fork-openpgpjs/src
larabr 01b02d6092 Always select SHA-256 or longer hash for Ed25519 signatures (new format)
Due to a bug, a shorter hash could be selected, and signing would throw as a result.
This change fixes the issue by automatically picking SHA-256, if needed.
The same was already done for legacy EdDSA signatures.
2023-10-03 18:50:40 +02:00
..
biginteger Update ESlint 2023-02-21 18:27:56 +01:00
config Add additionalAllowedPackets config option (#1618) 2023-03-30 15:52:11 +02:00
crypto Always select SHA-256 or longer hash for Ed25519 signatures (new format) 2023-10-03 18:50:40 +02:00
encoding Update ESlint 2023-02-21 18:27:56 +01:00
key Always select SHA-256 or longer hash for Ed25519 signatures (new format) 2023-10-03 18:50:40 +02:00
packet crypto-refresh: add support for new X25519 key and PKESK format 2023-07-25 10:17:09 +02:00
type crypto-refresh: add support for new X25519 key and PKESK format 2023-07-25 10:17:09 +02:00
cleartext.js Reject cleartext messages with extraneous data preceeding hash header 2023-08-29 16:30:35 +02:00
enums.js Add enums.publicKey.eddsaLegacy 2023-10-03 18:50:36 +02:00
index.js Export Subkey class (#1381) 2021-07-20 10:54:29 +02:00
message.js Enforce AES with PKESK v3 using x25519 (new format) 2023-07-25 10:17:17 +02:00
openpgp.js Docs: mark global generateSessionKeys's encryptionKeys as optional (#1596) 2023-02-17 13:05:25 +01:00
signature.js Replace armor option with format in openpgp.encrypt, sign and encryptSessionKey (#1354) 2021-07-19 18:12:42 +02:00
util.js Enforce AES with PKESK v3 using x25519 (new format) 2023-07-25 10:17:17 +02:00