Update RSA key size error for security tokens
This commit is contained in:
parent
42b5e291ca
commit
2ed25ab8f3
|
@ -565,7 +565,7 @@ public abstract class OperationResult implements Parcelable {
|
||||||
MSG_MF_ERROR_DUPLICATE_KEYTOCARD_FOR_SLOT(LogLevel.ERROR, R.string.msg_mf_error_duplicate_keytocard_for_slot),
|
MSG_MF_ERROR_DUPLICATE_KEYTOCARD_FOR_SLOT(LogLevel.ERROR, R.string.msg_mf_error_duplicate_keytocard_for_slot),
|
||||||
MSG_MF_ERROR_INVALID_FLAGS_FOR_KEYTOCARD(LogLevel.ERROR, R.string.msg_mf_error_invalid_flags_for_keytocard),
|
MSG_MF_ERROR_INVALID_FLAGS_FOR_KEYTOCARD(LogLevel.ERROR, R.string.msg_mf_error_invalid_flags_for_keytocard),
|
||||||
MSG_MF_ERROR_BAD_SECURITY_TOKEN_ALGO(LogLevel.ERROR, R.string.edit_key_error_bad_security_token_algo),
|
MSG_MF_ERROR_BAD_SECURITY_TOKEN_ALGO(LogLevel.ERROR, R.string.edit_key_error_bad_security_token_algo),
|
||||||
MSG_MF_ERROR_BAD_SECURITY_TOKEN_SIZE(LogLevel.ERROR, R.string.edit_key_error_bad_security_token_size),
|
MSG_MF_ERROR_BAD_SECURITY_TOKEN_RSA_KEY_SIZE(LogLevel.ERROR, R.string.edit_key_error_bad_security_token_size),
|
||||||
MSG_MF_ERROR_BAD_SECURITY_TOKEN_CURVE(LogLevel.ERROR, R.string.edit_key_error_bad_security_token_curve),
|
MSG_MF_ERROR_BAD_SECURITY_TOKEN_CURVE(LogLevel.ERROR, R.string.edit_key_error_bad_security_token_curve),
|
||||||
MSG_MF_ERROR_BAD_SECURITY_TOKEN_STRIPPED(LogLevel.ERROR, R.string.edit_key_error_bad_security_token_stripped),
|
MSG_MF_ERROR_BAD_SECURITY_TOKEN_STRIPPED(LogLevel.ERROR, R.string.edit_key_error_bad_security_token_stripped),
|
||||||
MSG_MF_MASTER (LogLevel.DEBUG, R.string.msg_mf_master),
|
MSG_MF_MASTER (LogLevel.DEBUG, R.string.msg_mf_master),
|
||||||
|
|
|
@ -1657,9 +1657,9 @@ public class PgpKeyOperation {
|
||||||
case PublicKeyAlgorithmTags.RSA_ENCRYPT:
|
case PublicKeyAlgorithmTags.RSA_ENCRYPT:
|
||||||
case PublicKeyAlgorithmTags.RSA_SIGN:
|
case PublicKeyAlgorithmTags.RSA_SIGN:
|
||||||
case PublicKeyAlgorithmTags.RSA_GENERAL:
|
case PublicKeyAlgorithmTags.RSA_GENERAL:
|
||||||
// Key size must be at least 2048
|
// Key size must be at least 2048 since OpenPGP card specification 3.x
|
||||||
if (publicKey.getBitStrength() < 2048) {
|
if (publicKey.getBitStrength() < 2048) {
|
||||||
log.add(LogType.MSG_MF_ERROR_BAD_SECURITY_TOKEN_SIZE, indent + 1);
|
log.add(LogType.MSG_MF_ERROR_BAD_SECURITY_TOKEN_RSA_KEY_SIZE, indent + 1);
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
break;
|
break;
|
||||||
|
|
|
@ -785,7 +785,7 @@
|
||||||
<string name="edit_key_error_add_identity">"Add at least one identity!"</string>
|
<string name="edit_key_error_add_identity">"Add at least one identity!"</string>
|
||||||
<string name="edit_key_error_add_subkey">"Add at least one subkey!"</string>
|
<string name="edit_key_error_add_subkey">"Add at least one subkey!"</string>
|
||||||
<string name="edit_key_error_bad_security_token_algo">"Algorithm not supported by Security Token!"</string>
|
<string name="edit_key_error_bad_security_token_algo">"Algorithm not supported by Security Token!"</string>
|
||||||
<string name="edit_key_error_bad_security_token_size">"Key size not supported by Security Token!"</string>
|
<string name="edit_key_error_bad_security_token_size">"RSA key lower than 2048 bits is not supported by Security Token since OpenPGP card specification 3.x!"</string>
|
||||||
<string name="edit_key_error_bad_security_token_curve">"Curve not supported by Security Token!"</string>
|
<string name="edit_key_error_bad_security_token_curve">"Curve not supported by Security Token!"</string>
|
||||||
<string name="edit_key_error_bad_security_token_stripped">"Cannot move key to Security Token (either stripped or already on Security Token)!"</string>
|
<string name="edit_key_error_bad_security_token_stripped">"Cannot move key to Security Token (either stripped or already on Security Token)!"</string>
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue