diff options
author | Tulio Casagrande <tcasagra@thoughtworks.com> | 2017-01-24 18:18:03 -0200 |
---|---|---|
committer | Ruben Pollan <meskio@sindominio.net> | 2017-01-31 09:44:27 +0100 |
commit | 6dd47f1d5df4f12c867062c47a40358ef7cb6a7c (patch) | |
tree | 47ea8b919aacbc6e296d5f87d05b95129c8a9502 /pkg/pyinst/build.mk | |
parent | 14240342ee1de35335d75ab0bbfb4822e79eaa8a (diff) |
Repeat decryption if signed with attached key
Previously, if an email was signed with a new key, that was also sent
as an attachment, the verification of the signature could fail if the
only available source of this new key is the attachment ifself.
I changed to extract the attachment before adding the leap header,
which is responsible for the signed/encrypted flags. Also, if the
previous verification failed and a new key was successful imported,
it's going to decrypt the original email again, just to update the
verify status.
Signed-off-by: Ruben Pollan <meskio@sindominio.net>
Diffstat (limited to 'pkg/pyinst/build.mk')
0 files changed, 0 insertions, 0 deletions