mirror of
https://github.com/moparisthebest/open-keychain
synced 2024-11-16 05:45:04 -05:00
Process safe implementation of PassphraseCacheService, First test for crypto provider
This commit is contained in:
parent
b221c0c905
commit
215864a33e
@ -406,7 +406,10 @@
|
|||||||
android:name=".ui.HelpActivity"
|
android:name=".ui.HelpActivity"
|
||||||
android:label="@string/title_help" />
|
android:label="@string/title_help" />
|
||||||
|
|
||||||
<service android:name=".service.PassphraseCacheService" />
|
<service
|
||||||
|
android:name=".service.PassphraseCacheService"
|
||||||
|
android:exported="false"
|
||||||
|
android:process=":passphrase_cache" />
|
||||||
<service android:name="org.sufficientlysecure.keychain.service.KeychainIntentService" />
|
<service android:name="org.sufficientlysecure.keychain.service.KeychainIntentService" />
|
||||||
<service
|
<service
|
||||||
android:name="org.sufficientlysecure.keychain.service.KeychainApiService"
|
android:name="org.sufficientlysecure.keychain.service.KeychainApiService"
|
||||||
@ -456,7 +459,8 @@
|
|||||||
<!-- Crypto Provider other intents -->
|
<!-- Crypto Provider other intents -->
|
||||||
<activity
|
<activity
|
||||||
android:name=".crypto_provider.CryptoActivity"
|
android:name=".crypto_provider.CryptoActivity"
|
||||||
android:label="TODO crypto activity" >
|
android:label="TODO crypto activity"
|
||||||
|
android:process=":crypto" >
|
||||||
<intent-filter>
|
<intent-filter>
|
||||||
<action android:name="org.sufficientlysecure.keychain.CRYPTO_CACHE_PASSPHRASE" />
|
<action android:name="org.sufficientlysecure.keychain.CRYPTO_CACHE_PASSPHRASE" />
|
||||||
|
|
||||||
@ -467,7 +471,8 @@
|
|||||||
<!-- Crypto Provider API -->
|
<!-- Crypto Provider API -->
|
||||||
<activity
|
<activity
|
||||||
android:name=".crypto_provider.RegisterActivity"
|
android:name=".crypto_provider.RegisterActivity"
|
||||||
android:label="TODO reg" >
|
android:label="TODO reg"
|
||||||
|
android:process=":crypto" >
|
||||||
<intent-filter>
|
<intent-filter>
|
||||||
<action android:name="com.android.crypto.REGISTER" />
|
<action android:name="com.android.crypto.REGISTER" />
|
||||||
|
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
/*
|
/*
|
||||||
* Copyright (C) 2012 Dominik Schürmann <dominik@dominikschuermann.de>
|
* Copyright (C) 2013 Dominik Schürmann <dominik@dominikschuermann.de>
|
||||||
*
|
*
|
||||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
* you may not use this file except in compliance with the License.
|
* you may not use this file except in compliance with the License.
|
||||||
@ -18,27 +18,16 @@ package org.sufficientlysecure.keychain.crypto_provider;
|
|||||||
|
|
||||||
import java.io.ByteArrayInputStream;
|
import java.io.ByteArrayInputStream;
|
||||||
import java.io.ByteArrayOutputStream;
|
import java.io.ByteArrayOutputStream;
|
||||||
import java.io.IOException;
|
|
||||||
import java.io.InputStream;
|
import java.io.InputStream;
|
||||||
import java.io.OutputStream;
|
import java.io.OutputStream;
|
||||||
import java.security.NoSuchAlgorithmException;
|
|
||||||
import java.security.NoSuchProviderException;
|
|
||||||
import java.security.SignatureException;
|
|
||||||
|
|
||||||
import org.spongycastle.openpgp.PGPException;
|
|
||||||
import org.sufficientlysecure.keychain.Constants;
|
import org.sufficientlysecure.keychain.Constants;
|
||||||
import org.sufficientlysecure.keychain.Id;
|
import org.sufficientlysecure.keychain.Id;
|
||||||
import org.sufficientlysecure.keychain.helper.PgpMain;
|
import org.sufficientlysecure.keychain.helper.PgpMain;
|
||||||
import org.sufficientlysecure.keychain.helper.PgpMain.PgpGeneralException;
|
|
||||||
import org.sufficientlysecure.keychain.util.InputData;
|
import org.sufficientlysecure.keychain.util.InputData;
|
||||||
import org.sufficientlysecure.keychain.util.Log;
|
import org.sufficientlysecure.keychain.util.Log;
|
||||||
import org.sufficientlysecure.keychain.R;
|
import org.sufficientlysecure.keychain.R;
|
||||||
import org.sufficientlysecure.keychain.service.IKeychainApiService;
|
|
||||||
import org.sufficientlysecure.keychain.service.KeychainIntentService;
|
import org.sufficientlysecure.keychain.service.KeychainIntentService;
|
||||||
import org.sufficientlysecure.keychain.service.PassphraseCacheService;
|
import org.sufficientlysecure.keychain.service.PassphraseCacheService;
|
||||||
import org.sufficientlysecure.keychain.service.handler.IKeychainDecryptHandler;
|
|
||||||
import org.sufficientlysecure.keychain.service.handler.IKeychainEncryptHandler;
|
|
||||||
import org.sufficientlysecure.keychain.service.handler.IKeychainGetDecryptionKeyIdHandler;
|
|
||||||
|
|
||||||
import com.android.crypto.CryptoError;
|
import com.android.crypto.CryptoError;
|
||||||
import com.android.crypto.ICryptoCallback;
|
import com.android.crypto.ICryptoCallback;
|
||||||
@ -59,13 +48,13 @@ public class CryptoService extends Service {
|
|||||||
public void onCreate() {
|
public void onCreate() {
|
||||||
super.onCreate();
|
super.onCreate();
|
||||||
mContext = this;
|
mContext = this;
|
||||||
Log.d(Constants.TAG, "KeychainApiService, onCreate()");
|
Log.d(Constants.TAG, "CryptoService, onCreate()");
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void onDestroy() {
|
public void onDestroy() {
|
||||||
super.onDestroy();
|
super.onDestroy();
|
||||||
Log.d(Constants.TAG, "KeychainApiService, onDestroy()");
|
Log.d(Constants.TAG, "CryptoService, onDestroy()");
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
@ -73,50 +62,8 @@ public class CryptoService extends Service {
|
|||||||
return mBinder;
|
return mBinder;
|
||||||
}
|
}
|
||||||
|
|
||||||
private synchronized void encryptAndSignSafe(byte[] inputBytes, String inputUri,
|
private synchronized void decryptAndVerifySafe(byte[] inputBytes, ICryptoCallback callback)
|
||||||
boolean useAsciiArmor, int compression, long[] encryptionKeyIds,
|
throws RemoteException {
|
||||||
String encryptionPassphrase, int symmetricEncryptionAlgorithm, long signatureKeyId,
|
|
||||||
int signatureHashAlgorithm, boolean signatureForceV3, String signaturePassphrase,
|
|
||||||
IKeychainEncryptHandler handler) throws RemoteException {
|
|
||||||
|
|
||||||
try {
|
|
||||||
|
|
||||||
// build InputData and write into OutputStream
|
|
||||||
InputStream inputStream = new ByteArrayInputStream(inputBytes);
|
|
||||||
long inputLength = inputBytes.length;
|
|
||||||
InputData input = new InputData(inputStream, inputLength);
|
|
||||||
|
|
||||||
OutputStream output = new ByteArrayOutputStream();
|
|
||||||
|
|
||||||
PgpMain.encryptAndSign(mContext, null, input, output, useAsciiArmor, compression,
|
|
||||||
encryptionKeyIds, encryptionPassphrase, symmetricEncryptionAlgorithm,
|
|
||||||
signatureKeyId, signatureHashAlgorithm, signatureForceV3, signaturePassphrase);
|
|
||||||
|
|
||||||
output.close();
|
|
||||||
|
|
||||||
// start activity from service, TOOD: Test!
