summaryrefslogtreecommitdiffstats
path: root/openpgp
AgeCommit message (Collapse)Author
2023-05-23openpgp: Prefer OCB if available in the Nettle backend.Justus Winter
2023-05-23openpgp: Improve test.Justus Winter
2023-05-23openpgp: Improve tracing.Justus Winter
2023-05-22openpgp: Formalize reporting of supported algorithms.Justus Winter
2023-05-22openpgp: Deduplicate EdDSA signing.Justus Winter
2023-05-22openpgp: Deduplicate EdDSA signature verification.Justus Winter
2023-05-22openpgp: Introduce a common public facade for public key operations.Justus Winter
2023-05-22openpgp: Deduplicate Key::import_secret_ed25519.Justus Winter
2023-05-22openpgp: Add Ed25519 to trait Asymmetric.Justus Winter
2023-05-22openpgp: Add asymmetric encryption trait.Justus Winter
- As first step, abstract over X25519.
2023-05-22openpgp: Move random into the Backend trait.Justus Winter
2023-05-22openpgp: Introduce a trait for the crypto backends.Justus Winter
- This trait will not be public, at least for now, and we will still stick to the compile-time backend selection, at least for now. Therefore, we can still enjoy static dispatch. - The trait will formalize the interface. It should only abstract over the underlying primitives. Notably, we want to be able to implement all operations on packets using this interface, so that no user-facing functions are implemented in the crypto backends. This will lead to a more consistent experience across all backends.
2023-05-22openpgp: Implement GCM mode.Justus Winter
- The Galois/Counter mode for block ciphers is a FIPS-approved AEAD mode. It will be added to the upcoming OpenPGP standard so that we have a FIPS-compliant subset of OpenPGP.
2023-05-22openpgp: Implement OCB mode using the Nettle backend.Justus Winter
- Nettle 3.9 and up support the authenticated encryption mode OCB.
2023-05-16openpgp: Release 1.16.0.openpgp/v1.16.0Neal H. Walfield
2023-05-16openpgp: Upgrade base64.Neal H. Walfield
- Upgrade base64 to version 0.21.
2023-05-15openpgp: Improve test.Neal H. Walfield
- Arbitrary does not draw from a uniform distribution, e.g., arbitrary seems to be draw 0 about 10% of the time for a 32-bit quantity. - When we need two different arbitrary values, be very careful to make sure they are different.
2023-05-15openpgp: Improve documentation.Neal H. Walfield
- In `Cert::keys`, `Cert::userids` and `Cert::user_attributes`, we that `ValidCert:userids`, etc. is better than `Cert::userids`, etc., mention that `Cert::with_policy` can be used to turn a `Cert` into a `ValidCert`. - Fixes #921.
2023-05-15openpgp: Change crypto-botan to use botan v3.Alexander Kjäll
- Version 3 of Botan was release in April 2023. It is already distributed by Arch. Switch crypto-botan to select the v3 interface. - Introduce the `crypto-botan2` feature to use Botan with Botan's v2 interface.
2023-05-15openpgp: Derive Clone for SubpacketArea.Neal H. Walfield
- We can safely derive `Clone` for `SubpacketArea`. - There is no reason to not clone the cache as well. It's just a vector.
2023-05-15openpgp: SignatureBuilder should return an OpenPGP timestamp.Neal H. Walfield
- `SignatureBuilder::effective_signature_creation_time` is supposed to return the effective signature creation time. That is, it should return the signature creation time that would be used if the signature were created now. - The function returns a `SystemTime`, which has a different resolution and range from an OpenPGP timestamp. - When using the current time, roundtrip it via `types::Timestamp` to return the timestamp that will actually be set.
2023-05-15openpgp: Update NEWS.Neal H. Walfield
2023-05-12openpgp: Clear the fingerprint cache when the key is updated.Neal H. Walfield
- When a `Key4` is changed, make sure the fingerprint cache is cleared. - Fixes #1016
2023-05-12openpgp: Make KeyFlags easier to use.Neal H. Walfield
- Add `KeyFlags::set_certification_to`, `KeyFlags::set_signing_to`, `KeyFlags::set_transport_encryption_to`, `KeyFlags::set_storage_encryption_to`, `KeyFlags::set_split_key_to`, and `KeyFlags::set_group_key_to`. - This interface is easier to use when the caller has a boolean. - Fixes #1018.
2023-05-12openpgp: Improve error message.Neal H. Walfield
- When an algorithm is completely disabled, don't say that it "is not considered secure since 1970-01-01T00:00:00Z" (i.e., the unix epoch), just say "is not considered secure". - Fixes #1000.
2023-05-12openpgp: Fix mapping of synthetic packets.Justus Winter
- If the packet parser encounters junk, it tries to recover by finding the next plausible packet. Then, it returns the skipped data in an synthetic packet. This packet has neither CTB nor length. - Previously, trying to access the data resulted in an out-of-bounds subslicing. - Fixes #985.
2023-05-12openpgp: Fix a crash in the Cleartext Signature Framework.Justus Winter
- Fixes #977.
