summaryrefslogtreecommitdiffstats
AgeCommit message (Collapse)Author
2023-11-14openpgp: When creating certs, derive the encryption key once.justus/fix-1015Justus Winter
- Fixes #1015.
2023-11-14openpgp: Add functions to encrypt keys with the new type.Justus Winter
- Same should be done for decryption.
2023-11-14openpgp: Add a type that combines S2K, cipher, and session key.Justus Winter
- I'm happy to wordsmith the name, EncryptionParameters isn't quite ideal...
2023-11-14net: Upgrade from trust-dns-* to hickory-*.Justus Winter
- Fixes #1062.
2023-11-14openpgp: Improve tracing.Justus Winter
2023-11-14openpgp: Add new test.Justus Winter
- Tests that an inline-signed message using two different hash algorithms verifies correctly.
2023-11-14openpgp: Impl TryFrom<&Signature> for OnePassSig.Justus Winter
2023-11-03openpgp: Remove redundant call.Justus Winter
- This triggers a warning in rustc 1.73, and thus is an error for us.
2023-11-03doc: Fix typos.Justus Winter
2023-11-02ci: Use the rust-stable image for the rust-stable job.Justus Winter
- Fixes #1063.
2023-10-27ipc: Release 0.31.0ipc/v0.31.0Neal H. Walfield
2023-10-27ipc: Upgrade socket2Neal H. Walfield
2023-10-27ipc: Upgrade dirsNeal H. Walfield
2023-10-27ipc: Upgrade ctorNeal H. Walfield
2023-10-27ipc: Upgrade clapNeal H. Walfield
- Upgrade clap from clap 3 to clap 4. - Use the opportunity to change to clap's derive-style API.
2023-10-27ipc: Upgrade capnpNeal H. Walfield
2023-10-27Update Cargo.lock.Neal H. Walfield
2023-10-27ci: Don't run CI when updating mainNeal H. Walfield
- We've configured the gitlab project so that the only way to push to main is via a merge request for which CI has passed. As such, running (most) jobs when merging to main is a waste of resources, and we don't do it by default. - Fixes: #1061
2023-10-27ci: Remove outdated rule.Neal H. Walfield
- As of ea31e87029288bfe5897b1dd6a02cdc291946c9e, the all_commits job works for branches that are not derived from main. - Remove outdated rule.
2023-10-26openpgp: Release 1.17.0openpgp/v1.17.0Neal H. Walfield
2023-10-26openpgp: Depend on buffered-reader 1.3.0 or laterNeal H. Walfield
- `openpgp` uses features that are only present in version 1.3.0 of buffered reader. Adjust the dependency.
2023-10-26buffered-reader: Release 1.3.0buffered-reader/v1.3.0Neal H. Walfield
2023-10-26openpgp: Upgrade rpasswordNeal H. Walfield
2023-10-26openpgp: Upgrade lalrpopPeter Michael Green
- Fixes #1060.
2023-10-26openpgp: Upgrade idnaNeal H. Walfield
2023-10-26openpgp: Drop generic-array direct dependencyNeal H. Walfield
- Use `cipher`'s reexport of `generic-array` instead of directly depending on `generic-array` and having to worry about synchronizing the versions.
2023-10-26openpgp: Upgrade ed25519Neal H. Walfield
2023-10-26openpgp: Upgrade dsaNeal H. Walfield
2023-10-26openpgp: Upgrade criterion from 0.4 to 0.5Alexander Kjäll
2023-10-26openpgp: Tighten win-crypto-ng version rangeNeal H. Walfield
- Require version 0.5.1.
2023-10-26Update Cargo.lockNeal H. Walfield
2023-10-26doc: Update the release checklistNeal H. Walfield
2023-10-26ci: Add a job to authenticate the commitsNeal H. Walfield
- Add a job to authenticate the commits using sequoia-git.
2023-10-25Add a signing policy.Neal H. Walfield
- Add a commit signing policy.
2023-10-24openpgp: Upgrade regex-syntax.Neal H. Walfield
- Upgrade regex-syntax to 0.8. - Fixes #1056.
2023-10-13openpgp: Improve documentation.Neal H. Walfield
- `Cert::from_str`, `Cert::from_reader`, `Cert::from_file`, and `Cert::from_bytes` return an error if the input contains multiple certificates. - Improve the documentation to make that clearer, and suggest the use of `CertParser` to parse keyrings.
2023-10-11openpgp: Add non-allocating accessors for parsed User ID components.Justus Winter
- Now that we use OnceCell for the cache, we can hand out references to the cached data. This closes the gap between UserID and ConventionallyParsedUserID, hence I think this addresses the concern in #377. - Deprecate the allocating variants. - Fixes #377.
2023-10-10openpgp: Use OnceCell to cache the parsed user id.Justus Winter
- Behaves the same, but is much nicer.
2023-10-10openpgp: Add fuzz targets.Justus Winter
2023-10-10openpgp: Add a null crypto backend for fuzzing.Justus Winter
- Fixes #962.
2023-10-10openpgp: Drop assertion that does not hold.Justus Winter
- Instead, just accept that if other signature types come in, we miscompute the hash, and we'll reject the signature later on.
2023-10-06openpgp: Use CertBuilder::new() in doc tests to count reliably.David Runge
Adapt the doc tests of `KeyAmalgamationIter::secret()`, `KeyAmalgamationIter::unencrypted_secret()`, `ValidKeyAmalgamationIter::secret()` and `ValidKeyAmalgamationIter::unencrypted_secret()` to make use of `CertBuilder::new()` instead of `CertBuilder::general_purpose()` to be able to test for the amount of found keys more reliably. Signed-off-by: David Runge <dave@sleepmap.de>
2023-10-06openpgp: Add encrypted_secret filter for ValidKeyAmalgamationIter.David Runge
Add the new filter `encrypted_secret` to filter on whether secret key material is present and encrypted. Remove the `secret` field of `ValidKeyAmalgamationIter` and alter `ValidKeyAmalgamationIter::secret()` to set both `encrypted_secret` and `unencrypted_secret` to `Some(true)`. Closes https://gitlab.com/sequoia-pgp/sequoia/-/issues/1040 Signed-off-by: David Runge <dave@sleepmap.de>
2023-10-06openpgp: Add encrypted_secret filter for KeyAmalgamationIter.David Runge
- Add the private function `skip_secret()` to evaluate whether a secret key is skipped during filtering and provide a message in that case. - Add the new filter `encrypted_secret` to filter on whether secret key material is present and encrypted. Make use of the `skip_secret()` function to evaluate whether a key is skipped when filtering or not. - Remove the `secret` field of `KeyAmalgamationIter` and alter `KeyAmalgamationIter::secret()` to set both `encrypted_secret` and `unencrypted_secret` to `Some(true)`. Closes https://gitlab.com/sequoia-pgp/sequoia/-/issues/1040 Signed-off-by: David Runge <dave@sleepmap.de>
2023-10-02openpgp: Test that v3 revocation signatures are honored.Justus Winter
- Fixes #954.
2023-10-02openpgp: Only add issuer fingerprint information to v4 and up sigs.Justus Winter
2023-10-02openpgp: Update comment.Justus Winter
- We don't actually stop, and doing that seems like an optimization for a very unlikely case.
2023-10-02openpgp: Avoid clone.Justus Winter
2023-09-29openpgp: Change the hex parsing to accept odd number of nibbles.Justus Winter
- This came up as the new leak tests use our hex parsing functions to parse /proc/self/maps and apparently Linux will drop leading zeros from addresses. - Fix this by allowing these functions to operate on an odd number of nibbles. I see no reason no reason not to do that, except for the fact that we don't want to establish that it is okay to drop leading zeros from key IDs and fingerprints, hence I preserved the behavior of parsing key IDs and fingerprints.
2023-09-27openpgp: Fix SignatureBuilder::signature_expiration_time.Justus Winter
- SignatureBuilder::signature_expiration_time is broken. This is because SignatureBuilder doesn't actually implement signature_expiration_time. Instead, it is resolved via a Deref to the SubpacketAreas::signature_expiration_time. That function returns: creation_time subpacket + expiration_time subpacket, but the actual creation time in a SignatureBuilder may not yet have propagated to the subpacket area! - Fixes #998.