diff options
| author | Werner Koch <[email protected]> | 2014-08-18 13:42:54 +0000 |
|---|---|---|
| committer | Werner Koch <[email protected]> | 2014-08-18 13:42:54 +0000 |
| commit | 3981ff15f3c0829ba22cd37794353502d996683c (patch) | |
| tree | ff65c51b73688a205dd26e62123524dbaf27aeb3 /agent/findkey.c | |
| parent | tests: Re-enable OpenPGP ecc test. (diff) | |
| download | gnupg-3981ff15f3c0829ba22cd37794353502d996683c.tar.gz gnupg-3981ff15f3c0829ba22cd37794353502d996683c.zip | |
agent: Return NO_SECKEY instead of ENONET for PKSIGN and others.
* agent/pksign.c (agent_pksign_do): Replace ENONET by NO_SECKEY.
* agent/findkey.c (agent_key_from_file): No diagnostic for NO_SECKEY.
* agent/pkdecrypt.c (agent_pkdecrypt): Replace checking for ENOENT.
Diffstat (limited to 'agent/findkey.c')
| -rw-r--r-- | agent/findkey.c | 6 |
1 files changed, 5 insertions, 1 deletions
diff --git a/agent/findkey.c b/agent/findkey.c index 8725afbf3..5ff263ef4 100644 --- a/agent/findkey.c +++ b/agent/findkey.c @@ -605,7 +605,11 @@ agent_key_from_file (ctrl_t ctrl, const char *cache_nonce, rc = read_key_file (grip, &s_skey); if (rc) - return rc; + { + if (gpg_err_code (rc) == GPG_ERR_ENOENT) + rc = gpg_error (GPG_ERR_NO_SECKEY); + return rc; + } /* For use with the protection functions we also need the key as an canonical encoded S-expression in a buffer. Create this buffer |
