Merge branch 'new-edit'
Conflicts: OpenKeychain/src/main/java/org/sufficientlysecure/keychain/service/KeychainIntentService.java OpenKeychain/src/main/java/org/sufficientlysecure/keychain/service/OperationResultParcel.java OpenKeychain/src/main/res/values/strings.xml
This commit is contained in:
File diff suppressed because it is too large
Load Diff
@@ -30,6 +30,11 @@ public class PgpGeneralMsgIdException extends Exception {
|
|||||||
mMessageId = messageId;
|
mMessageId = messageId;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
public PgpGeneralMsgIdException(int messageId, Throwable cause) {
|
||||||
|
super("msg[" + messageId + "]", cause);
|
||||||
|
mMessageId = messageId;
|
||||||
|
}
|
||||||
|
|
||||||
public PgpGeneralException getContextualized(Context context) {
|
public PgpGeneralException getContextualized(Context context) {
|
||||||
return new PgpGeneralException(context.getString(mMessageId), this);
|
return new PgpGeneralException(context.getString(mMessageId), this);
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -44,7 +44,6 @@ import org.sufficientlysecure.keychain.pgp.PgpKeyOperation;
|
|||||||
import org.sufficientlysecure.keychain.pgp.PgpSignEncrypt;
|
import org.sufficientlysecure.keychain.pgp.PgpSignEncrypt;
|
||||||
import org.sufficientlysecure.keychain.pgp.Progressable;
|
import org.sufficientlysecure.keychain.pgp.Progressable;
|
||||||
import org.sufficientlysecure.keychain.pgp.UncachedKeyRing;
|
import org.sufficientlysecure.keychain.pgp.UncachedKeyRing;
|
||||||
import org.sufficientlysecure.keychain.pgp.UncachedSecretKey;
|
|
||||||
import org.sufficientlysecure.keychain.pgp.WrappedPublicKeyRing;
|
import org.sufficientlysecure.keychain.pgp.WrappedPublicKeyRing;
|
||||||
import org.sufficientlysecure.keychain.pgp.WrappedSecretKey;
|
import org.sufficientlysecure.keychain.pgp.WrappedSecretKey;
|
||||||
import org.sufficientlysecure.keychain.pgp.WrappedSecretKeyRing;
|
import org.sufficientlysecure.keychain.pgp.WrappedSecretKeyRing;
|
||||||
@@ -53,6 +52,7 @@ import org.sufficientlysecure.keychain.pgp.exception.PgpGeneralMsgIdException;
|
|||||||
import org.sufficientlysecure.keychain.provider.KeychainContract.KeyRings;
|
import org.sufficientlysecure.keychain.provider.KeychainContract.KeyRings;
|
||||||
import org.sufficientlysecure.keychain.provider.KeychainDatabase;
|
import org.sufficientlysecure.keychain.provider.KeychainDatabase;
|
||||||
import org.sufficientlysecure.keychain.provider.ProviderHelper;
|
import org.sufficientlysecure.keychain.provider.ProviderHelper;
|
||||||
|
import org.sufficientlysecure.keychain.service.OperationResultParcel.OperationLog;
|
||||||
import org.sufficientlysecure.keychain.util.InputData;
|
import org.sufficientlysecure.keychain.util.InputData;
|
||||||
import org.sufficientlysecure.keychain.util.Log;
|
import org.sufficientlysecure.keychain.util.Log;
|
||||||
import org.sufficientlysecure.keychain.util.ProgressScaler;
|
import org.sufficientlysecure.keychain.util.ProgressScaler;
|
||||||
@@ -87,9 +87,6 @@ public class KeychainIntentService extends IntentService
|
|||||||
public static final String ACTION_DECRYPT_VERIFY = Constants.INTENT_PREFIX + "DECRYPT_VERIFY";
|
public static final String ACTION_DECRYPT_VERIFY = Constants.INTENT_PREFIX + "DECRYPT_VERIFY";
|
||||||
|
|
||||||
public static final String ACTION_SAVE_KEYRING = Constants.INTENT_PREFIX + "SAVE_KEYRING";
|
public static final String ACTION_SAVE_KEYRING = Constants.INTENT_PREFIX + "SAVE_KEYRING";
|
||||||
public static final String ACTION_GENERATE_KEY = Constants.INTENT_PREFIX + "GENERATE_KEY";
|
|
||||||
public static final String ACTION_GENERATE_DEFAULT_RSA_KEYS = Constants.INTENT_PREFIX
|
|
||||||
