{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":65798922,"defaultBranch":"main","name":"go-crypto","ownerLogin":"ProtonMail","currentUserCanPush":false,"isFork":false,"isEmpty":false,"createdAt":"2016-08-16T07:45:08.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/6953970?v=4","public":true,"private":false,"isOrgOwned":true},"refInfo":{"name":"","listCacheKey":"v0:1720183631.0","currentOid":""},"activityList":{"items":[{"before":"5b817af5a2c547f55317e8bc7093dd4777620f84","after":null,"ref":"refs/heads/feat/v5-behind-build-tag","pushedAt":"2024-07-05T12:47:11.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"lubux","name":"Lukas Burkhalter","path":"/lubux","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/10532077?s=80&v=4"}},{"before":"3df78a3ea124d4f5ed9ec02d14e78731282dc15a","after":"c25e074d11e5f1813d0e04ed9c984214d0535a4c","ref":"refs/heads/main","pushedAt":"2024-07-05T12:47:07.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"lubux","name":"Lukas Burkhalter","path":"/lubux","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/10532077?s=80&v=4"},"commit":{"message":"Put support for reading v5 packets behind a feature flag (#212)\n\n* Put v5 support behind a feature flag","shortMessageHtmlLink":"Put support for reading v5 packets behind a feature flag (#212)"}},{"before":"598d0318e9fc189a9f1fd2c5853aa94152cbdf77","after":"5b817af5a2c547f55317e8bc7093dd4777620f84","ref":"refs/heads/feat/v5-behind-build-tag","pushedAt":"2024-07-05T12:01:48.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"lubux","name":"Lukas Burkhalter","path":"/lubux","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/10532077?s=80&v=4"},"commit":{"message":"Adapt docs to non-aead","shortMessageHtmlLink":"Adapt docs to non-aead"}},{"before":"446301bdc492ae66e0d81fc6e4c05055dfa31461","after":"598d0318e9fc189a9f1fd2c5853aa94152cbdf77","ref":"refs/heads/feat/v5-behind-build-tag","pushedAt":"2024-07-05T11:58:02.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"lubux","name":"Lukas Burkhalter","path":"/lubux","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/10532077?s=80&v=4"},"commit":{"message":"Integrate review comments","shortMessageHtmlLink":"Integrate review comments"}},{"before":"6028a9fc4b3352901c97bbc76b520f8087104ed2","after":null,"ref":"refs/heads/restrict-s2k-types","pushedAt":"2024-07-05T08:36:57.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"twiss","name":"Daniel Huigens","path":"/twiss","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/908303?s=80&v=4"}},{"before":"3272cd7ba797dbd62275bec987082862e3409bf5","after":"3df78a3ea124d4f5ed9ec02d14e78731282dc15a","ref":"refs/heads/main","pushedAt":"2024-07-05T08:36:53.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"twiss","name":"Daniel Huigens","path":"/twiss","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/908303?s=80&v=4"},"commit":{"message":"Restrict S2K types (#213)\n\nRFC9580 says that:\r\n\r\n Argon2 is only used with AEAD (S2K usage octet 253). An\r\n implementation MUST NOT create and MUST reject as malformed any\r\n secret key packet where the S2K usage octet is not AEAD (253) and\r\n the S2K specifier type is Argon2.\r\n\r\nTherefore, we disallow reading and writing Argon2 keys without AEAD.\r\n\r\nAnd:\r\n\r\n [The Simple and Salted S2K methods] are used only for reading in\r\n backwards compatibility mode.\r\n \r\nSo, we disallow encrypting keys using those methods.\r\n\r\nSince v6 keys don't need backwards compatibility, we also disallow\r\nreading Simple S2K there. We still allow reading Salted S2K since the\r\nspec says it may be used \"when [the password] is high entropy\".","shortMessageHtmlLink":"Restrict S2K types (#213)"}},{"before":"1b33c40d7233cfb1297577921c914ccef7d0ad64","after":"6028a9fc4b3352901c97bbc76b520f8087104ed2","ref":"refs/heads/restrict-s2k-types","pushedAt":"2024-07-04T21:25:22.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"twiss","name":"Daniel Huigens","path":"/twiss","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/908303?s=80&v=4"},"commit":{"message":"Restrict S2K types","shortMessageHtmlLink":"Restrict S2K types"}},{"before":null,"after":"1b33c40d7233cfb1297577921c914ccef7d0ad64","ref":"refs/heads/restrict-s2k-types","pushedAt":"2024-07-04T21:17:11.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"twiss","name":"Daniel Huigens","path":"/twiss","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/908303?s=80&v=4"},"commit":{"message":"Restrict S2K types","shortMessageHtmlLink":"Restrict S2K types"}},{"before":"3272cd7ba797dbd62275bec987082862e3409bf5","after":"446301bdc492ae66e0d81fc6e4c05055dfa31461","ref":"refs/heads/feat/v5-behind-build-tag","pushedAt":"2024-07-04T15:37:12.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"lubux","name":"Lukas Burkhalter","path":"/lubux","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/10532077?s=80&v=4"},"commit":{"message":"Put v5 support behind a feature flag","shortMessageHtmlLink":"Put v5 support behind a feature flag"}},{"before":null,"after":"3272cd7ba797dbd62275bec987082862e3409bf5","ref":"refs/heads/feat/v5-behind-build-tag","pushedAt":"2024-07-04T15:35:25.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"lubux","name":"Lukas Burkhalter","path":"/lubux","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/10532077?s=80&v=4"},"commit":{"message":"ECDH with a v6 key must use the full fingerprint (#211)\n\n* Fix ECDH fingeprint size for v6 keys\r\n\r\nDo not truncate the fingerprint to 20 bytes as for v5,\r\nbut rather use the whole fingerprint for v6\r\n\r\n* Fix linter issues","shortMessageHtmlLink":"ECDH with a v6 key must use the full fingerprint (#211)"}},{"before":"c5728c304d53844d6666a081441279832c37f1ec","after":null,"ref":"refs/heads/fix/v6-fingerprint-full-size","pushedAt":"2024-07-02T12:45:13.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"lubux","name":"Lukas Burkhalter","path":"/lubux","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/10532077?s=80&v=4"}},{"before":"140b3d6f14775c42f6544e1cc34cf77e3da56baa","after":"3272cd7ba797dbd62275bec987082862e3409bf5","ref":"refs/heads/main","pushedAt":"2024-07-02T12:45:10.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"lubux","name":"Lukas Burkhalter","path":"/lubux","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/10532077?s=80&v=4"},"commit":{"message":"ECDH with a v6 key must use the full fingerprint (#211)\n\n* Fix ECDH fingeprint size for v6 keys\r\n\r\nDo not truncate the fingerprint to 20 bytes as for v5,\r\nbut rather use the whole fingerprint for v6\r\n\r\n* Fix linter issues","shortMessageHtmlLink":"ECDH with a v6 key must use the full fingerprint (#211)"}},{"before":null,"after":"c5728c304d53844d6666a081441279832c37f1ec","ref":"refs/heads/fix/v6-fingerprint-full-size","pushedAt":"2024-07-02T12:20:10.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"lubux","name":"Lukas Burkhalter","path":"/lubux","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/10532077?s=80&v=4"},"commit":{"message":"Fix linter issues","shortMessageHtmlLink":"Fix linter issues"}},{"before":"91b9355abc04d4cb6dccb994db52f9abb1071a95","after":"dfc52108cb1d8cc96044e7c1ccdc0265e60ba5fe","ref":"refs/heads/Proton","pushedAt":"2024-06-25T14:04:49.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"lubux","name":"Lukas Burkhalter","path":"/lubux","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/10532077?s=80&v=4"},"commit":{"message":"Fix HMAC generation (#204)\n\nGenerate an AEAD subkey when requesting an HMAC primary key.","shortMessageHtmlLink":"Fix HMAC generation (#204)"}},{"before":"e3a3edc3ebc87d9f25b0b35e04611e5eff53eb40","after":"4477c15229a7009a2dcebf924d2d8dad9546f864","ref":"refs/heads/feat/random-notation-in-signatures","pushedAt":"2024-06-24T08:23:31.