{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":126862351,"defaultBranch":"master","name":"openpgpjs","ownerLogin":"twiss","currentUserCanPush":false,"isFork":true,"isEmpty":false,"createdAt":"2018-03-26T17:08:34.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/908303?v=4","public":true,"private":false,"isOrgOwned":false},"refInfo":{"name":"","listCacheKey":"v0:1693324609.0","currentOid":""},"activityList":{"items":[{"before":"7498223c24b9216512b5257e7e4c98e2c90180e1","after":"2a67f02b97d789650217193ccd1824a3fd0eb562","ref":"refs/heads/update-packet-versions","pushedAt":"2023-09-01T14:18:50.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"larabr","name":null,"path":"/larabr","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7375870?s=80&v=4"},"commit":{"message":"Add SEIP.fromObject\n\nTo avoid defaulting to v1","shortMessageHtmlLink":"Add SEIP.fromObject"}},{"before":"35dc7042eb3d2572945bd4d18cf60898cf789d3c","after":"7498223c24b9216512b5257e7e4c98e2c90180e1","ref":"refs/heads/update-packet-versions","pushedAt":"2023-08-31T14:42:32.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"larabr","name":null,"path":"/larabr","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7375870?s=80&v=4"},"commit":{"message":"Add SEIP.fromObject\n\nTo avoid defaulting to v1","shortMessageHtmlLink":"Add SEIP.fromObject"}},{"before":"5a21cf854124780a129bab93892337c46c3b018c","after":"35dc7042eb3d2572945bd4d18cf60898cf789d3c","ref":"refs/heads/update-packet-versions","pushedAt":"2023-08-31T13:31:50.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"larabr","name":null,"path":"/larabr","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7375870?s=80&v=4"},"commit":{"message":"Only parse Issuer Key ID subpacket in v4 signatures\n\nThis packet must not be included in newer signature versions, but if it is\npresent it can cause internal inconsistencies, so we avoid parsing it.","shortMessageHtmlLink":"Only parse Issuer Key ID subpacket in v4 signatures"}},{"before":"194bcc7afd3bb404ec20c1a18f68e9366a34342e","after":"5a21cf854124780a129bab93892337c46c3b018c","ref":"refs/heads/update-packet-versions","pushedAt":"2023-08-28T13:38:14.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"larabr","name":null,"path":"/larabr","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7375870?s=80&v=4"},"commit":{"message":"Add SEIP.fromObject\n\nTo avoid defaulting to v1","shortMessageHtmlLink":"Add SEIP.fromObject"}},{"before":"2231abd3a52143d102d4c60aa3b1a835ddecccac","after":"194bcc7afd3bb404ec20c1a18f68e9366a34342e","ref":"refs/heads/update-packet-versions","pushedAt":"2023-08-28T12:46:49.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"larabr","name":null,"path":"/larabr","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7375870?s=80&v=4"},"commit":{"message":"Simplify OPS generation and fix order","shortMessageHtmlLink":"Simplify OPS generation and fix order"}},{"before":"e1a481683dab23f1718a0efc9bc1345e1f02ebc3","after":"2231abd3a52143d102d4c60aa3b1a835ddecccac","ref":"refs/heads/update-packet-versions","pushedAt":"2023-08-07T20:08:00.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"larabr","name":null,"path":"/larabr","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7375870?s=80&v=4"},"commit":{"message":"Add PKESK.fromObject","shortMessageHtmlLink":"Add PKESK.fromObject"}},{"before":"79e45df2a8eb14d27a0383c3de1268b13b44281f","after":"e1a481683dab23f1718a0efc9bc1345e1f02ebc3","ref":"refs/heads/update-packet-versions","pushedAt":"2023-08-07T19:54:49.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"larabr","name":null,"path":"/larabr","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7375870?s=80&v=4"},"commit":{"message":"Add PKESK.fromObject","shortMessageHtmlLink":"Add PKESK.fromObject"}},{"before":"d051167e58371b10f379fabff5752c22964cb469","after":"79e45df2a8eb14d27a0383c3de1268b13b44281f","ref":"refs/heads/update-packet-versions","pushedAt":"2023-08-07T18:38:29.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"larabr","name":null,"path":"/larabr","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7375870?s=80&v=4"},"commit":{"message":"Only emit Hash header below V6 for cleartext messages\n\nThe latest version of the crypto refresh (i.e., !313, !314) specifies that\nthe \"Hash\" header is depricated. This commit changes that the Hash header\nis only generated if a cleartext message contains a non-V6 signature.","shortMessageHtmlLink":"Only emit Hash header below V6 for cleartext messages"}},{"before":"7eceef2d6aad67c8f9c57c9c9dc596506837695c","after":"d051167e58371b10f379fabff5752c22964cb469","ref":"refs/heads/update-packet-versions","pushedAt":"2023-08-03T15:32:15.