summaryrefslogtreecommitdiffstats
path: root/g10/main.h
diff options
context:
space:
mode:
authorWerner Koch <wk@gnupg.org>2019-03-18 13:07:14 +0100
committerWerner Koch <wk@gnupg.org>2019-03-18 13:07:14 +0100
commit5205512fc092c53c0a52c8379ef2a129ce6e58a9 (patch)
tree3253bbb308ac47b1c4b6654efc5eb77259002aa9 /g10/main.h
parentgpg: Avoid importing secret keys if the keyblock is not valid. (diff)
downloadgnupg2-5205512fc092c53c0a52c8379ef2a129ce6e58a9.tar.xz
gnupg2-5205512fc092c53c0a52c8379ef2a129ce6e58a9.zip
gpg: Allow import of PGP desktop exported secret keys.
* g10/import.c (NODE_TRANSFER_SECKEY): New. (import): Add attic kludge. (transfer_secret_keys): Add arg only_marked. (resync_sec_with_pub_keyblock): Return removed seckeys via new arg r_removedsecs. (import_secret_one): New arg r_secattic. Change to take ownership of arg keyblock. Implement extra secret key import logic. Factor some code out to ... (do_transfer): New. (import_matching_seckeys): New. -- The PGP desktops exported secret keys are really stupid. And they even a have kind of exception in rfc4880 which does not rule that out (section 11.2): [...] Implementations SHOULD include self-signatures on any user IDs and subkeys, as this allows for a complete public key to be automatically extracted from the transferable secret key. Implementations MAY choose to omit the self-signatures, especially if a transferable public key accompanies the transferable secret key. Now if they would only put the public key before the secret key. Anyway we now have a workaround for that ugliness. GnuPG-bug-id: 4392 Signed-off-by: Werner Koch <wk@gnupg.org>
Diffstat (limited to 'g10/main.h')
-rw-r--r--g10/main.h3
1 files changed, 2 insertions, 1 deletions
diff --git a/g10/main.h b/g10/main.h
index 867f6975b..34a932b16 100644
--- a/g10/main.h
+++ b/g10/main.h
@@ -394,7 +394,8 @@ struct impex_filter_parm_s
const char *impex_filter_getval (void *cookie, const char *propname);
gpg_error_t transfer_secret_keys (ctrl_t ctrl, struct import_stats_s *stats,
- kbnode_t sec_keyblock, int batch, int force);
+ kbnode_t sec_keyblock, int batch, int force,
+ int only_marked);
int collapse_uids( KBNODE *keyblock );