Daniel Huigens
|
f8d9ba516a
|
Update ProtonMail/crypto
|
2020-11-12 13:53:46 +01:00 |
|
wussler
|
371d429001
|
WIP: Add compression to API (#91)
* Add compression to API
* Add docs
* Use defaults for a simpler interface
* Update x/crypto
* Fix ecdsa key types for lib update
|
2020-11-04 17:40:45 +01:00 |
|
wussler
|
6b2ac0b11c
|
Migrate CI to actions, build artifacts (#89)
* Create go workflow
* Delete travis config
* Update build script
* Create apple workflow
* Create android workflow
Co-authored-by: marin thiercelin <marin.thiercelin@pm.me>
|
2020-10-19 10:07:25 +02:00 |
|
Daniel Huigens
|
486e1220a1
|
Update ProtonMail/crypto (#42)
|
2020-04-25 16:03:49 +02:00 |
|
wussler
|
3c79f40acb
|
Add SHA256 fingerprint utils and helpers (#41)
|
2020-04-07 14:59:25 +02:00 |
|
wussler
|
54f45d0471
|
Openpgp security update (V2) (#31)
* Change keyring unlock functionalities
* Add keyring#Lock, keyring#CheckIntegrity, tests
* Update helpers, fix bugs
* Update go.mod with ProtonMail/crypto commit
* Change key management system
* Clear keys from memory + tests
* Create SessionKey with direct encryption for datapackets. Move symmetrickey to password.
* Fix upstream dependencies
* Update module to V2, documentation
* Add linter
* Add v2 folder to .gitignore
* Minor changes to KeyID getters
* Remove old changelog
* Improve docs, remove compilation script
|
2019-12-27 19:35:43 +01:00 |
|
Daniel Huigens
|
7e8dd9ab95
|
Update ProtonMail/crypto
|
2019-08-14 17:34:13 +02:00 |
|
Daniel Huigens
|
781681b548
|
Use Entitiy.EncryptionKey instead of reimplementing it
This fixes us sometimes using subkeys whose key flags allow
encryption but don't have a valid algorithm for encryption,
or that are expired, etc.
|
2019-06-04 16:45:33 +02:00 |
|
Daniel Huigens
|
82d49bf235
|
Update dependencies
|
2019-05-21 16:09:42 +02:00 |
|
Daniel Huigens
|
def57f1f88
|
Switch to Go modules (#7)
|
2019-05-21 15:43:33 +02:00 |
|