David Hook
David Hook
So the issue was generating a response that the server couldn't read?
Okay I've done a bit of work on this now. How's the following look: PGPSessionKeyEncryptedData sessionKeyEncData = encryptedData.extractSessionKeyEncryptedData(); SessionKeyDataDecryptorFactory decryptorFactory = new BcSessionKeyDataDecryptorFactory(sessionKey); InputStream decrypted = sessionKeyEncData.getDataStream(decryptorFactory); Really the data...
Should be appearing in github shortly. I've deprecated the old methods and marked them for later removal.
Usually this would mean the password is wrong, it's possibly an issue with the PBE algorithm, but given how long it has been since we have had a report like...
It should decrypt to a private key object, as in a PKCS#8 PrivateKeyInfo. If there was an issue with the fact it was ed25519 then the problem would show up...
Oh yeah... think it must be a slow day today. Let me think about this further. @chen0411 would you provide a sample with a password.
It is possible to sign an earlier jar with a newer signing certificate. You can apply for a signing certificate if you want to do this. One thing though, 1.40...
Compare what you are generating with publicKey.getEncoded() and you will see what is missing.
Thanks. I can read and validate all those. Here's some I generated - in this case I did the SHA-256 initial stamp and then did a rehash with SHA-512. The...
Might be time to get the RFC out again... So I think there - doesn't it say somewhere that if there's a single document just the time stamp is enough?...