open-keychain/OpenPGP-Keychain/src/org/sufficientlysecure/keychain/service/remote/OpenPgpService.java

534 lines
21 KiB
Java
Raw Normal View History

2013-05-28 09:10:36 -04:00
/*
* Copyright (C) 2013 Dominik Schürmann <dominik@dominikschuermann.de>
2013-05-28 09:10:36 -04:00
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
2013-05-28 09:10:36 -04:00
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
2013-05-28 09:10:36 -04:00
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
2013-05-28 09:10:36 -04:00
*/
2013-09-15 07:52:05 -04:00
package org.sufficientlysecure.keychain.service.remote;
2013-05-28 09:10:36 -04:00
import java.io.ByteArrayInputStream;
import java.io.ByteArrayOutputStream;
import java.io.InputStream;
import java.io.OutputStream;
import java.util.ArrayList;
import java.util.regex.Matcher;
2013-05-29 09:58:50 -04:00
2013-09-10 17:19:34 -04:00
import org.openintents.openpgp.IOpenPgpCallback;
import org.openintents.openpgp.IOpenPgpService;
import org.openintents.openpgp.OpenPgpError;
import org.openintents.openpgp.OpenPgpSignatureResult;
2013-05-28 09:10:36 -04:00
import org.sufficientlysecure.keychain.Constants;
import org.sufficientlysecure.keychain.Id;
import org.sufficientlysecure.keychain.R;
2013-09-08 12:21:04 -04:00
import org.sufficientlysecure.keychain.helper.Preferences;
import org.sufficientlysecure.keychain.pgp.PgpHelper;
import org.sufficientlysecure.keychain.pgp.PgpOperation;
import org.sufficientlysecure.keychain.pgp.exception.NoAsymmetricEncryptionException;
import org.sufficientlysecure.keychain.pgp.exception.PgpGeneralException;
2013-09-06 07:48:27 -04:00
import org.sufficientlysecure.keychain.provider.KeychainContract;
2013-05-28 09:10:36 -04:00
import org.sufficientlysecure.keychain.service.KeychainIntentService;
import org.sufficientlysecure.keychain.service.PassphraseCacheService;
2013-09-16 07:00:47 -04:00
import org.sufficientlysecure.keychain.service.exception.NoUserIdsException;
import org.sufficientlysecure.keychain.service.exception.UserInteractionRequiredException;
import org.sufficientlysecure.keychain.service.exception.WrongPassphraseException;
2013-09-08 10:08:36 -04:00
import org.sufficientlysecure.keychain.util.InputData;
import org.sufficientlysecure.keychain.util.Log;
2013-05-28 09:10:36 -04:00
import android.content.Intent;
2013-09-06 12:36:16 -04:00
import android.database.Cursor;
2013-09-06 07:48:27 -04:00
import android.net.Uri;
2013-05-28 09:10:36 -04:00
import android.os.Bundle;
import android.os.IBinder;
import android.os.Message;
2013-05-28 09:10:36 -04:00
import android.os.RemoteException;
2013-09-15 09:20:15 -04:00
public class OpenPgpService extends RemoteService {
2013-09-16 07:00:47 -04:00
private String getCachedPassphrase(long keyId, boolean allowUserInteraction)
throws UserInteractionRequiredException {
2013-09-15 09:20:15 -04:00
String passphrase = PassphraseCacheService.getCachedPassphrase(getContext(), keyId);
2013-09-06 07:48:27 -04:00
if (passphrase == null) {
2013-09-16 07:00:47 -04:00
if (!allowUserInteraction) {
throw new UserInteractionRequiredException(
2013-09-16 10:08:44 -04:00
"Passphrase not found in cache, please enter your passphrase!");
2013-09-16 07:00:47 -04:00
}
2013-09-06 07:48:27 -04:00
Log.d(Constants.TAG, "No passphrase! Activity required!");
// start passphrase dialog
2013-09-16 07:00:47 -04:00
PassphraseActivityCallback callback = new PassphraseActivityCallback();
2013-09-06 07:48:27 -04:00
Bundle extras = new Bundle();
2013-09-15 09:20:15 -04:00
extras.putLong(RemoteServiceActivity.EXTRA_SECRET_KEY_ID, keyId);
2013-09-16 07:00:47 -04:00
pauseAndStartUserInteraction(RemoteServiceActivity.ACTION_CACHE_PASSPHRASE, callback,
extras);
if (callback.isSuccess()) {
Log.d(Constants.TAG, "New passphrase entered!");
// get again after it was entered
2013-09-15 09:20:15 -04:00
passphrase = PassphraseCacheService.getCachedPassphrase(getContext(), keyId);
} else {
Log.d(Constants.TAG, "Passphrase dialog canceled!");
2013-09-08 17:08:30 -04:00
return null;
}
2013-09-06 07:48:27 -04:00
}
return passphrase;
}
2013-09-15 08:16:29 -04:00
public class PassphraseActivityCallback extends UserInputCallback {
2013-09-08 17:08:30 -04:00
private boolean success = false;
public boolean isSuccess() {
return success;
}
@Override
2013-09-15 08:16:29 -04:00
public void handleUserInput(Message msg) {
if (msg.arg1 == OKAY) {
success = true;
} else {
success = false;
}
}
};
2013-09-06 12:54:55 -04:00
/**
* Search database for key ids based on emails.
