399 Commits

Author SHA1 Message Date
Michael Greene
ee261fe8be initial pass of direct-key signing (0x1f) plus tests - #104 2014-09-26 16:56:25 -07:00
Michael Greene
dba6e3a76a modified test_exports slightly; added tox.sh for more easily dealing with tox on OSX systems with a brewed openssl
[skip ci]
2014-09-26 15:02:33 -07:00
Michael Greene
b2956e774b moved deque bisect-insertion to a utility function; added bisect-based deque item re-sorting function - closes #124 2014-09-26 13:20:50 -07:00
Michael Greene
38a4f9f8b1 rewrote PGPKey.parse; some other API changes; some cleanups; and a Python 2.x compatibility fix 2014-09-25 20:03:35 -07:00
Michael Greene
9583136c35 creating new photo UIDs now works - #118; signing photo UIDs is now actually being tested 2014-09-25 13:15:19 -07:00
Michael Greene
d5409e845a - PGPSignature is now orderable by its creation date
- Exportable.ascii_unarmor now ignores carriage returns
 - PGPUID is now exposed as part of the primary API
 - PGPKey.add_uid now consumes a PGPUID - #118, #119
 - fixed bisect/deque.rotate stuff to work correctly
2014-09-23 15:50:49 -07:00
Michael Greene
7629bc79d0 api usability enhancements; more unit test stuff 2014-09-22 17:25:22 -07:00
Michael Greene
29ace81b5e certificate revocation signing now tested - #104 2014-09-19 10:51:46 -07:00
Michael Greene
2982be3603 uid signing; uid removal - closes #119; added "add_signature" method to PGPUID to ensure that certification signatures are added in sorted order; made primary signature retrieval more robust 2014-09-18 17:05:46 -07:00
Michael Greene
8030c52b49 another minor code clean 2014-09-17 18:44:11 -07:00
Michael Greene
398fe7263b some additional refactoring for minor performance improvement and (hopefully) readability 2014-09-17 18:25:26 -07:00
Michael Greene
39b4743fd4 some unit test overhauling 2014-09-17 17:52:13 -07:00
Michael Greene
8fdc9dd1f6 Python 2.7 unit test fix 2014-09-17 12:03:31 -07:00
Michael Greene
28b1f1b86d some much needed test and testdata cleanups; fixed verification being skipped in test_reg_bug_56; resolved regression test_reg_bug_56 was meant to prevent 2014-09-16 20:22:53 -07:00
Michael Greene
36e83c2683 massively sped up crc24 computation by iterating over the data instead of doing pop(0) - closes #68 2014-09-16 14:52:21 -07:00
Michael Greene
4a374dca69 a little input validation 2014-09-16 13:27:04 -07:00
Michael Greene
cda965fdf4 asdfdsgqwetqty 2014-09-16 13:23:51 -07:00
Michael Greene
040faa17e5 maybe finally fixed 2014-09-16 13:14:57 -07:00
Michael Greene
9c4f66a519 test 2014-09-16 13:06:26 -07:00
Michael Greene
423728d9b8 user id certification now fully tested and working properly - #104 2014-09-16 12:38:08 -07:00
Michael Greene
08e804ff33 asdf 2014-09-15 18:56:53 -07:00
Michael Greene
9f16d3f98a can create new user ids for existing keys - #119
can sign user ids (directly) - #104
2014-09-15 18:22:59 -07:00
Michael Greene
51cab7715a another test bug possibly fixed 2014-09-15 17:20:13 -07:00
Michael Greene
0141513cf8 can now encrypt a single PGPMessage with multiple passphrase(s) - closes #114 2014-09-15 17:11:10 -07:00
Michael Greene
eaa7aef8e2 py.test errors for the last couple of builds should now be fixed 2014-09-15 17:09:47 -07:00
Michael Greene
73f38a4638 signing messages and adding those signatures to them now works - #114 2014-09-15 16:17:34 -07:00
Michael Greene
0875553d14 combined compression algorithm unit tests into one; changed method of creating literal message 2014-09-15 13:48:20 -07:00
Michael Greene
811c236720 stubbed out tests for #104
[skip ci]
2014-09-12 17:24:25 -07:00
Michael Greene