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"lubux","name":"Lukas Burkhalter","path":"/lubux","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/10532077?s=80&v=4"},"commit":{"message":"Only apply randomization to less than version six","shortMessageHtmlLink":"Only apply randomization to less than version six"}},{"before":"9b97f529441a65331872c7106e7ee0741719d8a0","after":null,"ref":"refs/heads/fix-cipher-key-size","pushedAt":"2024-06-24T07:21:23.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"lubux","name":"Lukas Burkhalter","path":"/lubux","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/10532077?s=80&v=4"}},{"before":"3a86725d5755681bbb468f1ef92c43082591913f","after":"140b3d6f14775c42f6544e1cc34cf77e3da56baa","ref":"refs/heads/main","pushedAt":"2024-06-24T07:21:12.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"lubux","name":"Lukas Burkhalter","path":"/lubux","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/10532077?s=80&v=4"},"commit":{"message":"Fix session key length generation (#198)\n\nIf AEAD is in use, we should generate a session key of the length of the cipher suite. \r\nThis triggers when a key has a different AEAD preference than the cipher.","shortMessageHtmlLink":"Fix session key length generation (#198)"}},{"before":"31b9581e45d589526520c4243444e16d9cd87f4e","after":"9b97f529441a65331872c7106e7ee0741719d8a0","ref":"refs/heads/fix-cipher-key-size","pushedAt":"2024-06-24T07:14:19.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"lubux","name":"Lukas Burkhalter","path":"/lubux","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/10532077?s=80&v=4"},"commit":{"message":"Add sk key generation fix to v2 API","shortMessageHtmlLink":"Add sk key generation fix to v2 API"}},{"before":"7f9da727fba11d10344ee9b2d5f3d8fcf1956c65","after":"3a86725d5755681bbb468f1ef92c43082591913f","ref":"refs/heads/main","pushedAt":"2024-06-24T06:52:10.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"lubux","name":"Lukas Burkhalter","path":"/lubux","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/10532077?s=80&v=4"},"commit":{"message":"Update to use PrepareVerify (#210)\n\nFixes the build issues with #191","shortMessageHtmlLink":"Update to use PrepareVerify (#210)"}},{"before":"a0326358fd635289f3489c10f0a0cc180c206150","after":null,"ref":"refs/heads/feat/unify-key-generation","pushedAt":"2024-06-24T06:32:12.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"lubux","name":"Lukas Burkhalter","path":"/lubux","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/10532077?s=80&v=4"}},{"before":"dc5f72bd68dc8efd85ac7f34bae0d580646161c2","after":"7f9da727fba11d10344ee9b2d5f3d8fcf1956c65","ref":"refs/heads/main","pushedAt":"2024-06-24T06:32:06.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"lubux","name":"Lukas Burkhalter","path":"/lubux","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/10532077?s=80&v=4"},"commit":{"message":"Unify key generation self-signature (#208)\n\n- Serialized signature sub-packets are now ordered by their ID.\r\n- The creation time, issuer key ID, and key flag sub-packets are now critical.","shortMessageHtmlLink":"Unify key generation self-signature (#208)"}},{"before":"774879c14f80290c8fa47601b59a73dac11ca74d","after":"dc5f72bd68dc8efd85ac7f34bae0d580646161c2","ref":"refs/heads/main","pushedAt":"2024-06-21T15:43:34.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"twiss","name":"Daniel Huigens","path":"/twiss","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/908303?s=80&v=4"},"commit":{"message":"Fix several semgrep lint errors (#207)","shortMessageHtmlLink":"Fix several semgrep lint errors (#207)"}},{"before":"f4e1152d9c5f8efe0b88f3aa3906a4ecbc1541f5","after":"774879c14f80290c8fa47601b59a73dac11ca74d","ref":"refs/heads/main","pushedAt":"2024-06-21T15:41:32.