*
* @param encryptionUserIds
* @return
*/
2013-09-16 07:00:47 -04:00
private long[] getKeyIdsFromEmails(String[] encryptionUserIds, long ownKeyId,
boolean allowUserInteraction) throws UserInteractionRequiredException {
2013-09-06 12:54:55 -04:00
// find key ids to given emails in database
ArrayList<Long> keyIds = new ArrayList<Long>();
boolean missingUserIdsCheck = false;
boolean dublicateUserIdsCheck = false;
ArrayList<String> missingUserIds = new ArrayList<String>();
ArrayList<String> dublicateUserIds = new ArrayList<String>();
2013-09-06 12:54:55 -04:00
for (String email : encryptionUserIds) {
Uri uri = KeychainContract.KeyRings.buildPublicKeyRingsByEmailsUri(email);
Cursor cur = getContentResolver().query(uri, null, null, null, null);
if (cur.moveToFirst()) {
long id = cur.getLong(cur.getColumnIndex(KeychainContract.KeyRings.MASTER_KEY_ID));
keyIds.add(id);
} else {
missingUserIdsCheck = true;
missingUserIds.add(email);
2013-09-06 12:54:55 -04:00
Log.d(Constants.TAG, "user id missing");
}
if (cur.moveToNext()) {
dublicateUserIdsCheck = true;
dublicateUserIds.add(email);
2013-09-06 12:54:55 -04:00
Log.d(Constants.TAG, "more than one user id with the same email");
}
}
// also encrypt to our self (so that we can decrypt it later!)
keyIds.add(ownKeyId);
2013-09-06 12:54:55 -04:00
// convert to long[]
long[] keyIdsArray = new long[keyIds.size()];
for (int i = 0; i < keyIdsArray.length; i++) {
keyIdsArray[i] = keyIds.get(i);
}
2013-09-16 07:00:47 -04:00
// allow the user to verify pub key selection
if (allowUserInteraction && (missingUserIdsCheck || dublicateUserIdsCheck)) {
SelectPubKeysActivityCallback callback = new SelectPubKeysActivityCallback();
Bundle extras = new Bundle();
2013-09-15 09:20:15 -04:00
extras.putLongArray(RemoteServiceActivity.EXTRA_SELECTED_MASTER_KEY_IDS, keyIdsArray);
extras.putStringArrayList(RemoteServiceActivity.EXTRA_MISSING_USER_IDS, missingUserIds);
extras.putStringArrayList(RemoteServiceActivity.EXTRA_DUBLICATE_USER_IDS,
dublicateUserIds);
2013-09-16 07:00:47 -04:00
pauseAndStartUserInteraction(RemoteServiceActivity.ACTION_SELECT_PUB_KEYS, callback,
extras);
if (callback.isSuccess()) {
Log.d(Constants.TAG, "New selection of pub keys!");
keyIdsArray = callback.getPubKeyIds();
} else {
Log.d(Constants.TAG, "Pub key selection canceled!");
return null;
}
}
2013-09-16 07:00:47 -04:00
// if no user interaction is allow throw exceptions on duplicate or missing pub keys
if (!allowUserInteraction) {
if (missingUserIdsCheck)
throw new UserInteractionRequiredException(
"Pub keys for these user ids are missing:" + missingUserIds.toString());
if (dublicateUserIdsCheck)
throw new UserInteractionRequiredException(
"More than one pub key with these user ids exist:"
+ dublicateUserIds.toString());
}
if (keyIdsArray.length == 0) {
return null;
}
return keyIdsArray;
2013-09-06 12:54:55 -04:00
}
2013-09-15 08:16:29 -04:00
public class SelectPubKeysActivityCallback extends UserInputCallback {
public static final String PUB_KEY_IDS = "pub_key_ids";
