Thomas Oberndörfer
5eca11ca5b
Set signature feature subpacket depending on config.integrity_protect flag
2014-03-29 15:39:26 +01:00
Thomas Oberndörfer
1c818f2410
OP-01-006 Generated keys have no stored algorithm preference (Medium). Set preferences for symmetric, hash and compression algorithms. Fix preferred_compression_algorithms subpacket reading.
2014-03-28 21:39:54 +01:00
Thomas Oberndörfer
28e7a80eba
OP-01-011 Error suppression in UTF-8 decoding function (Medium). Add check for parameter type to decode_utf8.
2014-03-21 18:32:05 +01:00
Thomas Oberndörfer
93ca8b62fe
OP-01-019 Cleartext Message Spoofing in Armor Headers (Critical). Fix: throw error if unknown ASCII armor type.
2014-03-21 16:11:48 +01:00
Thomas Oberndörfer
329c92bc73
OP-01-009 Cleartext Messages Spoofing by Lax Armor Headers parsing (Critical). Add armor header verification. Verify "Hash" header in cleartext signed message.
2014-03-21 15:37:52 +01:00
Thomas Oberndörfer
22e4540ed9
OP-01-007 Algorithm Preferences ignored upon Encryption (Low)
2014-03-18 17:45:15 +01:00
Thomas Oberndörfer
9f23c6a891
OP-01-005 Side-channel leak in RSA decryption (High). Add config option for RSA blinding, default true. Update jsbn to 1.3. Remove decrypted packets after Message.decrypt().
2014-03-17 11:54:40 +01:00
Tankred Hase
7cba2be2fc
Merge pull request #179 from toberndo/keyring_enh
...
Refactoring keyring, Key update method, Fixes
2014-02-27 11:04:25 +01:00
Thomas Oberndörfer
1dfdfb62cb
Keyring: simplify API, accept 16 char hex or fingerprint as keyid.
2014-02-26 11:45:03 +01:00
Tankred Hase
3d423655c4
reduce memory allocations in aes block cipher, optimize performance test
2014-02-26 00:20:46 +01:00
Tankred Hase
01a0a218c7
update becnhmark test
2014-02-25 13:19:41 +01:00
Tankred Hase
49ac4e6816
add performance test
2014-02-25 10:30:57 +01:00
Thomas Oberndörfer
7bdbb58266
Update keyring unit tests
2014-02-23 20:52:52 +01:00
Thomas Oberndörfer
e71a897d8a
Add unit tests for key update
2014-02-23 20:52:03 +01:00
Thomas Oberndörfer
151694ff07
Write unhashed subpackets. Fix #178 .
2014-02-23 20:51:02 +01:00
Eason Goodale
7ca8414fc8
The keys seem to have been generated with 'whiteout.test@t-online.de'
2014-02-06 04:43:00 -08:00
Eason Goodale
bb4057af7d
Keyring test should ensure that it's actually getting a key when it uses a valid address
2014-02-06 04:36:57 -08:00
Thomas Oberndörfer
f00f4a9582
Merge branch 'key_enh'
2014-02-06 12:46:24 +01:00
Thomas Oberndörfer
b1e8c9ec52
Add unit tests for getExpirationTime Key method
2014-02-06 12:28:36 +01:00
Thomas Oberndörfer
191eca353e
Merge branch 'pr/170'
2014-02-06 12:23:47 +01:00
Thomas Oberndörfer
d46ef40390
Add unit test for custom localstorage item name
2014-02-06 12:20:52 +01:00
Thomas Oberndörfer
b3a5597ab9
Merge pull request #169 from openpgpjs/subkey_revocation
...
Verify subkey revocation signatures according to: RFC4880 Errata ID: 3298
2014-02-06 11:41:30 +01:00
Thomas Oberndörfer
a9c9f78dd4
Verify subkey revocation signatures according to: http://www.rfc-editor.org/errata_search.php?rfc=4880&eid=3298
2014-02-04 17:44:22 +01:00
Thomas Oberndörfer
57849437d9
Fix isValidEncryptionKeyPacket function: access key flags by index
2014-02-04 15:51:47 +01:00
Tankred Hase
01469be87f
Merge pull request #163 from MarcoPolo/master
...
Fixed keyring local storage
2014-02-02 09:14:44 -08:00
Tankred Hase
95db18eb4a
Add unit test to catch #156 and fix it
2014-01-31 14:03:59 +01:00
Marco Munizaga
875ccf5196
Fixed keyring local storage
2014-01-31 02:26:57 -05:00
Tankred Hase
bf46ff3c9d
fix tests
2014-01-10 20:46:31 +01:00
Robert Nelson
92adbff398
Changed comparison in window check
2014-01-09 08:22:57 -08:00
Robert Nelson
4cabe075d5
Add standalone support
2014-01-09 07:31:00 -08:00
Robert Nelson
9f4e6e7ebb
Add files missed in last commit
2014-01-09 02:47:57 -08:00
Robert Nelson
57c98386f9
Add node.js support
2014-01-08 09:01:15 -08:00
Robert Nelson
0c6b345ba8
Refactor classes
2014-01-05 10:13:25 -08:00
Robert Nelson
28ba64c11d
Eliminate previous ci tests.