2023-05-12openpgp: Fix a crash in the Cleartext Signature Framework.Justus Winter
- See #977.
2023-05-12openpgp: Fix a crash related to stray signatures.Justus Winter
- See #977.
2023-05-12openpgp: Fix crash in the packet parser.Justus Winter
- The packet parser hashes packet bodies to provide a robust equality relation even when packet bodies are streamed. To hash all bytes on the fly everywhere, we do that when it is consumed in PacketParser::consume. - This function assumes that if BufferedReader::data and friends returned n bytes, future calls to these interfaces will succeed if up to n bytes are requested, and no data was consumed in the meantime. - However, armor::Reader::data_helper did not provide that guarantee, making PacketParser::consume panic with the message "It is an error to consume more than data returns", which doesn't quite correctly name the problem at hand. - Fix this crash by fixing armor::Reader::data_helper in the same way the previous commit fixes buffered_reader::Generic::data_helper. - Fixes #957.
2023-05-11buffered-reader: Fix returning partial reads ending in errors.Justus Winter
- Make sure that we return the data we already have in our buffer, even though we encountered an IO error while filling it. - Notably, the packet parser assumes that data once read can be requested through the buffered reader protocol again and again. Unfortunately, that was not the case, leading to a panic. - As the generic reader is used to implement the buffered reader protocol on top of io::Read, this problem affects among other things the compression container. Demonstrate this using test. - Fixes #1005.
2023-05-05openpgp: Release 1.15.0openpgp/v1.15.0Neal H. Walfield
2023-05-05openpgp: Remove foreign-types-shared dependencyNeal H. Walfield
- It's not used.
2023-05-05openpgp: Upgrade criterionNeal H. Walfield
2023-05-05openpgp: Note that using Rust Crypto raises the MSRV to 1.65Neal H. Walfield
2023-05-03Tighten dependenciesNeal H. Walfield
- Fix the memsec and lalrpop dependencies. When allowing multiple, incompatible versions of a package using `">x.y"` always specify a upper bound to prevent a dependee that runs `cargo update` from using a yet-to-be-released incompatible version in the future. - Fix the openssl dependencies. When specifying a micro version, we don't need to use ">" to get new semver-compatible versions. That is, the default strategy is not "=", but "^". https://doc.rust-lang.org/cargo/reference/specifying-dependencies.html
2023-05-03openpgp: Update rust-crypto dependenciesNeal H. Walfield
- Note: `x25519-dalek` is broken. It depends on zeroize `=1.3`, but crates like rsa depend on newer versions of zeroize. - See https://github.com/WebAssembly/wasi-crypto/issues/63 , https://github.com/dalek-cryptography/x25519-dalek/issues/92 . - Resolve this by using `x25519-dalek-ng`, which fixes this issue. This is a common workaround, and is also used by, for instance OpenMLS: https://github.com/openmls/openmls/blob/3ff090fd4881cb796d4688f7f174929a7521dbf1/openmls_rust_crypto/README.md?plain=1#L3 - Fixes #910.
2023-05-03openpgp: Update win-crypto-ng to 0.5Neal H. Walfield
- Fixes #1014
2023-04-28openpgp: Rework creation of plausible secret key material.Justus Winter
- Introduce SecretKeyMaterial::arbitrary_for that given a public key algorithm will create plausible secrets for that. This function can be re-used in impl Arbitrary for Key.
2023-04-28openpgp: Add test for alignment of packet parser and heuristics.Justus Winter
- Fixes #1010.
2023-04-28openpgp: Don't generate arbitrarily large S2K parameters.Justus Winter
- We have to stay well below 255 bytes so that packets including the S2K objects are representable.
2023-04-27openpgp: Make match exhaustive.Justus Winter
2023-04-26openpgp: Harmonize Key::encrypt, make pk_algo match exhaustive.Justus Winter
- This changes and harmonizes the behavior of Key::encrypt, notably it also returns more specific errors when a signature algorithm is used for encryption. - It also makes the matches over the public key algorithms exhaustive, so that when we add more algorithms in the future, we will see where we need to implement them.
2023-04-26openpgp: Generalize test.Justus Winter
2023-04-26openpgp: Fix test.Justus Winter
- Don't enable AEAD-encryption by default in the test. Instead, that should be inferred from the recipient keys.
2023-04-26openpgp: Add randomized roundtrip tests for Key.Justus Winter
2023-04-26Revert "openpgp: Improve error message, avoid stuttering."Justus Winter
This reverts commit d57bd33cf9bddda77dff8e6508ebb1e4902f9294.
2023-04-18openpgp: Avoid leaking secrets in error messages.Justus Winter
2023-04-18openpgp: Improve documentationNeal H. Walfield
- Improve the documentation for `Cert::sort_and_dedup`, `Cert::merge_public` and `Cert::merge_public_and_secret`, and add more examples.
2023-04-17openpgp: Handle concatenated certs in the RawCertParser.Justus Winter
- Fixes #970.