diff options
author | Werner Koch <wk@gnupg.org> | 2019-03-18 13:07:14 +0100 |
---|---|---|
committer | Werner Koch <wk@gnupg.org> | 2019-03-18 13:07:14 +0100 |
commit | 5205512fc092c53c0a52c8379ef2a129ce6e58a9 (patch) | |
tree | 3253bbb308ac47b1c4b6654efc5eb77259002aa9 /g10/main.h | |
parent | gpg: Avoid importing secret keys if the keyblock is not valid. (diff) | |
download | gnupg2-5205512fc092c53c0a52c8379ef2a129ce6e58a9.tar.xz gnupg2-5205512fc092c53c0a52c8379ef2a129ce6e58a9.zip |
gpg: Allow import of PGP desktop exported secret keys.
* g10/import.c (NODE_TRANSFER_SECKEY): New.
(import): Add attic kludge.
(transfer_secret_keys): Add arg only_marked.
(resync_sec_with_pub_keyblock): Return removed seckeys via new arg
r_removedsecs.
(import_secret_one): New arg r_secattic. Change to take ownership of
arg keyblock. Implement extra secret key import logic. Factor some
code out to ...
(do_transfer): New.
(import_matching_seckeys): New.
--
The PGP desktops exported secret keys are really stupid. And they
even a have kind of exception in rfc4880 which does not rule that
out (section 11.2):
[...] Implementations SHOULD include self-signatures on any user
IDs and subkeys, as this allows for a complete public key to be
automatically extracted from the transferable secret key.
Implementations MAY choose to omit the self-signatures, especially
if a transferable public key accompanies the transferable secret
key.
Now if they would only put the public key before the secret
key. Anyway we now have a workaround for that ugliness.
GnuPG-bug-id: 4392
Signed-off-by: Werner Koch <wk@gnupg.org>
Diffstat (limited to 'g10/main.h')
-rw-r--r-- | g10/main.h | 3 |
1 files changed, 2 insertions, 1 deletions
diff --git a/g10/main.h b/g10/main.h index 867f6975b..34a932b16 100644 --- a/g10/main.h +++ b/g10/main.h @@ -394,7 +394,8 @@ struct impex_filter_parm_s const char *impex_filter_getval (void *cookie, const char *propname); gpg_error_t transfer_secret_keys (ctrl_t ctrl, struct import_stats_s *stats, - kbnode_t sec_keyblock, int batch, int force); + kbnode_t sec_keyblock, int batch, int force, + int only_marked); int collapse_uids( KBNODE *keyblock ); |