+ "GENERATE_DEFAULT_RSA_KEYS";
|
|
||||||
|
|
||||||
public static final String ACTION_DELETE_FILE_SECURELY = Constants.INTENT_PREFIX
|
public static final String ACTION_DELETE_FILE_SECURELY = Constants.INTENT_PREFIX
|
||||||
+ "DELETE_FILE_SECURELY";
|
+ "DELETE_FILE_SECURELY";
|
||||||
@@ -127,14 +124,7 @@ public class KeychainIntentService extends IntentService
|
|||||||
|
|
||||||
// save keyring
|
// save keyring
|
||||||
public static final String SAVE_KEYRING_PARCEL = "save_parcel";
|
public static final String SAVE_KEYRING_PARCEL = "save_parcel";
|
||||||
public static final String SAVE_KEYRING_CAN_SIGN = "can_sign";
|
public static final String SAVE_KEYRING_PASSPHRASE = "passphrase";
|
||||||
|
|
||||||
|
|
||||||
// generate key
|
|
||||||
public static final String GENERATE_KEY_ALGORITHM = "algorithm";
|
|
||||||
public static final String GENERATE_KEY_KEY_SIZE = "key_size";
|
|
||||||
public static final String GENERATE_KEY_SYMMETRIC_PASSPHRASE = "passphrase";
|
|
||||||
public static final String GENERATE_KEY_MASTER_KEY = "master_key";
|
|
||||||
|
|
||||||
// delete file securely
|
// delete file securely
|
||||||
public static final String DELETE_FILE = "deleteFile";
|
public static final String DELETE_FILE = "deleteFile";
|
||||||
@@ -164,9 +154,6 @@ public class KeychainIntentService extends IntentService
|
|||||||
/*
|
/*
|
||||||
* possible data keys as result send over messenger
|
* possible data keys as result send over messenger
|
||||||
*/
|
*/
|
||||||
// keys
|
|
||||||
public static final String RESULT_NEW_KEY = "new_key";
|
|
||||||
public static final String RESULT_KEY_USAGES = "new_key_usages";
|
|
||||||
|
|
||||||
// encrypt
|
// encrypt
|
||||||
public static final String RESULT_BYTES = "encrypted_data";
|
public static final String RESULT_BYTES = "encrypted_data";
|
||||||
@@ -490,136 +477,40 @@ public class KeychainIntentService extends IntentService
|
|||||||
} else if (ACTION_SAVE_KEYRING.equals(action)) {
|
} else if (ACTION_SAVE_KEYRING.equals(action)) {
|
||||||
try {
|
try {
|
||||||
/* Input */
|
/* Input */
|
||||||
OldSaveKeyringParcel saveParcel = data.getParcelable(SAVE_KEYRING_PARCEL);
|
SaveKeyringParcel saveParcel = data.getParcelable(SAVE_KEYRING_PARCEL);
|
||||||
String oldPassphrase = saveParcel.oldPassphrase;
|
long masterKeyId = saveParcel.mMasterKeyId;
|
||||||
String newPassphrase = saveParcel.newPassphrase;
|
|
||||||
boolean canSign = true;
|
|
||||||
|
|
||||||
if (data.containsKey(SAVE_KEYRING_CAN_SIGN)) {
|
|
||||||
canSign = data.getBoolean(SAVE_KEYRING_CAN_SIGN);
|
|
||||||
}
|
|
||||||
|
|
||||||
if (newPassphrase == null) {
|
|
||||||
newPassphrase = oldPassphrase;
|
|
||||||
}
|
|
||||||
|
|
||||||
long masterKeyId = saveParcel.keys.get(0).getKeyId();
|
|
||||||
|
|
||||||
/* Operation */
|
/* Operation */
|
||||||
ProviderHelper providerHelper = new ProviderHelper(this);
|
ProviderHelper providerHelper = new ProviderHelper(this);
|
||||||
if (!canSign) {
|
PgpKeyOperation keyOperations = new PgpKeyOperation(new ProgressScaler(this, 0, 90, 100));
|
||||||
setProgress(R.string.progress_building_key, 0, 100);
|
try {
|
||||||
WrappedSecretKeyRing keyRing = providerHelper.getWrappedSecretKeyRing(masterKeyId);
|
String passphrase = data.getString(SAVE_KEYRING_PASSPHRASE);
|
||||||
UncachedKeyRing newKeyRing =
|
WrappedSecretKeyRing secRing = providerHelper.getWrappedSecretKeyRing(masterKeyId);
|
||||||
keyRing.changeSecretKeyPassphrase(oldPassphrase, newPassphrase);
|
|
||||||
setProgress(R.string.progress_saving_key_ring, 50, 100);
|
|
||||||
// providerHelper.saveSecretKeyRing(newKeyRing);
|
|
||||||
setProgress(R.string.progress_done, 100, 100);
|
|
||||||
} else {
|
|
||||||
