b97434fbf0
* tests/json/t-decrypt-verify.out.json: Remove check with key of 04071FB807287134. -- GnuPG 2.3 changes how public key decryption works; It collects list of PUBKEY_ENC packets and then processes an ENCRYPTED* packet. At the stage of processing an ENCRYPTED* packet, it checks if private keys can decrypt any of PUBKEY_ENC packets. It does not necessarily examine all of PUBKEY_ENC packets. Only when it finds a PUBKEY_ENC packet cannot be decrypted, it reports STATUS_NO_SECKEY with keyid of that packet. GnuPG 2.2 or older tries PUBKEY_ENC packets in order, and the first successful PUBKEY_ENC packet is used. Rest of PUBKEY_ENC packets are not examined, but STATUS_NO_SECKEY with keyid is reported even when there is a valid private key. Signed-off-by: NIIBE Yutaka <gniibe@fsij.org>
52 lines
1.6 KiB
JSON
52 lines
1.6 KiB
JSON
{
|
|
"dec_info": {
|
|
"symkey_algo": "TWOFISH.CFB",
|
|
"wrong_key_usage": false,
|
|
"is_de_vs": false,
|
|
"is_mime": false,
|
|
"legacy_cipher_nomdc": false,
|
|
"recipients": [{
|
|
"keyid": "6AE6D7EE46A871F8",
|
|
"pubkey_algo_name": "ELG-E",
|
|
"status_string": "Success",
|
|
"status_code": 0
|
|
}]
|
|
},
|
|
"info": {
|
|
"is_mime": false,
|
|
"signatures": [{
|
|
"summary": {
|
|
"sigsum": [],
|
|
"valid": false,
|
|
"green": false,
|
|
"red": false,
|
|
"revoked": false,
|
|
"key-expired": false,
|
|
"sig-expired": false,
|
|
"key-missing": false,
|
|
"crl-missing": false,
|
|
"crl-too-old": false,
|
|
"bad-policy": false,
|
|
"sys-error": false
|
|
},
|
|
"wrong_key_usage": false,
|
|
"chain_model": false,
|
|
"is_de_vs": false,
|
|
"status_string": "Success",
|
|
"fingerprint": "A0FF4590BB6122EDEF6E3C542D727CC768697734",
|
|
"validity_string": "unknown",
|
|
"pubkey_algo_name": "DSA",
|
|
"hash_algo_name": "RIPEMD160",
|
|
"status_code": 0,
|
|
"timestamp": 1542200353,
|
|
"exp_timestamp": 0,
|
|
"pka_trust": 0,
|
|
"validity": 0,
|
|
"validity_reason": 0
|
|
}]
|
|
},
|
|
"type": "plaintext",
|
|
"base64": false,
|
|
"data": "Hello world"
|
|
}
|