Bug#402958: .gnupg/options not created from skeleton file

2006-12-14 Thread Werner Koch
, Werner 2006-12-14 Werner Koch [EMAIL PROTECTED] * http.c (http_wait_response): No more shutdown. Fixes bug#739. --- util/http.c (revision 4377) +++ util/http.c (working copy) @@ -212,8 +212,12 @@ iobuf_ioctl (hd-fp_write, 1, 1, NULL); /* keep the socket open */ iobuf_close (hd

Bug#387270: gnupg: segfaults when asking a passphrase

2006-09-14 Thread Werner Koch
On Wed, 13 Sep 2006 09:12, Oohara Yuuma said: gnupg segfaults when it encrypts a file with a symmetric cipher: gpg --symmetric --armor copyright gpg: Segmentation fault caught ... exiting Segmentation fault FWIW, I can't replicate it with a stock 1.4.5 on Sid. What is the content of your

Bug#388257: GnuPG 1.9.23 released

2006-09-19 Thread Werner Koch
On Tue, 19 Sep 2006 16:07, Bernhard Reiter said: I have added a wish for a Debian experimental package http://bugs.debian.org/388257 I fear that your whish to completly supercede the gnupg package by gnupg2 is not possible. gnupg2 has a *lot of dependencies* and relies on the gpg-agent. gpg

Bug#388257: GnuPG 1.9.23 released

2006-09-19 Thread Werner Koch
On Tue, 19 Sep 2006 20:06, Bernhard Reiter said: This is for now, but I guess the plan is to have gpg 2 to supercede gpg 1.4 in the mid run. Packaging for this in experimental seems Not really. There are many applications of gpg which don't need the new features of gpg2 and thus we will keep

Bug#391724: exit code 2 if gpg-agent cannot be contacted even though signing works

2006-10-09 Thread Werner Koch
code is 0 for the same operation. Sure that this is in 1.4.5? I fixed this the day before the release: 2006-07-31 Werner Koch [EMAIL PROTECTED] * passphrase.c (agent_open): Use log_info instead of log_error to allow a fallback without having gpg return an error code. Fixes

Bug#388396: texinfo: CSS @import bug in makeinfo

2006-09-20 Thread Werner Koch
Package: texinfo Version: 4.8.dfsg.1-2 Severity: normal Tags: patch The code to read a css file has an obvious bug: A css file: == @import url(foo); == will end up as == @mport url(foo); == The fix is easy: 2006-09-20 Werner Koch [EMAIL

Bug#388257: GnuPG 1.9.23 released

2006-09-25 Thread Werner Koch
On Wed, 20 Sep 2006 15:15, Georg C. F. Greve said: I wonder: could it ever become possible to build a downsized version for specific purposes and limited dependencies from the gnupg2 branch? No. That might make maintenance of 1.4 unnecessary in the long run. We will keep 1.4 and maybe even

Bug#400822: gnupg: --no-options causes errors

2006-11-30 Thread Werner Koch
On Thu, 30 Nov 2006 03:07, [EMAIL PROTECTED] said: Yes, that's what happened and now when I think about it the behavior is as documented. But what's the reasoning for not creating ~/.gnupg if it's still needed? It is not always needed. Salam-Shalom, Werner -- To UNSUBSCRIBE, email

Bug#500718: gnupg: symmetric option not compatible with output option

2008-10-01 Thread Werner Koch
Hi! Sorry, I can't replicate that with a stock 1.4.9. Neither with gpg nor with gpg-zip. Shalom-Salam, Werner -- Linux-Kongress 2008 + Hamburg + October 7-10 + www.linux-kongress.org Die Gedanken sind frei. Auschnahme regelt ein Bundeschgesetz. -- To UNSUBSCRIBE, email to

Bug#343434: gnupg: FTBFS (ppc64): Please use '--disable-asm' on ppc64

2008-07-30 Thread Werner Koch
Hi, this bug is now also tracked as https://bugs.g10code.com/gnupg/issue942 I should have an account for such a box however I doubt that I can debug it within the next weeks. Salam-Shalom, Werner -- Die Gedanken sind frei. Auschnahme regelt ein Bundeschgesetz. -- To

Bug#494040: gpgv: Unintelligible (behaviour and) error messages.

2008-08-07 Thread Werner Koch
On Wed, 6 Aug 2008 22:59, [EMAIL PROTECTED] said: | [EMAIL PROTECTED]:~$ gpgv /tmp/blender_2.46+dfsg-3.dsc | gpgv: keyblock resource `/home/kibi/.gnupg/trustedkeys.gpg': general error Do you mean the error message which probably should be file not found? | gpgv: Signature made Mon Jul 14

Bug#494040: gpgv: Unintelligible (behaviour and) error messages.

2008-08-07 Thread Werner Koch
On Thu, 7 Aug 2008 09:32, [EMAIL PROTECTED] said: I don't understand why, when the point is about verifying signatures (as stated in the whatis entry). Why does it have to assume they are trustworthy and then to use its very own keyring? I'd assume as a first You need to know whether the key

Bug#494194: gnupg: Choice of algorithms for --symmetric is obscure

2008-08-08 Thread Werner Koch
Hi! You are mixing up two things: 1. The key derivation function, commonly abbreviated as KDF but in OpenPGP as S2K (String to Key). 2. The encrytion algorithm. The first is use to derive a key from a passphrase and the second to do the actual encryption. The goal of the key derivation is

Bug#499542: libgcrypt11_1.4.3-1(sparc/experimental): FTBFS: test failure

2008-09-19 Thread Werner Koch
On Fri, 19 Sep 2008 17:34, [EMAIL PROTECTED] said: | /bin/sh: line 4: 16160 Bus error ${dir}$tst | FAIL: basic We have a similar report in the bug tracker but I am currently missing a test machine. IIRC the problem is in the AES code. You can do cd tests ./basic --verbose

Bug#499542: libgcrypt11_1.4.3-1(sparc/experimental): FTBFS: test failure

2008-09-19 Thread Werner Koch
On Fri, 19 Sep 2008 18:59, [EMAIL PROTECTED] said: Completed additional public key checks. Bus error Well, the new selftest code (3DES or the driver code). A backtrace might help but a shell acount on a sparc box would be better. Is it possible to get an account for Marcus? Salam-Shalom,

Bug#499542: libgcrypt11_1.4.3-1(sparc/experimental): FTBFS: test failure

2008-09-20 Thread Werner Koch
On Sat, 20 Sep 2008 09:12, [EMAIL PROTECTED] said: Program received signal SIGBUS, Bus error. 0xf7f00af8 in finalize (hd=0x2cec8) at hmac256.c:279 279 X(0); Interesting: #ifdef WORDS_BIGENDIAN #define X(a) do { *(u32*)p = hd-h##a ; p += 4; } while(0) #else /* little endian */

Bug#499542: libgcrypt11_1.4.3-1(sparc/experimental): FTBFS: test failure

2008-09-20 Thread Werner Koch
On Sat, 20 Sep 2008 13:27, [EMAIL PROTECTED] said: libgcrypt selftest: digest HMAC-SHA256 (8): does not match in second implementation (data-28 key-4) Well, there is definitley still a bug in the hmac256 tool. I can't look at it today anymore, sorry. My only big endian box is a PowerPC64

Bug#343085: [patch] Uses too much entropy (Debian Bug #343085)

2008-01-21 Thread Werner Koch
On Sun, 20 Jan 2008 18:10, [EMAIL PROTECTED] said: I gues it is not a god idea to share this seed file between multiple hosts accessing a central mailq queue. Is this this assumption correct? Yes. You better avoid that if possible. Shalom-Salam, Werner -- Die Gedanken sind frei.

Bug#463358: dirmngr: ldap_init() implicitly converted to pointer

2008-02-01 Thread Werner Koch
On Thu, 31 Jan 2008 16:28, [EMAIL PROTECTED] said: now. ldap.h used to globally expose these functions. ldap.h has begun deprecating old functions, requiring packages to explicitly define LDAP_DEPRECATED to use them. This seems to be a pretty common practice. .. for OpenLDAP. We had quite a

Bug#448775: Uses too much entropy (Debian Bug #343085)

2008-01-04 Thread Werner Koch
On Fri, 4 Jan 2008 13:35, [EMAIL PROTECTED] said: I think the daemon is there to help libgcrypt maintain randomness state between invocations of applications that use randomness from libgcrypt. Right. And it is still flagged as experimental because it lacks any fair distribution of random to

Bug#343085: Bug#448775: Uses too much entropy (Debian Bug #343085)

2008-01-04 Thread Werner Koch
On Fri, 4 Jan 2008 13:41, [EMAIL PROTECTED] said: We could consider doing something like that in gnutls too, to help applications avoid having to do it themselves. However, the documentation on UPDATE_SEED seems somewhat discouraging. I'm not sure Let's say this description is very

Bug#448775: Uses too much entropy (Debian Bug #343085)

2008-01-04 Thread Werner Koch
On Fri, 4 Jan 2008 15:16, [EMAIL PROTECTED] said: int gnutls_set_random_seed_file (const char *filename); I don't think that is a good idea. gnutls does not provide the required thread hook function for libgcrypt and thus the appliaction needs to do this. If you want these functions you

Bug#448775: Uses too much entropy (Debian Bug #343085)

2008-01-04 Thread Werner Koch
On Fri, 4 Jan 2008 15:39, [EMAIL PROTECTED] said: You mean the problem where one client requests a lot of randomness, which would hurt the randomness received by other clients? Right. Though the IPC mechanims allows for several concurrent requests, the hear of the RNG serializes everything.

Bug#448775: Uses too much entropy (Debian Bug #343085)

2008-01-08 Thread Werner Koch
On Fri, 4 Jan 2008 17:01, [EMAIL PROTECTED] said: Right. So what should applications like exim do exactly? Is there My suggestion is: int main () { int rc; #ifdef WE_USE_PTHREADS rc = gcry_control (GCRYCTL_SET_THREAD_CBS, gcry_threads_pthread); if (rc) error

Bug#448775: Uses too much entropy (Debian Bug #343085)

2008-01-08 Thread Werner Koch
On Fri, 4 Jan 2008 16:33, [EMAIL PROTECTED] said: plugin for pidgin: if another plugin (say, Jabber) uses gnutls, which initializes libgcrypt, and OTR also initializes libgcrypt (perhaps with custom allocation functions), you can easily cause a crash. At least we have a way to test whether

Bug#343085: Bug#448775: Uses too much entropy (Debian Bug #343085)

2008-01-08 Thread Werner Koch
On Sat, 5 Jan 2008 14:17, [EMAIL PROTECTED] said: gnutls-serv reads 3000 times 120 bytes from /dev/urandom, yes, 360 kilobytes! Run gcry_control (GCRYCTL_DUMP_RANDOM_STATS); to get statistics about libgcrypt's RNG. Shalom-Salam, Werner -- Die Gedanken sind frei. Auschnahme

Bug#343085: Bug#448775: Uses too much entropy (Debian Bug #343085)

2008-01-08 Thread Werner Koch
On Tue, 8 Jan 2008 11:03, [EMAIL PROTECTED] said: random usage: poolsize=600 mixed=621 polls=3000/117 added=3588/370308 outmix=3 getlvl1=3/136 getlvl2=0/0 - The random pool has been mixed 621 times. - The slow random poll function has been called 3000 times to fill and update

Bug#343085: [patch] Re: Bug#448775: Uses too much entropy (Debian Bug #343085)

2008-01-08 Thread Werner Koch
On Tue, 8 Jan 2008 11:59, [EMAIL PROTECTED] said: Anyway there 3000 calls to /dev/urandom are far too many for an initial pool filling. I need to check this. Found it. The bug was introduced with libgcrypt 1.3.1. Here is a patch: 2008-01-08 Werner Koch [EMAIL PROTECTED

Bug#343085: [patch] Re: Bug#448775: Uses too much entropy (Debian Bug #343085)

2008-01-08 Thread Werner Koch
On Tue, 8 Jan 2008 17:16, [EMAIL PROTECTED] said: Still, 3kb per TLS connection is excessive, so I still recommend exim to set a libgcrypt seeds file to solve the problem. Yes, definitely. Salam-Shalom, Werner -- Die Gedanken sind frei. Auschnahme regelt ein Bundeschgesetz. --

Bug#451438: mingw32: cannot find -lgcc_s

2007-11-21 Thread Werner Koch
On Sat, 17 Nov 2007 00:24, [EMAIL PROTECTED] said: Were these problems with the compiler being more strict, or with it being more buggy? They are both inconvenient but they aren't I can't remember in detail. It was more a problem of changed libraries. Actually nits but changing this in

Bug#453122: /usr/bin/gpg is suid root - unnecessary risk for rights elevation

2007-11-28 Thread Werner Koch
On Tue, 27 Nov 2007 15:57, [EMAIL PROTECTED] said: Severity: serious I doubt that this is a serious problem. The option to install gpg suid(root) has been there for nearly a decade. gpg is diligent to drop suid as soon as possible (after mlock and even before parsing options) and even checks

Bug#428635: Cannot create dsa2 keys

2007-12-11 Thread Werner Koch
On Tue, 11 Dec 2007 20:03, [EMAIL PROTECTED] said: Upgrading to libgcrypt11 1.4.0 generates a different error. However I think this one is really a gnupg2 error, not a gcrypt one. Alright. Thanks for reminding that I need to add support for DSA-2. Will do this tomorrow so that we can get

Bug#445328: gnupg: man page formatting and other typos

2007-12-12 Thread Werner Koch
On Wed, 12 Dec 2007 13:37, [EMAIL PROTECTED] said: -signed stuff from stdin, use -'-' - as the second filename. For +signed stuff from stdin, use '-' as the second filename. For I fixed this too by using the yat2m tool from gnupg-2 where this formatting problem has been fixed. 1.4.8 will

Bug#445328: gnupg: man page formatting and other typos

2007-12-12 Thread Werner Koch
On Wed, 12 Dec 2007 13:37, [EMAIL PROTECTED] said: I also took the liberty of fixing a few obvious typos by running aspell on the man page, e.g. RETURN VAUE should be RETURN VALUE. See the patch for details. Thanks. I applied the typo fixes to gpg.texi. Note that changing the man page is

Bug#461980: (forw) Bug#461980: gnupg-agent: manpage typos

2008-01-27 Thread Werner Koch
On Sun, 27 Jan 2008 23:55, [EMAIL PROTECTED] said: Including a new patch against the source files, with some additional fixes (manly, be possible). Also some of the original fixes applied to additional parts. Thanks. I applied it except for: --- gnupg2-2.0.8/doc/qualified.txt +++

Bug#461980: (forw) Bug#461980: gnupg-agent: manpage typos

2008-01-29 Thread Werner Koch
On Tue, 29 Jan 2008 15:22, [EMAIL PROTECTED] said: |Ignore requests to change the current @code{tty} or X |window system @code{DISPLAY} variable, respectively. This is useful Right, I got the same hint off-list. Shalom-Salam, Werner -- Die Gedanken sind frei. Auschnahme regelt ein

Bug#461980: (forw) Bug#461980: gnupg-agent: manpage typos

2008-01-29 Thread Werner Koch
On Mon, 28 Jan 2008 15:27, [EMAIL PROTECTED] said: All applied. In ./doc/DETAILS, I'm not sure: | The default is the standard gpg Web of Trust model respective | the standard X.509 model. The defined values are Is this supposed to mean: | The default is the standard

Bug#448775: Uses too much entropy (Debian Bug #343085)

2008-01-31 Thread Werner Koch
On Wed, 30 Jan 2008 19:20, [EMAIL PROTECTED] said: Any obvious breakage? Exim does not use any threading. I have not included an gcry_check_version(NULL) since I thought gcry_control() would fail as reliably as gcry_check_version() would, if gcrypt was Better insert a gcry_check_version

Bug#463358: dirmngr: ldap_init() implicitly converted to pointer

2008-01-31 Thread Werner Koch
On Thu, 31 Jan 2008 06:21, [EMAIL PROTECTED] said: Function `ldap_init' implicitly converted to pointer at dirmngr_ldap.c:520 Huh? ldap.h is included and thus I can see no such problem. The libldap API has been updated and many functions used by the ldap plugin are now deprecated. This

Bug#450670: Please add a watch file.

2007-11-09 Thread Werner Koch
On Fri, 9 Nov 2007 02:35, [EMAIL PROTECTED] said: Please add a watch file for gnupg. I have attached one, which may be useful for you. The attached one does not work becuase it will fire for gnupg 1.x and gnupg 2.0 updates. Fix should be trivial. Salam-Shalom, Werner -- Die Gedanken

Bug#450670: Please add a watch file.

2007-11-12 Thread Werner Koch
On Sat, 10 Nov 2007 08:08, [EMAIL PROTECTED] said: On Fri, Nov 09, 2007 at 05:05:28PM +0100, Werner Koch wrote: Please add a watch file for gnupg. I have attached one, which may be useful for you. The attached one does not work becuase it will fire for gnupg 1.x and gnupg 2.0 updates

Bug#412408: Is invoking exit(2) in a library the right thing to do?

2007-11-15 Thread Werner Koch
On Thu, 15 Nov 2007 10:55, [EMAIL PROTECTED] said: The only way forward I can see from here is to refer the issue to the Technical Committee. If nobody objects or wants to do it themselves I'll write up a summary when I have some free time. I still do not understand the problem. Do you say

Bug#412408: Is invoking exit(2) in a library the right thing to do?

2007-11-15 Thread Werner Koch
On Thu, 15 Nov 2007 13:19, [EMAIL PROTECTED] said: M null c 1 3 which creates /dev/null, but does not contain a line to create /dev/random. It also contains the comment: So the fix should be pretty easy: M random c 1 8 M urandom c 1 9 Shalom-Salam, Werner p.s. Does

Bug#412408: Is invoking exit(2) in a library the right thing to do?

2007-11-15 Thread Werner Koch
On Thu, 15 Nov 2007 15:32, [EMAIL PROTECTED] said: I oppose this solution, the only devices which *must* be created statically (and are available in the standard initramfs indeed) are null and console. With this reasoning you may also change Linux to allow /dev/random to be a module. It was

Bug#451438: mingw32: cannot find -lgcc_s

2007-11-16 Thread Werner Koch
On Fri, 16 Nov 2007 14:09, [EMAIL PROTECTED] said: Oh. I wasn't aware of an active regression here, but yes, that indeed seems to be a known issue with 'upgrading' from 3.4 to current 4.x ... I had already some complaints from folks (cross-)building gnupg and related stuff with the latest

Bug#412408: Is invoking exit(2) in a library the right thing to do?

2007-11-18 Thread Werner Koch
On Sun, 18 Nov 2007 12:10, [EMAIL PROTECTED] said: Indeed. And you should call abort() instead of exit() in the library. I will consider this. Shalom-Salam, Werner -- Die Gedanken sind frei. Auschnahme regelt ein Bundeschgesetz. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with

Bug#310328: Bug #310328,Upgrading gnupg with open enigmail causes serious problem

2005-05-23 Thread Werner Koch
[Patrick, there seems to be a problem with gpg and enigmail when using large keyrings: gpg goes too sleep for a long time. Not sure whether you can clarify things.] On Mon, 23 May 2005 19:48:06 +0200, martin f krafft said: What happens if you just leave it, go an play outside for a while,

Bug#310805: gnupg: fully exportable armored homedir is completely impossible now!

2005-05-26 Thread Werner Koch
On Thu, 26 May 2005 02:22:06 -0700, t takahashi said: another example of unnecessary accessing of homedir is when you want to compress a file. when you do gpg --store, homedir access is unnecessary but gpg tries to access it (perhaps to find preferences?). however, there is no way to turn

Bug#310978: Please add support for ELG_E

2005-05-29 Thread Werner Koch
On Fri, 27 May 2005 06:57:23 -0500, Stephen R Marenka said: This one line patch enables default support for Elgamal E. Maybe there's a smarter way to do it, but it escaped me. There is no need for it. Although some algorithm numbers are taken from OpenPGP, this does not mean that we will

Bug#311360: gnupg: introduces unnecessary dependence on USB dev support (i.e. not sug./rec.)

2005-06-01 Thread Werner Koch
On Tue, 31 May 2005 18:55:19 +0200, Georg Bauhaus said: If there is a really convincing argument that a tool like /usr/bin/gpg invented for signing and encrypting files must be aware Yes there is one: gpg supports smartcards and thus needs access to smartcard readers. It comes with an

Bug#295718: gnupg: sha1 is broken

2005-02-18 Thread Werner Koch
On Thu, 17 Feb 2005 17:43:51 +0100, Markus Schaber said: GnuPG should be changed to give strong warings whenever SHA-1 is used, and maybe disable the usage of SHA-1 for new signatures altogether. No. Broken is used by Bruce in a way cryptographers use it. IT is far far away from any

Bug#296128: localicing don't work properly

2005-02-21 Thread Werner Koch
On Sun, 20 Feb 2005 15:13:44 +0100, Klaus Ethgen said: The following text is not localiced (to german) even thought it is in the de.po file. But marked as fuzzy. There are a lot of outdated translations. I don't think that it is a good idea to file a bug for every outdated language. For de

Bug#296128: localicing don't work properly

2005-02-21 Thread Werner Koch
On Mon, 21 Feb 2005 13:13:25 +0100, Klaus Ethgen said: Hmm... But the possition seems to be correct as I looked to the source. But what do this fuzzy mean concretely in this case? That is a term from the GNU gettext system. If it dedects changed or new strings it tries a fuzzy macth to make

Bug#300743: gnupg: Should not depend on libusb

2005-03-21 Thread Werner Koch
On Mon, 21 Mar 2005 15:55:31 +0100, Frans Pop said: I feel it is not very nice packaging, especially for something like gnupg that is very general purpose and that is priority standard, to depend on a hardware specific library. libusb is by design not hardware dependedn. If USB is not

Bug#299814: GnuPG 1.2.5 selects wrong encryption keys

2005-03-23 Thread Werner Koch
On Wed, 23 Mar 2005 00:40:23 -0800, Steve Langasek said: Given that this bug is marked grave, should gnupg 1.4.0-3 be pushed into testing, or is there another fix we should prefer here? Although I'd prefer to see 1.4.1 in testing, updating to 1.2.7 would solve this bug. Shalom-Salam,

Bug#301627: gnupg: Default key signing level change causes confusion

2005-03-29 Thread Werner Koch
On Sun, 27 Mar 2005 12:13:19 +0200, Rmi Denis-Courmont said: I think the ask-cert-level option should really be re-enabled by default. We changed this on purpose. The cert levels have never been used in the past and due to the different intepretation people assign to them, their meaning is

Bug#302905: gnupg: pop_filter(): filter function not found

2005-04-04 Thread Werner Koch
On Sun, 03 Apr 2005 19:13:33 +0100, Oliver Elphick said: This appears to be related to the contents of my .gnupg, because the Would you mind to tell us what is special about your gpg.conf? If you don't want to see this in the BTS, please send it to me by PM. My guess is that your keyring is

Bug#302905: gnupg: pop_filter(): filter function not found

2005-04-05 Thread Werner Koch
On Mon, 04 Apr 2005 08:07:13 +0100, Oliver Elphick said: Since I can decrypt stuff, I assume that would be the public keyring? If so, how can I clean it up? Restore it from a backup. I think it is better to continue such a discussion on the gnupg users mailing list. You need to figure out

Bug#304579: gpgme[-dev]

2005-04-14 Thread Werner Koch
On Thu, 14 Apr 2005 07:53:37 +0200, folkert said: The gpgme in the Debian distribution is very much behind. The current version of gpgme is 1.0.2. Quiet a bit has changed since the Debian- 0.3 is the old API used by some old software (e.g. sylpheed). You should use the libgpgme11 package

Bug#307276: gnupg: Error importing Wouter's keys

2005-05-02 Thread Werner Koch
On Mon, 02 May 2005 12:28:15 +0300, Lars Wirzenius said: I've no idea what happened. The is supposed to have key id AF79D29E and importing it from the key server I use works fine. There is a bad formatted signature in the key: :signature packet: algo 17, keyid 432843E0AF3C67EA version

Bug#299814: Bug#300859: gnupg RC bugs

2005-05-05 Thread Werner Koch
On Wed, 04 May 2005 14:08:05 +, Brian M Carlson said: * Update to 1.4.1. I'd really prefer that. 1.4.1 has been released more than 6 weeks ago and fixes quite some bugs we figured out in 1.4.0. The case with 1.4.0 was that people don't care anymore about RC releases and start complaining

Bug#275188: decrypt-saving still deleting messages?

