Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Ensure crypto refresh cleartext messages are parseable #170

Closed
wants to merge 1 commit into from

Conversation

lubux
Copy link
Contributor

@lubux lubux commented May 25, 2023

The crypto refresh introduces a new SaltedHash header in signed cleartext messages, which prevents a new message from being parsed by the library. This pull request updates the parsing function to accept the new header and ensures that a cleartext message containing multiple signatures with different versions can be verified.

For example, the following cleartext message with a v4 and a v6 signature
can now be successfully verified with a v4 key.

-----BEGIN PGP SIGNED MESSAGE-----
SaltedHash: SHA512:MOvqfCOPw2ONdPPtEzWRHPrtHV7jge6f7/iBUI7FqQQ
Hash: SHA512

....

-----BEGIN PGP SIGNATURE-----
...
-----END PGP SIGNATURE-----

The crypto refresh introduces a new header in cleartext messages,
which prevents a new cleartext message from being parsed by the library.
This commit updates the parsing function to accept the new header and ensures that
cleartext messages with mixed signature versions can be verified.
@lubux lubux requested a review from twiss May 25, 2023 13:58
@lubux lubux changed the title Ensure crypto refresh cleartext messages are parsable Ensure crypto refresh cleartext messages are parseable May 25, 2023
@lubux
Copy link
Contributor Author

lubux commented May 30, 2023

This pull request becomes obsolete with mr:313, which removes the salted hash header from the crypto refresh and makes the hash header optional.

@lubux lubux closed this May 30, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

1 participant