animist-io / wowshuxkluh

Ionic / Ethereum module to help mobile Dapps run location contingent smart-contracts over Bluetooth LE.
http://animist.io
ISC License
6 stars 1 forks source link

Update openpgp to the latest version πŸš€ #51

Open greenkeeper[bot] opened 6 years ago

greenkeeper[bot] commented 6 years ago

☝️ Greenkeeper’s updated Terms of Service will come into effect on April 6th, 2018.

Version 3.0.0 of openpgp was just published.

Dependency openpgp
Current Version 2.6.2
Type dependency

The version 3.0.0 is not covered by your current version range.

If you don’t accept this pull request, your project will work just like it did before. However, you might be missing out on a bunch of new features, fixes and/or performance improvements from the dependency update.

It might be worth looking into these changes and trying to get this project onto the latest version of openpgp.

If you have a solid test suite and good coverage, a passing build is a strong indicator that you can take advantage of these changes directly by merging the proposed change into your project. If the build fails or you don’t have such unconditional trust in your tests, this branch is a great starting point for you to work on the update.


Release Notes v3.0.0

Public-Key Cryptography:

  • Public-key cryptography using elliptic curves P-256, P-384, P-521, SECP-256k1, Curve25519, and Ed25519 is now supported. The implementation uses Fedor Indutny’s Elliptic library and utilizes native Node.js and browser APIs when possible. We recommend using ed25519 for security and efficiency.
    To generate ECC keys, pass a curve parameter to the generateKey function; e.g. curve='ed25519'.

  • In other public-key cryptography news: jsbn.js is dead, long live bn.js! All public-key algorithms and MPI handling functions have been refactored to use bn.js. In particular, new probabilistic random prime generation algorithms have been added to assist with RSA key generation. If you need RSA keys, for instance for compatibility purposes, we recommend at least a 2048-bit key size.

  • Generating and receiving wild card key IDs in public-key encrypted session key packets is now supported. A wild card key ID indicates that the receiving implementation should try all available private keys, checking whether each can be used to decrypt any session key, with an associated performance cost. To generate key packets with wild card key IDs, the wildcard option can be set to true in the encrypt and encryptSessionKey functions.

  • A new optional date input to the encrypt, decrypt, sign, and verify functions allows for performing operations in the context of that date. This can be helpful for hiding the true encryption/signature time of scheduled messages or for verifying signatures of old messages with currently expired public keys that may not have been expired at the time of receipt.

Breaking API Changes:

  • The high-level decrypt function now accepts arrays of private keys, passwords, or session keys as input and attempts to decrypt session keys with all values. All possible decrypted session keys are then used to attempt to decrypt the message data. This is necessary because there is no way to a priori validate decrypted session keys from wild card key IDs or passwords if the algorithm enum happens to be valid, and this happens an appreciable fraction of the time (~1/20). The input variables privateKey, password, and sessionKey have been renamed to privateKeys, passwords, and sessionKeys respectively.

  • The decryptSessionKey function has been renamed to decryptSessionKeys and similarly accepts arrays of private keys and passwords as input.

Compression:

  • Bzip2 compression and decompression using the compressjs library is now supported.

  • Zlib compression now uses pako’s zlib module or the native zlib module on Node.js when possible. This represents a significant performance increase in compression.

  • Compression can now be enabled by either altering the compression value in the config file or passing in a compression option to the high-level encrypt function.

Randomness:

  • Fixed an issue where the random number buffer would get depleted when running many concurrent processes with web workers

  • It is now possible to specify the number of worker threads when initializing the web worker

Development:

  • JavaScript style checking now uses ESLint. Run grunt eslint before submitting pull-requests.
    Also before submitting pull requests, run grunt browsertest and open localhost:3000/test/unittests.html to test web worker compatibility.

  • The library has been refactored to use ES6 variable declaration syntax (const, let) and ES7 asynchronous code syntax (async, await). Babel ensures compatibility with older browsers.

Future Roadmap:

  • Improve the performance of public-key operations via improving the bn.js library. See the benchmarks.

  • Add support for streaming cryptography.

  • Add support for Brainpool elliptic curves.

  • Add support for the RFC4880 draft version 5, which include changes in the S2K function and specifications for supporting AEAD in V5 keys. This includes AES-EAX, an authenticated mode of operation for AES, as well as two new authenticated public key options: AEDH and AEDSA. See issue #627.

Commits

The new version differs by 212 commits.

  • 4ded3f9 Documentation improvements in src/packet
  • a5e7562 Many documentation improvements; more to come
  • 184a988 Release new version
  • 08da24d documentation fixes
  • d3f42b2 update comments
  • c5b5bf7 utils fix
  • 6c7a73b README formatting
  • 843d94f Merge pull request #660 from openpgpjs/bug/subkey-revocations
  • 6fefe22 Finished fixing key.js; fixes async tests
  • 0b2817b Last little things become async ...
  • 4700606 Added test for encryption with revoked subkey
  • 23a4141 Addresses @sanjanarajan's comments
  • 73a240d Simplifies (Key|User|SubKey).isRevoked, API changes in key.js
  • ec22dab Slightly simplifies key.js; adds key.verifyKeyPackets which should be run before getEncryption/SigningKeyPacket
  • 354b961 primegen bugfix, recalculate i

There are 212 commits in total.

See the full diff

FAQ and help There is a collection of [frequently asked questions](https://greenkeeper.io/faq.html). If those don’t help, you can always [ask the humans behind Greenkeeper](https://github.com/greenkeeperio/greenkeeper/issues/new).

Your Greenkeeper bot :palm_tree:

greenkeeper[bot] commented 6 years ago

Version 3.0.1 just got published.

Update to this version instead πŸš€

Commits

The new version differs by 7 commits.

  • 8dd4b3f Release new version
  • b4055f4 fix #670
  • 4d40c60 Merge pull request #668 from openpgpjs/rev_fixes
  • 96c9cd0 Fixes dead links in the documentation
  • 3945912 remove some redundant code
  • 38508b3 if primary key is invalid, so are subkeys
  • a94ca90 add test for key revoked with cert, no revoked subkeys

See the full diff

greenkeeper[bot] commented 6 years ago

Version 3.0.2 just got published.

Update to this version instead πŸš€

Commits

The new version differs by 3 commits.

See the full diff

greenkeeper[bot] commented 6 years ago

Version 3.0.3 just got published.

Update to this version instead πŸš€

Release Notes v3.0.3
  • Adds support for ECC Brainpool curves brainpoolP256r1, brainpoolP384r1, and brainpoolP512r1.

  • Allows calculation of expiration time of already expired keys with no valid self certifications

  • Fixed parsing of revocation subkey fingerprint

Commits

The new version differs by 9 commits.

  • afc9164 Release new version
  • f88c1bc Merge pull request #672 from openpgpjs/feat/brainpool
  • 401edab add brainpool gpg compatibility tests
  • 7dcc74b Merge pull request #674 from cheme/master
  • e257e7a Fix parsing of revocation subkey fingerprint
  • 944dece Adds Brainpool Curves + tests + docs
  • 66f9faa Merge pull request #673 from openpgpjs/exp_time
  • 75cd4e5 some fixes, add expired key test
  • c0ceffe some refactoring, calculate exp time of expired keys

See the full diff

greenkeeper[bot] commented 6 years ago

Version 3.0.4 just got published.

Update to this version instead πŸš€

Release Notes v3.0.4
  • Adds an optional date parameter to the generateKey function that will generate a key that will appear to be created at this date. The default value of this is the current time.

  • Adds native Node.js support for Brainpool curves

  • Canonicalizes line endings of data before verification when it has a signature of type "text"

Commits

The new version differs by 12 commits.

  • f1714fd Release new version
  • c13960a Merge pull request #680 from twiss/native-brainpool-node
  • cfb0fdb Check length tag in DER-encoded OIDs
  • 59b608f Enable native Brainpool crypto on Node
  • 8d09538 Merge pull request #679 from openpgpjs/text_sigs
  • 614640e add comment
  • 8778490 tests
  • a22c9e4 WIP text signatures
  • c9d837c Merge pull request #677 from openpgpjs/keygen_date
  • 6fe7303 docs
  • 2f35198 tests
  • eb96d44 add date parameter to generateKey function

See the full diff

greenkeeper[bot] commented 6 years ago

Version 3.0.5 just got published.

Update to this version instead πŸš€

Commits

The new version differs by 2 commits.

See the full diff

greenkeeper[bot] commented 6 years ago

Version 3.0.6 just got published.

Update to this version instead πŸš€

greenkeeper[bot] commented 6 years ago

Version 3.0.7 just got published.

Update to this version instead πŸš€

Release Notes v3.0.7
  • When canonicalizing line endings for text mode, always remove trailing whitespace from lines
Commits

The new version differs by 2 commits.

  • 840a981 Release new version
  • c28f7ad always remove trailing whitespace from lines when canonicalizing

See the full diff

greenkeeper[bot] commented 6 years ago

Version 3.0.8 just got published.

Update to this version instead πŸš€

Commits

The new version differs by 12 commits.

  • dbc195d Release new version
  • 2376c83 Merge pull request #692 from twiss/fix-dash-escaping
  • c63ed98 Fix dash-escaping the first line of cleartext signed messages
  • ce973be Merge pull request #685 from twiss/workers-random
  • 6b2514f Merge pull request #687 from twiss/use-recent-binding
  • ceec576 Use most recent primary user
  • bfc047d Don't request randomness from main thread in workers by default
  • 61f20fd Merge pull request #688 from KAYLukas/master
  • 187cc6b Support compression in the WebWorker
  • 39c7374 Only consider most recent user self certification
  • 122d526 Only consider most recent subkey binding signature
  • 20a9bcc Use crypto.getRandomValues in Workers

See the full diff

greenkeeper[bot] commented 6 years ago

Version 3.0.9 just got published.

Update to this version instead πŸš€

Commits

The new version differs by 55 commits.

  • cf3c279 Release new version
  • 9a5583f clarifying comments
  • d562c14 Merge pull request #691 from twiss/draft04
  • a16d1a6 iOS does not support GCM-en/decrypting empty messages
  • 2627755 iOS Safari doesn't allow setting Error.message
  • 49c9fb1 Only call webCrypto.generateKey once in tests
  • 8ec01ae Reduce duplicate tests
  • a7fce27 Safari 8 compatibility
  • cc1f7a4 Lower chunk_size_byte to 12 (256KiB)
  • 550b758 Fall back to asm for CTR and CBC in old Safari
  • b819138 Bump "old Chrome" version from 38 to 41
  • 48cbb97 Bump Sauce Labs timeout
  • 7ce3f55 Set default draft version to 4
  • 04651e3 Rename enums.aead.gcm to experimental_gcm
  • bbf71d1 Deduplicate OCB encrypt / decrypt

There are 55 commits in total.

See the full diff

greenkeeper[bot] commented 6 years ago

Version 3.0.10 just got published.

Update to this version instead πŸš€

Release Notes v3.0.10
  • Adds an optional userId parameter to upper-level encrypt, sign, and encryptSessionKey functions which can be used to select which of a key's users to use for encryption/signing. This will throw an error if a userId is passed in that is not present in the encrypting/signing key.

  • Always use a subkey for signing when available before resorting to using the primary key

  • Removal of some ESLint silencers

  • When the ignore_mdc_error config flag is set to false (the default), decryption of symmetrically encrypted data packets without integrity protection will always fail, regardless of the cipher used

Commits

The new version differs by 17 commits.

  • 400226c Release new version
  • 34bc45c fix #670 - if ignore_mdc_error is set to false then MDC is required for all symmetrically encrypted data
  • 6efcce1 prioritize signing with subkeys when possible
  • 4926667 Merge pull request #694 from twiss/eslint-cleanup
  • 244a711 Merge pull request #698 from twiss/fix-aead-instructions
  • 4c9d025 Merge pull request #693 from twiss/userid
  • 3ffcc7b Fix AEAD instructions
  • b5c6e65 Warn about console usage
  • 4afaae1 Remove unused variables
  • 6e27e31 Micro-optimize DSA signing
  • 0ae4270 Add Object.assign polyfill
  • 887e832 Throw when user ID matches no users
  • 95b9e51 Remove some ESLint silencers
  • 94b27c9 Don't repeatedly loop enums in enums.read
  • 3c22437 Remove util.isUserId()

There are 17 commits in total.

See the full diff

greenkeeper[bot] commented 6 years ago

Version 3.0.11 just got published.

Update to this version instead πŸš€

Release Notes v3.0.11
  • Fix #710: handle case with binary signatures on textual literal data packets
  • Fix issues with DataCloneErrors when communicating to the service worker on IE11
Commits

The new version differs by 7 commits ahead by 7, behind by 2.

  • bf428b8 Release new version
  • 80aab5d Merge pull request #712 from openpgpjs/signature_formatting
  • bcfb9c0 fix case with binary signatures on text data
  • 5111a2b Merge pull request #705 from mmso/fix/ie11
  • 11ff845 Don't include transferable on IE11 on postMessage
  • 7cd2ade Release new version
  • 33d5b15 fix #706 - if ignore_mdc_error is set to false then MDC is required for all symmetrically encrypted data

See the full diff

greenkeeper[bot] commented 6 years ago

Version 3.0.12 just got published.