2005-01-17 Thread Werner Koch
On Sun, 16 Jan 2005 13:03:47 +0100, Thomas Roessler said: The problem here is that PGP exit values are nontrivial. To give just one example, gpg will return exit status 1 when it encounters a bad signature; I'm not sure right now whether this includes a Don't rely on that. 1 is usually used

Bug#297253: /usr/bin/gpg: missing dependencies

2005-03-02 Thread Werner Koch
On Mon, 28 Feb 2005 10:12:27 +0100, Sythos said: missing libpcsclite1 dependencies Note, that is not a hard dependency because libpcsclite is dlopened and even not needed if a CCID reader has been setup properly. Shalom-Salam, Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with

Bug#436749: - (meaning stdin) gets lost in gpg man page

2007-08-13 Thread Werner Koch
On Thu, 9 Aug 2007 00:24, [EMAIL PROTECTED] said: Inspection of the man page source suggests that it should say use - to specify stdin, but the - has gotten swallowed up somewhere along the I am nut sure why exactly this happends. However the translation of @samp{foo} wad anyway wrong. It

Bug#403833: [PATCH] Add hostname to default env file

2007-09-10 Thread Werner Koch
On Mon, 10 Sep 2007 17:51, [EMAIL PROTECTED] said: This breaks existing installations. What about using Not many; and certianly not seriously. You know all installations of gpg-agent? I doubt that. 1) The change si limited. It affects only installation that use --write-env-file with

Bug#444451: with-colons output does not include fpr for subkey-less keys

2007-09-28 Thread Werner Koch
Hi, The reason for this is that you did not used --fixed-list-mode: Do not merge primary user ID and primary key in @option{--with-colon} listing mode and print all timestamps as seconds since 1970-01-01. --fixed-list-mode is required to fix a flaw in the original format of the colon

Bug#412408: Is invoking exit(2) in a library the right thing to do?

2007-11-02 Thread Werner Koch
On Thu, 1 Nov 2007 16:13, [EMAIL PROTECTED] said: This is causing a problem for Pidgin as well. [0] If there's no entropy device, then you can't use GnuTLS. However, that shouldn't prevent you There is a serious problem on your system if gnutls and thus libgcrypt are available but the system

Bug#412408: Is invoking exit(2) in a library the right thing to do?

2007-11-05 Thread Werner Koch
On Mon, 5 Nov 2007 13:37, [EMAIL PROTECTED] said: I still do not consider calling exit(2) in a library acceptable under any condition. So you want abort () instead? I consider this a bad option in this case because exit handlers would not be run. Given the reluctance of many programmers to

Bug#439689: gnupg: another key producing the same issue

2007-11-06 Thread Werner Koch
On Tue, 6 Nov 2007 06:40, [EMAIL PROTECTED] said: This is a serious bug that can lock application forever if such a key gets imported into the keyring. Well, not forever, it just takes some time. Fixing keysevers is no wichtery ;-). We will do a 1.4.8 release candidate in the next days.

Bug#439689: gnupg: another key producing the same issue

2007-11-07 Thread Werner Koch
On Tue, 6 Nov 2007 15:35, [EMAIL PROTECTED] said: What I notice is that it contains Czech characters so could that be the culprit? No. David already explained the problem. 1.4.8rc1 will be much faster in trying to cleanup such mangled keys. Salam-Shalom, Werner -- Die Gedanken sind

Bug#403613: the rndlinux module opens a file handle and never closes it

2006-12-18 Thread Werner Koch
On Mon, 18 Dec 2006 14:20, [EMAIL PROTECTED] said: The function _gcry_rndlinux_gather_random() in cipher/rndlinux.c opens two file handles (fd_random and fd_urandom) which are never closed. Since it does not apply the FD_CLOEXEC flag, all subprocesses will inherit these two handles without

Bug#229818: GPA 0.7.5 should fix this bug

2007-02-26 Thread Werner Koch
Him, I have just released GPA 0.7.5 which very likely fixes this bug. This bug is also tracked as bugs.gnupg.org/756. Salam-Shalom, Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Bug#247783: Should be fixed by GPA 0.7.5

2007-02-26 Thread Werner Koch
Hi, I have just release 0.7.5 with a couple of bug fixes. I presume that this one is also fixed. Shalom-Salam, Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Bug#412508: fails to file options.skel for new ~/.gnupg directory

2007-02-26 Thread Werner Koch
Werner Koch [EMAIL PROTECTED] * Makefile.am (AM_CPPFLAGS): Define GNUPG_DATADIR. * openfile.c (copy_options_file): Use log_info and not log_error to avoid error returns in case of a missing skeleton file. A new release is due anyway. We hope to get it out by next

Bug#412408: Is invoking exit(2) in a library the right thing to do?

