-
Notifications
You must be signed in to change notification settings - Fork 7
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Improve handling of invalid keys on message compose #2438
Comments
Currently, I don't believe retrieving the public key is related to EKM. We only seem to use EKM for fetching and updating private keys, during which we update Should I add functionality to retrieve public keys from flowcrypt-ios/FlowCrypt/Functionality/Services/Local Contacts Provider/LocalContactsProvider.swift Line 147 in de5c954
flowcrypt-ios/FlowCrypt/Functionality/DataManager/Encrypted Storage/EncryptedStorage.swift Line 194 in 914a16e
|
Here I meant retrieving of private keys, as it was reported by customer - some user had expired private key on EKM and couldn't sent encrypted message. Then key on EKM was updated but user still got error So here we should attempt to fetch the latest keys from EKM if sender's local keys can't be used for encryption. |
Aha, I see |
When user tries to send encrypted message, but stored local keys are invalid (expired or revoked) then we just show
Your account keys are not usable for encryption
error message:In this case, before showing error message, we should try to fetch updated keys from EKM and show error only if there are no valid keys on EKM.
The text was updated successfully, but these errors were encountered: