You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* Invalidate RSA keys less than 2048 bits
* tslint fix
* updated expiredPubKey to 2048-bit so the test 'compose - expired can still send' passes
* Modified keys for existing tests to fit RSA 2048 requirement
* Secure PK and insecure SK test and diagnostics
* moved armoring out of the background
* moved armoring out of the background 2
* moved armoring out of the background 3
* introduced rawKey and rawArmored fields of Key
* restored ContactStore
* PK 2048/RSA and SK 1024/RSA parse unencrypted and decrypt tests
* renamed methods and fields
* added comment
* removed weak keys from S/MIME certificate
Public keys that have a RSA primary key smaller than 2048 bits should always have
usableForEncryption
andusableForSigning
be false.Similarly, when parsing a public key, any subkeys that use RSA key smaller than 2048 should not be taken into account. (not sure how to do this)
2048bit will therefore be the minimum required strength for RSA.
The text was updated successfully, but these errors were encountered: