Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: openpgpjs/openpgpjs
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: v5.9.0
Choose a base ref
...
head repository: openpgpjs/openpgpjs
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: v5.10.0
Choose a head ref
  • 14 commits
  • 73 files changed
  • 3 contributors

Commits on Jul 10, 2023

  1. Support parsing encrypted key with unknown s2k types or cipher algos (#…

    …1658)
    
    Such keys are still capable of encryption and signature verification.
    This change is relevant for forward compatibility of v4 keys encrypted using e.g. argon2.
    larabr authored Jul 10, 2023
    Configuration menu
    Copy the full SHA
    d72cece View commit details
    Browse the repository at this point in the history
  2. Fix verification of detached signatures that include unknown signatur…

    …e packet versions
    
    Relevant for forward compatibility when verifying detached signatures
    that include e.g. v4 and v6 packets
    larabr committed Jul 10, 2023
    Configuration menu
    Copy the full SHA
    de2ffaf View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    9ed1135 View commit details
    Browse the repository at this point in the history
  4. Fix parsing of messages with unsupported SKESK s2k type

    These messages should still be decrypt-able if they include at least one
    supported ESK packet.
    larabr committed Jul 10, 2023
    Configuration menu
    Copy the full SHA
    f5b5b73 View commit details
    Browse the repository at this point in the history
  5. Fix parsing of ECDH with unknown KDFParam version

    Keys with such subkeys should still be usable, as long as they have
    a supported primary key.
    larabr committed Jul 10, 2023
    Configuration menu
    Copy the full SHA
    32caf41 View commit details
    Browse the repository at this point in the history
  6. Merge pull request #1656

    Fix forward compatibility of keys, SKESKs, and detached/cleartext signatures and ECDH.
    
    Relevant for forward compatibility when:
    - verifying **detached** or cleartext signatures that include e.g. v4 and v6 packets.
      Non-detached signatures are not affected.
    - parsing messages with sym. encrypted session keys (SKESK) that rely on unsupported S2K types (e.g. argon2)
    - parsing keys that include ECDH subkeys with unknown KDF params version
      (e.g. end-to-end encrypted forwarding use-case)
    larabr authored Jul 10, 2023
    Configuration menu
    Copy the full SHA
    b6170aa View commit details
    Browse the repository at this point in the history

Commits on Jul 13, 2023

  1. crypto-refresh: add support for new Ed25519 key and signature format

    This addition is backwards compatible. We offer no way to generate v4 keys in the new format.
    larabr committed Jul 13, 2023
    Configuration menu
    Copy the full SHA
    3f44082 View commit details
    Browse the repository at this point in the history

Commits on Jul 25, 2023

  1. crypto-refresh: add support for new X25519 key and PKESK format

    As specified in openpgp-crypto-refresh-09.
    
    Instead of encoding the symmetric key algorithm in the PKESK ciphertext (requiring padding),
    the symmetric key algorithm is left unencrypted.
    
    Co-authored-by: Lukas Burkhalter <lukas.burkhalter@proton.ch>
    larabr and lubux committed Jul 25, 2023
    Configuration menu
    Copy the full SHA
    1c07d26 View commit details
    Browse the repository at this point in the history
  2. Enforce AES with PKESK v3 using x25519 (new format)

    Fail on PKESK parsing as well as session key generation and encryption
    larabr committed Jul 25, 2023
    Configuration menu
    Copy the full SHA
    ee4ad89 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    ef953ce View commit details
    Browse the repository at this point in the history
  4. Internal: rename Curves to CurvesWithOID

    Following the addition of the new format for Montgomery curves,
    which do not rely on OIDs.
    larabr committed Jul 25, 2023
    Configuration menu
    Copy the full SHA
    b164190 View commit details
    Browse the repository at this point in the history
  5. CI: test on iOS Safari 14 instead of 15 to have access to SubtleCrypto

    SubtleCrypto not available in the latter due to stricter secure context checks
    larabr committed Jul 25, 2023
    Configuration menu
    Copy the full SHA
    5ae2846 View commit details
    Browse the repository at this point in the history

Commits on Jul 26, 2023

  1. Merge pull request #1620

    Add support for new Ed25519/X25519 keys, signatures and messages,
    as per crypto-refresh document.
    larabr authored Jul 26, 2023
    Configuration menu
    Copy the full SHA
    8d4dd34 View commit details
    Browse the repository at this point in the history

Commits on Aug 29, 2023

  1. 5.10.0

    larabr committed Aug 29, 2023
    Configuration menu
    Copy the full SHA
    4df86e5 View commit details
    Browse the repository at this point in the history
Loading