PgpKeyOperation keyOperations = new PgpKeyOperation(new ProgressScaler(this, 0, 90, 100));
|
|
||||||
try {
|
|
||||||
WrappedSecretKeyRing seckey = providerHelper.getWrappedSecretKeyRing(masterKeyId);
|
|
||||||
WrappedPublicKeyRing pubkey = providerHelper.getWrappedPublicKeyRing(masterKeyId);
|
|
||||||
|
|
||||||
PgpKeyOperation.Pair<UncachedKeyRing,UncachedKeyRing> pair =
|
OperationLog log = new OperationLog();
|
||||||
keyOperations.buildSecretKey(seckey, pubkey, saveParcel); // edit existing
|
UncachedKeyRing ring = keyOperations.modifySecretKeyRing(secRing, saveParcel,
|
||||||
setProgress(R.string.progress_saving_key_ring, 90, 100);
|
passphrase, log, 0);
|
||||||
providerHelper.savePairedKeyRing(pair.first, pair.second);
|
setProgress(R.string.progress_saving_key_ring, 90, 100);
|
||||||
} catch (ProviderHelper.NotFoundException e) {
|
providerHelper.saveSecretKeyRing(ring);
|
||||||
PgpKeyOperation.Pair<UncachedKeyRing,UncachedKeyRing> pair =
|
} catch (ProviderHelper.NotFoundException e) {
|
||||||
keyOperations.buildNewSecretKey(saveParcel); //new Keyring
|
// UncachedKeyRing ring = keyOperations.(saveParcel); //new Keyring
|
||||||
// save the pair
|
// save the pair
|
||||||
setProgress(R.string.progress_saving_key_ring, 90, 100);
|
setProgress(R.string.progress_saving_key_ring, 90, 100);
|
||||||
providerHelper.savePairedKeyRing(pair.first, pair.second);
|
// providerHelper.saveSecretKeyRing(ring);
|
||||||
}
|
sendErrorToHandler(e);
|
||||||
|
}
|
||||||
setProgress(R.string.progress_done, 100, 100);
|
|
||||||
|
setProgress(R.string.progress_done, 100, 100);
|
||||||
|
|
||||||
|
if (saveParcel.newPassphrase != null) {
|
||||||
|
PassphraseCacheService.addCachedPassphrase(this, masterKeyId, saveParcel.newPassphrase);
|
||||||
}
|
}
|
||||||
PassphraseCacheService.addCachedPassphrase(this, masterKeyId, newPassphrase);
|
|
||||||
|
|
||||||
/* Output */
|
/* Output */
|
||||||
sendMessageToHandler(KeychainIntentServiceHandler.MESSAGE_OKAY);
|
sendMessageToHandler(KeychainIntentServiceHandler.MESSAGE_OKAY);
|
||||||
} catch (Exception e) {
|
} catch (Exception e) {
|
||||||
sendErrorToHandler(e);
|
sendErrorToHandler(e);
|
||||||
}
|
}
|
||||||
} else if (ACTION_GENERATE_KEY.equals(action)) {
|
|
||||||
try {
|
|
||||||
/* Input */
|
|
||||||
int algorithm = data.getInt(GENERATE_KEY_ALGORITHM);
|
|
||||||
String passphrase = data.getString(GENERATE_KEY_SYMMETRIC_PASSPHRASE);
|
|
||||||
int keysize = data.getInt(GENERATE_KEY_KEY_SIZE);
|
|
||||||
boolean masterKey = data.getBoolean(GENERATE_KEY_MASTER_KEY);
|
|
||||||
|
|
||||||
/* Operation */
|
|
||||||
PgpKeyOperation keyOperations = new PgpKeyOperation(new ProgressScaler(this, 0, 100, 100));
|
|
||||||
byte[] newKey = keyOperations.createKey(algorithm, keysize, passphrase, masterKey);
|
|
||||||
|
|
||||||
/* Output */
|
|
||||||
Bundle resultData = new Bundle();
|
|
||||||
resultData.putByteArray(RESULT_NEW_KEY, newKey);
|
|
||||||
|
|
||||||
OtherHelper.logDebugBundle(resultData, "resultData");
|
|
||||||
|
|
||||||
sendMessageToHandler(KeychainIntentServiceHandler.MESSAGE_OKAY, resultData);
|
|
||||||
} catch (Exception e) {
|
|
||||||
sendErrorToHandler(e);
|
|
||||||
}
|
|
||||||
} else if (ACTION_GENERATE_DEFAULT_RSA_KEYS.equals(action)) {
|
|
||||||
// generate one RSA 4096 key for signing and one subkey for encrypting!
|
|
||||||
try {
|
|
||||||
/* Input */
|
|
||||||
String passphrase = data.getString(GENERATE_KEY_SYMMETRIC_PASSPHRASE);
|
|
||||||
ArrayList<Integer> keyUsageList = new ArrayList<Integer>();
|
|
||||||
|
|
||||||
/* Operation */
|
|
||||||
int keysTotal = 3;
|
|
||||||
int keysCreated = 0;
|
|
||||||
setProgress(
|
|
||||||
getApplicationContext().getResources().