|
|
||||||
// Intent dialogIntent = new Intent(getBaseContext(), myActivity.class);
|
|
||||||
// dialogIntent.addFlags(Intent.FLAG_ACTIVITY_NEW_TASK);
|
|
||||||
// getApplication().startActivity(dialogIntent);
|
|
||||||
|
|
||||||
byte[] outputBytes = ((ByteArrayOutputStream) output).toByteArray();
|
|
||||||
|
|
||||||
// return over handler on client side
|
|
||||||
handler.onSuccess(outputBytes, null);
|
|
||||||
} catch (Exception e) {
|
|
||||||
Log.e(Constants.TAG, "KeychainService, Exception!", e);
|
|
||||||
|
|
||||||
try {
|
|
||||||
handler.onException(getExceptionId(e), e.getMessage());
|
|
||||||
} catch (Exception t) {
|
|
||||||
Log.e(Constants.TAG, "Error returning exception to client", t);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
private synchronized void decryptAndVerifySafe(byte[] inputBytes, String passphrase,
|
|
||||||
boolean assumeSymmetric, IKeychainDecryptHandler handler) throws RemoteException {
|
|
||||||
|
|
||||||
try {
|
try {
|
||||||
// build InputData and write into OutputStream
|
// build InputData and write into OutputStream
|
||||||
InputStream inputStream = new ByteArrayInputStream(inputBytes);
|
InputStream inputStream = new ByteArrayInputStream(inputBytes);
|
||||||
@ -125,8 +72,36 @@ public class CryptoService extends Service {
|
|||||||
|
|
||||||
OutputStream outputStream = new ByteArrayOutputStream();
|
OutputStream outputStream = new ByteArrayOutputStream();
|
||||||
|
|
||||||
|
long secretKeyId = PgpMain.getDecryptionKeyId(mContext, inputStream);
|
||||||
|
if (secretKeyId == Id.key.none) {
|
||||||
|
throw new PgpMain.PgpGeneralException(getString(R.string.error_noSecretKeyFound));
|
||||||
|
}
|
||||||
|
|
||||||
|
Log.d(Constants.TAG, "secretKeyId " + secretKeyId);
|
||||||
|
|
||||||
|
String passphrase = PassphraseCacheService.getCachedPassphrase(mContext, secretKeyId);
|
||||||
|
|
||||||
|
if (passphrase == null) {
|
||||||
|
Log.d(Constants.TAG, "No passphrase! Activity required!");
|
||||||
|
// No passphrase cached for this ciphertext! Intent required to cache
|
||||||
|
// passphrase!
|
||||||
|
Intent intent = new Intent(CryptoActivity.ACTION_CACHE_PASSPHRASE);
|
||||||
|
intent.putExtra(CryptoActivity.EXTRA_SECRET_KEY_ID, secretKeyId);
|
||||||
|
callback.onActivityRequired(intent);
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
// if (signedOnly) {
|
||||||
|
// resultData = PgpMain.verifyText(this, this, inputData, outStream,
|
||||||
|
// lookupUnknownKey);
|
||||||
|
// } else {
|
||||||
|
// resultData = PgpMain.decryptAndVerify(this, this, inputData, outStream,
|
||||||
|
// PassphraseCacheService.getCachedPassphrase(this, secretKeyId),
|
||||||
|
// assumeSymmetricEncryption);
|
||||||
|
// }
|
||||||
|
|
||||||
Bundle outputBundle = PgpMain.decryptAndVerify(mContext, null, inputData, outputStream,
|
Bundle outputBundle = PgpMain.decryptAndVerify(mContext, null, inputData, outputStream,
|
||||||
passphrase, assumeSymmetric);
|
passphrase, false);
|
||||||
|
|
||||||
outputStream.close();
|
outputStream.close();
|
||||||
|
|
||||||
@ -143,52 +118,16 @@ public class CryptoService extends Service {
|
|||||||
boolean signatureUnknown = outputBundle
|
boolean signatureUnknown = outputBundle
|
||||||
.getBoolean(KeychainIntentService.RESULT_SIGNATURE_UNKNOWN);
|
.getBoolean(KeychainIntentService.RESULT_SIGNATURE_UNKNOWN);
|
||||||
|
|
||||||
// return over handler on client side
|
CryptoSignatureResult sigResult = new CryptoSignatureResult(signatureUserId, signature,
|
||||||
handler.onSuccess(outputBytes, null, signature, signatureKeyId, signatureUserId,
|
|
||||||
signatureSuccess, signatureUnknown);
|
signatureSuccess, signatureUnknown);
|
||||||
|
|
||||||
|
// return over handler on client side
|
||||||
|
callback.onDecryptVerifySuccess(outputBytes, sigResult);
|
||||||
} catch (Exception e) {
|
} catch (Exception e) {
|
||||||
Log.e(Constants.TAG, "KeychainService, Exception!", e);
|
Log.e(Constants.TAG, "KeychainService, Exception!", e);
|
||||||
|
|
||||||
try {
|
try {
|
||||||
handler.onException(getExceptionId(e), e.getMessage());
|
callback.onError(new CryptoError(0, e.getMessage()));
|
||||||
} catch (Exception t) {
|
|
||||||
Log.e(Constants.TAG, "Error returning exception to client", t);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
private synchronized void getDecryptionKeySafe(byte[] inputBytes, String inputUri,
|
|
||||||
IKeychainGetDecryptionKeyIdHandler handler) {
|
|
||||||
|
|
||||||
// TODO: implement inputUri
|
|
||||||
|
|
||||||
try {
|
|
||||||
InputStream inputStream = new ByteArrayInputStream(inputBytes);
|
|
||||||
|
|
||||||
long secretKeyId = Id.key.none;
|
|
||||||
boolean symmetric;
|
|
||||||
|
|
||||||
try {
|
|
||||||
secretKeyId = PgpMain.getDecryptionKeyId(CryptoService.this, inputStream);
|
|
||||||
if (secretKeyId == Id.key.none) {
|
|
||||||
throw new PgpGeneralException(getString(R.string.error_noSecretKeyFound));
|
|
||||||
}
|
|
||||||
symmetric = false;
|
|
||||||
} catch (PgpMain.NoAsymmetricEncryptionException e) {
|
|
||||||
secretKeyId = Id.key.symmetric;
|
|
||||||
if (!PgpMain.hasSymmetricEncryption(CryptoService.this, inputStream)) {
|
|
||||||
throw new PgpGeneralException(getString(R.string.error_noKnownEncryptionFound));
|
|
||||||
}
|
|
||||||
symmetric = true;
|
|
||||||
}
|
|
||||||
|
|
||||||
handler.onSuccess(secretKeyId, symmetric);
|
|
||||||
|
|
||||||
} catch (Exception e) {
|
|
||||||
Log.e(Constants.TAG, "KeychainService, Exception!", e);
|
|
||||||
|
|
||||||
try {
|
|
||||||
handler.onException(getExceptionId(e), e.getMessage());
|
|
||||||
} catch (Exception t) {
|
} catch (Exception t) {
|
||||||
Log.e(Constants.TAG, "Error returning exception to client", t);
|
Log.e(Constants.TAG, "Error returning exception to client", t);
|
||||||
}
|
}
|
||||||
@ -221,171 +160,35 @@ public class CryptoService extends Service {
|
|||||||
@Override
|
@Override
|
||||||
public void decryptAndVerify(byte[] inputBytes, ICryptoCallback callback)
|
public void decryptAndVerify(byte[] inputBytes, ICryptoCallback callback)
|
||||||
throws RemoteException {
|
throws RemoteException {
|
||||||
|
decryptAndVerifySafe(inputBytes, callback);
|
||||||
try {
|
|
||||||
// build InputData and write into OutputStream
|
|
||||||
InputStream inputStream = new ByteArrayInputStream(inputBytes);
|
|
||||||
long inputLength = inputBytes.length;
|
|
||||||
InputData inputData = new InputData(inputStream, inputLength);
|
|
||||||
|
|
||||||
OutputStream outputStream = new ByteArrayOutputStream();
|
|
||||||
|
|
||||||
// String passphrase = "";
|
|
||||||
|
|
||||||
long secretKeyId = PgpMain.getDecryptionKeyId(mContext, inputStream);
|
|
||||||
if (secretKeyId == Id.key.none) {
|
|
||||||
throw new PgpMain.PgpGeneralException(
|
|
||||||
getString(R.string.error_noSecretKeyFound));
|
|
||||||
}
|
|
||||||
|
|
||||||
String passphrase = PassphraseCacheService.getCachedPassphrase(mContext,
|
|
||||||
secretKeyId);
|
|
||||||
|
|
||||||
if (passphrase == null) {
|
|
||||||
// No passphrase cached for this ciphertext! Intent required to cache
|
|
||||||
// passphrase!
