107 lines
4.6 KiB
Java
107 lines
4.6 KiB
Java
/*
|
|
* Copyright (C) 2017 Schürmann & Breitmoser GbR
|
|
*
|
|
* This program is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
package org.sufficientlysecure.keychain.operations;
|
|
|
|
|
|
import android.content.Context;
|
|
import android.net.Uri;
|
|
import android.support.annotation.NonNull;
|
|
|
|
import org.sufficientlysecure.keychain.Constants;
|
|
import org.sufficientlysecure.keychain.operations.results.EditKeyResult;
|
|
import org.sufficientlysecure.keychain.operations.results.OperationResult;
|
|
import org.sufficientlysecure.keychain.operations.results.RevokeResult;
|
|
import org.sufficientlysecure.keychain.pgp.Progressable;
|
|
import org.sufficientlysecure.keychain.pgp.exception.PgpKeyNotFoundException;
|
|
import org.sufficientlysecure.keychain.provider.CachedPublicKeyRing;
|
|
import org.sufficientlysecure.keychain.provider.KeyWritableRepository;
|
|
import org.sufficientlysecure.keychain.provider.KeychainContract;
|
|
import org.sufficientlysecure.keychain.service.RevokeKeyringParcel;
|
|
import org.sufficientlysecure.keychain.service.SaveKeyringParcel;
|
|
import org.sufficientlysecure.keychain.service.input.CryptoInputParcel;
|
|
import org.sufficientlysecure.keychain.ui.util.KeyFormattingUtils;
|
|
import org.sufficientlysecure.keychain.util.Log;
|
|
|
|
public class RevokeOperation extends BaseReadWriteOperation<RevokeKeyringParcel> {
|
|
|
|
public RevokeOperation(Context context, KeyWritableRepository databaseInteractor, Progressable progressable) {
|
|
super(context, databaseInteractor, progressable);
|
|
}
|
|
|
|
@NonNull
|
|
@Override
|
|
public OperationResult execute(RevokeKeyringParcel revokeKeyringParcel,
|
|
CryptoInputParcel cryptoInputParcel) {
|
|
|
|
// we don't cache passphrases during revocation
|
|
cryptoInputParcel = cryptoInputParcel.withNoCachePassphrase();
|
|
|
|
long masterKeyId = revokeKeyringParcel.getMasterKeyId();
|
|
|
|
OperationResult.OperationLog log = new OperationResult.OperationLog();
|
|
log.add(OperationResult.LogType.MSG_REVOKE, 0,
|
|
KeyFormattingUtils.beautifyKeyId(masterKeyId));
|
|
|
|
try {
|
|
|
|
Uri secretUri = KeychainContract.KeyRings.buildUnifiedKeyRingUri(masterKeyId);
|
|
CachedPublicKeyRing keyRing = mKeyRepository.getCachedPublicKeyRing(secretUri);
|
|
|
|
// check if this is a master secret key we can work with
|
|
switch (keyRing.getSecretKeyType(masterKeyId)) {
|
|
case GNU_DUMMY:
|
|
log.add(OperationResult.LogType.MSG_EK_ERROR_DUMMY, 1);
|
|
return new RevokeResult(RevokeResult.RESULT_ERROR, log, masterKeyId);
|
|
}
|
|
|
|
SaveKeyringParcel.Builder saveKeyringParcel =
|
|
SaveKeyringParcel.buildChangeKeyringParcel(masterKeyId, keyRing.getFingerprint());
|
|
|
|
// all revoke operations are made atomic as of now
|
|
saveKeyringParcel.setUpdateOptions(revokeKeyringParcel.isShouldUpload(), true,
|
|
revokeKeyringParcel.getKeyserver());
|
|
|
|
saveKeyringParcel.addRevokeSubkey(masterKeyId);
|
|
|
|
EditKeyResult revokeAndUploadResult = new EditKeyOperation(mContext,
|
|
mKeyWritableRepository, mProgressable, mCancelled).execute(
|
|
saveKeyringParcel.build(), cryptoInputParcel);
|
|
|
|
if (revokeAndUploadResult.isPending()) {
|
|
return revokeAndUploadResult;
|
|
}
|
|
|
|
log.add(revokeAndUploadResult, 1);
|
|
|
|
if (revokeAndUploadResult.success()) {
|
|
log.add(OperationResult.LogType.MSG_REVOKE_OK, 1);
|
|
return new RevokeResult(RevokeResult.RESULT_OK, log, masterKeyId);
|
|
} else {
|
|
log.add(OperationResult.LogType.MSG_REVOKE_ERROR_KEY_FAIL, 1);
|
|
return new RevokeResult(RevokeResult.RESULT_ERROR, log, masterKeyId);
|
|
}
|
|
|
|
} catch (PgpKeyNotFoundException | KeyWritableRepository.NotFoundException e) {
|
|
Log.e(Constants.TAG, "could not find key to revoke", e);
|
|
log.add(OperationResult.LogType.MSG_REVOKE_ERROR_KEY_FAIL, 1);
|
|
return new RevokeResult(RevokeResult.RESULT_ERROR, log, masterKeyId);
|
|
}
|
|
}
|
|
|
|
}
|