Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Bump github.com/ProtonMail/go-crypto from 1.0.0 to 1.1.2 (#257)
Bumps [github.com/ProtonMail/go-crypto](https://github.com/ProtonMail/go-crypto) from 1.0.0 to 1.1.2. <details> <summary>Release notes</summary> <p><em>Sourced from <a href="https://github.com/ProtonMail/go-crypto/releases">github.com/ProtonMail/go-crypto's releases</a>.</em></p> <blockquote> <h2>Release v1.1.2</h2> <h2>What's Changed</h2> <ul> <li>Cleartext Framework: Exclude the line-ending separator when decoding plaintext by <a href="https://github.com/lubux"><code>@lubux</code></a> in <a href="https://redirect.github.com/ProtonMail/go-crypto/pull/242">ProtonMail/go-crypto#242</a></li> </ul> <p><strong>Full Changelog</strong>: <a href="https://github.com/ProtonMail/go-crypto/compare/v1.1.1...v1.1.2">https://github.com/ProtonMail/go-crypto/compare/v1.1.1...v1.1.2</a></p> <h2>Release v1.1.2-proton</h2> <h2>What's Changed</h2> <p>This release is v1.1.2 with support for symmetric keys and automatic forwarding, both of which are not standardized yet.</p> <h2>Release v1.1.1</h2> <h2>What's Changed</h2> <ul> <li>Fix <code>clearsign.Encode</code> backwards compatibility <a href="https://redirect.github.com/ProtonMail/go-crypto/issues/239">#239</a> by <a href="https://github.com/mdosch"><code>@mdosch</code></a> in <a href="https://redirect.github.com/ProtonMail/go-crypto/pull/240">ProtonMail/go-crypto#240</a></li> </ul> <p><strong>Full Changelog</strong>: <a href="https://github.com/ProtonMail/go-crypto/compare/v1.1.0...v1.1.1">https://github.com/ProtonMail/go-crypto/compare/v1.1.0...v1.1.1</a></p> <h2>Release v1.1.1-proton</h2> <h2>What's Changed</h2> <p>This release is v1.1.1 with support for symmetric keys and automatic forwarding, both of which are not standardized yet.</p> <h2>Release v1.1.0</h2> <h2>What's Changed</h2> <p>This release adds full support for the new version of the OpenPGP standard, <a href="https://www.rfc-editor.org/rfc/rfc9580.html">RFC 9580</a>. In addition, the release introduces an improved non-backwards compatible v2 API. The API in the <code>openpgp</code> package remains fully backwards compatible while the new v2 API is located in a separate <code>v2</code> package in <code>openpgp</code>.</p> <p>For the full changes since <code>v1.0.0</code>, see the previous release notes. For the full changelog, see <a href="https://github.com/ProtonMail/go-crypto/compare/v1.0.0...v1.1.0">https://github.com/ProtonMail/go-crypto/compare/v1.0.0...v1.1.0</a>.</p> <p>Changes since <code>v1.1.0-beta.0</code>:</p> <ul> <li>Replace expiring curve448 integration test vector by <a href="https://github.com/lubux"><code>@lubux</code></a></li> <li>Validate input key size in SEIPDv2 decryption by <a href="https://github.com/lubux"><code>@lubux</code></a></li> </ul> <p><strong>Changelog since <code>v1.1.0-beta.0</code></strong>: <a href="https://github.com/ProtonMail/go-crypto/compare/v1.1.0-beta.0...v1.1.0">https://github.com/ProtonMail/go-crypto/compare/v1.1.0-beta.0...v1.1.0</a>.</p> <h2>Release v1.1.0-proton</h2> <h2>What's Changed</h2> <p>This release is v1.1.0 with support for symmetric keys and automatic forwarding, both of which are not standardized yet.</p> <h2>v1.1.0-beta.0-proton</h2> <p>This pre-release is v1.1.0-beta.0 with support for symmetric keys and automatic forwarding, both of which are not standardized yet.</p> <h2>v1.1.0-beta.0</h2> <h2>What's Changed</h2> <ul> <li>Allow Salted S2K for high-entropy passphrases by <a href="https://github.com/twiss"><code>@twiss</code></a> in <a href="https://redirect.github.com/ProtonMail/go-crypto/pull/219">ProtonMail/go-crypto#219</a></li> <li>fix data race in getEd25519Sk by <a href="https://github.com/DmitriyMV"><code>@DmitriyMV</code></a> in <a href="https://redirect.github.com/ProtonMail/go-crypto/pull/220">ProtonMail/go-crypto#220</a></li> <li>Add back crypto.Signer support for ECDSA signing keys. by <a href="https://github.com/doryiii"><code>@doryiii</code></a> in <a href="https://redirect.github.com/ProtonMail/go-crypto/pull/227">ProtonMail/go-crypto#227</a></li> </ul> <!