txn, contactName)); + db.addLocalAuthor(txn, localAuthor); + assertEquals(contactId, db.addContact(txn, author, localAuthorId)); db.addSubscription(txn, group); db.addVisibility(txn, contactId, groupId); db.addGroupMessage(txn, message); @@ -402,7 +383,8 @@ public class H2DatabaseTest extends BriarTestCase { Connection txn = db.startTransaction(); // Add a contact, subscribe to a group and store a message - assertEquals(contactId, db.addContact(txn, contactName)); + db.addLocalAuthor(txn, localAuthor); + assertEquals(contactId, db.addContact(txn, author, localAuthorId)); db.addSubscription(txn, group); db.addVisibility(txn, contactId, groupId); db.setSubscriptions(txn, contactId, Arrays.asList(group), 1); @@ -433,7 +415,8 @@ public class H2DatabaseTest extends BriarTestCase { Connection txn = db.startTransaction(); // Add a contact, subscribe to a group and store a message - assertEquals(contactId, db.addContact(txn, contactName)); + db.addLocalAuthor(txn, localAuthor); + assertEquals(contactId, db.addContact(txn, author, localAuthorId)); db.addSubscription(txn, group); db.setSubscriptions(txn, contactId, Arrays.asList(group), 1); db.addGroupMessage(txn, message); @@ -465,7 +448,8 @@ public class H2DatabaseTest extends BriarTestCase { Connection txn = db.startTransaction(); // Add a contact and some messages to ack - assertEquals(contactId, db.addContact(txn, contactName)); + db.addLocalAuthor(txn, localAuthor); + assertEquals(contactId, db.addContact(txn, author, localAuthorId)); db.addMessageToAck(txn, contactId, messageId); db.addMessageToAck(txn, contactId, messageId1); @@ -490,7 +474,8 @@ public class H2DatabaseTest extends BriarTestCase { Connection txn = db.startTransaction(); // Add a contact and receive the same message twice - assertEquals(contactId, db.addContact(txn, contactName)); + db.addLocalAuthor(txn, localAuthor); + assertEquals(contactId, db.addContact(txn, author, localAuthorId)); db.addMessageToAck(txn, contactId, messageId); db.addMessageToAck(txn, contactId, messageId); @@ -515,7 +500,8 @@ public class H2DatabaseTest extends BriarTestCase { Connection txn = db.startTransaction(); // Add a contact, subscribe to a group and store a message - assertEquals(contactId, db.addContact(txn, contactName)); + db.addLocalAuthor(txn, localAuthor); + assertEquals(contactId, db.addContact(txn, author, localAuthorId)); db.addSubscription(txn, group); db.addVisibility(txn, contactId, groupId); db.setSubscriptions(txn, contactId, Arrays.asList(group), 1); @@ -752,9 +738,10 @@ public class H2DatabaseTest extends BriarTestCase { Connection txn = db.startTransaction(); // Add a contact with a transport + db.addLocalAuthor(txn, localAuthor); + assertEquals(contactId, db.addContact(txn, author, localAuthorId)); TransportProperties p = new TransportProperties( Collections.singletonMap("foo", "bar")); - assertEquals(contactId, db.addContact(txn, contactName)); db.setRemoteProperties(txn, contactId, transportId, p, 1); assertEquals(Collections.singletonMap(contactId, p), db.getRemoteProperties(txn, transportId)); @@ -782,7 +769,7 @@ public class H2DatabaseTest extends BriarTestCase { Connection txn = db.startTransaction(); // Add a transport to the database - db.addTransport(txn, transportId); + db.addTransport(txn, transportId, 123); // Set the transport properties TransportProperties p = new TransportProperties(); @@ -790,6 +777,8 @@ public class H2DatabaseTest extends BriarTestCase { p.put("bar", "bar"); db.mergeLocalProperties(txn, transportId, p); assertEquals(p, db.getLocalProperties(txn, transportId)); + assertEquals(Collections.singletonMap(transportId, p), + db.getLocalProperties(txn)); // Update one of the properties and add another TransportProperties p1 = new TransportProperties(); @@ -801,6 +790,8 @@ public class H2DatabaseTest extends BriarTestCase { merged.put("bar", "baz"); merged.put("bam", "bam"); assertEquals(merged, db.getLocalProperties(txn, transportId)); + assertEquals(Collections.singletonMap(transportId, merged), + db.getLocalProperties(txn)); db.commitTransaction(txn); db.close(); @@ -812,7 +803,7 @@ public class H2DatabaseTest extends BriarTestCase { Connection txn = db.startTransaction(); // Add a transport to the database - db.addTransport(txn, transportId); + db.addTransport(txn, transportId, 123); // Set the transport config TransportConfig c = new TransportConfig(); @@ -841,10 +832,13 @@ public class H2DatabaseTest extends BriarTestCase { Database<Connection> db = open(false); Connection txn = db.startTransaction(); + // Add a contact + db.addLocalAuthor(txn, localAuthor); + assertEquals(contactId, db.addContact(txn, author, localAuthorId)); + // Initialise the transport properties with version 1 TransportProperties p = new TransportProperties( Collections.singletonMap("foo", "bar")); - assertEquals(contactId, db.addContact(txn, contactName)); db.setRemoteProperties(txn, contactId, transportId, p, 1); assertEquals(Collections.singletonMap(contactId, p), db.getRemoteProperties(txn, transportId)); @@ -876,7 +870,8 @@ public class H2DatabaseTest extends BriarTestCase { Connection txn = db.startTransaction(); // Add a contact and subscribe to a group - assertEquals(contactId, db.addContact(txn, contactName)); + db.addLocalAuthor(txn, localAuthor); + assertEquals(contactId, db.addContact(txn, author, localAuthorId)); db.addSubscription(txn, group); db.setSubscriptions(txn, contactId, Arrays.asList(group), 1); @@ -893,7 +888,8 @@ public class H2DatabaseTest extends BriarTestCase { Connection txn = db.startTransaction(); // Add a contact, subscribe to a group and store a message - assertEquals(contactId, db.addContact(txn, contactName)); + db.addLocalAuthor(txn, localAuthor); + assertEquals(contactId, db.addContact(txn, author, localAuthorId)); db.addSubscription(txn, group); db.setSubscriptions(txn, contactId, Arrays.asList(group), 1); db.addGroupMessage(txn, message); @@ -916,7 +912,8 @@ public class H2DatabaseTest extends BriarTestCase { Connection txn = db.startTransaction(); // Add a contact, subscribe to a group and store a message - assertEquals(contactId, db.addContact(txn, contactName)); + db.addLocalAuthor(txn, localAuthor); + assertEquals(contactId, db.addContact(txn, author, localAuthorId)); db.addSubscription(txn, group); db.setSubscriptions(txn, contactId, Arrays.asList(group), 1); db.addGroupMessage(txn, message); @@ -939,7 +936,8 @@ public class H2DatabaseTest extends BriarTestCase { // Add a contact, subscribe to a group and store a message - // the message is older than the contact's retention time - assertEquals(contactId, db.addContact(txn, contactName)); + db.addLocalAuthor(txn, localAuthor); + assertEquals(contactId, db.addContact(txn, author, localAuthorId)); db.addSubscription(txn, group); db.addVisibility(txn, contactId, groupId); db.setSubscriptions(txn, contactId, Arrays.asList(group), 1); @@ -963,7 +961,8 @@ public class H2DatabaseTest extends BriarTestCase { Connection txn = db.startTransaction(); // Add a contact, subscribe to a group and store a message - assertEquals(contactId, db.addContact(txn, contactName)); + db.addLocalAuthor(txn, localAuthor); + assertEquals(contactId, db.addContact(txn, author, localAuthorId)); db.addSubscription(txn, group); db.addVisibility(txn, contactId, groupId); db.setSubscriptions(txn, contactId, Arrays.asList(group), 1); @@ -988,7 +987,8 @@ public class H2DatabaseTest extends BriarTestCase { Connection txn = db.startTransaction(); // Add a contact and subscribe to a group - assertEquals(contactId, db.addContact(txn, contactName)); + db.addLocalAuthor(txn, localAuthor); + assertEquals(contactId, db.addContact(txn, author, localAuthorId)); db.addSubscription(txn, group); db.addVisibility(txn, contactId, groupId); db.setSubscriptions(txn, contactId, Arrays.asList(group), 1); @@ -1007,7 +1007,8 @@ public class H2DatabaseTest extends BriarTestCase { Connection txn = db.startTransaction(); // Add a contact with a subscription - assertEquals(contactId, db.addContact(txn, contactName)); + db.addLocalAuthor(txn, localAuthor); + assertEquals(contactId, db.addContact(txn, author, localAuthorId)); db.setSubscriptions(txn, contactId, Arrays.asList(group), 1); // There's no local subscription for the group @@ -1024,7 +1025,8 @@ public class H2DatabaseTest extends BriarTestCase { Connection txn = db.startTransaction(); // Add a contact, subscribe to a group and store a message - assertEquals(contactId, db.addContact(txn, contactName)); + db.addLocalAuthor(txn, localAuthor); + assertEquals(contactId, db.addContact(txn, author, localAuthorId)); db.addSubscription(txn, group); db.addGroupMessage(txn, message); db.addStatus(txn, contactId, messageId, false); @@ -1043,7 +1045,8 @@ public class H2DatabaseTest extends BriarTestCase { Connection txn = db.startTransaction(); // Add a contact, subscribe to a group and store a message - assertEquals(contactId, db.addContact(txn, contactName)); + db.addLocalAuthor(txn, localAuthor); + assertEquals(contactId, db.addContact(txn, author, localAuthorId)); db.addSubscription(txn, group); db.addGroupMessage(txn, message); db.setSubscriptions(txn, contactId, Arrays.asList(group), 