Bug#516922: cryptmount: couldn't find libgcrypt cipher blowfish

2009-02-24 Thread Werner Koch
On Tue, 24 Feb 2009 15:09, agustin.mar...@hispalinux.es said: Last libgcrypt11 seems to have added a problem regarding cryptmount. Since I Cryptmount does not properly initialize Libgcrypt. From the NEWS file: Noteworthy changes in version 1.4.3 (2008-09-18)

Bug#514623: Cannot use revoked subkeys for decription using a smart card

2009-02-10 Thread Werner Koch
On Tue, 10 Feb 2009 00:04, enr...@debian.org said: revocation. Here's a simple use case for revocation without compromission: I revoke a 1024b subkey because I've switched to a 4096b As well as a bunch of other reasons. Gpg even offers some standard choices: 0 = No reason specified 1 =

Bug#514623: Cannot use revoked subkeys for decription using a smart card

2009-02-10 Thread Werner Koch
See also: https://bugs.g10code.com/gnupg/issue1000 -- Die Gedanken sind frei. Auschnahme regelt ein Bundeschgesetz. -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org

Bug#495473: A GnuTLS problem?

2009-01-26 Thread Werner Koch
On Sat, 24 Jan 2009 17:49, ametz...@downhill.at.eu.org said: GCRYPT_VERSION is expanded at libgwenhywfar build time to the version FWIW, I suggest to use this in configure.ac: NEED_LIBGCRYPT_API=1 NEED_LIBGCRYPT_VERSION=1.4.0 # other configure stuff

Bug#505286: gnupg: gpg-agent manpage is wrong

2008-11-12 Thread Werner Koch
Hi! The man pages are generated from Texinfo source and we could fix that in the converter tool (yat2m). I installed a far easier fix though by using $(foo) instead of `foo`. This is in the gnupg svn trunk rev 4871. NOte that the man pages from GnuPG-1 are source copied from GnuPG-2

Bug#500718: gnupg: symmetric option not compatible with output option

2008-10-01 Thread Werner Koch
Hi! Sorry, I can't replicate that with a stock 1.4.9. Neither with gpg nor with gpg-zip. Shalom-Salam, Werner -- Linux-Kongress 2008 + Hamburg + October 7-10 + www.linux-kongress.org Die Gedanken sind frei. Auschnahme regelt ein Bundeschgesetz. -- To UNSUBSCRIBE, email to

Bug#499542: libgcrypt11_1.4.3-1(sparc/experimental): FTBFS: test failure

2008-09-20 Thread Werner Koch
On Sat, 20 Sep 2008 09:12, [EMAIL PROTECTED] said: Program received signal SIGBUS, Bus error. 0xf7f00af8 in finalize (hd=0x2cec8) at hmac256.c:279 279 X(0); Interesting: #ifdef WORDS_BIGENDIAN #define X(a) do { *(u32*)p = hd-h##a ; p += 4; } while(0) #else /* little endian */

Bug#499542: libgcrypt11_1.4.3-1(sparc/experimental): FTBFS: test failure

2008-09-20 Thread Werner Koch
On Sat, 20 Sep 2008 13:27, [EMAIL PROTECTED] said: libgcrypt selftest: digest HMAC-SHA256 (8): does not match in second implementation (data-28 key-4) Well, there is definitley still a bug in the hmac256 tool. I can't look at it today anymore, sorry. My only big endian box is a PowerPC64

Bug#499542: libgcrypt11_1.4.3-1(sparc/experimental): FTBFS: test failure

2008-09-19 Thread Werner Koch
On Fri, 19 Sep 2008 17:34, [EMAIL PROTECTED] said: | /bin/sh: line 4: 16160 Bus error ${dir}$tst | FAIL: basic We have a similar report in the bug tracker but I am currently missing a test machine. IIRC the problem is in the AES code. You can do cd tests ./basic --verbose

Bug#499542: libgcrypt11_1.4.3-1(sparc/experimental): FTBFS: test failure

2008-09-19 Thread Werner Koch
On Fri, 19 Sep 2008 18:59, [EMAIL PROTECTED] said: Completed additional public key checks. Bus error Well, the new selftest code (3DES or the driver code). A backtrace might help but a shell acount on a sparc box would be better. Is it possible to get an account for Marcus? Salam-Shalom,

Bug#494194: gnupg: Choice of algorithms for --symmetric is obscure

2008-08-08 Thread Werner Koch
Hi! You are mixing up two things: 1. The key derivation function, commonly abbreviated as KDF but in OpenPGP as S2K (String to Key). 2. The encrytion algorithm. The first is use to derive a key from a passphrase and the second to do the actual encryption. The goal of the key derivation is

Bug#494040: gpgv: Unintelligible (behaviour and) error messages.

2008-08-07 Thread Werner Koch
On Wed, 6 Aug 2008 22:59, [EMAIL PROTECTED] said: | [EMAIL PROTECTED]:~$ gpgv /tmp/blender_2.46+dfsg-3.dsc | gpgv: keyblock resource `/home/kibi/.gnupg/trustedkeys.gpg': general error Do you mean the error message which probably should be file not found? | gpgv: Signature made Mon Jul 14

Bug#494040: gpgv: Unintelligible (behaviour and) error messages.

