|
|
|
@ -485,7 +485,7 @@ pgp_write_struct_pubkey_ptag(
|
|
|
|
|
const pgp_pubkey_t *key,
|
|
|
|
|
pgp_content_enum ptag)
|
|
|
|
|
{
|
|
|
|
|
return pgp_write_ptag(output, PGP_PTAG_CT_PUBLIC_KEY) &&
|
|
|
|
|
return pgp_write_ptag(output, ptag) &&
|
|
|
|
|
pgp_write_length(output, 1 + 4 + 1 + pubkey_length(key)) &&
|
|
|
|
|
write_pubkey_body(key, output);
|
|
|
|
|
}
|
|
|
|
@ -561,7 +561,7 @@ pgp_write_xfer_key(pgp_output_t *output,
|
|
|
|
|
/* matching selected user id */
|
|
|
|
|
if(uidsigp->uid == uididx)
|
|
|
|
|
{
|
|
|
|
|
if (!pgp_write(output, &uidsigp->packet.raw,
|
|
|
|
|
if (!pgp_write(output, uidsigp->packet.raw,
|
|
|
|
|
(unsigned)uidsigp->packet.length)) {
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
@ -598,7 +598,7 @@ pgp_write_xfer_key(pgp_output_t *output,
|
|
|
|
|
/* matching selected subkey */
|
|
|
|
|
if(subkeysigp->subkey == subkeyidx)
|
|
|
|
|
{
|
|
|
|
|
if (!pgp_write(output, &subkeysigp->packet.raw,
|
|
|
|
|
if (!pgp_write(output, subkeysigp->packet.raw,
|
|
|
|
|
(unsigned)subkeysigp->packet.length)) {
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|