1); @@ -1063,7 +1066,8 @@ public class H2DatabaseTest extends BriarTestCase { Connection txn = db.startTransaction(); // Add a contact, subscribe to a group and store a message - assertEquals(contactId, db.addContact(txn, contactName)); + db.addLocalAuthor(txn, localAuthor); + assertEquals(contactId, db.addContact(txn, author, localAuthorId)); db.addSubscription(txn, group); db.addVisibility(txn, contactId, groupId); db.setSubscriptions(txn, contactId, Arrays.asList(group), 1); @@ -1085,7 +1089,8 @@ public class H2DatabaseTest extends BriarTestCase { Connection txn = db.startTransaction(); // Add a contact, subscribe to a group and store a message - assertEquals(contactId, db.addContact(txn, contactName)); + db.addLocalAuthor(txn, localAuthor); + assertEquals(contactId, db.addContact(txn, author, localAuthorId)); db.addSubscription(txn, group); db.addVisibility(txn, contactId, groupId); db.setSubscriptions(txn, contactId, Arrays.asList(group), 1); @@ -1106,13 +1111,17 @@ public class H2DatabaseTest extends BriarTestCase { Connection txn = db.startTransaction(); // Add a contact and subscribe to a group - assertEquals(contactId, db.addContact(txn, contactName)); + db.addLocalAuthor(txn, localAuthor); + assertEquals(contactId, db.addContact(txn, author, localAuthorId)); db.addSubscription(txn, group); + // The group should not be visible to the contact assertEquals(Collections.emptyList(), db.getVisibility(txn, groupId)); + // Make the group visible to the contact db.addVisibility(txn, contactId, groupId); assertEquals(Arrays.asList(contactId), db.getVisibility(txn, groupId)); + // Make the group invisible again db.removeVisibility(txn, contactId, groupId); assertEquals(Collections.emptyList(), db.getVisibility(txn, groupId)); @@ -1198,7 +1207,8 @@ public class H2DatabaseTest extends BriarTestCase { Connection txn = db.startTransaction(); // Add a contact and subscribe to a group - assertEquals(contactId, db.addContact(txn, contactName)); + db.addLocalAuthor(txn, localAuthor); + assertEquals(contactId, db.addContact(txn, author, localAuthorId)); db.addSubscription(txn, group); // A message with a private parent should return null @@ -1247,7 +1257,8 @@ public class H2DatabaseTest extends BriarTestCase { Connection txn = db.startTransaction(); // Add a contact and subscribe to a group - assertEquals(contactId, db.addContact(txn, contactName)); + db.addLocalAuthor(txn, localAuthor); + assertEquals(contactId, db.addContact(txn, author, localAuthorId)); db.addSubscription(txn, group); // Store a couple of messages @@ -1477,9 +1488,10 @@ public class H2DatabaseTest extends BriarTestCase { Database<Connection> db = open(false); Connection txn = db.startTransaction(); - // Subscribe to the groups and add a contact + // Add a contact and subscribe to the groups + db.addLocalAuthor(txn, localAuthor); + assertEquals(contactId, db.addContact(txn, author, localAuthorId)); for(Group g : groups) db.addSubscription(txn, g); - assertEquals(contactId, db.addContact(txn, contactName)); // Make the groups visible to the contact Collections.shuffle(groups); @@ -1500,32 +1512,28 @@ public class H2DatabaseTest extends BriarTestCase { @Test public void testTemporarySecrets() throws Exception { // Create an endpoint and three consecutive temporary secrets - long epoch = 123, clockDiff = 234, latency = 345; + long epoch = 123, latency = 234; boolean alice = false; - long outgoing1 = 456, centre1 = 567; - long outgoing2 = 678, centre2 = 789; - long outgoing3 = 890, centre3 = 901; - Endpoint ep = new Endpoint(contactId, transportId, epoch, clockDiff, - latency, alice); + long outgoing1 = 345, centre1 = 456; + long outgoing2 = 567, centre2 = 678; + long outgoing3 = 789, centre3 = 890; + Endpoint ep = new Endpoint(contactId, transportId, epoch, alice); Random random = new Random(); byte[] secret1 = new byte[32], bitmap1 = new byte[4]; random.nextBytes(secret1); random.nextBytes(bitmap1); TemporarySecret s1 = new TemporarySecret(contactId, transportId, epoch, - clockDiff, latency, alice, 0, secret1, outgoing1, centre1, - bitmap1); + alice, 0, secret1, outgoing1, centre1, bitmap1); byte[] secret2 = new byte[32], bitmap2 = new byte[4]; random.nextBytes(secret2); random.nextBytes(bitmap2); TemporarySecret s2 = new TemporarySecret(contactId, transportId, epoch, - clockDiff, latency, alice, 1, secret2, outgoing2, centre2, - bitmap2); + alice, 