sm: Allow decryption even if expired other keys are configured.
authorWerner Koch <wk@gnupg.org>
Tue, 26 Mar 2019 12:31:06 +0000 (13:31 +0100)
committerDaniel Kahn Gillmor <dkg@fifthhorseman.net>
Thu, 22 Aug 2019 19:11:59 +0000 (20:11 +0100)
commit495c91771e450bc88da8a9352bcf4537f32973f2
tree30249635da0e0db1ea2af1a65d0fed974310bb46
parent32798243e6ca46b56201e38c5a0cac4414ded04b
sm: Allow decryption even if expired other keys are configured.

* sm/gpgsm.c (main): Add special handling for bad keys in decrypt
mode.
--

The problem can easily be tested by adding --encrypt-to EXPIRED_KEY to
a decryption command.  With that patch the errors are printed but
decryption continues and the process returns success unless other
errors occur.

GnuPG-bug-id: 4431
Signed-off-by: Werner Koch <wk@gnupg.org>
(cherry picked from commit 30972d21824264aef2088d30b4f2e5ce3aca889e)

Gbp-Pq: Topic from-2.2.15
Gbp-Pq: Name sm-Allow-decryption-even-if-expired-other-keys-are-config.patch
sm/gpgsm.c