|
|
||||||
Intent intent = new Intent(CryptoActivity.ACTION_CACHE_PASSPHRASE);
|
|
||||||
intent.putExtra(CryptoActivity.EXTRA_SECRET_KEY_ID, secretKeyId);
|
|
||||||
callback.onActivityRequired(intent);
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
// if (signedOnly) {
|
|
||||||
// resultData = PgpMain.verifyText(this, this, inputData, outStream,
|
|
||||||
// lookupUnknownKey);
|
|
||||||
// } else {
|
|
||||||
// resultData = PgpMain.decryptAndVerify(this, this, inputData, outStream,
|
|
||||||
// PassphraseCacheService.getCachedPassphrase(this, secretKeyId),
|
|
||||||
// assumeSymmetricEncryption);
|
|
||||||
// }
|
|
||||||
|
|
||||||
Bundle outputBundle = PgpMain.decryptAndVerify(mContext, null, inputData,
|
|
||||||
outputStream, passphrase, false);
|
|
||||||
|
|
||||||
outputStream.close();
|
|
||||||
|
|
||||||
byte[] outputBytes = ((ByteArrayOutputStream) outputStream).toByteArray();
|
|
||||||
|
|
||||||
// get signature informations from bundle
|
|
||||||
boolean signature = outputBundle.getBoolean(KeychainIntentService.RESULT_SIGNATURE);
|
|
||||||
long signatureKeyId = outputBundle
|
|
||||||
.getLong(KeychainIntentService.RESULT_SIGNATURE_KEY_ID);
|
|
||||||
String signatureUserId = outputBundle
|
|
||||||
.getString(KeychainIntentService.RESULT_SIGNATURE_USER_ID);
|
|
||||||
boolean signatureSuccess = outputBundle
|
|
||||||
.getBoolean(KeychainIntentService.RESULT_SIGNATURE_SUCCESS);
|
|
||||||
boolean signatureUnknown = outputBundle
|
|
||||||
.getBoolean(KeychainIntentService.RESULT_SIGNATURE_UNKNOWN);
|
|
||||||
|
|
||||||
CryptoSignatureResult sigResult = new CryptoSignatureResult(signatureUserId,
|
|
||||||
signature, signatureSuccess, signatureUnknown);
|
|
||||||
|
|
||||||
// return over handler on client side
|
|
||||||
callback.onDecryptVerifySuccess(outputBytes, sigResult);
|
|
||||||
// handler.onSuccess(outputBytes, null, signature, signatureKeyId, signatureUserId,
|
|
||||||
// signatureSuccess, signatureUnknown);
|
|
||||||
} catch (Exception e) {
|
|
||||||
Log.e(Constants.TAG, "KeychainService, Exception!", e);
|
|
||||||
|
|
||||||
try {
|
|
||||||
callback.onError(new CryptoError(getExceptionId(e), e.getMessage()));
|
|
||||||
} catch (Exception t) {
|
|
||||||
Log.e(Constants.TAG, "Error returning exception to client", t);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
}
|
||||||
//
|
|
||||||
// @Override
|
|
||||||
// public void encryptAsymmetric(byte[] inputBytes, String inputUri, boolean useAsciiArmor,
|
|
||||||
// int compression, long[] encryptionKeyIds, int symmetricEncryptionAlgorithm,
|
|
||||||
// IKeychainEncryptHandler handler) throws RemoteException {
|
|
||||||
//
|
|
||||||
// encryptAndSignSafe(inputBytes, inputUri, useAsciiArmor, compression, encryptionKeyIds,
|
|
||||||
// null, symmetricEncryptionAlgorithm, Id.key.none, 0, false, null, handler);
|
|
||||||
// }
|
|
||||||
//
|
|
||||||
// @Override
|
|
||||||
// public void encryptSymmetric(byte[] inputBytes, String inputUri, boolean useAsciiArmor,
|
|
||||||
// int compression, String encryptionPassphrase, int symmetricEncryptionAlgorithm,
|
|
||||||
// IKeychainEncryptHandler handler) throws RemoteException {
|
|
||||||
//
|
|
||||||
// encryptAndSignSafe(inputBytes, inputUri, useAsciiArmor, compression, null,
|
|
||||||
// encryptionPassphrase, symmetricEncryptionAlgorithm, Id.key.none, 0, false,
|
|
||||||
// null, handler);
|
|
||||||
// }
|
|
||||||
//
|
|
||||||
// @Override
|
|
||||||
// public void encryptAndSignAsymmetric(byte[] inputBytes, String inputUri,
|
|
||||||
// boolean useAsciiArmor, int compression, long[] encryptionKeyIds,
|
|
||||||
// int symmetricEncryptionAlgorithm, long signatureKeyId, int signatureHashAlgorithm,
|
|
||||||
// boolean signatureForceV3, String signaturePassphrase,
|
|
||||||
// IKeychainEncryptHandler handler) throws RemoteException {
|
|
||||||
//
|
|
||||||
// encryptAndSignSafe(inputBytes, inputUri, useAsciiArmor, compression, encryptionKeyIds,
|
|
||||||
// null, symmetricEncryptionAlgorithm, signatureKeyId, signatureHashAlgorithm,
|
|
||||||
// signatureForceV3, signaturePassphrase, handler);
|
|
||||||
// }
|
|
||||||
//
|
|
||||||
// @Override
|
|
||||||
// public void encryptAndSignSymmetric(byte[] inputBytes, String inputUri,
|
|
||||||
// boolean useAsciiArmor, int compression, String encryptionPassphrase,
|
|
||||||
// int symmetricEncryptionAlgorithm, long signatureKeyId, int signatureHashAlgorithm,
|
|
||||||
// boolean signatureForceV3, String signaturePassphrase,
|
|
||||||
// IKeychainEncryptHandler handler) throws RemoteException {
|
|
||||||
//
|
|
||||||
// encryptAndSignSafe(inputBytes, inputUri, useAsciiArmor, compression, null,
|
|
||||||
