Closed jpo234 closed 4 years ago
I'm not sure about the empty session key. rnp --list-packets
shows a zero-length key for gpg encrypted messages, too. They actual problem might be in rnp --list-packets
.
Or I'm mistaken and the following part from RFC4880 applies:
If the encrypted session key is not present (which can be detected on the basis of packet length and S2K specifier size), then the S2K algorithm applied to the passphrase produces the session key for decrypting the file, using the symmetric cipher algorithm from the Symmetric-Key Encrypted Session Key packet.
Sorry for the inconvenience. When using two different keys, rnp correctly uses and encrypts a session key.
Description
When encrypting a message with rnp_op_encrypt_execute the session key is empty.
Steps to Reproduce
Expected Behavior
The encrypted session key must not be empty and should vary from run to run
Actual Behavior
The encrypted session key is always empty.
enc_main.zip