1, secret2, outgoing2, centre2, bitmap2); byte[] secret3 = new byte[32], bitmap3 = new byte[4]; random.nextBytes(secret3); random.nextBytes(bitmap3); TemporarySecret s3 = new TemporarySecret(contactId, transportId, epoch, - clockDiff, latency, alice, 2, secret3, outgoing3, centre3, - bitmap3); + alice, 2, secret3, outgoing3, centre3, bitmap3); Database<Connection> db = open(false); Connection txn = db.startTransaction(); @@ -1535,8 +1543,9 @@ public class H2DatabaseTest extends BriarTestCase { // Add the contact, the transport, the endpoint and the first two // secrets (periods 0 and 1) - assertEquals(contactId, db.addContact(txn, contactName)); - db.addTransport(txn, transportId); + db.addLocalAuthor(txn, localAuthor); + assertEquals(contactId, db.addContact(txn, author, localAuthorId)); + db.addTransport(txn, transportId, latency); db.addEndpoint(txn, ep); db.addSecrets(txn, Arrays.asList(s1, s2)); @@ -1548,8 +1557,6 @@ public class H2DatabaseTest extends BriarTestCase { assertEquals(contactId, s.getContactId()); assertEquals(transportId, s.getTransportId()); assertEquals(epoch, s.getEpoch()); - assertEquals(clockDiff, s.getClockDifference()); - assertEquals(latency, s.getLatency()); assertEquals(alice, s.getAlice()); if(s.getPeriod() == 0) { assertArrayEquals(secret1, s.getSecret()); @@ -1580,8 +1587,6 @@ public class H2DatabaseTest extends BriarTestCase { assertEquals(contactId, s.getContactId()); assertEquals(transportId, s.getTransportId()); assertEquals(epoch, s.getEpoch()); - assertEquals(clockDiff, s.getClockDifference()); - assertEquals(latency, s.getLatency()); assertEquals(alice, s.getAlice()); if(s.getPeriod() == 1) { assertArrayEquals(secret2, s.getSecret()); @@ -1613,24 +1618,23 @@ public class H2DatabaseTest extends BriarTestCase { @Test public void testIncrementConnectionCounter() throws Exception { // Create an endpoint and a temporary secret - long epoch = 123, clockDiff = 234, latency = 345; + long epoch = 123, latency = 234; boolean alice = false; - long period = 456, outgoing = 567, centre = 678; - Endpoint ep = new Endpoint(contactId, transportId, epoch, clockDiff, - latency, alice); + long period = 345, outgoing = 456, centre = 567; + Endpoint ep = new Endpoint(contactId, transportId, epoch, alice); Random random = new Random(); byte[] secret = new byte[32], bitmap = new byte[4]; random.nextBytes(secret); TemporarySecret s = new TemporarySecret(contactId, transportId, epoch, - clockDiff, latency, alice, period, secret, outgoing, centre, - bitmap); + alice, period, secret, outgoing, centre, bitmap); Database<Connection> db = open(false); Connection txn = db.startTransaction(); // Add the contact, the transport, the endpoint and the temporary secret - assertEquals(contactId, db.addContact(txn, contactName)); - db.addTransport(txn, transportId); + db.addLocalAuthor(txn, localAuthor); + assertEquals(contactId, db.addContact(txn, author, localAuthorId)); + db.addTransport(txn, transportId, latency); db.addEndpoint(txn, ep); db.addSecrets(txn, Arrays.asList(s)); @@ -1669,24 +1673,23 @@ public class H2DatabaseTest extends BriarTestCase { @Test public void testSetConnectionWindow() throws Exception { // Create an endpoint and a temporary secret - long epoch = 123, clockDiff = 234, latency = 345; + long epoch = 123, latency = 234; boolean alice = false; - long period = 456, outgoing = 567, centre = 678; - Endpoint ep = new Endpoint(contactId, transportId, epoch, clockDiff, - latency, alice); + long period = 345, outgoing = 456, centre = 567; + Endpoint ep = new Endpoint(contactId, transportId, epoch, alice); Random random = new Random(); byte[] secret = new byte[32], bitmap = new byte[4]; random.nextBytes(secret); TemporarySecret s = new TemporarySecret(contactId, transportId, epoch, - clockDiff, latency, alice, period, secret, outgoing, centre, - bitmap); + alice, period, secret, outgoing, centre, bitmap); Database<Connection> db = open(false); Connection txn = db.startTransaction(); // Add the contact, the transport, the endpoint and the temporary secret - assertEquals(contactId, db.addContact(txn, contactName)); - db.addTransport(txn, transportId); + db.addLocalAuthor(txn, localAuthor); + assertEquals(contactId, db.addContact(txn, author, localAuthorId)); + db.addTransport(txn, transportId, latency); db.addEndpoint(txn, ep); db.addSecrets(txn, Arrays.asList(s)); @@ -1739,15 +1742,13 @@ public class H2DatabaseTest extends BriarTestCase { @Test public void testContactTransports() throws Exception { // Create some