sm: Allow decryption even if expired other keys are configured.
authorWerner Koch <wk@gnupg.org>
Tue, 26 Mar 2019 12:31:06 +0000 (13:31 +0100)
committerDaniel Kahn Gillmor <dkg@fifthhorseman.net>
Fri, 1 Jul 2022 16:06:43 +0000 (17:06 +0100)
commitc62a754a2e47b20cf97b0dad4e71d5b7c70448b0
tree749e464b42e50f3e2955ccdbcbeacf290694e7e5
parent79d6d224f00cb377d96e6f16d313f25c988e1980
sm: Allow decryption even if expired other keys are configured.

* sm/gpgsm.c (main): Add special handling for bad keys in decrypt
mode.
--

The problem can easily be tested by adding --encrypt-to EXPIRED_KEY to
a decryption command.  With that patch the errors are printed but
decryption continues and the process returns success unless other
errors occur.

GnuPG-bug-id: 4431
Signed-off-by: Werner Koch <wk@gnupg.org>
(cherry picked from commit 30972d21824264aef2088d30b4f2e5ce3aca889e)

Gbp-Pq: Topic from-2.2.15
Gbp-Pq: Name sm-Allow-decryption-even-if-expired-other-keys-are-config.patch
sm/gpgsm.c