Bart Butler
d737f65ccc
Merge pull request #559 from openpgpjs/sign_byte_arrays
...
Sign Uint8 arrays
2017-07-12 19:45:53 -07:00
Sanjana Rajan
e53cbe8417
remove extra spaces
2017-07-08 13:26:20 +02:00
Sanjana Rajan
95c5e3af01
use message obj when signing uint8 array
2017-07-08 13:25:24 +02:00
Bart Butler
d33c46a33c
minor bugfix
2017-07-06 15:27:45 -07:00
Sanjana Rajan
d061af1fc3
style fixes
2017-07-06 16:29:25 +02:00
Sanjana Rajan
a9bb3f1839
armor based on text vs. bytes
2017-07-04 16:47:23 -07:00
Sanjana Rajan
28e5f5d3f4
allow cleartext msg data to be string or byte array
2017-07-04 14:15:39 -07:00
Sanjana Rajan
a7702a74d3
support split checksum where body and checksum are on the same line
2017-06-27 16:41:53 -07:00
Bart Butler
ddf6eb5783
change URL to https
2017-04-25 14:09:31 +02:00
Abhishek Hingnikar
472294ec84
Fix documentation
...
The storeHandler seems to need loadPublic, loadPrivate, storePublic, storePrivate methods but the current documentation only mentions load and store.
2017-04-08 16:12:47 +05:30
Kévin Bernard-Allies
342bc8fe01
Simplify code of CRC24 checksum in armor encoding
2017-04-06 13:12:45 +02:00
Sanjana Rajan
c3958b0270
tolerant default to true
2017-04-05 16:36:29 -07:00
Sanjana Rajan
b51b8ad341
add tolerant mode which suppresses errors in reading non-data packets
2017-04-05 07:54:08 -07:00
Bart Butler
5fb23ac833
use web worker for reformatKey
2017-03-29 16:27:16 -07:00
Bart Butler
a1ff93f1fc
not all platforms implement TypedArray.slice
2017-03-28 11:44:04 -07:00
Bart Butler
62c24ed227
Merge pull request #534 from openpgpjs/signature_input
...
Accept signature object as an input to encrypt function
2017-03-28 10:43:00 -07:00
Bart Butler
a4190061d9
optimize Uint8Array2str function for large payloads
2017-03-28 10:35:20 -07:00
Sanjana Rajan
16c6d2f162
signatureInput -> signature
2017-03-23 13:01:12 -07:00
Sanjana Rajan
d04c09687d
spacing
2017-03-23 11:16:16 -07:00
Sanjana Rajan
25d16046c2
add one pass in case where no priv keys are passed in for signing
2017-03-22 17:14:30 -07:00
Sanjana Rajan
79160abcc9
allow signature as input in high level encrypt
2017-03-22 17:04:21 -07:00
Sanjana Rajan
af211f63c0
update README to demonstrate detached signature use, some documentation fixes
2017-03-17 16:54:34 -07:00
Sanjana Rajan
e4621fc688
initialize publicKeys to empty array, test case where signed message is decrypted without public keys to verify
2017-03-15 17:44:43 -07:00
Sanjana Rajan
4ec07672a7
return signature object inside verification object
2017-03-10 10:38:59 -08:00
Sanjana Rajan
da9e3c6264
small fixes
2017-03-07 19:10:33 -08:00
Sanjana Rajan
465d4643a8
add clone to packetlist support for signature objects
2017-03-07 16:51:08 -08:00
Sanjana Rajan
7d02154dc9
small fixes
2017-03-07 13:59:18 -08:00
Sanjana Rajan
43355e079f
add detached sig option to upper level functions
2017-03-07 13:59:18 -08:00
Sanjana Rajan
c3908cbec0
add detached sign/verify options to cleartext
2017-03-07 13:59:18 -08:00
Sanjana Rajan
4fd4c13ddd
refactor cleartext message to use signature object instead of packetlist
2017-03-07 13:59:17 -08:00
Sanjana Rajan
7b58cd9200
add tests
2017-03-07 13:59:17 -08:00
Sanjana Rajan
57d07091e8
add support for detached signatures
2017-03-07 13:59:17 -08:00
Bart Butler
ebc37f3a7d
Merge pull request #417 from zartdinov/master
...
Added ability to sign and verify public keys
2017-03-05 12:24:37 -08:00
Aydar Zartdinov
be776c61b1
Validate signatures by all suitable keys
2017-03-04 19:27:27 +00:00
Aydar Zartdinov
d5e88c7c79
Prevent self signing by fingerprint instead of keyId
2017-03-04 18:47:33 +00:00
Bart Butler
b0c1a854fd
move SHA1 to the bottom of the preferred hash algorithm list
2017-02-27 10:30:39 -08:00
Sanjana Rajan
e90161c2d1
add missing parentheses
2017-02-15 13:06:18 -08:00
Aydar Zartdinov
d9cb8e681d
Array.prototype.find replaced for Node.js 0.12 and IE 11
2017-02-15 21:31:05 +03:00
Aydar Zartdinov
3fa4c0c760
Base functionality moved to User.prototype
2017-02-15 21:08:17 +03:00
Aydar Zartdinov
715f98bb38
Reverted top level api changes
2017-02-15 21:04:50 +03:00
Aydar Zartdinov
5140a946e5
Added ability to sign and verify public keys
2017-02-15 21:04:50 +03:00
Bart Butler
6be9ddde59
Merge pull request #517 from openpgpjs/userID
...
Key reformatting and resigning
2017-02-13 16:11:17 -08:00
Sanjana Rajan
11e1040a30
remove extra input param
2017-01-31 14:18:13 -08:00
Sanjana Rajan
a902c421eb
add upper level refactorKey function
2017-01-31 14:14:27 -08:00
Sanjana Rajan
9de579a29d
remove extra space, typo
2017-01-30 19:41:43 -08:00
Sanjana Rajan
9d59351007
reformatKey function
2017-01-30 19:38:49 -08:00
Alax Villmann
e526cf0a3b
Generate valid version 3 signatures
2017-01-26 12:49:49 -08:00
David Janes
c223b88829
implement keyExpirationTime
2017-01-24 16:54:52 -05:00
Bart Butler
bc69357ab5
Merge pull request #498 from larshp/master
...
S2K - Only generate what is needed
2017-01-22 23:36:36 -08:00
Alax Villmann
0989015ed2
V3 header generation was concat()-ing non-Uint8 arrays
2017-01-09 10:30:31 -08:00
Sanjana Rajan
d65d629264
trim name
2016-12-15 10:39:29 -08:00
Sanjana Rajan
d058523e9e
clearer syntax
2016-12-15 10:01:50 -08:00
Sanjana Rajan
109f8a5d20
don't allow leading spaces in user id
2016-12-14 12:38:01 -08:00
Lars Hvam
c69a92d694
only generate what is needed
2016-11-20 09:54:00 -05:00
Sanjana Rajan
344294659e
invalidate expired primary keys
2016-10-27 11:50:30 -07:00
Bart Butler
659c6f23d2
Merge pull request #493 from openpgpjs/armored_decrypted_key_fix
...
Reset secret key's encrypted field to null after decryption
2016-10-26 16:58:07 -07:00
Bart Butler
6abf7ffcc0
Fix rare race condition with webworker tasks, fix minified web worker filename default
2016-10-26 16:56:21 -07:00
Sanjana Rajan
8620220cfb
reset encrypted field to null when decrypting secret key
2016-10-26 16:55:49 -07:00
emersion
e9940eb100
Properly set one-pass signture packet flag
2016-08-17 13:03:56 +02:00
Tankred Hase
e3cbaba33a
Be sure to only pop unsupported packet if already pushed
2016-06-08 11:30:53 +02:00
Tankred Hase
490d8e4e90
Bugfix: drop unsupported packets in packetlist.read()
...
add unit test for RSA key with ECC subkey
2016-06-07 18:21:31 +02:00
Tankred Hase
87b4bfefd8
Fix error handling
2016-05-24 17:22:15 +02:00
Tankred Hase
4fd9fd3c7f
Cleanup and document worker.js
2016-05-24 13:12:39 +02:00
Thomas Oberndörfer
9c76df73ff
Merge pull request #446 from openpgpjs/issue/443
...
