Make predicate names in KeychainProvider consistent
This commit is contained in:
@@ -158,7 +158,7 @@ public class CachedPublicKeyRing extends KeyRing {
|
|||||||
public boolean canCertify() throws PgpKeyNotFoundException {
|
public boolean canCertify() throws PgpKeyNotFoundException {
|
||||||
try {
|
try {
|
||||||
Object data = mKeyRepository.getGenericData(mUri,
|
Object data = mKeyRepository.getGenericData(mUri,
|
||||||
KeychainContract.KeyRings.HAS_CERTIFY,
|
KeychainContract.KeyRings.HAS_CERTIFY_SECRET,
|
||||||
KeyRepository.FIELD_TYPE_NULL);
|
KeyRepository.FIELD_TYPE_NULL);
|
||||||
return !((Boolean) data);
|
return !((Boolean) data);
|
||||||
} catch(KeyWritableRepository.NotFoundException e) {
|
} catch(KeyWritableRepository.NotFoundException e) {
|
||||||
@@ -192,7 +192,7 @@ public class CachedPublicKeyRing extends KeyRing {
|
|||||||
public long getSecretSignId() throws PgpKeyNotFoundException {
|
public long getSecretSignId() throws PgpKeyNotFoundException {
|
||||||
try {
|
try {
|
||||||
Object data = mKeyRepository.getGenericData(mUri,
|
Object data = mKeyRepository.getGenericData(mUri,
|
||||||
KeyRings.HAS_SIGN,
|
KeyRings.HAS_SIGN_SECRET,
|
||||||
KeyRepository.FIELD_TYPE_INTEGER);
|
KeyRepository.FIELD_TYPE_INTEGER);
|
||||||
return (Long) data;
|
return (Long) data;
|
||||||
} catch(KeyWritableRepository.NotFoundException e) {
|
} catch(KeyWritableRepository.NotFoundException e) {
|
||||||
@@ -209,7 +209,7 @@ public class CachedPublicKeyRing extends KeyRing {
|
|||||||
public long getSecretAuthenticationId() throws PgpKeyNotFoundException {
|
public long getSecretAuthenticationId() throws PgpKeyNotFoundException {
|
||||||
try {
|
try {
|
||||||
Object data = mKeyRepository.getGenericData(mUri,
|
Object data = mKeyRepository.getGenericData(mUri,
|
||||||
KeyRings.HAS_AUTHENTICATE,
|
KeyRings.HAS_AUTHENTICATE_SECRET,
|
||||||
KeyRepository.FIELD_TYPE_INTEGER);
|
KeyRepository.FIELD_TYPE_INTEGER);
|
||||||
return (Long) data;
|
return (Long) data;
|
||||||
} catch(KeyWritableRepository.NotFoundException e) {
|
} catch(KeyWritableRepository.NotFoundException e) {
|
||||||
|
|||||||
@@ -152,9 +152,9 @@ public class KeychainContract {
|
|||||||
public static final String IS_EXPIRED = "is_expired";
|
public static final String IS_EXPIRED = "is_expired";
|
||||||
public static final String HAS_ANY_SECRET = "has_any_secret";
|
public static final String HAS_ANY_SECRET = "has_any_secret";
|
||||||
public static final String HAS_ENCRYPT = "has_encrypt";
|
public static final String HAS_ENCRYPT = "has_encrypt";
|
||||||
public static final String HAS_SIGN = "has_sign";
|
