To reproduce encrypt a file with --disable-mdc and then decrypt it with GPGME's run-decrypt test.
For files that are encrypted only to your own (sec key available) key it will return: Decryption Failed.
For files that are also encrypted to someone elses key it will return: No seckey
Especially the NO_SECKEY is a bug and confusing. With the current prominence of MDC I would give this high priority.
Related: T3714
> gpg --decrypt /tmp/test.txt.gpg > /dev/null || ./run-decrypt --status --verbose /tmp/test.txt.gpg gpg: NOTE: THIS IS A DEVELOPMENT VERSION! gpg: It is only intended for test purposes and should NOT be gpg: used in a production environment or with production keys! gpg: encrypted with 3072-bit RSA key, ID 8CC999BDAA45C71F, created 2015-12-08 "Andre Heinecke <aheinecke@intevation.de>" gpg: WARNING: message was not integrity protected status_cb: ENC_TO 8CC999BDAA45C71F 1 0 status_cb: KEY_CONSIDERED 94A5C9A03C2FE5CA3B095D8E1FDF723CF462B6B1 0 status_cb: KEY_CONSIDERED 94A5C9A03C2FE5CA3B095D8E1FDF723CF462B6B1 0 status_cb: DECRYPTION_KEY E18955A9626007093BDC2ED28CC999BDAA45C71F 94A5C9A03C2FE5CA3B095D8E1FDF723CF462B6B1 u status_cb: KEY_CONSIDERED 94A5C9A03C2FE5CA3B095D8E1FDF723CF462B6B1 0 status_cb: BEGIN_DECRYPTION status_cb: DECRYPTION_COMPLIANCE_MODE 23 status_cb: DECRYPTION_INFO 0 9 status_cb: PLAINTEXT 62 1526381790 test.txt status_cb: PLAINTEXT_LENGTH 2735904 status_cb: DECRYPTION_FAILED status_cb: END_DECRYPTION status_cb: run-decrypt: decrypt failed: Decryption failed > gpg --disable-mdc -r test2@testkolab.intevation.de -o /tmp/test2.txt.gpg -e /tmp/test.txt > gpg --decrypt /tmp/test2.txt.gpg > /dev/null || ./run-decrypt --status --verbose /tmp/test2.txt.gpg gpg: NOTE: THIS IS A DEVELOPMENT VERSION! gpg: It is only intended for test purposes and should NOT be gpg: used in a production environment or with production keys! gpg: encrypted with 2048-bit RSA key, ID F973DE938392D6A4, created 2017-01-12 "Testuser 2 <test2@testkolab.intevation.de>" gpg: encrypted with 3072-bit RSA key, ID 8CC999BDAA45C71F, created 2015-12-08 "Andre Heinecke <aheinecke@intevation.de>" gpg: WARNING: message was not integrity protected status_cb: ENC_TO F973DE938392D6A4 1 0 status_cb: ENC_TO 8CC999BDAA45C71F 1 0 status_cb: KEY_CONSIDERED 94A5C9A03C2FE5CA3B095D8E1FDF723CF462B6B1 0 status_cb: KEY_CONSIDERED 94A5C9A03C2FE5CA3B095D8E1FDF723CF462B6B1 0 status_cb: DECRYPTION_KEY E18955A9626007093BDC2ED28CC999BDAA45C71F 94A5C9A03C2FE5CA3B095D8E1FDF723CF462B6B1 u status_cb: KEY_CONSIDERED 7CF58740B82E0CCEE43BD6AA30D84817E01C25A1 0 status_cb: NO_SECKEY F973DE938392D6A4 status_cb: KEY_CONSIDERED 94A5C9A03C2FE5CA3B095D8E1FDF723CF462B6B1 0 status_cb: BEGIN_DECRYPTION status_cb: DECRYPTION_COMPLIANCE_MODE 23 status_cb: DECRYPTION_INFO 0 9 status_cb: PLAINTEXT 62 1526382267 test.txt status_cb: PLAINTEXT_LENGTH 2735904 status_cb: DECRYPTION_FAILED status_cb: END_DECRYPTION status_cb: run-decrypt: decrypt failed: No secret key