aboutsummaryrefslogtreecommitdiffstats
path: root/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/service/results/DecryptVerifyResult.java
diff options
context:
space:
mode:
authorVincent Breitmoser <valodim@mugenguild.com>2014-09-13 21:32:17 +0200
committerVincent Breitmoser <valodim@mugenguild.com>2014-09-13 21:32:17 +0200
commitf8677a5f166308e34c0652d9890f4120a6e712aa (patch)
treed49a860bfbb99ffb27e77ab2842bd8cc4832c183 /OpenKeychain/src/main/java/org/sufficientlysecure/keychain/service/results/DecryptVerifyResult.java
parenta1323a1a1456ce2b50599d66304178ebddb02efd (diff)
parent7b08b18d251d4d3df681ea3be2235338c6a07c65 (diff)
downloadopen-keychain-f8677a5f166308e34c0652d9890f4120a6e712aa.tar.gz
open-keychain-f8677a5f166308e34c0652d9890f4120a6e712aa.tar.bz2
open-keychain-f8677a5f166308e34c0652d9890f4120a6e712aa.zip
Merge branch 'result-parcels'
Diffstat (limited to 'OpenKeychain/src/main/java/org/sufficientlysecure/keychain/service/results/DecryptVerifyResult.java')
-rw-r--r--OpenKeychain/src/main/java/org/sufficientlysecure/keychain/service/results/DecryptVerifyResult.java116
1 files changed, 116 insertions, 0 deletions
diff --git a/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/service/results/DecryptVerifyResult.java b/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/service/results/DecryptVerifyResult.java
new file mode 100644
index 000000000..e7ac209bf
--- /dev/null
+++ b/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/service/results/DecryptVerifyResult.java
@@ -0,0 +1,116 @@
+/*
+ * Copyright (C) 2014 Dominik Schürmann <dominik@dominikschuermann.de>
+ *
+ * This program is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 3 of the License, or
+ * (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program. If not, see <http://www.gnu.org/licenses/>.
+ */
+
+package org.sufficientlysecure.keychain.service.results;
+
+import android.os.Parcel;
+
+import org.openintents.openpgp.OpenPgpMetadata;
+import org.openintents.openpgp.OpenPgpSignatureResult;
+
+public class DecryptVerifyResult extends OperationResultParcel {
+
+ // the fourth bit indicates a "data pending" result!
+ public static final int RESULT_PENDING = 8;
+
+ // fifth to sixth bit in addition indicate specific type of pending
+ public static final int RESULT_PENDING_ASYM_PASSPHRASE = RESULT_PENDING +16;
+ public static final int RESULT_PENDING_SYM_PASSPHRASE = RESULT_PENDING +32;
+ public static final int RESULT_PENDING_NFC = RESULT_PENDING +48;
+
+ long mKeyIdPassphraseNeeded;
+ byte[] mNfcSessionKey;
+
+ OpenPgpSignatureResult mSignatureResult;
+ OpenPgpMetadata mDecryptMetadata;
+
+ public long getKeyIdPassphraseNeeded() {
+ return mKeyIdPassphraseNeeded;
+ }
+
+ public void setKeyIdPassphraseNeeded(long keyIdPassphraseNeeded) {
+ mKeyIdPassphraseNeeded = keyIdPassphraseNeeded;
+ }
+
+ public void setNfcEncryptedSessionKey(byte[] sessionKey) {
+ mNfcSessionKey = sessionKey;
+ }
+
+ public byte[] getNfcEncryptedSessionKey() {
+ return mNfcSessionKey;
+ }
+
+ public OpenPgpSignatureResult getSignatureResult() {
+ return mSignatureResult;
+ }
+
+ public void setSignatureResult(OpenPgpSignatureResult signatureResult) {
+ mSignatureResult = signatureResult;
+ }
+
+ public OpenPgpMetadata getDecryptMetadata() {
+ return mDecryptMetadata;
+ }
+
+ public void setDecryptMetadata(OpenPgpMetadata decryptMetadata) {
+ mDecryptMetadata = decryptMetadata;
+ }
+
+ public boolean isPending() {
+ return (mResult & RESULT_PENDING) != 0;
+ }
+
+ public DecryptVerifyResult(int result, OperationLog log) {
+ super(result, log);
+ }
+
+ public DecryptVerifyResult(Parcel source) {
+ super(source);
+ mKeyIdPassphraseNeeded = source.readLong();
+ mSignatureResult = source.readParcelable(OpenPgpSignatureResult.class.getClassLoader());
+ mDecryptMetadata = source.readParcelable(OpenPgpMetadata.class.getClassLoader());
+ mNfcSessionKey = source.readInt() != 0 ? source.createByteArray() : null;
+ }
+
+ public int describeContents() {
+ return 0;
+ }
+
+ public void writeToParcel(Parcel dest, int flags) {
+ super.writeToParcel(dest, flags);
+ dest.writeLong(mKeyIdPassphraseNeeded);
+ dest.writeParcelable(mSignatureResult, 0);
+ dest.writeParcelable(mDecryptMetadata, 0);
+ if (mNfcSessionKey != null) {
+ dest.writeInt(1);
+ dest.writeByteArray(mNfcSessionKey);
+ } else {
+ dest.writeInt(0);
+ }
+ }
+
+ public static final Creator<DecryptVerifyResult> CREATOR = new Creator<DecryptVerifyResult>() {
+ public DecryptVerifyResult createFromParcel(final Parcel source) {
+ return new DecryptVerifyResult(source);
+ }
+
+ public DecryptVerifyResult[] newArray(final int size) {
+ return new DecryptVerifyResult[size];
+ }
+ };
+
+}