Skip to content

Releases: ProtonMail/gopenpgp

Release v2.7.0

20 Apr 14:01
753a3fe
Compare
Choose a tag to compare

Changed

  • The SignatureVerificationError struct now has a Cause error field, which is returned by the the Unwrap function. The cause is also included in the error message.
    NB: If the caller was relying on the exact message of the error, it might break the flow.
  • When a signature fails verification because of the signature context, it returns a SignatureVerificationError with
    status constants.SIGNATURE_BAD_CONTEXT instead of constants.SIGNATURE_FAILED.

Added

  • Add api for signature context on streams SignDetachedStreamWithContext.
  • Add API for signature context on embedded signatures.

Fixed

  • When verifying detached signatures, gopenpgp sometimes needs to reattempt verification a second time to check for edge cases of signature expiration. This logic was broken because it was not rewinding the data readers.

Release v2.6.1-proton

22 Mar 13:26
Compare
Choose a tag to compare

This release is 2.6.1 with support for symmetric keys and automatic forwarding, both of which are not standardized yet

Release v2.6.1

22 Mar 13:13
5037273
Compare
Choose a tag to compare

Security fix

  • Update github.com/ProtonMail/go-crypto and github.com/ProtonMail/go-mime to fix
    panic on invalid inputs.

Release 2.6.0-proton

17 Mar 11:11
Compare
Choose a tag to compare

This release is 2.6.0 with symmetric keys and forwarding support

Release version 2.6.0

15 Mar 09:46
62f2ca8
Compare
Choose a tag to compare

Added

  • API for adding context to detached signatures:
     sig, err := keyRing.SignDetachedWithContext(message, context)
  • API to verify the context of detached signatures:
     err := keyRing.VerifyDetachedWithContext(message, signature, verifyTime, verificationContext)

Changed

  • Update github.com/ProtonMail/go-crypto to the latest version
  • More strictly verify detached signatures: reject detached signatures from revoked and expired keys.
  • In GetVerifiedSignatureTimestamp, use the new VerifyDetachedSignatureAndHash function to get the verified signature, instead of parsing the signature packets manually to get the timestamp.
  • Upgraded golang.org/x/crypto dependency to v0.7.0

Release version 2.5.2

26 Jan 11:43
b4e40eb
Compare
Choose a tag to compare

Changed

  • Update github.com/ProtonMail/go-crypto to the latest version

Release version 2.5.1

25 Jan 09:30
2adafdb
Compare
Choose a tag to compare

Added

  • Streaming API to encrypt with compression:
    • func (keyRing *KeyRing) EncryptStreamWithCompression
    • func (keyRing *KeyRing) EncryptSplitStreamWithCompression
    • func (sk *SessionKey) EncryptStreamWithCompression

Release version 2.5.0

16 Dec 09:34
e1f4ae0
Compare
Choose a tag to compare

Changed

  • Update github.com/ProtonMail/go-crypto to the latest version
  • Update github.com/ProtonMail/go-mime to the latest version, which cleans up unneeded dependencies. And fix an issue with PGP/MIME messages with non standard encodings.
  • Sanitize strings returned in MIMECallbacks.OnBody() and PlainMessage.GetString(). Strings that have non utf8 characters will be sanitized to have the "character unknown" character : � instead.
  • Detached sign text messages with signature type text. Similarly, clearsigned messages now also use signature type text.
  • Leave trailing spaces of text messages intact (except for clearsigned messages, where the spec requires us to trim trailing spaces). Note that for backwards compatibility, when verifying detached signatures over text messages, the application will have to trim trailing spaces in order for the signature to verify, if it was created by a previous version of this library (using crypto.NewPlainMessageFromString()).

Release version 2.4.10

23 Aug 11:54
dd858da
Compare
Choose a tag to compare

Update go-crypto

Release version 2.4.9

19 Aug 09:58
3278880
Compare
Choose a tag to compare

Upgrade underlying go-crypto version