...
Merge ci keyring tests to unittests, the other ci tests just duplicate other unit tests.
Change Makefile to just run grunt and npm tasks.
2014-01-04 11:09:29 -08:00
Robert Nelson
0a23d056c0
Finish crypto/cipher tests, disable subkey revocation tests
2014-01-03 22:46:37 -08:00
Robert Nelson
db80459cf1
Merge branch 'master' into chai-mocha-port
2014-01-03 13:51:49 -08:00
Robert Nelson
3beb4ac0ad
Started porting crypto tests
2014-01-03 08:10:50 -08:00
Robert Nelson
e5e1675615
Port general tests to chai/mocha
2014-01-02 19:47:04 -08:00
Robert Nelson
17ad1f5fed
More documentation fixes
2013-12-26 22:49:37 -08:00
Robert Nelson
e891d81e17
Merge upstream/devel changes
2013-12-22 13:01:24 -08:00
Robert Nelson
8923813580
Fix jsdoc generation and make keyring multiple instance.
...
Add jsdoc @module definitions.
Fix references to old class names.
Make keyring a multiple instance module.
Eliminate unit test dependency on running npm test.
2013-12-22 12:39:11 -08:00
Thomas Oberndörfer
b27b01905b
Refactoring Key class to use structured data. Transform key from-to packetlist.
...
Add User and SubKey class. Verification methods for key components.
2013-12-20 18:19:11 +01:00
Thomas Oberndörfer
1ca90a980c
Support multiple keys per ASCII armored block. Unify error handling: replace print_error function
...
with exceptions. The idea is to use exceptions internally, but catch them in the high level API
functions and return errors as implemented in openpgp.key.readArmored.
2013-12-17 16:09:52 +01:00
Thomas Oberndörfer
d7d74ec5e3
Verify V3 certification signatures
2013-12-12 14:22:23 +01:00
Thomas Oberndörfer
ff8d93f956
Fix key expiration time. Add key revocation unit test.
2013-12-12 12:05:00 +01:00
Thomas Oberndörfer
d22facc61c
Remove CP-1252 cleartext signature unit-test
2013-12-09 19:33:30 +01:00
Thomas Oberndörfer
5fd4bdbccb
Fix make bundle-test and keyring unit-tests
2013-12-09 16:57:44 +01:00
Robert Nelson
1c07c482aa
Create a bundle for keyring and split out the store code
2013-12-08 20:54:25 -08:00
Robert Nelson
bfba0eca0c
Changed unitttests and keyring to use bundled openpgp and updated keyring to use openpgp.key instead of packetlists.
...
Added getUserIds() to key.
Reenabled keyring ci tests.
2013-12-08 15:41:31 -08:00
Thomas Oberndörfer
5d32718096
Normalize end of line, add getter and setter for text in literal data packet.
2013-12-08 14:24:52 +01:00
Robert Nelson
f57de1ec40
Unit tests passing
2013-12-06 09:56:05 -08:00
Thomas Oberndörfer
f6176ed484
Move key generation to Key class
2013-12-04 16:45:14 +01:00
Thomas Oberndörfer
7e711510cc
Implement cleartext signed messages
2013-12-02 20:11:21 +01:00
Thomas Oberndörfer
89eb5dff2a
Rename attribute for data of armored message from .openpgp to .data
2013-12-02 11:27:14 +01:00
Thomas Oberndörfer
c2a79368dc
Add verify method to message class and other improvements. Implement openpgp.decryptAndVerifyMessage. Allow parsing of unhashed signature subpackets.
2013-11-30 17:29:20 +01:00
Thomas Oberndörfer
b0ea97ec28
Make packet tests run. Rename test files, move signature tests to general folder.
...
Split keyring tests in own file. Add tests for V3 signatures and fix verification.
2013-11-26 18:30:17 +01:00
Thomas Oberndörfer
66c428da7e
Fix key generation: use primary key for subkey binding signature. On signing all signature subpacket data
...
is written to the hashed subpacket data section. This allows to set e.g. key flags on certification signatures.
2013-11-26 10:35:41 +01:00
Thomas Oberndörfer
22ad0d3505
Implement signAndEncryptMessage function. Fix packet_one_pass_signature.write().
2013-11-19 16:30:41 +01:00
Thomas Oberndörfer
93376b6e13
Add decryptKeyPacket to key class. Used to decrypt specific key
...
packets and replacing the unlock mechanism. Decrypt method of packet_secret_key
returns boolean to indicate successful decryption. Add config to util class
and cleanup comments. Update tests.