2007-03-05 Thread Werner Koch
On Mon, 5 Mar 2007 19:40, [EMAIL PROTECTED] said: in this specific case (libnns-ldap failing due to missing /dev/(u)random devices in early boot when connecting to the ldap server using a ssl protected session.) the only thing actually using gcrypt directly is gnutls. You simply can't use

Bug#416717: libgcrypt11-doc: not happy with documentation

2007-03-30 Thread Werner Koch
On Fri, 30 Mar 2007 01:43, [EMAIL PROTECTED] said: There is a one-line description of each function, but no description of how things actually work or are intended to be used. You may want to write such docs and contribute them. In the meantime GnuPG 2.0 is a good example on how to use

Bug#399904: gnupg: --list-keys hangs at ctrl-C

2006-11-23 Thread Werner Koch
Hi! I was able to duplicate this after some tries. strace shows that it hangs in futex(0xb7ea9880, FUTEX_WAIT, 2, NULL) = -1 EINTR (Interrupted system call) The EINTR is due to the SIGQUIT. I am running Sid using the same glibc version but a stock gpg 1.4.5. A quick check of the glibc 2.4

Bug#399904: gnupg: --list-keys hangs at ctrl-C

2006-11-23 Thread Werner Koch
Architecture: amd64 (x86_64) Well, I am running on i386 Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.18-1-amd64 Stock Linux 2.6.15.2 (not the Debioan package) Shalom-Salam, Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble?

Bug#427703: Please support an encrypt-to-self option in ~/.gnupg/gpg.conf

2007-06-08 Thread Werner Koch
On Wed, 6 Jun 2007 22:14, [EMAIL PROTECTED] said: It does work fine, though, if you have only one private key. And as long as you don't accidently import another secret key. I'd like to share gpg.conf between machines; apart from the key IDs, it seems entirely non-machine-specific. gpg

Bug#427857: gnupg: --passphrase does not work with agent

2007-06-08 Thread Werner Koch
On Thu, 7 Jun 2007 01:20, [EMAIL PROTECTED] said: When I do gpg --passphrase foobar file.txt, I get a passphrase entry window (from pinentry-qt I think). Doing gpg --no-use-agent --passphrase foobar file.txt works as expected. That is as it should be. We can't error out in such a case

Bug#420867: --allow-multiple-messages missing from man page and --help

2007-04-25 Thread Werner Koch
On Wed, 25 Apr 2007 07:40, [EMAIL PROTECTED] said: When decrypting multiple files with --decrypt-files, it is necessary to also use --allow-multiple-messages, otherwise only the first file will decrypt, This has recently been fixed in our SVN. Let me know if you need a patch.

Bug#427703: Please support an encrypt-to-self option in ~/.gnupg/gpg.conf

2007-06-06 Thread Werner Koch
Hi, running gpg without an explicit --default-key is not suggested as you don't have any control on what gpg views as its default key. When adding --default-key it is not much work to also add an --encrypt-to. Shalom-Salam, Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a

Bug#418164: gnupg: --no-tty undocumented

2007-04-10 Thread Werner Koch
On Sat, 7 Apr 2007 16:54, [EMAIL PROTECTED] said: Please mention the --no-tty option in the manpage. It's essential for writing scripts that use gpg. We obviously lost this option entry while migrating from sgml to texinfo. I have just fixed it in my working copy. * gpg.texi (GPG

Bug#318587: gnupg: should encrypt to all subkeys

2005-07-17 Thread Werner Koch
On Sat, 16 Jul 2005 12:45:35 +0200, Steinar H Gunderson said: When encrypting to a master key with multiple encryption subkeys, GPG currently signs to only the newest one. In my case, one is available on my home computer (which does not always have a smart card reader attached), and the other

Bug#318587: gnupg: should encrypt to all subkeys

2005-07-18 Thread Werner Koch
On Sun, 17 Jul 2005 16:54:44 +0200, Steinar H Gunderson said: Well, does OpenPGP specify at all which subkeys to encrypt to? Is there a good reason why GnuPG simply can't encrypt to both by default? No. Why only to both ot them? There are often more than just 2 non-expired encryption keys.

Bug#318587: gnupg: should encrypt to all subkeys

2005-07-18 Thread Werner Koch
On Mon, 18 Jul 2005 11:36:20 +0200, Steinar H Gunderson said: Well, s/both/all/. What is the disadvantage, if any? Overhead in size and performance. Does it make much more sense having multiple subkeys, but in reality only use one of them? I'm not sure if I catch the logic here :-) The

Bug#38857: A patch for handling readonly keyrings in gnupg

2005-07-19 Thread Werner Koch
On Mon, 18 Jul 2005 20:21:38 +0300, Toni Timonen said: I wrote a patch for gnupg to handle readonly keyrings correctly. What it does now, is that when you try to modify a key in a keyring that is not writable it makes a copy of that keyring to a writable one and modifies it. That won't work

Bug#316388: [EMAIL PROTECTED]: Re: Bug#316388: still prompts for passphrase with gpg-agent unless GPG_TTY is set]

2005-07-22 Thread Werner Koch
On Thu, 30 Jun 2005 20:18:27 +0200, Marco d'Itri said: Any comments? IIRC you wrote that code. I have not lloked at the context, but .. From: Joey Hess [EMAIL PROTECTED] Subject: Re: Bug#316388: still prompts for passphrase with gpg-agent unless GPG_TTY is set Maybe the mutt developers