private boolean success = false;
private long[] pubKeyIds;
public boolean isSuccess() {
return success;
}
public long[] getPubKeyIds() {
return pubKeyIds;
}
@Override
2013-09-15 08:16:29 -04:00
public void handleUserInput(Message msg) {
if (msg.arg1 == OKAY) {
success = true;
pubKeyIds = msg.getData().getLongArray(PUB_KEY_IDS);
} else {
success = false;
}
}
};
2013-09-06 12:54:55 -04:00
private synchronized void encryptAndSignSafe(byte[] inputBytes, String[] encryptionUserIds,
boolean asciiArmor, boolean allowUserInteraction, IOpenPgpCallback callback,
2013-09-16 07:08:02 -04:00
AppSettings appSettings, boolean sign) {
2013-06-17 13:51:41 -04:00
try {
// build InputData and write into OutputStream
InputStream inputStream = new ByteArrayInputStream(inputBytes);
long inputLength = inputBytes.length;
InputData inputData = new InputData(inputStream, inputLength);
2013-09-06 07:48:27 -04:00
OutputStream outputStream = new ByteArrayOutputStream();
2013-09-16 07:00:47 -04:00
long[] keyIds = getKeyIdsFromEmails(encryptionUserIds, appSettings.getKeyId(),
allowUserInteraction);
if (keyIds == null) {
2013-09-16 07:00:47 -04:00
throw new NoUserIdsException("No user ids!");
}
2013-09-06 07:48:27 -04:00
PgpOperation operation = new PgpOperation(getContext(), null, inputData, outputStream);
2013-09-06 12:54:55 -04:00
if (sign) {
2013-09-16 07:00:47 -04:00
String passphrase = getCachedPassphrase(appSettings.getKeyId(),
allowUserInteraction);
2013-09-08 17:08:30 -04:00
if (passphrase == null) {
2013-09-16 07:00:47 -04:00
throw new WrongPassphraseException("No or wrong passphrase!");
2013-09-08 17:08:30 -04:00
}
2013-09-08 12:21:04 -04:00
operation.signAndEncrypt(asciiArmor, appSettings.getCompression(), keyIds, null,
2013-09-06 12:54:55 -04:00
appSettings.getEncryptionAlgorithm(), appSettings.getKeyId(),
appSettings.getHashAlgorithm(), true, passphrase);
} else {
operation.signAndEncrypt(asciiArmor, appSettings.getCompression(), keyIds, null,
2013-09-06 12:54:55 -04:00
appSettings.getEncryptionAlgorithm(), Id.key.none,
appSettings.getHashAlgorithm(), true, null);
}
2013-06-17 13:51:41 -04:00
2013-09-06 07:48:27 -04:00
outputStream.close();
2013-06-17 13:51:41 -04:00
2013-09-06 07:48:27 -04:00
byte[] outputBytes = ((ByteArrayOutputStream) outputStream).toByteArray();
2013-06-17 13:51:41 -04:00
2013-09-06 07:48:27 -04:00
// return over handler on client side
callback.onSuccess(outputBytes, null);
2013-09-16 07:00:47 -04:00
} catch (UserInteractionRequiredException e) {
callbackOpenPgpError(callback, OpenPgpError.USER_INTERACTION_REQUIRED, e.getMessage());
} catch (NoUserIdsException e) {
callbackOpenPgpError(callback, OpenPgpError.NO_USER_IDS, e.getMessage());
} catch (WrongPassphraseException e) {
callbackOpenPgpError(callback, OpenPgpError.NO_OR_WRONG_PASSPHRASE, e.getMessage());
2013-06-17 13:51:41 -04:00
} catch (Exception e) {
2013-09-16 07:00:47 -04:00
callbackOpenPgpError(callback, OpenPgpError.GENERIC_ERROR, e.getMessage());
2013-06-17 13:51:41 -04:00
}
}
// TODO: asciiArmor?!
