Commit Graph

  • 34d8588bc4 Throw when parsing v6 keys using legacy curve25519 larabr 2023-09-26 15:30:44 +02:00
  • 6b13b7b0fa Default to generating new curve25519 format for v6 keys larabr 2023-09-26 15:36:14 +02:00
  • 740a772be5 addSubkey: match primary key version larabr 2023-09-26 19:23:30 +02:00
  • 97433cbb73 Drop enums.publicKey.eddsa in favour of enums.publicKey.eddsaLegacy larabr 2023-09-07 19:36:42 +02:00
  • c3b0cd7485 Support generating Curve448 and Curve25519 keys (new format) larabr 2023-09-07 19:34:44 +02:00
  • d78cfd3c0e Rename values of enums.curve.{curve, ed}25519Legacy from '{curve. ed}25519' to '{curve. ed}25519Legacy' larabr 2023-10-20 17:16:04 +02:00
  • 091fd72156 Prevent generating v6 keys using legacy curve25519 larabr 2023-09-26 15:31:24 +02:00
  • 83481f3c7a Throw when parsing v6 keys using legacy curve25519 larabr 2023-09-26 15:30:44 +02:00
  • eaceb3b933 Default to generating new curve25519 format for v6 keys larabr 2023-09-26 15:36:14 +02:00
  • 8697d9f2bd addSubkey: match primary key version larabr 2023-09-26 19:23:30 +02:00
  • 3d0e66d5c2 Drop enums.publicKey.eddsa in favour of enums.publicKey.eddsaLegacy larabr 2023-09-07 19:36:42 +02:00
  • 946b0cc180 Support generating Curve448 and Curve25519 keys (new format) larabr 2023-09-07 19:34:44 +02:00
  • e9ba20defb Throw on unexpected param sizes in secret keys, session keys and signatures larabr 2023-10-03 13:36:05 +02:00
  • fdff8e0b00 Run npm audit larabr 2023-09-29 22:21:43 +02:00
  • 6abdb61827 Update Curve448 tests using inputs from gopenpgp larabr 2023-08-23 12:22:47 +02:00
  • c68da1b374 Internal: refactor uint8ArrayToHex for performance and to avoid branching larabr 2023-03-30 13:27:16 +02:00
  • c6c6309803 crypto-refresh: add support for X448 larabr 2023-03-30 15:35:50 +02:00
  • e1395e33e5 crypto-refresh: add support for Ed448 larabr 2023-03-28 19:26:40 +02:00
  • e0c1e8c430 Throw on unexpected param sizes in secret keys, session keys and signatures larabr 2023-10-03 13:36:05 +02:00
  • a541e64b22 Run npm audit larabr 2023-09-29 22:21:43 +02:00
  • bb4d3b18d9 Update Curve448 tests using inputs from gopenpgp larabr 2023-08-23 12:22:47 +02:00
  • e51a50ab16 Internal: refactor uint8ArrayToHex for performance and to avoid branching larabr 2023-03-30 13:27:16 +02:00
  • 94602ace73 crypto-refresh: add support for X448 larabr 2023-03-30 15:35:50 +02:00
  • 940cb5fc02 crypto-refresh: add support for Ed448 larabr 2023-03-28 19:26:40 +02:00
  • 42aea29990 Disregard config.aeadProtect when encrypting to public keys (#1678) larabr 2023-10-19 14:22:31 +02:00
  • 824a5b2d20 [v6] Fix parsing of v6 signatures with unknown hash algorithm (#1683) larabr 2023-09-25 20:04:56 +02:00
  • 4e2dfa504b Add SHA-3 signature support (#1680) Ryan 2023-09-25 05:17:21 -04:00
  • d61ad889e8 Remove unused enums.symmetric.plaintext larabr 2023-09-11 13:57:02 +02:00
  • e24a59c2e9 Add SEIP.fromObject larabr 2023-08-28 15:31:00 +02:00
  • aee6254f37 Add PKESK.fromObject larabr 2023-08-07 21:45:50 +02:00
  • de8e9a8277 Only emit Hash header below V6 for cleartext messages Lukas Burkhalter 2023-06-08 10:05:01 +02:00
  • 7af7693832 Accept cleartext messages without hash header Lukas Burkhalter 2023-06-01 16:24:38 +02:00
  • 8f9b719454 Add support for v6 one-pass signature packets Lukas Burkhalter 2023-06-01 15:18:43 +02:00
