diff --git a/docs/AEADEncryptedDataPacket.html b/docs/AEADEncryptedDataPacket.html index 2d02f816..9a37f6d1 100644 --- a/docs/AEADEncryptedDataPacket.html +++ b/docs/AEADEncryptedDataPacket.html @@ -98,7 +98,7 @@ AEAD Protected Data Packet
Infinity
if the key doesn't expire, or null
if
Infinity
if the key doesn't expire, or null
if
Infinity
if the key doesn't expire, or null
if
Infinity
if the key doesn't expire, or null
if
read
on an empty PacketList instance.
read
on an empty PacketList instance.
read
on an empty PacketList instance.
read
on an empty PacketList instance.
read
on an empty PacketList instance.
decryptionKeys
, sessionkeys
or passwords<
Source:
-
- openpgp.js, line 327
+ openpgp.js, line 332
@@ -1735,7 +1735,9 @@ One of decryptionKeys
, sessionkeys
or passwords<
signature: Promise<Signature>
}, ...
]
-}
+}
+
+where `signatures` contains a separate entry for each signature packet found in the input message.
@@ -1994,7 +1996,7 @@ This method does not change the original key.
decryptionKeys
or passwords
must be specified.<
encryptionKeys
or passwords
must be sp
encryptionKeys
or passwords
must be sp
sign
parameter that default
sign
parameter that default
sign
parameter that default
sign
parameter that default
sign
parameter that default
sign
parameter that default
sign
parameter that default
sign
parameter that default
sign
parameter that default
sign
parameter that default
sign
parameter that default
Minimum RSA key size allowed for key generation and message signing, verification and encryption. +The default is 2047 since due to a bug, previous versions of OpenPGP.js could generate 2047-bit keys instead of 2048-bit ones.
+Minimum RSA key size allowed for key generation and message signing, verification and encryption
Reject non-standard curves for key generation, message encryption, signing or verification
+Name | + + +Type | + + + + + +Description | +
---|---|---|
rejectCurves |
+
+
+ + + +Set.<String> + + + + | + + + + + ++ |
Reject insecure public key algorithms for message encryption, signing or verification
+Reject insecure public key algorithms for key generation and message encryption, signing or verification
Whether to use the indutny/elliptic library for curves (other than Curve25519) that are not supported by the available native crypto API. +When false, certain standard curves will not be supported (depending on the platform). +Note: the indutny/elliptic curve library is not designed to be constant time.
+Whether to use the indutny/elliptic library. When false, certain curves will not be supported.