Open koto opened 9 years ago
We need to expose getValidEncryptionKeys
in ContextImpl
or make TransferableKey.toKeyObject()
expose information whether a valid encryption (sub)key is present and filter based on those.
Same for signing.
This is taken into account for the Keyringv2 design.
closing up old bugs, please reopen if you would still like to see it fixed
this seems useful, sorry I shouldn't have closed it
From koto@google.com on September 02, 2014 17:13:48
In the keyring, for given User IDs we might have public/secret (sub)keys that can only encrypt/sign or verify a message. There is no guarantee that we can encrypt a message for every user id in a public keyring. For example, some keys might have been revoked,expired or just missing.
We should not allow the user to choose a user Chip as a recipient, if we don't have an encrypting key for that user.
Steps to reproduce:
What happens:
You can choose koto+rsa identity. Encrypting the message will however only encrypt to senders' key, because koto+rsa UID has no public key to encrypt to.
What should happen:
koto+rsa Chip should be a red chip or should not show in the UI at all.
Original issue: http://code.google.com/p/end-to-end/issues/detail?id=144