// encryptionPassphrase, symmetricEncryptionAlgorithm, signatureKeyId,
|
|
||||||
// signatureHashAlgorithm, signatureForceV3, signaturePassphrase, handler);
|
|
||||||
// }
|
|
||||||
//
|
|
||||||
// @Override
|
|
||||||
// public void decryptAndVerifyAsymmetric(byte[] inputBytes, String inputUri,
|
|
||||||
// String keyPassphrase, IKeychainDecryptHandler handler) throws RemoteException {
|
|
||||||
//
|
|
||||||
// decryptAndVerifySafe(inputBytes, inputUri, keyPassphrase, false, handler);
|
|
||||||
// }
|
|
||||||
//
|
|
||||||
// @Override
|
|
||||||
// public void decryptAndVerifySymmetric(byte[] inputBytes, String inputUri,
|
|
||||||
// String encryptionPassphrase, IKeychainDecryptHandler handler)
|
|
||||||
// throws RemoteException {
|
|
||||||
//
|
|
||||||
// decryptAndVerifySafe(inputBytes, inputUri, encryptionPassphrase, true, handler);
|
|
||||||
// }
|
|
||||||
//
|
|
||||||
// @Override
|
|
||||||
// public void getDecryptionKeyId(byte[] inputBytes, String inputUri,
|
|
||||||
// IKeychainGetDecryptionKeyIdHandler handler) throws RemoteException {
|
|
||||||
//
|
|
||||||
// getDecryptionKeySafe(inputBytes, inputUri, handler);
|
|
||||||
// }
|
|
||||||
|
|
||||||
};
|
};
|
||||||
|
|
||||||
/**
|
// /**
|
||||||
* As we can not throw an exception through Android RPC, we assign identifiers to the exception
|
// * As we can not throw an exception through Android RPC, we assign identifiers to the
|
||||||
* types.
|
// exception
|
||||||
*
|
// * types.
|
||||||
* @param e
|
// *
|
||||||
* @return
|
// * @param e
|
||||||
*/
|
// * @return
|
||||||
private int getExceptionId(Exception e) {
|
// */
|
||||||
if (e instanceof NoSuchProviderException) {
|
// private int getExceptionId(Exception e) {
|
||||||
return 0;
|
// if (e instanceof NoSuchProviderException) {
|
||||||
} else if (e instanceof NoSuchAlgorithmException) {
|
// return 0;
|
||||||
return 1;
|
// } else if (e instanceof NoSuchAlgorithmException) {
|
||||||
} else if (e instanceof SignatureException) {
|
// return 1;
|
||||||
return 2;
|
// } else if (e instanceof SignatureException) {
|
||||||
} else if (e instanceof IOException) {
|
// return 2;
|
||||||
return 3;
|
// } else if (e instanceof IOException) {
|
||||||
} else if (e instanceof PgpGeneralException) {
|
// return 3;
|
||||||
return 4;
|
// } else if (e instanceof PgpGeneralException) {
|
||||||
} else if (e instanceof PGPException) {
|
// return 4;
|
||||||
return 5;
|
// } else if (e instanceof PGPException) {
|
||||||
} else {
|
// return 5;
|
||||||
return -1;
|
// } else {
|
||||||
}
|
// return -1;
|
||||||
}
|
// }
|
||||||
|
// }
|
||||||
|
|
||||||
}
|
}
|
||||||
|
@ -56,7 +56,6 @@ import android.os.Message;
|
|||||||
import android.os.Messenger;
|
import android.os.Messenger;
|
||||||
import android.os.RemoteException;
|
import android.os.RemoteException;
|
||||||
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* This Service contains all important long lasting operations for APG. It receives Intents with
|
* This Service contains all important long lasting operations for APG. It receives Intents with
|
||||||
* data from the activities or other apps, queues these intents, executes them, and stops itself
|
* data from the activities or other apps, queues these intents, executes them, and stops itself
|
||||||
@ -541,11 +540,12 @@ public class KeychainIntentService extends IntentService implements ProgressDial
|
|||||||
|
|
||||||
/* Operation */
|
/* Operation */
|
||||||
if (!canSign) {
|
if (!canSign) {
|
||||||
PgpMain.changeSecretKeyPassphrase(this, ProviderHelper.getPGPSecretKeyRingByKeyId(this, masterKeyId),
|
PgpMain.changeSecretKeyPassphrase(this,
|
||||||
oldPassPhrase, newPassPhrase, this);
|
ProviderHelper.getPGPSecretKeyRingByKeyId(this, masterKeyId),
|
||||||
|
oldPassPhrase, newPassPhrase, this);
|
||||||
} else {
|
} else {
|
||||||
PgpMain.buildSecretKey(this, userIds, keys, keysUsages, masterKeyId, oldPassPhrase,
|
PgpMain.buildSecretKey(this, userIds, keys, keysUsages, masterKeyId,
|
||||||
newPassPhrase, this);
|
oldPassPhrase, newPassPhrase, this);
|
||||||
}
|
}
|
||||||
PassphraseCacheService.addCachedPassphrase(this, masterKeyId, newPassPhrase);
|
PassphraseCacheService.addCachedPassphrase(this, masterKeyId, newPassPhrase);
|
||||||
|
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
/*
|
/*
|
||||||
* Copyright (C) 2012 Dominik Schürmann <dominik@dominikschuermann.de>
|
* Copyright (C) 2012-2013 Dominik Schürmann <dominik@dominikschuermann.de>
|
||||||
*
|
*
|
||||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
* you may not use this file except in compliance with the License.
|
* you may not use this file except in compliance with the License.
