fix code style in /pgp
This commit is contained in:
@@ -17,11 +17,6 @@
|
|||||||
|
|
||||||
package org.sufficientlysecure.keychain.pgp;
|
package org.sufficientlysecure.keychain.pgp;
|
||||||
|
|
||||||
import java.io.ByteArrayOutputStream;
|
|
||||||
import java.io.IOException;
|
|
||||||
import java.util.ArrayList;
|
|
||||||
import java.util.Iterator;
|
|
||||||
|
|
||||||
import org.spongycastle.openpgp.PGPKeyRing;
|
import org.spongycastle.openpgp.PGPKeyRing;
|
||||||
import org.spongycastle.openpgp.PGPObjectFactory;
|
import org.spongycastle.openpgp.PGPObjectFactory;
|
||||||
import org.spongycastle.openpgp.PGPSecretKey;
|
import org.spongycastle.openpgp.PGPSecretKey;
|
||||||
@@ -29,6 +24,11 @@ import org.spongycastle.openpgp.PGPSecretKeyRing;
|
|||||||
import org.sufficientlysecure.keychain.Constants;
|
import org.sufficientlysecure.keychain.Constants;
|
||||||
import org.sufficientlysecure.keychain.util.Log;
|
import org.sufficientlysecure.keychain.util.Log;
|
||||||
|
|
||||||
|
import java.io.ByteArrayOutputStream;
|
||||||
|
import java.io.IOException;
|
||||||
|
import java.util.ArrayList;
|
||||||
|
import java.util.Iterator;
|
||||||
|
|
||||||
|
|
||||||
public class PgpConversionHelper {
|
public class PgpConversionHelper {
|
||||||
|
|
||||||
@@ -73,7 +73,7 @@ public class PgpConversionHelper {
|
|||||||
|
|
||||||
/**
|
/**
|
||||||
* Convert from byte[] to PGPSecretKey
|
* Convert from byte[] to PGPSecretKey
|
||||||
*
|
* <p/>
|
||||||
* Singles keys are encoded as keyRings with one single key in it by Bouncy Castle
|
* Singles keys are encoded as keyRings with one single key in it by Bouncy Castle
|
||||||
*
|
*
|
||||||
* @param keyBytes
|
* @param keyBytes
|
||||||
@@ -88,13 +88,13 @@ public class PgpConversionHelper {
|
|||||||
Log.e(Constants.TAG, "Error while converting to PGPSecretKey!", e);
|
Log.e(Constants.TAG, "Error while converting to PGPSecretKey!", e);
|
||||||
}
|
}
|
||||||
PGPSecretKey secKey = null;
|
PGPSecretKey secKey = null;
|
||||||
if(obj instanceof PGPSecretKey) {
|
if (obj instanceof PGPSecretKey) {
|
||||||
if ((secKey = (PGPSecretKey)obj ) == null) {
|
if ((secKey = (PGPSecretKey) obj) == null) {
|
||||||
Log.e(Constants.TAG, "No keys given!");
|
Log.e(Constants.TAG, "No keys given!");
|
||||||
}
|
}
|
||||||
} else if(obj instanceof PGPSecretKeyRing) { //master keys are sent as keyrings
|
} else if (obj instanceof PGPSecretKeyRing) { //master keys are sent as keyrings
|
||||||
PGPSecretKeyRing keyRing = null;
|
PGPSecretKeyRing keyRing = null;
|
||||||
if ((keyRing = (PGPSecretKeyRing)obj) == null) {
|
if ((keyRing = (PGPSecretKeyRing) obj) == null) {
|
||||||
Log.e(Constants.TAG, "No keys given!");
|
Log.e(Constants.TAG, "No keys given!");
|
||||||
}
|
}
|
||||||
secKey = keyRing.getSecretKey();
|
secKey = keyRing.getSecretKey();
|
||||||
|
|||||||
@@ -18,38 +18,16 @@
|
|||||||
package org.sufficientlysecure.keychain.pgp;
|
package org.sufficientlysecure.keychain.pgp;
|
||||||
|
|
||||||
import android.content.Context;
|
import android.content.Context;
|
||||||
|
|
||||||
import org.openintents.openpgp.OpenPgpSignatureResult;
|
import org.openintents.openpgp.OpenPgpSignatureResult;
|
||||||
import org.spongycastle.bcpg.ArmoredInputStream;
|
import org.spongycastle.bcpg.ArmoredInputStream;
|
||||||
import org.spongycastle.bcpg.SignatureSubpacketTags;
|
import org.spongycastle.bcpg.SignatureSubpacketTags;
|
||||||
import org.spongycastle.openpgp.PGPCompressedData;
|
import org.spongycastle.openpgp.*;
|
||||||
import org.spongycastle.openpgp.PGPEncryptedData;
|
|
||||||
import org.spongycastle.openpgp.PGPEncryptedDataList;
|
|
||||||
import org.spongycastle.openpgp.PGPException;
|
|
||||||
import org.spongycastle.openpgp.PGPLiteralData;
|
|
||||||
import org.spongycastle.openpgp.PGPObjectFactory;
|
|
||||||
import org.spongycastle.openpgp.PGPOnePassSignature;
|
|
||||||
import org.spongycastle.openpgp.PGPOnePassSignatureList;
|
|
||||||
import org.spongycastle.openpgp.PGPPBEEncryptedData;
|
|
||||||
import org.spongycastle.openpgp.PGPPrivateKey;
|
|
||||||
import org.spongycastle.openpgp.PGPPublicKey;
|
|
||||||
import org.spongycastle.openpgp.PGPPublicKeyEncryptedData;
|
|
||||||
import org.spongycastle.openpgp.PGPPublicKeyRing;
|
|
||||||
import org.spongycastle.openpgp.PGPSecretKey;
|
|
||||||
import org.spongycastle.openpgp.PGPSecretKeyRing;
|
|
||||||
import org.spongycastle.openpgp.PGPSignature;
|
|
||||||
import org.spongycastle.openpgp.PGPSignatureList;
|
|
||||||
import org.spongycastle.openpgp.PGPSignatureSubpacketVector;
|
|
||||||
import org.spongycastle.openpgp.PGPUtil;
|
import org.spongycastle.openpgp.PGPUtil;
|
||||||
import org.spongycastle.openpgp.operator.PBEDataDecryptorFactory;
|
import org.spongycastle.openpgp.operator.PBEDataDecryptorFactory;
|
||||||
import org.spongycastle.openpgp.operator.PBESecretKeyDecryptor;
|
import org.spongycastle.openpgp.operator.PBESecretKeyDecryptor;
|
||||||
import org.spongycastle.openpgp.operator.PGPDigestCalculatorProvider;
|
import org.spongycastle.openpgp.operator.PGPDigestCalculatorProvider;
|
||||||
import org.spongycastle.openpgp.operator.PublicKeyDataDecryptorFactory;
|
import org.spongycastle.openpgp.operator.PublicKeyDataDecryptorFactory;
|
||||||
import org.spongycastle.openpgp.operator.jcajce.JcaPGPContentVerifierBuilderProvider;
|
import org.spongycastle.openpgp.operator.jcajce.*;
|
||||||
import org.spongycastle.openpgp.operator.jcajce.JcaPGPDigestCalculatorProviderBuilder;
|
|
||||||
import org.spongycastle.openpgp.operator.jcajce.JcePBEDataDecryptorFactoryBuilder;
|
|
||||||
import org.spongycastle.openpgp.operator.jcajce.JcePBESecretKeyDecryptorBuilder;
|
|
||||||
import org.spongycastle.openpgp.operator.jcajce.JcePublicKeyDataDecryptorFactoryBuilder;
|
|
||||||
import org.sufficientlysecure.keychain.Constants;
|
import org.sufficientlysecure.keychain.Constants;
|
||||||
import org.sufficientlysecure.keychain.R;
|
import org.sufficientlysecure.keychain.R;
|
||||||
import org.sufficientlysecure.keychain.pgp.exception.PgpGeneralException;
|
import org.sufficientlysecure.keychain.pgp.exception.PgpGeneralException;
|
||||||
@@ -59,12 +37,7 @@ import org.sufficientlysecure.keychain.util.InputData;
|
|||||||
import org.sufficientlysecure.keychain.util.Log;
|
import org.sufficientlysecure.keychain.util.Log;
|
||||||
import org.sufficientlysecure.keychain.util.ProgressDialogUpdater;
|
import org.sufficientlysecure.keychain.util.ProgressDialogUpdater;
|
||||||
|
|
||||||
import java.io.BufferedInputStream;
|
import java.io.*;
|
||||||
import java.io.ByteArrayInputStream;
|
|
||||||
import java.io.ByteArrayOutputStream;
|
|
||||||
import java.io.IOException;
|
|
||||||
import java.io.InputStream;
|
|
||||||
import java.io.OutputStream;
|
|
||||||
import java.security.SignatureException;
|
import java.security.SignatureException;
|
||||||
import java.util.Iterator;
|
import java.util.Iterator;
|
||||||
|
|
||||||
@@ -72,57 +45,57 @@ import java.util.Iterator;
|
|||||||
* This class uses a Builder pattern!
|
* This class uses a Builder pattern!
|
||||||
*/
|
*/
|
||||||
public class PgpDecryptVerify {
|
public class PgpDecryptVerify {
|
||||||
private Context context;
|
private Context mContext;
|
||||||
private InputData data;
|
private InputData mData;
|
||||||
private OutputStream outStream;
|
private OutputStream mOutStream;
|
||||||
|
|
||||||
private ProgressDialogUpdater progressDialogUpdater;
|
private ProgressDialogUpdater mProgressDialogUpdater;
|
||||||
private boolean assumeSymmetric;
|
private boolean mAssumeSymmetric;
|
||||||
private String passphrase;
|
private String mPassphrase;
|
||||||
private long enforcedKeyId;
|
private long mEnforcedKeyId;
|
||||||
|
|
||||||
private PgpDecryptVerify(Builder builder) {
|
private PgpDecryptVerify(Builder builder) {
|
||||||
// private Constructor can only be called from Builder
|
// private Constructor can only be called from Builder
|
||||||
this.context = builder.context;
|
this.mContext = builder.mContext;
|
||||||
this.data = builder.data;
|
this.mData = builder.mData;
|
||||||
this.outStream = builder.outStream;
|
this.mOutStream = builder.mOutStream;
|
||||||
|
|
||||||
this.progressDialogUpdater = builder.progressDialogUpdater;
|
this.mProgressDialogUpdater = builder.mProgressDialogUpdater;
|
||||||
this.assumeSymmetric = builder.assumeSymmetric;
|
this.mAssumeSymmetric = builder.mAssumeSymmetric;
|
||||||
this.passphrase = builder.passphrase;
|
this.mPassphrase = builder.mPassphrase;
|
||||||
this.enforcedKeyId = builder.enforcedKeyId;
|
this.mEnforcedKeyId = builder.mEnforcedKeyId;
|
||||||
}
|
}
|
||||||
|
|
||||||
public static class Builder {
|
public static class Builder {
|
||||||
// mandatory parameter
|
// mandatory parameter
|
||||||
private Context context;
|
private Context mContext;
|
||||||
private InputData data;
|
private InputData mData;
|
||||||
private OutputStream outStream;
|
private OutputStream mOutStream;
|
||||||
|
|
||||||
// optional
|
// optional
|
||||||
private ProgressDialogUpdater progressDialogUpdater = null;
|
private ProgressDialogUpdater mProgressDialogUpdater = null;
|
||||||
private boolean assumeSymmetric = false;
|
private boolean mAssumeSymmetric = false;
|
||||||
private String passphrase = "";
|
private String mPassphrase = "";
|
||||||
private long enforcedKeyId = 0;
|
private long mEnforcedKeyId = 0;
|
||||||
|
|
||||||
public Builder(Context context, InputData data, OutputStream outStream) {
|
public Builder(Context context, InputData data, OutputStream outStream) {
|
||||||
this.context = context;
|
this.mContext = context;
|
||||||
this.data = data;
|
this.mData = data;
|
||||||
this.outStream = outStream;
|
this.mOutStream = outStream;
|
||||||
}
|
}
|
||||||
|
|
||||||
public Builder progressDialogUpdater(ProgressDialogUpdater progressDialogUpdater) {
|
public Builder progressDialogUpdater(ProgressDialogUpdater progressDialogUpdater) {
|
||||||
this.progressDialogUpdater = progressDialogUpdater;
|
this.mProgressDialogUpdater = progressDialogUpdater;
|
||||||
return this;
|
return this;
|
||||||
}
|
}
|
||||||
|
|
||||||
public Builder assumeSymmetric(boolean assumeSymmetric) {
|
public Builder assumeSymmetric(boolean assumeSymmetric) {
|
||||||
this.assumeSymmetric = assumeSymmetric;
|
this.mAssumeSymmetric = assumeSymmetric;
|
||||||
return this;
|
return this;
|
||||||
}
|
}
|
||||||
|
|
||||||
public Builder passphrase(String passphrase) {
|
public Builder passphrase(String passphrase) {
|
||||||
this.passphrase = passphrase;
|
this.mPassphrase = passphrase;
|
||||||
return this;
|
return this;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -134,7 +107,7 @@ public class PgpDecryptVerify {
|
|||||||
* @return
|
* @return
|
||||||
*/
|
*/
|
||||||
public Builder enforcedKeyId(long enforcedKeyId) {
|
public Builder enforcedKeyId(long enforcedKeyId) {
|
||||||
this.enforcedKeyId = enforcedKeyId;
|
this.mEnforcedKeyId = enforcedKeyId;
|
||||||
return this;
|
return this;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -144,14 +117,14 @@ public class PgpDecryptVerify {
|
|||||||
}
|
}
|
||||||
|
|
||||||
public void updateProgress(int message, int current, int total) {
|
public void updateProgress(int message, int current, int total) {
|
||||||
if (progressDialogUpdater != null) {
|
if (mProgressDialogUpdater != null) {
|
||||||
progressDialogUpdater.setProgress(message, current, total);
|
mProgressDialogUpdater.setProgress(message, current, total);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
public void updateProgress(int current, int total) {
|
public void updateProgress(int current, int total) {
|
||||||
if (progressDialogUpdater != null) {
|
if (mProgressDialogUpdater != null) {
|
||||||
progressDialogUpdater.setProgress(current, total);
|
mProgressDialogUpdater.setProgress(current, total);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -196,7 +169,7 @@ public class PgpDecryptVerify {
|
|||||||
public PgpDecryptVerifyResult execute()
|
public PgpDecryptVerifyResult execute()
|
||||||
throws IOException, PgpGeneralException, PGPException, SignatureException {
|
throws IOException, PgpGeneralException, PGPException, SignatureException {
|
||||||
// automatically works with ascii armor input and binary
|
// automatically works with ascii armor input and binary
|
||||||
InputStream in = PGPUtil.getDecoderStream(data.getInputStream());
|
InputStream in = PGPUtil.getDecoderStream(mData.getInputStream());
|
||||||
if (in instanceof ArmoredInputStream) {
|
if (in instanceof ArmoredInputStream) {
|
||||||
ArmoredInputStream aIn = (ArmoredInputStream) in;
|
ArmoredInputStream aIn = (ArmoredInputStream) in;
|
||||||
// it is ascii armored
|
// it is ascii armored
|
||||||
@@ -240,7 +213,7 @@ public class PgpDecryptVerify {
|
|||||||
}
|
}
|
||||||
|
|
||||||
if (enc == null) {
|
if (enc == null) {
|
||||||
throw new PgpGeneralException(context.getString(R.string.error_invalid_data));
|
throw new PgpGeneralException(mContext.getString(R.string.error_invalid_data));
|
||||||
}
|
}
|
||||||
|
|
||||||
InputStream clear;
|
InputStream clear;
|
||||||
@@ -250,7 +223,7 @@ public class PgpDecryptVerify {
|
|||||||
|
|
||||||
// TODO: currently we always only look at the first known key or symmetric encryption,
|
// TODO: currently we always only look at the first known key or symmetric encryption,
|
||||||
// there might be more...
