Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Making sure also public keys kan be retrieved without relying upon PublicKeyRingBundle #576

Merged
merged 8 commits into from
Jun 4, 2020

Conversation

polterguy
Copy link

This too method needs to be public and virtual, in order for me to retrieve public keys, without relying upon PublicKeyRingBundle, which makes no sense, if user wants to store (millions potentially) of keys in database.

Thomas Hansen added 6 commits June 2, 2020 22:02
To avoid relying upon `PublicKeyRingBundle` if more generic solution for key lookups is needed
That is the commonalities required to use PGP cryptography, without relying upon GnuPG or local files in any ways, allowing the user to persist his private and public keys as he see fit.
@polterguy
Copy link
Author

Jo mate, I took the liberty of doing what I proposed, to create an interception class between OpenPgpContext and CryptographyContext, to make it simpler to implement completely custom key persistence layer. Hopefully it's in accordance to your standards :)

@polterguy
Copy link
Author

BTW, not sure why the TestAutoKeyRetrieve test is failing, and I have firewall issues where I'm at, and I can't test it myself ... :/

@polterguy
Copy link
Author

Darn it! Thank you for CI ...!! :/

On its way, finally I think ... :)

@jstedfast
Copy link
Owner

The TestAutoKeyRetrieve() test fails intermittently due to the fact that Werner's GnuPG key, depending on which keyserver is in the rotation, is sometimes signed with an Elliptic Curve key which is not yet supported by BouncyCastle.

bcgit/bc-csharp#73

I would not worry about it failing.

@jstedfast jstedfast merged commit 878090d into jstedfast:master Jun 4, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants