https://git.schokokeks.org/derivepassphrase.git/tree/fc134c9aa5519d8cf5b394a0036af8be2a0ecaffRecent commits to derivepassphrase.git (fc134c9aa5519d8cf5b394a0036af8be2a0ecaff)2024-06-22T21:19:30+02:00tag:gitlist.org,2012:commit/fc134c9aa5519d8cf5b394a0036af8be2a0ecaffSupport textual passphrases, if it is safe2024-06-22T21:19:30+02:00Marco Riccim@the13thletter.info
<pre>Some level of awareness is necessary to support passphrases stored in
(JSON) config files. We reject the passphrase if there are multiple
Unicode representations (and thus UTF-8 representations) of the same
text but with different normalizations. In such a case, a byte string
must be used, and the value cannot currently be stored in the JSON
config file.
</pre>
tag:gitlist.org,2012:commit/d3bdff5889f148f85d644ecfcb3fc9787b0a1aefFix passphrase-from-SSH-signature calculation2024-06-22T21:19:30+02:00Marco Riccim@the13thletter.info
<pre>In vault(1), the passphrase derived from an SSH key signature is *not*
just the (framed, binary) SSH signature of the vault UUID. Instead, the
payload part of the signature, in binary, is converted to base64,
yielding the passphrase. Rewrite the `Vault.phrase_from_signature`
method to match vault's behavior, and rename it to `phrase_from_key` to
better match the *actual* interface (which takes an SSH key, not
a signature).
(This design – emitting an SSH signature as payload only, in base64 – is
hard-coded into the SSH agent client library used by vault, and likely
not a conscious design by vault's primary author.)
</pre>
tag:gitlist.org,2012:commit/81f902f6a37fc585684b6fc375ffcb5f2ae964c6Expose some functionality from `Vault` as interal methods2024-06-22T21:19:30+02:00Marco Riccim@the13thletter.info
<pre>Expose some functionality from `derivepassphrase.Vault` as interal
methods, to facilitate testing and to avoid reimplementing the same
functionality again in the command-line interface. This includes hash
length estimation and SSH key suitability checking.
</pre>
tag:gitlist.org,2012:commit/3d09a07f18a46b597808e3f2030a566d4ef7d1e2Add function for SSH framed byte strings with trailing data2024-06-22T21:19:30+02:00Marco Riccim@the13thletter.info
<pre>The new function `ssh_agent_client.unstring_prefix` does not abort if
there is trailing data after the SSH framed byte string.
</pre>
tag:gitlist.org,2012:commit/18198578dc3148566fde6e7767a3a1584f338175Remove public attributes of `ssh_agent_client.SSHAgentClient`2024-06-22T21:19:30+02:00Marco Riccim@the13thletter.info
<pre></pre>
tag:gitlist.org,2012:commit/23390bc56a135d2c97a3e54d3b08bf5e117f32f0Add prototype command-line interface2024-06-22T19:54:19+02:00Marco Riccim@the13thletter.info
<pre></pre>
tag:gitlist.org,2012:commit/e999bd54e5f32c3bdb1600b86b43740f14e535b3Reformat binary test data to aligned hex view2024-06-08T19:14:35+02:00Marco Riccim@the13thletter.info
<pre>For those familiar with SSH protocol messages, make the data more
readable by aligning the hex view on the data boundaries according to
the protocol.
</pre>
tag:gitlist.org,2012:commit/6eab62ca9f46c2caf2172c6558e26f7cef8f02d5Remove __about__.py files, use __init__.py instead2024-06-08T19:07:53+02:00Marco Riccim@the13thletter.info
<pre>Apparently, this is a `hatch` convention/tradeoff, but one that doesn't
appear sensible to a project like this.
On that note, since we're starting with a clear target API in mind,
start directly at release 0.1.0 instead of the `hatch` default 0.0.1.
</pre>
tag:gitlist.org,2012:commit/85fcc667bbe6a3efb47e11c46a67c959d2419e86Exclude known "emergency exits" from coverage reporting2024-06-08T19:06:56+02:00Marco Riccim@the13thletter.info
<pre>These "emergency exits" are code paths rooted in defensive programming
(of both code and of tests), and are not intended to be reached in
practice.
</pre>
tag:gitlist.org,2012:commit/9d27d86c9b17d6ee74682f9116b1c714dcd6af4cAdd coverage testing2024-06-08T19:06:56+02:00Marco Riccim@the13thletter.info
<pre></pre>