  • 8c1e2ff46f Implement packet criticality check larabr 2023-07-25 11:41:20 +02:00
  • f92ead7b2d Support AEAD encryption for v4 and v6 private keys larabr 2023-04-06 18:00:14 +02:00
  • 8157224a8a Appease linter Daniel Huigens 2023-04-06 11:57:50 +02:00
  • 22fedc5976 Throw intelligible error on GCM authentication failure, fix/refactor test for modification detection on decryption larabr 2023-04-05 00:53:04 +02:00
  • e4aba977d1 When decrypting a v6 PKESK in constant-time, use the v2 SEIPD algorithm Daniel Huigens 2023-03-18 00:30:30 +01:00
  • fa28c8313a Add support for PKESK v6 Daniel Huigens 2023-03-17 18:41:34 +01:00
  • 4cc548b15e Look up preferred ciphersuite in one go Daniel Huigens 2023-03-16 18:17:26 +01:00
  • 6016aaacec Support SKESK v6 as per the latest crypto refresh Daniel Huigens 2022-12-14 18:08:01 +01:00
  • 3f689e727a Implement Padding Packet Daniel Huigens 2022-12-14 13:30:53 +01:00
  • 330f0c4bc7 Implement SEIPD v2 Daniel Huigens 2022-12-13 17:30:29 +01:00
  • e943d6e945 Remove armor checksum check Daniel Huigens 2022-12-13 15:04:07 +01:00
  • 251061e1d7 For v6 keys, check direct-key signature for key properties Daniel Huigens 2022-12-06 14:33:10 +01:00
  • fd1b58cd9c Update fallback (mandatory) AEAD algorithm to OCB Daniel Huigens 2022-12-06 19:32:27 +01:00
  • 086e539f69 Tests: update expected algorithm preferences Daniel Huigens 2022-12-06 14:33:42 +01:00
  • f0245d72bf Remove compression algorithms from preferences Daniel Huigens 2022-12-06 12:43:02 +01:00
  • 4927f34ffa Don't generate armor checksum lines Daniel Huigens 2022-11-30 17:48:06 +01:00
  • 86eca6011e Remove AES-192 from preferred symmetric algorithms Daniel Huigens 2022-12-06 13:22:09 +01:00
  • a681f53831 Add preferred ciphersuites subpacket Daniel Huigens 2022-03-02 18:50:40 +01:00
  • 2b9ff562e2 Add (non-experimental) GCM Daniel Huigens 2022-03-02 18:17:16 +01:00
  • 162a2f26e5 Generate SEIPD v2 flag instead of AEAD flag Daniel Huigens 2022-03-02 17:18:44 +01:00
  • ea9dfd78f3 Don't require User IDs for v6 keys Daniel Huigens 2022-03-02 17:17:49 +01:00
  • ebd34e9ddd For v6 keys, create direct-key signature for key properties Daniel Huigens 2022-03-02 17:16:58 +01:00
  • 41190e8fe7 Rename enums.signatureSubpacket.issuer to .issuerKeyID larabr 2023-08-31 16:00:11 +02:00
  • 481b967ff8 Only parse Issuer Key ID subpacket in v4 signatures larabr 2023-08-31 15:24:44 +02:00
  • a3cbea36ab Add support for v6 signatures Daniel Huigens 2023-03-15 19:28:52 +01:00
  • bcb202dc01 Replace config.v5Keys with config.v6Keys flag Daniel Huigens 2023-03-15 19:37:55 +01:00
  • 8e6bc94521 Add support for v6 key packets Daniel Huigens 2023-03-15 18:39:19 +01:00
  • 91356a9f44 HKDF: remove fallback for Node 14 larabr 2023-07-27 12:28:27 +02:00
  • 0d88eae0eb Set Node 16 as minimum supported version in package.json larabr 2023-07-27 12:31:02 +02:00
  • c775959aca Replace internal BigInteger code with that from noble-hashes larabr 2023-06-21 11:55:44 +02:00
  • f04bbf96a2 Lint: update config to support ESM imports larabr 2023-06-20 14:23:08 +02:00
  • ec286fe6e8 Replace hash.js with noble-hashes larabr 2023-06-20 13:44:23 +02:00
  • 137995c10a Drop config.minBytesForWebCrypto larabr 2023-06-20 13:13:48 +02:00
  • 30db682b02 Tests: update sinon larabr 2023-06-01 16:28:45 +02:00