Update to this version instead πŸš€

Commits

The new version differs by 16 commits.

  • 96c1c21 Release new version
  • 99d3849 style fix
  • b56afca Merge pull request #725 from FlowCrypt/master
  • 35260cb configurable max uid length | close #724
  • 7736db7 Merge pull request #723 from wiktor-k/fix-signersuid
  • 0099c37 Fix reading signersUserId packet in signatures
  • c7a65cc fix #716
  • 0248604 more helpful error messages when rsa message and sig sizes exceed that of modulus
  • c83c81c Merge pull request #708 from MaximilianKrambach/tests
  • 4beb313 change some variable names in tests to camelCase
  • 75f2918 Merge pull request #714 from wiktor-k/wkd
  • 043e77a Add Web Key Directory lookup
  • da98ccb Add ZBase32 encoding function
  • be26302 Merge pull request #703 from nguyendviet/master
  • 1eb3902 Run tests with randomly generated strings

There are 16 commits in total.

See the full diff

greenkeeper[bot] commented 6 years ago

Version 3.0.13 just got published.

Update to this version instead πŸš€

Commits

The new version differs by 13 commits.

  • 21c908a Release new version
  • 53f473b Merge pull request #734 from twiss/key-revocation
  • 3fd0fa8 Various key revocation fixes
  • 76f5839 name fixes
  • 8865103 Merge pull request #733 from wiktor-k/fix-primary-uid
  • c3d4bf3 Fix Key#getPrimaryUser on keys without valid UIDs
  • e411839 Deduplicate signature packet creation
  • 1ed7943 Create openpgp.revokeKey
  • 368d802 Subkey revocation
  • a3484c3 Key revocation
  • 1bb8623 camel case some variables
  • 5455b4f Merge pull request #728 from MaximilianKrambach/user_packets_678
  • 11029e4 Key merging with non-UserID user attribute

See the full diff

greenkeeper[bot] commented 6 years ago

Version 3.1.0 just got published.

Update to this version instead πŸš€

Commits

The new version differs by 8 commits.

  • 21449eb Release new version
  • 11b2d2d Merge pull request #739 from twiss/key-expiry-capabilities
  • 15e6f0d Replace get(Sub)KeyPackets with get(Sub)Keys
  • 91b7165 Add key/subKey.getKeyId, getFingerprint, getAlgorithmInfo, getCreationTime, isDecrypted
  • 8cfe817 Remove getEncryptionKeyPacket and getSigningKeyPacket
  • a49276a Allow checking expiry of subkeys by capability, keyId or userId
  • 06746b6 Use latest created subkey when possible
  • 8f3e448 Remove obsolete JSDoc comment

See the full diff

greenkeeper[bot] commented 6 years ago

Version 3.1.1 just got published.

Update to this version instead πŸš€

Commits

The new version differs by 10 commits.

  • 16762d0 Release new version
  • 8f01d4b clean up tests
  • adb0148 fix #748, signature cloning in verification objects
  • d1416cb Merge pull request #746 from KAYLukas/fix/worker
  • 01abfc5 remove unnecessary trims
  • 6f176f8 Fix multiple workers
  • 438d47f handle case where primary user doesn't exist when getting exp time
  • 49153db Merge pull request #742 from wiktor-k/fix-uat-verification
  • 19e3c34 Fix verification of User Attributes
  • 5c574d9 remove package-lock

See the full diff

greenkeeper[bot] commented 6 years ago

Version 3.1.2 just got published.

Update to this version instead πŸš€

Release Notes v3.1.2
  • Minor bug fixed - now subkeys are correctly sorted by create time when deciding which to use
Commits

The new version differs by 2 commits.

  • 5be838f Release new version
  • c79bda1 bugfix - compare create time from key packet

See the full diff

greenkeeper[bot] commented 6 years ago

Version 4.0.0 just got published.

Update to this version instead πŸš€

Commits

The new version differs by 94 commits.

  • 22c66c1 Release new version
  • d323643 update release script
  • 7a4df69 Fix intermittent failures of tests for stream error detection on Node
  • 6214459 Merge pull request #709 from twiss/stream
  • e055d86 Update documentation
  • 6134b0d Update README.md
  • 80453d2 Update release script
  • e5a3095 Fix GCM and EAX in Edge
  • 08216ba Add npm run build to build both compat and non-compat files
  • a2044a2 Fix Sauce Labs Edge
  • 4bdc5e9 Add --compat option
  • 8170682 Replace build_debug target with --dev option
  • c705f47 Switch back to hash.js SHA512
  • d1626a7 Disable some tests on Sauce Labs
  • 00a2c0c Support unicode surrogate code points

There are 94 commits in total.

