aboutsummaryrefslogtreecommitdiffstats
path: root/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/keyimport
diff options
context:
space:
mode:
authorVincent Breitmoser <valodim@mugenguild.com>2014-09-15 14:00:17 +0200
committerVincent Breitmoser <valodim@mugenguild.com>2014-09-15 14:00:17 +0200
commite457d4c9097cb3f2e1c6305609cfacff1c5c38c2 (patch)
tree9d6410b554b68aca6aa49539e045e9db5d703cbf /OpenKeychain/src/main/java/org/sufficientlysecure/keychain/keyimport
parent9a3a032d99064cd16ca065a214d8f7fd09d54088 (diff)
parent40751bceb586d12da671966c1ad5661223819c5b (diff)
downloadopen-keychain-e457d4c9097cb3f2e1c6305609cfacff1c5c38c2.tar.gz
open-keychain-e457d4c9097cb3f2e1c6305609cfacff1c5c38c2.tar.bz2
open-keychain-e457d4c9097cb3f2e1c6305609cfacff1c5c38c2.zip
Merge remote-tracking branch 'origin/master'
Conflicts: OpenKeychain/src/main/java/org/sufficientlysecure/keychain/pgp/UncachedKeyRing.java OpenKeychain/src/main/res/values-de/strings.xml
Diffstat (limited to 'OpenKeychain/src/main/java/org/sufficientlysecure/keychain/keyimport')
-rw-r--r--OpenKeychain/src/main/java/org/sufficientlysecure/keychain/keyimport/CloudSearch.java90
-rw-r--r--OpenKeychain/src/main/java/org/sufficientlysecure/keychain/keyimport/HkpKeyserver.java2
-rw-r--r--OpenKeychain/src/main/java/org/sufficientlysecure/keychain/keyimport/ImportKeysList.java95
-rw-r--r--OpenKeychain/src/main/java/org/sufficientlysecure/keychain/keyimport/ImportKeysListEntry.java23
-rw-r--r--OpenKeychain/src/main/java/org/sufficientlysecure/keychain/keyimport/KeybaseKeyserver.java4
-rw-r--r--OpenKeychain/src/main/java/org/sufficientlysecure/keychain/keyimport/Keyserver.java16
6 files changed, 219 insertions, 11 deletions
diff --git a/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/keyimport/CloudSearch.java b/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/keyimport/CloudSearch.java
new file mode 100644
index 000000000..27d826c59
--- /dev/null
+++ b/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/keyimport/CloudSearch.java
@@ -0,0 +1,90 @@
+/*
+ * Copyright (C) 2014 Tim Bray <tbray@textuality.com>
+ *
+ * This program is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 3 of the License, or
+ * (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program. If not, see <http://www.gnu.org/licenses/>.
+ */
+package org.sufficientlysecure.keychain.keyimport;
+
+import org.sufficientlysecure.keychain.Constants;
+import org.sufficientlysecure.keychain.helper.Preferences;
+import org.sufficientlysecure.keychain.util.Log;
+
+import java.util.ArrayList;
+import java.util.Vector;
+
+/**
+ * Search two or more types of server for online keys.
+ */
+public class CloudSearch {
+
+ private final static long SECONDS = 1000;
+
+ public static ArrayList<ImportKeysListEntry> search(final String query, Preferences.CloudSearchPrefs cloudPrefs)
+ throws Keyserver.CloudSearchFailureException {
+ final ArrayList<Keyserver> servers = new ArrayList<Keyserver>();
+
+ // it's a Vector for sync, multiple threads might report problems
+ final Vector<Keyserver.CloudSearchFailureException> problems = new Vector<Keyserver.CloudSearchFailureException>();
+
+ if (cloudPrefs.searchKeyserver) {
+ servers.add(new HkpKeyserver(cloudPrefs.keyserver));
+ }
+ if (cloudPrefs.searchKeybase) {
+ servers.add(new KeybaseKeyserver());
+ }
+ final ImportKeysList results = new ImportKeysList(servers.size());
+
+ for (final Keyserver keyserver : servers) {
+ Runnable r = new Runnable() {
+ @Override
+ public void run() {
+ try {
+ results.addAll(keyserver.search(query));
+ } catch (Keyserver.CloudSearchFailureException e) {
+ problems.add(e);
+ }
+ results.finishedAdding(); // notifies if all searchers done
+ }
+ };
+ new Thread(r).start();
+ }
+
+ // wait for either all the searches to come back, or 10 seconds
+ synchronized(results) {
+ try {
+ results.wait(10 * SECONDS);
+ } catch (InterruptedException e) {
+ }
+ }
+
+ if (results.outstandingSuppliers() > 0) {
+ String message = "Launched " + servers.size() + " cloud searchers, but" +
+ results.outstandingSuppliers() + "failed to complete.";
+ problems.add(new Keyserver.QueryFailedException(message));
+ }
+
+ if (!problems.isEmpty()) {
+ for (Keyserver.CloudSearchFailureException e : problems) {
+ Log.d(Constants.TAG, "Cloud search exception: " + e.getLocalizedMessage());
+ }
+
+ // only throw exception if we didn’t get any results
+ if (results.isEmpty()) {
+ throw problems.get(0);
+ }
+ }
+
+ return results;
+ }
+}
diff --git a/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/keyimport/HkpKeyserver.java b/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/keyimport/HkpKeyserver.java
index c4c12cd3a..a6f1334ea 100644
--- a/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/keyimport/HkpKeyserver.java
+++ b/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/keyimport/HkpKeyserver.java
@@ -278,7 +278,7 @@ public class HkpKeyserver extends Keyserver {
while (matcher.find()) {
final ImportKeysListEntry entry = new ImportKeysListEntry();
entry.setQuery(query);
- entry.setOrigin(getUrlPrefix() + mHost + ":" + mPort);
+ entry.addOrigin(getUrlPrefix() + mHost + ":" + mPort);
int bitSize = Integer.parseInt(matcher.group(3));
entry.setBitStrength(bitSize);
diff --git a/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/keyimport/ImportKeysList.java b/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/keyimport/ImportKeysList.java
new file mode 100644
index 000000000..15bcd8576
--- /dev/null
+++ b/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/keyimport/ImportKeysList.java
@@ -0,0 +1,95 @@
+/*
+ * Copyright (C) 2014 Tim Bray <tbray@textuality.com>
+ *
+ * This program is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 3 of the License, or
+ * (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program. If not, see <http://www.gnu.org/licenses/>.
+ */
+package org.sufficientlysecure.keychain.keyimport;
+
+import java.util.ArrayList;
+import java.util.Collection;
+
+/**
+ * Just an ArrayList, only with a synchronized dupe-merging add/addAll, and a sign-off method
+ */
+public class ImportKeysList extends ArrayList<ImportKeysListEntry> {
+
+ private int mSupplierCount;
+
+ public ImportKeysList(int supplierCount) {
+ mSupplierCount = supplierCount;
+ }
+
+ @Override
+ public boolean add(ImportKeysListEntry toAdd) {
+ addOrMerge(toAdd);
+ return true; // that’s what the ArrayList#add contract says
+ }
+
+ @Override
+ public boolean addAll(Collection<? extends ImportKeysListEntry> addThese) {
+ boolean modified = false;
+ for (ImportKeysListEntry toAdd : addThese) {
+ modified = addOrMerge(toAdd) || modified;
+ }
+ return modified;
+ }
+
+ // NOTE: side-effects
+ // NOTE: synchronized
+ private synchronized boolean addOrMerge(ImportKeysListEntry toAdd) {
+ for (ImportKeysListEntry existing : this) {
+ if (toAdd.hasSameKeyAs(existing)) {
+ return mergeDupes(toAdd, existing);
+ }
+ }
+ return super.add(toAdd);
+ }
+
+ // being a little anal about the ArrayList#addAll contract here
+ private boolean mergeDupes(ImportKeysListEntry incoming, ImportKeysListEntry existing) {
+ boolean modified = false;
+ if (incoming.isRevoked()) {
+ existing.setRevoked(true);
+ modified = true;
+ }
+ if (incoming.isExpired()) {
+ existing.setExpired(true);
+ modified = true;
+ }
+ for (String origin : incoming.getOrigins()) {
+ existing.addOrigin(origin);
+ }
+ ArrayList<String> incomingIDs = incoming.getUserIds();
+ ArrayList<String> existingIDs = existing.getUserIds();
+ for (String incomingID : incomingIDs) {
+ if (!existingIDs.contains(incomingID)) {
+ existingIDs.add(incomingID);
+ modified = true;
+ }
+ }
+ return modified;
+ }
+
+ // NOTE: synchronized
+ public synchronized void finishedAdding() {
+ mSupplierCount--;
+ if (mSupplierCount == 0) {
+ this.notify();
+ }
+ }
+
+ public int outstandingSuppliers() {
+ return mSupplierCount;
+ }
+}
diff --git a/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/keyimport/ImportKeysListEntry.java b/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/keyimport/ImportKeysListEntry.java
index da70f1505..b3df67c0c 100644
--- a/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/keyimport/ImportKeysListEntry.java
+++ b/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/keyimport/ImportKeysListEntry.java