|
// there might be more...
|
||||||
if (assumeSymmetric) {
|
if (mAssumeSymmetric) {
|
||||||
PGPPBEEncryptedData pbe = null;
|
PGPPBEEncryptedData pbe = null;
|
||||||
Iterator<?> it = enc.getEncryptedDataObjects();
|
Iterator<?> it = enc.getEncryptedDataObjects();
|
||||||
// find secret key
|
// find secret key
|
||||||
@@ -264,7 +237,7 @@ public class PgpDecryptVerify {
|
|||||||
|
|
||||||
if (pbe == null) {
|
if (pbe == null) {
|
||||||
throw new PgpGeneralException(
|
throw new PgpGeneralException(
|
||||||
context.getString(R.string.error_no_symmetric_encryption_packet));
|
mContext.getString(R.string.error_no_symmetric_encryption_packet));
|
||||||
}
|
}
|
||||||
|
|
||||||
updateProgress(R.string.progress_preparing_streams, currentProgress, 100);
|
updateProgress(R.string.progress_preparing_streams, currentProgress, 100);
|
||||||
@@ -273,7 +246,7 @@ public class PgpDecryptVerify {
|
|||||||
.setProvider(Constants.BOUNCY_CASTLE_PROVIDER_NAME).build();
|
.setProvider(Constants.BOUNCY_CASTLE_PROVIDER_NAME).build();
|
||||||
PBEDataDecryptorFactory decryptorFactory = new JcePBEDataDecryptorFactoryBuilder(
|
PBEDataDecryptorFactory decryptorFactory = new JcePBEDataDecryptorFactoryBuilder(
|
||||||
digestCalcProvider).setProvider(Constants.BOUNCY_CASTLE_PROVIDER_NAME).build(
|
digestCalcProvider).setProvider(Constants.BOUNCY_CASTLE_PROVIDER_NAME).build(
|
||||||
passphrase.toCharArray());
|
mPassphrase.toCharArray());
|
||||||
|
|
||||||
clear = pbe.getDataStream(decryptorFactory);
|
clear = pbe.getDataStream(decryptorFactory);
|
||||||
|
|
||||||
@@ -290,33 +263,35 @@ public class PgpDecryptVerify {
|
|||||||
Object obj = it.next();
|
Object obj = it.next();
|
||||||
if (obj instanceof PGPPublicKeyEncryptedData) {
|
if (obj instanceof PGPPublicKeyEncryptedData) {
|
||||||
PGPPublicKeyEncryptedData encData = (PGPPublicKeyEncryptedData) obj;
|
PGPPublicKeyEncryptedData encData = (PGPPublicKeyEncryptedData) obj;
|
||||||
secretKey = ProviderHelper.getPGPSecretKeyByKeyId(context, encData.getKeyID());
|
secretKey = ProviderHelper.getPGPSecretKeyByKeyId(mContext, encData.getKeyID());
|
||||||
if (secretKey != null) {
|
if (secretKey != null) {
|
||||||
// secret key exists in database
|
// secret key exists in database
|
||||||
|
|
||||||
// allow only a specific key for decryption?
|
// allow only a specific key for decryption?
|
||||||
if (enforcedKeyId != 0) {
|
if (mEnforcedKeyId != 0) {
|
||||||
// TODO: improve this code! get master key directly!
|
// TODO: improve this code! get master key directly!
|
||||||
PGPSecretKeyRing secretKeyRing = ProviderHelper.getPGPSecretKeyRingByKeyId(context, encData.getKeyID());
|
PGPSecretKeyRing secretKeyRing =
|
||||||
|
ProviderHelper.getPGPSecretKeyRingByKeyId(mContext, encData.getKeyID());
|
||||||
long masterKeyId = PgpKeyHelper.getMasterKey(secretKeyRing).getKeyID();
|
long masterKeyId = PgpKeyHelper.getMasterKey(secretKeyRing).getKeyID();
|
||||||
Log.d(Constants.TAG, "encData.getKeyID():" + encData.getKeyID());
|
Log.d(Constants.TAG, "encData.getKeyID():" + encData.getKeyID());
|
||||||
Log.d(Constants.TAG, "enforcedKeyId: " + enforcedKeyId);
|
Log.d(Constants.TAG, "enforcedKeyId: " + mEnforcedKeyId);
|
||||||
Log.d(Constants.TAG, "masterKeyId: " + masterKeyId);
|
Log.d(Constants.TAG, "masterKeyId: " + masterKeyId);
|
||||||
|
|
||||||
if (enforcedKeyId != masterKeyId) {
|
if (mEnforcedKeyId != masterKeyId) {
|
||||||
throw new PgpGeneralException(context.getString(R.string.error_no_secret_key_found));
|
throw new PgpGeneralException(
|
||||||
|
mContext.getString(R.string.error_no_secret_key_found));
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
pbe = encData;
|
pbe = encData;
|
||||||
|
|
||||||
// if no passphrase was explicitly set try to get it from the cache service
|
// if no passphrase was explicitly set try to get it from the cache service
|
||||||
if (passphrase == null) {
|
if (mPassphrase == null) {
|
||||||
// returns "" if key has no passphrase
|
// returns "" if key has no passphrase
|
||||||
passphrase = PassphraseCacheService.getCachedPassphrase(context, encData.getKeyID());
|
mPassphrase = PassphraseCacheService.getCachedPassphrase(mContext, encData.getKeyID());
|
||||||
|
|
||||||
// if passphrase was not cached, return here indicating that a passphrase is missing!
|
// if passphrase was not cached, return here indicating that a passphrase is missing!
|
||||||
if (passphrase == null) {
|
if (mPassphrase == null) {
|
||||||
returnData.setKeyPassphraseNeeded(true);
|
returnData.setKeyPassphraseNeeded(true);
|
||||||
return returnData;
|
return returnData;
|
||||||
}
|
}
|
||||||
@@ -330,7 +305,7 @@ public class PgpDecryptVerify {
|
|||||||
}
|
}
|
||||||
|
|
||||||
if (secretKey == null) {
|
if (secretKey == null) {
|
||||||
throw new PgpGeneralException(context.getString(R.string.error_no_secret_key_found));
|
throw new PgpGeneralException(mContext.getString(R.string.error_no_secret_key_found));
|
||||||
}
|
}
|
||||||
|
|
||||||
currentProgress += 5;
|
currentProgress += 5;
|
||||||
@@ -339,14 +314,14 @@ public class PgpDecryptVerify {
|
|||||||
try {
|
try {
|
||||||
PBESecretKeyDecryptor keyDecryptor = new JcePBESecretKeyDecryptorBuilder()
|
PBESecretKeyDecryptor keyDecryptor = new JcePBESecretKeyDecryptorBuilder()
|
||||||
.setProvider(Constants.BOUNCY_CASTLE_PROVIDER_NAME).build(
|
.setProvider(Constants.BOUNCY_CASTLE_PROVIDER_NAME).build(
|
||||||
passphrase.toCharArray());
|
mPassphrase.toCharArray());
|
||||||
privateKey = secretKey.extractPrivateKey(keyDecryptor);
|
privateKey = secretKey.extractPrivateKey(keyDecryptor);
|
||||||
} catch (PGPException e) {
|
} catch (PGPException e) {
|
||||||
throw new PGPException(context.getString(R.string.error_wrong_passphrase));
|
throw new PGPException(mContext.getString(R.string.error_wrong_passphrase));
|
||||||
}
|
}
|
||||||
if (privateKey == null) {
|
if (privateKey == null) {
|
||||||
throw new PgpGeneralException(
|
throw new PgpGeneralException(
|
||||||
context.getString(R.string.error_could_not_extract_private_key));
|
mContext.getString(R.string.error_could_not_extract_private_key));
|
||||||
}
|
}
|
||||||
currentProgress += 5;
|
currentProgress += 5;
|
||||||
updateProgress(R.string.progress_preparing_streams, currentProgress, 100);
|
updateProgress(R.string.progress_preparing_streams, currentProgress, 100);
|
||||||
@@ -386,7 +361,7 @@ public class PgpDecryptVerify {
|
|||||||
for (int i = 0; i < sigList.size(); ++i) {
|
for (int i = 0; i < sigList.size(); ++i) {
|
||||||
signature = sigList.get(i);
|
signature = sigList.get(i);
|
||||||
signatureKey = ProviderHelper
|
signatureKey = ProviderHelper
|
||||||
.getPGPPublicKeyByKeyId(context, signature.getKeyID());
|
.getPGPPublicKeyByKeyId(mContext, signature.getKeyID());
|
||||||
if (signatureKeyId == 0) {
|
if (signatureKeyId == 0) {
|
||||||
signatureKeyId = signature.getKeyID();
|
signatureKeyId = signature.getKeyID();
|
||||||
}
|
}
|
||||||
@@ -397,7 +372,7 @@ public class PgpDecryptVerify {
|
|||||||
signatureKeyId = signature.getKeyID();
|
signatureKeyId = signature.getKeyID();
|
||||||
String userId = null;
|
String userId = null;
|
||||||
PGPPublicKeyRing signKeyRing = ProviderHelper.getPGPPublicKeyRingByKeyId(
|
PGPPublicKeyRing signKeyRing = ProviderHelper.getPGPPublicKeyRingByKeyId(
|
||||||
context, signatureKeyId);
|
mContext, signatureKeyId);
|
||||||
if (signKeyRing != null) {
|
if (signKeyRing != null) {
|
||||||
userId = PgpKeyHelper.getMainUserId(PgpKeyHelper.getMasterKey(signKeyRing));
|
userId = PgpKeyHelper.getMainUserId(PgpKeyHelper.getMasterKey(signKeyRing));
|
||||||
}
|
}
|
||||||
@@ -444,9 +419,9 @@ public class PgpDecryptVerify {
|
|||||||
int n;
|
int n;
|
||||||
// TODO: progress calculation is broken here! Try to rework it based on commented code!
|
// TODO: progress calculation is broken here! Try to rework it based on commented code!
|
||||||
// int progress = 0;
|
// int progress = 0;
|
||||||
long startPos = data.getStreamPosition();
|
long startPos = mData.getStreamPosition();
|
||||||
while ((n = dataIn.read(buffer)) > 0) {
|
while ((n = dataIn.read(buffer)) > 0) {
|
||||||
outStream.write(buffer, 0, n);
|
mOutStream.write(buffer, 0, n);
|
||||||
// progress += n;
|
// progress += n;
|
||||||
if (signature != null) {
|
if (signature != null) {
|
||||||
try {
|
try {
|
||||||
@@ -460,11 +435,11 @@ public class PgpDecryptVerify {
|
|||||||
// unknown size, but try to at least have a moving, slowing down progress bar
|
// unknown size, but try to at least have a moving, slowing down progress bar
|
||||||
// currentProgress = startProgress + (endProgress - startProgress) * progress
|
// currentProgress = startProgress + (endProgress - startProgress) * progress
|
||||||
// / (progress + 100000);
|
// / (progress + 100000);
|
||||||
if (data.getSize() - startPos == 0) {
|
if (mData.getSize() - startPos == 0) {
|
||||||
currentProgress = endProgress;
|
currentProgress = endProgress;
|
||||||
} else {
|
} else {
|
||||||
currentProgress = (int) (startProgress + (endProgress - startProgress)
|
currentProgress = (int) (startProgress + (endProgress - startProgress)
|
||||||
* (data.getStreamPosition() - startPos) / (data.getSize() - startPos));
|
* (mData.getStreamPosition() - startPos) / (mData.getSize() - startPos));
|
||||||
}
|
}
|
||||||
updateProgress(currentProgress, 100);
|
updateProgress(currentProgress, 100);
|
||||||
}
|
}
|
||||||
@@ -480,7 +455,7 @@ public class PgpDecryptVerify {
|
|||||||
signatureResult.setSignatureOnly(false);
|
signatureResult.setSignatureOnly(false);
|
||||||
|
|
||||||
//Now check binding signatures
|
//Now check binding signatures
|
||||||
boolean validKeyBinding = verifyKeyBinding(context, messageSignature, signatureKey);
|
boolean validKeyBinding = verifyKeyBinding(mContext, messageSignature, signatureKey);
|
||||||
boolean validSignature = signature.verify(messageSignature);
|
boolean validSignature = signature.verify(messageSignature);
|
||||||
|
|
||||||
// TODO: implement CERTIFIED!
|
// TODO: implement CERTIFIED!
|
||||||
@@ -499,7 +474,7 @@ public class PgpDecryptVerify {
|
|||||||
} else {
|
} else {
|
||||||
// failed
|
// failed
|
||||||
Log.d(Constants.TAG, "Integrity verification: failed!");
|
Log.d(Constants.TAG, "Integrity verification: failed!");
|
||||||
throw new PgpGeneralException(context.getString(R.string.error_integrity_check_failed));
|
throw new PgpGeneralException(mContext.getString(R.string.error_integrity_check_failed));
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
// no integrity check
|
// no integrity check
|
||||||
@@ -555,21 +530,21 @@ public class PgpDecryptVerify {
|
|||||||
out.close();
|
out.close();
|
||||||
|
|
||||||
byte[] clearText = out.toByteArray();
|
byte[] clearText = out.toByteArray();
|
||||||
outStream.write(clearText);
|
mOutStream.write(clearText);
|
||||||
|
|
||||||
updateProgress(R.string.progress_processing_signature, 60, 100);
|
updateProgress(R.string.progress_processing_signature, 60, 100);
|
||||||
PGPObjectFactory pgpFact = new PGPObjectFactory(aIn);
|
PGPObjectFactory pgpFact = new PGPObjectFactory(aIn);
|
||||||
|
|
||||||
PGPSignatureList sigList = (PGPSignatureList) pgpFact.nextObject();
|
PGPSignatureList sigList = (PGPSignatureList) pgpFact.nextObject();
|
||||||
if (sigList == null) {
|
if (sigList == null) {
|
||||||
throw new PgpGeneralException(context.getString(R.string.error_corrupt_data));
|
throw new PgpGeneralException(mContext.getString(R.string.error_corrupt_data));
|
||||||
}
|
}
|
||||||
PGPSignature signature = null;
|
PGPSignature signature = null;
|
||||||
long signatureKeyId = 0;
|
long signatureKeyId = 0;
|
||||||
PGPPublicKey signatureKey = null;
|
PGPPublicKey signatureKey = null;
|
||||||
for (int i = 0; i < sigList.size(); ++i) {
|
for (int i = 0; i < sigList.size(); ++i) {
|
||||||
signature = sigList.get(i);
|
signature = sigList.get(i);
|
||||||
signatureKey = ProviderHelper.getPGPPublicKeyByKeyId(context, signature.getKeyID());
|
signatureKey = ProviderHelper.getPGPPublicKeyByKeyId(mContext, signature.getKeyID());
|
||||||
if (signatureKeyId == 0) {
|
if (signatureKeyId == 0) {
|
||||||
signatureKeyId = signature.getKeyID();
|
signatureKeyId = signature.getKeyID();
|
||||||
}
|
}
|
||||||
@@ -579,7 +554,7 @@ public class PgpDecryptVerify {
|
|||||||
} else {
|
} else {
|
||||||
signatureKeyId = signature.getKeyID();
|
signatureKeyId = signature.getKeyID();
|
||||||
String userId = null;
|
String userId = null;
|
||||||
PGPPublicKeyRing signKeyRing = ProviderHelper.getPGPPublicKeyRingByKeyId(context,
|
PGPPublicKeyRing signKeyRing = ProviderHelper.getPGPPublicKeyRingByKeyId(mContext,
|
||||||
signatureKeyId);
|
signatureKeyId);
|
||||||
if (signKeyRing != null) {
|
if (signKeyRing != null) {
|
||||||
userId = PgpKeyHelper.getMainUserId(PgpKeyHelper.getMasterKey(signKeyRing));
|
userId = PgpKeyHelper.getMainUserId(PgpKeyHelper.getMasterKey(signKeyRing));
|
||||||
@@ -623,7 +598,7 @@ public class PgpDecryptVerify {
|
|||||||
}
|
}
|
||||||
|
|
||||||
//Now check binding signatures
|
//Now check binding signatures
|
||||||
boolean validKeyBinding = verifyKeyBinding(context, signature, signatureKey);
|
boolean validKeyBinding = verifyKeyBinding(mContext, signature, signatureKey);
|
||||||
boolean validSignature = signature.verify();
|
boolean validSignature = signature.verify();
|
||||||
|
|
||||||
if (validSignature & validKeyBinding) {
|
if (validSignature & validKeyBinding) {
|
||||||
@@ -684,24 +659,27 @@ public class PgpDecryptVerify {
|
|||||||
continue;
|
continue;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (validTempSubkeyBinding)
|
if (validTempSubkeyBinding) {
|
||||||
validSubkeyBinding = true;
|
validSubkeyBinding = true;
|
||||||
|
}
|
||||||
if (validTempSubkeyBinding) {
|
if (validTempSubkeyBinding) {
|
||||||
validPrimaryKeyBinding = verifyPrimaryKeyBinding(sig.getUnhashedSubPackets(),
|
validPrimaryKeyBinding = verifyPrimaryKeyBinding(sig.getUnhashedSubPackets(),
|
||||||
masterPublicKey, signingPublicKey);
|
masterPublicKey, signingPublicKey);
|
||||||
if (validPrimaryKeyBinding)
|
if (validPrimaryKeyBinding) {
|
||||||
break;
|
break;
|
||||||
|
}
|
||||||
validPrimaryKeyBinding = verifyPrimaryKeyBinding(sig.getHashedSubPackets(),
|
validPrimaryKeyBinding = verifyPrimaryKeyBinding(sig.getHashedSubPackets(),
|
||||||
masterPublicKey, signingPublicKey);
|
masterPublicKey, signingPublicKey);
|
||||||
if (validPrimaryKeyBinding)
|
if (validPrimaryKeyBinding) {
|
||||||
break;
|
break;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
return (validSubkeyBinding & validPrimaryKeyBinding);
|
return (validSubkeyBinding & validPrimaryKeyBinding);
|
||||||
}
|
}
|
||||||
|
|
||||||
private static boolean verifyPrimaryKeyBinding(PGPSignatureSubpacketVector Pkts,
|
private static boolean verifyPrimaryKeyBinding(PGPSignatureSubpacketVector pkts,
|
||||||
PGPPublicKey masterPublicKey, PGPPublicKey signingPublicKey) {
|
PGPPublicKey masterPublicKey, PGPPublicKey signingPublicKey) {
|
||||||
boolean validPrimaryKeyBinding = false;
|
boolean validPrimaryKeyBinding = false;
|
||||||
JcaPGPContentVerifierBuilderProvider contentVerifierBuilderProvider =
|
JcaPGPContentVerifierBuilderProvider contentVerifierBuilderProvider =
|
||||||
@@ -709,9 +687,9 @@ public class PgpDecryptVerify {
|
|||||||
.setProvider(Constants.BOUNCY_CASTLE_PROVIDER_NAME);
|
.setProvider(Constants.BOUNCY_CASTLE_PROVIDER_NAME);
|
||||||
PGPSignatureList eSigList;
|
PGPSignatureList eSigList;
|
||||||
|
|
||||||
if (Pkts.hasSubpacket(SignatureSubpacketTags.EMBEDDED_SIGNATURE)) {
|
if (pkts.hasSubpacket(SignatureSubpacketTags.EMBEDDED_SIGNATURE)) {
|
||||||
try {
|
try {
|
||||||
eSigList = Pkts.getEmbeddedSignatures();
|
eSigList = pkts.getEmbeddedSignatures();
|
||||||
} catch (IOException e) {
|
} catch (IOException e) {
|
||||||
return false;
|
return false;
|
||||||
} catch (PGPException e) {
|
} catch (PGPException e) {
|
||||||
@@ -723,8 +701,9 @@ public class PgpDecryptVerify {
|
|||||||
try {
|
try {
|
||||||
emSig.init(contentVerifierBuilderProvider, signingPublicKey);
|
emSig.init(contentVerifierBuilderProvider, signingPublicKey);
|
||||||
validPrimaryKeyBinding = emSig.verifyCertification(masterPublicKey, signingPublicKey);
|
validPrimaryKeyBinding = emSig.verifyCertification(masterPublicKey, signingPublicKey);
|
||||||
if (validPrimaryKeyBinding)
|
if (validPrimaryKeyBinding) {
|
||||||
break;
|
break;
|
||||||
|
}
|
||||||
} catch (PGPException e) {
|
} catch (PGPException e) {
|
||||||
continue;
|
continue;
|
||||||
} catch (SignatureException e) {
|
} catch (SignatureException e) {
|
||||||
|
|||||||
@@ -19,36 +19,35 @@ package org.sufficientlysecure.keychain.pgp;
|
|||||||
|
|
||||||
import android.os.Parcel;
|
import android.os.Parcel;
|
||||||
import android.os.Parcelable;
|
import android.os.Parcelable;
|
||||||
|
|
||||||
import org.openintents.openpgp.OpenPgpSignatureResult;
|
import org.openintents.openpgp.OpenPgpSignatureResult;
|
||||||
|
|
||||||
public class PgpDecryptVerifyResult implements Parcelable {
|
public class PgpDecryptVerifyResult implements Parcelable {
|
||||||
boolean symmetricPassphraseNeeded;
|
boolean mSymmetricPassphraseNeeded;
|
||||||
boolean keyPassphraseNeeded;
|
boolean mKeyPassphraseNeeded;
|
||||||
OpenPgpSignatureResult signatureResult;
|
OpenPgpSignatureResult mSignatureResult;
|
||||||
|
|
||||||
public boolean isSymmetricPassphraseNeeded() {
|
public boolean isSymmetricPassphraseNeeded() {
|
||||||
return symmetricPassphraseNeeded;
|
return mSymmetricPassphraseNeeded;
|
||||||
}
|
}
|
||||||
|
|
||||||
public void setSymmetricPassphraseNeeded(boolean symmetricPassphraseNeeded) {
|
public void setSymmetricPassphraseNeeded(boolean symmetricPassphraseNeeded) {
|
||||||
this.symmetricPassphraseNeeded = symmetricPassphraseNeeded;
|
this.mSymmetricPassphraseNeeded = symmetricPassphraseNeeded;
|
||||||
}
|
}
|
||||||
|
|
||||||
public boolean isKeyPassphraseNeeded() {
|
public boolean isKeyPassphraseNeeded() {
|
||||||
return keyPassphraseNeeded;
|
return mKeyPassphraseNeeded;
|
||||||
}
|
}
|
||||||
|
|
||||||
public void setKeyPassphraseNeeded(boolean keyPassphraseNeeded) {
|
public void setKeyPassphraseNeeded(boolean keyPassphraseNeeded) {
|
||||||
this.keyPassphraseNeeded = keyPassphraseNeeded;
|
this.mKeyPassphraseNeeded = keyPassphraseNeeded;
|
||||||
}
|
}
|
||||||
|
|
||||||
public OpenPgpSignatureResult getSignatureResult() {
|
public OpenPgpSignatureResult getSignatureResult() {
|
||||||
return signatureResult;
|
return mSignatureResult;
|
||||||
}
|
}
|
||||||
|
|
||||||
public void setSignatureResult(OpenPgpSignatureResult signatureResult) {
|
public void setSignatureResult(OpenPgpSignatureResult signatureResult) {
|
||||||
this.signatureResult = signatureResult;
|
this.mSignatureResult = signatureResult;
|
||||||
}
|
}
|
||||||
|
|
||||||
public PgpDecryptVerifyResult() {
|
public PgpDecryptVerifyResult() {
|
||||||
@@ -56,9 +55,9 @@ public class PgpDecryptVerifyResult implements Parcelable {
|
|||||||
}
|
}
|
||||||
|
|
||||||
public PgpDecryptVerifyResult(PgpDecryptVerifyResult b) {
|
public PgpDecryptVerifyResult(PgpDecryptVerifyResult b) {
|
||||||
this.symmetricPassphraseNeeded = b.symmetricPassphraseNeeded;
|
this.mSymmetricPassphraseNeeded = b.mSymmetricPassphraseNeeded;
|
||||||
this.keyPassphraseNeeded = b.keyPassphraseNeeded;
|
this.mKeyPassphraseNeeded = b.mKeyPassphraseNeeded;
|
||||||
this.signatureResult = b.signatureResult;
|
this.mSignatureResult = b.mSignatureResult;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
@@ -67,17 +66,17 @@ public class PgpDecryptVerifyResult implements Parcelable {
|
|||||||
}
|
}
|
||||||
|
|
||||||
public void writeToParcel(Parcel dest, int flags) {
|
public void writeToParcel(Parcel dest, int flags) {
|
||||||
dest.writeByte((byte) (symmetricPassphraseNeeded ? 1 : 0));
|
dest.writeByte((byte) (mSymmetricPassphraseNeeded ? 1 : 0));
|
||||||
dest.writeByte((byte) (keyPassphraseNeeded ? 1 : 0));
|
dest.writeByte((byte) (mKeyPassphraseNeeded ? 1 : 0));
|
||||||
dest.writeParcelable(signatureResult, 0);
|
dest.writeParcelable(mSignatureResult, 0);
|
||||||
}
|
}
|
||||||
|
|
||||||
public static final Creator<PgpDecryptVerifyResult> CREATOR = new Creator<PgpDecryptVerifyResult>() {
|
public static final Creator<PgpDecryptVerifyResult> CREATOR = new Creator<PgpDecryptVerifyResult>() {
|
||||||
public PgpDecryptVerifyResult createFromParcel(final Parcel source) {
|
public PgpDecryptVerifyResult createFromParcel(final Parcel source) {
|
||||||
PgpDecryptVerifyResult vr = new PgpDecryptVerifyResult();
|
PgpDecryptVerifyResult vr = new PgpDecryptVerifyResult();
|
||||||
vr.symmetricPassphraseNeeded = source.readByte() == 1;
|
vr.mSymmetricPassphraseNeeded = source.readByte() == 1;
|
||||||
vr.keyPassphraseNeeded = source.readByte() == 1;
|
vr.mKeyPassphraseNeeded = source.readByte() == 1;
|
||||||
vr.signatureResult = source.readParcelable(OpenPgpSignatureResult.class.getClassLoader());
|
vr.mSignatureResult = source.readParcelable(OpenPgpSignatureResult.class.getClassLoader());
|
||||||
return vr;
|
return vr;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -17,22 +17,10 @@
|
|||||||
|
|
||||||
package org.sufficientlysecure.keychain.pgp;
|
package org.sufficientlysecure.keychain.pgp;
|
||||||
|
|
||||||
import java.io.File;
|
import android.content.Context;
|
||||||
import java.io.FileNotFoundException;
|
import android.content.pm.PackageInfo;
|
||||||
import java.io.IOException;
|
import android.content.pm.PackageManager.NameNotFoundException;
|
||||||
import java.io.InputStream;
|
import org.spongycastle.openpgp.*;
|
||||||
import java.io.RandomAccessFile;
|
|
||||||
import java.security.SecureRandom;
|
|
||||||
import java.util.Iterator;
|
|
||||||
import java.util.regex.Pattern;
|
|
||||||
|
|
||||||
import org.spongycastle.openpgp.PGPEncryptedDataList;
|
|
||||||
import org.spongycastle.openpgp.PGPObjectFactory;
|
|
||||||
import org.spongycastle.openpgp.PGPPublicKeyEncryptedData;
|
|
||||||
import org.spongycastle.openpgp.PGPPublicKeyRing;
|
|
||||||
import org.spongycastle.openpgp.PGPSecretKey;
|
|
||||||
import org.spongycastle.openpgp.PGPSecretKeyRing;
|
|
||||||
import org.spongycastle.openpgp.PGPUtil;
|
|
||||||
import org.sufficientlysecure.keychain.Constants;
|
import org.sufficientlysecure.keychain.Constants;
|
||||||
import org.sufficientlysecure.keychain.Id;
|
import org.sufficientlysecure.keychain.Id;
|
||||||
import org.sufficientlysecure.keychain.R;
|
import org.sufficientlysecure.keychain.R;
|
||||||
@@ -42,21 +30,25 @@ import org.sufficientlysecure.keychain.provider.ProviderHelper;
|
|||||||
import org.sufficientlysecure.keychain.util.Log;
|
import org.sufficientlysecure.keychain.util.Log;
|
||||||
import org.sufficientlysecure.keychain.util.ProgressDialogUpdater;
|
import org.sufficientlysecure.keychain.util.ProgressDialogUpdater;
|
||||||
|
|
||||||
import android.content.Context;
|
import java.io.File;
|
||||||
import android.content.pm.PackageInfo;
|
import java.io.IOException;
|
||||||
import android.content.pm.PackageManager.NameNotFoundException;
|
import java.io.InputStream;
|
||||||
|
import java.io.RandomAccessFile;
|
||||||
|
import java.security.SecureRandom;
|
||||||
|
import java.util.Iterator;
|
||||||
|
import java.util.regex.Pattern;
|
||||||
|
|
||||||
public class PgpHelper {
|
public class PgpHelper {
|
||||||
|
|
||||||
public static Pattern PGP_MESSAGE = Pattern.compile(
|
public static final Pattern PGP_MESSAGE = Pattern.compile(
|
||||||
".*?(-----BEGIN PGP MESSAGE-----.*?-----END PGP MESSAGE-----).*", Pattern.DOTALL);
|
".*?(-----BEGIN PGP MESSAGE-----.*?-----END PGP MESSAGE-----).*", Pattern.DOTALL);
|
||||||
|
|
||||||
public static Pattern PGP_SIGNED_MESSAGE = Pattern
|
public static final Pattern PGP_SIGNED_MESSAGE = Pattern
|
||||||
.compile(
|
.compile(
|
||||||
".*?(-----BEGIN PGP SIGNED MESSAGE-----.*?-----BEGIN PGP SIGNATURE-----.*?-----END PGP SIGNATURE-----).*",
|
".*?(-----BEGIN PGP SIGNED MESSAGE-----.*?-----BEGIN PGP SIGNATURE-----.*?-----END PGP SIGNATURE-----).*",
|
||||||
Pattern.DOTALL);
|
Pattern.DOTALL);
|
||||||
|
|
||||||
public static Pattern PGP_PUBLIC_KEY = Pattern.compile(
|
public static final Pattern PGP_PUBLIC_KEY = Pattern.compile(
|
||||||
".*?(-----BEGIN PGP PUBLIC KEY BLOCK-----.*?-----END PGP PUBLIC KEY BLOCK-----).*",
|
".*?(-----BEGIN PGP PUBLIC KEY BLOCK-----.*?-----END PGP PUBLIC KEY BLOCK-----).*",
|
||||||
Pattern.DOTALL);
|
Pattern.DOTALL);
|
||||||
|
|
||||||
@@ -187,7 +179,7 @@ public class PgpHelper {
|
|||||||
|
|
||||||
/**
|
/**
|
||||||
* Deletes file securely by overwriting it with random data before deleting it.
|
* Deletes file securely by overwriting it with random data before deleting it.
|
||||||
*
|
* <p/>
|
||||||
* TODO: Does this really help on flash storage?
|
* TODO: Does this really help on flash storage?
