Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

User group key rotation tutadb 1844 #7505

Merged
merged 7 commits into from
Sep 16, 2024

Conversation

vitoreiji
Copy link
Contributor

No description provided.

@vaf-hub vaf-hub changed the base branch from master to dev-crypto September 4, 2024 08:27
@vitoreiji vitoreiji force-pushed the user-group-key-rotation-tutadb-1844 branch from 9a648d6 to 4d8458a Compare September 4, 2024 10:00
@vitoreiji vitoreiji force-pushed the user-group-key-rotation-tutadb-1844 branch 2 times, most recently from f10ec99 to 455bccd Compare September 4, 2024 11:09
@vaf-hub vaf-hub force-pushed the user-group-key-rotation-tutadb-1844 branch 4 times, most recently from b9fd3ab to 3d2d239 Compare September 9, 2024 13:30
@vaf-hub vaf-hub force-pushed the dev-crypto branch 2 times, most recently from 7a2291a to ab6a096 Compare September 9, 2024 13:56
@vaf-hub vaf-hub force-pushed the user-group-key-rotation-tutadb-1844 branch from 3d2d239 to 05ee9a5 Compare September 9, 2024 14:12
vitoreiji and others added 3 commits September 11, 2024 09:41
We were using mismatched sender key and sender key version.

tutadb#1844

undo rename of generated type attribute
@vaf-hub vaf-hub force-pushed the user-group-key-rotation-tutadb-1844 branch 3 times, most recently from 37f5422 to 3cba437 Compare September 16, 2024 10:19
vaf-hub and others added 4 commits September 16, 2024 16:02
…min to decrypt user group key via pubAdminEncGKey

remove rsa and pqFacade dependencies from CryptoFacade as they were moved to AsymmetricCryptoFacade
remove unauthenticated asymmetric decryption because it was only used in a deprecated case and is the same implementation as with authentication,
enforce the correct protocol version and that it matches the algorithm of recipient's key pair
use existing method to decrypt via adminEncGKey when changing the admin flag
add cryptoWrapper dependency to make testing easier
@vaf-hub vaf-hub force-pushed the user-group-key-rotation-tutadb-1844 branch from 9c71778 to 9904832 Compare September 16, 2024 14:02
@vaf-hub vaf-hub merged commit 9904832 into dev-crypto Sep 16, 2024
1 check failed
@vaf-hub vaf-hub deleted the user-group-key-rotation-tutadb-1844 branch September 16, 2024 14:03
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants