gpgme/tests/json/t-decrypt-verify.out.json
NIIBE Yutaka b97434fbf0 json: Fix t-decrypt-verify.out for GnuPG >= 2.3.
* tests/json/t-decrypt-verify.out.json: Remove check with key of
04071FB807287134.

--

GnuPG 2.3 changes how public key decryption works; It collects list of
PUBKEY_ENC packets and then processes an ENCRYPTED* packet.  At the
stage of processing an ENCRYPTED* packet, it checks if private keys
can decrypt any of PUBKEY_ENC packets.  It does not necessarily
examine all of PUBKEY_ENC packets.  Only when it finds a PUBKEY_ENC
packet cannot be decrypted, it reports STATUS_NO_SECKEY with keyid of
that packet.

GnuPG 2.2 or older tries PUBKEY_ENC packets in order, and the first
successful PUBKEY_ENC packet is used.  Rest of PUBKEY_ENC packets are
not examined, but STATUS_NO_SECKEY with keyid is reported even when
there is a valid private key.

Signed-off-by: NIIBE Yutaka <gniibe@fsij.org>
2019-08-06 11:19:59 +09:00

52 lines
1.6 KiB
JSON

{
"dec_info": {
"symkey_algo": "TWOFISH.CFB",
"wrong_key_usage": false,
"is_de_vs": false,
"is_mime": false,
"legacy_cipher_nomdc": false,
"recipients": [{
"keyid": "6AE6D7EE46A871F8",
"pubkey_algo_name": "ELG-E",
"status_string": "Success",
"status_code": 0
}]
},
"info": {
"is_mime": false,
"signatures": [{
"summary": {
"sigsum": [],
"valid": false,
"green": false,
"red": false,
"revoked": false,
"key-expired": false,
"sig-expired": false,
"key-missing": false,
"crl-missing": false,
"crl-too-old": false,
"bad-policy": false,
"sys-error": false
},
"wrong_key_usage": false,
"chain_model": false,
"is_de_vs": false,
"status_string": "Success",
"fingerprint": "A0FF4590BB6122EDEF6E3C542D727CC768697734",
"validity_string": "unknown",
"pubkey_algo_name": "DSA",
"hash_algo_name": "RIPEMD160",
"status_code": 0,
"timestamp": 1542200353,
"exp_timestamp": 0,
"pka_trust": 0,
"validity": 0,
"validity_reason": 0
}]
},
"type": "plaintext",
"base64": false,
"data": "Hello world"
}