|
||||||
@ -39,27 +39,39 @@ import android.content.Context;
|
|||||||
import android.content.Intent;
|
import android.content.Intent;
|
||||||
import android.content.IntentFilter;
|
import android.content.IntentFilter;
|
||||||
import android.os.Binder;
|
import android.os.Binder;
|
||||||
|
import android.os.Bundle;
|
||||||
|
import android.os.Handler;
|
||||||
|
import android.os.HandlerThread;
|
||||||
import android.os.IBinder;
|
import android.os.IBinder;
|
||||||
|
import android.os.Message;
|
||||||
|
import android.os.Messenger;
|
||||||
|
import android.os.RemoteException;
|
||||||
import android.util.Log;
|
import android.util.Log;
|
||||||
|
|
||||||
public class PassphraseCacheService extends Service {
|
public class PassphraseCacheService extends Service {
|
||||||
public static final String TAG = Constants.TAG + ": PassphraseCacheService";
|
public static final String TAG = Constants.TAG + ": PassphraseCacheService";
|
||||||
|
|
||||||
|
public static final String ACTION_PASSPHRASE_CACHE_ADD = Constants.INTENT_PREFIX
|
||||||
|
+ "PASSPHRASE_CACHE_ADD";
|
||||||
|
public static final String ACTION_PASSPHRASE_CACHE_GET = Constants.INTENT_PREFIX
|
||||||
|
+ "PASSPHRASE_CACHE_GET";
|
||||||
|
|
||||||
public static final String BROADCAST_ACTION_PASSPHRASE_CACHE_SERVICE = Constants.INTENT_PREFIX
|
public static final String BROADCAST_ACTION_PASSPHRASE_CACHE_SERVICE = Constants.INTENT_PREFIX
|
||||||
+ "PASSPHRASE_CACHE_SERVICE";
|
+ "PASSPHRASE_CACHE_BROADCAST";
|
||||||
|
|
||||||
public static final String EXTRA_TTL = "ttl";
|
public static final String EXTRA_TTL = "ttl";
|
||||||
public static final String EXTRA_KEY_ID = "keyId";
|
public static final String EXTRA_KEY_ID = "keyId";
|
||||||
public static final String EXTRA_PASSPHRASE = "passphrase";
|
public static final String EXTRA_PASSPHRASE = "passphrase";
|
||||||
|
public static final String EXTRA_MESSENGER = "messenger";
|
||||||
|
|
||||||
private static final int REQUEST_ID = 0;
|
private static final int REQUEST_ID = 0;
|
||||||
private static final long DEFAULT_TTL = 15;
|
private static final long DEFAULT_TTL = 15;
|
||||||
|
|
||||||
private BroadcastReceiver mIntentReceiver;
|
private BroadcastReceiver mIntentReceiver;
|
||||||
|
|
||||||
// This is static to be easily retrieved by getCachedPassphrase() without the need of callback
|
private HashMap<Long, String> mPassphraseCache = new HashMap<Long, String>();
|
||||||
// functions
|
|
||||||
private static HashMap<Long, String> mPassphraseCache = new HashMap<Long, String>();
|
Context mContext;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* This caches a new passphrase by sending a new command to the service. An android service is
|
* This caches a new passphrase by sending a new command to the service. An android service is
|
||||||
@ -74,6 +86,7 @@ public class PassphraseCacheService extends Service {
|
|||||||
Log.d(TAG, "cacheNewPassphrase() for " + keyId);
|
Log.d(TAG, "cacheNewPassphrase() for " + keyId);
|
||||||
|
|
||||||
Intent intent = new Intent(context, PassphraseCacheService.class);
|
Intent intent = new Intent(context, PassphraseCacheService.class);
|
||||||
|
intent.setAction(ACTION_PASSPHRASE_CACHE_ADD);
|
||||||
intent.putExtra(EXTRA_TTL, Preferences.getPreferences(context).getPassPhraseCacheTtl());
|
intent.putExtra(EXTRA_TTL, Preferences.getPreferences(context).getPassPhraseCacheTtl());
|
||||||
intent.putExtra(EXTRA_PASSPHRASE, passphrase);
|
intent.putExtra(EXTRA_PASSPHRASE, passphrase);
|
||||||
intent.putExtra(EXTRA_KEY_ID, keyId);
|
intent.putExtra(EXTRA_KEY_ID, keyId);
|
||||||
@ -82,17 +95,65 @@ public class PassphraseCacheService extends Service {
|
|||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Gets a cached passphrase from memory
|
* Gets a cached passphrase from memory, blocking method
|
||||||
*
|
*
|
||||||
* @param context
|
* @param context
|
||||||
* @param keyId
|
* @param keyId
|
||||||
* @return
|
* @return
|
||||||
*/
|
*/
|
||||||
public static String getCachedPassphrase(Context context, long keyId) {
|
public static String getCachedPassphrase(Context context, long keyId) {
|
||||||
|
Log.d(TAG, "getCachedPassphrase() get masterKeyId for " + keyId);
|
||||||
|
Intent intent = new Intent(context, PassphraseCacheService.class);
|
||||||
|
intent.setAction(ACTION_PASSPHRASE_CACHE_GET);
|
||||||
|
|
||||||
|
final Object mutex = new Object();
|
||||||
|
final Bundle returnBundle = new Bundle();
|
||||||
|
|
||||||
|
HandlerThread handlerThread = new HandlerThread("getPassphrase");
|
||||||
|
handlerThread.start();
|
||||||
|
Handler returnHandler = new Handler(handlerThread.getLooper()) {
|
||||||
|
@Override
|
||||||
|
public void handleMessage(Message message) {
|
||||||
|
if (message.obj != null) {
|
||||||
|
String passphrase = ((Bundle) message.obj).getString(EXTRA_PASSPHRASE);
|
||||||
|
returnBundle.putString(EXTRA_PASSPHRASE, passphrase);
|
||||||
|
}
|
||||||
|
synchronized (mutex) {
|
||||||
|
mutex.notify();
|
||||||
|
}
|
||||||
|
getLooper().quit();
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
// Create a new Messenger for the communication back
|
||||||
|
Messenger messenger = new Messenger(returnHandler);
|
||||||
|
intent.putExtra(EXTRA_KEY_ID, keyId);
|
||||||
|
intent.putExtra(EXTRA_MESSENGER, messenger);
|
||||||
|
// send intent to this service
|
||||||
|
context.startService(intent);
|
||||||
|
|
||||||
|
// Wait on mutex until passphrase is returned to handlerThread
|
||||||
|
synchronized (mutex) {
|
||||||
|
try {
|
||||||
|
mutex.wait(3000);
|
||||||
|
} catch (InterruptedException e) {
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if (returnBundle.containsKey(EXTRA_PASSPHRASE)) {
|
||||||
|
return returnBundle.getString(EXTRA_PASSPHRASE);
|
||||||
|
} else {
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
private String getCachedPassphraseImpl(long keyId) {
|
||||||
|
Log.d(TAG, "getCachedPassphraseImpl() get masterKeyId for " + keyId);
|
||||||
|
|
||||||
// try to get master key id which is used as an identifier for cached passphrases
|
// try to get master key id which is used as an identifier for cached passphrases
|
||||||
long masterKeyId = keyId;
|
long masterKeyId = keyId;
|
||||||
if (masterKeyId != Id.key.symmetric) {
|
if (masterKeyId != Id.key.symmetric) {
|
||||||
PGPSecretKeyRing keyRing = ProviderHelper.getPGPSecretKeyRingByKeyId(context, keyId);
|
PGPSecretKeyRing keyRing = ProviderHelper.getPGPSecretKeyRingByKeyId(this, keyId);
|
||||||
if (keyRing == null) {
|
if (keyRing == null) {
|
||||||
return null;
|
return null;
|
||||||
}
|
}
|
||||||
@ -102,22 +163,24 @@ public class PassphraseCacheService extends Service {
|
|||||||
}
|
}
|
||||||
masterKeyId = masterKey.getKeyID();
|
masterKeyId = masterKey.getKeyID();
|
||||||
}
|
}
|
||||||
|
Log.d(TAG, "getCachedPassphraseImpl() for masterKeyId" + masterKeyId);
|
||||||
|
|
||||||
// get cached passphrase
|
// get cached passphrase
|
||||||
String cachedPassphrase = mPassphraseCache.get(masterKeyId);
|
String cachedPassphrase = mPassphraseCache.get(masterKeyId);
|
||||||
if (cachedPassphrase == null) {
|
if (cachedPassphrase == null) {
|
||||||
|
// TODO: fix!