public static final String HAS_SIGN_SECRET = "has_sign_secret";
|
||||||
public static final String HAS_CERTIFY = "has_certify";
|
public static final String HAS_CERTIFY_SECRET = "has_certify_secret";
|
||||||
public static final String HAS_AUTHENTICATE = "has_authenticate";
|
public static final String HAS_AUTHENTICATE_SECRET = "has_authenticate_secret";
|
||||||
public static final String HAS_DUPLICATE_USER_ID = "has_duplicate_user_id";
|
public static final String HAS_DUPLICATE_USER_ID = "has_duplicate_user_id";
|
||||||
public static final String API_KNOWN_TO_PACKAGE_NAMES = "known_to_apps";
|
public static final String API_KNOWN_TO_PACKAGE_NAMES = "known_to_apps";
|
||||||
|
|
||||||
|
|||||||
@@ -351,12 +351,12 @@ public class KeychainProvider extends ContentProvider {
|
|||||||
+ ")) AS " + KeyRings.HAS_ANY_SECRET);
|
+ ")) AS " + KeyRings.HAS_ANY_SECRET);
|
||||||
projectionMap.put(KeyRings.HAS_ENCRYPT,
|
projectionMap.put(KeyRings.HAS_ENCRYPT,
|
||||||
"kE." + Keys.KEY_ID + " AS " + KeyRings.HAS_ENCRYPT);
|
"kE." + Keys.KEY_ID + " AS " + KeyRings.HAS_ENCRYPT);
|
||||||
projectionMap.put(KeyRings.HAS_SIGN,
|
projectionMap.put(KeyRings.HAS_SIGN_SECRET,
|
||||||
"kS." + Keys.KEY_ID + " AS " + KeyRings.HAS_SIGN);
|
"kS." + Keys.KEY_ID + " AS " + KeyRings.HAS_SIGN_SECRET);
|
||||||
projectionMap.put(KeyRings.HAS_AUTHENTICATE,
|
projectionMap.put(KeyRings.HAS_AUTHENTICATE_SECRET,
|
||||||
"kA." + Keys.KEY_ID + " AS " + KeyRings.HAS_AUTHENTICATE);
|
"kA." + Keys.KEY_ID + " AS " + KeyRings.HAS_AUTHENTICATE_SECRET);
|
||||||
projectionMap.put(KeyRings.HAS_CERTIFY,
|
projectionMap.put(KeyRings.HAS_CERTIFY_SECRET,
|
||||||
"kC." + Keys.KEY_ID + " AS " + KeyRings.HAS_CERTIFY);
|
"kC." + Keys.KEY_ID + " AS " + KeyRings.HAS_CERTIFY_SECRET);
|
||||||
projectionMap.put(KeyRings.IS_EXPIRED,
|
projectionMap.put(KeyRings.IS_EXPIRED,
|
||||||
"(" + Tables.KEYS + "." + Keys.EXPIRY + " IS NOT NULL AND " + Tables.KEYS + "." + Keys.EXPIRY
|
"(" + Tables.KEYS + "." + Keys.EXPIRY + " IS NOT NULL AND " + Tables.KEYS + "." + Keys.EXPIRY
|
||||||
+ " < " + new Date().getTime() / 1000 + ") AS " + KeyRings.IS_EXPIRED);
|
+ " < " + new Date().getTime() / 1000 + ") AS " + KeyRings.IS_EXPIRED);
|
||||||
@@ -398,7 +398,7 @@ public class KeychainProvider extends ContentProvider {
|
|||||||
+ " AND ( kE." + Keys.EXPIRY + " IS NULL OR kE." + Keys.EXPIRY
|
+ " AND ( kE." + Keys.EXPIRY + " IS NULL OR kE." + Keys.EXPIRY
|
||||||
+ " >= " + new Date().getTime() / 1000 + " )"
|
+ " >= " + new Date().getTime() / 1000 + " )"
|
||||||
+ ")" : "")
|
+ ")" : "")
|
||||||
+ (plist.contains(KeyRings.HAS_SIGN) ?
|
+ (plist.contains(KeyRings.HAS_SIGN_SECRET) ?