2008-08-07 Thread Werner Koch
On Thu, 7 Aug 2008 09:32, [EMAIL PROTECTED] said: I don't understand why, when the point is about verifying signatures (as stated in the whatis entry). Why does it have to assume they are trustworthy and then to use its very own keyring? I'd assume as a first You need to know whether the key

Bug#343434: gnupg: FTBFS (ppc64): Please use '--disable-asm' on ppc64

2008-07-30 Thread Werner Koch
Hi, this bug is now also tracked as https://bugs.g10code.com/gnupg/issue942 I should have an account for such a box however I doubt that I can debug it within the next weeks. Salam-Shalom, Werner -- Die Gedanken sind frei. Auschnahme regelt ein Bundeschgesetz. -- To

Bug#489225: gnupg says KEYEXPIRED even when only other subkeys are expired

2008-07-05 Thread Werner Koch
On Fri, 4 Jul 2008 14:53, [EMAIL PROTECTED] said: When I have a signature made by an expired key, will I get {GOODSIG,EXPKEYSIG}, or {BADSIG,EXPKEYSIG}? Only one them: if( !rc || gpg_err_code (rc) == GPG_ERR_BAD_SIGNATURE ) { KBNODE un, keyblock; int count=0, statno;

Bug#489225: gnupg says KEYEXPIRED even when only other subkeys are expired

2008-07-04 Thread Werner Koch
On Fri, 4 Jul 2008 09:35, [EMAIL PROTECTED] said: When verifying a signature by a key that has subkeys, some of which are expired, GnuPG always prints KEYEXPIRED to the status-fd. It does this even if not the subkey that signed the message expired. That is due to the way we generate this

Bug#225888: [Pkg-gnupg-maint] Bug#225888: closed by Daniel Leidert [EMAIL PROTECTED] (gnupg: slight improvement of docs regarding IDEA)

2008-06-13 Thread Werner Koch
Hi! Let me state it again: There is no IDEA support for GnuPG - there has never been any support - the reason to write GnuPG was due to the IDEA and RSA patents. Even after 2010 (or whatever the patent stuff says) there will be no IDEA support - IDEA is OBSOLETE, it is an old cipher algorithm

Bug#452118: New upstream version 1.4.9 with a fix for CVE-2008-1530

2008-04-08 Thread Werner Koch
On Tue, 8 Apr 2008 15:06, [EMAIL PROTECTED] said: I am going to raise the severity of this bug because version 1.4.9 is out with a fix for CVE-2008-1530: Nope. That bug is 1.4.8 specific. There is no such bug in 1.4.7 or older. Shalom-Salam, Werner -- Die Gedanken sind frei.

Bug#448775: Uses too much entropy (Debian Bug #343085)

2008-03-13 Thread Werner Koch
On Thu, 13 Mar 2008 09:32, [EMAIL PROTECTED] said: I don't think the seed file approach works for a forking daemon like Exim because you cannot guaranteed an undisturbed read/modify/write cycle on the seed file. Locking is out of the question, too, because It depends on how much entropy you

Bug#448775: Uses too much entropy (Debian Bug #343085)

2008-03-11 Thread Werner Koch
On Sat, 8 Mar 2008 09:48, [EMAIL PROTECTED] said: but it looks like the mere presence of gcry_control (GCRYCTL_SET_RANDOM_SEED_FILE,filename) causes the crashes. That should be easy to debug: void _gcry_set_random_seed_file( const char *name ) { if (seed_file_name) BUG ();

Bug#461065: make --debug-all print IP of keyserver instead of hostname

2008-02-25 Thread Werner Koch
On Wed, 16 Jan 2008 13:05, [EMAIL PROTECTED] said: For debugging purposes, it would make sense to have gnupg log the IP instead of the hostname it uses as keyserver in the following line: Pass the debug option to the keyserver help: $ gpg --keyserver-options debug=1 -v --refresh-key

Bug#463358: dirmngr: ldap_init() implicitly converted to pointer

2008-02-01 Thread Werner Koch
On Thu, 31 Jan 2008 16:28, [EMAIL PROTECTED] said: now. ldap.h used to globally expose these functions. ldap.h has begun deprecating old functions, requiring packages to explicitly define LDAP_DEPRECATED to use them. This seems to be a pretty common practice. .. for OpenLDAP. We had quite a

Bug#448775: Uses too much entropy (Debian Bug #343085)

2008-01-31 Thread Werner Koch
On Wed, 30 Jan 2008 19:20, [EMAIL PROTECTED] said: Any obvious breakage? Exim does not use any threading. I have not included an gcry_check_version(NULL) since I thought gcry_control() would fail as reliably as gcry_check_version() would, if gcrypt was Better insert a gcry_check_version

Bug#463358: dirmngr: ldap_init() implicitly converted to pointer

2008-01-31 Thread Werner Koch
On Thu, 31 Jan 2008 06:21, [EMAIL PROTECTED] said: Function `ldap_init' implicitly converted to pointer at dirmngr_ldap.c:520 Huh? ldap.h is included and thus I can see no such problem. The libldap API has been updated and many functions used by the ldap plugin are now deprecated. This

Bug#461980: (forw) Bug#461980: gnupg-agent: manpage typos

2008-01-29 Thread Werner Koch
On Tue, 29 Jan 2008 15:22, [EMAIL PROTECTED] said: |Ignore requests to change the current @code{tty} or X |window system @code{DISPLAY} variable, respectively. This is useful Right, I got the same hint off-list. Shalom-Salam, Werner -- Die Gedanken sind frei. Auschnahme regelt ein

Bug#461980: (forw) Bug#461980: gnupg-agent: manpage typos

2008-01-29 Thread Werner Koch
On Mon, 28 Jan 2008 15:27, [EMAIL PROTECTED] said: All applied. In ./doc/DETAILS, I'm not sure: | The default is the standard gpg Web of Trust model respective | the standard X.509 model. The defined values are Is this supposed to mean: | The default is the standard

Bug#461980: (forw) Bug#461980: gnupg-agent: manpage typos

2008-01-27 Thread Werner Koch
On Sun, 27 Jan 2008 23:55, [EMAIL PROTECTED] said: Including a new patch against the source files, with some additional fixes (manly, be possible). Also some of the original fixes applied to additional parts. Thanks. I applied it except for: --- gnupg2-2.0.8/doc/qualified.txt +++

Bug#343085: [patch] Uses too much entropy (Debian Bug #343085)

2008-01-21 Thread Werner Koch
On Sun, 20 Jan 2008 18:10, [EMAIL PROTECTED] said: I gues it is not a god idea to share this seed file between multiple hosts accessing a central mailq queue. Is this this assumption correct? Yes. You better avoid that if possible. Shalom-Salam, Werner -- Die Gedanken sind frei.

Bug#448775: Uses too much entropy (Debian Bug #343085)

2008-01-08 Thread Werner Koch
On Fri, 4 Jan 2008 17:01, [EMAIL PROTECTED] said: Right. So what should applications like exim do exactly? Is there My suggestion is: int main () { int rc; #ifdef WE_USE_PTHREADS rc = gcry_control (GCRYCTL_SET_THREAD_CBS, gcry_threads_pthread); if (rc) error

Bug#448775: Uses too much entropy (Debian Bug #343085)

2008-01-08 Thread Werner Koch
On Fri, 4 Jan 2008 16:33, [EMAIL PROTECTED] said: plugin for pidgin: if another plugin (say, Jabber) uses gnutls, which initializes libgcrypt, and OTR also initializes libgcrypt (perhaps with custom allocation functions), you can easily cause a crash. At least we have a way to test whether

Bug#343085: Bug#448775: Uses too much entropy (Debian Bug #343085)

2008-01-08 Thread Werner Koch
On Sat, 5 Jan 2008 14:17, [EMAIL PROTECTED] said: gnutls-serv reads 3000 times 120 bytes from /dev/urandom, yes, 360 kilobytes! Run gcry_control (GCRYCTL_DUMP_RANDOM_STATS); to get statistics about libgcrypt's RNG. Shalom-Salam, Werner -- Die Gedanken sind frei. Auschnahme

Bug#343085: Bug#448775: Uses too much entropy (Debian Bug #343085)

2008-01-08 Thread Werner Koch
On Tue, 8 Jan 2008 11:03, [EMAIL PROTECTED] said: random usage: poolsize=600 mixed=621 polls=3000/117 added=3588/370308 outmix=3 getlvl1=3/136 getlvl2=0/0 - The random pool has been mixed 621 times. - The slow random poll function has been called 3000 times to fill and update

Bug#343085: [patch] Re: Bug#448775: Uses too much entropy (Debian Bug #343085)

2008-01-08 Thread Werner Koch
On Tue, 8 Jan 2008 11:59, [EMAIL PROTECTED] said: Anyway there 3000 calls to /dev/urandom are far too many for an initial pool filling. I need to check this. Found it. The bug was introduced with libgcrypt 1.3.1. Here is a patch: 2008-01-08 Werner Koch [EMAIL PROTECTED

Bug#343085: [patch] Re: Bug#448775: Uses too much entropy (Debian Bug #343085)

2008-01-08 Thread Werner Koch
On Tue, 8 Jan 2008 17:16, [EMAIL PROTECTED] said: Still, 3kb per TLS connection is excessive, so I still recommend exim to set a libgcrypt seeds file to solve the problem. Yes, definitely. Salam-Shalom, Werner -- Die Gedanken sind frei. Auschnahme regelt ein Bundeschgesetz. --

Bug#448775: Uses too much entropy (Debian Bug #343085)

2008-01-04 Thread Werner Koch
On Fri, 4 Jan 2008 13:35, [EMAIL PROTECTED] said: I think the daemon is there to help libgcrypt maintain randomness state between invocations of applications that use randomness from libgcrypt. Right. And it is still flagged as experimental because it lacks any fair distribution of random to

