Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: openpgpjs/openpgpjs
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: v6.0.1
Choose a base ref
...
head repository: openpgpjs/openpgpjs
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: v6.1.0
Choose a head ref
  • 14 commits
  • 132 files changed
  • 3 contributors

Commits on Nov 21, 2024

  1. Configuration menu
    Copy the full SHA
    daeaf6b View commit details
    Browse the repository at this point in the history

Commits on Nov 22, 2024

  1. TS: add gcm to enums.aead, mark non-standard experimentalGCM as…

    … deprecated
    
    `experimentalGCM` should not be used anymore,
    as a different a different algorithm ID was standardized
    for GCM, and using the experimental value could give
    interoperability issues with e.g. SEIPDv2 and AEAD-encrypted keys.
    larabr committed Nov 22, 2024
    Configuration menu
    Copy the full SHA
    bbdaad0 View commit details
    Browse the repository at this point in the history
  2. Fix decryption support for non-standard, legacy AEAD messages and key…

    …s that used `experimentalGCM`
    
    This adds back support for decrypting password-protected messages which
    were encrypted in OpenPGP.js v5 with custom config settings
    `config.aeadProtect = true` together with
    `config.preferredAEADAlgorithm = openpgp.enums.aead.experimentalGCM`.
    
    Public-key-encrypted messages are affected if they were encrypted using the same config, while also providing `encryptionKeys` that declared `experimentalGCM` in their AEAD prefs.
    Such keys could be generated in OpenPGP.js v5 by setting the aforementioned config values.
    larabr committed Nov 22, 2024
    Configuration menu
    Copy the full SHA
    4d2d874 View commit details
    Browse the repository at this point in the history
  3. Throw on encryption using non-standard experimentalGCM AEAD algo

    The `enums.aead.gcm` ID standardized by RFC9580 should be used instead.
    larabr committed Nov 22, 2024
    Configuration menu
    Copy the full SHA
    6c3b028 View commit details
    Browse the repository at this point in the history
  4. Merge pull request #1811

    larabr authored Nov 22, 2024
    Configuration menu
    Copy the full SHA
    bf85dee View commit details
    Browse the repository at this point in the history
  5. Internal: improve tree-shaking for crypto modules

    Every submodule under the 'crypto' directory was exported-imported
    even if a handful of functions where actually needed.
    We now only export entire modules behind default exports if it makes
    sense for readability and if the different submodules would be
    imported together anyway (e.g. `cipherMode` exports are all needed
    by the SEIPD class).
    
    We've also dropped exports that are not used outside of the crypto modules,
    e.g. pkcs5 helpers.
    larabr committed Nov 22, 2024
    Configuration menu
    Copy the full SHA
    2a8969b View commit details
    Browse the repository at this point in the history
  6. Lightweight build: lazy load md5 hashing module

    Used by old, legacy messages only
    larabr committed Nov 22, 2024
    Configuration menu
    Copy the full SHA
    abe750c View commit details
    Browse the repository at this point in the history
  7. Use noble-hashes for md5

    The existing md5 module brought in the util module,
    which messed up the chunking structure in the lightweight build;
    inlining those functions is an option, but the noble-hashes code
    is also more modern and readable.
    larabr committed Nov 22, 2024
    Configuration menu
    Copy the full SHA
    a16160f View commit details
    Browse the repository at this point in the history
  8. Internal: avoid importing enums in legacy_cipher chunk

    To avoid issues with the lightweight build:
    for now it works fine, but it could mess up chunking in the future,
    and it already results in a circular import.
    larabr committed Nov 22, 2024
    Configuration menu
    Copy the full SHA
    a5d894f View commit details
    Browse the repository at this point in the history
  9. Internal: improve tree-shaking of web-stream-tools

    Import single functions instead of entire lib.
    larabr committed Nov 22, 2024
    Configuration menu
    Copy the full SHA
    8e5da78 View commit details
    Browse the repository at this point in the history
  10. Configuration menu
    Copy the full SHA
    6db98f1 View commit details
    Browse the repository at this point in the history

Commits on Nov 25, 2024

  1. Merge pull request #1812

    Improve internal tree-shaking and lazy load md5
    larabr authored Nov 25, 2024
    Configuration menu
    Copy the full SHA
    b2bd8a0 View commit details
    Browse the repository at this point in the history

Commits on Jan 29, 2025

  1. Configuration menu
    Copy the full SHA
    432856f View commit details
    Browse the repository at this point in the history

Commits on Jan 30, 2025

  1. 6.1.0

    twiss committed Jan 30, 2025
    Configuration menu
    Copy the full SHA
    96b13a4 View commit details
    Browse the repository at this point in the history
Loading