Implement feature #443
2016-05-03 10:01:48 +02:00
evilaliv3
4e3937f1e2
Replace isDecrypted=false with keys[i].clearPrivateMPIs()
2016-04-28 17:40:14 +02:00
evilaliv3
0d93127186
Simplify code-flow of Key.encrypt
2016-04-28 16:01:33 +02:00
evilaliv3
a5fdc36062
Cleanup API for key.decrypt and align unit tests
2016-04-27 16:06:52 +02:00
evilaliv3
1007637f39
Mark isDecrypted flag when the key is encrypted
2016-04-25 18:35:57 +02:00
evilaliv3
61470ad068
Apply edits as suggested in review of pull #446
2016-04-25 18:35:50 +02:00
Tankred Hase
fd218ef52d
Add comments to preferred algorithms
2016-04-25 13:08:00 +02:00
evilaliv3
afc2c95238
Implement feature #443
2016-04-25 00:54:16 +02:00
Tankred Hase
e3b146b9d9
Fix Keyid.fromId()
2016-04-11 12:11:35 +02:00
Tankred Hase
4070e27959
Cleanup of AES-CFB code in integrity protected packet
2016-03-25 16:10:27 +08:00
Tankred Hase
843fba0d40
Use underscore instead of camelcase in config
...
zeroCopy —> zero_copy
useNative —> use_native
Remove unnecessary tests from build
2016-03-24 21:02:29 +08:00
Tankred Hase
72c8bf5ea7
Deactivate GCM by default
2016-03-24 20:47:42 +08:00
Tankred Hase
969e39dcf2
Rename useAEAD --> nativeAEAD
2016-03-24 13:49:26 +08:00
Tankred Hase
f4fc274f14
Fix: use worker for CFB w/ webcrypto support
2016-03-24 13:24:18 +08:00
Tankred Hase
c8569e0cd5
Add version attribute to the AEAD packet
2016-03-24 10:53:35 +08:00
Tankred Hase
8b46a117ab
Prefer aes128 over aes192 (no WebCrypto support)
2016-03-24 10:53:30 +08:00
Tankred Hase
979f212305
Cleanup Promise code
2016-03-24 09:29:41 +08:00
Tankred Hase
ddedb5cb42
Cleanup public api
2016-03-23 21:36:48 +08:00
Tankred Hase
1e3d6468d6
Wrap code into promises to globally catch errors
2016-03-23 21:19:02 +08:00
Tankred Hase
453a9cee07
Use web worker for encrypt/decrypt if no native gcm
2016-03-23 21:17:36 +08:00
Tankred Hase
760bdb8f00
Use only standard window.crypto.subtle in gcm.js
...
There is currently no support for AES-GCM in IE11 and Safari/iOSqq
2016-03-23 17:27:09 +08:00
Tankred Hase
9b2823aa67
Fix unit tests under node
2016-03-23 16:43:40 +08:00
Tankred Hase
963648c6ea
Fix unit tests for browsers
2016-03-23 15:39:51 +08:00
Tankred Hase
e5e76d2eb7
Cleanup gcm.js
2016-03-23 14:32:48 +08:00
Tankred Hase
a225027a6b
Wrap message.sign into a promise in openpgp.encrypt
2016-03-23 13:43:12 +08:00
Tankred Hase
7fabe02e03
Fix GCM under node.js
2016-03-23 13:43:06 +08:00
Tankred Hase
8f8218e9de
Cleanup and test AEAD protected packet
2016-03-22 17:45:19 +08:00
Tankred Hase
8aa15b66a9
Cleanup and unit test gcm.js
2016-03-22 17:45:19 +08:00
Tankred Hase
365a9d2107
Fix link to IEFT draft packet tag in enums.js
2016-03-22 17:45:18 +08:00
Tankred Hase
2e4d8547a0
Fix typo in src/crypto/index.js
2016-03-22 17:45:18 +08:00
Tankred Hase
149f5d5191
Use promise api in sym_encrypted_* packets
2016-03-22 17:45:18 +08:00
Tankred Hase
ded8926b27
Support AES-GCM with AEAD Protected Data Packets
...
Closes openpgpjs/openpgpjs#421
2016-03-22 17:44:22 +08:00
Tankred Hase
b5618fd63d
Remove redundant util.emailRegEx
2016-02-19 11:17:35 +07:00
Tankred Hase
a1ab02adc8
Revert "Point to TLS/HSTS secured .com domain"
...
This reverts commit 177d701f5b
.
2016-02-18 11:38:12 +07:00
Tankred Hase
506e36c9cc
Remove function bind polyfill from worker.js
...
This is no longer required in Phantom.js 2.x
2016-02-18 11:15:59 +07:00
Tankred Hase
177d701f5b
Point to TLS/HSTS secured .com domain
2016-02-15 14:06:31 +07:00
Harry Marr
68d1b5a35c
Handle carriage-return only newlines
...
Newlines are normalised to \r\n, but that previously assumed that only
\r\n and \n newline characters could be used. Even though \r newlines
are rarely used in the wild, it's be helpful to support them. Currently,
they're just removed entirely.
2016-02-14 12:01:19 +00:00