diff options
author | Vincent Breitmoser <valodim@mugenguild.com> | 2014-09-13 17:54:10 +0200 |
---|---|---|
committer | Vincent Breitmoser <valodim@mugenguild.com> | 2014-09-13 17:54:10 +0200 |
commit | 4c636a1471ac1013574a3d1446549a652c690b47 (patch) | |
tree | 516558a2ef69a535cca365d2478367eb0326cee9 /OpenKeychain/src/main/java/org/sufficientlysecure/keychain/service/results/DecryptVerifyResult.java | |
parent | 19252380f198555a6650654ab5e2e35905b40203 (diff) | |
download | open-keychain-4c636a1471ac1013574a3d1446549a652c690b47.tar.gz open-keychain-4c636a1471ac1013574a3d1446549a652c690b47.tar.bz2 open-keychain-4c636a1471ac1013574a3d1446549a652c690b47.zip |
introduce OperationResultParcel for PgpDecryptVerify operations (WIP)
Diffstat (limited to 'OpenKeychain/src/main/java/org/sufficientlysecure/keychain/service/results/DecryptVerifyResult.java')
-rw-r--r-- | OpenKeychain/src/main/java/org/sufficientlysecure/keychain/service/results/DecryptVerifyResult.java | 113 |
1 files changed, 113 insertions, 0 deletions
diff --git a/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/service/results/DecryptVerifyResult.java b/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/service/results/DecryptVerifyResult.java new file mode 100644 index 000000000..909f9f9be --- /dev/null +++ b/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/service/results/DecryptVerifyResult.java @@ -0,0 +1,113 @@ +/* + * Copyright (C) 2014 Dominik Schürmann <dominik@dominikschuermann.de> + * + * This program is free software: you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation, either version 3 of the License, or + * (at your option) any later version. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program. If not, see <http://www.gnu.org/licenses/>. + */ + +package org.sufficientlysecure.keychain.service.results; + +import android.os.Parcel; +import android.os.Parcelable; + +import org.openintents.openpgp.OpenPgpMetadata; +import org.openintents.openpgp.OpenPgpSignatureResult; + +public class DecryptVerifyResult extends OperationResultParcel { + + // the fourth bit indicates a "data pending" result! + public static final int RESULT_PENDING = 8; + + // fifth to sixth bit in addition indicate specific type of pending + public static final int RESULT_PENDING_ASYM_PASSPHRASE = RESULT_PENDING +16; + public static final int RESULT_PENDING_SYM_PASSPHRASE = RESULT_PENDING +32; + public static final int RESULT_PENDING_NFC = RESULT_PENDING +48; + + long mKeyIdPassphraseNeeded; + byte[] mSessionKey; + + OpenPgpSignatureResult mSignatureResult; + OpenPgpMetadata mDecryptMetadata; + + public long getKeyIdPassphraseNeeded() { + return mKeyIdPassphraseNeeded; + } + + public void setKeyIdPassphraseNeeded(long keyIdPassphraseNeeded) { + mKeyIdPassphraseNeeded = keyIdPassphraseNeeded; + } + + public void setNfcEncryptedSessionKey(byte[] sessionKey) { + mSessionKey = sessionKey; + } + + public OpenPgpSignatureResult getSignatureResult() { + return mSignatureResult; + } + + public void setSignatureResult(OpenPgpSignatureResult signatureResult) { + mSignatureResult = signatureResult; + } + + public OpenPgpMetadata getDecryptMetadata() { + return mDecryptMetadata; + } + + public void setDecryptMetadata(OpenPgpMetadata decryptMetadata) { + mDecryptMetadata = decryptMetadata; + } + + public boolean isPending() { + return (mResult & RESULT_PENDING) != 0; + } + + public DecryptVerifyResult(int result, OperationLog log) { + super(result, log); + } + + public DecryptVerifyResult(Parcel source) { + super(source); + mKeyIdPassphraseNeeded = source.readLong(); + mSignatureResult = source.readParcelable(OpenPgpSignatureResult.class.getClassLoader()); + mDecryptMetadata = source.readParcelable(OpenPgpMetadata.class.getClassLoader()); + mSessionKey = source.readInt() != 0 ? source.createByteArray() : null; + } + + public int describeContents() { + return 0; + } + + public void writeToParcel(Parcel dest, int flags) { + super.writeToParcel(dest, flags); + dest.writeLong(mKeyIdPassphraseNeeded); + dest.writeParcelable(mSignatureResult, 0); + dest.writeParcelable(mDecryptMetadata, 0); + if (mSessionKey != null) { + dest.writeInt(1); + dest.writeByteArray(mSessionKey); + } else { + dest.writeInt(0); + } + } + + public static final Creator<DecryptVerifyResult> CREATOR = new Creator<DecryptVerifyResult>() { + public DecryptVerifyResult createFromParcel(final Parcel source) { + return new DecryptVerifyResult(source); + } + + public DecryptVerifyResult[] newArray(final int size) { + return new DecryptVerifyResult[size]; + } + }; + +} |