question-mark
Stuck on an issue?

Lightrun Answers was designed to reduce the constant googling that comes with debugging 3rd party libraries. It collects links to all the places you might be looking at while hunting down a tough bug.

And, if you’re still stuck at the end, we’re happy to hop on a call to see how we can help out.

Bring back SecurityKey.IsSupportedAlgorithm

See original GitHub issue

When fixing ASOS to use the newest IM bits, I had to replace SecurityKey.IsSupportedAlgorithm by the new syntax.

key.IsSupportedAlgorithm(SecurityAlgorithms.RsaSha256Signature)

->

key.CryptoProviderFactory.IsSupportedAlgorithm(SecurityAlgorithms.RsaSha256Signature)

Unfortunately, it doesn’t work at all because the key itself is not flowed up to CryptoProviderFactory.IsSupportedAlgorithm so it always returns false even if the key is a RSA key.

You now have to use this extremely weird and error-prone syntax:

key.CryptoProviderFactory.IsSupportedAlgorithm(SecurityAlgorithms.RsaSha256Signature, key)

@brentschmaltz @tushargupta51 @polita any chance we can reintroduce SecurityKey.IsSupportedAlgorithm for RTM?

Issue Analytics

  • State:closed
  • Created 7 years ago
  • Comments:11 (11 by maintainers)

github_iconTop GitHub Comments

1reaction
brentschmaltzcommented, Jun 17, 2020

@kevinchalet I’ll get it in…

0reactions
kevinchaletcommented, Jun 27, 2020

@brentschmaltz thanks! I can confirm the new API works like a charm 🎉

Read more comments on GitHub >

github_iconTop Results From Across the Web

Restrict cryptographic algorithms and protocols
This article describes how to restrict the use of certain cryptographic algorithms and protocols in the Schannel.dll file.
Read more >
Cipher Suites: Ciphers, Algorithms and Negotiating ...
This is the process where a client and server agree on a mutually support cipher suite and then use the chosen cipher suite...
Read more >
Use a security key for 2-Step Verification - Android
Security keys can be used with 2-Step Verification to help you keep hackers out of your Google Account. Important: If you're a ......
Read more >
An Introduction to Cipher Suites
Cipher suites are sets of instructions that enable secure network ... A key exchange algorithm, to determine how symmetric keys will be ...
Read more >
Specified Key is Not a Valid Size for This Algorithm
' This error occurs when the key size provided for a particular encryption algorithm is not supported. In this article, we will explore...
Read more >

github_iconTop Related Medium Post

No results found

github_iconTop Related StackOverflow Question

No results found

github_iconTroubleshoot Live Code

Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start Free

github_iconTop Related Reddit Thread

No results found

github_iconTop Related Hackernoon Post

No results found

github_iconTop Related Tweet

No results found

github_iconTop Related Dev.to Post

No results found

github_iconTop Related Hashnode Post

No results found