Peter Cai
8f9728cd60
Catch SecurityException from using a stale Tag object
...
Applications are not supposed to be able to do any I/O using a stale Tag
object. This was not checked in older Android versions, but enforced
later since Android 13 (and possibly in Android 12L).
When we are checking for a disconnected tag, the Tag object can become
stale if the same tag (or another tag) gets rediscovered. In addition,
if NfcService is restarted for some reason, the cookie value used to
check for this will also be reset to 0. In any case, a SecurityException
could be raised when checking for a disconnected tag, and we should be
able to handle this case.
2022-12-12 18:27:40 -05:00
Harsh Shandilya
6b3368acb2
Update SplitUserIdTest.java
2021-05-02 19:23:02 +05:30
Harsh Shandilya
6408bac245
OpenKeychain: add a test for TLD-less email
...
Signed-off-by: Harsh Shandilya <me@msfjarvis.dev>
2021-05-02 19:04:20 +05:30
Dominik Schürmann
5522b6d583
use getDigest() properly
2021-04-29 17:58:31 +02:00
Dominik Schürmann
7cf34b0539
do not call digestCalculator.getDigest() twice
2021-04-29 17:52:31 +02:00
Dominik Schürmann
f8724d3f42
integrate EdDSAAuthenticationSigner into default signer using enablePreHash parameter
2021-04-29 17:51:39 +02:00
Dominik Schürmann
a9b28dd11c
improve card decrypt with constants
2021-04-21 14:48:14 +02:00
Dominik Schürmann
28c23f84bf
improve variable names in ECDH card decrypt
2021-04-21 14:36:55 +02:00
dangfan
ec5d5e399f
add more documentation of decryptSessionKeyEcdh
2021-04-21 19:09:35 +08:00
dangfan
9ea9bd96bb
fix the compatibility of compressed and uncompressed format in ECDH
2021-04-21 09:25:59 +08:00
Dominik Schürmann
38157242e1
HKP parsing: make \r optional in pubkey lines
2021-04-18 10:24:37 +02:00
Stelian Pop
20caa22f05
Fix parsing of EOL in keyserver answer
2021-04-16 11:36:25 +02:00
Christian Hagau
178e7856b2
Don't explicitly clear PIN when verifying admin PIN.
...
The PIN is cleared anyway when the Passphrase object holding the PIN is
freed.
2021-04-02 00:00:00 +00:00
David Hedberg
f45254cf07
Only skip hashing when creating an EDDSA authentication signature
2021-03-27 11:38:14 +01:00
Dominik Schürmann
3dfa1af046
update from transifex
2021-03-17 21:13:55 +01:00
Dominik Schürmann
64f4d7aaa4
Version 5.7
2021-03-17 12:32:55 +01:00
Dominik Schürmann
903cce6b20
fix SecurityTokenUtilsTest
2021-03-16 19:50:29 +01:00
Dominik Schürmann
56254aedb7
improve and simplify key formats
2021-03-16 17:07:56 +01:00
Dominik Schürmann
c899e5ef2d
Merge branch 'master' of https://github.com/dhedberg/open-keychain into dhedberg-master
2021-03-16 15:47:24 +01:00
Dominik Schürmann
0b49e7f91f
fix build error introduced by x25519 decryption support
2021-03-16 15:25:24 +01:00
Dominik Schürmann
7e5738bd5c
Merge pull request #2630 from canokeys/fix_ecdh_kek_error
...
Fix ECDH decryption error using NIST curves
2021-03-16 15:13:23 +01:00
Dominik Schürmann
fb0651eda1
fix algorithm id for ECDSA auth keys on security keys
2021-03-16 15:12:22 +01:00
Dominik Schürmann
af64735cbf
disable IDEA, simply arguments in PgpSecurityConstants
2021-03-16 14:54:15 +01:00
Dominik Schürmann
8d01f2d077
master -> primary in strings
2021-02-26 15:36:11 +01:00
Dominik Schürmann
94987a9010
rename whitelists to secure lists
2021-02-26 15:11:54 +01:00
Dominik Schürmann
0ec0c34cb9
move toBytes into RSAKeyFormat
2021-02-23 18:18:43 +01:00
Dominik Schürmann
2a0625e615
fix yubikey curve OID bug by reworking ASN1 parsing
2021-02-23 18:10:15 +01:00
David Hedberg
6d4f37b154
Don't hash the data to sign when using EDDSA
2021-02-20 19:43:04 +01:00
David Hedberg
3fb4771602
Activate ssh encoding of public keys for ed25519
2021-02-20 19:39:28 +01:00
Christian Hagau
7dc0c5e184
Initialize all members of KdfParameters with default values
2021-02-17 00:00:00 +00:00
Christian Hagau
b69a7c585d
Fix parameter names for KdfParameters setters
2021-02-17 00:00:00 +00:00
Christian Hagau
5ccd4c05e8
Add missing break statement in KDF-DO parser
2021-02-17 00:00:00 +00:00
Vincent Breitmoser
1ba7f48fd2
update Android Password Store link
2021-02-14 19:41:15 +01:00
Dominik Schürmann
1d4c7e4e73
Version 5.6
2021-02-14 18:21:08 +01:00
Vincent Breitmoser
4b2813ea58
Merge pull request #2627 from canokeys/fix_import_rsa_length
...
Computes the lengths in the template dynamically
2021-02-03 22:52:45 +01:00
Christian Hagau
c2bab8807e
Add support for KDF for security tokens
2021-01-29 00:00:00 +00:00
Christian Hagau
6f41c8d5c7
Add KDF to Extended Capabilities
2021-01-29 00:00:00 +00:00
Christian Hagau
a0a5b63c54
Add a test for S2K KDF for security tokens
2021-01-29 00:00:00 +00:00
Christian Hagau
d234f6a66d
Add `KdfCalculator` class
2021-01-29 00:00:00 +00:00
Christian Hagau
d3c51b26e8
Add `KdfParameters` class
2021-01-29 00:00:00 +00:00
Vincent Breitmoser
f6a5141e24
log exception for failed keyserver checks
2021-01-29 13:32:10 +01:00
Vincent Breitmoser
1af70961aa
restore pinning for hkps.pool.sks-keyservers.net only (it won't work without)
2021-01-29 13:02:42 +01:00
Vincent Breitmoser
1034b8b99c
drop some unused constants
2021-01-29 12:40:11 +01:00
Vincent Breitmoser
8d5f806fa3
actually set keys.o.o as default keyserver
2021-01-29 12:36:35 +01:00
Vincent Breitmoser
b6c71063a8
remove stray reference to keybase.io
2021-01-29 12:33:28 +01:00
Vincent Breitmoser
5eaa7518e8
drop broken secure wifi transfer feature
...
This feature depended on the unsupported TLS-PSK implementation shipped
with Android's conscrypt implementation. It abused a duck typing
mechanism that allowed using TLS-PSK despite its unsupported status, but
this silently broke somewhere along the way.
2021-01-29 12:10:35 +01:00
Vincent Breitmoser
2cc35ce970
drop broken pinning mechanism
2021-01-29 12:05:08 +01:00
dangfan
04a6740cec
fix broken curve25519 decryption
2020-12-20 22:06:46 +08:00
dangfan
e82fb82c44
fix ecdh decryption error: Invalid KEK
2020-12-20 13:10:28 +08:00
dangfan
ea70f7307e
Computes the lengths in the template dynamically according to the mod length when importing RSA keys
2020-12-18 23:06:03 +08:00