@@ -46,7 +46,7 @@ public class ImportKeysListEntry implements Serializable, Parcelable {
private String mPrimaryUserId;
private String mExtraData;
private String mQuery;
- private String mOrigin;
+ private ArrayList<String> mOrigins;
private Integer mHashCode = null;
private boolean mSelected;
@@ -70,7 +70,7 @@ public class ImportKeysListEntry implements Serializable, Parcelable {
dest.writeByte((byte) (mSecretKey ? 1 : 0));
dest.writeByte((byte) (mSelected ? 1 : 0));
dest.writeString(mExtraData);
- dest.writeString(mOrigin);
+ dest.writeStringList(mOrigins);
}
public static final Creator<ImportKeysListEntry> CREATOR = new Creator<ImportKeysListEntry>() {
@@ -90,7 +90,8 @@ public class ImportKeysListEntry implements Serializable, Parcelable {
vr.mSecretKey = source.readByte() == 1;
vr.mSelected = source.readByte() == 1;
vr.mExtraData = source.readString();
- vr.mOrigin = source.readString();
+ vr.mOrigins = new ArrayList<String>();
+ source.readStringList(vr.mOrigins);
return vr;
}
@@ -107,6 +108,13 @@ public class ImportKeysListEntry implements Serializable, Parcelable {
return super.hashCode();
}
+ public boolean hasSameKeyAs(Object o) {
+ if (mFingerprintHex == null || o == null || !(o instanceof ImportKeysListEntry)) {
+ return false;
+ }
+ return mFingerprintHex.equals(((ImportKeysListEntry) o).mFingerprintHex);
+ }
+
public String getKeyIdHex() {
return mKeyIdHex;
}
@@ -223,12 +231,12 @@ public class ImportKeysListEntry implements Serializable, Parcelable {
mQuery = query;
}
- public String getOrigin() {
- return mOrigin;
+ public ArrayList<String> getOrigins() {
+ return mOrigins;
}
- public void setOrigin(String origin) {
- mOrigin = origin;
+ public void addOrigin(String origin) {
+ mOrigins.add(origin);
}
/**
@@ -240,6 +248,7 @@ public class ImportKeysListEntry implements Serializable, Parcelable {
// do not select by default
mSelected = false;
mUserIds = new ArrayList<String>();
+ mOrigins = new ArrayList<String>();
}
/**
diff --git a/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/keyimport/KeybaseKeyserver.java b/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/keyimport/KeybaseKeyserver.java
index cbd06da90..0a55fccc8 100644
--- a/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/keyimport/KeybaseKeyserver.java
+++ b/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/keyimport/KeybaseKeyserver.java
@@ -63,7 +63,9 @@ public class KeybaseKeyserver extends Keyserver {
private ImportKeysListEntry makeEntry(Match match) throws KeybaseException {
final ImportKeysListEntry entry = new ImportKeysListEntry();
entry.setQuery(mQuery);
- entry.setOrigin(ORIGIN);
+ entry.addOrigin(ORIGIN);
+
+ entry.setRevoked(false); // keybase doesn’t say anything about revoked keys
String username = match.getUsername();
String fullName = match.getFullName();
diff --git a/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/keyimport/Keyserver.java b/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/keyimport/Keyserver.java
index b726529f8..5e4bd0b70 100644
--- a/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/keyimport/Keyserver.java
+++ b/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/keyimport/Keyserver.java
@@ -24,7 +24,19 @@ import java.io.InputStream;
import java.util.List;
public abstract class Keyserver {
- public static class QueryFailedException extends Exception {
+
+ public static class CloudSearchFailureException extends Exception {
+ private static final long serialVersionUID = 2703768928624654515L;
+
+ public CloudSearchFailureException(String message) {
+ super(message);
+ }
+ public CloudSearchFailureException() {
+ super();
+ }
+ }
+
+ public static class QueryFailedException extends CloudSearchFailureException {
private static final long serialVersionUID = 2703768928624654512L;
public QueryFailedException(String message) {
@@ -32,7 +44,7 @@ public abstract class Keyserver {
}
}
- public static class QueryNeedsRepairException extends Exception {
+ public static class QueryNeedsRepairException extends CloudSearchFailureException {
private static final long serialVersionUID = 2693768928624654512L;
}