aboutsummaryrefslogtreecommitdiffstats
path: root/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/ui/SecurityTokenOperationActivity.java
diff options
context:
space:
mode:
authorNikita Mikhailov <nikita.s.mikhailov@gmail.com>2016-04-06 22:49:52 +0600
committerNikita Mikhailov <nikita.s.mikhailov@gmail.com>2016-04-14 22:48:01 +0600
commit5e18b15775f4c6d9c563d61a71143320620e968e (patch)
tree0bd9134a7fac20a517998abfe29540cf0469bad8 /OpenKeychain/src/main/java/org/sufficientlysecure/keychain/ui/SecurityTokenOperationActivity.java
parent79a0918072e2b4a01f328cb8d8d2a0a8761394f6 (diff)
downloadopen-keychain-5e18b15775f4c6d9c563d61a71143320620e968e.tar.gz
open-keychain-5e18b15775f4c6d9c563d61a71143320620e968e.tar.bz2
open-keychain-5e18b15775f4c6d9c563d61a71143320620e968e.zip
OTG: Rename 'javacard' package, methods, remove JavacardInterface
Diffstat (limited to 'OpenKeychain/src/main/java/org/sufficientlysecure/keychain/ui/SecurityTokenOperationActivity.java')
-rw-r--r--OpenKeychain/src/main/java/org/sufficientlysecure/keychain/ui/SecurityTokenOperationActivity.java36
1 files changed, 18 insertions, 18 deletions
diff --git a/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/ui/SecurityTokenOperationActivity.java b/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/ui/SecurityTokenOperationActivity.java
index 7e1474eb7..c68936577 100644
--- a/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/ui/SecurityTokenOperationActivity.java
+++ b/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/ui/SecurityTokenOperationActivity.java
@@ -162,7 +162,7 @@ public class SecurityTokenOperationActivity extends BaseSecurityTokenNfcActivity
case NFC_DECRYPT: {
for (int i = 0; i < mRequiredInput.mInputData.length; i++) {
byte[] encryptedSessionKey = mRequiredInput.mInputData[i];
- byte[] decryptedSessionKey = mJavacardDevice.decryptSessionKey(encryptedSessionKey);
+ byte[] decryptedSessionKey = mSmartcardDevice.decryptSessionKey(encryptedSessionKey);
mInputParcel.addCryptoData(encryptedSessionKey, decryptedSessionKey);
}
break;
@@ -173,15 +173,15 @@ public class SecurityTokenOperationActivity extends BaseSecurityTokenNfcActivity
for (int i = 0; i < mRequiredInput.mInputData.length; i++) {
byte[] hash = mRequiredInput.mInputData[i];
int algo = mRequiredInput.mSignAlgos[i];
- byte[] signedHash = mJavacardDevice.calculateSignature(hash, algo);
+ byte[] signedHash = mSmartcardDevice.calculateSignature(hash, algo);
mInputParcel.addCryptoData(hash, signedHash);
}
break;
}
case NFC_MOVE_KEY_TO_CARD: {
// TODO: assume PIN and Admin PIN to be default for this operation
- mJavacardDevice.setPin(new Passphrase("123456"));
- mJavacardDevice.setAdminPin(new Passphrase("12345678"));
+ mSmartcardDevice.setPin(new Passphrase("123456"));
+ mSmartcardDevice.setAdminPin(new Passphrase("12345678"));
ProviderHelper providerHelper = new ProviderHelper(this);
CanonicalizedSecretKeyRing secretKeyRing;
@@ -206,7 +206,7 @@ public class SecurityTokenOperationActivity extends BaseSecurityTokenNfcActivity
long keyGenerationTimestampMillis = key.getCreationTime().getTime();
long keyGenerationTimestamp = keyGenerationTimestampMillis / 1000;
byte[] timestampBytes = ByteBuffer.allocate(4).putInt((int) keyGenerationTimestamp).array();
- byte[] tokenSerialNumber = Arrays.copyOf(mJavacardDevice.getAid(), 16);
+ byte[] tokenSerialNumber = Arrays.copyOf(mSmartcardDevice.getAid(), 16);
Passphrase passphrase;
try {
@@ -218,25 +218,25 @@ public class SecurityTokenOperationActivity extends BaseSecurityTokenNfcActivity
if (key.canSign() || key.canCertify()) {
if (shouldPutKey(key.getFingerprint(), 0)) {
- mJavacardDevice.putKey(0xB6, key, passphrase);
- mJavacardDevice.putData(0xCE, timestampBytes);
- mJavacardDevice.putData(0xC7, key.getFingerprint());
+ mSmartcardDevice.putKey(0xB6, key, passphrase);
+ mSmartcardDevice.putData(0xCE, timestampBytes);
+ mSmartcardDevice.putData(0xC7, key.getFingerprint());
} else {
throw new IOException("Key slot occupied; token must be reset to put new signature key.");
}
} else if (key.canEncrypt()) {
if (shouldPutKey(key.getFingerprint(), 1)) {
- mJavacardDevice.putKey(0xB8, key, passphrase);
- mJavacardDevice.putData(0xCF, timestampBytes);
- mJavacardDevice.putData(0xC8, key.getFingerprint());
+ mSmartcardDevice.putKey(0xB8, key, passphrase);
+ mSmartcardDevice.putData(0xCF, timestampBytes);
+ mSmartcardDevice.putData(0xC8, key.getFingerprint());
} else {
throw new IOException("Key slot occupied; token must be reset to put new decryption key.");
}
} else if (key.canAuthenticate()) {
if (shouldPutKey(key.getFingerprint(), 2)) {
- mJavacardDevice.putKey(0xA4, key, passphrase);
- mJavacardDevice.putData(0xD0, timestampBytes);
- mJavacardDevice.putData(0xC9, key.getFingerprint());
+ mSmartcardDevice.putKey(0xA4, key, passphrase);
+ mSmartcardDevice.putData(0xD0, timestampBytes);
+ mSmartcardDevice.putData(0xC9, key.getFingerprint());
} else {
throw new IOException("Key slot occupied; token must be reset to put new authentication key.");
}
@@ -249,13 +249,13 @@ public class SecurityTokenOperationActivity extends BaseSecurityTokenNfcActivity
}
// change PINs afterwards
- mJavacardDevice.modifyPin(0x81, newPin);
- mJavacardDevice.modifyPin(0x83, newAdminPin);
+ mSmartcardDevice.modifyPin(0x81, newPin);
+ mSmartcardDevice.modifyPin(0x83, newAdminPin);
break;
}
case NFC_RESET_CARD: {
- mJavacardDevice.resetAndWipeToken();
+ mSmartcardDevice.resetAndWipeToken();
break;
}
@@ -330,7 +330,7 @@ public class SecurityTokenOperationActivity extends BaseSecurityTokenNfcActivity
}
private boolean shouldPutKey(byte[] fingerprint, int idx) throws IOException {
- byte[] tokenFingerprint = mJavacardDevice.getMasterKeyFingerprint(idx);
+ byte[] tokenFingerprint = mSmartcardDevice.getMasterKeyFingerprint(idx);
// Note: special case: This should not happen, but happens with
// https://github.com/FluffyKaon/OpenPGP-Card, thus for now assume true