summaryrefslogtreecommitdiff
path: root/src/leap/bitmask/keymanager/errors.py
diff options
context:
space:
mode:
authorTulio Casagrande <tcasagra@thoughtworks.com>2017-01-24 18:18:03 -0200
committerRuben Pollan <meskio@sindominio.net>2017-01-31 09:44:27 +0100
commit6dd47f1d5df4f12c867062c47a40358ef7cb6a7c (patch)
tree47ea8b919aacbc6e296d5f87d05b95129c8a9502 /src/leap/bitmask/keymanager/errors.py
parent14240342ee1de35335d75ab0bbfb4822e79eaa8a (diff)
Repeat decryption if signed with attached key
Previously, if an email was signed with a new key, that was also sent as an attachment, the verification of the signature could fail if the only available source of this new key is the attachment ifself. I changed to extract the attachment before adding the leap header, which is responsible for the signed/encrypted flags. Also, if the previous verification failed and a new key was successful imported, it's going to decrypt the original email again, just to update the verify status. Signed-off-by: Ruben Pollan <meskio@sindominio.net>
Diffstat (limited to 'src/leap/bitmask/keymanager/errors.py')
0 files changed, 0 insertions, 0 deletions