private void signSafe(byte[] inputBytes, boolean allowUserInteraction,
2013-09-16 07:08:02 -04:00
IOpenPgpCallback callback, AppSettings appSettings) {
2013-09-08 12:21:04 -04:00
try {
// build InputData and write into OutputStream
InputStream inputStream = new ByteArrayInputStream(inputBytes);
long inputLength = inputBytes.length;
InputData inputData = new InputData(inputStream, inputLength);
OutputStream outputStream = new ByteArrayOutputStream();
2013-09-16 07:00:47 -04:00
String passphrase = getCachedPassphrase(appSettings.getKeyId(), allowUserInteraction);
2013-09-08 17:08:30 -04:00
if (passphrase == null) {
2013-09-16 07:00:47 -04:00
throw new WrongPassphraseException("No or wrong passphrase!");
2013-09-08 17:08:30 -04:00
}
2013-09-08 12:21:04 -04:00
PgpOperation operation = new PgpOperation(getContext(), null, inputData, outputStream);
operation.signText(appSettings.getKeyId(), passphrase, appSettings.getHashAlgorithm(),
Preferences.getPreferences(this).getForceV3Signatures());
2013-09-08 12:21:04 -04:00
outputStream.close();
byte[] outputBytes = ((ByteArrayOutputStream) outputStream).toByteArray();
// return over handler on client side
callback.onSuccess(outputBytes, null);
2013-09-16 07:00:47 -04:00
} catch (UserInteractionRequiredException e) {
callbackOpenPgpError(callback, OpenPgpError.USER_INTERACTION_REQUIRED, e.getMessage());
} catch (WrongPassphraseException e) {
callbackOpenPgpError(callback, OpenPgpError.NO_OR_WRONG_PASSPHRASE, e.getMessage());
2013-09-08 12:21:04 -04:00
} catch (Exception e) {
2013-09-16 07:00:47 -04:00
callbackOpenPgpError(callback, OpenPgpError.GENERIC_ERROR, e.getMessage());
2013-09-08 12:21:04 -04:00
}
2013-09-06 12:36:16 -04:00
}
private synchronized void decryptAndVerifySafe(byte[] inputBytes, boolean allowUserInteraction,
2013-09-16 07:08:02 -04:00
IOpenPgpCallback callback, AppSettings appSettings) {
2013-05-28 09:10:36 -04:00
try {
2013-09-09 16:38:09 -04:00
// TODO: this is not really needed
// checked if it is text with BEGIN and END tags
String message = new String(inputBytes);
Log.d(Constants.TAG, "in: " + message);
boolean signedOnly = false;
Matcher matcher = PgpHelper.PGP_MESSAGE.matcher(message);
if (matcher.matches()) {
2013-09-09 16:38:09 -04:00
Log.d(Constants.TAG, "PGP_MESSAGE matched");
message = matcher.group(1);
// replace non breakable spaces
message = message.replaceAll("\\xa0", " ");
// overwrite inputBytes
inputBytes = message.getBytes();
} else {
matcher = PgpHelper.PGP_SIGNED_MESSAGE.matcher(message);
2013-09-09 16:38:09 -04:00
if (matcher.matches()) {
signedOnly = true;
Log.d(Constants.TAG, "PGP_SIGNED_MESSAGE matched");
message = matcher.group(1);
// replace non breakable spaces
message = message.replaceAll("\\xa0", " ");
// overwrite inputBytes
inputBytes = message.getBytes();
} else {
Log.d(Constants.TAG, "Nothing matched! Binary?");
}
}
2013-09-09 16:38:09 -04:00
// END TODO
Log.d(Constants.TAG, "in: " + new String(inputBytes));
2013-05-28 09:10:36 -04:00
2013-09-06 07:48:27 -04:00
// TODO: This allows to decrypt messages with ALL secret keys, not only the one for the
// app, Fix this?
2013-09-09 16:38:09 -04:00
String passphrase = null;
if (!signedOnly) {
// BEGIN Get key
// TODO: this input stream is consumed after PgpMain.getDecryptionKeyId()... do it
// better!