endpoints - long epoch1 = 123, clockDiff1 = 234, latency1 = 345; - long epoch2 = 456, clockDiff2 = 567, latency2 = 678; + long epoch1 = 123, latency1 = 234; + long epoch2 = 345, latency2 = 456; boolean alice1 = true, alice2 = false; TransportId transportId1 = new TransportId(TestUtils.getRandomId()); TransportId transportId2 = new TransportId(TestUtils.getRandomId()); - Endpoint ep1 = new Endpoint(contactId, transportId1, epoch1, clockDiff1, - latency1, alice1); - Endpoint ep2 = new Endpoint(contactId, transportId2, epoch2, clockDiff2, - latency2, alice2); + Endpoint ep1 = new Endpoint(contactId, transportId1, epoch1, alice1); + Endpoint ep2 = new Endpoint(contactId, transportId2, epoch2, alice2); Database<Connection> db = open(false); Connection txn = db.startTransaction(); @@ -1756,9 +1757,10 @@ public class H2DatabaseTest extends BriarTestCase { assertEquals(Collections.emptyList(), db.getEndpoints(txn)); // Add the contact, the transports and the endpoints - assertEquals(contactId, db.addContact(txn, contactName)); - db.addTransport(txn, transportId1); - db.addTransport(txn, transportId2); + db.addLocalAuthor(txn, localAuthor); + assertEquals(contactId, db.addContact(txn, author, localAuthorId)); + db.addTransport(txn, transportId1, latency1); + db.addTransport(txn, transportId2, latency2); db.addEndpoint(txn, ep1); db.addEndpoint(txn, ep2); @@ -1770,14 +1772,10 @@ public class H2DatabaseTest extends BriarTestCase { assertEquals(contactId, ep.getContactId()); if(ep.getTransportId().equals(transportId1)) { assertEquals(epoch1, ep.getEpoch()); - assertEquals(clockDiff1, ep.getClockDifference()); - assertEquals(latency1, ep.getLatency()); assertEquals(alice1, ep.getAlice()); foundFirst = true; } else if(ep.getTransportId().equals(transportId2)) { assertEquals(epoch2, ep.getEpoch()); - assertEquals(clockDiff2, ep.getClockDifference()); - assertEquals(latency2, ep.getLatency()); assertEquals(alice2, ep.getAlice()); foundSecond = true; } else { diff --git a/briar-tests/src/net/sf/briar/messaging/ConstantsTest.java b/briar-tests/src/net/sf/briar/messaging/ConstantsTest.java index 76e4d6ccab4d30c30a1d38ba2f8a6f4b85f10496..7d454d68d20e065f438544f5805a18f99f38b3e8 100644 --- a/briar-tests/src/net/sf/briar/messaging/ConstantsTest.java +++ b/briar-tests/src/net/sf/briar/messaging/ConstantsTest.java @@ -2,13 +2,13 @@ package net.sf.briar.messaging; import static net.sf.briar.api.messaging.MessagingConstants.MAX_AUTHOR_NAME_LENGTH; import static net.sf.briar.api.messaging.MessagingConstants.MAX_BODY_LENGTH; +import static net.sf.briar.api.messaging.MessagingConstants.MAX_CONTENT_TYPE_LENGTH; import static net.sf.briar.api.messaging.MessagingConstants.MAX_GROUP_NAME_LENGTH; import static net.sf.briar.api.messaging.MessagingConstants.MAX_PACKET_LENGTH; import static net.sf.briar.api.messaging.MessagingConstants.MAX_PROPERTIES_PER_TRANSPORT; import static net.sf.briar.api.messaging.MessagingConstants.MAX_PROPERTY_LENGTH; import static net.sf.briar.api.messaging.MessagingConstants.MAX_PUBLIC_KEY_LENGTH; import static net.sf.briar.api.messaging.MessagingConstants.MAX_SIGNATURE_LENGTH; -import static net.sf.briar.api.messaging.MessagingConstants.MAX_CONTENT_TYPE_LENGTH; import static net.sf.briar.api.messaging.MessagingConstants.MAX_SUBSCRIPTIONS; import java.io.ByteArrayOutputStream; @@ -21,11 +21,13 @@ import java.util.Random; import net.sf.briar.BriarTestCase; import net.sf.briar.TestUtils; +import net.sf.briar.api.Author; +import net.sf.briar.api.AuthorFactory; +import net.sf.briar.api.TransportId; import net.sf.briar.api.TransportProperties; +import net.sf.briar.api.UniqueId; import net.sf.briar.api.crypto.CryptoComponent; import net.sf.briar.api.messaging.Ack; -import net.sf.briar.api.messaging.Author; -import net.sf.briar.api.messaging.AuthorFactory; import net.sf.briar.api.messaging.Group; import net.sf.briar.api.messaging.GroupFactory; import net.sf.briar.api.messaging.Message; @@ -35,9 +37,7 @@ import net.sf.briar.api.messaging.Offer; import net.sf.briar.api.messaging.PacketWriter; import net.sf.briar.api.messaging.PacketWriterFactory; import net.sf.briar.api.messaging.SubscriptionUpdate; -import net.sf.briar.api.messaging.TransportId; import net.sf.briar.api.messaging.TransportUpdate; -import net.sf.briar.api.messaging.UniqueId; import net.sf.briar.clock.ClockModule; import net.sf.briar.crypto.CryptoModule; import net.sf.briar.serial.SerialModule; diff --git a/briar-tests/src/net/sf/briar/messaging/PacketReaderImplTest.java