Commit Graph

4683 Commits (master)

Author SHA1 Message Date
Peter Cai 8f9728cd60 Catch SecurityException from using a stale Tag object
Applications are not supposed to be able to do any I/O using a stale Tag
object. This was not checked in older Android versions, but enforced
later since Android 13 (and possibly in Android 12L).

When we are checking for a disconnected tag, the Tag object can become
stale if the same tag (or another tag) gets rediscovered. In addition,
if NfcService is restarted for some reason, the cookie value used to
check for this will also be reset to 0. In any case, a SecurityException
could be raised when checking for a disconnected tag, and we should be
able to handle this case.
2022-12-12 18:27:40 -05:00
Harsh Shandilya 6b3368acb2
Update SplitUserIdTest.java 2021-05-02 19:23:02 +05:30
Harsh Shandilya 6408bac245
OpenKeychain: add a test for TLD-less email
Signed-off-by: Harsh Shandilya <me@msfjarvis.dev>
2021-05-02 19:04:20 +05:30
Dominik Schürmann 5522b6d583 use getDigest() properly 2021-04-29 17:58:31 +02:00
Dominik Schürmann 7cf34b0539 do not call digestCalculator.getDigest() twice 2021-04-29 17:52:31 +02:00
Dominik Schürmann f8724d3f42 integrate EdDSAAuthenticationSigner into default signer using enablePreHash parameter 2021-04-29 17:51:39 +02:00
Dominik Schürmann a9b28dd11c improve card decrypt with constants 2021-04-21 14:48:14 +02:00
Dominik Schürmann 28c23f84bf improve variable names in ECDH card decrypt 2021-04-21 14:36:55 +02:00
dangfan ec5d5e399f
add more documentation of decryptSessionKeyEcdh 2021-04-21 19:09:35 +08:00
dangfan 9ea9bd96bb
fix the compatibility of compressed and uncompressed format in ECDH 2021-04-21 09:25:59 +08:00
Dominik Schürmann 38157242e1 HKP parsing: make \r optional in pubkey lines 2021-04-18 10:24:37 +02:00
Stelian Pop 20caa22f05 Fix parsing of EOL in keyserver answer 2021-04-16 11:36:25 +02:00
Christian Hagau 178e7856b2 Don't explicitly clear PIN when verifying admin PIN.
The PIN is cleared anyway when the Passphrase object holding the PIN is
freed.
2021-04-02 00:00:00 +00:00
David Hedberg f45254cf07 Only skip hashing when creating an EDDSA authentication signature 2021-03-27 11:38:14 +01:00
Dominik Schürmann 3dfa1af046 update from transifex 2021-03-17 21:13:55 +01:00
Dominik Schürmann 64f4d7aaa4 Version 5.7 2021-03-17 12:32:55 +01:00
Dominik Schürmann 903cce6b20 fix SecurityTokenUtilsTest 2021-03-16 19:50:29 +01:00
Dominik Schürmann 56254aedb7 improve and simplify key formats 2021-03-16 17:07:56 +01:00
Dominik Schürmann c899e5ef2d Merge branch 'master' of https://github.com/dhedberg/open-keychain into dhedberg-master 2021-03-16 15:47:24 +01:00
Dominik Schürmann 0b49e7f91f fix build error introduced by x25519 decryption support 2021-03-16 15:25:24 +01:00
Dominik Schürmann 7e5738bd5c
Merge pull request #2630 from canokeys/fix_ecdh_kek_error
Fix ECDH decryption error using NIST curves
2021-03-16 15:13:23 +01:00
Dominik Schürmann fb0651eda1 fix algorithm id for ECDSA auth keys on security keys 2021-03-16 15:12:22 +01:00
Dominik Schürmann af64735cbf disable IDEA, simply arguments in PgpSecurityConstants 2021-03-16 14:54:15 +01:00
Dominik Schürmann 8d01f2d077 master -> primary in strings 2021-02-26 15:36:11 +01:00
Dominik Schürmann 94987a9010 rename whitelists to secure lists 2021-02-26 15:11:54 +01:00
Dominik Schürmann 0ec0c34cb9 move toBytes into RSAKeyFormat 2021-02-23 18:18:43 +01:00
Dominik Schürmann 2a0625e615 fix yubikey curve OID bug by reworking ASN1 parsing 2021-02-23 18:10:15 +01:00
David Hedberg 6d4f37b154 Don't hash the data to sign when using EDDSA 2021-02-20 19:43:04 +01:00
David Hedberg 3fb4771602 Activate ssh encoding of public keys for ed25519 2021-02-20 19:39:28 +01:00
Christian Hagau 7dc0c5e184 Initialize all members of KdfParameters with default values 2021-02-17 00:00:00 +00:00
Christian Hagau b69a7c585d Fix parameter names for KdfParameters setters 2021-02-17 00:00:00 +00:00
Christian Hagau 5ccd4c05e8 Add missing break statement in KDF-DO parser 2021-02-17 00:00:00 +00:00
Vincent Breitmoser 1ba7f48fd2 update Android Password Store link 2021-02-14 19:41:15 +01:00
Dominik Schürmann 1d4c7e4e73 Version 5.6 2021-02-14 18:21:08 +01:00
Vincent Breitmoser 4b2813ea58
Merge pull request #2627 from canokeys/fix_import_rsa_length
Computes the lengths in the template dynamically
2021-02-03 22:52:45 +01:00
Christian Hagau c2bab8807e Add support for KDF for security tokens 2021-01-29 00:00:00 +00:00
Christian Hagau 6f41c8d5c7 Add KDF to Extended Capabilities 2021-01-29 00:00:00 +00:00
Christian Hagau a0a5b63c54 Add a test for S2K KDF for security tokens 2021-01-29 00:00:00 +00:00
Christian Hagau d234f6a66d Add `KdfCalculator` class 2021-01-29 00:00:00 +00:00
Christian Hagau d3c51b26e8 Add `KdfParameters` class 2021-01-29 00:00:00 +00:00
Vincent Breitmoser f6a5141e24 log exception for failed keyserver checks 2021-01-29 13:32:10 +01:00
Vincent Breitmoser 1af70961aa restore pinning for hkps.pool.sks-keyservers.net only (it won't work without) 2021-01-29 13:02:42 +01:00
Vincent Breitmoser 1034b8b99c drop some unused constants 2021-01-29 12:40:11 +01:00
Vincent Breitmoser 8d5f806fa3 actually set keys.o.o as default keyserver 2021-01-29 12:36:35 +01:00
Vincent Breitmoser b6c71063a8 remove stray reference to keybase.io 2021-01-29 12:33:28 +01:00
Vincent Breitmoser 5eaa7518e8 drop broken secure wifi transfer feature
This feature depended on the unsupported TLS-PSK implementation shipped
with Android's conscrypt implementation. It abused a duck typing
mechanism that allowed using TLS-PSK despite its unsupported status, but
this silently broke somewhere along the way.
2021-01-29 12:10:35 +01:00
Vincent Breitmoser 2cc35ce970 drop broken pinning mechanism 2021-01-29 12:05:08 +01:00
dangfan 04a6740cec fix broken curve25519 decryption 2020-12-20 22:06:46 +08:00
dangfan e82fb82c44 fix ecdh decryption error: Invalid KEK 2020-12-20 13:10:28 +08:00
dangfan ea70f7307e Computes the lengths in the template dynamically according to the mod length when importing RSA keys 2020-12-18 23:06:03 +08:00