diff options
author | Ben Kibbey <[email protected]> | 2014-11-09 21:42:54 +0000 |
---|---|---|
committer | Werner Koch <[email protected]> | 2014-11-21 19:25:43 +0000 |
commit | 5942b0c7e0593b82b4c4a142c214d7a2649de104 (patch) | |
tree | 9dd199a77b86d271d3a155bc6d2545b3f9e1a185 /src/export.c | |
parent | doc: Clarify the FILE command. (diff) | |
download | gpgme-5942b0c7e0593b82b4c4a142c214d7a2649de104.tar.gz gpgme-5942b0c7e0593b82b4c4a142c214d7a2649de104.zip |
Fix returning new signatures when there are none.
* src/sign.c (gpgme_op_sign_result): Test that invalid and valid
signatures add up to gpgme_signers_count().
--
When invalid and valid signatures do not equal gpgme_signers_count() it
means that there was a bad passphrase during signing after the first
signer. This leaves the result.signatures from previous signers intact
which isn't correct since gpg will report:
gpg: number of one-pass packets does not match number of signature
packets
gpg: can't handle this ambiguous signature data
during verify. So when this happens append the valid signatures to the
.invalid_signers list with .reason set to GPG_ERR_GENERAL.
Diffstat (limited to '')
0 files changed, 0 insertions, 0 deletions