b/briar-tests/src/net/sf/briar/messaging/PacketReaderImplTest.java index cb6309fae2bfe6718c4447cfb5ef2d337fcdbd6d..c32db9c0c9f31814696fded7fc60cedb87dd8649 100644 --- a/briar-tests/src/net/sf/briar/messaging/PacketReaderImplTest.java +++ b/briar-tests/src/net/sf/briar/messaging/PacketReaderImplTest.java @@ -17,7 +17,6 @@ import net.sf.briar.api.serial.ReaderFactory; import net.sf.briar.api.serial.SerialComponent; import net.sf.briar.api.serial.Writer; import net.sf.briar.api.serial.WriterFactory; -import net.sf.briar.messaging.PacketReaderImpl; import net.sf.briar.serial.SerialModule; import org.junit.Test; diff --git a/briar-tests/src/net/sf/briar/messaging/PacketWriterImplTest.java b/briar-tests/src/net/sf/briar/messaging/PacketWriterImplTest.java index 5a691ee2e7589dc025767d7d0bf7e867497a6481..4cf06c4f50628b4e56bbda71ad862d76d786afbf 100644 --- a/briar-tests/src/net/sf/briar/messaging/PacketWriterImplTest.java +++ b/briar-tests/src/net/sf/briar/messaging/PacketWriterImplTest.java @@ -11,8 +11,6 @@ import net.sf.briar.api.serial.SerialComponent; import net.sf.briar.api.serial.WriterFactory; import net.sf.briar.clock.ClockModule; import net.sf.briar.crypto.CryptoModule; -import net.sf.briar.messaging.MessagingModule; -import net.sf.briar.messaging.PacketWriterImpl; import net.sf.briar.serial.SerialModule; import net.sf.briar.util.StringUtils; diff --git a/briar-tests/src/net/sf/briar/messaging/simplex/OutgoingSimplexConnectionTest.java b/briar-tests/src/net/sf/briar/messaging/simplex/OutgoingSimplexConnectionTest.java index b13cae6016957c77e90008fbeb5fbddb41ffaf42..4c2684caa32007eaf6f45ed97377ec27e790088b 100644 --- a/briar-tests/src/net/sf/briar/messaging/simplex/OutgoingSimplexConnectionTest.java +++ b/briar-tests/src/net/sf/briar/messaging/simplex/OutgoingSimplexConnectionTest.java @@ -14,13 +14,13 @@ import java.util.concurrent.Executors; import net.sf.briar.BriarTestCase; import net.sf.briar.TestUtils; import net.sf.briar.api.ContactId; +import net.sf.briar.api.TransportId; +import net.sf.briar.api.UniqueId; import net.sf.briar.api.db.DatabaseComponent; import net.sf.briar.api.db.DatabaseExecutor; import net.sf.briar.api.messaging.Ack; import net.sf.briar.api.messaging.MessageId; import net.sf.briar.api.messaging.PacketWriterFactory; -import net.sf.briar.api.messaging.TransportId; -import net.sf.briar.api.messaging.UniqueId; import net.sf.briar.api.transport.ConnectionContext; import net.sf.briar.api.transport.ConnectionRegistry; import net.sf.briar.api.transport.ConnectionWriterFactory; diff --git a/briar-tests/src/net/sf/briar/messaging/simplex/SimplexMessagingIntegrationTest.java b/briar-tests/src/net/sf/briar/messaging/simplex/SimplexMessagingIntegrationTest.java index b87285eb61654c51464869bd015e99e6a83badfd..c996745f390f0e026defa3833fac195ad9ae64ea 100644 --- a/briar-tests/src/net/sf/briar/messaging/simplex/SimplexMessagingIntegrationTest.java +++ b/briar-tests/src/net/sf/briar/messaging/simplex/SimplexMessagingIntegrationTest.java @@ -10,7 +10,11 @@ import java.util.Random; import net.sf.briar.BriarTestCase; import net.sf.briar.TestDatabaseModule; import net.sf.briar.TestUtils; +import net.sf.briar.api.Author; +import net.sf.briar.api.AuthorId; import net.sf.briar.api.ContactId; +import net.sf.briar.api.LocalAuthor; +import net.sf.briar.api.TransportId; import net.sf.briar.api.crypto.KeyManager; import net.sf.briar.api.db.DatabaseComponent; import net.sf.briar.api.db.event.DatabaseEvent; @@ -21,7 +25,6 @@ import net.sf.briar.api.messaging.MessageFactory; import net.sf.briar.api.messaging.MessageVerifier; import net.sf.briar.api.messaging.PacketReaderFactory; import net.sf.briar.api.messaging.PacketWriterFactory; -import net.sf.briar.api.messaging.TransportId; import net.sf.briar.api.transport.ConnectionContext; import net.sf.briar.api.transport.ConnectionReaderFactory; import net.sf.briar.api.transport.ConnectionRecogniser; @@ -103,12 +106,18 @@ public class SimplexMessagingIntegrationTest extends BriarTestCase { // Start Alice's key manager KeyManager km = alice.getInstance(KeyManager.class); km.start(); + // Add a local pseudonym for Alice + AuthorId aliceId = new AuthorId(TestUtils.getRandomId()); + LocalAuthor aliceAuthor = new LocalAuthor(aliceId, "Alice", + new byte[60], new byte[60]); + db.addLocalAuthor(aliceAuthor); // Add Bob as a contact - ContactId contactId = db.addContact("Bob"); - Endpoint ep = new Endpoint(contactId, transportId, epoch, - CLOCK_DIFFERENCE, LATENCY, true); + AuthorId bobId = new