Skip to content

Releases: detunized/password-manager-access

v0.1.2

09 Dec 19:02
Compare
Choose a tag to compare

Changes:

This list of changes was auto generated.

v0.1.1

09 Dec 11:33
Compare
Choose a tag to compare

Changes:

  • 25fa7d6 CI: don't checkout the code on the release job, use the tag as the release name
  • bfca606 Version bumped to 0.1.1
  • ceb38b1 Bitwarden: better error handling, report invalid U2F signature properly (fixes #11)
  • ef26a15 Bitwarden: Handle U2F cancellation
  • 636428d Bitwarden: conditionally reference U2fWin10 and compile on NET Framework only
  • e1e199b Bitwarden: removed unused Ui.ProvideU2fPasscode method
  • 4843f1a Changed the test lib to be a calss lib to eliminate the warning about missin Main method
  • 79789ca Bitwarden: Fixed the unsupported 2FA methods test
  • 4e56e6a Bitwarden: Support for FIDO U2F on Windows 10 build 1903+ via U2fWin10 library (https://www.nuget.org/packages/U2fWin10/)
  • c2cf20a Normalize whitespace and BOM (don't need one, thank you)
See More
  • fc59886 Bitwarden: FIDO U2F support (WIP)
  • 9a71e47 Bitwarden: Don't throw when unsupported 2FA method encountered, ignore it
  • ca81a20 Bump the client version (67145154c993da489a7a2a44dde55f4d55b9fb8f, 13 Nov 2019 in the original repo)
  • 5fbaf23 Support for MS Authenticator (89ea4b790bd8ed6aabc47deb9b6e19fb0b81895b, 13 Nov 2019 in the original repo)
  • 803658c Fixed a server imposed 200 item limit per request: issue multiple requests until we're done receiving all the items in the vault (ad9375fa2e4ad0725a68413a56e0240881117e21, 17 Sep 2019 in the original repo)
  • 58dea6b Azure Pipelines: release to GH only from refs/tags/ [skip appveyor]
  • 6b4c928 Azure Pipelines: enalble windows build [skip appveyor]
  • fe19068 Azure Pipelines: tag release [skip appveyor]
  • a0bc99e Azure Pipelines: create github release [skip appveyor]
  • 86d35f4 Azure Pipelines: ls downloaded files [skip appveyor]
  • 8da9509 Azure Pipelines: download all files [skip appveyor]
  • 5e9904d Azure Pipelines: download nupkg [skip appveyor]
  • eeb55be Azure Pipelines: publish nuget [skip appveyor]
  • bf7c3e9 Azure Pipelines: view files [skip appveyor]
  • 3c784a8 Azure Pipelines: upload test results
  • ea2bf96 Azure Pipelines: simple linux build only
  • 282d9b0 Azure Pipelines: make nuget package using dotnet pack and publish locally
  • b4e8c7a Azure Pipelines: make nuget package
  • 2537672 NuGet package properties
  • 816dafb Don't package the examples for NuGet
  • f9edcd1 Azure Pipelines: named the stages for Linux build
  • 1c95e35 Azure Pipelines: run only netcoreapp3.0 tests on Linux
  • be13637 Azure Pipelines: Linux dotnet build
  • ba6f570 CircleCI removed after a few attempts to configure a windows and a linux build (ref #2)
  • ab0c148 Add tests to CircleCI config
  • 69af40a Circle CI config
  • 11fc149 Azure Pipelines badge (ref #2)
  • b16d0c9 Appveyor config and badge (ref #2)
  • 1adcf24 Auzure CI config: only build the main solution
  • 981547f Set up CI with Azure Pipelines (Windows)
  • ea7ab5d Support for .NET Core
  • 4693e4f Make a few attempts with the MFA codes, smarter email triggering, handle incorrect MFA code
  • 1edfdef Handle always-OTP device registration properly
  • 73fec92 New device registration reworked, better MFA support
  • 3b30c12 Test settings in various formats
  • 2c460f0 Test various local key formats
  • 66d4cbd Dashlane exceptions removed, some TODOs fixed
