@@ -24,7 +24,10 @@ import com.oblador.keychain.decryptionHandler.DecryptionResultHandlerProvider
24
24
import com.oblador.keychain.exceptions.CryptoFailedException
25
25
import com.oblador.keychain.exceptions.EmptyParameterException
26
26
import com.oblador.keychain.exceptions.KeyStoreAccessException
27
+ import kotlinx.coroutines.CoroutineScope
28
+ import kotlinx.coroutines.Dispatchers
27
29
import java.util.concurrent.TimeUnit
30
+ import kotlinx.coroutines.launch
28
31
29
32
@ReactModule(name = KeychainModule .KEYCHAIN_MODULE )
30
33
@Suppress(" unused" )
@@ -123,6 +126,9 @@ class KeychainModule(reactContext: ReactApplicationContext) :
123
126
/* * Shared preferences storage. */
124
127
private val prefsStorage: PrefsStorage
125
128
129
+ /* * Launches a coroutine to perform non-blocking UI operations */
130
+ private val mainCoroutineScope = CoroutineScope (Dispatchers .Default )
131
+
126
132
// endregion
127
133
// region Initialization
128
134
/* * Default constructor. */
@@ -184,26 +190,29 @@ class KeychainModule(reactContext: ReactApplicationContext) :
184
190
options : ReadableMap ? ,
185
191
promise : Promise
186
192
) {
187
- try {
188
- throwIfEmptyLoginPassword(username, password)
189
- val level = getSecurityLevelOrDefault(options)
190
- val storage = getSelectedStorage(options)
191
- throwIfInsufficientLevel(storage, level)
192
- val result = storage.encrypt(alias, username, password, level)
193
- prefsStorage.storeEncryptedEntry(alias, result)
194
- val results = Arguments .createMap()
195
- results.putString(Maps .SERVICE , alias)
196
- results.putString(Maps .STORAGE , storage.getCipherStorageName())
197
- promise.resolve(results)
198
- } catch (e: EmptyParameterException ) {
199
- Log .e(KEYCHAIN_MODULE , e.message, e)
200
- promise.reject(Errors .E_EMPTY_PARAMETERS , e)
201
- } catch (e: CryptoFailedException ) {
202
- Log .e(KEYCHAIN_MODULE , e.message, e)
203
- promise.reject(Errors .E_CRYPTO_FAILED , e)
204
- } catch (fail: Throwable ) {
205
- Log .e(KEYCHAIN_MODULE , fail.message, fail)
206
- promise.reject(Errors .E_UNKNOWN_ERROR , fail)
193
+ mainCoroutineScope.launch {
194
+ try {
195
+ throwIfEmptyLoginPassword(username, password)
196
+ val level = getSecurityLevelOrDefault(options)
197
+ val storage = getSelectedStorage(options)
198
+ throwIfInsufficientLevel(storage, level)
199
+
200
+ val result = storage.encrypt(alias, username, password, level)
201
+ prefsStorage.storeEncryptedEntry(alias, result)
202
+ val results = Arguments .createMap()
203
+ results.putString(Maps .SERVICE , alias)
204
+ results.putString(Maps .STORAGE , storage.getCipherStorageName())
205
+ promise.resolve(results)
206
+ } catch (e: EmptyParameterException ) {
207
+ Log .e(KEYCHAIN_MODULE , e.message, e)
208
+ promise.reject(Errors .E_EMPTY_PARAMETERS , e)
209
+ } catch (e: CryptoFailedException ) {
210
+ Log .e(KEYCHAIN_MODULE , e.message, e)
211
+ promise.reject(Errors .E_CRYPTO_FAILED , e)
212
+ } catch (fail: Throwable ) {
213
+ Log .e(KEYCHAIN_MODULE , fail.message, fail)
214
+ promise.reject(Errors .E_UNKNOWN_ERROR , fail)
215
+ }
207
216
}
208
217
}
209
218
@@ -237,21 +246,22 @@ class KeychainModule(reactContext: ReactApplicationContext) :
237
246
}
238
247
239
248
private fun getGenericPassword (alias : String , options : ReadableMap ? , promise : Promise ) {
240
- try {
241
- val resultSet = prefsStorage.getEncryptedEntry(alias)
242
- if (resultSet == null ) {
243
- Log .e(KEYCHAIN_MODULE , " No entry found for service: $alias " )
244
- promise.resolve(false )
245
- return
246
- }
247
- val storageName = resultSet.cipherStorageName
248
- val rules = getSecurityRulesOrDefault(options)
249
- val promptInfo = getPromptInfo(options)
250
- var cipher: CipherStorage ? = null
251
-
252
- // Only check for upgradable ciphers for FacebookConseal as that
253
- // is the only cipher that can be upgraded
254
- cipher =
249
+ mainCoroutineScope.launch {
250
+ try {
251
+ val resultSet = prefsStorage.getEncryptedEntry(alias)
252
+ if (resultSet == null ) {
253
+ Log .e(KEYCHAIN_MODULE , " No entry found for service: $alias " )
254
+ promise.resolve(false )
255
+ return @launch
256
+ }
257
+ val storageName = resultSet.cipherStorageName
258
+ val rules = getSecurityRulesOrDefault(options)
259
+ val promptInfo = getPromptInfo(options)
260
+ var cipher: CipherStorage ? = null
261
+
262
+ // Only check for upgradable ciphers for FacebookConseal as that
263
+ // is the only cipher that can be upgraded
264
+ cipher =
255
265
if (rules == Rules .AUTOMATIC_UPGRADE && storageName == KnownCiphers .FB ) {
256
266
// get the best storage
257
267
val accessControl = getAccessControlOrDefault(options)
@@ -260,22 +270,23 @@ class KeychainModule(reactContext: ReactApplicationContext) :
260
270
} else {
261
271
getCipherStorageByName(storageName)
262
272
}
263
- val decryptionResult = decryptCredentials(alias, cipher!! , resultSet, rules, promptInfo)
264
- val credentials = Arguments .createMap()
265
- credentials.putString(Maps .SERVICE , alias)
266
- credentials.putString(Maps .USERNAME , decryptionResult.username)
267
- credentials.putString(Maps .PASSWORD , decryptionResult.password)
268
- credentials.putString(Maps .STORAGE , cipher.getCipherStorageName())
269
- promise.resolve(credentials)
270
- } catch (e: KeyStoreAccessException ) {
271
- Log .e(KEYCHAIN_MODULE , e.message!! )
272
- promise.reject(Errors .E_KEYSTORE_ACCESS_ERROR , e)
273
- } catch (e: CryptoFailedException ) {
274
- Log .e(KEYCHAIN_MODULE , e.message!! )
275
- promise.reject(Errors .E_CRYPTO_FAILED , e)
276
- } catch (fail: Throwable ) {
277
- Log .e(KEYCHAIN_MODULE , fail.message, fail)
278
- promise.reject(Errors .E_UNKNOWN_ERROR , fail)
273
+ val decryptionResult = decryptCredentials(alias, cipher!! , resultSet, rules, promptInfo)
274
+ val credentials = Arguments .createMap()
275
+ credentials.putString(Maps .SERVICE , alias)
276
+ credentials.putString(Maps .USERNAME , decryptionResult.username)
277
+ credentials.putString(Maps .PASSWORD , decryptionResult.password)
278
+ credentials.putString(Maps .STORAGE , cipher.getCipherStorageName())
279
+ promise.resolve(credentials)
280
+ } catch (e: KeyStoreAccessException ) {
281
+ Log .e(KEYCHAIN_MODULE , e.message!! )
282
+ promise.reject(Errors .E_KEYSTORE_ACCESS_ERROR , e)
283
+ } catch (e: CryptoFailedException ) {
284
+ Log .e(KEYCHAIN_MODULE , e.message!! )
285
+ promise.reject(Errors .E_CRYPTO_FAILED , e)
286
+ } catch (fail: Throwable ) {
287
+ Log .e(KEYCHAIN_MODULE , fail.message, fail)
288
+ promise.reject(Errors .E_UNKNOWN_ERROR , fail)
289
+ }
279
290
}
280
291
}
281
292
0 commit comments