InputStream inputStream2 = new ByteArrayInputStream(inputBytes);
// TODO: duplicates functions from DecryptActivity!
long secretKeyId;
try {
if (inputStream2.markSupported()) {
2013-09-15 09:20:15 -04:00
// should probably set this to the max size of two
// pgpF objects, if it even needs to be anything other
// than 0.
inputStream2.mark(200);
2013-09-09 16:38:09 -04:00
}
secretKeyId = PgpHelper.getDecryptionKeyId(this, inputStream2);
2013-09-09 16:38:09 -04:00
if (secretKeyId == Id.key.none) {
throw new PgpGeneralException(getString(R.string.error_noSecretKeyFound));
2013-09-09 16:38:09 -04:00
}
} catch (NoAsymmetricEncryptionException e) {
2013-09-09 16:38:09 -04:00
if (inputStream2.markSupported()) {
inputStream2.reset();
}
secretKeyId = Id.key.symmetric;
if (!PgpOperation.hasSymmetricEncryption(this, inputStream2)) {
throw new PgpGeneralException(
2013-09-09 16:38:09 -04:00
getString(R.string.error_noKnownEncryptionFound));
}
2013-09-16 07:00:47 -04:00
// we do not support symmetric decryption from the API!
throw new Exception("Symmetric decryption is not supported!");
}
2013-09-09 16:38:09 -04:00
Log.d(Constants.TAG, "secretKeyId " + secretKeyId);
2013-09-16 07:00:47 -04:00
passphrase = getCachedPassphrase(secretKeyId, allowUserInteraction);
2013-09-09 16:38:09 -04:00
if (passphrase == null) {
2013-09-16 07:00:47 -04:00
throw new WrongPassphraseException("No or wrong passphrase!");
}
}
2013-05-28 09:10:36 -04:00
2013-09-09 16:38:09 -04:00
// build InputData and write into OutputStream
InputStream inputStream = new ByteArrayInputStream(inputBytes);
long inputLength = inputBytes.length;
InputData inputData = new InputData(inputStream, inputLength);
2013-05-28 09:10:36 -04:00
2013-09-09 16:38:09 -04:00
OutputStream outputStream = new ByteArrayOutputStream();
2013-05-28 09:10:36 -04:00
Bundle outputBundle;
PgpOperation operation = new PgpOperation(getContext(), null, inputData, outputStream);
if (signedOnly) {
// TODO: download missing keys from keyserver?
outputBundle = operation.verifyText(false);
} else {
2013-09-16 07:00:47 -04:00
outputBundle = operation.decryptAndVerify(passphrase, false);
}
2013-05-28 09:10:36 -04:00
outputStream.close();
byte[] outputBytes = ((ByteArrayOutputStream) outputStream).toByteArray();
// get signature informations from bundle
boolean signature = outputBundle.getBoolean(KeychainIntentService.RESULT_SIGNATURE);
2013-09-10 17:19:34 -04:00
OpenPgpSignatureResult sigResult = null;
if (signature) {
2013-09-15 09:23:13 -04:00
// long signatureKeyId = outputBundle
// .getLong(KeychainIntentService.RESULT_SIGNATURE_KEY_ID);
2013-09-13 20:08:06 -04:00
String signatureUserId = outputBundle
.getString(KeychainIntentService.RESULT_SIGNATURE_USER_ID);
boolean signatureSuccess = outputBundle
.getBoolean(KeychainIntentService.RESULT_SIGNATURE_SUCCESS);
boolean signatureUnknown = outputBundle
.getBoolean(KeychainIntentService.RESULT_SIGNATURE_UNKNOWN);
2013-09-15 08:16:29 -04:00
2013-09-13 20:08:06 -04:00
int signatureStatus = OpenPgpSignatureResult.SIGNATURE_ERROR;
if (signatureSuccess) {
2013-09-15 09:26:41 -04:00
signatureStatus = OpenPgpSignatureResult.SIGNATURE_SUCCESS_TRUSTED;
2013-09-13 20:08:06 -04:00
} else if (signatureUnknown) {
2013-09-16 10:30:06 -04:00
signatureStatus = OpenPgpSignatureResult.SIGNATURE_UNKNOWN_PUB_KEY;
2013-09-13 20:08:06 -04:00
}
sigResult = new OpenPgpSignatureResult(signatureStatus, signatureUserId, signedOnly);
}
2013-05-28 09:10:36 -04:00
