Package: gpgsm Version: 2.4.7-21+deb13u1+b1 Severity: normal Dear Maintainer,
The following situation occurs: $ gpgsm --list-chain --with-validation ... Do you ultimately trust "CN=HARICA Client RSA Root CA 2021 O=Hellenic Academic and Research Institutions CA C=GR" to correctly certify user certificates? Yes Cancel No [ycn]? y Please verify that the certificate identified as: "CN=HARICA Client RSA Root CA 2021 O=Hellenic Academic and Research Institutions CA C=GR" has the fingerprint: 46:C6:90:0A:77:3A:B6:BC:F4:65:AD:AC:FC:E3:F7:07:00:6E:DE:6E Correct Cancel Wrong [ccw]? c ... There are 2 identical [c], I'm not sure if this intended as correct or cancel. With pinentry-curses you can choose by moving your marking, but on pinentry-tty it's not possible. Edit the file .gnupg/trustlist.txt by hand resolves the problem, but it's not the point, to use gpgsm. -- System Information: Debian Release: 13.3 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 6.12.63+deb13-amd64 (SMP w/20 CPU threads; PREEMPT) Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US:en Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled Versions of packages gpgsm depends on: ii gpgconf 2.4.7-21+deb13u1+b1 ii libassuan9 3.0.2-2 ii libc6 2.41-12+deb13u1 ii libgcrypt20 1.11.0-7 ii libgpg-error0 1.51-4 ii libksba8 1.6.7-2+b1 ii libnpth0t64 1.8-3 ii libreadline8t64 8.2-6 Versions of packages gpgsm recommends: ii gnupg 2.4.7-21+deb13u1 gpgsm suggests no packages. -- no debconf information