2013-11-19 13:50:14 +01:00
Thomas Oberndörfer
c051eacf36
Introduce unlock method for keys: passphrase is set as attribute of key and used
...
to decrypt required secret key packets on demand. Directly access config module in armor.js.
Key method getPrivateKeyPacket returns key packets by ID (optionally decrypted).
Message method decrypt returns new message with packetlist of decrypted message.
Add CRLF conversion to literal data packet. Packetlist: make filterByTag variadic,
add findPacket method. Keep state isDecrypted in secret key packet, don't decrypt
if already decrypted. Add mapToHex method to keyid. Simplify emailRegEx.
2013-11-16 22:08:42 +01:00
Thomas Oberndörfer
1be6b8b858
Remove keyring from openpgp namespace. Optimize keyid initialization.
2013-10-24 12:19:46 +02:00
Thomas Oberndörfer
b544343c63
Further clean up in message and key class. Make tests run.
2013-10-22 20:15:05 +02:00
Thomas Oberndörfer
b1c9eb71d2
Refactoring message and key class. Implement decryptMessage.
2013-10-21 20:51:46 +02:00
seancolyer
91070f9750
Changing main api to be more key dependent
2013-10-18 21:46:38 -04:00
seancolyer
7cfa0ab705
Cleanup, creating armor enums
2013-10-18 21:18:38 -04:00
seancolyer
fae321a1e3
Further test work, make keyring marginally work. Start end-to-end work.
2013-10-08 21:54:40 -04:00
Michal Kolodziej
664ab71686
Switch to browserify. Basic unit tests are working.
2013-05-11 21:55:48 +02:00
Michal Kolodziej
18236ac097
A ton of changes regarding browserify support. Non functional as of now.
2013-05-11 16:03:25 +02:00
Michal Kolodziej
c64c75bf04
Merged public and secret keys where appropriate.
2013-05-10 19:09:24 +02:00
Michal Kolodziej
77acb5a59a
Working signature creation.
2013-05-09 16:51:25 +02:00
Michal Kolodziej
1e49e8ee23
Encryption of secret key packets is working.
2013-05-09 14:25:09 +02:00
Michal Kolodziej
945fa0ba51
Reading/decryption/signature verification side is working.
2013-05-09 09:37:12 +02:00
Michal Kolodziej
ab31b39d2f
Signature verification on primary key is working!
2013-05-09 09:31:50 +02:00
Michal Kolodziej
ba68203b56
Changed up the verification api - it accepts multiple packets now.
2013-05-08 23:11:57 +02:00
Michal Kolodziej
e1e2223e8f
Signature verification is working on literal packets.
2013-05-08 13:04:25 +02:00
Michal Kolodziej
dd5d0c801c
Secret key packet decryption is working though, there
...
is still work to be done in the decryption function
as it's quite a mess still.
2013-04-27 18:14:57 +02:00
Michal Kolodziej
03382cbec1
Made sym key and s2k writable.
2013-04-27 16:15:07 +02:00
Michal Kolodziej
a115cccc53
Fixed s2k implementation somewhat.
2013-04-26 18:54:41 +02:00
Michal Kolodziej
1f9bc46a81
Encryption to a subkey from a GPG generated message is working.
...
Still no decryption and keys are transmitted in plaintext!
2013-04-26 15:48:19 +02:00
Michal Kolodziej
6fe166fa87
Reading of unencrypted secret key packets seems to be working.
2013-04-25 17:28:43 +02:00
Michal Kolodziej
530a9a0c69
Changed mpi interface to a more sane variant - openpgp
...
methods MUST return openpgp_type_mpi, using BigIntegers
is prohibited as otherwise the wrapper has no point.
2013-04-24 10:46:43 +02:00
Michal Kolodziej
6d45a19f88
Public key encrypted sesssion key is working.
2013-04-24 09:08:55 +02:00
Michal Kolodziej
43c5d1b30d
Changed up the interface. Instead of a dedicated list,
...
all packets are directly on the packetlist object.
2013-04-23 10:19:01 +02:00
Michal Kolodziej
38330ea4a6
Sym encrypted session key is working, decryption of messages
...
from gpg works too! Fixed some minor bugs and got rid of a
few globals.
2013-04-23 10:03:28 +02:00
Michal Kolodziej
3a3764a436
Added test and working code to the sym encrypted integrity protected packet.
2013-04-22 19:56:51 +02:00
Michal Kolodziej
3f04470e1f
First working packet: writing/reading sym encrypted
...
and literal packets is working. Tests added.
2013-04-22 18:03:50 +02:00
Michal Kolodziej
c190784ffd
Working on making the new packet infrastructure run.
2013-04-22 17:04:20 +02:00
Michal Kolodziej
23295342fc
Added utf8 awareness to the literal and userid packet classes. Made s2k
...
work correctly with utf8 strings. Fixeda visibility issue with the
testing suite and added relevant unit tests.
2013-04-16 10:47:17 +02:00