|
||||||
// check if secret key has a passphrase
|
// check if secret key has a passphrase
|
||||||
if (!hasPassphrase(context, masterKeyId)) {
|
// if (!hasPassphrase(context, masterKeyId)) {
|
||||||
// cache empty passphrase
|
// // cache empty passphrase
|
||||||
addCachedPassphrase(context, masterKeyId, "");
|
// addCachedPassphrase(context, masterKeyId, "");
|
||||||
return "";
|
// return "";
|
||||||
} else {
|
// } else {
|
||||||
return null;
|
return null;
|
||||||
}
|
// }
|
||||||
}
|
}
|
||||||
// set it again to reset the cache life cycle
|
// set it again to reset the cache life cycle
|
||||||
Log.d(TAG, "Cache passphrase again when getting it!");
|
Log.d(TAG, "Cache passphrase again when getting it!");
|
||||||
addCachedPassphrase(context, masterKeyId, cachedPassphrase);
|
addCachedPassphrase(this, masterKeyId, cachedPassphrase);
|
||||||
|
|
||||||
return cachedPassphrase;
|
return cachedPassphrase;
|
||||||
}
|
}
|
||||||
@ -196,11 +259,6 @@ public class PassphraseCacheService extends Service {
|
|||||||
return sender;
|
return sender;
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
|
||||||
public void onCreate() {
|
|
||||||
Log.d(TAG, "onCreate()");
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Executed when service is started by intent
|
* Executed when service is started by intent
|
||||||
*/
|
*/
|
||||||
@ -211,20 +269,41 @@ public class PassphraseCacheService extends Service {
|
|||||||
// register broadcastreceiver
|
// register broadcastreceiver
|
||||||
registerReceiver();
|
registerReceiver();
|
||||||
|
|
||||||
if (intent != null) {
|
if (intent != null && intent.getAction() != null) {
|
||||||
long ttl = intent.getLongExtra(EXTRA_TTL, DEFAULT_TTL);
|
if (ACTION_PASSPHRASE_CACHE_ADD.equals(intent.getAction())) {
|
||||||
long keyId = intent.getLongExtra(EXTRA_KEY_ID, -1);
|
long ttl = intent.getLongExtra(EXTRA_TTL, DEFAULT_TTL);
|
||||||
String passphrase = intent.getStringExtra(EXTRA_PASSPHRASE);
|
long keyId = intent.getLongExtra(EXTRA_KEY_ID, -1);
|
||||||
|
String passphrase = intent.getStringExtra(EXTRA_PASSPHRASE);
|
||||||
|
|
||||||
Log.d(TAG, "Received intent in onStartCommand() with keyId: " + keyId + ", ttl: " + ttl);
|
Log.d(TAG,
|
||||||
|
"Received ACTION_PASSPHRASE_CACHE_ADD intent in onStartCommand() with keyId: "
|
||||||
|
+ keyId + ", ttl: " + ttl);
|
||||||
|
|
||||||
// add keyId and passphrase to memory
|
// add keyId and passphrase to memory
|
||||||
mPassphraseCache.put(keyId, passphrase);
|
mPassphraseCache.put(keyId, passphrase);
|
||||||
|
|
||||||
// register new alarm with keyId for this passphrase
|
// register new alarm with keyId for this passphrase
|
||||||
long triggerTime = new Date().getTime() + (ttl * 1000);
|
long triggerTime = new Date().getTime() + (ttl * 1000);
|
||||||
AlarmManager am = (AlarmManager) this.getSystemService(Context.ALARM_SERVICE);
|
AlarmManager am = (AlarmManager) this.getSystemService(Context.ALARM_SERVICE);
|
||||||
am.set(AlarmManager.RTC_WAKEUP, triggerTime, buildIntent(this, keyId));
|
am.set(AlarmManager.RTC_WAKEUP, triggerTime, buildIntent(this, keyId));
|
||||||
|
} else if (ACTION_PASSPHRASE_CACHE_GET.equals(intent.getAction())) {
|
||||||
|
long keyId = intent.getLongExtra(EXTRA_KEY_ID, -1);
|
||||||
|
Messenger messenger = intent.getParcelableExtra(EXTRA_MESSENGER);
|
||||||
|
|
||||||
|
String passphrase = getCachedPassphraseImpl(keyId);
|
||||||
|
|
||||||
|
Message msg = Message.obtain();
|
||||||
|
Bundle bundle = new Bundle();
|
||||||
|
bundle.putString(EXTRA_PASSPHRASE, passphrase);
|
||||||
|
msg.obj = bundle;
|
||||||
|
try {
|
||||||
|
messenger.send(msg);
|
||||||
|
} catch (RemoteException e) {
|
||||||
|
Log.e(Constants.TAG, "Sending message failed", e);
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
Log.e(Constants.TAG, "Intent or Intent Action not supported!");
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
return START_STICKY;
|
return START_STICKY;
|
||||||
@ -240,7 +319,7 @@ public class PassphraseCacheService extends Service {
|
|||||||
// remove passphrase corresponding to keyId from memory
|
// remove passphrase corresponding to keyId from memory
|
||||||
mPassphraseCache.remove(keyId);
|
mPassphraseCache.remove(keyId);
|
||||||
|
|
||||||
Log.d(TAG, "Timeout of " + keyId + ", removed from memory!");
|
Log.d(TAG, "Timeout of keyId " + keyId + ", removed from memory!");
|
||||||
|
|
||||||
// stop whole service if no cached passphrases remaining
|
// stop whole service if no cached passphrases remaining
|
||||||
if (mPassphraseCache.isEmpty()) {
|
if (mPassphraseCache.isEmpty()) {
|
||||||
@ -249,13 +328,26 @@ public class PassphraseCacheService extends Service {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void onCreate() {
|
||||||
|
super.onCreate();
|
||||||
|
mContext = this;
|
||||||
|
Log.d(Constants.TAG, "PassphraseCacheService, onCreate()");
|
||||||
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void onDestroy() {
|
public void onDestroy() {
|
||||||
Log.d(TAG, "onDestroy()");
|
super.onDestroy();
|
||||||
|
Log.d(Constants.TAG, "PassphraseCacheService, onDestroy()");
|
||||||
|
|
||||||
unregisterReceiver(mIntentReceiver);
|
unregisterReceiver(mIntentReceiver);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public IBinder onBind(Intent intent) {
|
||||||
|
return mBinder;
|
||||||
|
}
|
||||||
|
|
||||||
public class PassphraseCacheBinder extends Binder {
|
public class PassphraseCacheBinder extends Binder {
|
||||||
public PassphraseCacheService getService() {
|
public PassphraseCacheService getService() {
|
||||||
return PassphraseCacheService.this;
|
return PassphraseCacheService.this;
|
||||||
@ -264,9 +356,4 @@ public class PassphraseCacheService extends Service {
|
|||||||
|
|
||||||
private final IBinder mBinder = new PassphraseCacheBinder();
|
private final IBinder mBinder = new PassphraseCacheBinder();
|
||||||
|
|
||||||
@Override
|
|
||||||
public IBinder onBind(Intent intent) {
|
|
||||||
return mBinder;
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
}
|
@ -199,7 +199,8 @@ public class SignKeyActivity extends SherlockFragmentActivity {
