It is sometimes useful to have a long-term storage key and a feature in the MUA
to add an additional public key encrypted packet to a message which was
encrypted to a temporary key.
Description
Description
Revisions and Commits
Revisions and Commits
rG GnuPG | |||
rGd528d0b06533 gpg: New commands --add-recipients and --change-recipients. | |||
rG1695cf267edf gpg: New option --show-only-session-key | |||
rM GPGME | |||
rMcd79fc39736f core: New encryption flags GPGME_ENCRYPT_ADD_RECP and _CHG_RECP. |
Related Objects
Related Objects
Event Timeline
Comment Actions
I now see I misunderstood the problem description.
The point is that a user has a message that is encrypted to key X. After
receiving the message, he wants to allow another key (say Y) to decrypt the
message by adding a symmetrically encrypted data packet to the message for Y,
i.e., without reencrypting the whole thing.