gpg,sm: Fix compliance checking for decryption.
authorWerner Koch <wk@gnupg.org>
Thu, 27 Jul 2017 11:56:38 +0000 (13:56 +0200)
committerWerner Koch <wk@gnupg.org>
Thu, 27 Jul 2017 11:56:38 +0000 (13:56 +0200)
commita0d0cbee7654ad7582400efaa92d493cd8e669e9
tree20bfb26e2b78690f8ab54dc115dd5543f3331618
parent6d95611d01b0768a365173668a878e903e3078e9
gpg,sm: Fix compliance checking for decryption.

* common/compliance.c (gnupg_pk_is_compliant): Remove the Elgamal
signing check.  We don't support Elgamal signing at all.
(gnupg_pk_is_allowed) <de-vs>: Revert encryption/decryption for RSA.
Check the curvenames for ECDH.
* g10/pubkey-enc.c (get_session_key): Print only a warning if the key
is not compliant.
* sm/decrypt.c (gpgsm_decrypt): Ditto.  Use the same string as in gpg
so that we have only one translation.
--

We always allow decryption and print only a note if the key was not
complaint at the encryption site.

GnuPG-bug-id: 3308
Signed-off-by: Werner Koch <wk@gnupg.org>
common/compliance.c
g10/pubkey-enc.c
sm/decrypt.c