7026afa957 stubbed out tests for #114
[skip ci]
2014-09-12 16:28:41 -07:00
Michael Greene
22a53a90a5 Added unit tests to test all of the compression algorithms; these can be merged into a single test later 2014-09-12 16:20:53 -07:00
Michael Greene
6ce08fbcdb Now truly verifies embedded signatures - notably, type Primary Key Binding. Closes #99 2014-09-12 14:03:04 -07:00
Michael Greene
8a7df66d90 added remaining missing warning filters 2014-09-11 18:21:16 -07:00
Michael Greene
3c565c5b20 Almost fully implemented #99; primary key binding signatures are not yet verified, although it likely works 2014-09-11 18:17:03 -07:00
Michael Greene
64742a5b23 Added the ability to verify more types of signatures; now testing verifying subkey binding signatures - #99 2014-09-11 15:29:43 -07:00
Michael Greene
4d668ca992 first pass at ensuring warnings properly point to the calling code; will need to write a unit test for this as well 2014-09-11 13:30:06 -07:00
Michael Greene
0acdde7720 export test first pass - closes #90 2014-09-11 13:18:11 -07:00
Michael Greene
2387fc9c2d Verify key certifications - #99 2014-09-08 17:21:47 -07:00
Michael Greene
8728969f3d (both One-Pass and not) signed message signature verification now works - closes #117 2014-09-08 13:29:48 -07:00
Michael Greene
f670292cc7 almost forgot that decryption requires private keys 2014-09-08 12:43:11 -07:00
Michael Greene
3c5a23d046 Message encryption using RSA - closes #105 2014-09-08 12:31:10 -07:00
Michael Greene
7596d38f67 First pass for encrypting messages/storage using symmetric encryption only (via passphrase) - closes #113 2014-09-05 15:19:32 -07:00
Michael Greene
7975e5164c Basic PGPMessage creation (with and without compression) now works - #114
Unit tests for that, as well
2014-09-04 15:28:44 -07:00
Michael Greene
4b54c9790f added unit tests:
- test verifying a signature with the wrong key
 - test verifying an invalid signature (wrong or modified subject) - closes #44
 - cleaned up test_reg_bug_56
2014-09-03 17:06:46 -07:00
Michael Greene
508c1fc634 PGPKey.unlock is now functionally implemented as a context manager, complete with basic memory wiping; basic unit test also implemented 2014-09-03 16:43:22 -07:00
Michael Greene
b7ec56360e Can now inline-sign things with one or more keys - closes #26; progress towards #114
Also fixed an issue for Python 2.7 in int_to_bytes with binscii.hexlify where 0 or 0L is being converted to bytes
2014-09-03 15:53:54 -07:00
Michael Greene
5265e32ffe header length updating first pass - closes #93 2014-09-03 14:15:45 -07:00
Michael Greene
e69a02f43d dash un/escaping of cleartext now works 2014-09-03 12:34:37 -07:00
Michael Greene
cb4d06cce7 PGPKey can now verify signatures in cleartext PGPMessages - closes #27 2014-08-27 18:26:50 -07:00
Michael Greene
f4458cc02e Passphrase-protected (symmetrically encrypted only; no public-key encryption) messages can now be decrypted - #113
Also fixed a parsing issue in SKESessionKeyV4
2014-08-27 15:37:53 -07:00
Michael Greene
b1eb37df64 - fixed the arguments for _decrypt in PrivKey.decrypt_keyblob
- UnsupportedAlgorithm is now re-raised as PGPDecryptionError in all cases as it should - closes #112
 - Reorganized some issuer/message retrieval code in PGPMessage
 - Simplified PGPMessage parsing logic; it now assumes those messages are correctly formatted, instead of trying to make sense of them at parsing time
 - Regenerated encrypted message test material to all be usable to test decryption using multiple public key algorithms (at this point, RSA and ElGamal (as DSA)); added a passphrase to one, as well, to test that
2014-08-27 14:32:54 -07:00