|
||||||
*
|
*
|
||||||
* @param context
|
* @param context
|
||||||
@@ -206,8 +198,9 @@ public class PgpHelper {
|
|||||||
int pos = 0;
|
int pos = 0;
|
||||||
String msg = context.getString(R.string.progress_deleting_securely, file.getName());
|
String msg = context.getString(R.string.progress_deleting_securely, file.getName());
|
||||||
while (pos < length) {
|
while (pos < length) {
|
||||||
if (progress != null)
|
if (progress != null) {
|
||||||
progress.setProgress(msg, (int) (100 * pos / length), 100);
|
progress.setProgress(msg, (int) (100 * pos / length), 100);
|
||||||
|
}
|
||||||
random.nextBytes(data);
|
random.nextBytes(data);
|
||||||
raf.write(data);
|
raf.write(data);
|
||||||
pos += data.length;
|
pos += data.length;
|
||||||
|
|||||||
@@ -17,20 +17,11 @@
|
|||||||
|
|
||||||
package org.sufficientlysecure.keychain.pgp;
|
package org.sufficientlysecure.keychain.pgp;
|
||||||
|
|
||||||
import java.io.ByteArrayOutputStream;
|
import android.content.Context;
|
||||||
import java.io.FileNotFoundException;
|
import android.os.Bundle;
|
||||||
import java.io.IOException;
|
import android.os.Environment;
|
||||||
import java.io.OutputStream;
|
|
||||||
import java.util.ArrayList;
|
|
||||||
import java.util.List;
|
|
||||||
|
|
||||||
import org.spongycastle.bcpg.ArmoredOutputStream;
|
import org.spongycastle.bcpg.ArmoredOutputStream;
|
||||||
import org.spongycastle.openpgp.PGPException;
|
import org.spongycastle.openpgp.*;
|
||||||
import org.spongycastle.openpgp.PGPKeyRing;
|
|
||||||
import org.spongycastle.openpgp.PGPPublicKey;
|
|
||||||
import org.spongycastle.openpgp.PGPPublicKeyRing;
|
|
||||||
import org.spongycastle.openpgp.PGPSecretKey;
|
|
||||||
import org.spongycastle.openpgp.PGPSecretKeyRing;
|
|
||||||
import org.spongycastle.openpgp.operator.jcajce.JcaKeyFingerprintCalculator;
|
import org.spongycastle.openpgp.operator.jcajce.JcaKeyFingerprintCalculator;
|
||||||
import org.sufficientlysecure.keychain.Constants;
|
import org.sufficientlysecure.keychain.Constants;
|
||||||
import org.sufficientlysecure.keychain.Id;
|
import org.sufficientlysecure.keychain.Id;
|
||||||
@@ -39,16 +30,14 @@ import org.sufficientlysecure.keychain.pgp.exception.PgpGeneralException;
|
|||||||
import org.sufficientlysecure.keychain.provider.ProviderHelper;
|
import org.sufficientlysecure.keychain.provider.ProviderHelper;
|
||||||
import org.sufficientlysecure.keychain.service.KeychainIntentService;
|
import org.sufficientlysecure.keychain.service.KeychainIntentService;
|
||||||
import org.sufficientlysecure.keychain.ui.adapter.ImportKeysListEntry;
|
import org.sufficientlysecure.keychain.ui.adapter.ImportKeysListEntry;
|
||||||
import org.sufficientlysecure.keychain.util.HkpKeyServer;
|
import org.sufficientlysecure.keychain.util.*;
|
||||||
import org.sufficientlysecure.keychain.util.IterableIterator;
|
|
||||||
import org.sufficientlysecure.keychain.util.KeyServer.AddKeyException;
|
import org.sufficientlysecure.keychain.util.KeyServer.AddKeyException;
|
||||||
import org.sufficientlysecure.keychain.util.KeychainServiceListener;
|
|
||||||
import org.sufficientlysecure.keychain.util.Log;
|
|
||||||
import org.sufficientlysecure.keychain.util.ProgressDialogUpdater;
|
|
||||||
|
|
||||||
import android.content.Context;
|
import java.io.ByteArrayOutputStream;
|
||||||
import android.os.Bundle;
|
import java.io.IOException;
|
||||||
import android.os.Environment;
|
import java.io.OutputStream;
|
||||||
|
import java.util.ArrayList;
|
||||||
|
import java.util.List;
|
||||||
|
|
||||||
public class PgpImportExport {
|
public class PgpImportExport {
|
||||||
|
|
||||||
@@ -63,7 +52,7 @@ public class PgpImportExport {
|
|||||||
this.mProgress = progress;
|
this.mProgress = progress;
|
||||||
}
|
}
|
||||||
|
|
||||||
public PgpImportExport(Context context, ProgressDialogUpdater progress, KeychainServiceListener keychainListener){
|
public PgpImportExport(Context context, ProgressDialogUpdater progress, KeychainServiceListener keychainListener) {
|
||||||
super();
|
super();
|
||||||
this.mContext = context;
|
this.mContext = context;
|
||||||
this.mProgress = progress;
|
this.mProgress = progress;
|
||||||
@@ -107,8 +96,8 @@ public class PgpImportExport {
|
|||||||
return false;
|
return false;
|
||||||
} finally {
|
} finally {
|
||||||
try {
|
try {
|
||||||
if (aos != null) aos.close();
|
if (aos != null) { aos.close(); }
|
||||||
if (bos != null) bos.close();
|
if (bos != null) { bos.close(); }
|
||||||
} catch (IOException e) {
|
} catch (IOException e) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -199,7 +188,7 @@ public class PgpImportExport {
|
|||||||
if (secretKeyRing != null) {
|
if (secretKeyRing != null) {
|
||||||
secretKeyRing.encode(arOutStream);
|
secretKeyRing.encode(arOutStream);
|
||||||
}
|
}
|
||||||
if(mKeychainServiceListener.hasServiceStopped()){
|
if (mKeychainServiceListener.hasServiceStopped()) {
|
||||||
arOutStream.close();
|
arOutStream.close();
|
||||||
return null;
|
return null;
|
||||||
}
|
}
|
||||||
@@ -212,7 +201,7 @@ public class PgpImportExport {
|
|||||||
publicKeyRing.encode(arOutStream);
|
publicKeyRing.encode(arOutStream);
|
||||||
}
|
}
|
||||||
|
|
||||||
if(mKeychainServiceListener.hasServiceStopped()){
|
if (mKeychainServiceListener.hasServiceStopped()) {
|
||||||
arOutStream.close();
|
arOutStream.close();
|
||||||
return null;
|
return null;
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -17,21 +17,9 @@
|
|||||||
|
|
||||||
package org.sufficientlysecure.keychain.pgp;
|
package org.sufficientlysecure.keychain.pgp;
|
||||||
|
|
||||||
import java.util.Calendar;
|
import android.content.Context;
|
||||||
import java.util.Date;
|
|
||||||
import java.util.GregorianCalendar;
|
|
||||||
import java.util.Locale;
|
|
||||||
import java.util.Vector;
|
|
||||||
import java.util.regex.Matcher;
|
|
||||||
import java.util.regex.Pattern;
|
|
||||||
|
|
||||||
import org.spongycastle.bcpg.sig.KeyFlags;
|
import org.spongycastle.bcpg.sig.KeyFlags;
|
||||||
import org.spongycastle.openpgp.PGPPublicKey;
|
import org.spongycastle.openpgp.*;
|
||||||
import org.spongycastle.openpgp.PGPPublicKeyRing;
|
|
||||||
import org.spongycastle.openpgp.PGPSecretKey;
|
|
||||||
import org.spongycastle.openpgp.PGPSecretKeyRing;
|
|
||||||
import org.spongycastle.openpgp.PGPSignature;
|
|
||||||
import org.spongycastle.openpgp.PGPSignatureSubpacketVector;
|
|
||||||
import org.spongycastle.util.encoders.Hex;
|
import org.spongycastle.util.encoders.Hex;
|
||||||
import org.sufficientlysecure.keychain.Constants;
|
import org.sufficientlysecure.keychain.Constants;
|
||||||
import org.sufficientlysecure.keychain.R;
|
import org.sufficientlysecure.keychain.R;
|
||||||
@@ -39,7 +27,9 @@ import org.sufficientlysecure.keychain.provider.ProviderHelper;
|
|||||||
import org.sufficientlysecure.keychain.util.IterableIterator;
|
import org.sufficientlysecure.keychain.util.IterableIterator;
|
||||||
import org.sufficientlysecure.keychain.util.Log;
|
import org.sufficientlysecure.keychain.util.Log;
|
||||||
|
|
||||||
import android.content.Context;
|
import java.util.*;
|
||||||
|
import java.util.regex.Matcher;
|
||||||
|
import java.util.regex.Pattern;
|
||||||
|
|
||||||
public class PgpKeyHelper {
|
public class PgpKeyHelper {
|
||||||
|
|
||||||
|
|||||||
@@ -17,48 +17,20 @@
|
|||||||
|
|
||||||
package org.sufficientlysecure.keychain.pgp;
|
package org.sufficientlysecure.keychain.pgp;
|
||||||
|
|
||||||
import java.io.IOException;
|
import android.content.Context;
|
||||||
import java.math.BigInteger;
|
|
||||||
import java.security.InvalidAlgorithmParameterException;
|
|
||||||
import java.security.KeyPairGenerator;
|
|
||||||
import java.security.NoSuchAlgorithmException;
|
|
||||||
import java.security.NoSuchProviderException;
|
|
||||||
import java.security.SecureRandom;
|
|
||||||
import java.security.SignatureException;
|
|
||||||
import java.util.ArrayList;
|
|
||||||
import java.util.Date;
|
|
||||||
import java.util.GregorianCalendar;
|
|
||||||
import java.util.TimeZone;
|
|
||||||
|
|
||||||
import org.spongycastle.bcpg.CompressionAlgorithmTags;
|
import org.spongycastle.bcpg.CompressionAlgorithmTags;
|
||||||
import org.spongycastle.bcpg.HashAlgorithmTags;
|
import org.spongycastle.bcpg.HashAlgorithmTags;
|
||||||
import org.spongycastle.bcpg.SymmetricKeyAlgorithmTags;
|
import org.spongycastle.bcpg.SymmetricKeyAlgorithmTags;
|
||||||
import org.spongycastle.bcpg.sig.KeyFlags;
|
import org.spongycastle.bcpg.sig.KeyFlags;
|
||||||
import org.spongycastle.jce.provider.BouncyCastleProvider;
|
import org.spongycastle.jce.provider.BouncyCastleProvider;
|
||||||
import org.spongycastle.jce.spec.ElGamalParameterSpec;
|
import org.spongycastle.jce.spec.ElGamalParameterSpec;
|
||||||
import org.spongycastle.openpgp.PGPEncryptedData;
|
import org.spongycastle.openpgp.*;
|
||||||
import org.spongycastle.openpgp.PGPException;
|
|
||||||
import org.spongycastle.openpgp.PGPKeyPair;
|
|
||||||
import org.spongycastle.openpgp.PGPKeyRingGenerator;
|
|
||||||
import org.spongycastle.openpgp.PGPPrivateKey;
|
|
||||||
import org.spongycastle.openpgp.PGPPublicKey;
|
|
||||||
import org.spongycastle.openpgp.PGPPublicKeyRing;
|
|
||||||
import org.spongycastle.openpgp.PGPSecretKey;
|
|
||||||
import org.spongycastle.openpgp.PGPSecretKeyRing;
|
|
||||||
import org.spongycastle.openpgp.PGPSignature;
|
|
||||||
import org.spongycastle.openpgp.PGPSignatureGenerator;
|
|
||||||
import org.spongycastle.openpgp.PGPSignatureSubpacketGenerator;
|
|
||||||
import org.spongycastle.openpgp.PGPSignatureSubpacketVector;
|
|
||||||
import org.spongycastle.openpgp.PGPUtil;
|
import org.spongycastle.openpgp.PGPUtil;
|
||||||
import org.spongycastle.openpgp.operator.PBESecretKeyDecryptor;
|
import org.spongycastle.openpgp.operator.PBESecretKeyDecryptor;
|
||||||
import org.spongycastle.openpgp.operator.PBESecretKeyEncryptor;
|
import org.spongycastle.openpgp.operator.PBESecretKeyEncryptor;
|
||||||
import org.spongycastle.openpgp.operator.PGPContentSignerBuilder;
|
import org.spongycastle.openpgp.operator.PGPContentSignerBuilder;
|
||||||
import org.spongycastle.openpgp.operator.PGPDigestCalculator;
|
import org.spongycastle.openpgp.operator.PGPDigestCalculator;
|
||||||
import org.spongycastle.openpgp.operator.jcajce.JcaPGPContentSignerBuilder;
|
import org.spongycastle.openpgp.operator.jcajce.*;
|
||||||
import org.spongycastle.openpgp.operator.jcajce.JcaPGPDigestCalculatorProviderBuilder;
|
|
||||||
import org.spongycastle.openpgp.operator.jcajce.JcaPGPKeyPair;
|
|
||||||
import org.spongycastle.openpgp.operator.jcajce.JcePBESecretKeyDecryptorBuilder;
|
|
||||||
import org.spongycastle.openpgp.operator.jcajce.JcePBESecretKeyEncryptorBuilder;
|
|
||||||
import org.sufficientlysecure.keychain.Constants;
|
import org.sufficientlysecure.keychain.Constants;
|
||||||
import org.sufficientlysecure.keychain.Id;
|
import org.sufficientlysecure.keychain.Id;
|
||||||
import org.sufficientlysecure.keychain.R;
|
import org.sufficientlysecure.keychain.R;
|
||||||
@@ -68,21 +40,27 @@ import org.sufficientlysecure.keychain.util.Log;
|
|||||||
import org.sufficientlysecure.keychain.util.Primes;
|
import org.sufficientlysecure.keychain.util.Primes;
|
||||||
import org.sufficientlysecure.keychain.util.ProgressDialogUpdater;
|
import org.sufficientlysecure.keychain.util.ProgressDialogUpdater;
|
||||||
|
|
||||||
import android.content.Context;
|
import java.io.IOException;
|
||||||
|
import java.math.BigInteger;
|
||||||
|
import java.security.*;
|
||||||
|
import java.util.ArrayList;
|
||||||
|
import java.util.Date;
|
||||||
|
import java.util.GregorianCalendar;
|
||||||
|
import java.util.TimeZone;
|
||||||
|
|
||||||
public class PgpKeyOperation {
|
public class PgpKeyOperation {
|
||||||
private Context mContext;
|
private Context mContext;
|
||||||
private ProgressDialogUpdater mProgress;
|
private ProgressDialogUpdater mProgress;
|
||||||
|
|
||||||
private static final int[] PREFERRED_SYMMETRIC_ALGORITHMS = new int[] {
|
private static final int[] PREFERRED_SYMMETRIC_ALGORITHMS = new int[]{
|
||||||
SymmetricKeyAlgorithmTags.AES_256, SymmetricKeyAlgorithmTags.AES_192,
|
SymmetricKeyAlgorithmTags.AES_256, SymmetricKeyAlgorithmTags.AES_192,
|
||||||
SymmetricKeyAlgorithmTags.AES_128, SymmetricKeyAlgorithmTags.CAST5,
|
SymmetricKeyAlgorithmTags.AES_128, SymmetricKeyAlgorithmTags.CAST5,
|
||||||
SymmetricKeyAlgorithmTags.TRIPLE_DES };
|
SymmetricKeyAlgorithmTags.TRIPLE_DES};
|
||||||
private static final int[] PREFERRED_HASH_ALGORITHMS = new int[] { HashAlgorithmTags.SHA1,
|
private static final int[] PREFERRED_HASH_ALGORITHMS = new int[]{HashAlgorithmTags.SHA1,
|
||||||
HashAlgorithmTags.SHA256, HashAlgorithmTags.RIPEMD160 };
|
HashAlgorithmTags.SHA256, HashAlgorithmTags.RIPEMD160};
|
||||||
private static final int[] PREFERRED_COMPRESSION_ALGORITHMS = new int[] {
|
private static final int[] PREFERRED_COMPRESSION_ALGORITHMS = new int[]{
|
||||||
CompressionAlgorithmTags.ZLIB, CompressionAlgorithmTags.BZIP2,
|
CompressionAlgorithmTags.ZLIB, CompressionAlgorithmTags.BZIP2,
|
||||||
CompressionAlgorithmTags.ZIP };
|
CompressionAlgorithmTags.ZIP};
|
||||||
|
|
||||||
public PgpKeyOperation(Context context, ProgressDialogUpdater progress) {
|
public PgpKeyOperation(Context context, ProgressDialogUpdater progress) {
|
||||||
super();
|
super();
|
||||||
@@ -119,8 +97,9 @@ public class PgpKeyOperation {
|
|||||||
|
|
||||||
// TODO: key flags?
