Eduardo' Vela" <Nava> (sirdarckcat)
Eduardo' Vela" <Nava> (sirdarckcat)
hey gary, is there a protocol for gossip within coniks already designed?
coruus, can you send this as a pull request? https://github.com/coruus/e2e/commit/909622dcfef2fbf0bf4aa047d813f7dfd1527e44 not sure if it's ready or you had something pending
asked frank/thai/quan if they are interested
leaving it open for (a) as per (b) the inverse blind is as-is to keep the algorithm fixed timing.
hi we can support this easily, I think. can you please send us a copy of a key like this?
(a test key, don't send your actual secret key =)
Here's what I get by doing this. It seems like the S2K is easy to support. ``` # off=0 ctb=95 tag=5 hlen=3 plen=277 :secret key packet: version 4, algo 1,...
monkey patching the code, seems to make it work: ``` e2e.openpgp.EncryptedCipher.prototype.unlockAndVerifyKey_ = function(decryptedKeyData) { if (this.s2k_ instanceof e2e.openpgp.DummyS2k && this.s2k_.mode == e2e.openpgp.DummyS2k.GPG_modes.NO_SECRET) { this.locked_ = false; this.keyBytes_ = []; return;...
note we might want to do the same with hashes (sha-1, md5, etc)
I think we can leave the lockable storage implementation as-is for now until we refactor things to use context2.