SslValidatorDialog.java 7.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186
  1. /* ownCloud Android client application
  2. * Copyright (C) 2011 Bartek Przybylski
  3. *
  4. * This program is free software: you can redistribute it and/or modify
  5. * it under the terms of the GNU General Public License as published by
  6. * the Free Software Foundation, either version 3 of the License, or
  7. * (at your option) any later version.
  8. *
  9. * This program is distributed in the hope that it will be useful,
  10. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. * GNU General Public License for more details.
  13. *
  14. * You should have received a copy of the GNU General Public License
  15. * along with this program. If not, see <http://www.gnu.org/licenses/>.
  16. *
  17. */
  18. package com.owncloud.android.ui.dialog;
  19. import java.io.IOException;
  20. import java.security.KeyStoreException;
  21. import java.security.NoSuchAlgorithmException;
  22. import java.security.cert.CertificateException;
  23. import java.security.cert.X509Certificate;
  24. import android.app.Dialog;
  25. import android.content.Context;
  26. import android.os.Bundle;
  27. import android.util.Log;
  28. import android.view.View;
  29. import android.view.Window;
  30. import android.widget.TextView;
  31. import com.owncloud.android.R;
  32. import com.owncloud.android.network.CertificateCombinedException;
  33. import com.owncloud.android.network.OwnCloudClientUtils;
  34. import com.owncloud.android.operations.RemoteOperationResult;
  35. /**
  36. * Dialog to request the user about a certificate that could not be validated with the certificates store in the system.
  37. *
  38. * @author David A. Velasco
  39. */
  40. public class SslValidatorDialog extends Dialog {
  41. private final static String TAG = SslValidatorDialog.class.getSimpleName();
  42. private OnSslValidatorListener mListener;
  43. private CertificateCombinedException mException = null;
  44. private View mView;
  45. /**
  46. * Creates a new SslValidatorDialog to ask the user if an untrusted certificate from a server should
  47. * be trusted.
  48. *
  49. * @param context Android context where the dialog will live.
  50. * @param result Result of a failed remote operation.
  51. * @param listener Object to notice when the server certificate was added to the local certificates store.
  52. * @return A new SslValidatorDialog instance, or NULL if the operation can not be recovered
  53. * by setting the certificate as reliable.
  54. */
  55. public static SslValidatorDialog newInstance(Context context, RemoteOperationResult result, OnSslValidatorListener listener) {
  56. if (result.isSslRecoverableException()) {
  57. SslValidatorDialog dialog = new SslValidatorDialog(context, listener);
  58. return dialog;
  59. } else {
  60. return null;
  61. }
  62. }
  63. /**
  64. * Private constructor.
  65. *
  66. * Instances have to be created through static {@link SslValidatorDialog#newInstance}.
  67. *
  68. * @param context Android context where the dialog will live
  69. * @param e Exception causing the need of prompt the user about the server certificate.
  70. * @param listener Object to notice when the server certificate was added to the local certificates store.
  71. */
  72. private SslValidatorDialog(Context context, OnSslValidatorListener listener) {
  73. super(context);
  74. mListener = listener;
  75. }
  76. /**
  77. * {@inheritDoc}
  78. */
  79. protected void onCreate(Bundle savedInstanceState) {
  80. super.onCreate(savedInstanceState);
  81. requestWindowFeature(Window.FEATURE_NO_TITLE);
  82. mView = getLayoutInflater().inflate(R.layout.ssl_validator_layout, null);
  83. setContentView(mView);
  84. mView.findViewById(R.id.ok).setOnClickListener(
  85. new View.OnClickListener() {
  86. @Override
  87. public void onClick(View v) {
  88. try {
  89. saveServerCert();
  90. dismiss();
  91. if (mListener != null)
  92. mListener.onSavedCertificate();
  93. else
  94. Log.d(TAG, "Nobody there to notify the certificate was saved");
  95. } catch (Exception e) {
  96. dismiss();
  97. if (mListener != null)
  98. mListener.onFailedSavingCertificate();
  99. Log.e(TAG, "Server certificate could not be saved in the known servers trust store ", e);
  100. }
  101. }
  102. });
  103. mView.findViewById(R.id.cancel).setOnClickListener(
  104. new View.OnClickListener() {
  105. @Override
  106. public void onClick(View v) {
  107. cancel();
  108. }
  109. });
  110. }
  111. public void updateResult(RemoteOperationResult result) {
  112. if (result.isSslRecoverableException()) {
  113. mException = (CertificateCombinedException) result.getException();
  114. /// clean
  115. ((TextView)mView.findViewById(R.id.reason_cert_not_trusted)).setVisibility(View.GONE);
  116. ((TextView)mView.findViewById(R.id.reason_cert_expired)).setVisibility(View.GONE);
  117. ((TextView)mView.findViewById(R.id.reason_cert_not_yet_valid)).setVisibility(View.GONE);
  118. ((TextView)mView.findViewById(R.id.reason_hostname_not_verified)).setVisibility(View.GONE);
  119. ((TextView)mView.findViewById(R.id.subject)).setVisibility(View.GONE);
  120. /// refresh
  121. if (mException.getCertPathValidatorException() != null) {
  122. ((TextView)mView.findViewById(R.id.reason_cert_not_trusted)).setVisibility(View.VISIBLE);
  123. }
  124. if (mException.getCertificateExpiredException() != null) {
  125. ((TextView)mView.findViewById(R.id.reason_cert_expired)).setVisibility(View.VISIBLE);
  126. }
  127. if (mException.getCertificateNotYetValidException() != null) {
  128. ((TextView)mView.findViewById(R.id.reason_cert_not_yet_valid)).setVisibility(View.VISIBLE);
  129. }
  130. if (mException.getSslPeerUnverifiedException() != null ) {
  131. ((TextView)mView.findViewById(R.id.reason_hostname_not_verified)).setVisibility(View.VISIBLE);
  132. }
  133. showCertificateData(mException.getServerCertificate());
  134. }
  135. }
  136. private void showCertificateData(X509Certificate cert) {
  137. TextView subject = (TextView)mView.findViewById(R.id.subject);
  138. if (cert != null) {
  139. String text = cert.getSubjectDN().getName();
  140. text = text.substring(text.indexOf(",") + 1);
  141. subject.setVisibility(View.VISIBLE);
  142. subject.setText(text);
  143. } else {
  144. // this should not happen
  145. subject.setText(R.string.ssl_validator_certificate_not_available);
  146. }
  147. }
  148. private void saveServerCert() throws KeyStoreException, NoSuchAlgorithmException, CertificateException, IOException {
  149. if (mException.getServerCertificate() != null) {
  150. OwnCloudClientUtils.addCertToKnownServersStore(mException.getServerCertificate(), getContext());
  151. }
  152. }
  153. public interface OnSslValidatorListener {
  154. public void onSavedCertificate();
  155. public void onFailedSavingCertificate();
  156. }
  157. }