|
// TODO: key flags?
|
||||||
public PGPSecretKey createKey(int algorithmChoice, int keySize, String passphrase,
|
public PGPSecretKey createKey(int algorithmChoice, int keySize, String passphrase,
|
||||||
boolean isMasterKey) throws NoSuchAlgorithmException, PGPException, NoSuchProviderException,
|
boolean isMasterKey)
|
||||||
PgpGeneralException, InvalidAlgorithmParameterException {
|
throws NoSuchAlgorithmException, PGPException, NoSuchProviderException,
|
||||||
|
PgpGeneralException, InvalidAlgorithmParameterException {
|
||||||
|
|
||||||
if (keySize < 512) {
|
if (keySize < 512) {
|
||||||
throw new PgpGeneralException(mContext.getString(R.string.error_key_size_minimum512bit));
|
throw new PgpGeneralException(mContext.getString(R.string.error_key_size_minimum512bit));
|
||||||
@@ -134,41 +113,41 @@ public class PgpKeyOperation {
|
|||||||
KeyPairGenerator keyGen = null;
|
KeyPairGenerator keyGen = null;
|
||||||
|
|
||||||
switch (algorithmChoice) {
|
switch (algorithmChoice) {
|
||||||
case Id.choice.algorithm.dsa: {
|
case Id.choice.algorithm.dsa: {
|
||||||
keyGen = KeyPairGenerator.getInstance("DSA", Constants.BOUNCY_CASTLE_PROVIDER_NAME);
|
keyGen = KeyPairGenerator.getInstance("DSA", Constants.BOUNCY_CASTLE_PROVIDER_NAME);
|
||||||
keyGen.initialize(keySize, new SecureRandom());
|
keyGen.initialize(keySize, new SecureRandom());
|
||||||
algorithm = PGPPublicKey.DSA;
|
algorithm = PGPPublicKey.DSA;
|
||||||
break;
|
break;
|
||||||
}
|
|
||||||
|
|
||||||
case Id.choice.algorithm.elgamal: {
|
|
||||||
if (isMasterKey) {
|
|
||||||
throw new PgpGeneralException(
|
|
||||||
mContext.getString(R.string.error_master_key_must_not_be_el_gamal));
|
|
||||||
}
|
}
|
||||||
keyGen = KeyPairGenerator.getInstance("ElGamal", Constants.BOUNCY_CASTLE_PROVIDER_NAME);
|
|
||||||
BigInteger p = Primes.getBestPrime(keySize);
|
|
||||||
BigInteger g = new BigInteger("2");
|
|
||||||
|
|
||||||
ElGamalParameterSpec elParams = new ElGamalParameterSpec(p, g);
|
case Id.choice.algorithm.elgamal: {
|
||||||
|
if (isMasterKey) {
|
||||||
|
throw new PgpGeneralException(
|
||||||
|
mContext.getString(R.string.error_master_key_must_not_be_el_gamal));
|
||||||
|
}
|
||||||
|
keyGen = KeyPairGenerator.getInstance("ElGamal", Constants.BOUNCY_CASTLE_PROVIDER_NAME);
|
||||||
|
BigInteger p = Primes.getBestPrime(keySize);
|
||||||
|
BigInteger g = new BigInteger("2");
|
||||||
|
|
||||||
keyGen.initialize(elParams);
|
ElGamalParameterSpec elParams = new ElGamalParameterSpec(p, g);
|
||||||
algorithm = PGPPublicKey.ELGAMAL_ENCRYPT;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
|
|
||||||
case Id.choice.algorithm.rsa: {
|
keyGen.initialize(elParams);
|
||||||
keyGen = KeyPairGenerator.getInstance("RSA", Constants.BOUNCY_CASTLE_PROVIDER_NAME);
|
algorithm = PGPPublicKey.ELGAMAL_ENCRYPT;
|
||||||
keyGen.initialize(keySize, new SecureRandom());
|
break;
|
||||||
|
}
|
||||||
|
|
||||||
algorithm = PGPPublicKey.RSA_GENERAL;
|
case Id.choice.algorithm.rsa: {
|
||||||
break;
|
keyGen = KeyPairGenerator.getInstance("RSA", Constants.BOUNCY_CASTLE_PROVIDER_NAME);
|
||||||
}
|
keyGen.initialize(keySize, new SecureRandom());
|
||||||
|
|
||||||
default: {
|
algorithm = PGPPublicKey.RSA_GENERAL;
|
||||||
throw new PgpGeneralException(
|
break;
|
||||||
mContext.getString(R.string.error_unknown_algorithm_choice));
|
}
|
||||||
}
|
|
||||||
|
default: {
|
||||||
|
throw new PgpGeneralException(
|
||||||
|
mContext.getString(R.string.error_unknown_algorithm_choice));
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// build new key pair
|
// build new key pair
|
||||||
@@ -184,13 +163,13 @@ public class PgpKeyOperation {
|
|||||||
.setProvider(Constants.BOUNCY_CASTLE_PROVIDER_NAME).build(passphrase.toCharArray());
|
.setProvider(Constants.BOUNCY_CASTLE_PROVIDER_NAME).build(passphrase.toCharArray());
|
||||||
|
|
||||||
PGPSecretKey secKey = new PGPSecretKey(keyPair.getPrivateKey(), keyPair.getPublicKey(),
|
PGPSecretKey secKey = new PGPSecretKey(keyPair.getPrivateKey(), keyPair.getPublicKey(),
|
||||||
sha1Calc, isMasterKey, keyEncryptor);
|
sha1Calc, isMasterKey, keyEncryptor);
|
||||||
|
|
||||||
return secKey;
|
return secKey;
|
||||||
}
|
}
|
||||||
|
|
||||||
public void changeSecretKeyPassphrase(PGPSecretKeyRing keyRing, String oldPassPhrase,
|
public void changeSecretKeyPassphrase(PGPSecretKeyRing keyRing, String oldPassPhrase,
|
||||||
String newPassPhrase) throws IOException, PGPException,
|
String newPassPhrase) throws IOException, PGPException,
|
||||||
NoSuchProviderException {
|
NoSuchProviderException {
|
||||||
|
|
||||||
updateProgress(R.string.progress_building_key, 0, 100);
|
updateProgress(R.string.progress_building_key, 0, 100);
|
||||||
@@ -218,9 +197,9 @@ public class PgpKeyOperation {
|
|||||||
}
|
}
|
||||||
|
|
||||||
public void buildSecretKey(ArrayList<String> userIds, ArrayList<PGPSecretKey> keys,
|
public void buildSecretKey(ArrayList<String> userIds, ArrayList<PGPSecretKey> keys,
|
||||||
ArrayList<Integer> keysUsages, ArrayList<GregorianCalendar> keysExpiryDates,
|
ArrayList<Integer> keysUsages, ArrayList<GregorianCalendar> keysExpiryDates,
|
||||||
long masterKeyId, String oldPassPhrase,
|
long masterKeyId, String oldPassPhrase,
|
||||||
String newPassPhrase) throws PgpGeneralException, NoSuchProviderException,
|
String newPassPhrase) throws PgpGeneralException, NoSuchProviderException,
|
||||||
PGPException, NoSuchAlgorithmException, SignatureException, IOException {
|
PGPException, NoSuchAlgorithmException, SignatureException, IOException {
|
||||||
|
|
||||||
Log.d(Constants.TAG, "userIds: " + userIds.toString());
|
Log.d(Constants.TAG, "userIds: " + userIds.toString());
|
||||||
@@ -237,8 +216,10 @@ public class PgpKeyOperation {
|
|||||||
updateProgress(R.string.progress_preparing_master_key, 10, 100);
|
updateProgress(R.string.progress_preparing_master_key, 10, 100);
|
||||||
|
|
||||||
int usageId = keysUsages.get(0);
|
int usageId = keysUsages.get(0);
|
||||||
boolean canSign = (usageId == Id.choice.usage.sign_only || usageId == Id.choice.usage.sign_and_encrypt);
|
boolean canSign =
|
||||||
boolean canEncrypt = (usageId == Id.choice.usage.encrypt_only || usageId == Id.choice.usage.sign_and_encrypt);
|
(usageId == Id.choice.usage.sign_only || usageId == Id.choice.usage.sign_and_encrypt);
|
||||||
|
boolean canEncrypt =
|
||||||
|
(usageId == Id.choice.usage.encrypt_only || usageId == Id.choice.usage.sign_and_encrypt);
|
||||||
|
|
||||||
String mainUserId = userIds.get(0);
|
String mainUserId = userIds.get(0);
|
||||||
|
|
||||||
@@ -303,13 +284,16 @@ public class PgpKeyOperation {
|
|||||||
GregorianCalendar expiryDate = keysExpiryDates.get(0);
|
GregorianCalendar expiryDate = keysExpiryDates.get(0);
|
||||||
//note that the below, (a/c) - (b/c) is *not* the same as (a - b) /c
|
//note that the below, (a/c) - (b/c) is *not* the same as (a - b) /c
|
||||||
//here we purposefully ignore partial days in each date - long type has no fractional part!
|
//here we purposefully ignore partial days in each date - long type has no fractional part!
|
||||||
long numDays = (expiryDate.getTimeInMillis() / 86400000) - (creationDate.getTimeInMillis() / 86400000);
|
long numDays =
|
||||||
if (numDays <= 0)
|
(expiryDate.getTimeInMillis() / 86400000) - (creationDate.getTimeInMillis() / 86400000);
|
||||||
|
if (numDays <= 0) {
|
||||||
throw new PgpGeneralException(mContext.getString(R.string.error_expiry_must_come_after_creation));
|
throw new PgpGeneralException(mContext.getString(R.string.error_expiry_must_come_after_creation));
|
||||||
|
}
|
||||||
hashedPacketsGen.setKeyExpirationTime(false, numDays * 86400);
|
hashedPacketsGen.setKeyExpirationTime(false, numDays * 86400);
|
||||||
} else {
|
} else {
|
||||||
hashedPacketsGen.setKeyExpirationTime(false, 0); //do this explicitly, although since we're rebuilding,
|
//do this explicitly, although since we're rebuilding,
|
||||||
//this happens anyway
|
hashedPacketsGen.setKeyExpirationTime(false, 0);
|
||||||
|
//this happens anyway
|
||||||
}
|
}
|
||||||
|
|
||||||
updateProgress(R.string.progress_building_master_key, 30, 100);
|
updateProgress(R.string.progress_building_master_key, 30, 100);
|
||||||
@@ -382,13 +366,17 @@ public class PgpKeyOperation {
|
|||||||
GregorianCalendar expiryDate = keysExpiryDates.get(i);
|
GregorianCalendar expiryDate = keysExpiryDates.get(i);
|
||||||
//note that the below, (a/c) - (b/c) is *not* the same as (a - b) /c
|
//note that the below, (a/c) - (b/c) is *not* the same as (a - b) /c
|
||||||
//here we purposefully ignore partial days in each date - long type has no fractional part!
|
//here we purposefully ignore partial days in each date - long type has no fractional part!
|
||||||
long numDays = (expiryDate.getTimeInMillis() / 86400000) - (creationDate.getTimeInMillis() / 86400000);
|
long numDays =
|
||||||
if (numDays <= 0)
|
(expiryDate.getTimeInMillis() / 86400000) - (creationDate.getTimeInMillis() / 86400000);
|
||||||
throw new PgpGeneralException(mContext.getString(R.string.error_expiry_must_come_after_creation));
|
if (numDays <= 0) {
|
||||||
|
throw new PgpGeneralException
|
||||||
|
(mContext.getString(R.string.error_expiry_must_come_after_creation));
|
||||||
|
}
|
||||||
hashedPacketsGen.setKeyExpirationTime(false, numDays * 86400);
|
hashedPacketsGen.setKeyExpirationTime(false, numDays * 86400);
|
||||||
} else {
|
} else {
|
||||||
hashedPacketsGen.setKeyExpirationTime(false, 0); //do this explicitly, although since we're rebuilding,
|
//do this explicitly, although since we're rebuilding,
|
||||||
//this happens anyway
|
hashedPacketsGen.setKeyExpirationTime(false, 0);
|
||||||
|
//this happens anyway
|
||||||
}
|
}
|
||||||
|
|
||||||
keyGen.addSubKey(subKeyPair, hashedPacketsGen.generate(), unhashedPacketsGen.generate());
|
keyGen.addSubKey(subKeyPair, hashedPacketsGen.generate(), unhashedPacketsGen.generate());
|
||||||
|
|||||||
@@ -18,28 +18,11 @@
|
|||||||
package org.sufficientlysecure.keychain.pgp;
|
package org.sufficientlysecure.keychain.pgp;
|
||||||
|
|
||||||
import android.content.Context;
|
import android.content.Context;
|
||||||
|
|
||||||
import org.spongycastle.bcpg.ArmoredOutputStream;
|
import org.spongycastle.bcpg.ArmoredOutputStream;
|
||||||
import org.spongycastle.bcpg.BCPGOutputStream;
|
import org.spongycastle.bcpg.BCPGOutputStream;
|
||||||
import org.spongycastle.openpgp.PGPCompressedDataGenerator;
|
import org.spongycastle.openpgp.*;
|
||||||
import org.spongycastle.openpgp.PGPEncryptedDataGenerator;
|
|
||||||
import org.spongycastle.openpgp.PGPException;
|
|
||||||
import org.spongycastle.openpgp.PGPLiteralData;
|
|
||||||
import org.spongycastle.openpgp.PGPLiteralDataGenerator;
|
|
||||||
import org.spongycastle.openpgp.PGPPrivateKey;
|
|
||||||
import org.spongycastle.openpgp.PGPPublicKey;
|
|
||||||
import org.spongycastle.openpgp.PGPSecretKey;
|
|
||||||
import org.spongycastle.openpgp.PGPSecretKeyRing;
|
|
||||||
import org.spongycastle.openpgp.PGPSignature;
|
|
||||||
import org.spongycastle.openpgp.PGPSignatureGenerator;
|
|
||||||
import org.spongycastle.openpgp.PGPSignatureSubpacketGenerator;
|
|
||||||
import org.spongycastle.openpgp.PGPV3SignatureGenerator;
|
|
||||||
import org.spongycastle.openpgp.operator.PBESecretKeyDecryptor;
|
import org.spongycastle.openpgp.operator.PBESecretKeyDecryptor;
|
||||||
import org.spongycastle.openpgp.operator.jcajce.JcaPGPContentSignerBuilder;
|
import org.spongycastle.openpgp.operator.jcajce.*;
|
||||||
import org.spongycastle.openpgp.operator.jcajce.JcePBEKeyEncryptionMethodGenerator;
|
|
||||||
import org.spongycastle.openpgp.operator.jcajce.JcePBESecretKeyDecryptorBuilder;
|
|
||||||
import org.spongycastle.openpgp.operator.jcajce.JcePGPDataEncryptorBuilder;
|
|
||||||
import org.spongycastle.openpgp.operator.jcajce.JcePublicKeyKeyEncryptionMethodGenerator;
|
|
||||||
import org.sufficientlysecure.keychain.Constants;
|
import org.sufficientlysecure.keychain.Constants;
|
||||||
import org.sufficientlysecure.keychain.Id;
|
import org.sufficientlysecure.keychain.Id;
|
||||||
import org.sufficientlysecure.keychain.R;
|
import org.sufficientlysecure.keychain.R;
|
||||||
@@ -49,11 +32,7 @@ import org.sufficientlysecure.keychain.util.InputData;
|
|||||||
import org.sufficientlysecure.keychain.util.Log;
|
import org.sufficientlysecure.keychain.util.Log;
|
||||||
import org.sufficientlysecure.keychain.util.ProgressDialogUpdater;
|
import org.sufficientlysecure.keychain.util.ProgressDialogUpdater;
|
||||||
|
|
||||||
import java.io.BufferedReader;
|
import java.io.*;
|
||||||
import java.io.IOException;
|
|
||||||
import java.io.InputStream;
|
|
||||||
import java.io.InputStreamReader;
|
|
||||||
import java.io.OutputStream;
|
|
||||||
import java.security.NoSuchAlgorithmException;
|
import java.security.NoSuchAlgorithmException;
|
||||||
import java.security.NoSuchProviderException;
|
import java.security.NoSuchProviderException;
|
||||||
import java.security.SignatureException;
|
import java.security.SignatureException;
|
||||||
@@ -63,110 +42,110 @@ import java.util.Date;
|
|||||||
* This class uses a Builder pattern!
|
* This class uses a Builder pattern!
|
||||||
*/
|
*/
|
||||||
public class PgpSignEncrypt {
|
public class PgpSignEncrypt {
|
||||||
private Context context;
|
private Context mContext;
|
||||||
private InputData data;
|
private InputData mData;
|
||||||
private OutputStream outStream;
|
private OutputStream mOutStream;
|
||||||
|
|
||||||
private ProgressDialogUpdater progress;
|
private ProgressDialogUpdater mProgress;
|
||||||
private boolean enableAsciiArmorOutput;
|
private boolean mEnableAsciiArmorOutput;
|
||||||
private int compressionId;
|
private int mCompressionId;
|
||||||
private long[] encryptionKeyIds;
|
private long[] mEncryptionKeyIds;
|
||||||
private String encryptionPassphrase;
|
private String mEncryptionPassphrase;
|
||||||
private int symmetricEncryptionAlgorithm;
|
private int mSymmetricEncryptionAlgorithm;
|
||||||
private long signatureKeyId;
|
private long mSignatureKeyId;
|
||||||
private int signatureHashAlgorithm;
|
private int mSignatureHashAlgorithm;
|
||||||
private boolean signatureForceV3;
|
private boolean mSignatureForceV3;
|
||||||
private String signaturePassphrase;
|
private String mSignaturePassphrase;
|
||||||
|
|
||||||
private PgpSignEncrypt(Builder builder) {
|
private PgpSignEncrypt(Builder builder) {
|
||||||
// private Constructor can only be called from Builder
|
// private Constructor can only be called from Builder
|
||||||
this.context = builder.context;
|
this.mContext = builder.mContext;
|
||||||
this.data = builder.data;
|
this.mData = builder.mData;
|
||||||
this.outStream = builder.outStream;
|
this.mOutStream = builder.mOutStream;
|
||||||
|
|
||||||
this.progress = builder.progress;
|
this.mProgress = builder.mProgress;
|
||||||
this.enableAsciiArmorOutput = builder.enableAsciiArmorOutput;
|
this.mEnableAsciiArmorOutput = builder.mEnableAsciiArmorOutput;
|
||||||
this.compressionId = builder.compressionId;
|
this.mCompressionId = builder.mCompressionId;
|
||||||
this.encryptionKeyIds = builder.encryptionKeyIds;
|
this.mEncryptionKeyIds = builder.mEncryptionKeyIds;
|
||||||
this.encryptionPassphrase = builder.encryptionPassphrase;
|
this.mEncryptionPassphrase = builder.mEncryptionPassphrase;
|
||||||
this.symmetricEncryptionAlgorithm = builder.symmetricEncryptionAlgorithm;
|
this.mSymmetricEncryptionAlgorithm = builder.mSymmetricEncryptionAlgorithm;
|
||||||
this.signatureKeyId = builder.signatureKeyId;
|
this.mSignatureKeyId = builder.mSignatureKeyId;
|
||||||
this.signatureHashAlgorithm = builder.signatureHashAlgorithm;
|
this.mSignatureHashAlgorithm = builder.mSignatureHashAlgorithm;
|
||||||
this.signatureForceV3 = builder.signatureForceV3;
|
this.mSignatureForceV3 = builder.mSignatureForceV3;
|
||||||
this.signaturePassphrase = builder.signaturePassphrase;
|
this.mSignaturePassphrase = builder.mSignaturePassphrase;
|
||||||
}
|
}
|
||||||
|
|
||||||
public static class Builder {
|
public static class Builder {
|
||||||
// mandatory parameter
|
// mandatory parameter
|
||||||
private Context context;
|
private Context mContext;
|
||||||
private InputData data;
|
private InputData mData;
|
||||||
private OutputStream outStream;
|
private OutputStream mOutStream;
|
||||||
|
|
||||||
// optional
|
// optional
|
||||||
private ProgressDialogUpdater progress = null;
|
private ProgressDialogUpdater mProgress = null;
|
||||||
private boolean enableAsciiArmorOutput = false;
|
private boolean mEnableAsciiArmorOutput = false;
|
||||||
private int compressionId = Id.choice.compression.none;
|
private int mCompressionId = Id.choice.compression.none;
|
||||||
private long[] encryptionKeyIds = new long[0];
|
private long[] mEncryptionKeyIds = new long[0];
|
||||||
private String encryptionPassphrase = null;
|
private String mEncryptionPassphrase = null;
|
||||||
private int symmetricEncryptionAlgorithm = 0;
|
private int mSymmetricEncryptionAlgorithm = 0;
|
||||||
private long signatureKeyId = Id.key.none;
|
private long mSignatureKeyId = Id.key.none;
|
||||||
private int signatureHashAlgorithm = 0;
|
private int mSignatureHashAlgorithm = 0;
|
||||||
private boolean signatureForceV3 = false;
|
private boolean mSignatureForceV3 = false;
|
||||||
private String signaturePassphrase = null;
|
private String mSignaturePassphrase = null;
|
||||||
|
|
||||||
public Builder(Context context, InputData data, OutputStream outStream) {
|
public Builder(Context context, InputData data, OutputStream outStream) {
|
||||||
this.context = context;
|
this.mContext = context;
|
||||||
this.data = data;
|
this.mData = data;
|
||||||
this.outStream = outStream;
|
this.mOutStream = outStream;
|
||||||
}
|
}
|
||||||
|
|
||||||
public Builder progress(ProgressDialogUpdater progress) {
|
public Builder progress(ProgressDialogUpdater progress) {
|
||||||
this.progress = progress;
|
this.mProgress = progress;
|
||||||
return this;
|
return this;
|
||||||
}
|
}
|
||||||
|
|
||||||
public Builder enableAsciiArmorOutput(boolean enableAsciiArmorOutput) {
|
public Builder enableAsciiArmorOutput(boolean enableAsciiArmorOutput) {
|
||||||
this.enableAsciiArmorOutput = enableAsciiArmorOutput;
|
this.mEnableAsciiArmorOutput = enableAsciiArmorOutput;
|
||||||
return this;
|
return this;
|
||||||
}
|
}
|
||||||
|
|
||||||
public Builder compressionId(int compressionId) {
|
public Builder compressionId(int compressionId) {
|
||||||
this.compressionId = compressionId;
|
this.mCompressionId = compressionId;
|
||||||
return this;
|
return this;
|
||||||
}
|
}
|
||||||
|
|
||||||
public Builder encryptionKeyIds(long[] encryptionKeyIds) {
|
public Builder encryptionKeyIds(long[] encryptionKeyIds) {
|
||||||
this.encryptionKeyIds = encryptionKeyIds;
|
this.mEncryptionKeyIds = encryptionKeyIds;
|
||||||
return this;
|
return this;
|
||||||
}
|
}
|
||||||
|
|
||||||
public Builder encryptionPassphrase(String encryptionPassphrase) {
|
public Builder encryptionPassphrase(String encryptionPassphrase) {
|
||||||
this.encryptionPassphrase = encryptionPassphrase;
|
this.mEncryptionPassphrase = encryptionPassphrase;
|
||||||
return this;
|
return this;
|
||||||
}
|
}
|
||||||
|
|
||||||
public Builder symmetricEncryptionAlgorithm(int symmetricEncryptionAlgorithm) {
|
public Builder symmetricEncryptionAlgorithm(int symmetricEncryptionAlgorithm) {
|
||||||
this.symmetricEncryptionAlgorithm = symmetricEncryptionAlgorithm;
|
this.mSymmetricEncryptionAlgorithm = symmetricEncryptionAlgorithm;
|
||||||
return this;
|
return this;
|
||||||
}
|
}
|
||||||
|
|
||||||
public Builder signatureKeyId(long signatureKeyId) {
|
public Builder signatureKeyId(long signatureKeyId) {
|
||||||
this.signatureKeyId = signatureKeyId;
|
this.mSignatureKeyId = signatureKeyId;
|
||||||
return this;
|
return this;
|
||||||
}
|
}
|
||||||
|
|
||||||
public Builder signatureHashAlgorithm(int signatureHashAlgorithm) {
|
public Builder signatureHashAlgorithm(int signatureHashAlgorithm) {
|
||||||
this.signatureHashAlgorithm = signatureHashAlgorithm;
|
this.mSignatureHashAlgorithm = signatureHashAlgorithm;
|
||||||
return this;
|
return this;
|
||||||
}
|
}
|
||||||
|
|
||||||
public Builder signatureForceV3(boolean signatureForceV3) {
|
public Builder signatureForceV3(boolean signatureForceV3) {
|
||||||
this.signatureForceV3 = signatureForceV3;
|
this.mSignatureForceV3 = signatureForceV3;
|
||||||
return this;
|
return this;
|
||||||
}
|
}
|
||||||
|
|
||||||
public Builder signaturePassphrase(String signaturePassphrase) {
|
public Builder signaturePassphrase(String signaturePassphrase) {
|
||||||
this.signaturePassphrase = signaturePassphrase;
|
this.mSignaturePassphrase = signaturePassphrase;
|
||||||
return this;
|
return this;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -176,14 +155,14 @@ public class PgpSignEncrypt {
|
|||||||
}
|
}
|
||||||
|
|
||||||
public void updateProgress(int message, int current, int total) {
|
public void updateProgress(int message, int current, int total) {
|
||||||
if (progress != null) {
|
if (mProgress != null) {
|
||||||
progress.setProgress(message, current, total);
|
mProgress.setProgress(message, current, total);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
public void updateProgress(int current, int total) {
|
public void updateProgress(int current, int total) {
|
||||||
if (progress != null) {
|
if (mProgress != null) {
|
||||||
progress.setProgress(current, total);
|
mProgress.setProgress(current, total);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -201,17 +180,17 @@ public class PgpSignEncrypt {
|
|||||||
throws IOException, PgpGeneralException, PGPException, NoSuchProviderException,
|
throws IOException, PgpGeneralException, PGPException, NoSuchProviderException,
|
||||||
NoSuchAlgorithmException, SignatureException {
|
NoSuchAlgorithmException, SignatureException {
|
||||||
|
|
||||||
boolean enableSignature = signatureKeyId != Id.key.none;
|
boolean enableSignature = mSignatureKeyId != Id.key.none;
|
||||||
boolean enableEncryption = (encryptionKeyIds.length != 0 || encryptionPassphrase != null);
|
boolean enableEncryption = (mEncryptionKeyIds.length != 0 || mEncryptionPassphrase != null);
|
||||||
boolean enableCompression = (enableEncryption && compressionId != Id.choice.compression.none);
|
boolean enableCompression = (enableEncryption && mCompressionId != Id.choice.compression.none);
|
||||||
|
|
||||||
Log.d(Constants.TAG, "enableSignature:" + enableSignature
|
Log.d(Constants.TAG, "enableSignature:" + enableSignature
|
||||||
+ "\nenableEncryption:" + enableEncryption
|
+ "\nenableEncryption:" + enableEncryption
|
||||||
+ "\nenableCompression:" + enableCompression
|
+ "\nenableCompression:" + enableCompression
|
||||||
+ "\nenableAsciiArmorOutput:" + enableAsciiArmorOutput);
|
+ "\nenableAsciiArmorOutput:" + mEnableAsciiArmorOutput);
|
||||||
|
|
||||||
int signatureType;
|
int signatureType;
|
||||||
if (enableAsciiArmorOutput && enableSignature && !enableEncryption && !enableCompression) {
|
if (mEnableAsciiArmorOutput && enableSignature && !enableEncryption && !enableCompression) {
|
||||||
// for sign-only ascii text
|
// for sign-only ascii text
|
||||||
signatureType = PGPSignature.CANONICAL_TEXT_DOCUMENT;
|
signatureType = PGPSignature.CANONICAL_TEXT_DOCUMENT;
|
||||||
} else {
|
} else {
|
||||||
@@ -220,12 +199,12 @@ public class PgpSignEncrypt {
|
|||||||
|
|
||||||
ArmoredOutputStream armorOut = null;
|
ArmoredOutputStream armorOut = null;
|
||||||
OutputStream out;
|
OutputStream out;
|
||||||
if (enableAsciiArmorOutput) {
|
if (mEnableAsciiArmorOutput) {
|
||||||
armorOut = new ArmoredOutputStream(outStream);
|
armorOut = new ArmoredOutputStream(mOutStream);
|
||||||
armorOut.setHeader("Version", PgpHelper.getFullVersion(context));
|
armorOut.setHeader("Version", PgpHelper.getFullVersion(mContext));
|
||||||
out = armorOut;
|
out = armorOut;
|
||||||
} else {
|
} else {
|
||||||
out = outStream;
|
out = mOutStream;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* Get keys for signature generation for later usage */
|
/* Get keys for signature generation for later usage */
|
||||||
@@ -233,25 +212,25 @@ public class PgpSignEncrypt {
|
|||||||
PGPSecretKeyRing signingKeyRing = null;
|
PGPSecretKeyRing signingKeyRing = null;
|
||||||
PGPPrivateKey signaturePrivateKey = null;
|
PGPPrivateKey signaturePrivateKey = null;
|
||||||
if (enableSignature) {
|
if (enableSignature) {
|
||||||
signingKeyRing = ProviderHelper.getPGPSecretKeyRingByKeyId(context, signatureKeyId);
|
signingKeyRing = ProviderHelper.getPGPSecretKeyRingByKeyId(mContext, mSignatureKeyId);
|
||||||
signingKey = PgpKeyHelper.getSigningKey(context, signatureKeyId);
|
signingKey = PgpKeyHelper.getSigningKey(mContext, mSignatureKeyId);
|
||||||
if (signingKey == null) {
|
if (signingKey == null) {
|
||||||
throw new PgpGeneralException(context.getString(R.string.error_signature_failed));
|
throw new PgpGeneralException(mContext.getString(R.string.error_signature_failed));
|
||||||
}
|
}
|
||||||
|
|
||||||
if (signaturePassphrase == null) {
|
if (mSignaturePassphrase == null) {
|
||||||
throw new PgpGeneralException(
|
throw new PgpGeneralException(
|
||||||
context.getString(R.string.error_no_signature_passphrase));
|
mContext.getString(R.string.error_no_signature_passphrase));
|
||||||
}
|
}
|
||||||
|
|
||||||
updateProgress(R.string.progress_extracting_signature_key, 0, 100);
|
updateProgress(R.string.progress_extracting_signature_key, 0, 100);
|
||||||
|
|
||||||
PBESecretKeyDecryptor keyDecryptor = new JcePBESecretKeyDecryptorBuilder().setProvider(
|
PBESecretKeyDecryptor keyDecryptor = new JcePBESecretKeyDecryptorBuilder().setProvider(
|
||||||
Constants.BOUNCY_CASTLE_PROVIDER_NAME).build(signaturePassphrase.toCharArray());
|
Constants.BOUNCY_CASTLE_PROVIDER_NAME).build(mSignaturePassphrase.toCharArray());
|
||||||
signaturePrivateKey = signingKey.extractPrivateKey(keyDecryptor);
|
signaturePrivateKey = signingKey.extractPrivateKey(keyDecryptor);
|
||||||
if (signaturePrivateKey == null) {
|
if (signaturePrivateKey == null) {
|
||||||
throw new PgpGeneralException(
|
throw new PgpGeneralException(
|
||||||
context.getString(R.string.error_could_not_extract_private_key));
|
mContext.getString(R.string.error_could_not_extract_private_key));
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
updateProgress(R.string.progress_preparing_streams, 5, 100);
|
updateProgress(R.string.progress_preparing_streams, 5, 100);
|
||||||
@@ -261,23 +240,23 @@ public class PgpSignEncrypt {
|
|||||||
if (enableEncryption) {
|
if (enableEncryption) {
|
||||||
// has Integrity packet enabled!