AuthorId(TestUtils.getRandomId()); + Author bobAuthor = new Author(bobId, "Bob", new byte[60]); + ContactId contactId = db.addContact(bobAuthor, aliceId); // Add the transport and the endpoint - db.addTransport(transportId); + db.addTransport(transportId, LATENCY); + Endpoint ep = new Endpoint(contactId, transportId, epoch, true); db.addEndpoint(ep); km.endpointAdded(ep, initialSecret.clone()); // Send Bob a message @@ -151,12 +160,18 @@ public class SimplexMessagingIntegrationTest extends BriarTestCase { // Start Bob's key manager KeyManager km = bob.getInstance(KeyManager.class); km.start(); + // Add a local pseudonym for Bob + AuthorId bobId = new AuthorId(TestUtils.getRandomId()); + LocalAuthor bobAuthor = new LocalAuthor(bobId, "Bob", new byte[60], + new byte[60]); + db.addLocalAuthor(bobAuthor); // Add Alice as a contact - ContactId contactId = db.addContact("Alice"); - Endpoint ep = new Endpoint(contactId, transportId, epoch, - CLOCK_DIFFERENCE, LATENCY, false); + AuthorId aliceId = new AuthorId(TestUtils.getRandomId()); + Author aliceAuthor = new Author(aliceId, "Alice", new byte[60]); + ContactId contactId = db.addContact(aliceAuthor, bobId); // Add the transport and the endpoint - db.addTransport(transportId); + db.addTransport(transportId, LATENCY); + Endpoint ep = new Endpoint(contactId, transportId, epoch, false); db.addEndpoint(ep); km.endpointAdded(ep, initialSecret.clone()); // Set up a database listener diff --git a/briar-tests/src/net/sf/briar/plugins/PluginManagerImplTest.java b/briar-tests/src/net/sf/briar/plugins/PluginManagerImplTest.java index a33f7723828b972b5948898a7c48f739fe677758..5b4ee5b55a98ae9196f8b2d0290bc5448d6d66ae 100644 --- a/briar-tests/src/net/sf/briar/plugins/PluginManagerImplTest.java +++ b/briar-tests/src/net/sf/briar/plugins/PluginManagerImplTest.java @@ -6,9 +6,9 @@ import java.util.concurrent.Executors; import net.sf.briar.BriarTestCase; import net.sf.briar.TestUtils; +import net.sf.briar.api.TransportId; import net.sf.briar.api.android.AndroidExecutor; import net.sf.briar.api.db.DatabaseComponent; -import net.sf.briar.api.messaging.TransportId; import net.sf.briar.api.plugins.duplex.DuplexPlugin; import net.sf.briar.api.plugins.duplex.DuplexPluginCallback; import net.sf.briar.api.plugins.duplex.DuplexPluginConfig; @@ -46,23 +46,26 @@ public class PluginManagerImplTest extends BriarTestCase { context.mock(SimplexPluginFactory.class); final SimplexPlugin simplexPlugin = context.mock(SimplexPlugin.class); final TransportId simplexId = new TransportId(TestUtils.getRandomId()); + final long simplexLatency = 12345; final SimplexPluginFactory simplexFailFactory = context.mock(SimplexPluginFactory.class, "simplexFailFactory"); final SimplexPlugin simplexFailPlugin = context.mock(SimplexPlugin.class, "simplexFailPlugin"); final TransportId simplexFailId = new TransportId(TestUtils.getRandomId()); + final long simplexFailLatency = 23456; // Two duplex plugin factories: one creates a plugin, the other fails final DuplexPluginFactory duplexFactory = context.mock(DuplexPluginFactory.class); final DuplexPlugin duplexPlugin = context.mock(DuplexPlugin.class); final TransportId duplexId = new TransportId(TestUtils.getRandomId()); + final long duplexLatency = 34567; final DuplexPluginFactory duplexFailFactory = context.mock(DuplexPluginFactory.class, "duplexFailFactory"); final TransportId duplexFailId = new TransportId(TestUtils.getRandomId()); context.checking(new Expectations() {{ - // Start the simplex plugins + // First simplex plugin oneOf(simplexPluginConfig).getFactories(); will(returnValue(Arrays.asList(simplexFactory, simplexFailFactory))); @@ -71,20 +74,25 @@ public class PluginManagerImplTest extends BriarTestCase { oneOf(simplexFactory).createPlugin(with(any( SimplexPluginCallback.class))); will(returnValue(simplexPlugin)); // Created - oneOf(db).addTransport(simplexId); + oneOf(simplexPlugin).getMaxLatency(); + will(returnValue(simplexLatency)); + oneOf(db).addTransport(simplexId, simplexLatency); will(returnValue(true)); oneOf(simplexPlugin).start(); will(returnValue(true)); // Started + // Second simplex plugin oneOf(simplexFailFactory).getId(); will(returnValue(simplexFailId)); oneOf(simplexFailFactory).createPlugin(with(any( SimplexPluginCallback.class))); will(returnValue(simplexFailPlugin)); // Created - oneOf(db).addTransport(simplexFailId); + oneOf(simplexFailPlugin).getMaxLatency(); + will(returnValue(simplexFailLatency)); + oneOf(db).addTransport(simplexFailId, simplexFailLatency); will(returnValue(true)); oneOf(simplexFailPlugin).start(); will(returnValue(false)); // Failed