aboutsummaryrefslogtreecommitdiffstats
path: root/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/pgp
Commit message (Collapse)AuthorAgeFilesLines
* ssh authentication supportHEADmasterhsm2016-05-292-7/+84
|
* Fix license headerDominik Schürmann2016-05-251-3/+0
|
* Slight changes for consistencyAlex Fong2016-05-161-1/+1
|
* Shifted duplicate method implementations from KeyRing to openpgp-api submoduleAlex Fong2016-05-151-45/+5
|
* Fix license headerDominik Schürmann2016-05-121-0/+18
|
* update progress handling in PgpDecryptVerifyOperationVincent Breitmoser2016-05-111-38/+26
| | | | | | | | - less progress messages overall - report progress again based on input stream position, if filesize is known - limit progress messages to one every 200ms while decrypting - also fixed a bug in DecryptListFragment, the recycler view now reuses old views as intended instead of crossfading all the time.
* PgpSignEncryptOperation refactoringAndrea Torlaschi2016-05-104-246/+414
|
* Edited commentsAlex Fong2016-05-051-2/+2
|
* Refactoring: Removed PassphraseChangeParcel and placed its functionality ↵Alex Fong2016-05-051-84/+76
| | | | into ChangeUnlockParcel.
* Removed unrequired code, standardized terms used.Alex Fong2016-05-051-7/+11
|
* Refactored code to use functions already present in code, reduced liberties ↵Alex Fong2016-05-051-0/+29
| | | | | | | taken when modifying functions. Todo: Fix indentation for error messages
* (WIP) Change password when key is stripped #1692Alex Fong2016-05-041-6/+66
| | | | | | | | | | | Approach: Find the first unstripped secret key and use it for passphrase verification All unstripped keys will have their passphrase changed to new passphrase, if possible. Current Progress: Changing the passphrase of keys works fine. Refactoring to combine "modifySecretKeyring" and newly added method, "modifyKeyRingPassword" may be possible if given the go-ahead.
* Fix createUserIdDominik Schürmann2016-04-291-1/+1
|
* Merge pull request #1819 from 007durgesh219/Issue#1817Dominik Schürmann2016-04-292-22/+18
|\ | | | | Fix Crash when no encryption subkey is available, Issue #1817
| * Fix Crash when no encryption subkey is available, Issue #1817Durgesh2016-04-142-22/+18
| | | | | | | | Signed-off-by: Durgesh <007durgesh219@gmail.com>
* | Use StringBuilder.append() according to lintDominik Schürmann2016-04-291-2/+6
| |
* | Merge pull request #1816 from fiaxh/no_name_choose_emailDominik Schürmann2016-04-291-1/+10
|\ \ | | | | | | Correctly handle keys only having an email address
| * | Better handle user_id sidecases while splittingfiaxh2016-04-121-1/+10
| |/
* | Merge pull request #1831 from fiaxh/key_creation_flexibleDominik Schürmann2016-04-291-8/+10
|\ \ | | | | | | Handle user input on key creation more generously
| * | Handle user input on key creation more generouslyfiaxh2016-04-151-8/+10
| |/ | | | | | | | | Allow empty name and do not regex-check email fixes #1825
* | api: allow caching of sessionKey in OpenPgpDecryptResultVincent Breitmoser2016-04-292-34/+68
| |
* | Update obsolete Nfc class prefixesNikita Mikhailov2016-04-164-9/+9
|/
* get rid of code path for pin and notation data handlingVincent Breitmoser2016-03-232-92/+63
|
* Fix K-9 stable: OpenPGP: Unknown compression algorithm #1752Durgesh2016-03-061-1/+7
| | | | Signed-off-by: Durgesh <007durgesh219@gmail.com>
* ditch isLikelyText flag, set mimeType to text/plain in that caseVincent Breitmoser2016-02-231-11/+7
|
* move CharsetVerifier to utils packageVincent Breitmoser2016-02-231-1/+1
|
* documentation and cleanupVincent Breitmoser2016-02-221-1/+1
|
* decryptVerify: use CharsetVerifier to guess whether data is binary or notVincent Breitmoser2016-02-221-10/+19
|
* externalize CharsetVerifier, add looksLikeText to OpenPgpMetadata objectVincent Breitmoser2016-02-221-11/+8
|
* Backup format v2: redesign restore dialogDominik Schürmann2016-02-101-1/+1
|
* Backup format v2: redesigned backup code fragment with masked edit textDominik Schürmann2016-02-101-1/+1
|
* Merge branch 'master' into performanceVincent Breitmoser2016-02-1018-175/+176
|\
| * Replace spongycastle with bouncycastleDominik Schürmann2016-02-0917-164/+164
| |
* | performance: add license headers and some documentationVincent Breitmoser2016-02-103-9/+46
| |
* | performance: use more canonical hashCode implementationVincent Breitmoser2016-02-051-4/+4
| |
* | performance: avoid expensive getSecretKeyType call, use cached where possibleVincent Breitmoser2016-02-054-93/+86
| |
* | performance: cache session keys per compatible S2K configurationVincent Breitmoser2016-02-053-4/+116
|/
* import: handle FileNotFoundException (fixes #1688)Vincent Breitmoser2016-02-011-1/+0
|
* Always revoke subkeys with a revocation signature.KB Sriram2016-01-151-12/+33
| | | | | | | | | | | | | | | Unlike UID revocations which are "reversible" by newer UID self-signatures, a subkey revocation should be "permanent" even if followed by a newer self-signature. The RFC is ambiguous on this, but this is the convention used by (e.g.) GnuPG. The rationale for this behaviour is available as comments within the GnuPG source. UID signatures: https://github.com/mtigas/gnupg/blob/50c98c7ed6b542857ee2f902eca36cda37407737/g10/getkey.c#L1668-L1674 Subkey signatures: https://github.com/mtigas/gnupg/blob/50c98c7ed6b542857ee2f902eca36cda37407737/g10/getkey.c#L1990-L1997
* Error out when editing a stripped keyDominik Schürmann2016-01-111-1/+6
|
* Use more generic 'Security Token' where possible, add sutitle to create key ↵Dominik Schürmann2016-01-101-26/+26
| | | | what tokens are supported
* Update spongycastle to 1.53Dominik Schürmann2015-12-223-4/+6
|
* api: add micalg result extra to detached signature api callVincent Breitmoser2015-12-171-0/+8
|
* fix delete file securely method and use for delete original fileVincent Breitmoser2015-11-151-41/+4
|
* decrypt: skip all encountered marker packets (fix #1582)Vincent Breitmoser2015-11-151-8/+8
|
* Merge commit '816dce0334e8b8d9da3cb00d31d26033b17040a3'Vincent Breitmoser2015-11-131-1/+15
|\
| * import: apply fixPgpMessage to text for import from clipboardVincent Breitmoser2015-11-061-1/+15
| |
* | decrypt: skip unavailable and unsuitable keysVincent Breitmoser2015-11-131-0/+12
|/
* bench: simple working benchmarkVincent Breitmoser2015-11-042-16/+24
|
* bench: add benchmark operation for testingVincent Breitmoser2015-11-041-1/+10
|