|
// has Integrity packet enabled!
|
||||||
JcePGPDataEncryptorBuilder encryptorBuilder =
|
JcePGPDataEncryptorBuilder encryptorBuilder =
|
||||||
new JcePGPDataEncryptorBuilder(symmetricEncryptionAlgorithm)
|
new JcePGPDataEncryptorBuilder(mSymmetricEncryptionAlgorithm)
|
||||||
.setProvider(Constants.BOUNCY_CASTLE_PROVIDER_NAME)
|
.setProvider(Constants.BOUNCY_CASTLE_PROVIDER_NAME)
|
||||||
.setWithIntegrityPacket(true);
|
.setWithIntegrityPacket(true);
|
||||||
|
|
||||||
cPk = new PGPEncryptedDataGenerator(encryptorBuilder);
|
cPk = new PGPEncryptedDataGenerator(encryptorBuilder);
|
||||||
|
|
||||||
if (encryptionKeyIds.length == 0) {
|
if (mEncryptionKeyIds.length == 0) {
|
||||||
// Symmetric encryption
|
// Symmetric encryption
|
||||||
Log.d(Constants.TAG, "encryptionKeyIds length is 0 -> symmetric encryption");
|
Log.d(Constants.TAG, "encryptionKeyIds length is 0 -> symmetric encryption");
|
||||||
|
|
||||||
JcePBEKeyEncryptionMethodGenerator symmetricEncryptionGenerator =
|
JcePBEKeyEncryptionMethodGenerator symmetricEncryptionGenerator =
|
||||||
new JcePBEKeyEncryptionMethodGenerator(encryptionPassphrase.toCharArray());
|
new JcePBEKeyEncryptionMethodGenerator(mEncryptionPassphrase.toCharArray());
|
||||||
cPk.addMethod(symmetricEncryptionGenerator);
|
cPk.addMethod(symmetricEncryptionGenerator);
|
||||||
} else {
|
} else {
|
||||||
// Asymmetric encryption
|
// Asymmetric encryption
|
||||||
for (long id : encryptionKeyIds) {
|
for (long id : mEncryptionKeyIds) {
|
||||||
PGPPublicKey key = PgpKeyHelper.getEncryptPublicKey(context, id);
|
PGPPublicKey key = PgpKeyHelper.getEncryptPublicKey(mContext, id);
|
||||||
if (key != null) {
|
if (key != null) {
|
||||||
JcePublicKeyKeyEncryptionMethodGenerator pubKeyEncryptionGenerator =
|
JcePublicKeyKeyEncryptionMethodGenerator pubKeyEncryptionGenerator =
|
||||||
new JcePublicKeyKeyEncryptionMethodGenerator(key);
|
new JcePublicKeyKeyEncryptionMethodGenerator(key);
|
||||||
@@ -295,10 +274,10 @@ public class PgpSignEncrypt {
|
|||||||
|
|
||||||
// content signer based on signing key algorithm and chosen hash algorithm
|
// content signer based on signing key algorithm and chosen hash algorithm
|
||||||
JcaPGPContentSignerBuilder contentSignerBuilder = new JcaPGPContentSignerBuilder(
|
JcaPGPContentSignerBuilder contentSignerBuilder = new JcaPGPContentSignerBuilder(
|
||||||
signingKey.getPublicKey().getAlgorithm(), signatureHashAlgorithm)
|
signingKey.getPublicKey().getAlgorithm(), mSignatureHashAlgorithm)
|
||||||
.setProvider(Constants.BOUNCY_CASTLE_PROVIDER_NAME);
|
.setProvider(Constants.BOUNCY_CASTLE_PROVIDER_NAME);
|
||||||
|
|
||||||
if (signatureForceV3) {
|
if (mSignatureForceV3) {
|
||||||
signatureV3Generator = new PGPV3SignatureGenerator(contentSignerBuilder);
|
signatureV3Generator = new PGPV3SignatureGenerator(contentSignerBuilder);
|
||||||
signatureV3Generator.init(signatureType, signaturePrivateKey);
|
signatureV3Generator.init(signatureType, signaturePrivateKey);
|
||||||
} else {
|
} else {
|
||||||
@@ -322,14 +301,14 @@ public class PgpSignEncrypt {
|
|||||||
encryptionOut = cPk.open(out, new byte[1 << 16]);
|
encryptionOut = cPk.open(out, new byte[1 << 16]);
|
||||||
|
|
||||||
if (enableCompression) {
|
if (enableCompression) {
|
||||||
compressGen = new PGPCompressedDataGenerator(compressionId);
|
compressGen = new PGPCompressedDataGenerator(mCompressionId);
|
||||||
bcpgOut = new BCPGOutputStream(compressGen.open(encryptionOut));
|
bcpgOut = new BCPGOutputStream(compressGen.open(encryptionOut));
|
||||||
} else {
|
} else {
|
||||||
bcpgOut = new BCPGOutputStream(encryptionOut);
|
bcpgOut = new BCPGOutputStream(encryptionOut);
|
||||||
}
|
}
|
||||||
|
|
||||||
if (enableSignature) {
|
if (enableSignature) {
|
||||||
if (signatureForceV3) {
|
if (mSignatureForceV3) {
|
||||||
signatureV3Generator.generateOnePassVersion(false).encode(bcpgOut);
|
signatureV3Generator.generateOnePassVersion(false).encode(bcpgOut);
|
||||||
} else {
|
} else {
|
||||||
signatureGenerator.generateOnePassVersion(false).encode(bcpgOut);
|
signatureGenerator.generateOnePassVersion(false).encode(bcpgOut);
|
||||||
@@ -345,13 +324,13 @@ public class PgpSignEncrypt {
|
|||||||
long progress = 0;
|
long progress = 0;
|
||||||
int n;
|
int n;
|
||||||
byte[] buffer = new byte[1 << 16];
|
byte[] buffer = new byte[1 << 16];
|
||||||
InputStream in = data.getInputStream();
|
InputStream in = mData.getInputStream();
|
||||||
while ((n = in.read(buffer)) > 0) {
|
while ((n = in.read(buffer)) > 0) {
|
||||||
pOut.write(buffer, 0, n);
|
pOut.write(buffer, 0, n);
|
||||||
|
|
||||||
// update signature buffer if signature is requested
|
// update signature buffer if signature is requested
|
||||||
if (enableSignature) {
|
if (enableSignature) {
|
||||||
if (signatureForceV3) {
|
if (mSignatureForceV3) {
|
||||||
signatureV3Generator.update(buffer, 0, n);
|
signatureV3Generator.update(buffer, 0, n);
|
||||||
} else {
|
} else {
|
||||||
signatureGenerator.update(buffer, 0, n);
|
signatureGenerator.update(buffer, 0, n);
|
||||||
@@ -359,26 +338,26 @@ public class PgpSignEncrypt {
|
|||||||
}
|
}
|
||||||
|
|
||||||
progress += n;
|
progress += n;
|
||||||
if (data.getSize() != 0) {
|
if (mData.getSize() != 0) {
|
||||||
updateProgress((int) (20 + (95 - 20) * progress / data.getSize()), 100);
|
updateProgress((int) (20 + (95 - 20) * progress / mData.getSize()), 100);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
literalGen.close();
|
literalGen.close();
|
||||||
} else if (enableAsciiArmorOutput && enableSignature && !enableEncryption && !enableCompression) {
|
} else if (mEnableAsciiArmorOutput && enableSignature && !enableEncryption && !enableCompression) {
|
||||||
/* sign-only of ascii text */
|
/* sign-only of ascii text */
|
||||||
|
|
||||||
updateProgress(R.string.progress_signing, 40, 100);
|
updateProgress(R.string.progress_signing, 40, 100);
|
||||||
|
|
||||||
// write directly on armor output stream
|
// write directly on armor output stream
|
||||||
armorOut.beginClearText(signatureHashAlgorithm);
|
armorOut.beginClearText(mSignatureHashAlgorithm);
|
||||||
|
|
||||||
InputStream in = data.getInputStream();
|
InputStream in = mData.getInputStream();
|
||||||
final BufferedReader reader = new BufferedReader(new InputStreamReader(in));
|
final BufferedReader reader = new BufferedReader(new InputStreamReader(in));
|
||||||
|
|
||||||
final byte[] newline = "\r\n".getBytes("UTF-8");
|
final byte[] newline = "\r\n".getBytes("UTF-8");
|
||||||
|
|
||||||
if (signatureForceV3) {
|
if (mSignatureForceV3) {
|
||||||
processLine(reader.readLine(), armorOut, signatureV3Generator);
|
processLine(reader.readLine(), armorOut, signatureV3Generator);
|
||||||
} else {
|
} else {
|
||||||
processLine(reader.readLine(), armorOut, signatureGenerator);
|
processLine(reader.readLine(), armorOut, signatureGenerator);
|
||||||
@@ -395,7 +374,7 @@ public class PgpSignEncrypt {
|
|||||||
armorOut.write(newline);
|
armorOut.write(newline);
|
||||||
|
|
||||||
// update signature buffer with input line
|
// update signature buffer with input line
|
||||||
if (signatureForceV3) {
|
if (mSignatureForceV3) {
|
||||||
signatureV3Generator.update(newline);
|
signatureV3Generator.update(newline);
|
||||||
processLine(line, armorOut, signatureV3Generator);
|
processLine(line, armorOut, signatureV3Generator);
|
||||||
} else {
|
} else {
|
||||||
@@ -415,7 +394,7 @@ public class PgpSignEncrypt {
|
|||||||
|
|
||||||
if (enableSignature) {
|
if (enableSignature) {
|
||||||
updateProgress(R.string.progress_generating_signature, 95, 100);
|
updateProgress(R.string.progress_generating_signature, 95, 100);
|
||||||
if (signatureForceV3) {
|
if (mSignatureForceV3) {
|
||||||
signatureV3Generator.generate().encode(pOut);
|
signatureV3Generator.generate().encode(pOut);
|
||||||
} else {
|
} else {
|
||||||
signatureGenerator.generate().encode(pOut);
|
signatureGenerator.generate().encode(pOut);
|
||||||
@@ -432,12 +411,12 @@ public class PgpSignEncrypt {
|
|||||||
|
|
||||||
encryptionOut.close();
|
encryptionOut.close();
|
||||||
}
|
}
|
||||||
if (enableAsciiArmorOutput) {
|
if (mEnableAsciiArmorOutput) {
|
||||||
armorOut.close();
|
armorOut.close();
|
||||||
}
|
}
|
||||||
|
|
||||||
out.close();
|
out.close();
|
||||||
outStream.close();
|
mOutStream.close();
|
||||||
|
|
||||||
updateProgress(R.string.progress_done, 100, 100);
|
updateProgress(R.string.progress_done, 100, 100);
|
||||||
}
|
}
|
||||||
@@ -449,35 +428,36 @@ public class PgpSignEncrypt {
|
|||||||
SignatureException {
|
SignatureException {
|
||||||
|
|
||||||
OutputStream out;
|
OutputStream out;
|
||||||
if (enableAsciiArmorOutput) {
|
if (mEnableAsciiArmorOutput) {
|
||||||
// Ascii Armor (Radix-64)
|
// Ascii Armor (Radix-64)
|
||||||
ArmoredOutputStream armorOut = new ArmoredOutputStream(outStream);
|
ArmoredOutputStream armorOut = new ArmoredOutputStream(mOutStream);
|
||||||
armorOut.setHeader("Version", PgpHelper.getFullVersion(context));
|
armorOut.setHeader("Version", PgpHelper.getFullVersion(mContext));
|
||||||
out = armorOut;
|
out = armorOut;
|
||||||
} else {
|
} else {
|
||||||
out = outStream;
|
out = mOutStream;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (signatureKeyId == 0) {
|
if (mSignatureKeyId == 0) {
|
||||||
throw new PgpGeneralException(context.getString(R.string.error_no_signature_key));
|
throw new PgpGeneralException(mContext.getString(R.string.error_no_signature_key));
|
||||||
}
|
}
|
||||||
|
|
||||||
PGPSecretKeyRing signingKeyRing = ProviderHelper.getPGPSecretKeyRingByKeyId(context, signatureKeyId);
|
PGPSecretKeyRing signingKeyRing =
|
||||||
PGPSecretKey signingKey = PgpKeyHelper.getSigningKey(context, signatureKeyId);
|
ProviderHelper.getPGPSecretKeyRingByKeyId(mContext, mSignatureKeyId);
|
||||||
|
PGPSecretKey signingKey = PgpKeyHelper.getSigningKey(mContext, mSignatureKeyId);
|
||||||
if (signingKey == null) {
|
if (signingKey == null) {
|
||||||
throw new PgpGeneralException(context.getString(R.string.error_signature_failed));
|
throw new PgpGeneralException(mContext.getString(R.string.error_signature_failed));
|
||||||
}
|
}
|
||||||
|
|
||||||
if (signaturePassphrase == null) {
|
if (mSignaturePassphrase == null) {
|
||||||
throw new PgpGeneralException(context.getString(R.string.error_no_signature_passphrase));
|
throw new PgpGeneralException(mContext.getString(R.string.error_no_signature_passphrase));
|
||||||
}
|
}
|
||||||
|
|
||||||
PBESecretKeyDecryptor keyDecryptor = new JcePBESecretKeyDecryptorBuilder().setProvider(
|
PBESecretKeyDecryptor keyDecryptor = new JcePBESecretKeyDecryptorBuilder().setProvider(
|
||||||
Constants.BOUNCY_CASTLE_PROVIDER_NAME).build(signaturePassphrase.toCharArray());
|
Constants.BOUNCY_CASTLE_PROVIDER_NAME).build(mSignaturePassphrase.toCharArray());
|
||||||
PGPPrivateKey signaturePrivateKey = signingKey.extractPrivateKey(keyDecryptor);
|
PGPPrivateKey signaturePrivateKey = signingKey.extractPrivateKey(keyDecryptor);
|
||||||
if (signaturePrivateKey == null) {
|
if (signaturePrivateKey == null) {
|
||||||
throw new PgpGeneralException(
|
throw new PgpGeneralException(
|
||||||
context.getString(R.string.error_could_not_extract_private_key));
|
mContext.getString(R.string.error_could_not_extract_private_key));
|
||||||
}
|
}
|
||||||
updateProgress(R.string.progress_preparing_streams, 0, 100);
|
updateProgress(R.string.progress_preparing_streams, 0, 100);
|
||||||
|
|
||||||
@@ -490,12 +470,12 @@ public class PgpSignEncrypt {
|
|||||||
|
|
||||||
// content signer based on signing key algorithm and chosen hash algorithm
|
// content signer based on signing key algorithm and chosen hash algorithm
|
||||||
JcaPGPContentSignerBuilder contentSignerBuilder = new JcaPGPContentSignerBuilder(signingKey
|
JcaPGPContentSignerBuilder contentSignerBuilder = new JcaPGPContentSignerBuilder(signingKey
|
||||||
.getPublicKey().getAlgorithm(), signatureHashAlgorithm)
|
.getPublicKey().getAlgorithm(), mSignatureHashAlgorithm)
|
||||||
.setProvider(Constants.BOUNCY_CASTLE_PROVIDER_NAME);
|
.setProvider(Constants.BOUNCY_CASTLE_PROVIDER_NAME);
|
||||||
|
|
||||||
PGPSignatureGenerator signatureGenerator = null;
|
PGPSignatureGenerator signatureGenerator = null;
|
||||||
PGPV3SignatureGenerator signatureV3Generator = null;
|
PGPV3SignatureGenerator signatureV3Generator = null;
|
||||||
if (signatureForceV3) {
|
if (mSignatureForceV3) {
|
||||||
signatureV3Generator = new PGPV3SignatureGenerator(contentSignerBuilder);
|
signatureV3Generator = new PGPV3SignatureGenerator(contentSignerBuilder);
|
||||||
signatureV3Generator.init(type, signaturePrivateKey);
|
signatureV3Generator.init(type, signaturePrivateKey);
|
||||||
} else {
|
} else {
|
||||||
@@ -510,7 +490,7 @@ public class PgpSignEncrypt {
|
|||||||
|
|
||||||
updateProgress(R.string.progress_signing, 40, 100);
|
updateProgress(R.string.progress_signing, 40, 100);
|
||||||
|
|
||||||