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"twiss","name":"Daniel Huigens","path":"/twiss","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/908303?s=80&v=4"},"commit":{"message":"Add functions to verify signature hash tags (#191)","shortMessageHtmlLink":"Add functions to verify signature hash tags (#191)"}},{"before":"610cabb48f6fbb8f35f984acb0782d1454f843fe","after":"a0326358fd635289f3489c10f0a0cc180c206150","ref":"refs/heads/feat/unify-key-generation","pushedAt":"2024-06-21T13:18:15.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"lubux","name":"Lukas Burkhalter","path":"/lubux","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/10532077?s=80&v=4"},"commit":{"message":"Remove whitespaces in docs\n\nCo-authored-by: Daniel Huigens ","shortMessageHtmlLink":"Remove whitespaces in docs"}},{"before":"20d98066bf49883040570c138d7a4edeba6dcdc7","after":"610cabb48f6fbb8f35f984acb0782d1454f843fe","ref":"refs/heads/feat/unify-key-generation","pushedAt":"2024-06-21T12:40:42.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"lubux","name":"Lukas Burkhalter","path":"/lubux","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/10532077?s=80&v=4"},"commit":{"message":"Remove auto zip preference in key generation","shortMessageHtmlLink":"Remove auto zip preference in key generation"}},{"before":"dd431f6bdaaa742f6fb9c110d997061d3c3a4ba4","after":"20d98066bf49883040570c138d7a4edeba6dcdc7","ref":"refs/heads/feat/unify-key-generation","pushedAt":"2024-06-21T09:22:37.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"lubux","name":"Lukas Burkhalter","path":"/lubux","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/10532077?s=80&v=4"},"commit":{"message":"Positive certification siganture in key generation","shortMessageHtmlLink":"Positive certification siganture in key generation"}},{"before":"54fa1c39e7c108056ee917f3a547c23893b1559f","after":"e3a3edc3ebc87d9f25b0b35e04611e5eff53eb40","ref":"refs/heads/feat/random-notation-in-signatures","pushedAt":"2024-06-21T07:28:00.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"lubux","name":"Lukas Burkhalter","path":"/lubux","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/10532077?s=80&v=4"},"commit":{"message":"Remove existing randomized notations","shortMessageHtmlLink":"Remove existing randomized notations"}},{"before":"93fa1c2ae4fe913fb83729ac282575f595adcc26","after":"54fa1c39e7c108056ee917f3a547c23893b1559f","ref":"refs/heads/feat/random-notation-in-signatures","pushedAt":"2024-06-20T16:03:30.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"lubux","name":"Lukas Burkhalter","path":"/lubux","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/10532077?s=80&v=4"},"commit":{"message":"Remove existing randomized notations","shortMessageHtmlLink":"Remove existing randomized notations"}},{"before":"ad9d15de2808d95a79bd8c0af708fd05e9c7097f","after":"93fa1c2ae4fe913fb83729ac282575f595adcc26","ref":"refs/heads/feat/random-notation-in-signatures","pushedAt":"2024-06-20T15:28:30.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"lubux","name":"Lukas Burkhalter","path":"/lubux","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/10532077?s=80&v=4"},"commit":{"message":"Randomize v4 and v5 signatures via custom notation","shortMessageHtmlLink":"Randomize v4 and v5 signatures via custom notation"}},{"before":null,"after":"ad9d15de2808d95a79bd8c0af708fd05e9c7097f","ref":"refs/heads/feat/random-notation-in-signatures","pushedAt":"2024-06-20T15:27:37.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"lubux","name":"Lukas Burkhalter","path":"/lubux","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/10532077?s=80&v=4"},"commit":{"message":"Randomize v4 and v5 signatures via custom notation","shortMessageHtmlLink":"Randomize v4 and v5 signatures via custom notation"}}],"hasNextPage":true,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"djE6ks8AAAAEd8rSXQA","startCursor":null,"endCursor":null}},"title":"Activity ยท ProtonMail/go-crypto"}