diff options
author | Werner Koch <[email protected]> | 2017-07-12 16:30:49 +0000 |
---|---|---|
committer | Werner Koch <[email protected]> | 2017-07-12 16:30:49 +0000 |
commit | ad0c5ab4cd8d3a1b11b37dc137b75a67aa26da37 (patch) | |
tree | a8ee1156e1672fae12a5f1136c76705cc2d7449a /src/w32-io.c | |
parent | core: Return CANCELED and BAD_PASSPHRASE error code on decryption. (diff) | |
download | gpgme-ad0c5ab4cd8d3a1b11b37dc137b75a67aa26da37.tar.gz gpgme-ad0c5ab4cd8d3a1b11b37dc137b75a67aa26da37.zip |
core: Return NO_SECKEY error code on decryption
* src/decrypt.c (op_data_t): Add flag any_no_seckey.
(_gpgme_decrypt_status_handler): Consult that flag.
(_gpgme_decrypt_status_handler): Set that flag.
--
The NO_SECKEY is emitted instead of an "S ERROR pkdecrypt_failed" if
gpg knowns that a key has been encrypted to that key (cf. "S ENC_TO").
it is not fool proffof but in the majority of cases we can provide a
better error message than just DECRYPTION_FAILED.
GnuPG-bug-id: 3270
Signed-off-by: Werner Koch <[email protected]>
Diffstat (limited to 'src/w32-io.c')
0 files changed, 0 insertions, 0 deletions