diff --git a/androidTest/java/org/thoughtcrime/securesms/service/SmsListenerTest.java b/androidTest/java/org/thoughtcrime/securesms/service/SmsListenerTest.java
new file mode 100644
index 0000000000..1dc149b965
--- /dev/null
+++ b/androidTest/java/org/thoughtcrime/securesms/service/SmsListenerTest.java
@@ -0,0 +1,113 @@
+/**
+ * Copyright (C) 2015 Open Whisper Systems
+ *
+ * This program is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 3 of the License, or
+ * (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program. If not, see .
+ */
+
+package org.thoughtcrime.securesms.service;
+
+import android.annotation.SuppressLint;
+import android.content.Context;
+import android.content.Intent;
+import android.content.SharedPreferences;
+import android.os.Bundle;
+import android.provider.Telephony;
+import android.util.Log;
+
+import org.mockito.ArgumentCaptor;
+import org.spongycastle.util.encoders.Hex;
+import org.thoughtcrime.securesms.TextSecureTestCase;
+
+import static org.mockito.Matchers.anyBoolean;
+import static org.mockito.Matchers.anyInt;
+import static org.mockito.Matchers.anyString;
+import static org.mockito.Matchers.contains;
+import static org.mockito.Mockito.mock;
+import static org.mockito.Mockito.times;
+import static org.mockito.Mockito.verify;
+import static org.mockito.Mockito.when;
+
+public class SmsListenerTest extends TextSecureTestCase {
+
+ /*
+ http://rednaxela.net/pdu.php
+ 'Your TextSecure verification code: 337-337'
+ 'Your TextSecure verification code: 337-1337'
+ 'Your TextSecure verification code: 1337-337'
+ 'Your TextSecure verification code: 1337-1337'
+ 'XXXYour TextSecure verification code: 1337-1337'
+ 'Your TextSecure verification code: 1337-1337XXX'
+ */
+ private static final String CHALLENGE_SMS_3_3 = "07914400000000F001000B811000000000F000002AD9775D0EA296F1F469795C979741F6B23C6D4E8FC3F4F4DB0D1ABFC9651D6836BBB566B31B";
+ private static final String CHALLENGE_SMS_3_4 = "07914400000000F001000B811000000000F000002BD9775D0EA296F1F469795C979741F6B23C6D4E8FC3F4F4DB0D1ABFC9651D6836BBB562B3D90D";
+ private static final String CHALLENGE_SMS_4_3 = "07914400000000F001000B811000000000F000002BD9775D0EA296F1F469795C979741F6B23C6D4E8FC3F4F4DB0D1ABFC9651D28369BDD5AB3D90D";
+ private static final String CHALLENGE_SMS_4_4 = "07914400000000F001000B811000000000F000002CD9775D0EA296F1F469795C979741F6B23C6D4E8FC3F4F4DB0D1ABFC9651D28369BDD5AB1D9EC06";
+ private static final String CHALLENGE_SMS_4_4_PREPEND = "07914400000000F001000B811000000000F000002F582C36FBAECB41D4329E3E2D8FEBF232C85E96A7CDE971989E7EBB41E337B9AC03C566B35B2B369BDD00";
+ private static final String CHALLENGE_SMS_4_4_APPEND = "07914400000000F001000B811000000000F000002FD9775D0EA296F1F469795C979741F6B23C6D4E8FC3F4F4DB0D1ABFC9651D28369BDD5AB1D9EC86C56201";
+ private static final String[] CHALLENGE_SMS = {
+ CHALLENGE_SMS_3_3, CHALLENGE_SMS_3_4, CHALLENGE_SMS_4_3,
+ CHALLENGE_SMS_4_4, CHALLENGE_SMS_4_4_PREPEND, CHALLENGE_SMS_4_4_APPEND
+ };
+
+ private static final String CHALLENGE_3_3 = "337337";
+ private static final String CHALLENGE_3_4 = "3371337";
+ private static final String CHALLENGE_4_3 = "1337337";
+ private static final String CHALLENGE_4_4 = "13371337";
+ private static final String[] CHALLENGES = {
+ CHALLENGE_3_3, CHALLENGE_3_4, CHALLENGE_4_3,
+ CHALLENGE_4_4, CHALLENGE_4_4, CHALLENGE_4_4,
+ };
+
+ @SuppressLint("NewApi")
+ private Intent buildSmsReceivedIntent(String encodedPdu) throws Exception {
+ final Intent smsIntent = mock(Intent.class);
+ final Bundle smsExtras = new Bundle();
+
+ smsExtras.putSerializable("pdus", new Object[]{Hex.decode(encodedPdu)});
+