-- raw HTML omitted --> </blockquote> <p>... (truncated)</p> </details> <details> <summary>Commits</summary> <ul> <li><a href="https://github.com/ProtonMail/go-crypto/commit/2d2c7894dbb6ff089c9702e1553111340c3e683d"><code>2d2c789</code></a> feat(cleartext): Do not include line ending separator in plaintext (<a href="https://redirect.github.com/ProtonMail/go-crypto/issues/242">#242</a>)</li> <li><a href="https://github.com/ProtonMail/go-crypto/commit/f8b3f214bfc9c08e7b4af9d1fd406573f5f28d9f"><code>f8b3f21</code></a> Remove cleartext Encode header argument <a href="https://redirect.github.com/ProtonMail/go-crypto/issues/239">#239</a> (<a href="https://redirect.github.com/ProtonMail/go-crypto/issues/240">#240</a>)</li> <li><a href="https://github.com/ProtonMail/go-crypto/commit/b97cc3cc403885d5e5f635f2fbe7870c543202a0"><code>b97cc3c</code></a> feat: Validate input key size in SEIPDv2 decryption (<a href="https://redirect.github.com/ProtonMail/go-crypto/issues/236">#236</a>)</li> <li><a href="https://github.com/ProtonMail/go-crypto/commit/20ab0e40584bc971f516c1a45983f82c48239f9a"><code>20ab0e4</code></a> Replace expiring curve448 integration test vector (<a href="https://redirect.github.com/ProtonMail/go-crypto/issues/235">#235</a>)</li> <li><a href="https://github.com/ProtonMail/go-crypto/commit/f6ad483b4efe49419338a7ee23fffef48739acb8"><code>f6ad483</code></a> No v6 ECC keys with legacy OIDs (<a href="https://redirect.github.com/ProtonMail/go-crypto/issues/234">#234</a>)</li> <li><a href="https://github.com/ProtonMail/go-crypto/commit/77090fe8654c9ca9027f3e5c74a3650667921d3c"><code>77090fe</code></a> Fix ECDH using v6 keys (<a href="https://redirect.github.com/ProtonMail/go-crypto/issues/233">#233</a>)</li> <li><a href="https://github.com/ProtonMail/go-crypto/commit/78521796a4060a77e71768337f674325523c87d9"><code>7852179</code></a> Add support for keyserver preferences and preferred keyserver (closes <a href="https://redirect.github.com/ProtonMail/go-crypto/issues/206">#206</a>) (...</li> <li><a href="https://github.com/ProtonMail/go-crypto/commit/2add69303ec20700f7d67a02e61f82be792c73bb"><code>2add693</code></a> Add back crypto.Signer support for ECDSA signing keys (<a href="https://redirect.github.com/ProtonMail/go-crypto/issues/227">#227</a>)</li> <li><a href="https://github.com/ProtonMail/go-crypto/commit/0f7b93575b86466130045261116073413a11082b"><code>0f7b935</code></a> ci: Fix CI for v1 interoptest (<a href="https://redirect.github.com/ProtonMail/go-crypto/issues/229">#229</a>)</li> <li><a href="https://github.com/ProtonMail/go-crypto/commit/b5837fa4476e00841adaacdb8253b7ee59fa968f"><code>b5837fa</code></a> ci: Change gosop branch for gopenpgp-v2 to gosop-gopenpgp-v2 (<a href="https://redirect.github.com/ProtonMail/go-crypto/issues/224">#224</a>)</li> <li>Additional commits viewable in <a href="https://github.com/ProtonMail/go-crypto/compare/v1.0.0...v1.1.2">compare view</a></li> </ul> </details> <br /> [![Dependabot compatibility score](https://dependabot-badges.githubapp.com/badges/compatibility_score?dependency-name=github.com/ProtonMail/go-crypto&package-manager=go_modules&previous-version=1.0.0&new-version=1.1.2)](https://docs.github.com/en/github/managing-security-vulnerabilities/about-dependabot-security-updates#about-compatibility-scores) Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting `@dependabot rebase`. [//]: # (dependabot-automerge-start) [//]: # (dependabot-automerge-end) --- <details> <summary>Dependabot commands and options</summary> <br /> You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot show <dependency name> ignore conditions` will show all of the ignore conditions of the specified dependency - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) </details> Signed-off-by: dependabot[bot] <support@github.com> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
- Loading branch information