to start - // Start the duplex plugins + // First duplex plugin oneOf(duplexPluginConfig).getFactories(); will(returnValue(Arrays.asList(duplexFactory, duplexFailFactory))); oneOf(duplexFactory).getId(); @@ -92,14 +100,15 @@ public class PluginManagerImplTest extends BriarTestCase { oneOf(duplexFactory).createPlugin(with(any( DuplexPluginCallback.class))); will(returnValue(duplexPlugin)); // Created - oneOf(db).addTransport(duplexId); + oneOf(duplexPlugin).getMaxLatency(); + will(returnValue(duplexLatency)); + oneOf(db).addTransport(duplexId, duplexLatency); will(returnValue(true)); oneOf(duplexPlugin).start(); will(returnValue(true)); // Started + // Second duplex plugin oneOf(duplexFailFactory).getId(); will(returnValue(duplexFailId)); - oneOf(db).addTransport(duplexFailId); - will(returnValue(true)); oneOf(duplexFailFactory).createPlugin(with(any( DuplexPluginCallback.class))); will(returnValue(null)); // Failed to create a plugin diff --git a/briar-tests/src/net/sf/briar/transport/ConnectionRegistryImplTest.java b/briar-tests/src/net/sf/briar/transport/ConnectionRegistryImplTest.java index 9e63803aab55efec53dcb543f444a612ba83f30b..1e118bf7da395f4883a3431c8b2768d1126f2162 100644 --- a/briar-tests/src/net/sf/briar/transport/ConnectionRegistryImplTest.java +++ b/briar-tests/src/net/sf/briar/transport/ConnectionRegistryImplTest.java @@ -6,7 +6,7 @@ import java.util.Collections; import net.sf.briar.BriarTestCase; import net.sf.briar.TestUtils; import net.sf.briar.api.ContactId; -import net.sf.briar.api.messaging.TransportId; +import net.sf.briar.api.TransportId; import net.sf.briar.api.transport.ConnectionRegistry; import org.junit.Test; diff --git a/briar-tests/src/net/sf/briar/transport/TransportConnectionRecogniserTest.java b/briar-tests/src/net/sf/briar/transport/TransportConnectionRecogniserTest.java index 31a8152e7abfad51abbe720f973209c1ca3d2acb..dddcc83d07c4ddf94f66ba10d479271706bc9646 100644 --- a/briar-tests/src/net/sf/briar/transport/TransportConnectionRecogniserTest.java +++ b/briar-tests/src/net/sf/briar/transport/TransportConnectionRecogniserTest.java @@ -11,10 +11,10 @@ import javax.crypto.NullCipher; import net.sf.briar.BriarTestCase; import net.sf.briar.TestUtils; import net.sf.briar.api.ContactId; +import net.sf.briar.api.TransportId; import net.sf.briar.api.crypto.CryptoComponent; import net.sf.briar.api.crypto.ErasableKey; import net.sf.briar.api.db.DatabaseComponent; -import net.sf.briar.api.messaging.TransportId; import net.sf.briar.api.transport.ConnectionContext; import net.sf.briar.api.transport.TemporarySecret; import net.sf.briar.util.ByteUtils; @@ -62,7 +62,7 @@ public class TransportConnectionRecogniserTest extends BriarTestCase { will(new EncodeTagAction()); oneOf(tagKey).erase(); }}); - TemporarySecret s = new TemporarySecret(contactId, transportId, 0, 0, 0, + TemporarySecret s = new TemporarySecret(contactId, transportId, 123, alice, 0, secret, 0, 0, new byte[4]); TransportConnectionRecogniser recogniser = new TransportConnectionRecogniser(crypto, db, transportId); @@ -108,7 +108,7 @@ public class TransportConnectionRecogniserTest extends BriarTestCase { oneOf(tagKey).erase(); // Accept connection again - no expectations }}); - TemporarySecret s = new TemporarySecret(contactId, transportId, 0, 0, 0, + TemporarySecret s = new TemporarySecret(contactId, transportId, 123, alice, 0, secret, 0, 0, new byte[4]); TransportConnectionRecogniser recogniser = new TransportConnectionRecogniser(crypto, db, transportId); diff --git a/briar-tests/src/net/sf/briar/transport/TransportIntegrationTest.java b/briar-tests/src/net/sf/briar/transport/TransportIntegrationTest.java index 11eae9905a3efcb35a6bebcd60ca4624d21c7d18..493439897c52a0e3ead237af8baa13c968ddcd58 100644 --- a/briar-tests/src/net/sf/briar/transport/TransportIntegrationTest.java +++ b/briar-tests/src/net/sf/briar/transport/TransportIntegrationTest.java @@ -13,10 +13,10 @@ import java.util.Random; import net.sf.briar.BriarTestCase; import net.sf.briar.TestUtils; import net.sf.briar.api.ContactId; +import net.sf.briar.api.TransportId; import net.sf.briar.api.crypto.AuthenticatedCipher; import net.sf.briar.api.crypto.CryptoComponent; import net.sf.briar.api.crypto.ErasableKey; -import net.sf.briar.api.messaging.TransportId; import net.sf.briar.api.transport.ConnectionContext; import net.sf.briar.api.transport.ConnectionWriter; import net.sf.briar.api.transport.ConnectionWriterFactory;