|
c270bc3d60
|
Hex decode data in OpenPgpV4Fingerprint constructor
|
2022-01-04 17:33:51 +01:00 |
|
|
301b201d43
|
Remove investigative test with expired key
|
2022-01-01 18:11:48 +01:00 |
|
|
b1bde161b4
|
Fix typos and wording
|
2021-12-28 13:53:25 +01:00 |
|
|
ce7b69269b
|
Various code cleanup
|
2021-12-28 13:32:50 +01:00 |
|
|
59f1a85887
|
Fix more code issues
|
2021-12-28 12:30:52 +01:00 |
|
|
e96d668ee2
|
Clean up code
|
2021-12-28 12:18:51 +01:00 |
|
|
6eac50c5b5
|
Add documentation to SessionKey
|
2021-12-28 01:42:12 +01:00 |
|
|
f3b7286eaf
|
Introduce and use DateUtil.toSecondsPrecision
|
2021-12-28 01:42:12 +01:00 |
|
|
2f44621657
|
Add documentation to CollectionUtils methods
|
2021-12-28 01:42:12 +01:00 |
|
|
376e234baf
|
Add documentation to SecretKeyRingEditor
|
2021-12-28 01:23:47 +01:00 |
|
|
d0ef8581e8
|
Add RevokeUserIdsTest
|
2021-12-27 13:49:31 +01:00 |
|
|
a0e9c1f555
|
Add SelectUserId.byEmail()
|
2021-12-27 13:36:13 +01:00 |
|
|
245376d7d0
|
Remove KeyRingUtils.deleteUserId() in favor of revoking SecretKeyRingEditor.removeUserId() methods
|
2021-12-27 13:35:58 +01:00 |
|
|
31b7d18183
|
Properly resolve earliest expiration date when primary user-id + direct-key sig have expiraiton
Rename getPossiblyExpiredPrimaryUserId() method
|
2021-12-23 17:10:44 +01:00 |
|
|
6c9c683c85
|
Rename method to getValidAndExpiredUserIds()
|
2021-12-22 12:42:31 +01:00 |
|
|
56e60e88f4
|
When no user-id is marked as primary: return first user-id
|
2021-12-22 12:40:40 +01:00 |
|
|
3aa9e2915a
|
Re-certify expired user-ids when changing key expiration date
|
2021-12-20 13:28:16 +01:00 |
|
|
710f961984
|
Rework key modification API.
Fixes #225
|
2021-12-20 13:01:58 +01:00 |
|
|
78b668880b
|
Delete unused TestImplementationFactoryProvider
|
2021-12-14 16:57:50 +01:00 |
|
|
cf90c25afc
|
rename invocationContextProvider to TestAllImplementations
|
2021-12-14 16:56:29 +01:00 |
|
|
c331dee6b1
|
Replace @ArgumentSource with @TestTemplate, @ExtendWith
|
2021-12-14 16:55:04 +01:00 |
|
|
2ebf4be39c
|
Replace @MethodSource annotation with @ArgumentsSource
|
2021-12-14 15:47:53 +01:00 |
|
|
a66b45c3d2
|
Further sourcing of PGPObjectFactory from ImplementationProvider
|
2021-12-14 15:03:45 +01:00 |
|
|
60f7a9d9ec
|
Source PGPObjectFactory from ImplementationProvider
|
2021-12-14 14:43:16 +01:00 |
|
|
1681f3934f
|
Fix method name getCommentHeader
|
2021-12-14 14:42:53 +01:00 |
|
|
bff2b3fbfe
|
Clarify nesting depth exceeded error message
|
2021-12-14 13:14:56 +01:00 |
|
|
f8968fc075
|
Add test for CachingSecretKeyRingProtector.replacePassphrase(*)
|
2021-12-13 13:28:53 +01:00 |
|
|
c4e3e27821
|
Fix replacePassphrase(secretKeys, passphrase)
|
2021-12-13 13:28:34 +01:00 |
|
|
5108b81252
|
Add test to ensure PGPainless will refuse to decrypt message with incapable key
|
2021-12-13 12:43:08 +01:00 |
|
|
80e12db8b6
|
Prevent message decryption using non-encryption key
|
2021-12-13 12:27:32 +01:00 |
|
|
e59a8884c1
|
SigningOptions: Replace arguments PGPSecretKeyRingCollection with Iterable<PGPSecretKeyRing>
|
2021-12-13 01:14:55 +01:00 |
|
|
ba9de4b44a
|
EncryptionOptions: replace arguments of type PGPPublicKeyRingCollection with Iterable<PGPPublicKeyRing>
|
2021-12-13 01:14:24 +01:00 |
|
|
710f676dc3
|
Rename MAX_RECURSION_DEPTH constant to avoid confusion
|
2021-12-13 01:03:20 +01:00 |
|
|
35462ab539
|
Add tests for PublicKeyParameterValidation
|
2021-12-09 13:25:23 +01:00 |
|
|
296f811b7f
|
Merge branch 'KO'
|
2021-12-07 19:08:03 +01:00 |
|
|
b3ec3333ce
|
CachingSecretKeyRingProtector: Prevent accidental passphrase override via addPassphrase()
|
2021-12-07 14:42:03 +01:00 |
|
|
82cbe467f2
|
Introduce iteration limit to prevent resource exhaustion when reading keys
|
2021-12-06 17:11:42 +01:00 |
|
|
c4618617f6
|
Introduce iteration limit to prevent resource exhaustion when reading signatures
|
2021-12-06 17:11:23 +01:00 |
|
|
af1d4f3e5b
|
Add ElGamal validation ported from openpgpjs
|
2021-12-06 16:43:27 +01:00 |
|
|
073cf870d2
|
Fix NPE when attempting to decrypt GNU_DUMMY_S2K keys
|
2021-12-06 15:07:34 +01:00 |
|
|
a34cd77920
|
Add test keys
|
2021-12-06 15:02:31 +01:00 |
|
|
d54a40196b
|
Fix NPE when attempting to decrypt GNU_DUMMY_S2K keys
|
2021-12-06 15:01:37 +01:00 |
|
|
fae5cd0efe
|
SOP: Fix signing using key with missing signing key
|
2021-12-02 15:10:53 +01:00 |
|
|
8d6aca0d04
|
Test modifyKeyRing().addSubkey() respects pk algorithm policy
|
2021-12-02 14:45:54 +01:00 |
|
|
e7d0cf9c00
|
Fix BaseSecretKeyRingProtector misinterpreting empty passphrases
|
2021-12-02 14:44:03 +01:00 |
|
|
14c1cf013e
|
Add test to verify correct behavior of public key algorithm policy enforcement during key generation
|
2021-12-02 14:29:01 +01:00 |
|
|
8b1bdb98f1
|
Adding subkeys, generating keys: Verify subkeys comply to public key algorithm policy
|
2021-12-02 14:18:21 +01:00 |
|
|
f5c3e7b23f
|
Remove Blowfish from default symmetric decryption/encryption algorithm policies
|
2021-12-02 13:09:35 +01:00 |
|
|
ddc071374c
|
Add invalid signature version processing regression test
|
2021-12-02 12:42:02 +01:00 |
|
|
cd9e7611ac
|
Remove workaround for invalid signature processing
|
2021-12-02 12:42:02 +01:00 |
|