Bug#343085: Bug#448775: Uses too much entropy (Debian Bug #343085)

2008-01-04 Thread Werner Koch
On Fri, 4 Jan 2008 13:41, [EMAIL PROTECTED] said: We could consider doing something like that in gnutls too, to help applications avoid having to do it themselves. However, the documentation on UPDATE_SEED seems somewhat discouraging. I'm not sure Let's say this description is very

Bug#448775: Uses too much entropy (Debian Bug #343085)

2008-01-04 Thread Werner Koch
On Fri, 4 Jan 2008 15:16, [EMAIL PROTECTED] said: int gnutls_set_random_seed_file (const char *filename); I don't think that is a good idea. gnutls does not provide the required thread hook function for libgcrypt and thus the appliaction needs to do this. If you want these functions you

Bug#448775: Uses too much entropy (Debian Bug #343085)

2008-01-04 Thread Werner Koch
On Fri, 4 Jan 2008 15:39, [EMAIL PROTECTED] said: You mean the problem where one client requests a lot of randomness, which would hurt the randomness received by other clients? Right. Though the IPC mechanims allows for several concurrent requests, the hear of the RNG serializes everything.

Bug#445328: gnupg: man page formatting and other typos

2007-12-12 Thread Werner Koch
On Wed, 12 Dec 2007 13:37, [EMAIL PROTECTED] said: -signed stuff from stdin, use -'-' - as the second filename. For +signed stuff from stdin, use '-' as the second filename. For I fixed this too by using the yat2m tool from gnupg-2 where this formatting problem has been fixed. 1.4.8 will

Bug#445328: gnupg: man page formatting and other typos

2007-12-12 Thread Werner Koch
On Wed, 12 Dec 2007 13:37, [EMAIL PROTECTED] said: I also took the liberty of fixing a few obvious typos by running aspell on the man page, e.g. RETURN VAUE should be RETURN VALUE. See the patch for details. Thanks. I applied the typo fixes to gpg.texi. Note that changing the man page is

Bug#428635: Cannot create dsa2 keys

2007-12-11 Thread Werner Koch
On Tue, 11 Dec 2007 20:03, [EMAIL PROTECTED] said: Upgrading to libgcrypt11 1.4.0 generates a different error. However I think this one is really a gnupg2 error, not a gcrypt one. Alright. Thanks for reminding that I need to add support for DSA-2. Will do this tomorrow so that we can get

Bug#453122: /usr/bin/gpg is suid root - unnecessary risk for rights elevation

2007-11-28 Thread Werner Koch
On Tue, 27 Nov 2007 15:57, [EMAIL PROTECTED] said: Severity: serious I doubt that this is a serious problem. The option to install gpg suid(root) has been there for nearly a decade. gpg is diligent to drop suid as soon as possible (after mlock and even before parsing options) and even checks

Bug#451438: mingw32: cannot find -lgcc_s

2007-11-21 Thread Werner Koch
On Sat, 17 Nov 2007 00:24, [EMAIL PROTECTED] said: Were these problems with the compiler being more strict, or with it being more buggy? They are both inconvenient but they aren't I can't remember in detail. It was more a problem of changed libraries. Actually nits but changing this in

Bug#412408: Is invoking exit(2) in a library the right thing to do?

2007-11-18 Thread Werner Koch
On Sun, 18 Nov 2007 12:10, [EMAIL PROTECTED] said: Indeed. And you should call abort() instead of exit() in the library. I will consider this. Shalom-Salam, Werner -- Die Gedanken sind frei. Auschnahme regelt ein Bundeschgesetz. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with

Bug#451438: mingw32: cannot find -lgcc_s

2007-11-16 Thread Werner Koch
On Fri, 16 Nov 2007 14:09, [EMAIL PROTECTED] said: Oh. I wasn't aware of an active regression here, but yes, that indeed seems to be a known issue with 'upgrading' from 3.4 to current 4.x ... I had already some complaints from folks (cross-)building gnupg and related stuff with the latest

Bug#412408: Is invoking exit(2) in a library the right thing to do?

2007-11-15 Thread Werner Koch
On Thu, 15 Nov 2007 10:55, [EMAIL PROTECTED] said: The only way forward I can see from here is to refer the issue to the Technical Committee. If nobody objects or wants to do it themselves I'll write up a summary when I have some free time. I still do not understand the problem. Do you say

Bug#412408: Is invoking exit(2) in a library the right thing to do?

2007-11-15 Thread Werner Koch
On Thu, 15 Nov 2007 13:19, [EMAIL PROTECTED] said: M null c 1 3 which creates /dev/null, but does not contain a line to create /dev/random. It also contains the comment: So the fix should be pretty easy: M random c 1 8 M urandom c 1 9 Shalom-Salam, Werner p.s. Does

Bug#412408: Is invoking exit(2) in a library the right thing to do?

2007-11-15 Thread Werner Koch
On Thu, 15 Nov 2007 15:32, [EMAIL PROTECTED] said: I oppose this solution, the only devices which *must* be created statically (and are available in the standard initramfs indeed) are null and console. With this reasoning you may also change Linux to allow /dev/random to be a module. It was

Bug#450670: Please add a watch file.

2007-11-12 Thread Werner Koch
On Sat, 10 Nov 2007 08:08, [EMAIL PROTECTED] said: On Fri, Nov 09, 2007 at 05:05:28PM +0100, Werner Koch wrote: Please add a watch file for gnupg. I have attached one, which may be useful for you. The attached one does not work becuase it will fire for gnupg 1.x and gnupg 2.0 updates

Bug#450670: Please add a watch file.

2007-11-09 Thread Werner Koch
On Fri, 9 Nov 2007 02:35, [EMAIL PROTECTED] said: Please add a watch file for gnupg. I have attached one, which may be useful for you. The attached one does not work becuase it will fire for gnupg 1.x and gnupg 2.0 updates. Fix should be trivial. Salam-Shalom, Werner -- Die Gedanken

Bug#439689: gnupg: another key producing the same issue

2007-11-07 Thread Werner Koch
On Tue, 6 Nov 2007 15:35, [EMAIL PROTECTED] said: What I notice is that it contains Czech characters so could that be the culprit? No. David already explained the problem. 1.4.8rc1 will be much faster in trying to cleanup such mangled keys. Salam-Shalom, Werner -- Die Gedanken sind

Bug#439689: gnupg: another key producing the same issue

2007-11-06 Thread Werner Koch
On Tue, 6 Nov 2007 06:40, [EMAIL PROTECTED] said: This is a serious bug that can lock application forever if such a key gets imported into the keyring. Well, not forever, it just takes some time. Fixing keysevers is no wichtery ;-). We will do a 1.4.8 release candidate in the next days.

Bug#412408: Is invoking exit(2) in a library the right thing to do?

2007-11-05 Thread Werner Koch
On Mon, 5 Nov 2007 13:37, [EMAIL PROTECTED] said: I still do not consider calling exit(2) in a library acceptable under any condition. So you want abort () instead? I consider this a bad option in this case because exit handlers would not be run. Given the reluctance of many programmers to

Bug#412408: Is invoking exit(2) in a library the right thing to do?

2007-11-02 Thread Werner Koch
On Thu, 1 Nov 2007 16:13, [EMAIL PROTECTED] said: This is causing a problem for Pidgin as well. [0] If there's no entropy device, then you can't use GnuTLS. However, that shouldn't prevent you There is a serious problem on your system if gnutls and thus libgcrypt are available but the system

Bug#444451: with-colons output does not include fpr for subkey-less keys

2007-09-28 Thread Werner Koch
Hi, The reason for this is that you did not used --fixed-list-mode: Do not merge primary user ID and primary key in @option{--with-colon} listing mode and print all timestamps as seconds since 1970-01-01. --fixed-list-mode is required to fix a flaw in the original format of the colon

Bug#403833: [PATCH] Add hostname to default env file

2007-09-10 Thread Werner Koch
On Mon, 10 Sep 2007 17:51, [EMAIL PROTECTED] said: This breaks existing installations. What about using Not many; and certianly not seriously. You know all installations of gpg-agent? I doubt that. 1) The change si limited. It affects only installation that use --write-env-file with

Bug#436749: - (meaning stdin) gets lost in gpg man page

2007-08-13 Thread Werner Koch
On Thu, 9 Aug 2007 00:24, [EMAIL PROTECTED] said: Inspection of the man page source suggests that it should say use - to specify stdin, but the - has gotten swallowed up somewhere along the I am nut sure why exactly this happends. However the translation of @samp{foo} wad anyway wrong. It

Bug#427703: Please support an encrypt-to-self option in ~/.gnupg/gpg.conf

2007-06-08 Thread Werner Koch
On Wed, 6 Jun 2007 22:14, [EMAIL PROTECTED] said: It does work fine, though, if you have only one private key. And as long as you don't accidently import another secret key. I'd like to share gpg.conf between machines; apart from the key IDs, it seems entirely non-machine-specific. gpg

Bug#427857: gnupg: --passphrase does not work with agent

2007-06-08 Thread Werner Koch
On Thu, 7 Jun 2007 01:20, [EMAIL PROTECTED] said: When I do gpg --passphrase foobar file.txt, I get a passphrase entry window (from pinentry-qt I think). Doing gpg --no-use-agent --passphrase foobar file.txt works as expected. That is as it should be. We can't error out in such a case

Bug#427703: Please support an encrypt-to-self option in ~/.gnupg/gpg.conf

2007-06-06 Thread Werner Koch
Hi, running gpg without an explicit --default-key is not suggested as you don't have any control on what gpg views as its default key. When adding --default-key it is not much work to also add an --encrypt-to. Shalom-Salam, Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a

Bug#420867: --allow-multiple-messages missing from man page and --help

2007-04-25 Thread Werner Koch
On Wed, 25 Apr 2007 07:40, [EMAIL PROTECTED] said: When decrypting multiple files with --decrypt-files, it is necessary to also use --allow-multiple-messages, otherwise only the first file will decrypt, This has recently been fixed in our SVN. Let me know if you need a patch.

Bug#418164: gnupg: --no-tty undocumented

2007-04-10 Thread Werner Koch
On Sat, 7 Apr 2007 16:54, [EMAIL PROTECTED] said: Please mention the --no-tty option in the manpage. It's essential for writing scripts that use gpg. We obviously lost this option entry while migrating from sgml to texinfo. I have just fixed it in my working copy. * gpg.texi (GPG

Bug#416717: libgcrypt11-doc: not happy with documentation

2007-03-30 Thread Werner Koch
On Fri, 30 Mar 2007 01:43, [EMAIL PROTECTED] said: There is a one-line description of each function, but no description of how things actually work or are intended to be used. You may want to write such docs and contribute them. In the meantime GnuPG 2.0 is a good example on how to use

Bug#412408: Is invoking exit(2) in a library the right thing to do?

2007-03-05 Thread Werner Koch
On Mon, 5 Mar 2007 19:40, [EMAIL PROTECTED] said: in this specific case (libnns-ldap failing due to missing /dev/(u)random devices in early boot when connecting to the ldap server using a ssl protected session.) the only thing actually using gcrypt directly is gnutls. You simply can't use

Bug#229818: GPA 0.7.5 should fix this bug

2007-02-26 Thread Werner Koch
Him, I have just released GPA 0.7.5 which very likely fixes this bug. This bug is also tracked as bugs.gnupg.org/756. Salam-Shalom, Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Bug#247783: Should be fixed by GPA 0.7.5

2007-02-26 Thread Werner Koch
Hi, I have just release 0.7.5 with a couple of bug fixes. I presume that this one is also fixed. Shalom-Salam, Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Bug#412508: fails to file options.skel for new ~/.gnupg directory

2007-02-26 Thread Werner Koch
Werner Koch [EMAIL PROTECTED] * Makefile.am (AM_CPPFLAGS): Define GNUPG_DATADIR. * openfile.c (copy_options_file): Use log_info and not log_error to avoid error returns in case of a missing skeleton file. A new release is due anyway. We hope to get it out by next

Bug#403613: the rndlinux module opens a file handle and never closes it

2006-12-18 Thread Werner Koch
On Mon, 18 Dec 2006 14:20, [EMAIL PROTECTED] said: The function _gcry_rndlinux_gather_random() in cipher/rndlinux.c opens two file handles (fd_random and fd_urandom) which are never closed. Since it does not apply the FD_CLOEXEC flag, all subprocesses will inherit these two handles without

Bug#402958: .gnupg/options not created from skeleton file

2006-12-14 Thread Werner Koch
, Werner 2006-12-14 Werner Koch [EMAIL PROTECTED] * http.c (http_wait_response): No more shutdown. Fixes bug#739. --- util/http.c (revision 4377) +++ util/http.c (working copy) @@ -212,8 +212,12 @@ iobuf_ioctl (hd-fp_write, 1, 1, NULL); /* keep the socket open */ iobuf_close (hd

Bug#400822: gnupg: --no-options causes errors

2006-11-30 Thread Werner Koch
On Thu, 30 Nov 2006 03:07, [EMAIL PROTECTED] said: Yes, that's what happened and now when I think about it the behavior is as documented. But what's the reasoning for not creating ~/.gnupg if it's still needed? It is not always needed. Salam-Shalom, Werner -- To UNSUBSCRIBE, email

Bug#399904: gnupg: --list-keys hangs at ctrl-C

2006-11-23 Thread Werner Koch
Hi! I was able to duplicate this after some tries. strace shows that it hangs in futex(0xb7ea9880, FUTEX_WAIT, 2, NULL) = -1 EINTR (Interrupted system call) The EINTR is due to the SIGQUIT. I am running Sid using the same glibc version but a stock gpg 1.4.5. A quick check of the glibc 2.4

Bug#399904: gnupg: --list-keys hangs at ctrl-C

2006-11-23 Thread Werner Koch
Architecture: amd64 (x86_64) Well, I am running on i386 Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.18-1-amd64 Stock Linux 2.6.15.2 (not the Debioan package) Shalom-Salam, Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble?

Bug#391724: exit code 2 if gpg-agent cannot be contacted even though signing works

2006-10-09 Thread Werner Koch
code is 0 for the same operation. Sure that this is in 1.4.5? I fixed this the day before the release: 2006-07-31 Werner Koch [EMAIL PROTECTED] * passphrase.c (agent_open): Use log_info instead of log_error to allow a fallback without having gpg return an error code. Fixes

Bug#388257: GnuPG 1.9.23 released

2006-09-25 Thread Werner Koch
On Wed, 20 Sep 2006 15:15, Georg C. F. Greve said: I wonder: could it ever become possible to build a downsized version for specific purposes and limited dependencies from the gnupg2 branch? No. That might make maintenance of 1.4 unnecessary in the long run. We will keep 1.4 and maybe even

