Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Conversation

@gahr
Copy link
Member

@gahr gahr commented Oct 7, 2025

When using classic S/MIME (i.e., via OpenSSL commands instead of using GPGMe), NeoMutt caches the private key passphrase. However, it fails to flush the cache on a failure to sign, which presumably comes from the user entering a wrong passphrase.

So, upon entering a wrong passphrase, the user currently has to wait for the cache to expire (smime_timeout) before trying again.

This PR fixes it, by immediately flusing the cached passphrase upon failure to sign.

When using classic S/MIME (i.e., via OpenSSL commands instead of using GPGMe), NeoMutt caches the private key passphrase.
However, it fails to flush the cache on a failure to sign, which presumably comes from the user entering a wrong passphrase.

So, upon entering a wrong passphrase, the user currently has to wait for the cache to expire (`smime_timeout`) before trying again.

This PR fixes it, by immediately flusing the cached passphrase upon failure to sign.
@gahr gahr requested a review from flatcap October 7, 2025 12:19
@gahr gahr self-assigned this Oct 7, 2025
@flatcap flatcap merged commit 6bdf4ba into main Oct 7, 2025
13 checks passed
@flatcap flatcap deleted the dont-store-wront-smime-pass branch October 7, 2025 14:56
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants