sm: Allow decryption even if expired other keys are configured.
authorWerner Koch <wk@gnupg.org>
Tue, 26 Mar 2019 12:31:06 +0000 (13:31 +0100)
committerWerner Koch <wk@gnupg.org>
Tue, 26 Mar 2019 12:31:06 +0000 (13:31 +0100)
commitaa58d2a49b3d416d9d6a0691a89f2bc8bc8649ad
treeb9e6e038bef37796e4e826b61a15e29d391a416d
parent3c7a1f3aea7f6e8137a93ef2166ff329688f5445
sm: Allow decryption even if expired other keys are configured.

* sm/gpgsm.c (main): Add special handling for bad keys in decrypt
mode.
--

The problem can easily be tested by adding --encrypt-to EXPIRED_KEY to
a decryption command.  With that patch the errors are printed but
decryption continues and the process returns success unless other
errors occur.

GnuPG-bug-id: 4431
Signed-off-by: Werner Koch <wk@gnupg.org>
sm/gpgsm.c