|
|
||||||
getQuantityString(R.plurals.progress_generating, keysTotal),
|
|
||||||
keysCreated,
|
|
||||||
keysTotal);
|
|
||||||
PgpKeyOperation keyOperations = new PgpKeyOperation(new ProgressScaler(this, 0, 100, 100));
|
|
||||||
|
|
||||||
ByteArrayOutputStream os = new ByteArrayOutputStream();
|
|
||||||
|
|
||||||
byte[] buf;
|
|
||||||
|
|
||||||
buf = keyOperations.createKey(Constants.choice.algorithm.rsa,
|
|
||||||
4096, passphrase, true);
|
|
||||||
os.write(buf);
|
|
||||||
keyUsageList.add(UncachedSecretKey.CERTIFY_OTHER);
|
|
||||||
keysCreated++;
|
|
||||||
setProgress(keysCreated, keysTotal);
|
|
||||||
|
|
||||||
buf = keyOperations.createKey(Constants.choice.algorithm.rsa,
|
|
||||||
4096, passphrase, false);
|
|
||||||
os.write(buf);
|
|
||||||
keyUsageList.add(UncachedSecretKey.ENCRYPT_COMMS | UncachedSecretKey.ENCRYPT_STORAGE);
|
|
||||||
keysCreated++;
|
|
||||||
setProgress(keysCreated, keysTotal);
|
|
||||||
|
|
||||||
buf = keyOperations.createKey(Constants.choice.algorithm.rsa,
|
|
||||||
4096, passphrase, false);
|
|
||||||
os.write(buf);
|
|
||||||
keyUsageList.add(UncachedSecretKey.SIGN_DATA);
|
|
||||||
keysCreated++;
|
|
||||||
setProgress(keysCreated, keysTotal);
|
|
||||||
|
|
||||||
// TODO: default to one master for cert, one sub for encrypt and one sub
|
|
||||||
// for sign
|
|
||||||
|
|
||||||
/* Output */
|
|
||||||
Bundle resultData = new Bundle();
|
|
||||||
resultData.putByteArray(RESULT_NEW_KEY, os.toByteArray());
|
|
||||||
resultData.putIntegerArrayList(RESULT_KEY_USAGES, keyUsageList);
|
|
||||||
|
|
||||||
OtherHelper.logDebugBundle(resultData, "resultData");
|
|
||||||
|
|
||||||
sendMessageToHandler(KeychainIntentServiceHandler.MESSAGE_OKAY, resultData);
|
|
||||||
} catch (Exception e) {
|
|
||||||
sendErrorToHandler(e);
|
|
||||||
}
|
|
||||||
} else if (ACTION_DELETE_FILE_SECURELY.equals(action)) {
|
} else if (ACTION_DELETE_FILE_SECURELY.equals(action)) {
|
||||||
try {
|
try {
|
||||||
/* Input */
|
/* Input */
|
||||||
|
|||||||
@@ -1,128 +0,0 @@
|
|||||||
/*
|
|
||||||
* Copyright (C) 2014 Ash Hughes <ashes-iontach@hotmail.com>
|
|
||||||
*
|
|
||||||
* This program is free software: you can redistribute it and/or modify
|
|
||||||
* it under the terms of the GNU General Public License as published by
|
|
||||||
* the Free Software Foundation, either version 3 of the License, or
|
|
||||||
* (at your option) any later version.
|
|
||||||
*
|
|
||||||
* This program is distributed in the hope that it will be useful,
|
|
||||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
||||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
||||||
* GNU General Public License for more details.
|
|
||||||
*
|
|
||||||
* You should have received a copy of the GNU General Public License
|
|
||||||
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
||||||
*/
|
|
||||||
|
|
||||||
package org.sufficientlysecure.keychain.service;
|
|
||||||
|
|
||||||
import android.os.Parcel;
|
|
||||||
import android.os.Parcelable;
|
|
||||||
|
|
||||||
import org.sufficientlysecure.keychain.Constants;
|
|
||||||
import org.sufficientlysecure.keychain.pgp.PgpConversionHelper;
|
|
||||||
import org.sufficientlysecure.keychain.pgp.UncachedSecretKey;
|
|
||||||
import org.sufficientlysecure.keychain.util.IterableIterator;
|
|
||||||
import org.sufficientlysecure.keychain.util.Log;
|
|
||||||
|
|
||||||
import java.io.ByteArrayOutputStream;
|
|
||||||
import java.io.IOException;
|
|
||||||
import java.util.ArrayList;
|
|
||||||
import java.util.Calendar;
|
|
||||||
|
|
||||||
/** Class for parcelling data between ui and services.
|
|
||||||
* This class is outdated and scheduled for removal, pending a rewrite of the
|
|
||||||
* EditKeyActivity and save keyring routines.