  • 6960368473 CI: test all Node.js version even if some fail larabr 2023-05-31 16:31:52 +02:00
  • c020f831d0 Add time benchmark test for streamed sign (testing hashing performance) larabr 2023-05-31 10:38:18 +02:00
  • bb81f6f80e Use WebCrypto for streamed CFB encryption; for CFB/GCM/EAX, fallback to asmcrypto only if key size is not supported larabr 2023-05-30 22:19:00 +02:00
  • 8c5a10a6e2 Update asmcrypto.js, use for AES only (move to noble-hashes for sha1, sha256) larabr 2023-05-30 18:14:01 +02:00
  • 6e4fa9d190 Replace pako with fflate as compression lib larabr 2023-05-31 15:47:36 +02:00
  • bb12f51473 Fix streaming tests for browser, drop NodeReadableStream tests in Node.js larabr 2023-05-17 19:20:22 +02:00
  • 5cccb35c40 Remove @private JSDoc directives interfering with TS larabr 2023-05-17 13:42:25 +02:00
  • 83e10659fd Tests: explicitly share openpgp instance used in tests larabr 2023-06-02 14:12:14 +02:00
  • bdd24424e9 Update to Mocha v10 in tests, declare lib as module and add exports to package.json larabr 2023-05-09 18:45:46 +02:00
  • ebdf2784d8 CI: drop Node 14 larabr 2023-04-04 14:32:39 +02:00
  • d828f51c13 crypto-refresh: add support for Argon2 S2K (#1597) larabr 2023-04-04 14:22:13 +02:00
  • 12b341faeb CI: temporarily enable for PRs to v6 branch larabr 2023-04-03 17:52:21 +02:00
  • 65c8e87332 Use globalThis for setting test helper functions globals Daniel Huigens 2022-09-02 22:24:54 +02:00
  • 6e4d0377bf Update ESLint globals syntax Daniel Huigens 2022-09-02 22:24:11 +02:00
  • c5995230b4 Remove embedded Web Streams ponyfill Daniel Huigens 2022-09-02 22:20:33 +02:00
  • 4cd1531215 Update web-stream-tools Daniel Huigens 2023-04-03 15:45:23 +02:00
  • fe420d0bf9 Rename enums.curve.x25519Legacy to .curve25519Legacy larabr 2023-10-19 15:41:02 +02:00
  • f9fd76156f
    Update docs larabr 2023-10-17 17:09:20 +02:00
  • 410dbcf1d5
    Fix Node 20 tests: always use NodeCrypto over WebCrypto (#1692) larabr 2023-10-12 10:10:28 +02:00
  • 04e5617b38 Fix Node 20 tests: always use NodeCrypto over WebCrypto larabr 2023-10-11 17:57:19 +02:00
  • 96d6e76c05
    Fix stream closure when using Node's stream.pipeline (#1691) larabr 2023-10-11 17:30:36 +02:00
  • cab2ee3644 Use exact version larabr 2023-10-11 14:17:42 +02:00
  • 6e6cab90f3 Fix stream closure when using Node's stream.pipeline larabr 2023-10-11 12:58:21 +02:00
  • ed482a17c5
    Merge pull request #1687 larabr 2023-10-10 13:06:09 +02:00
  • 99ba76c695 Add enums.curve.ed25519Legacy and .x25519Legacy larabr 2023-10-03 18:47:39 +02:00
  • a12ca976a0 Reject signatures with hash digest shorter than 256-bit for ed25519 larabr 2023-10-03 18:07:49 +02:00
  • c0f57dffb2 Do not clamp generated private key in X25519 (new format) larabr 2023-09-29 16:13:31 +02:00
  • b6fbab0443 Internally use createSignaturePacket helper whenever possible larabr 2023-09-29 13:00:44 +02:00
  • 1fd9d2f0c5 Fix binding signature generation using shorter hash than expected for some ECDSA subkeys larabr 2023-09-29 12:58:51 +02:00
  • 01b02d6092 Always select SHA-256 or longer hash for Ed25519 signatures (new format) larabr 2023-09-28 19:58:35 +02:00
  • 5b283550b7 Add enums.publicKey.eddsaLegacy larabr 2023-09-28 19:21:24 +02:00
  • 62ce628706 Uniform error thrown during hashing larabr 2023-09-25 18:25:16 +02:00
  • 18c87930ed Fix comment [skip ci] larabr 2023-09-25 13:13:35 +02:00