|
|||||||
// Send all information needed to service to sign key in other thread
|
// Send all information needed to service to sign key in other thread
|
||||||
Intent intent = new Intent(this, KeychainIntentService.class);
|
Intent intent = new Intent(this, KeychainIntentService.class);
|
||||||
|
|
||||||
intent.putExtra(KeychainIntentService.EXTRA_ACTION, KeychainIntentService.ACTION_SIGN_KEYRING);
|
intent.putExtra(KeychainIntentService.EXTRA_ACTION,
|
||||||
|
KeychainIntentService.ACTION_SIGN_KEYRING);
|
||||||
|
|
||||||
// fill values for this action
|
// fill values for this action
|
||||||
Bundle data = new Bundle();
|
Bundle data = new Bundle();
|
||||||
@ -210,8 +211,8 @@ public class SignKeyActivity extends SherlockFragmentActivity {
|
|||||||
intent.putExtra(KeychainIntentService.EXTRA_DATA, data);
|
intent.putExtra(KeychainIntentService.EXTRA_DATA, data);
|
||||||
|
|
||||||
// Message is received after signing is done in ApgService
|
// Message is received after signing is done in ApgService
|
||||||
KeychainIntentServiceHandler saveHandler = new KeychainIntentServiceHandler(this, R.string.progress_signing,
|
KeychainIntentServiceHandler saveHandler = new KeychainIntentServiceHandler(this,
|
||||||
ProgressDialog.STYLE_SPINNER) {
|
R.string.progress_signing, ProgressDialog.STYLE_SPINNER) {
|
||||||
public void handleMessage(Message message) {
|
public void handleMessage(Message message) {
|
||||||
// handle messages by standard ApgHandler first
|
// handle messages by standard ApgHandler first
|
||||||
super.handleMessage(message);
|
super.handleMessage(message);
|
||||||
@ -250,7 +251,8 @@ public class SignKeyActivity extends SherlockFragmentActivity {
|
|||||||
// Send all information needed to service to upload key in other thread
|
// Send all information needed to service to upload key in other thread
|
||||||
Intent intent = new Intent(this, KeychainIntentService.class);
|
Intent intent = new Intent(this, KeychainIntentService.class);
|
||||||
|
|
||||||
intent.putExtra(KeychainIntentService.EXTRA_ACTION, KeychainIntentService.ACTION_UPLOAD_KEYRING);
|
intent.putExtra(KeychainIntentService.EXTRA_ACTION,
|
||||||
|
KeychainIntentService.ACTION_UPLOAD_KEYRING);
|
||||||
|
|
||||||
// fill values for this action
|
// fill values for this action
|
||||||
Bundle data = new Bundle();
|
Bundle data = new Bundle();
|
||||||
@ -264,8 +266,8 @@ public class SignKeyActivity extends SherlockFragmentActivity {
|
|||||||
intent.putExtra(KeychainIntentService.EXTRA_DATA, data);
|
intent.putExtra(KeychainIntentService.EXTRA_DATA, data);
|
||||||
|
|
||||||
// Message is received after uploading is done in ApgService
|
// Message is received after uploading is done in ApgService
|
||||||
KeychainIntentServiceHandler saveHandler = new KeychainIntentServiceHandler(this, R.string.progress_exporting,
|
KeychainIntentServiceHandler saveHandler = new KeychainIntentServiceHandler(this,
|
||||||
ProgressDialog.STYLE_HORIZONTAL) {
|
R.string.progress_exporting, ProgressDialog.STYLE_HORIZONTAL) {
|
||||||
public void handleMessage(Message message) {
|
public void handleMessage(Message message) {
|
||||||
// handle messages by standard ApgHandler first
|
// handle messages by standard ApgHandler first
|
||||||
super.handleMessage(message);
|
super.handleMessage(message);
|
||||||
|
@ -103,11 +103,11 @@ public class SectionView extends LinearLayout implements OnClickListener, Editor
|
|||||||
}
|
}
|
||||||
|
|
||||||
public void setCanEdit(boolean bCanEdit) {
|
public void setCanEdit(boolean bCanEdit) {
|
||||||
canEdit = bCanEdit;
|
canEdit = bCanEdit;
|
||||||
mPlusButton = (ImageView)findViewById(R.id.plusbutton);
|
mPlusButton = (ImageView) findViewById(R.id.plusbutton);
|
||||||
if (!canEdit) {
|
if (!canEdit) {
|
||||||
mPlusButton.setVisibility(View.INVISIBLE);
|
mPlusButton.setVisibility(View.INVISIBLE);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/** {@inheritDoc} */
|
/** {@inheritDoc} */
|
||||||
@ -141,82 +141,85 @@ public class SectionView extends LinearLayout implements OnClickListener, Editor
|
|||||||
/** {@inheritDoc} */
|
/** {@inheritDoc} */
|
||||||
public void onClick(View v) {
|
public void onClick(View v) {
|
||||||
if (canEdit) {
|
if (canEdit) {
|
||||||
switch (mType) {
|
switch (mType) {
|
||||||
case Id.type.user_id: {
|
case Id.type.user_id: {
|
||||||
UserIdEditor view = (UserIdEditor) mInflater.inflate(R.layout.edit_key_user_id_item,
|
UserIdEditor view = (UserIdEditor) mInflater.inflate(
|
||||||
mEditors, false);
|
R.layout.edit_key_user_id_item, mEditors, false);
|
||||||
view.setEditorListener(this);
|
view.setEditorListener(this);
|
||||||
if (mEditors.getChildCount() == 0) {
|
if (mEditors.getChildCount() == 0) {
|
||||||
view.setIsMainUserId(true);
|
view.setIsMainUserId(true);
|
||||||
}
|
|
||||||
mEditors.addView(view);
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
|
|
||||||
case Id.type.key: {
|
|
||||||
AlertDialog.Builder dialog = new AlertDialog.Builder(getContext());
|
|
||||||
|
|
||||||
View view = mInflater.inflate(R.layout.create_key, null);
|
|
||||||
dialog.setView(view);
|
|
||||||
dialog.setTitle(R.string.title_createKey);
|
|
||||||
|
|
||||||
boolean wouldBeMasterKey = (mEditors.getChildCount() == 0);
|
|
||||||
|
|
||||||
final Spinner algorithm = (Spinner) view.findViewById(R.id.create_key_algorithm);
|
|
||||||
Vector<Choice> choices = new Vector<Choice>();
|
|
||||||
choices.add(new Choice(Id.choice.algorithm.dsa, getResources().getString(R.string.dsa)));
|
|
||||||
if (!wouldBeMasterKey) {
|
|
||||||
choices.add(new Choice(Id.choice.algorithm.elgamal, getResources().getString(
|
|
||||||
R.string.elgamal)));
|
|
||||||
}
|
|
||||||
|
|
||||||
choices.add(new Choice(Id.choice.algorithm.rsa, getResources().getString(R.string.rsa)));
|
|
||||||
|
|
||||||
ArrayAdapter<Choice> adapter = new ArrayAdapter<Choice>(getContext(),
|
|
||||||
android.R.layout.simple_spinner_item, choices);
|
|
||||||
adapter.setDropDownViewResource(android.R.layout.simple_spinner_dropdown_item);
|
|
||||||
algorithm.setAdapter(adapter);
|
|
||||||