|
||||||
" LEFT JOIN " + Tables.KEYS + " AS kS ON ("
|
" LEFT JOIN " + Tables.KEYS + " AS kS ON ("
|
||||||
+"kS." + Keys.MASTER_KEY_ID
|
+"kS." + Keys.MASTER_KEY_ID
|
||||||
+ " = " + Tables.KEYS + "." + Keys.MASTER_KEY_ID
|
+ " = " + Tables.KEYS + "." + Keys.MASTER_KEY_ID
|
||||||
@@ -409,7 +409,7 @@ public class KeychainProvider extends ContentProvider {
|
|||||||
+ " AND ( kS." + Keys.EXPIRY + " IS NULL OR kS." + Keys.EXPIRY
|
+ " AND ( kS." + Keys.EXPIRY + " IS NULL OR kS." + Keys.EXPIRY
|
||||||
+ " >= " + new Date().getTime() / 1000 + " )"
|
+ " >= " + new Date().getTime() / 1000 + " )"
|
||||||
+ ")" : "")
|
+ ")" : "")
|
||||||
+ (plist.contains(KeyRings.HAS_AUTHENTICATE) ?
|
+ (plist.contains(KeyRings.HAS_AUTHENTICATE_SECRET) ?
|
||||||
" LEFT JOIN " + Tables.KEYS + " AS kA ON ("
|
" LEFT JOIN " + Tables.KEYS + " AS kA ON ("
|
||||||
+"kA." + Keys.MASTER_KEY_ID
|
+"kA." + Keys.MASTER_KEY_ID
|
||||||
+ " = " + Tables.KEYS + "." + Keys.MASTER_KEY_ID
|
+ " = " + Tables.KEYS + "." + Keys.MASTER_KEY_ID
|
||||||
@@ -420,7 +420,7 @@ public class KeychainProvider extends ContentProvider {
|
|||||||
+ " AND ( kA." + Keys.EXPIRY + " IS NULL OR kA." + Keys.EXPIRY
|
+ " AND ( kA." + Keys.EXPIRY + " IS NULL OR kA." + Keys.EXPIRY
|
||||||
+ " >= " + new Date().getTime() / 1000 + " )"
|
+ " >= " + new Date().getTime() / 1000 + " )"
|
||||||
+ ")" : "")
|
+ ")" : "")
|
||||||
+ (plist.contains(KeyRings.HAS_CERTIFY) ?
|
+ (plist.contains(KeyRings.HAS_CERTIFY_SECRET) ?
|
||||||
" LEFT JOIN " + Tables.KEYS + " AS kC ON ("
|
" LEFT JOIN " + Tables.KEYS + " AS kC ON ("
|
||||||
+"kC." + Keys.MASTER_KEY_ID
|
+"kC." + Keys.MASTER_KEY_ID
|
||||||
+ " = " + Tables.KEYS + "." + Keys.MASTER_KEY_ID
|
+ " = " + Tables.KEYS + "." + Keys.MASTER_KEY_ID
|
||||||
|
|||||||
@@ -42,7 +42,7 @@ public class KeyLoader extends AsyncTaskLoader<List<KeyInfo>> {
|
|||||||
KeyRings.MASTER_KEY_ID,
|
KeyRings.MASTER_KEY_ID,
|
||||||
KeyRings.CREATION,
|
KeyRings.CREATION,
|
||||||
KeyRings.HAS_ENCRYPT,
|
KeyRings.HAS_ENCRYPT,
|
||||||
KeyRings.HAS_AUTHENTICATE,
|
KeyRings.HAS_AUTHENTICATE_SECRET,
|
||||||
KeyRings.HAS_ANY_SECRET,
|
KeyRings.HAS_ANY_SECRET,
|
||||||
KeyRings.VERIFIED,
|
KeyRings.VERIFIED,
|
||||||
KeyRings.NAME,
|
KeyRings.NAME,
|
||||||
|
|||||||
@@ -82,7 +82,7 @@ class RemoteSelectAuthenticationKeyPresenter implements LoaderCallbacks<List<Key
|
|||||||
|
|
||||||
@Override
|
@Override
|
||||||
public Loader<List<KeyInfo>> onCreateLoader(int id, Bundle args) {
|
public Loader<List<KeyInfo>> onCreateLoader(int id, Bundle args) {
|
||||||
String selection = KeyRings.HAS_ANY_SECRET + " != 0 AND " + KeyRings.HAS_AUTHENTICATE + " != 0";
|
String selection = KeyRings.HAS_ANY_SECRET + " != 0 AND " + KeyRings.HAS_AUTHENTICATE_SECRET + " != 0";
|
||||||
KeySelector keySelector = KeySelector.create(
|
KeySelector keySelector = KeySelector.create(
|
||||||
KeyRings.buildUnifiedKeyRingsUri(), selection);
|
KeyRings.buildUnifiedKeyRingsUri(), selection);
|
||||||
return new KeyLoader(context, context.getContentResolver(), keySelector);
|
return new KeyLoader(context, context.getContentResolver(), keySelector);
|
||||||
|
|||||||
@@ -60,7 +60,7 @@ public class CertifyKeySpinner extends KeySpinner {
|
|||||||
Uri baseUri = KeychainContract.KeyRings.buildUnifiedKeyRingsUri();
|
Uri baseUri = KeychainContract.KeyRings.buildUnifiedKeyRingsUri();
|
||||||
|
|
||||||
String[] projection = KeyAdapter.getProjectionWith(new String[] {
|
String[] projection = KeyAdapter.getProjectionWith(new String[] {
|
||||||
KeychainContract.KeyRings.HAS_CERTIFY,
|
KeychainContract.KeyRings.HAS_CERTIFY_SECRET,
|
||||||
});
|
});
|
||||||
|
|
||||||
String where = KeychainContract.KeyRings.HAS_ANY_SECRET + " = 1 AND "
|
String where = KeychainContract.KeyRings.HAS_ANY_SECRET + " = 1 AND "
|
||||||
@@ -79,7 +79,7 @@ public class CertifyKeySpinner extends KeySpinner {
|
|||||||
super.onLoadFinished(loader, data);
|
super.onLoadFinished(loader, data);
|
||||||
|
|
||||||
if (loader.getId() == LOADER_ID) {
|
if (loader.getId() == LOADER_ID) {
|
||||||
mIndexHasCertify = data.getColumnIndex(KeychainContract.KeyRings.HAS_CERTIFY);
|
mIndexHasCertify = data.getColumnIndex(KeychainContract.KeyRings.HAS_CERTIFY_SECRET);
|
||||||
|
|
||||||
// If:
|
// If:
|
||||||
// - no key has been pre-selected (e.g. by SageSlinger)
|
// - no key has been pre-selected (e.g. by SageSlinger)
|
||||||
|
|||||||
@@ -49,7 +49,7 @@ public class SignKeySpinner extends KeySpinner {
|
|||||||
Uri baseUri = KeychainContract.KeyRings.buildUnifiedKeyRingsUri();
|
Uri baseUri = KeychainContract.KeyRings.buildUnifiedKeyRingsUri();
|
||||||
|
|
||||||
String[] projection = KeyAdapter.getProjectionWith(new String[] {
|
String[] projection = KeyAdapter.getProjectionWith(new String[] {
|
||||||
KeychainContract.KeyRings.HAS_SIGN,
|
KeychainContract.KeyRings.HAS_SIGN_SECRET,
|
||||||
});
|
});
|
||||||
|
|
||||||
String where = KeychainContract.KeyRings.HAS_ANY_SECRET + " = 1";
|
String where = KeychainContract.KeyRings.HAS_ANY_SECRET + " = 1";
|
||||||
@@ -66,7 +66,7 @@ public class SignKeySpinner extends KeySpinner {
|
|||||||
super.onLoadFinished(loader, data);
|
super.onLoadFinished(loader, data);
|
||||||
|
|
||||||
if (loader.getId() == LOADER_ID) {
|
if (loader.getId() == LOADER_ID) {
|
||||||
mIndexHasSign = data.getColumnIndex(KeychainContract.KeyRings.HAS_SIGN);
|
mIndexHasSign = data.getColumnIndex(KeychainContract.KeyRings.HAS_SIGN_SECRET);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
Reference in New Issue
Block a user