|
|
||||||
*/
|
|
||||||
@Deprecated
|
|
||||||
public class OldSaveKeyringParcel implements Parcelable {
|
|
||||||
|
|
||||||
public ArrayList<String> userIds;
|
|
||||||
public ArrayList<String> originalIDs;
|
|
||||||
public ArrayList<String> deletedIDs;
|
|
||||||
public boolean[] newIDs;
|
|
||||||
public boolean primaryIDChanged;
|
|
||||||
public boolean[] moddedKeys;
|
|
||||||
public ArrayList<UncachedSecretKey> deletedKeys;
|
|
||||||
public ArrayList<Calendar> keysExpiryDates;
|
|
||||||
public ArrayList<Integer> keysUsages;
|
|
||||||
public String newPassphrase;
|
|
||||||
public String oldPassphrase;
|
|
||||||
public boolean[] newKeys;
|
|
||||||
public ArrayList<UncachedSecretKey> keys;
|
|
||||||
public String originalPrimaryID;
|
|
||||||
|
|
||||||
public OldSaveKeyringParcel() {}
|
|
||||||
|
|
||||||
private OldSaveKeyringParcel(Parcel source) {
|
|
||||||
userIds = (ArrayList<String>) source.readSerializable();
|
|
||||||
originalIDs = (ArrayList<String>) source.readSerializable();
|
|
||||||
deletedIDs = (ArrayList<String>) source.readSerializable();
|
|
||||||
newIDs = source.createBooleanArray();
|
|
||||||
primaryIDChanged = source.readByte() != 0;
|
|
||||||
moddedKeys = source.createBooleanArray();
|
|
||||||
byte[] tmp = source.createByteArray();
|
|
||||||
if (tmp == null) {
|
|
||||||
deletedKeys = null;
|
|
||||||
} else {
|
|
||||||
deletedKeys = PgpConversionHelper.BytesToPGPSecretKeyList(tmp);
|
|
||||||
}
|
|
||||||
keysExpiryDates = (ArrayList<Calendar>) source.readSerializable();
|
|
||||||
keysUsages = source.readArrayList(Integer.class.getClassLoader());
|
|
||||||
newPassphrase = source.readString();
|
|
||||||
oldPassphrase = source.readString();
|
|
||||||
newKeys = source.createBooleanArray();
|
|
||||||
keys = PgpConversionHelper.BytesToPGPSecretKeyList(source.createByteArray());
|
|
||||||
originalPrimaryID = source.readString();
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public void writeToParcel(Parcel destination, int flags) {
|
|
||||||
destination.writeSerializable(userIds); //might not be the best method to store.
|
|
||||||
destination.writeSerializable(originalIDs);
|
|
||||||
destination.writeSerializable(deletedIDs);
|
|
||||||
destination.writeBooleanArray(newIDs);
|
|
||||||
destination.writeByte((byte) (primaryIDChanged ? 1 : 0));
|
|
||||||
destination.writeBooleanArray(moddedKeys);
|
|
||||||
destination.writeByteArray(encodeArrayList(deletedKeys));
|
|
||||||
destination.writeSerializable(keysExpiryDates);
|
|
||||||
destination.writeList(keysUsages);
|
|
||||||
destination.writeString(newPassphrase);
|
|
||||||
destination.writeString(oldPassphrase);
|
|
||||||
destination.writeBooleanArray(newKeys);
|
|
||||||
destination.writeByteArray(encodeArrayList(keys));
|
|
||||||
destination.writeString(originalPrimaryID);
|
|
||||||
}
|
|
||||||
|
|
||||||
public static final Creator<OldSaveKeyringParcel> CREATOR = new Creator<OldSaveKeyringParcel>() {
|
|
||||||
public OldSaveKeyringParcel createFromParcel(final Parcel source) {
|
|
||||||
return new OldSaveKeyringParcel(source);
|
|
||||||
}
|
|
||||||
|
|
||||||
public OldSaveKeyringParcel[] newArray(final int size) {
|
|
||||||
return new OldSaveKeyringParcel[size];
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
private static byte[] encodeArrayList(ArrayList<UncachedSecretKey> list) {
|
|
||||||
if(list.isEmpty()) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
ByteArrayOutputStream os = new ByteArrayOutputStream();
|
|
||||||
for(UncachedSecretKey key : new IterableIterator<UncachedSecretKey>(list.iterator())) {
|
|
||||||
try {
|
|
||||||
key.encodeSecretKey(os);
|
|
||||||
} catch (IOException e) {
|
|
||||||
Log.e(Constants.TAG, "Error while converting ArrayList<UncachedSecretKey> to byte[]!", e);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return os.toByteArray();
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public int describeContents() {
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@@ -223,6 +223,7 @@ public class OperationResultParcel implements Parcelable {
|
|||||||
MSG_KC_UID_REVOKE_DUP (R.string.msg_kc_uid_revoke_dup),
|
MSG_KC_UID_REVOKE_DUP (R.string.msg_kc_uid_revoke_dup),
|
||||||
MSG_KC_UID_REVOKE_OLD (R.string.msg_kc_uid_revoke_old),
|
