| Commit message (Collapse) | Author | Age | Files | Lines |
| |
|
|\ |
|
| |
| |
| |
| | |
-implementation of "--sign-key"
-partial implementation of exchanging/verifying keys via QR Code
|
| |
| |
| |
| | |
-moving all org.bouncycastl2.* dependencies to Sponcy Castle instead.
This way multiple people dont need to maintain rebased versions of BC
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
Since AIDL is not for passing large data, a blob can be passed to APG by
a Uri. This Uri is opened as a file by APG and read/written to. Note the
file is overwritten by APG, so make sure it is a copy if you want to
keep the original.
With the ApgServiceBlobProvider, Apg has an own ContentProvider that can
be used like mentioned above. For now the data is stored in the dir
where APG stores other files and NOT DELETED after en/decryption. This
is tbd. It can only be accessed by an application with the permission
"org.thialfihar.android.apg.permission.STORE_BLOBS".
ApgCon has been updated accordingly and can handle blobs with `setBlob`
and `getBlobResult`. That is a really easy way to en/decrypt large data.
Note that encrypting by blob should only be used for large files (1MB+).
On all other cases, the data should be passed as as String through the
AIDl-Interface, so no temporary file must be created.
See ApgCon for a complete example of how to connect to the AIDL and use
it. Or use it in your own project!
|
|/
|
|
|
|
|
| |
https://github.com/rtyley/spongycastle
It replaces bouncycastle2. Looks like a cleaner and better integration. A
precompiled .jar ist in the "lib/"-dir.
|
| |
|
|
|
|
| |
preparations to test thread-pausing during decryption/encryption to deal with certain situations, mainly an unknown signature key
|
|
|
|
|
|
|
| |
prevent such keys from getting imported, so the error message should never be encountered anyway
Fixes issue 66
|
|
|
|
|
|
|
|
| |
id look up Intent for the key server query
Update issue 9
Status: Fixed
Added public key update via key server. Considering this issue fixed now. More key server features will be added, but general support is added.
|
|
|
|
|
| |
Update issue 9
Key server preference added.
|
|
|
|
|
| |
Update issue 9
Can search a key server now, touch a result to import the key. Still needs better error handling and some Intents to import keys based on key ID. Also still need key server preferences.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
basics and recommending other apps
Update issue 39
Added:
<string name="title_help">Getting Started</string>
<string name="menu_help">Help</string>
<!-- "OI File Manager", "ASTRO", and "K-9 Mail" must NOT be translated in order for the links to the market to work. -->
<string name="text_help">Install K-9 Mail for the best integration, it supports APG for PGP/INLINE and lets you directly encrypt/decrypt emails.
\n\nIt is recommended that you install OI File Manager or ASTRO to be able to use the browse button for file selection in APG.
\n\nFirst you need some keys. Either import them via the option menus in \"Manage Public Keys\" and \"Manage Secret Keys\" or create them in \"Manage Secret Keys\".
\n\nYou can also add a GMail account in the main activity via \"Add Account\", which simplifies decrypting emails received there.
\n\nCheck out the option menus in the various activities to find more functions.
</string>
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
actual deletion
Update issue 56
Added a method for secure file deletion. We'll possibly have to test this a bit and make sure it actually *is* secure on the filesystems used (vfat for SD card, yaffs2 for phone flash memory by default). This sort of overwrite might be absolutely useless on some filesystems.
I also wanted to add an option at first, but this seems reasonably fast and in general it should be what the user wants, so for now it will ALWAYS securely delete. If there is a demand for plain deletion, then options can be added.
Update issue 39
A new string:
<string name="progress_deletingSecurely">deleting \'%s\' securely...</string>
|
| |
|
|
|
|
| |
encryption and decryption (String, byte[], filename, content stream), also more Intent options added
|
|
|
|
| |
it over
|
|
|
|
| |
keyboard are pressed
|
|
|
|
| |
them to other APG Activities after looking at the content of the passed data
|
|
|
|
| |
cleaned up a bit, preparing to use the database there as well
|
|
|
|
| |
KeyRing, Key, and UserId tables
|
|
|
|
| |
decryption to change the default when a file requires it
|
| |
|
|
|
|
| |
strings into string.xml in preparation for internationalization, APG.java still has to be changed to allow that, as it isn't Context aware in most methods
|
|
|
|
| |
DecryptActivity as well
|
| |
|
|
|
|
| |
their own layout now with proper linkification
|
|
|
|
| |
longer delete the output file if either fails
|
|
|
|
| |
use symmetric OR asymmetric again, layout and string adjustments
|
| |
|
|
|
|
| |
structure as well
|
|
|
|
| |
asymmetric file encryption working, some more cleanup, introduced an application directory to encrypt to by default
|
|
IDs into Id in a similar structure as the generated R, also introducing a BaseActivity class that almost all activities derive from, which generates some common dialogs, handles the progress update, thread management, and thread communication
also adding first draft of encrypt file activity, not very functional yet
|