InputStream inStream = data.getInputStream();
|
InputStream inStream = mData.getInputStream();
|
||||||
// if (binary) {
|
// if (binary) {
|
||||||
// byte[] buffer = new byte[1 << 16];
|
// byte[] buffer = new byte[1 << 16];
|
||||||
// int n = 0;
|
// int n = 0;
|
||||||
@@ -527,7 +507,7 @@ public class PgpSignEncrypt {
|
|||||||
|
|
||||||
String line;
|
String line;
|
||||||
while ((line = reader.readLine()) != null) {
|
while ((line = reader.readLine()) != null) {
|
||||||
if (signatureForceV3) {
|
if (mSignatureForceV3) {
|
||||||
processLine(line, null, signatureV3Generator);
|
processLine(line, null, signatureV3Generator);
|
||||||
signatureV3Generator.update(newline);
|
signatureV3Generator.update(newline);
|
||||||
} else {
|
} else {
|
||||||
@@ -538,13 +518,13 @@ public class PgpSignEncrypt {
|
|||||||
// }
|
// }
|
||||||
|
|
||||||
BCPGOutputStream bOut = new BCPGOutputStream(out);
|
BCPGOutputStream bOut = new BCPGOutputStream(out);
|
||||||
if (signatureForceV3) {
|
if (mSignatureForceV3) {
|
||||||
signatureV3Generator.generate().encode(bOut);
|
signatureV3Generator.generate().encode(bOut);
|
||||||
} else {
|
} else {
|
||||||
signatureGenerator.generate().encode(bOut);
|
signatureGenerator.generate().encode(bOut);
|
||||||
}
|
}
|
||||||
out.close();
|
out.close();
|
||||||
outStream.close();
|
mOutStream.close();
|
||||||
|
|
||||||
updateProgress(R.string.progress_done, 100, 100);
|
updateProgress(R.string.progress_done, 100, 100);
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,33 +1,24 @@
|
|||||||
|
/*
|
||||||
|
* Copyright (C) 2012-2014 Dominik Schürmann <dominik@dominikschuermann.de>
|
||||||
|
* Copyright (C) 2010 Thialfihar <thi@thialfihar.org>
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
package org.sufficientlysecure.keychain.pgp;
|
package org.sufficientlysecure.keychain.pgp;
|
||||||
|
|
||||||
import java.io.IOException;
|
|
||||||
import java.math.BigInteger;
|
|
||||||
import java.security.InvalidKeyException;
|
|
||||||
import java.security.NoSuchAlgorithmException;
|
|
||||||
import java.security.NoSuchProviderException;
|
|
||||||
import java.security.PrivateKey;
|
|
||||||
import java.security.PublicKey;
|
|
||||||
import java.security.SignatureException;
|
|
||||||
import java.security.cert.CertificateException;
|
|
||||||
import java.security.cert.X509Certificate;
|
|
||||||
import java.text.DateFormat;
|
|
||||||
import java.util.Date;
|
|
||||||
import java.util.Iterator;
|
|
||||||
import java.util.Vector;
|
|
||||||
|
|
||||||
import javax.security.auth.callback.Callback;
|
|
||||||
import javax.security.auth.callback.CallbackHandler;
|
|
||||||
import javax.security.auth.callback.PasswordCallback;
|
|
||||||
import javax.security.auth.callback.UnsupportedCallbackException;
|
|
||||||
|
|
||||||
import org.spongycastle.asn1.DERObjectIdentifier;
|
import org.spongycastle.asn1.DERObjectIdentifier;
|
||||||
import org.spongycastle.asn1.x509.AuthorityKeyIdentifier;
|
import org.spongycastle.asn1.x509.*;
|
||||||
import org.spongycastle.asn1.x509.BasicConstraints;
|
|
||||||
import org.spongycastle.asn1.x509.GeneralName;
|
|
||||||
import org.spongycastle.asn1.x509.GeneralNames;
|
|
||||||
import org.spongycastle.asn1.x509.SubjectKeyIdentifier;
|
|
||||||
import org.spongycastle.asn1.x509.X509Extensions;
|
|
||||||
import org.spongycastle.asn1.x509.X509Name;
|
|
||||||
import org.spongycastle.openpgp.PGPException;
|
import org.spongycastle.openpgp.PGPException;
|
||||||
import org.spongycastle.openpgp.PGPPrivateKey;
|
import org.spongycastle.openpgp.PGPPrivateKey;
|
||||||
import org.spongycastle.openpgp.PGPPublicKey;
|
import org.spongycastle.openpgp.PGPPublicKey;
|
||||||
@@ -38,9 +29,23 @@ import org.spongycastle.x509.extension.SubjectKeyIdentifierStructure;
|
|||||||
import org.sufficientlysecure.keychain.Constants;
|
import org.sufficientlysecure.keychain.Constants;
|
||||||
import org.sufficientlysecure.keychain.util.Log;
|
import org.sufficientlysecure.keychain.util.Log;
|
||||||
|
|
||||||
|
import javax.security.auth.callback.Callback;
|
||||||
|
import javax.security.auth.callback.CallbackHandler;
|
||||||
|
import javax.security.auth.callback.PasswordCallback;
|
||||||
|
import javax.security.auth.callback.UnsupportedCallbackException;
|
||||||
|
import java.io.IOException;
|
||||||
|
import java.math.BigInteger;
|
||||||
|
import java.security.*;
|
||||||
|
import java.security.cert.CertificateException;
|
||||||
|
import java.security.cert.X509Certificate;
|
||||||
|
import java.text.DateFormat;
|
||||||
|
import java.util.Date;
|
||||||
|
import java.util.Iterator;
|
||||||
|
import java.util.Vector;
|
||||||
|
|
||||||
public class PgpToX509 {
|
public class PgpToX509 {
|
||||||
public final static String DN_COMMON_PART_O = "OpenPGP to X.509 Bridge";
|
public static final String DN_COMMON_PART_O = "OpenPGP to X.509 Bridge";
|
||||||
public final static String DN_COMMON_PART_OU = "OpenPGP Keychain cert";
|
public static final String DN_COMMON_PART_OU = "OpenPGP Keychain cert";
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Creates a self-signed certificate from a public and private key. The (critical) key-usage
|
* Creates a self-signed certificate from a public and private key. The (critical) key-usage
|
||||||
@@ -48,20 +53,14 @@ public class PgpToX509 {
|
|||||||
* and certificate-signing. The (non-critical) Netscape extension is set up with: SSL client and
|
* and certificate-signing. The (non-critical) Netscape extension is set up with: SSL client and
|
||||||
* S/MIME. A URI subjectAltName may also be set up.
|
* S/MIME. A URI subjectAltName may also be set up.
|
||||||
*
|
*
|
||||||
* @param pubKey
|
* @param pubKey public key
|
||||||
* public key
|
* @param privKey private key
|
||||||
* @param privKey
|
* @param subject subject (and issuer) DN for this certificate, RFC 2253 format preferred.
|
||||||
* private key
|
* @param startDate date from which the certificate will be valid (defaults to current date and time
|
||||||
* @param subject
|
* if null)
|
||||||
* subject (and issuer) DN for this certificate, RFC 2253 format preferred.
|
* @param endDate date until which the certificate will be valid (defaults to current date and time
|
||||||
* @param startDate
|
* if null) *
|
||||||
* date from which the certificate will be valid (defaults to current date and time
|
* @param subjAltNameURI URI to be placed in subjectAltName
|
||||||
* if null)
|
|
||||||
* @param endDate
|
|
||||||
* date until which the certificate will be valid (defaults to current date and time
|
|
||||||
* if null) *
|
|
||||||
* @param subjAltNameURI
|
|
||||||
* URI to be placed in subjectAltName
|
|
||||||
* @return self-signed certificate
|
* @return self-signed certificate
|
||||||
* @throws InvalidKeyException
|
* @throws InvalidKeyException
|
||||||
* @throws SignatureException
|
* @throws SignatureException
|
||||||
@@ -70,11 +69,10 @@ public class PgpToX509 {
|
|||||||
* @throws NoSuchProviderException
|
* @throws NoSuchProviderException
|
||||||
* @throws CertificateException
|
* @throws CertificateException
|
||||||
* @throws Exception
|
* @throws Exception
|
||||||
*
|
|
||||||
* @author Bruno Harbulot
|
* @author Bruno Harbulot
|
||||||
*/
|
*/
|
||||||
public static X509Certificate createSelfSignedCert(PublicKey pubKey, PrivateKey privKey,
|
public static X509Certificate createSelfSignedCert(PublicKey pubKey, PrivateKey privKey,
|
||||||
X509Name subject, Date startDate, Date endDate, String subjAltNameURI)
|
X509Name subject, Date startDate, Date endDate, String subjAltNameURI)
|
||||||
throws InvalidKeyException, IllegalStateException, NoSuchAlgorithmException,
|
throws InvalidKeyException, IllegalStateException, NoSuchAlgorithmException,
|
||||||
SignatureException, CertificateException, NoSuchProviderException {
|
SignatureException, CertificateException, NoSuchProviderException {
|
||||||
|
|
||||||
@@ -172,14 +170,11 @@ public class PgpToX509 {
|
|||||||
/**
|
/**
|
||||||
* Creates a self-signed certificate from a PGP Secret Key.
|
* Creates a self-signed certificate from a PGP Secret Key.
|
||||||
*
|
*
|
||||||
* @param pgpSecKey
|
* @param pgpSecKey PGP Secret Key (from which one can extract the public and private keys and other
|
||||||
* PGP Secret Key (from which one can extract the public and private keys and other
|
* attributes).
|
||||||
* attributes).
|
* @param pgpPrivKey PGP Private Key corresponding to the Secret Key (password callbacks should be done
|
||||||
* @param pgpPrivKey
|
* before calling this method)
|
||||||
* PGP Private Key corresponding to the Secret Key (password callbacks should be done
|
* @param subjAltNameURI optional URI to embed in the subject alternative-name
|
||||||
* before calling this method)
|
|
||||||
* @param subjAltNameURI
|
|
||||||
* optional URI to embed in the subject alternative-name
|
|
||||||
* @return self-signed certificate
|
* @return self-signed certificate
|
||||||
* @throws PGPException
|
* @throws PGPException
|
||||||
* @throws NoSuchProviderException
|
* @throws NoSuchProviderException
|
||||||
@@ -187,11 +182,10 @@ public class PgpToX509 {
|
|||||||
* @throws NoSuchAlgorithmException
|
* @throws NoSuchAlgorithmException
|
||||||
* @throws SignatureException
|
* @throws SignatureException
|
||||||
* @throws CertificateException
|
* @throws CertificateException
|
||||||
*
|
|
||||||
* @author Bruno Harbulot
|
* @author Bruno Harbulot
|
||||||
*/
|
*/
|
||||||
public static X509Certificate createSelfSignedCert(PGPSecretKey pgpSecKey,
|
public static X509Certificate createSelfSignedCert(PGPSecretKey pgpSecKey,
|
||||||
PGPPrivateKey pgpPrivKey, String subjAltNameURI) throws PGPException,
|
PGPPrivateKey pgpPrivKey, String subjAltNameURI) throws PGPException,
|
||||||
NoSuchProviderException, InvalidKeyException, NoSuchAlgorithmException,
|
NoSuchProviderException, InvalidKeyException, NoSuchAlgorithmException,
|
||||||
SignatureException, CertificateException {
|
SignatureException, CertificateException {
|
||||||
// get public key from secret key
|
// get public key from secret key
|
||||||
@@ -213,7 +207,7 @@ public class PgpToX509 {
|
|||||||
x509NameValues.add(DN_COMMON_PART_OU);
|
x509NameValues.add(DN_COMMON_PART_OU);
|
||||||
|
|
||||||
for (@SuppressWarnings("unchecked")
|
for (@SuppressWarnings("unchecked")
|
||||||
Iterator<Object> it = (Iterator<Object>) pgpSecKey.getUserIDs(); it.hasNext();) {
|
Iterator<Object> it = (Iterator<Object>) pgpSecKey.getUserIDs(); it.hasNext(); ) {
|
||||||
Object attrib = it.next();
|
Object attrib = it.next();
|
||||||
x509NameOids.add(X509Name.CN);
|
x509NameOids.add(X509Name.CN);
|
||||||
x509NameValues.add("CryptoCall");
|
x509NameValues.add("CryptoCall");
|
||||||
@@ -225,7 +219,7 @@ public class PgpToX509 {
|
|||||||
*/
|
*/
|
||||||
Log.d(Constants.TAG, "User attributes: ");
|
Log.d(Constants.TAG, "User attributes: ");
|
||||||
for (@SuppressWarnings("unchecked")
|
for (@SuppressWarnings("unchecked")
|
||||||
Iterator<Object> it = (Iterator<Object>) pgpSecKey.getUserAttributes(); it.hasNext();) {
|
Iterator<Object> it = (Iterator<Object>) pgpSecKey.getUserAttributes(); it.hasNext(); ) {
|
||||||
Object attrib = it.next();
|
Object attrib = it.next();
|
||||||
Log.d(Constants.TAG, " - " + attrib + " -- " + attrib.getClass());
|
Log.d(Constants.TAG, " - " + attrib + " -- " + attrib.getClass());
|
||||||
}
|
}
|
||||||
@@ -263,7 +257,6 @@ public class PgpToX509 {
|
|||||||
* allow passwords to be stored within your application.
|
* allow passwords to be stored within your application.
|
||||||
*
|
*
|
||||||
* @author Bruno Harbulot.
|
* @author Bruno Harbulot.
|
||||||
*
|
|
||||||
*/
|
*/
|
||||||
public final static class PredefinedPasswordCallbackHandler implements CallbackHandler {
|
public final static class PredefinedPasswordCallbackHandler implements CallbackHandler {
|
||||||
|
|
||||||
|
|||||||
@@ -1,3 +1,20 @@
|
|||||||
|
/*
|
||||||
|
* Copyright (C) 2012-2013 Dominik Schürmann <dominik@dominikschuermann.de>
|
||||||
|
* Copyright (C) 2010 Thialfihar <thi@thialfihar.org>
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
package org.sufficientlysecure.keychain.pgp.exception;
|
package org.sufficientlysecure.keychain.pgp.exception;
|
||||||
|
|
||||||
public class NoAsymmetricEncryptionException extends Exception {
|
public class NoAsymmetricEncryptionException extends Exception {
|
||||||
|
|||||||
@@ -1,3 +1,20 @@
|
|||||||
|
/*
|
||||||
|
* Copyright (C) 2012-2013 Dominik Schürmann <dominik@dominikschuermann.de>
|
||||||
|
* Copyright (C) 2010 Thialfihar <thi@thialfihar.org>
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
package org.sufficientlysecure.keychain.pgp.exception;
|
package org.sufficientlysecure.keychain.pgp.exception;
|
||||||
|
|
||||||
public class PgpGeneralException extends Exception {
|
public class PgpGeneralException extends Exception {
|
||||||
|
|||||||
Reference in New Issue
Block a user