Skip to content

Conversation

@vanitasvitae
Copy link
Contributor

Messages encrypted with only a single SKESK can optionally make use of the "direct-S2K" method (see https://www.rfc-editor.org/rfc/rfc9580.html#section-5.3.1-4).

During the v6 rework, I apparently made a slight mistake, causing all messages to not use the direct-s2k method anymore by always passing in a non-null session key to the SKESK generation method. Previously, direct-s2k would result in null being passed.

This patch adds a check that conditionally passes null again, restoring the previous behavior.

Fixes #2208

@dghgit
Copy link
Contributor

dghgit commented Dec 15, 2025

Thanks for the patch. Merged!

@dghgit dghgit closed this Dec 15, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Change in encrypted cipher (after 1.80) !

2 participants