See the full diff

greenkeeper[bot] commented 5 years ago

Version 4.0.1 just got published.

Update to this version instead πŸš€

Commits

The new version differs by 11 commits.

  • aab04c2 Release new version
  • d434374 bugfix - when a requested key capability is not present, return null expiration
  • e616f8a Merge pull request #763 from twiss/decrypt-performance-fix
  • ca2f6d0 Slightly optimize base64 decoding
  • dc72277 Don't process armored message data line per line
  • b004dde Merge pull request #699 from twiss/saucelabs-browsers
  • 8a254b6 Update Sauce Labs browsers
  • 564c645 Fix intermittent "Data did not arrive early" test failure
  • 8681ce8 Merge pull request #755 from DanielRuf/test/add-nodejs-10
  • aa0f132 tests: force npm install instead of npm ci
  • d94a3b8 test: add Node.js 10 and remove Node.js 9

See the full diff

greenkeeper[bot] commented 5 years ago

Update to this version instead πŸš€

Release Notes for v4.0.2
  • Fixes #771: publish compat builds with npm
  • Fixes #768: various issues with armoring
  • Allows slower platforms/browsers to be successfully tested with Saucelabs by grouping tests into separate test groups (they would previously time out after 5 minutes)
Commits

The new version differs by 7 commits.

  • cccebd0 Release new version
  • 528e544 Merge pull request #771 from twiss/publish-compat-npm
  • 7ad4927 Merge pull request #769 from twiss/armor-newlines-consistency
  • 6825484 Publish compat files to npm
  • d884029 Make newlines in armored objects consistent
  • 585ee3f Merge pull request #766 from twiss/split-saucelabs-tests
  • 0a5461b Split Sauce Labs JS unit tests into multiple parts for slow browsers

See the full diff

greenkeeper[bot] commented 5 years ago

Update to this version instead πŸš€

Release Notes for v4.1.0

Bug fixes:

  • Fixed #762 by always considering the last valid signature rather than just the last signature
  • Fixed #765 by disregarding non-self revocation signatures and by returning an error when parsing a key with an authorized revocation key subpacket (not supported by the library)
  • Fixed #752 by adding some documentation to avoid confusion about text vs. binary formats

API changes:

  • Key.prototype.getRevocationCertificate is now async
  • SubKey.prototype.getExpirationTime is now async and takes primaryKey, [date] as parameters instead of just [date]
  • When parsing a key with an authorized revocation key subpacket, we now return an error in the (await openpgp.key.read/readArmored(key)).err array, but also still return the key in the .keys array. This is because we ignore valid third-party revocation signatures made by authorized keys, so the key might not be safe to use in some cases.
Commits

The new version differs by 9 commits.

  • 150222b Release new version
  • a35b4d2 Merge pull request #772 from twiss/getLatestValidSignature
  • ac6b577 Make isValid*KeyPacket inner functions
  • bbcdace Small documentation fixes
  • b3af56b Ignore third-party revocation signatures
  • a1c47ec Indicate an error when parsing a key with an authorized revocation key
  • 5cf61da Check validity of signatures before using them
  • 9614e8f Merge pull request #773 from KAYLukas/master
  • 7a167fc Add missing browserify command

See the full diff

greenkeeper[bot] commented 5 years ago

Update to this version instead πŸš€

Commits

The new version differs by 3 commits.

  • a6e3ada Release new version
  • 28ca741 Merge pull request #778 from twiss/missing-sig-packet
  • 3751731 Don't hang when signature packet corresponding to one-pass sig is missing

See the full diff

greenkeeper[bot] commented 5 years ago

Update to this version instead πŸš€

Release Notes for v4.1.2
  • Fixes #787 which caused performance issues for large messages
  • Multiple documentation updates
  • Parsing an invalid integrity protected packet will now throw an error
Commits

The new version differs by 14 commits.

  • 3c1d89b Release new version
  • 7a2e0dc Merge pull request #787 from twiss/perf-fix-large-msgs
  • baaa071 Fix performance issue with handling large messages
  • f15b648 edit README wording
  • b972bd8 Merge pull request #782 from ZelphirKaltstahl/master
  • 1241892 adapted comment for pull request
  • 2f1f901 added helpful comment about default encryption and decryption of U8intArray with password
  • 6f9670c Clarify comment explaining packetlist's usage of supportsStreaming
  • c3b33c4 Merge pull request #781 from evildvl/patch-1
  • 1e3f223 Merge pull request #779 from twiss/throw-parse-errors
  • a427667 Update function to be clear
  • 9f8c93d Multiple public keys example
  • ee1bcce Multiple public keys code
  • bc61189 Throw on parse errors in integrity protected encrypted packets

See the full diff

greenkeeper[bot] commented 5 years ago

Update to this version instead πŸš€

Commits

The new version differs by 26 commits.

  • a6e20d7 Release new version
  • 67de70f Merge pull request #798 from twiss/seek-bzip
  • 08f48bf Switch to seek-bzip
  • 0be9113 Merge pull request #797 from twiss/security-fixes
  • 9a7fe9c Bump S2K iteration count parameter
  • d314a20 Don't return keys with an authorized revocation key
  • 8fa3aad Add and require primary key binding signatures on signing keys
  • 8c97112 Throw on critical unknown signature subpackets
  • 47138ee Don't trust unhashed signature subpackets
  • 327d3e5 Only accept binary or text signatures when verifying messages
  • 17f639b Merge pull request #795 from twiss/web-crypto-hashing
  • 2245df6 Don't return streams in openpgp.revokeKey()
  • 4faa84d Inline iterated S2K loop
  • a250ee9 Clean up checksum calculation
  • e8a2c45 Only use Web Crypto for hashing beyond a treshold number of bytes

There are 26 commits in total.

See the full diff

greenkeeper[bot] commented 5 years ago

Update to this version instead πŸš€

Commits

The new version differs by 7 commits.

  • 65de9b3 Release new version
  • 86225cb Merge pull request #799 from twiss/signature-data
  • 79124a9 Fix security test generating signing subkey on Safari 10
  • c037b96 Babelify seek-bzip for compat build
  • f96bf45 Lower S2K iteration count parameter in tests
  • 997f3e8 Compute signed data based on expected signature type
  • 1071cb9 Fix cloning embedded signatures

See the full diff

greenkeeper[bot] commented 5 years ago

Update to this version instead πŸš€

Commits

The new version differs by 9 commits.

  • 6c1738f Release new version
  • 798ac52 Merge pull request #810 from KAYLukas/fix/pako-missing-eof
  • a49529d Handle end of stream in compression correctly
  • 9d585cd Merge pull request #808 from mailvelope/rev-key-fix
  • a7bae10 Revise check on key revocation sub packet: throwing the exception should only be done on single keys and not discard the whole armored block with possibly multiple keys. Evaluate only self-signatures.
  • 47e6e2f Merge pull request #805 from Frontwise/no_arrow_func_in_compat_build
  • 44d81aa Compat build: specify target browsers
  • 161b034 Merge pull request #802 from KAYLukas/feat/3-des
  • c952e83 Support 3des as a session key algorithm

See the full diff

greenkeeper[bot] commented 5 years ago

Update to this version instead πŸš€

Commits

The new version differs by 18 commits.

  • d24bdd5 Release new version
  • f0f9a5c Fix key generation tests on Node
  • b1b1994 Merge pull request #816 from twiss/security-fixes
  • 804e911 Add config values to preferred algorithms
  • 926047f Default to RFC4880bis-mandated symmetric algos
  • 0660831 Fix CMAC of the empty string
  • 9b83f6f Return generic error on PKESK checksum mismatch when decrypting
  • e727097 Always look at the same literal data packet in getText() and verify()
  • 8720adc Check signature public key algorithm against issuer key algorithm
  • 3b9676f Reject messages encrypted with a symmetric algo not in preferred algos
  • a173e56 Merge pull request #817 from meitar/revkey-readme-fix
  • cd61531 Fix revocation example in README, use revocationCertificate.
  • cb3f644 Validate ECC public keys
  • d4d94c6 Remove non-AES CFB quick check
  • c7339f6 Check whether signing key was non-expired at signature creation time

There are 18 commits in total.

See the full diff

greenkeeper[bot] commented 5 years ago

Update to this version instead πŸš€

Commits

The new version differs by 22 commits.

  • 8c7c643 Release new version
  • f074d36 update CFB tests
  • 6c02b25 Merge pull request #820 from twiss/web-crypto-cfb
  • b105dc9 Merge pull request #812 from KAYLukas/fix/non-primary-non-revoked-sub-user
  • 529973f Merge branch 'master' into fix/non-primary-non-revoked-sub-user
  • 1bee091 Merge pull request #815 from twiss/userIds
  • d8a22d8 Merge pull request #818 from openpgpjs/gitter
  • 113c4a5 Add CAST5 to always-allowed algorithms
  • 95cc9ce Disable Web Workers on browsers without MessageChannel support
  • 3a2408d Fix stream.slice() in old Firefox
  • 2c5cb6a Fix armor parsing in edge case where reader.readToEnd() returns new Uint8Array([])
  • cfe7ff9 Simplify MDC verification
  • 9691dc9 Fix getExpirationTime with capabilities and an expired signing subkey
  • 668264a Move CFB optimizations into cfb.js
  • 3c10c58 Web Crypto CFB encryption

There are 22 commits in total.

See the full diff

greenkeeper[bot] commented 5 years ago

Update to this version instead πŸš€

greenkeeper[bot] commented 5 years ago

Update to this version instead πŸš€

Commits

The new version differs by 4 commits.

  • 83623b3 Release new version
  • 3e12314 Add old Firefox back to Sauce Labs tests
  • 3ed5bb3 Add Safari 9 to Sauce Labs tests
  • 5c5da1d Fix passing streams to workers in Safari 9

See the full diff

greenkeeper[bot] commented 5 years ago

Update to this version instead πŸš€

Commits

The new version differs by 16 commits.

  • 92ba734 Release new version
  • ffeb43e Merge pull request #831 from twiss/web-crypto-cfb
  • 37bc379 Merge pull request #828 from tomholub/patch-1
  • b940314 Merge pull request #834 from benhc123/patch-1
  • fe3c9a0 grammar improvement
  • 9b599c8 Merge pull request #827 from estelendur/double_is_readonly
  • 4458ea7 Revert "Adds dist changes derived from previous commit."
  • 1e5935d Require recent Firefox on Sauce Labs to pass
  • 4ce2dd2 update CFB tests
  • 31931c9 Simplify MDC verification
  • 3f1734a Move CFB optimizations into cfb.js
  • a891e0b Web Crypto CFB encryption
  • cf6278d Promisify hash.digest return value in jsdoc
  • 1054ed4 Fix util.js jsdoc Uint8Array typos
  • 6cd5152 Adds dist changes derived from previous commit.

There are 16 commits in total.

See the full diff

greenkeeper[bot] commented 5 years ago

Update to this version instead πŸš€

Commits

The new version differs by 11 commits.

  • b904aef Release new version
  • a87d03a Merge pull request #838 from twiss/worker-buffer-transfer
  • e3cae6c Merge pull request #837 from benhc123/patch-3
  • df72a3e Merge pull request #840 from mmso/fix/minification
  • 9ce5b7c Upgrade to terser-js
  • fe69cb8 Zero-copy transfer buffers when passing streams to workers
  • 625c6ea Zero-copy transfer buffers from the worker to the main thread
  • c73b453 Fix error handling in worker delegation
  • 5323739 Added link to license for informational purposes
  • 1fc0b25 Merge pull request #835 from benhc123/patch-2
  • e52504b Removed broken links

See the full diff

greenkeeper[bot] commented 5 years ago

Update to this version instead πŸš€

Release Notes for v4.4.5
  • Don't zero-copy transfer buffers in Safari 11.1 and Chrome < 56 (#841)
Commits

The new version differs by 3 commits.

  • 1ec216a Release new version
  • 49a7dea Don't run AsyncProxy tests in browsers that don't fully support workers
  • 77055f6 Don't zero-copy transfer buffers in Safari 11.1 and Chrome < 56

See the full diff

greenkeeper[bot] commented 5 years ago

Update to this version instead πŸš€

Commits

The new version differs by 13 commits.

  • 96eca0c Release new version
  • 2b17ffb Merge pull request #844 from wussler/master
  • bced451 Merge pull request #843 from crcunningham/patch-1
  • 6b19af0 new BN, fix doc
  • 2975e49 genPublicEphemeralKey to return Uint8Array
  • 6d9160d Fix mistake in documentation
  • 1face48 Naming
  • 4c809a4 Fix to returns
  • 31f72fb Update src/crypto/public_key/elliptic/ecdh.js
  • 680aa03 Update src/crypto/public_key/elliptic/ecdh.js
  • f77ebc7 Update src/crypto/public_key/elliptic/ecdh.js
  • 06952b4 Make ephemeral secret available from ECDH module
  • bd96433 Update README.md: Fix error

See the full diff

greenkeeper[bot] commented 5 years ago

Update to this version instead πŸš€

Commits

The new version differs by 9 commits.