Bug#325578: gnupg: --use-agent + no agent + successfull operation = failure return value

2005-08-30 Thread Werner Koch
2005-08-30 Werner Koch [EMAIL PROTECTED] * passphrase.c (agent_open): Print a warning and not an error in case of a missing agent. Should fix Debian bug #325578. Index: g10/passphrase.c === --- g10/passphrase.c

Bug#321720: compiling libgcrypt with --noexecstack

2005-09-14 Thread Werner Koch
On Wed, 14 Sep 2005 17:34:38 +0200, Marcus Better said: I just added the appropriate option to debian/rules, see the patch below. It would of course be nicer to mark the assembly files manually with .note.GNU-stack. I have just added a configure time option --enable-noexecstack to the

Bug#323458: libgcrypt11-dev: No docs

2005-08-16 Thread Werner Koch
claims that the manual is under the FDL. However: 2003-12-03 Werner Koch [EMAIL PROTECTED] * gcrypt.texi: Changed license from FDL to GPL because this is a reference manual only useful along with actual code. * fdl.texi: Removed. This was long before the release of 1.2

Bug#44910: gnupg: should not leasen permissions

2005-07-12 Thread Werner Koch
On Tue, 12 Jul 2005 10:37:41 +0200, Thijs Kinkhorst said: version of GnuPG in Debian (1.4.1-1). I'm wondering what the stance of upstream is on this bug: will or won't it be fixed? I don't see the problem with this. In same cases we could create a file with the same permissions as the source

Bug#44910: gnupg: should not leasen permissions

2005-07-12 Thread Werner Koch
On Tue, 12 Jul 2005 14:45:07 +0200, Martin Schulze said: Err... since it's easy to call isatty() on the input stream to find out Sure, but what other tool works like this? There are zillion ways to shoot oneself into the foot; tinkering with the permissions is just one. if there's an inode

Bug#196681: gnupg: gpg says /dev/null@alea isn't a valid email address

2005-07-14 Thread Werner Koch
On Wed, 13 Jul 2005 21:54:27 +0200, Thijs Kinkhorst said: gpg says me, /dev/[EMAIL PROTECTED] isn't a valid eMail address. But it is conform with rfc822. Indeed, I can still reproduce this with the current version. Use --allow-freeform-uid if you really need to use such strange mailboxes.

Bug#247461: gnupg: --no-tty still generates a warning

2005-07-14 Thread Werner Koch
On Wed, 13 Jul 2005 22:07:10 +0200, Wolfgang Rohdewald said: and stderr go to the tty but --no-tty obviously only suppresses stdout. The man page suggests all tty output (including stderr) As the name implies, --no-tty suppresses all output send to /dev/tty. These are for example prompts like

Bug#314252: gnupg: failed to open driver `libpcsclite.so'

2005-06-15 Thread Werner Koch
On Wed, 15 Jun 2005 14:29:34 +0200, Kiro Zimmer said: the library. I could also install libpcsclite1-dev, wich contains the missing symlink, but i think this is a gpg problem, because other packages work fine without installing it. No, it is not. gpg dlopens pscslite.so and provides an

Bug#314252: gnupg: failed to open driver `libpcsclite.so'

2005-06-15 Thread Werner Koch
On Wed, 15 Jun 2005 18:23:11 +0200, Kiro Zimmer said: I searched inside the manual- and info-pages for an solution, but this option is nowhere explained. Now it works as expected ;) Ondded, it is missing. This is because the code is actual a backport from 1.9 and there we got it in the

Bug#322247: gnupg: Expired keys mis-handled. Should check keyserver for update.

2005-08-10 Thread Werner Koch
On Tue, 9 Aug 2005 16:33:25 -0600, s keeling said: Version: 1.2.2-1woody1 1.2.x is not maintained anymore by upstream. 1.4.x shows expired keys more clearly. copy had expired. gpg should notice and go out and check for a new copy. I did that manually, picked up a new copy, now gpg

Bug#225888: [Pkg-gnupg-maint] Bug#225888: closed by Daniel Leidert [EMAIL PROTECTED] (gnupg: slight improvement of docs regarding IDEA)

2008-06-13 Thread Werner Koch
Hi! Let me state it again: There is no IDEA support for GnuPG - there has never been any support - the reason to write GnuPG was due to the IDEA and RSA patents. Even after 2010 (or whatever the patent stuff says) there will be no IDEA support - IDEA is OBSOLETE, it is an old cipher algorithm

Bug#489225: gnupg says KEYEXPIRED even when only other subkeys are expired

2008-07-05 Thread Werner Koch
On Fri, 4 Jul 2008 14:53, [EMAIL PROTECTED] said: When I have a signature made by an expired key, will I get {GOODSIG,EXPKEYSIG}, or {BADSIG,EXPKEYSIG}? Only one them: if( !rc || gpg_err_code (rc) == GPG_ERR_BAD_SIGNATURE ) { KBNODE un, keyblock; int count=0, statno;

  1   2   3   4   5   >