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"larabr","name":null,"path":"/larabr","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7375870?s=80&v=4"},"commit":{"message":"Implement packet criticality check\n\nThe Packet Tag space is now partitioned into critical packets and non-critical packets.\nIf an implementation encounters a critical packet where the packet type is unknown in a packet sequence,\nit MUST reject the whole packet sequence. On the other hand, an unknown non-critical packet MUST be ignored.\n\nSee https://www.ietf.org/archive/id/draft-ietf-openpgp-crypto-refresh-10.html#section-4.3.1 .","shortMessageHtmlLink":"Implement packet criticality check"}},{"before":"693f972e18cd4e6851becfe527f50aba7cb1f1fd","after":"7eceef2d6aad67c8f9c57c9c9dc596506837695c","ref":"refs/heads/update-packet-versions","pushedAt":"2023-07-31T21:44:28.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"larabr","name":null,"path":"/larabr","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7375870?s=80&v=4"},"commit":{"message":"Argon2: avoid loading multiple wasm modules on first initialisation\n\nConcurrent calls to `Argon2S2K.produceKey` prior to the `argon2Promise` being\ninitialised could result in multiple Wasm modules being loaded.\n\nThis scenario could be triggered during e.g. key (incl. subkey) decryption.","shortMessageHtmlLink":"Argon2: avoid loading multiple wasm modules on first initialisation"}},{"before":"1623a063401e0c938a82ed49554456b7d0782a8e","after":"693f972e18cd4e6851becfe527f50aba7cb1f1fd","ref":"refs/heads/update-packet-versions","pushedAt":"2023-07-31T18:08:43.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"larabr","name":null,"path":"/larabr","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7375870?s=80&v=4"},"commit":{"message":"Implement packet criticality check\n\nThe Packet Tag space is now partitioned into critical packets and non-critical packets.\nIf an implementation encounters a critical packet where the packet type is unknown in a packet sequence,\nit MUST reject the whole packet sequence. On the other hand, an unknown non-critical packet MUST be ignored.\n\nSee https://www.ietf.org/archive/id/draft-ietf-openpgp-crypto-refresh-10.html#section-4.3.1 .","shortMessageHtmlLink":"Implement packet criticality check"}},{"before":"7723b60c30fbcd746d4331b1d85aeb235daa48a4","after":"1623a063401e0c938a82ed49554456b7d0782a8e","ref":"refs/heads/update-packet-versions","pushedAt":"2023-07-31T14:50:13.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"larabr","name":null,"path":"/larabr","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7375870?s=80&v=4"},"commit":{"message":"Implement packet criticality check\n\nThe Packet Tag space is now partitioned into critical packets and non-critical packets.\nIf an implementation encounters a critical packet where the packet type is unknown in a packet sequence,\nit MUST reject the whole packet sequence. On the other hand, an unknown non-critical packet MUST be ignored.\n\nSee https://www.ietf.org/archive/id/draft-ietf-openpgp-crypto-refresh-10.html#section-4.3.1 .","shortMessageHtmlLink":"Implement packet criticality check"}},{"before":"891d3e729d41cf1bf513e39e73f6b7b2ffe3217e","after":"7723b60c30fbcd746d4331b1d85aeb235daa48a4","ref":"refs/heads/update-packet-versions","pushedAt":"2023-07-31T13:49:09.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"larabr","name":null,"path":"/larabr","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7375870?s=80&v=4"},"commit":{"message":"Implement packet criticality check\n\nThe Packet Tag space is now partitioned into critical packets and non-critical packets.\nIf an implementation encounters a critical packet where the packet type is unknown in a packet sequence,\nit MUST reject the whole packet sequence. On the other hand, an unknown non-critical packet MUST be ignored.\n\nSee https://www.ietf.org/archive/id/draft-ietf-openpgp-crypto-refresh-10.html#section-4.3.1 .","shortMessageHtmlLink":"Implement packet criticality check"}},{"before":"4737879994dbc99bae17e3833c4281ee166f19c6","after":"891d3e729d41cf1bf513e39e73f6b7b2ffe3217e","ref":"refs/heads/update-packet-versions","pushedAt":"2023-07-31T12:35:09.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"larabr","name":null,"path":"/larabr","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7375870?s=80&v=4"},"commit":{"message":"Implement packet criticality check\n\nThe Packet Tag space is now partitioned into critical packets and non-critical packets.\nIf an implementation encounters a critical packet where the packet type is unknown in a packet sequence,\nit MUST reject the whole packet sequence. On the other hand, an unknown non-critical packet MUST be ignored.\n\nSee https://www.ietf.org/archive/id/draft-ietf-openpgp-crypto-refresh-10.html#section-4.3.1 .","shortMessageHtmlLink":"Implement packet criticality check"}},{"before":"e4bf1bf236427ad09b8239ed14d651a8351c6230","after":"4737879994dbc99bae17e3833c4281ee166f19c6","ref":"refs/heads/update-packet-versions","pushedAt":"2023-07-25T09:41:25.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"larabr","name":null,"path":"/larabr","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7375870?s=80&v=4"},"commit":{"message":"Implement packet criticality check\n\nThe Packet Tag space is now partitioned into critical packets and non-critical packets.\nIf an implementation encounters a critical packet where the packet type is unknown in a packet sequence,\nit MUST reject the whole packet sequence. On the other hand, an unknown non-critical packet MUST be ignored.\n\nSee https://www.ietf.org/archive/id/draft-ietf-openpgp-crypto-refresh-10.html#section-4.3.1 .","shortMessageHtmlLink":"Implement packet criticality check"}},{"before":"c6126e04e476139c130bd2b37171e4071ab56654","after":"e4bf1bf236427ad09b8239ed14d651a8351c6230","ref":"refs/heads/update-packet-versions","pushedAt":"2023-07-24T17:04:27.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"larabr","name":null,"path":"/larabr","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7375870?s=80&v=4"},"commit":{"message":"Support AEAD encryption for v4 and v6 private keys","shortMessageHtmlLink":"Support AEAD encryption for v4 and v6 private keys"}},{"before":"9464a0e50a0a397dc8745cab05641524d214c0f6","after":"c6126e04e476139c130bd2b37171e4071ab56654","ref":"refs/heads/update-packet-versions","pushedAt":"2023-04-06T16:18:49.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"larabr","name":null,"path":"/larabr","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7375870?s=80&v=4"},"commit":{"message":"Support AEAD encryption for v4 and v6 private keys","shortMessageHtmlLink":"Support AEAD encryption for v4 and v6 private keys"}},{"before":"d411eb3f916e9dd6961b557f77660b3ba9ca5845","after":"9464a0e50a0a397dc8745cab05641524d214c0f6","ref":"refs/heads/update-packet-versions","pushedAt":"2023-04-06T12:03:12.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"twiss","name":"Daniel Huigens","path":"/twiss","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/908303?s=80&v=4"},"commit":{"message":"Return object from getPreferredCipherSuite instead of array\n\nRather than returning [symmetricAlgo, aeadAlgo] from\ngetPreferredCipherSuite, return { symmetricAlgo, aeadAlgo }.\n\nAlso, return aeadAlgo: undefined rather than 0 to indicate no AEAD\nalgorithm is used (CFB is used instead).","shortMessageHtmlLink":"Return object from getPreferredCipherSuite instead of array"}},{"before":"f67479a4d0fa7e3917c7a8161bf3e89583737f96","after":"d411eb3f916e9dd6961b557f77660b3ba9ca5845","ref":"refs/heads/update-packet-versions","pushedAt":"2023-04-06T09:58:31.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"twiss","name":"Daniel Huigens","path":"/twiss","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/908303?s=80&v=4"},"commit":{"message":"Appease linter","shortMessageHtmlLink":"Appease linter"}},{"before":"06c11a692cd81d0a15fcc394c259a2f45a157504","after":"f67479a4d0fa7e3917c7a8161bf3e89583737f96","ref":"refs/heads/update-packet-versions","pushedAt":"2023-04-05T15:58:35.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"larabr","name":null,"path":"/larabr","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7375870?s=80&v=4"},"commit":{"message":"Fix race condition in AEAD message decryption","shortMessageHtmlLink":"Fix race condition in AEAD message decryption"}},{"before":"dcb51bef6a797501e340635454cdadf26c885e7b","after":"06c11a692cd81d0a15fcc394c259a2f45a157504","ref":"refs/heads/update-packet-versions","pushedAt":"2023-04-05T15:34:24.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"larabr","name":null,"path":"/larabr","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7375870?s=80&v=4"},"commit":{"message":"CI: don't test on Node 20\n\nNeed to update Sinon, plus need to investigate AEAD decryption errors","shortMessageHtmlLink":"CI: don't test on Node 20"}},{"before":"7a5a803fab98070a2537a9a6340d202cd633ce2f","after":"dcb51bef6a797501e340635454cdadf26c885e7b","ref":"refs/heads/update-packet-versions","pushedAt":"2023-04-05T15:24:34.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"larabr","name":null,"path":"/larabr","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7375870?s=80&v=4"},"commit":{"message":"Ignore race condition in AEAD message decryption tests","shortMessageHtmlLink":"Ignore race condition in AEAD message decryption tests"}},{"before":"961312c81f4bdee970df366af03416350eece804","after":"7a5a803fab98070a2537a9a6340d202cd633ce2f","ref":"refs/heads/update-packet-versions","pushedAt":"2023-04-04T23:26:58.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"larabr","name":null,"path":"/larabr","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7375870?s=80&v=4"},"commit":{"message":"Fix floating promise rejection in AEAD message decryption","shortMessageHtmlLink":"Fix floating promise rejection in AEAD message decryption"}},{"before":"971a2ca0ca4beda3c7b865157ad2d1fa418225d6","after":"961312c81f4bdee970df366af03416350eece804","ref":"refs/heads/update-packet-versions","pushedAt":"2023-04-04T22:55:07.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"larabr","name":null,"path":"/larabr","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7375870?s=80&v=4"},"commit":{"message":"Throw intelligible error on GCM authentication failure, fix/refactor test for modification detection on decryption","shortMessageHtmlLink":"Throw intelligible error on GCM authentication failure, fix/refactor …"}},{"before":"150afacc03b96c17cc91b96aed8a35f69769f50d","after":"971a2ca0ca4beda3c7b865157ad2d1fa418225d6","ref":"refs/heads/update-packet-versions","pushedAt":"2023-04-04T11:27:17.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"twiss","name":"Daniel Huigens","path":"/twiss","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/908303?s=80&v=4"},"commit":{"message":"Update initial hash octet for v6 fingerprints","shortMessageHtmlLink":"Update initial hash octet for v6 fingerprints"}},{"before":"cf783ae66cfd40f4023a6c5ea74f59303da18fbb","after":"150afacc03b96c17cc91b96aed8a35f69769f50d","ref":"refs/heads/update-packet-versions","pushedAt":"2023-04-03T13:57:34.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"twiss","name":"Daniel Huigens","path":"/twiss","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/908303?s=80&v=4"},"commit":{"message":"Update initial hash octet for v6 fingerprints","shortMessageHtmlLink":"Update initial hash octet for v6 fingerprints"}},{"before":"d7175d42969e9bf6f452c976d0a0aa0481c4a88b","after":"cf783ae66cfd40f4023a6c5ea74f59303da18fbb","ref":"refs/heads/update-packet-versions","pushedAt":"2023-04-03T13:55:25.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"twiss","name":"Daniel Huigens","path":"/twiss","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/908303?s=80&v=4"},"commit":{"message":"Update initial hash octet for v6 fingerprints","shortMessageHtmlLink":"Update initial hash octet for v6 fingerprints"}},{"before":"a3d41b19795f793360bae64db47c53402da33f2f","after":"d7175d42969e9bf6f452c976d0a0aa0481c4a88b","ref":"refs/heads/update-packet-versions","pushedAt":"2023-03-21T19:42:07.000Z","pushType":"push","commitsCount":2,"pusher":{"login":"twiss","name":"Daniel Huigens","path":"/twiss","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/908303?s=80&v=4"},"commit":{"message":"Update initial hash octet for v6 fingerprints","shortMessageHtmlLink":"Update initial hash octet for v6 fingerprints"}},{"before":"f985995c1305d88a44a7131056f9282dd693cb34","after":"a3d41b19795f793360bae64db47c53402da33f2f","ref":"refs/heads/update-packet-versions","pushedAt":"2023-03-20T17:28:37.061Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"twiss","name":"Daniel Huigens","path":"/twiss","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/908303?s=80&v=4"},"commit":{"message":"Move the PKCS#5 padding into the algorithms\n\nRather than padding in the PKESK packet, add padding inside the\npublic-key algorithms, so that we can later add algorithms without\nany padding.\n\nAdditionally, simplify the constant-time decryption logic, by always\nusing the assumed algorithm, rather than doing a constant-time select\nbased on whether the decrypted algorithm identifier was correct.","shortMessageHtmlLink":"Move the PKCS#5 padding into the algorithms"}},{"before":"7619447b7c1c22a242d87ea6eb5d83468c0d17a8","after":"f985995c1305d88a44a7131056f9282dd693cb34","ref":"refs/heads/update-packet-versions","pushedAt":"2023-03-20T17:12:53.060Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"twiss","name":"Daniel Huigens","path":"/twiss","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/908303?s=80&v=4"},"commit":{"message":"Move the PKCS#5 padding into the algorithms\n\nRather than padding in the PKESK packet, add padding inside the\npublic-key algorithms, so that we can later add algorithms without\nany padding.\n\nAdditionally, simplify the constant-time decryption logic, by always\nusing the assumed algorithm, rather than doing a constant-time select\nbased on whether the decrypted algorithm identifier was correct.","shortMessageHtmlLink":"Move the PKCS#5 padding into the algorithms"}}],"hasNextPage":true,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"djE6ks8AAAADd4UfNQA","startCursor":null,"endCursor":null}},"title":"Activity · twiss/openpgpjs"}