aboutsummaryrefslogtreecommitdiffstats
path: root/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/pgp/CanonicalizedSecretKeyRing.java
diff options
context:
space:
mode:
authorVincent Breitmoser <valodim@mugenguild.com>2014-10-02 19:23:08 +0200
committerVincent Breitmoser <valodim@mugenguild.com>2014-10-02 19:26:07 +0200
commit37cb5c4c78880b5b4737cffdaa4ead76506a3843 (patch)
tree244b981b9475cbbdb021a85a5f7eab35b120c994 /OpenKeychain/src/main/java/org/sufficientlysecure/keychain/pgp/CanonicalizedSecretKeyRing.java
parent9a296c012d8aaaf4273892ad06a4f66ea4edefac (diff)
downloadopen-keychain-37cb5c4c78880b5b4737cffdaa4ead76506a3843.tar.gz
open-keychain-37cb5c4c78880b5b4737cffdaa4ead76506a3843.tar.bz2
open-keychain-37cb5c4c78880b5b4737cffdaa4ead76506a3843.zip
make getSignId a secret key operation, and respect unavailable keys
This one should remedy #811, but waiting for a test
Diffstat (limited to 'OpenKeychain/src/main/java/org/sufficientlysecure/keychain/pgp/CanonicalizedSecretKeyRing.java')
-rw-r--r--OpenKeychain/src/main/java/org/sufficientlysecure/keychain/pgp/CanonicalizedSecretKeyRing.java47
1 files changed, 12 insertions, 35 deletions
diff --git a/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/pgp/CanonicalizedSecretKeyRing.java b/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/pgp/CanonicalizedSecretKeyRing.java
index 48a2aaeb6..e20155cc6 100644
--- a/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/pgp/CanonicalizedSecretKeyRing.java
+++ b/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/pgp/CanonicalizedSecretKeyRing.java
@@ -30,6 +30,8 @@ import org.spongycastle.openpgp.operator.PBESecretKeyDecryptor;
import org.spongycastle.openpgp.operator.jcajce.JcePBESecretKeyDecryptorBuilder;
import org.sufficientlysecure.keychain.Constants;
import org.sufficientlysecure.keychain.pgp.exception.PgpGeneralException;
+import org.sufficientlysecure.keychain.provider.KeychainContract;
+import org.sufficientlysecure.keychain.provider.ProviderHelper;
import org.sufficientlysecure.keychain.util.IterableIterator;
import org.sufficientlysecure.keychain.util.Log;
@@ -74,43 +76,18 @@ public class CanonicalizedSecretKeyRing extends CanonicalizedKeyRing {
return new CanonicalizedSecretKey(this, mRing.getSecretKey(id));
}
- /** Getter that returns the subkey that should be used for signing. */
- CanonicalizedSecretKey getSigningSubKey() throws PgpGeneralException {
- PGPSecretKey key = mRing.getSecretKey(getSignId());
- if(key != null) {
- CanonicalizedSecretKey cKey = new CanonicalizedSecretKey(this, key);
- if(!cKey.canSign()) {
- throw new PgpGeneralException("key error");
+ /** Returns the key id which should be used for signing.
+ *
+ * This method returns keys which are actually available (ie. secret available, and not stripped,
+ * revoked, or expired), hence only works on keyrings where a secret key is available!
+ */
+ public long getSecretSignId() throws PgpGeneralException {
+ for(CanonicalizedSecretKey key : secretKeyIterator()) {
+ if (key.canSign() && key.isValid() && key.getSecretKeyType().isUsable()) {
+ return key.getKeyId();
}
- return cKey;
- }
- // TODO handle with proper exception
- throw new PgpGeneralException("no signing key available");
- }
-
- public boolean hasPassphrase() {
- PGPSecretKey secretKey = null;
- boolean foundValidKey = false;
- for (Iterator keys = mRing.getSecretKeys(); keys.hasNext(); ) {
- secretKey = (PGPSecretKey) keys.next();
- if (!secretKey.isPrivateKeyEmpty()) {
- foundValidKey = true;
- break;
- }
- }
- if(!foundValidKey) {
- return false;
- }
-
- try {
- PBESecretKeyDecryptor keyDecryptor = new JcePBESecretKeyDecryptorBuilder()
- .setProvider("SC").build("".toCharArray());
- PGPPrivateKey testKey = secretKey.extractPrivateKey(keyDecryptor);
- return testKey == null;
- } catch(PGPException e) {
- // this means the crc check failed -> passphrase required
- return true;
}
+ throw new PgpGeneralException("no valid signing key available");
}
public IterableIterator<CanonicalizedSecretKey> secretKeyIterator() {