Releases: ProtonMail/gopenpgp
Releases · ProtonMail/gopenpgp
Release version 2.5.1
Added
- Streaming API to encrypt with compression:
func (keyRing *KeyRing) EncryptStreamWithCompression
func (keyRing *KeyRing) EncryptSplitStreamWithCompression
func (sk *SessionKey) EncryptStreamWithCompression
Release version 2.5.0
Changed
- Update
github.com/ProtonMail/go-crypto
to the latest version - Update
github.com/ProtonMail/go-mime
to the latest version, which cleans up unneeded dependencies. And fix an issue with PGP/MIME messages with non standard encodings. - Sanitize strings returned in
MIMECallbacks.OnBody()
andPlainMessage.GetString()
. Strings that have non utf8 characters will be sanitized to have the "character unknown" character : � instead. - Detached sign text messages with signature type text. Similarly, clearsigned messages now also use signature type text.
- Leave trailing spaces of text messages intact (except for clearsigned messages, where the spec requires us to trim trailing spaces). Note that for backwards compatibility, when verifying detached signatures over text messages, the application will have to trim trailing spaces in order for the signature to verify, if it was created by a previous version of this library (using
crypto.NewPlainMessageFromString()
).
Release version 2.4.10
Update go-crypto
Release version 2.4.9
Upgrade underlying go-crypto version
Release version 2.4.8
Add AEAD decryption support
Release version 2.4.7
- DecryptMIMEMessage will return the decrypted content in the OnBody callback, even when there's a signature verification error. That lets the caller decide whether they want to use the content with a warning or hard fail on signature errors.
- Key generation functions no longer return an error if either the name or email is empty
Release version 2.4.6
Fix MIME signature parsing issues
Release version 2.4.5
Deprecate SeparateKeyAndData
, replace with (msg *PGPMessage) SplitMessage()
to split PGP messages
Release version 2.4.4
Clone returned slices from SeparateKeyAndData
Release version 2.4.3
Security
- Fixed incorrect MDC parsing for session key decryption
Changed
SeparateKeyAndData
is now implemented in a more generic way, by checking for the location in the bytes of the last session key packet, then splitting the binary message after that point.
Fixed
SeparateKeyAndData
now correctly parses AEAD packets.(ap *AttachmentProcessor) Finish()
now returns encryption errors correctly.