Bug#388396: texinfo: CSS @import bug in makeinfo

2006-09-20 Thread Werner Koch
Package: texinfo Version: 4.8.dfsg.1-2 Severity: normal Tags: patch The code to read a css file has an obvious bug: A css file: == @import url(foo); == will end up as == @mport url(foo); == The fix is easy: 2006-09-20 Werner Koch [EMAIL

Bug#388257: GnuPG 1.9.23 released

2006-09-19 Thread Werner Koch
On Tue, 19 Sep 2006 16:07, Bernhard Reiter said: I have added a wish for a Debian experimental package http://bugs.debian.org/388257 I fear that your whish to completly supercede the gnupg package by gnupg2 is not possible. gnupg2 has a *lot of dependencies* and relies on the gpg-agent. gpg

Bug#388257: GnuPG 1.9.23 released

2006-09-19 Thread Werner Koch
On Tue, 19 Sep 2006 20:06, Bernhard Reiter said: This is for now, but I guess the plan is to have gpg 2 to supercede gpg 1.4 in the mid run. Packaging for this in experimental seems Not really. There are many applications of gpg which don't need the new features of gpg2 and thus we will keep

Bug#387270: gnupg: segfaults when asking a passphrase

2006-09-14 Thread Werner Koch
On Wed, 13 Sep 2006 09:12, Oohara Yuuma said: gnupg segfaults when it encrypts a file with a symmetric cipher: gpg --symmetric --armor copyright gpg: Segmentation fault caught ... exiting Segmentation fault FWIW, I can't replicate it with a stock 1.4.5 on Sid. What is the content of your

Bug#383639: mingw32: Error compile test

2006-08-22 Thread Werner Koch
Dimitri told in by PM that he figured the problem. MS's libc requires %i64d instead of %lld. This is not POSIX and thus not ISO-C. Salam-Shalom, Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Bug#293556: data loss - RC

2006-08-21 Thread Werner Koch
The strace show only that you interrupted gpg: 28203 rt_sigaction(SIGINT, {SIG_DFL}, NULL, 8) = 0 28203 unlink(/home/madduck/.gnupg/pubring.gpg.lock) = 0 28203 unlink(/home/madduck/.gnupg/.#lk0x81281d8.lapse.28203) = 0 and it cleaned up the lock file. The .tmp file won't get cleaned up in such

Bug#383933: gnupg: --list-keys lists all keys with uid starting with that requested

2006-08-21 Thread Werner Koch
On Sun, 20 Aug 2006 21:22, alex bodnaru said: in conclusion, this may have been intended as a feature, but exact matching or regular expression matching would do it better, in my opinion. Substring search has always been the default. To get an exact match on the user id prepend an =; i.e.

Bug#383639: mingw32: Error compile test

2006-08-18 Thread Werner Koch
On Fri, 18 Aug 2006 15:43, Dmitry E. Oboukhov said: test.exe a=300 b=0 ~ Error! printf(a=%lld b=%lld\n, a, b); Are you sure that the printf from Windows' libc knows about the long long type? I doubt it. Shalom-Salam, Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED]

Bug#293556: data loss - RC

2006-08-17 Thread Werner Koch
On Mon, 14 Aug 2006 14:37, martin f krafft said: -rw--- 1 madduck madduck 16490496 2006-08-13 14:36 pubring.gpg -rw--- 1 madduck madduck 3546722 2006-08-14 08:23 pubring.gpg.tmp -rw--- 1 madduck madduck 17968679 2006-08-12 18:53 pubring.gpg~ FYI: When updating a keyring, gpg

Bug#381204: GnuPG security hole in memory allocation

2006-08-04 Thread Werner Koch
On Wed, 2 Aug 2006 21:37, Brian M. Carlson said: I am inclined to say that this is grave, but since gnupg tends to do memory allocation before it drops privileges, you might find that this The allocation problem, which is overflow like malloc(numbercontrolledbyuser+20), can only happen after

Bug#367058: existing wrong ~/.gnupg/gpg-agent.conf prevents window manager from starting, X still runs

2006-05-15 Thread Werner Koch
You might want to run gpg-agent --gpgconf-list /dev/null and check that it succeeded before running gpg-agent as a daemon. Salam-Shalom, Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Bug#321720: compiling libgcrypt with --noexecstack

2005-09-14 Thread Werner Koch
On Wed, 14 Sep 2005 17:34:38 +0200, Marcus Better said: I just added the appropriate option to debian/rules, see the patch below. It would of course be nicer to mark the assembly files manually with .note.GNU-stack. I have just added a configure time option --enable-noexecstack to the

Bug#325578: gnupg: --use-agent + no agent + successfull operation = failure return value

2005-08-30 Thread Werner Koch
2005-08-30 Werner Koch [EMAIL PROTECTED] * passphrase.c (agent_open): Print a warning and not an error in case of a missing agent. Should fix Debian bug #325578. Index: g10/passphrase.c === --- g10/passphrase.c

Bug#323458: libgcrypt11-dev: No docs

2005-08-16 Thread Werner Koch
claims that the manual is under the FDL. However: 2003-12-03 Werner Koch [EMAIL PROTECTED] * gcrypt.texi: Changed license from FDL to GPL because this is a reference manual only useful along with actual code. * fdl.texi: Removed. This was long before the release of 1.2

Bug#322247: gnupg: Expired keys mis-handled. Should check keyserver for update.

