84c30f9629
Update yubikit to 3.0.0, fix key generation, refactor code
2025-12-04 23:12:08 +01:00
bb796a6819
Remove old, commented-out code and add TODOs
2025-12-04 12:36:43 +01:00
2b060a1273
Fix existing test for decrypting with missing hardware key
2025-12-02 17:44:45 +01:00
a1af39a4f7
Transparent decryption
2025-12-02 13:10:47 +01:00
de47a683d9
WIP: Transparent decryption
2025-12-01 23:42:44 +01:00
510f8276e7
WIP
2025-12-01 12:08:04 +01:00
6f3f988707
Add prototype implementation for signing with hardware-backed keys
2025-12-01 12:07:45 +01:00
89bce1ca14
YubikeyDataDecryptorFactory: WIP with SECP521r1 keys
2025-12-01 12:07:30 +01:00
f26d91d41f
WIP: Decryption using ECDH key
2025-12-01 12:07:30 +01:00
06a6302001
Sketch out yubikey-based public key decryption.
...
Note: Requires a modified copy of Bouncy Castle with the following changes:
* BcPublicKeyDataDecryptorFactory.unwrapSessionData(): make public
* org.bouncycastle.openpgp.operator.bc.RFC6637KDFCalculator: Make class public
2025-12-01 12:07:30 +01:00
65159255f1
WIP: Explore implementing a concrete HardwareSecurity implementation using Yubikit
2025-12-01 12:07:28 +01:00