Be robust if other client sends padded base64 in the reciprocate
This commit is contained in:
parent
1ead2778c2
commit
0a9008a73d
|
@ -0,0 +1,32 @@
|
||||||
|
/*
|
||||||
|
* Copyright (c) 2020 New Vector Ltd
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package im.vector.matrix.android.internal.crypto.crosssigning
|
||||||
|
|
||||||
|
import org.amshove.kluent.shouldBeTrue
|
||||||
|
import org.junit.Test
|
||||||
|
|
||||||
|
@Suppress("SpellCheckingInspection")
|
||||||
|
class ExtensionsKtTest {
|
||||||
|
|
||||||
|
@Test
|
||||||
|
fun testComparingBase64StringWithOrWithoutPadding() {
|
||||||
|
// Without padding
|
||||||
|
"NMJyumnhMic".fromBase64().contentEquals("NMJyumnhMic".fromBase64()).shouldBeTrue()
|
||||||
|
// With padding
|
||||||
|
"NMJyumnhMic".fromBase64().contentEquals("NMJyumnhMic=".fromBase64()).shouldBeTrue()
|
||||||
|
}
|
||||||
|
}
|
|
@ -24,6 +24,7 @@ import im.vector.matrix.android.api.session.crypto.verification.VerificationTxSt
|
||||||
import im.vector.matrix.android.api.session.events.model.EventType
|
import im.vector.matrix.android.api.session.events.model.EventType
|
||||||
import im.vector.matrix.android.internal.crypto.actions.SetDeviceVerificationAction
|
import im.vector.matrix.android.internal.crypto.actions.SetDeviceVerificationAction
|
||||||
import im.vector.matrix.android.internal.crypto.crosssigning.DeviceTrustLevel
|
import im.vector.matrix.android.internal.crypto.crosssigning.DeviceTrustLevel
|
||||||
|
import im.vector.matrix.android.internal.crypto.crosssigning.fromBase64
|
||||||
import im.vector.matrix.android.internal.crypto.store.IMXCryptoStore
|
import im.vector.matrix.android.internal.crypto.store.IMXCryptoStore
|
||||||
import im.vector.matrix.android.internal.crypto.verification.DefaultVerificationTransaction
|
import im.vector.matrix.android.internal.crypto.verification.DefaultVerificationTransaction
|
||||||
import im.vector.matrix.android.internal.crypto.verification.VerificationInfo
|
import im.vector.matrix.android.internal.crypto.verification.VerificationInfo
|
||||||
|
@ -199,7 +200,7 @@ internal class DefaultQrCodeVerificationTransaction(
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
if (startReq.sharedSecret == qrCodeData.sharedSecret) {
|
if ((startReq.sharedSecret?.fromBase64()?.contentEquals(qrCodeData.sharedSecret.fromBase64()) == true)) {
|
||||||
// Ok, we can trust the other user
|
// Ok, we can trust the other user
|
||||||
// We can only trust the master key in this case
|
// We can only trust the master key in this case
|
||||||
// But first, ask the user for a confirmation
|
// But first, ask the user for a confirmation
|
||||||
|
|
Loading…
Reference in New Issue