  • 333b32d Use base url
  • 1d5c204 TODO
  • 096b1e5 Some foreach tests converted to theories
  • 31c923b JoinToString tests
  • 8cc97a6 Random device ID generation simplified and brought up to date
  • 679924e The term UKI is replaced with more generic Device ID, it was confusing
  • e3e582a Missing test fixture
  • a7ad3e5 Major refactoring: the uki/device-id is removed from the public API and now is done via the Ui interface, many more changes
  • fed6a8d Verify UKI before trying to login (WIP)
  • 21de924 Converted foreach/fact test to theories
  • 4a7be38 FetchException removed
  • fe553fe Discard deleted accounts (58676fa70cfa06a2292f715155c49f8dac435c52, 30 Sep 2019 in the original repo)
  • ffed2cc Support both OTP on every login and for new devices only
  • d84f28e Decrypt the vault protected by the server key (used with MFA)
  • b19211a Dashlane basic Google Auth support (WIP)
  • 02a34e7 Send OTP with given (MFA, WIP)
  • 3a25338 Check the login type before fetching the vault
  • 918a102 Request login type (MFA, WIP)
  • 2999bbf Dashlane ported to RestClient, IWebClient and WebClient removed
  • 18b927d RegisterUki ported to RestClient
  • e325acd Porting Dashlane.Remote over to RestClient (WIP)
  • 0dbefe1 Allow responses with errors in RestFlow
  • 7a209f5 ByteArray.Sub moved to common extensions
  • 642657b Removed most of the extensions from Dashlane
  • ed0e14a TODOs
  • abc9ff4 Import UKI is back. Yay!
  • 26390d8 An overload for DecryptBlob with a binary password
  • 0c36eb4 Made all internal methods internal
  • b4bf5e6 Added Argon2d support thanks to Konscious.Security.Cryptography.Argon2 1.2.1
  • a7e5a0f Throw on non ASCII passwords
  • 9954f11 Don't like yellow tests: the KWC5 test now simply check for throw
  • 0d70abb Blob.Compressed removed as it's no longer needed
  • 3f4bdc7 Refactoring: lots of code moved around
  • b2f1d92 Removed Parse.Sha1 and the iterations from the IV derivation
  • 1ff9464 Added SHA-1 to Crypto
  • 6d4e964 Removed Blob.Iterations since it's no longer used
  • 96a2df2 Removed UseDerivedKey since it's no longer used
  • 77f1857 Parse and decrypt the new flexible config PBKDF2 blob format
  • b0a210e SHA-512 and HMAC-SHA-256 added to the crypto lib
  • 7a4c908 Assign a cipher config to KWC3 blobs as well
  • bfc3089 Remove broken support for KWC5
  • bd90cd7 A working version of the local settings import with the new encryption
  • d421552 IV generation mode, KWC3/5 configs
  • 0590c87 Parse flexible crypto config and the rest of the blob
  • 93ef125 1password: Fixed occasional invalid RSA keys that .NET would choke on by restoring the missing leading zeros (ba6f77fc65ee89007ca3da13394dfd6557034411, 29 Aug 2019 in the original repo)
  • 82dcd07 Parse new encrypted blob format (WIP)
  • 6546597 All Dashlane tests are green
  • c5cd06a Tests converted to Xunit
  • 3885458 Dashlane tests moved from .orginal
  • cf8bd13 Only KWC3/5 modes are supported, any other throws an exception
  • 396dc24 Dashlane example converted from .original
  • 8cd32ac Updated the copyright and the namepsace
  • c659ab4 Dashlane moved from the .original
  • 9c09ca7 Force special RSA parsing/decryption when handling organization keys (fixes #1)
  • c9ec4b5 Special forced RSA parsing mode for the cipher string
  • 258bd0d Parse a cipher string without the encryption mode into AES-128-HMAC-SHA-256 when it has 3 pieces
  • d42a9c2 TestRestTransport -> RestFlow
  • b100e59...
Read more