MSG_KC_UID_REVOKE_OLD (R.string.msg_kc_uid_revoke_old),
|
||||||
|
|
||||||
|
|
||||||
// keyring consolidation
|
// keyring consolidation
|
||||||
MSG_MG_PUBLIC (R.string.msg_mg_public),
|
MSG_MG_PUBLIC (R.string.msg_mg_public),
|
||||||
MSG_MG_SECRET (R.string.msg_mg_secret),
|
MSG_MG_SECRET (R.string.msg_mg_secret),
|
||||||
@@ -230,6 +231,25 @@ public class OperationResultParcel implements Parcelable {
|
|||||||
MSG_MG_HETEROGENEOUS (R.string.msg_mg_heterogeneous),
|
MSG_MG_HETEROGENEOUS (R.string.msg_mg_heterogeneous),
|
||||||
MSG_MG_NEW_SUBKEY (R.string.msg_mg_new_subkey),
|
MSG_MG_NEW_SUBKEY (R.string.msg_mg_new_subkey),
|
||||||
MSG_MG_FOUND_NEW (R.string.msg_mg_found_new),
|
MSG_MG_FOUND_NEW (R.string.msg_mg_found_new),
|
||||||
|
|
||||||
|
// secret key modify
|
||||||
|
MSG_MF (R.string.msg_mr),
|
||||||
|
MSG_MF_ERROR_ENCODE (R.string.msg_mf_error_encode),
|
||||||
|
MSG_MF_ERROR_PGP (R.string.msg_mf_error_pgp),
|
||||||
|
MSG_MF_ERROR_SIG (R.string.msg_mf_error_sig),
|
||||||
|
MSG_MF_PASSPHRASE (R.string.msg_mf_passphrase),
|
||||||
|
MSG_MF_SUBKEY_CHANGE (R.string.msg_mf_subkey_change),
|
||||||
|
MSG_MF_SUBKEY_MISSING (R.string.msg_mf_subkey_missing),
|
||||||
|
MSG_MF_SUBKEY_NEW_ID (R.string.msg_mf_subkey_new_id),
|
||||||
|
MSG_MF_SUBKEY_NEW (R.string.msg_mf_subkey_new),
|
||||||
|
MSG_MF_SUBKEY_PAST_EXPIRY (R.string.msg_mf_subkey_past_expiry),
|
||||||
|
MSG_MF_SUBKEY_REVOKE (R.string.msg_mf_subkey_revoke),
|
||||||
|
MSG_MF_SUCCESS (R.string.msg_mf_success),
|
||||||
|
MSG_MF_UID_ADD (R.string.msg_mf_uid_add),
|
||||||
|
MSG_MF_UID_PRIMARY (R.string.msg_mf_uid_primary),
|
||||||
|
MSG_MF_UID_REVOKE (R.string.msg_mf_uid_revoke),
|
||||||
|
MSG_MF_UNLOCK_ERROR (R.string.msg_mf_unlock_error),
|
||||||
|
MSG_MF_UNLOCK (R.string.msg_mf_unlock),
|
||||||
;
|
;
|
||||||
|
|
||||||
private final int mMsgId;
|
private final int mMsgId;
|
||||||
@@ -280,6 +300,10 @@ public class OperationResultParcel implements Parcelable {
|
|||||||
add(new OperationResultParcel.LogEntryParcel(level, type, parameters, indent));
|
add(new OperationResultParcel.LogEntryParcel(level, type, parameters, indent));
|
||||||
}
|
}
|
||||||
|
|
||||||
|
public void add(LogLevel level, LogType type, int indent) {
|
||||||
|
add(new OperationResultParcel.LogEntryParcel(level, type, null, indent));
|
||||||
|
}
|
||||||
|
|
||||||
public boolean containsWarnings() {
|
public boolean containsWarnings() {
|
||||||
for(LogEntryParcel entry : new IterableIterator<LogEntryParcel>(iterator())) {
|
for(LogEntryParcel entry : new IterableIterator<LogEntryParcel>(iterator())) {
|
||||||
if (entry.mLevel == LogLevel.WARN || entry.mLevel == LogLevel.ERROR) {
|
if (entry.mLevel == LogLevel.WARN || entry.mLevel == LogLevel.ERROR) {
|
||||||
|
|||||||
@@ -23,16 +23,16 @@ import java.util.HashMap;
|
|||||||
public class SaveKeyringParcel implements Parcelable {
|
public class SaveKeyringParcel implements Parcelable {
|
||||||
|
|
||||||
// the master key id to be edited
|
// the master key id to be edited
|
||||||
private final long mMasterKeyId;
|
public final long mMasterKeyId;
|
||||||
// the key fingerprint, for safety
|
// the key fingerprint, for safety
|
||||||
private final byte[] mFingerprint;
|
public final byte[] mFingerprint;
|
||||||
|
|
||||||
public String newPassphrase;
|
public String newPassphrase;
|
||||||
|
|
||||||
public String[] addUserIds;
|
public String[] addUserIds;
|
||||||
public SubkeyAdd[] addSubKeys;
|
public SubkeyAdd[] addSubKeys;
|
||||||
|
|
||||||
public HashMap<Long, SubkeyChange> changeSubKeys;
|
public SubkeyChange[] changeSubKeys;
|
||||||
public String changePrimaryUserId;
|
public String changePrimaryUserId;
|
||||||
|
|
||||||
public String[] revokeUserIds;
|
public String[] revokeUserIds;
|
||||||
@@ -76,7 +76,7 @@ public class SaveKeyringParcel implements Parcelable {
|
|||||||
addUserIds = source.createStringArray();
|
addUserIds = source.createStringArray();
|
||||||
addSubKeys = (SubkeyAdd[]) source.readSerializable();
|
addSubKeys = (SubkeyAdd[]) source.readSerializable();
|
||||||
|
|
||||||
changeSubKeys = (HashMap<Long,SubkeyChange>) source.readSerializable();
|
changeSubKeys = (SubkeyChange[]) source.readSerializable();
|
||||||
changePrimaryUserId = source.readString();
|
changePrimaryUserId = source.readString();
|