  • e2d19a7 Release new version
  • 9d7db98 Specify git commits in package.json
  • 352dd56 Fix async describe() in test suite that always runs
  • 1dd168e Fix ECDH message encryption for some session keys
  • cd9fd86 Update openpgpjs/elliptic
  • d91b064 Optimize util.removeTrailingSpaces (#848)
  • f018f60 ECDHE tests (#846)
  • b0ac142 Merge pull request #847 from twiss/dont-throw-verification-errors
  • 9e4cc1a Don't throw on signature verification errors in openpgp.decrypt/verify

See the full diff

greenkeeper[bot] commented 5 years ago

Update to this version instead πŸš€

Release Notes for v4.4.8
  • Improve HKP examples, documentation and tests (#855)
  • Fix streaming/signed encryption with config.integrity_protect=false
  • With config.ignore_mdc_error=false, throw error before decrypting in non-MDC packets instead of after
  • Optimize reading large messages with lots of tiny partial body parts (#864)
  • Expand git hashes in dependencies to fix pnpm install (#858)
  • Update streams polyfill to fix a memory leak in Node.js; see MattiasBuelens/web-streams-polyfill#8 (#867)
  • Use ES6 build of web-streams-polyfill in non-compat builds
Commits

The new version differs by 10 commits.

  • b9abf80 Release new version
  • 76ce33d Use ES6 build of web-streams-polyfill in non-compat builds
  • ab0892b Update web-streams-polyfill
  • e17ad66 Expand git hashes in dependencies
  • a291a80 Fix reading indeterminate-length packets in IE11
  • cd6eadd Fix reading empty partial body part (again)
  • 5dcaf85 Optimize reading large messages with lots of tiny partial body parts (#864)
  • 54fc1dd Throw error before decrypting in non-MDC packets
  • 40360b4 Fix streaming/signed encryption with config.integrity_protect=false
  • 3edc6e7 ++ Add another Domain for HKP server (#855)

See the full diff

greenkeeper[bot] commented 5 years ago

Update to this version instead πŸš€

Release Notes for v4.4.9
  • Fix merging multiple subkey binding signatures (#868)
Commits

The new version differs by 2 commits.

  • 10d3bca Release new version
  • b1be7d1 Fix merging multiple subkey binding signatures (#868)

See the full diff

greenkeeper[bot] commented 5 years ago

Update to this version instead πŸš€

Commits

The new version differs by 2 commits.

  • 1ac8448 Release new version
  • a9599fe Work around go crypto bug in ECDH messages (#869)

See the full diff

greenkeeper[bot] commented 5 years ago

Update to this version instead πŸš€

Commits

The new version differs by 16 commits.

  • dff2dcd Release new version
  • 39bb4dd Merge pull request #893 from twiss/tweetnacl
  • 6689f93 Fix flaky test in Edge
  • f322aaf CI: Require Chrome instead of Firefox to succeed
  • 34e6eac Don't attempt to use workers if they fail to load
  • ecc8ae2 Don't include package.json
  • ffa8344 Only include tweetnacl functions we need
  • caa712c Fix using local dependencies
  • e637e75 Clean up ECDH API
  • ca0322b Use tweetnacl's X25519 implementation
  • be1b4df Use tweetnacl's Ed25519 implementation
  • d2c3869 Put comment before email when generating UIDs (#892)
  • cc4a911 Add Node 12 to CI (#889)
  • d5e87dc Move non-external dependencies to devDependencies (#888)
  • 7fb2901 Fix detached signing of messages created from streams (#887)

There are 16 commits in total.

See the full diff

greenkeeper[bot] commented 5 years ago

Update to this version instead πŸš€

greenkeeper[bot] commented 5 years ago

Update to this version instead πŸš€

greenkeeper[bot] commented 5 years ago

Update to this version instead πŸš€

greenkeeper[bot] commented 5 years ago

Update to this version instead πŸš€

greenkeeper[bot] commented 5 years ago

Update to this version instead πŸš€

greenkeeper[bot] commented 5 years ago

Update to this version instead πŸš€

greenkeeper[bot] commented 4 years ago

Update to this version instead πŸš€

greenkeeper[bot] commented 4 years ago

Update to this version instead πŸš€

greenkeeper[bot] commented 4 years ago

Update to this version instead πŸš€

greenkeeper[bot] commented 4 years ago

Update to this version instead πŸš€

greenkeeper[bot] commented 4 years ago

Update to this version instead πŸš€

greenkeeper[bot] commented 4 years ago

Update to this version instead πŸš€