2005-08-10 Thread Werner Koch
On Tue, 9 Aug 2005 16:33:25 -0600, s keeling said: Version: 1.2.2-1woody1 1.2.x is not maintained anymore by upstream. 1.4.x shows expired keys more clearly. copy had expired. gpg should notice and go out and check for a new copy. I did that manually, picked up a new copy, now gpg

Bug#316388: [EMAIL PROTECTED]: Re: Bug#316388: still prompts for passphrase with gpg-agent unless GPG_TTY is set]

2005-07-22 Thread Werner Koch
On Thu, 30 Jun 2005 20:18:27 +0200, Marco d'Itri said: Any comments? IIRC you wrote that code. I have not lloked at the context, but .. From: Joey Hess [EMAIL PROTECTED] Subject: Re: Bug#316388: still prompts for passphrase with gpg-agent unless GPG_TTY is set Maybe the mutt developers

Bug#38857: A patch for handling readonly keyrings in gnupg

2005-07-19 Thread Werner Koch
On Mon, 18 Jul 2005 20:21:38 +0300, Toni Timonen said: I wrote a patch for gnupg to handle readonly keyrings correctly. What it does now, is that when you try to modify a key in a keyring that is not writable it makes a copy of that keyring to a writable one and modifies it. That won't work

Bug#318587: gnupg: should encrypt to all subkeys

2005-07-18 Thread Werner Koch
On Sun, 17 Jul 2005 16:54:44 +0200, Steinar H Gunderson said: Well, does OpenPGP specify at all which subkeys to encrypt to? Is there a good reason why GnuPG simply can't encrypt to both by default? No. Why only to both ot them? There are often more than just 2 non-expired encryption keys.

Bug#318587: gnupg: should encrypt to all subkeys

2005-07-18 Thread Werner Koch
On Mon, 18 Jul 2005 11:36:20 +0200, Steinar H Gunderson said: Well, s/both/all/. What is the disadvantage, if any? Overhead in size and performance. Does it make much more sense having multiple subkeys, but in reality only use one of them? I'm not sure if I catch the logic here :-) The

Bug#318587: gnupg: should encrypt to all subkeys

2005-07-17 Thread Werner Koch
On Sat, 16 Jul 2005 12:45:35 +0200, Steinar H Gunderson said: When encrypting to a master key with multiple encryption subkeys, GPG currently signs to only the newest one. In my case, one is available on my home computer (which does not always have a smart card reader attached), and the other

Bug#196681: gnupg: gpg says /dev/null@alea isn't a valid email address

2005-07-14 Thread Werner Koch
On Wed, 13 Jul 2005 21:54:27 +0200, Thijs Kinkhorst said: gpg says me, /dev/[EMAIL PROTECTED] isn't a valid eMail address. But it is conform with rfc822. Indeed, I can still reproduce this with the current version. Use --allow-freeform-uid if you really need to use such strange mailboxes.

Bug#247461: gnupg: --no-tty still generates a warning

2005-07-14 Thread Werner Koch
On Wed, 13 Jul 2005 22:07:10 +0200, Wolfgang Rohdewald said: and stderr go to the tty but --no-tty obviously only suppresses stdout. The man page suggests all tty output (including stderr) As the name implies, --no-tty suppresses all output send to /dev/tty. These are for example prompts like

Bug#44910: gnupg: should not leasen permissions

2005-07-12 Thread Werner Koch
On Tue, 12 Jul 2005 10:37:41 +0200, Thijs Kinkhorst said: version of GnuPG in Debian (1.4.1-1). I'm wondering what the stance of upstream is on this bug: will or won't it be fixed? I don't see the problem with this. In same cases we could create a file with the same permissions as the source

Bug#44910: gnupg: should not leasen permissions

2005-07-12 Thread Werner Koch
On Tue, 12 Jul 2005 14:45:07 +0200, Martin Schulze said: Err... since it's easy to call isatty() on the input stream to find out Sure, but what other tool works like this? There are zillion ways to shoot oneself into the foot; tinkering with the permissions is just one. if there's an inode

Bug#314252: gnupg: failed to open driver `libpcsclite.so'

2005-06-15 Thread Werner Koch
On Wed, 15 Jun 2005 14:29:34 +0200, Kiro Zimmer said: the library. I could also install libpcsclite1-dev, wich contains the missing symlink, but i think this is a gpg problem, because other packages work fine without installing it. No, it is not. gpg dlopens pscslite.so and provides an

Bug#314252: gnupg: failed to open driver `libpcsclite.so'

2005-06-15 Thread Werner Koch
On Wed, 15 Jun 2005 18:23:11 +0200, Kiro Zimmer said: I searched inside the manual- and info-pages for an solution, but this option is nowhere explained. Now it works as expected ;) Ondded, it is missing. This is because the code is actual a backport from 1.9 and there we got it in the

<    1   2   3   4   5   >