summaryrefslogtreecommitdiffstats
path: root/g10/mainproc.c
diff options
context:
space:
mode:
authorNIIBE Yutaka <gniibe@fsij.org>2019-01-16 02:27:21 +0100
committerNIIBE Yutaka <gniibe@fsij.org>2019-01-16 02:27:21 +0100
commitdafffa95b2317bcb80fff1fd6d2bc7b4e6b1e206 (patch)
treed24572d613e8439f814600cfff9ddb2de284d83e /g10/mainproc.c
parentdoc: Mark keyserver-options timeout and http-proxy as obsolete. (diff)
downloadgnupg2-dafffa95b2317bcb80fff1fd6d2bc7b4e6b1e206.tar.xz
gnupg2-dafffa95b2317bcb80fff1fd6d2bc7b4e6b1e206.zip
gpg: Report STATUS_NO_SECKEY when it is examined.
* g10/packet.h (struct pubkey_enc_list): Add result. * g10/mainproc.c (proc_pubkey_enc): Initialize ->result. (proc_encrypted): Report STATUS_NO_SECKEY status. * g10/pubkey-enc.c (get_session_key): Set ->result. -- This change is for GPGME compatibility. Before this change, gpgme/tests/json/t-json failed with t-decrypt-verify. Signed-off-by: NIIBE Yutaka <gniibe@fsij.org>
Diffstat (limited to 'g10/mainproc.c')
-rw-r--r--g10/mainproc.c30
1 files changed, 15 insertions, 15 deletions
diff --git a/g10/mainproc.c b/g10/mainproc.c
index dce3f3799..8c41088cc 100644
--- a/g10/mainproc.c
+++ b/g10/mainproc.c
@@ -481,6 +481,7 @@ proc_pubkey_enc (CTX c, PACKET *pkt)
x->keyid[0] = enc->keyid[0];
x->keyid[1] = enc->keyid[1];
x->pubkey_algo = enc->pubkey_algo;
+ x->result = -1;
x->data[0] = x->data[1] = NULL;
if (enc->data[0])
{
@@ -577,22 +578,21 @@ proc_encrypted (CTX c, PACKET *pkt)
{
c->dek = xmalloc_secure_clear (sizeof *c->dek);
result = get_session_key (c->ctrl, c->pkenc_list, c->dek);
- if (result == GPG_ERR_NO_SECKEY)
- {
- if (is_status_enabled ())
- {
- struct pubkey_enc_list *list;
-
- for (list = c->pkenc_list; list; list = list->next)
- {
- char buf[20];
- snprintf (buf, sizeof buf, "%08lX%08lX",
- (ulong)list->keyid[0], (ulong)list->keyid[1]);
- write_status_text (STATUS_NO_SECKEY, buf);
- }
- }
+ if (is_status_enabled ())
+ {
+ struct pubkey_enc_list *list;
+
+ for (list = c->pkenc_list; list; list = list->next)
+ if (list->result == GPG_ERR_NO_SECKEY)
+ {
+ char buf[20];
+ snprintf (buf, sizeof buf, "%08lX%08lX",
+ (ulong)list->keyid[0], (ulong)list->keyid[1]);
+ write_status_text (STATUS_NO_SECKEY, buf);
+ }
}
- else if (result)
+
+ if (result)
{
log_info (_("public key decryption failed: %s\n"),
gpg_strerror (result));