||||||
|
|
||||||
revokeUserIds = source.createStringArray();
|
revokeUserIds = source.createStringArray();
|
||||||
|
|||||||
@@ -57,7 +57,6 @@ import org.sufficientlysecure.keychain.provider.KeychainContract.KeyRings;
|
|||||||
import org.sufficientlysecure.keychain.provider.ProviderHelper;
|
import org.sufficientlysecure.keychain.provider.ProviderHelper;
|
||||||
import org.sufficientlysecure.keychain.service.KeychainIntentService;
|
import org.sufficientlysecure.keychain.service.KeychainIntentService;
|
||||||
import org.sufficientlysecure.keychain.service.KeychainIntentServiceHandler;
|
import org.sufficientlysecure.keychain.service.KeychainIntentServiceHandler;
|
||||||
import org.sufficientlysecure.keychain.service.OldSaveKeyringParcel;
|
|
||||||
import org.sufficientlysecure.keychain.service.PassphraseCacheService;
|
import org.sufficientlysecure.keychain.service.PassphraseCacheService;
|
||||||
import org.sufficientlysecure.keychain.ui.dialog.CustomAlertDialogBuilder;
|
import org.sufficientlysecure.keychain.ui.dialog.CustomAlertDialogBuilder;
|
||||||
import org.sufficientlysecure.keychain.ui.dialog.PassphraseDialogFragment;
|
import org.sufficientlysecure.keychain.ui.dialog.PassphraseDialogFragment;
|
||||||
@@ -199,13 +198,10 @@ public class EditKeyActivity extends ActionBarActivity implements EditorListener
|
|||||||
|
|
||||||
// generate key
|
// generate key
|
||||||
if (extras.containsKey(EXTRA_GENERATE_DEFAULT_KEYS)) {
|
if (extras.containsKey(EXTRA_GENERATE_DEFAULT_KEYS)) {
|
||||||
|
/*
|
||||||
boolean generateDefaultKeys = extras.getBoolean(EXTRA_GENERATE_DEFAULT_KEYS);
|
boolean generateDefaultKeys = extras.getBoolean(EXTRA_GENERATE_DEFAULT_KEYS);
|
||||||
if (generateDefaultKeys) {
|
if (generateDefaultKeys) {
|
||||||
|
|
||||||
// Send all information needed to service generate keys in other thread
|
|
||||||
final Intent serviceIntent = new Intent(this, KeychainIntentService.class);
|
|
||||||
serviceIntent.setAction(KeychainIntentService.ACTION_GENERATE_DEFAULT_RSA_KEYS);
|
|
||||||
|
|
||||||
// fill values for this action
|
// fill values for this action
|
||||||
Bundle data = new Bundle();
|
Bundle data = new Bundle();
|
||||||
data.putString(KeychainIntentService.GENERATE_KEY_SYMMETRIC_PASSPHRASE,
|
data.putString(KeychainIntentService.GENERATE_KEY_SYMMETRIC_PASSPHRASE,
|
||||||
@@ -265,6 +261,7 @@ public class EditKeyActivity extends ActionBarActivity implements EditorListener
|
|||||||
// start service with intent
|
// start service with intent
|
||||||
startService(serviceIntent);
|
startService(serviceIntent);
|
||||||
}
|
}
|
||||||
|
*/
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
buildLayout(false);
|
buildLayout(false);
|
||||||
@@ -547,6 +544,7 @@ public class EditKeyActivity extends ActionBarActivity implements EditorListener
|
|||||||
}
|
}
|
||||||
|
|
||||||
private void finallySaveClicked() {
|
private void finallySaveClicked() {
|
||||||
|
/*
|
||||||
try {
|
try {
|
||||||
// Send all information needed to service to edit key in other thread
|
// Send all information needed to service to edit key in other thread
|
||||||
Intent intent = new Intent(this, KeychainIntentService.class);
|
Intent intent = new Intent(this, KeychainIntentService.class);
|
||||||
@@ -609,6 +607,7 @@ public class EditKeyActivity extends ActionBarActivity implements EditorListener
|
|||||||
AppMsg.makeText(this, getString(R.string.error_message, e.getMessage()),
|
AppMsg.makeText(this, getString(R.string.error_message, e.getMessage()),
|
||||||
AppMsg.STYLE_ALERT).show();
|
AppMsg.STYLE_ALERT).show();
|
||||||
}
|
}
|
||||||
|
*/
|
||||||
}
|
}
|
||||||
|
|
||||||
private void cancelClicked() {
|
private void cancelClicked() {
|
||||||
|
|||||||
@@ -346,13 +346,8 @@ public class SectionView extends LinearLayout implements OnClickListener, Editor
|
|||||||
}
|
}
|
||||||
|
|
||||||
private void createKey() {
|
private void createKey() {
|
||||||
// Send all information needed to service to edit key in other thread
|
|
||||||
final Intent intent = new Intent(mActivity, KeychainIntentService.class);
|
|
||||||
|
|
||||||
intent.setAction(KeychainIntentService.ACTION_GENERATE_KEY);
|
|
||||||
|
|
||||||
// fill values for this action
|
// fill values for this action
|
||||||
Bundle data = new Bundle();
|
|
||||||
Boolean isMasterKey;
|
Boolean isMasterKey;
|
||||||
|
|
||||||
String passphrase;
|
String passphrase;
|
||||||
@@ -365,6 +360,7 @@ public class SectionView extends LinearLayout implements OnClickListener, Editor
|
|||||||
passphrase = "";
|
passphrase = "";
|
||||||
isMasterKey = true;
|
isMasterKey = true;
|
||||||
}
|
}
|
||||||
|
/*
|
||||||
data.putBoolean(KeychainIntentService.GENERATE_KEY_MASTER_KEY, isMasterKey);
|
data.putBoolean(KeychainIntentService.GENERATE_KEY_MASTER_KEY, isMasterKey);
|
||||||
data.putString(KeychainIntentService.GENERATE_KEY_SYMMETRIC_PASSPHRASE, passphrase);
|
data.putString(KeychainIntentService.GENERATE_KEY_SYMMETRIC_PASSPHRASE, passphrase);
|
||||||
data.putInt(KeychainIntentService.GENERATE_KEY_ALGORITHM, mNewKeyAlgorithmChoice.getId());
|
data.putInt(KeychainIntentService.GENERATE_KEY_ALGORITHM, mNewKeyAlgorithmChoice.getId());
|
||||||
@@ -410,6 +406,8 @@ public class SectionView extends LinearLayout implements OnClickListener, Editor
|
|||||||
|
|
||||||
// start service with intent
|
// start service with intent
|
||||||
mActivity.startService(intent);
|
mActivity.startService(intent);
|
||||||
|
*/
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
private void addGeneratedKeyToView(UncachedSecretKey newKey) {
|
private void addGeneratedKeyToView(UncachedSecretKey newKey) {
|
||||||
|
|||||||
@@ -600,7 +600,6 @@
|
|||||||
<string name="msg_kc_uid_revoke_old">Removing outdated revocation certificate for user id "%s"</string>
|
<string name="msg_kc_uid_revoke_old">Removing outdated revocation certificate for user id "%s"</string>
|
||||||
<string name="msg_kc_uid_no_cert">No valid self-certificate found for user id %s, removing from ring</string>
|
<string name="msg_kc_uid_no_cert">No valid self-certificate found for user id %s, removing from ring</string>
|
||||||
|
|
||||||
|
|
||||||
<!-- Keyring merging log entries -->
|
<!-- Keyring merging log entries -->
|
||||||
<string name="msg_mg_public">Merging into public keyring %s</string>
|
<string name="msg_mg_public">Merging into public keyring %s</string>
|
||||||
<string name="msg_mg_secret">Merging into secret keyring %s</string>
|
<string name="msg_mg_secret">Merging into secret keyring %s</string>
|
||||||
@@ -609,6 +608,25 @@
|
|||||||
<string name="msg_mg_new_subkey">Adding new subkey %s</string>
|
<string name="msg_mg_new_subkey">Adding new subkey %s</string>
|
||||||
<string name="msg_mg_found_new">Found %s new certificates in keyring</string>
|
<string name="msg_mg_found_new">Found %s new certificates in keyring</string>
|
||||||
|
|
||||||
|
<!-- modifySecretKeyRing -->
|
||||||
|
<string name="msg_mr">Modifying keyring %s</string>
|
||||||
|
<string name="msg_mf_error_encode">Encoding exception!</string>
|
||||||
|
<string name="msg_mf_error_pgp">PGP internal exception!</string>
|
||||||
|
<string name="msg_mf_error_sig">Signature exception!</string>
|
||||||
|
<string name="msg_mf_passphrase">Changing passphrase</string>
|
||||||
|
<string name="msg_mf_subkey_change">Modifying subkey %s</string>
|
||||||
|
<string name="msg_mf_subkey_missing">Tried to operate on missing subkey %s!</string>
|
||||||
|
<string name="msg_mf_subkey_new">Generating new %1$s bit %2$s subkey</string>
|
||||||
|
<string name="msg_mf_subkey_new_id">New subkey id: %s</string>
|
||||||
|
<string name="msg_mf_subkey_past_expiry">Expiry date cannot be in the past!</string>
|
||||||
|
<string name="msg_mf_subkey_revoke">Revoking subkey %s</string>
|
||||||
|
<string name="msg_mf_success">Keyring successfully modified</string>
|
||||||
|
<string name="msg_mf_uid_add">Adding user id %s</string>
|
||||||
|
<string name="msg_mf_uid_primary">Changing primary uid to %s</string>
|
||||||
|
<string name="msg_mf_uid_revoke">Revoking user id %s</string>
|
||||||
|
<string name="msg_mf_unlock_error">Error unlocking keyring!</string>
|
||||||
|
<string name="msg_mf_unlock">Unlocking keyring</string>
|
||||||
|
|
||||||
<!-- unsorted -->
|
<!-- unsorted -->
|
||||||
<string name="section_certifier_id">Certifier</string>
|
<string name="section_certifier_id">Certifier</string>
|
||||||
<string name="section_cert">Certificate Details</string>
|
<string name="section_cert">Certificate Details</string>
|
||||||
|
|||||||
Reference in New Issue
Block a user