// make RSA the default
|
|
||||||
for (int i = 0; i < choices.size(); ++i) {
|
|
||||||
if (choices.get(i).getId() == Id.choice.algorithm.rsa) {
|
|
||||||
algorithm.setSelection(i);
|
|
||||||
break;
|
|
||||||
}
|
}
|
||||||
|
mEditors.addView(view);
|
||||||
|
break;
|
||||||
}
|
}
|
||||||
|
|
||||||
final EditText keySize = (EditText) view.findViewById(R.id.create_key_size);
|
case Id.type.key: {
|
||||||
|
AlertDialog.Builder dialog = new AlertDialog.Builder(getContext());
|
||||||
|
|
||||||
dialog.setPositiveButton(android.R.string.ok, new DialogInterface.OnClickListener() {
|
View view = mInflater.inflate(R.layout.create_key, null);
|
||||||
public void onClick(DialogInterface di, int id) {
|
dialog.setView(view);
|
||||||
di.dismiss();
|
dialog.setTitle(R.string.title_createKey);
|
||||||
try {
|
|
||||||
mNewKeySize = Integer.parseInt("" + keySize.getText());
|
boolean wouldBeMasterKey = (mEditors.getChildCount() == 0);
|
||||||
} catch (NumberFormatException e) {
|
|
||||||
mNewKeySize = 0;
|
final Spinner algorithm = (Spinner) view.findViewById(R.id.create_key_algorithm);
|
||||||
|
Vector<Choice> choices = new Vector<Choice>();
|
||||||
|
choices.add(new Choice(Id.choice.algorithm.dsa, getResources().getString(
|
||||||
|
R.string.dsa)));
|
||||||
|
if (!wouldBeMasterKey) {
|
||||||
|
choices.add(new Choice(Id.choice.algorithm.elgamal, getResources().getString(
|
||||||
|
R.string.elgamal)));
|
||||||
|
}
|
||||||
|
|
||||||
|
choices.add(new Choice(Id.choice.algorithm.rsa, getResources().getString(
|
||||||
|
R.string.rsa)));
|
||||||
|
|
||||||
|
ArrayAdapter<Choice> adapter = new ArrayAdapter<Choice>(getContext(),
|
||||||
|
android.R.layout.simple_spinner_item, choices);
|
||||||
|
adapter.setDropDownViewResource(android.R.layout.simple_spinner_dropdown_item);
|
||||||
|
algorithm.setAdapter(adapter);
|
||||||
|
// make RSA the default
|
||||||
|
for (int i = 0; i < choices.size(); ++i) {
|
||||||
|
if (choices.get(i).getId() == Id.choice.algorithm.rsa) {
|
||||||
|
algorithm.setSelection(i);
|
||||||
|
break;
|
||||||
}
|
}
|
||||||
|
|
||||||
mNewKeyAlgorithmChoice = (Choice) algorithm.getSelectedItem();
|
|
||||||
createKey();
|
|
||||||
}
|
}
|
||||||
});
|
|
||||||
|
|
||||||
dialog.setCancelable(true);
|
final EditText keySize = (EditText) view.findViewById(R.id.create_key_size);
|
||||||
dialog.setNegativeButton(android.R.string.cancel,
|
|
||||||
new DialogInterface.OnClickListener() {
|
|
||||||
public void onClick(DialogInterface di, int id) {
|
|
||||||
di.dismiss();
|
|
||||||
}
|
|
||||||
});
|
|
||||||
|
|
||||||
dialog.create().show();
|
dialog.setPositiveButton(android.R.string.ok,
|
||||||
break;
|
new DialogInterface.OnClickListener() {
|
||||||
}
|
public void onClick(DialogInterface di, int id) {
|
||||||
|
di.dismiss();
|
||||||
|
try {
|
||||||
|
mNewKeySize = Integer.parseInt("" + keySize.getText());
|
||||||
|
} catch (NumberFormatException e) {
|
||||||
|
mNewKeySize = 0;
|
||||||
|
}
|
||||||
|
|
||||||
default: {
|
mNewKeyAlgorithmChoice = (Choice) algorithm.getSelectedItem();
|
||||||
break;
|
createKey();
|
||||||
}
|
}
|
||||||
}
|
});
|
||||||
this.updateEditorsVisible();
|
|
||||||
|
dialog.setCancelable(true);
|
||||||
|
dialog.setNegativeButton(android.R.string.cancel,
|
||||||
|
new DialogInterface.OnClickListener() {
|
||||||
|
public void onClick(DialogInterface di, int id) {
|
||||||
|
di.dismiss();
|
||||||
|
}
|
||||||
|
});
|
||||||
|
|
||||||
|
dialog.create().show();
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
|
||||||
|
default: {
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
this.updateEditorsVisible();
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -266,7 +269,8 @@ public class SectionView extends LinearLayout implements OnClickListener, Editor
|
|||||||
// Send all information needed to service to edit key in other thread
|
// Send all information needed to service to edit key in other thread
|
||||||
Intent intent = new Intent(mActivity, KeychainIntentService.class);
|
Intent intent = new Intent(mActivity, KeychainIntentService.class);
|
||||||
|
|
||||||
intent.putExtra(KeychainIntentService.EXTRA_ACTION, KeychainIntentService.ACTION_GENERATE_KEY);
|
intent.putExtra(KeychainIntentService.EXTRA_ACTION,
|
||||||
|
KeychainIntentService.ACTION_GENERATE_KEY);
|
||||||
|
|
||||||
// fill values for this action
|
// fill values for this action
|
||||||
Bundle data = new Bundle();
|
Bundle data = new Bundle();
|
||||||
@ -293,7 +297,8 @@ public class SectionView extends LinearLayout implements OnClickListener, Editor
|
|||||||
ProgressDialog.STYLE_SPINNER);
|
ProgressDialog.STYLE_SPINNER);
|
||||||
|
|
||||||
// Message is received after generating is done in ApgService
|
// Message is received after generating is done in ApgService
|
||||||
KeychainIntentServiceHandler saveHandler = new KeychainIntentServiceHandler(mActivity, mGeneratingDialog) {
|
KeychainIntentServiceHandler saveHandler = new KeychainIntentServiceHandler(mActivity,
|
||||||
|
mGeneratingDialog) {
|
||||||
public void handleMessage(Message message) {
|
public void handleMessage(Message message) {
|
||||||
// handle messages by standard ApgHandler first
|
// handle messages by standard ApgHandler first
|
||||||
super.handleMessage(message);
|
super.handleMessage(message);
|
||||||
@ -302,7 +307,8 @@ public class SectionView extends LinearLayout implements OnClickListener, Editor
|
|||||||
// get new key from data bundle returned from service
|
// get new key from data bundle returned from service
|
||||||
Bundle data = message.getData();
|
Bundle data = message.getData();
|
||||||
PGPSecretKeyRing newKeyRing = (PGPSecretKeyRing) PgpConversionHelper
|
PGPSecretKeyRing newKeyRing = (PGPSecretKeyRing) PgpConversionHelper
|
||||||
.BytesToPGPKeyRing(data.getByteArray(KeychainIntentService.RESULT_NEW_KEY));
|
.BytesToPGPKeyRing(data
|
||||||
|
.getByteArray(KeychainIntentService.RESULT_NEW_KEY));
|
||||||
|
|
||||||
boolean isMasterKey = (mEditors.getChildCount() == 0);
|
boolean isMasterKey = (mEditors.getChildCount() == 0);
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user