mobile/android/base/browserid/BrowserIDKeyPair.java

Tue, 06 Jan 2015 21:39:09 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Tue, 06 Jan 2015 21:39:09 +0100
branch
TOR_BUG_9701
changeset 8
97036ab72558
permissions
-rw-r--r--

Conditionally force memory storage according to privacy.thirdparty.isolate;
This solves Tor bug #9701, complying with disk avoidance documented in
https://www.torproject.org/projects/torbrowser/design/#disk-avoidance.

     1 /* This Source Code Form is subject to the terms of the Mozilla Public
     2  * License, v. 2.0. If a copy of the MPL was not distributed with this
     3  * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
     5 package org.mozilla.gecko.browserid;
     7 import org.mozilla.gecko.sync.ExtendedJSONObject;
     9 public class BrowserIDKeyPair {
    10   public static final String JSON_KEY_PRIVATEKEY = "privateKey";
    11   public static final String JSON_KEY_PUBLICKEY = "publicKey";
    13   protected final SigningPrivateKey privateKey;
    14   protected final VerifyingPublicKey publicKey;
    16   public BrowserIDKeyPair(SigningPrivateKey privateKey, VerifyingPublicKey publicKey) {
    17     this.privateKey = privateKey;
    18     this.publicKey = publicKey;
    19   }
    21   public SigningPrivateKey getPrivate() {
    22     return this.privateKey;
    23   }
    25   public VerifyingPublicKey getPublic() {
    26     return this.publicKey;
    27   }
    29   public ExtendedJSONObject toJSONObject() {
    30     ExtendedJSONObject o = new ExtendedJSONObject();
    31     o.put(JSON_KEY_PRIVATEKEY, privateKey.toJSONObject());
    32     o.put(JSON_KEY_PUBLICKEY, publicKey.toJSONObject());
    33     return o;
    34   }
    35 }

mercurial