+ when(smsIntent.getAction()).thenReturn(Telephony.Sms.Intents.SMS_RECEIVED_ACTION);
+ when(smsIntent.getExtras()).thenReturn(smsExtras);
+
+ return smsIntent;
+ }
+
+ public void testReceiveChallenges() throws Exception {
+ final SmsListener smsListener = new SmsListener();
+
+ for (int i = 0; i < CHALLENGES.length; i++) {
+ final String CHALLENGE = CHALLENGES[i];
+ final String CHALLENGE_SMS = SmsListenerTest.CHALLENGE_SMS[i];
+
+ final Context mockContext = mock(Context.class);
+ final SharedPreferences mockPreferences = mock(SharedPreferences.class);
+ final ArgumentCaptor intentCaptor = ArgumentCaptor.forClass(Intent.class);
+
+ when(mockContext.getPackageName()).thenReturn(getContext().getPackageName());
+ when(mockContext.getSharedPreferences(anyString(), anyInt())).thenReturn(mockPreferences);
+ when(mockPreferences.getBoolean(contains("pref_verifying"), anyBoolean())).thenReturn(true);
+
+ try {
+ smsListener.onReceive(mockContext, buildSmsReceivedIntent(CHALLENGE_SMS));
+ } catch (IllegalStateException e) {
+ Log.d(getClass().getName(), "some api levels are picky with abortBroadcast()");
+ }
+
+ verify(mockContext, times(1)).sendBroadcast(intentCaptor.capture());
+
+ final Intent sendIntent = intentCaptor.getValue();
+ assertTrue(sendIntent.getAction().equals(RegistrationService.CHALLENGE_EVENT));
+ assertTrue(sendIntent.getStringExtra(RegistrationService.CHALLENGE_EXTRA).equals(CHALLENGE));
+ }
+ }
+}
diff --git a/src/org/thoughtcrime/securesms/service/SmsListener.java b/src/org/thoughtcrime/securesms/service/SmsListener.java
index fab3d2d107..078b1de291 100644
--- a/src/org/thoughtcrime/securesms/service/SmsListener.java
+++ b/src/org/thoughtcrime/securesms/service/SmsListener.java
@@ -28,17 +28,19 @@ import android.util.Log;
import org.thoughtcrime.securesms.ApplicationContext;
import org.thoughtcrime.securesms.jobs.SmsReceiveJob;
import org.thoughtcrime.securesms.protocol.WirePrefix;
-import org.thoughtcrime.securesms.sms.IncomingTextMessage;
import org.thoughtcrime.securesms.util.TextSecurePreferences;
import org.thoughtcrime.securesms.util.Util;
-import java.util.ArrayList;
+import java.util.regex.Matcher;
+import java.util.regex.Pattern;
public class SmsListener extends BroadcastReceiver {
private static final String SMS_RECEIVED_ACTION = Telephony.Sms.Intents.SMS_RECEIVED_ACTION;
private static final String SMS_DELIVERED_ACTION = Telephony.Sms.Intents.SMS_DELIVER_ACTION;
+ private static final Pattern CHALLENGE_PATTERN = Pattern.compile(".*Your TextSecure verification code: ([0-9]{3,4})-([0-9]{3,4}).*");
+
private boolean isExemption(SmsMessage message, String messageBody) {
// ignore CLASS0 ("flash") messages
@@ -128,7 +130,7 @@ public class SmsListener extends BroadcastReceiver {
if (messageBody == null)
return false;
- if (messageBody.matches(".*Your TextSecure verification code: [0-9]{3,4}-[0-9]{3,4}") &&
+ if (CHALLENGE_PATTERN.matcher(messageBody).matches() &&
TextSecurePreferences.isVerifying(context))
{
return true;
@@ -138,11 +140,14 @@ public class SmsListener extends BroadcastReceiver {
}
private String parseChallenge(Context context, Intent intent) {
- String messageBody = getSmsMessageBodyFromIntent(intent);
- String[] messageParts = messageBody.split(":");
- String[] codeParts = messageParts[1].trim().split("-");
+ String messageBody = getSmsMessageBodyFromIntent(intent);
+ Matcher challengeMatcher = CHALLENGE_PATTERN.matcher(messageBody);
- return codeParts[0] + codeParts[1];
+ if (!challengeMatcher.matches()) {
+ throw new AssertionError("Expression should match.");
+ }
+
+ return challengeMatcher.group(1) + challengeMatcher.group(2);
}
@Override