Skip to content

Conversation

@hko-s
Copy link
Contributor

@hko-s hko-s commented Nov 22, 2025

This is an early implementation of draft-ietf-openpgp-persistent-symmetric-keys.

This PR branch is intended for interop testing, and should not be merged before the draft arrives in a sufficiently stable state in the OpenPGP WG!

TODO:

  • Introduce and use remaining *-Key traits
  • Cleanup
  • Look into password-locking PSK

@hko-s hko-s marked this pull request as draft November 22, 2025 16:50
@hko-s hko-s force-pushed the PSK branch 9 times, most recently from 04eca35 to 964646d Compare November 25, 2025 10:09
@hko-s hko-s force-pushed the PSK branch 7 times, most recently from 3eeb4cd to c28dbb3 Compare November 29, 2025 20:49
@hko-s hko-s force-pushed the PSK branch 4 times, most recently from 491a545 to f2a0d4c Compare December 5, 2025 21:31
}
}

pub struct UnlockablePersistentSymmetricKey<'a> {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

this concept is new, why do we need it?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

My idea for that type was that it allows passing a Password into a regular encrypt and verify call like in d09cd49.

That seems like a reasonably nice way to hide away the need for a password from the rest of the code.

impl<'a> VerifyingKey for UnlockablePersistentSymmetricKey<'a> {
fn verify(
&self,
_hash: HashAlgorithm,
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

should at least check it in some form

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants