|
e8da3b30d8
|
Yet another patch for ASCII armor detection -.-
|
2022-02-15 14:23:03 +01:00 |
|
|
f3cf3456ab
|
ConsumerOptions.setIsCleartextSigned -> return this
|
2022-02-15 14:22:57 +01:00 |
|
|
b33885c268
|
Remove accidental marking of buffered stream in PGPUtilWrapper
|
2022-02-15 14:22:49 +01:00 |
|
|
458b4f1f78
|
Fix detection of unarmored data in detached signature verification
|
2022-02-11 14:07:29 +01:00 |
|
|
9b270197c2
|
Add MIME StreamEncoding enum val
|
2022-01-15 02:46:42 +01:00 |
|
|
bbc42fd8e4
|
Document workaround for BCs ECUtil.getCurveName() returning null for ed25519 keys
See https://github.com/bcgit/bc-java/issues/1087
|
2022-01-15 02:46:42 +01:00 |
|
|
01839728f0
|
Remove workaround for publicKey.getBitStrength() == -1 in BC
see https://github.com/bcgit/bc-java/issues/972
|
2022-01-15 02:46:41 +01:00 |
|
|
e374951ed0
|
Remove ProofUtil.
This does not belong here.
|
2022-01-15 02:46:41 +01:00 |
|
|
5e0ca369bf
|
Document workaround for https://github.com/bcgit/bc-java/pull/1085
|
2022-01-15 02:46:41 +01:00 |
|
|
fa0e208c98
|
Workaround for BC not correctly parsing RevocationKey packets
|
2022-01-15 02:46:41 +01:00 |
|
|
88e3c61b20
|
RevocationSignatureBuilder: Allow for generation of external revocation signatures
|
2022-01-15 02:46:41 +01:00 |
|
|
5884c4afcd
|
ArmorUtils: Add method to print single public keys
|
2022-01-15 02:46:41 +01:00 |
|
|
1447dfc642
|
Add SignatureUtils.wasIssuedBy
|
2022-01-15 02:46:41 +01:00 |
|
|
99496f80f5
|
Hex decode data in OpenPgpV4Fingerprint constructor
|
2022-01-15 02:46:41 +01:00 |
|
|
d9e3c6ed91
|
Remove investigative test with expired key
|
2022-01-15 02:46:41 +01:00 |
|
|
e7f583c1af
|
Fix KeyRingInfo.get*Algorithm(keyId)
|
2022-01-15 02:45:21 +01:00 |
|
|
9de196d6c5
|
Fix test for algorithm preference extraction
|
2022-01-15 02:45:10 +01:00 |
|
|
b58bdf8ff1
|
Fix KeyAccessor.ViaKeyId sourcing primary user-id signature
|
2022-01-15 00:59:54 +01:00 |
|
|
b1bde161b4
|
Fix typos and wording
|
2021-12-28 13:53:25 +01:00 |
|
|
ce7b69269b
|
Various code cleanup
|
2021-12-28 13:32:50 +01:00 |
|
|
59f1a85887
|
Fix more code issues
|
2021-12-28 12:30:52 +01:00 |
|
|
e96d668ee2
|
Clean up code
|
2021-12-28 12:18:51 +01:00 |
|
|
6eac50c5b5
|
Add documentation to SessionKey
|
2021-12-28 01:42:12 +01:00 |
|
|
f3b7286eaf
|
Introduce and use DateUtil.toSecondsPrecision
|
2021-12-28 01:42:12 +01:00 |
|
|
2f44621657
|
Add documentation to CollectionUtils methods
|
2021-12-28 01:42:12 +01:00 |
|
|
376e234baf
|
Add documentation to SecretKeyRingEditor
|
2021-12-28 01:23:47 +01:00 |
|
|
d0ef8581e8
|
Add RevokeUserIdsTest
|
2021-12-27 13:49:31 +01:00 |
|
|
a0e9c1f555
|
Add SelectUserId.byEmail()
|
2021-12-27 13:36:13 +01:00 |
|
|
245376d7d0
|
Remove KeyRingUtils.deleteUserId() in favor of revoking SecretKeyRingEditor.removeUserId() methods
|
2021-12-27 13:35:58 +01:00 |
|
|
31b7d18183
|
Properly resolve earliest expiration date when primary user-id + direct-key sig have expiraiton
Rename getPossiblyExpiredPrimaryUserId() method
|
2021-12-23 17:10:44 +01:00 |
|
|
6c9c683c85
|
Rename method to getValidAndExpiredUserIds()
|
2021-12-22 12:42:31 +01:00 |
|
|
56e60e88f4
|
When no user-id is marked as primary: return first user-id
|
2021-12-22 12:40:40 +01:00 |
|
|
3aa9e2915a
|
Re-certify expired user-ids when changing key expiration date
|
2021-12-20 13:28:16 +01:00 |
|
|
710f961984
|
Rework key modification API.
Fixes #225
|
2021-12-20 13:01:58 +01:00 |
|
|
78b668880b
|
Delete unused TestImplementationFactoryProvider
|
2021-12-14 16:57:50 +01:00 |
|
|
cf90c25afc
|
rename invocationContextProvider to TestAllImplementations
|
2021-12-14 16:56:29 +01:00 |
|
|
c331dee6b1
|
Replace @ArgumentSource with @TestTemplate, @ExtendWith
|
2021-12-14 16:55:04 +01:00 |
|
|
2ebf4be39c
|
Replace @MethodSource annotation with @ArgumentsSource
|
2021-12-14 15:47:53 +01:00 |
|
|
a66b45c3d2
|
Further sourcing of PGPObjectFactory from ImplementationProvider
|
2021-12-14 15:03:45 +01:00 |
|
|
60f7a9d9ec
|
Source PGPObjectFactory from ImplementationProvider
|
2021-12-14 14:43:16 +01:00 |
|
|
1681f3934f
|
Fix method name getCommentHeader
|
2021-12-14 14:42:53 +01:00 |
|
|
bff2b3fbfe
|
Clarify nesting depth exceeded error message
|
2021-12-14 13:14:56 +01:00 |
|
|
f8968fc075
|
Add test for CachingSecretKeyRingProtector.replacePassphrase(*)
|
2021-12-13 13:28:53 +01:00 |
|
|
c4e3e27821
|
Fix replacePassphrase(secretKeys, passphrase)
|
2021-12-13 13:28:34 +01:00 |
|
|
af8d04c66f
|
Threat Model: add remark about secure key storage
|
2021-12-13 13:21:18 +01:00 |
|
|
5108b81252
|
Add test to ensure PGPainless will refuse to decrypt message with incapable key
|
2021-12-13 12:43:08 +01:00 |
|
|
80e12db8b6
|
Prevent message decryption using non-encryption key
|
2021-12-13 12:27:32 +01:00 |
|
|
e59a8884c1
|
SigningOptions: Replace arguments PGPSecretKeyRingCollection with Iterable<PGPSecretKeyRing>
|
2021-12-13 01:14:55 +01:00 |
|
|
ba9de4b44a
|
EncryptionOptions: replace arguments of type PGPPublicKeyRingCollection with Iterable<PGPPublicKeyRing>
|
2021-12-13 01:14:24 +01:00 |
|
|
710f676dc3
|
Rename MAX_RECURSION_DEPTH constant to avoid confusion
|
2021-12-13 01:03:20 +01:00 |
|