// return over handler on client side
2013-07-01 17:19:53 -04:00
callback.onSuccess(outputBytes, sigResult);
2013-09-16 07:00:47 -04:00
} catch (UserInteractionRequiredException e) {
callbackOpenPgpError(callback, OpenPgpError.USER_INTERACTION_REQUIRED, e.getMessage());
} catch (WrongPassphraseException e) {
callbackOpenPgpError(callback, OpenPgpError.NO_OR_WRONG_PASSPHRASE, e.getMessage());
2013-05-28 09:10:36 -04:00
} catch (Exception e) {
2013-09-16 07:00:47 -04:00
callbackOpenPgpError(callback, OpenPgpError.GENERIC_ERROR, e.getMessage());
}
}
2013-05-28 09:10:36 -04:00
2013-09-16 07:00:47 -04:00
/**
* Returns error to IOpenPgpCallback
*
* @param callback
* @param errorId
* @param message
*/
private void callbackOpenPgpError(IOpenPgpCallback callback, int errorId, String message) {
try {
callback.onError(new OpenPgpError(0, message));
} catch (Exception t) {
2013-09-16 07:08:02 -04:00
Log.e(Constants.TAG,
"Exception while returning OpenPgpError to client via callback.onError()", t);
2013-05-28 09:10:36 -04:00
}
}
2013-09-10 17:19:34 -04:00
private final IOpenPgpService.Stub mBinder = new IOpenPgpService.Stub() {
2013-05-28 09:10:36 -04:00
@Override
2013-06-17 13:51:41 -04:00
public void encrypt(final byte[] inputBytes, final String[] encryptionUserIds,
2013-10-02 13:08:33 -04:00
final boolean asciiArmor, final IOpenPgpCallback callback) throws RemoteException {
2013-09-06 07:48:27 -04:00
final AppSettings settings = getAppSettings();
2013-06-17 13:51:41 -04:00
Runnable r = new Runnable() {
@Override
public void run() {
2013-10-02 13:08:33 -04:00
encryptAndSignSafe(inputBytes, encryptionUserIds, asciiArmor, true, callback,
settings, false);
2013-06-17 13:51:41 -04:00
}
};
checkAndEnqueue(r);
2013-05-28 09:10:36 -04:00
}
@Override
2013-09-13 20:08:06 -04:00
public void signAndEncrypt(final byte[] inputBytes, final String[] encryptionUserIds,
2013-10-02 13:08:33 -04:00
final boolean asciiArmor, final IOpenPgpCallback callback) throws RemoteException {
2013-09-06 12:36:16 -04:00
final AppSettings settings = getAppSettings();
Runnable r = new Runnable() {
@Override
public void run() {
2013-10-02 13:08:33 -04:00
encryptAndSignSafe(inputBytes, encryptionUserIds, asciiArmor, true, callback,
settings, true);
2013-09-06 12:36:16 -04:00
}
};
checkAndEnqueue(r);
2013-05-28 09:10:36 -04:00
}
@Override
2013-09-10 17:19:34 -04:00
public void sign(final byte[] inputBytes, boolean asciiArmor,
2013-10-02 13:08:33 -04:00
final IOpenPgpCallback callback) throws RemoteException {
2013-09-06 12:54:55 -04:00
final AppSettings settings = getAppSettings();
Runnable r = new Runnable() {
@Override
public void run() {
2013-10-02 13:08:33 -04:00
signSafe(inputBytes, true, callback, settings);
2013-09-06 12:54:55 -04:00
}
};
checkAndEnqueue(r);
2013-05-28 09:10:36 -04:00
}
@Override
2013-10-02 13:08:33 -04:00
public void decryptAndVerify(final byte[] inputBytes, final IOpenPgpCallback callback)
throws RemoteException {
2013-09-06 12:36:16 -04:00
final AppSettings settings = getAppSettings();
Runnable r = new Runnable() {
@Override
public void run() {
2013-10-02 13:08:33 -04:00
decryptAndVerifySafe(inputBytes, true, callback, settings);
}
};
checkAndEnqueue(r);
2013-05-28 09:10:36 -04:00
}
2013-10-02 13:08:33 -04:00
@Override
public boolean isKeyAvailable(String[] userIds) throws RemoteException {
// TODO
return false;
}
};
2013-09-16 07:08:02 -04:00
@Override
public IBinder onBind(Intent intent) {
return mBinder;
}
2013-05-28 09:10:36 -04:00
}