- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
All Stories
Apr 10 2013
new version with end enumerate a little earlier.
Apr 9 2013
Apr 5 2013
Marking as resolved, as this seems to work fine now as far as I can tell (I'm
certainly happy).
scrypt has now been implemented.
Mar 26 2013
Mar 25 2013
This bug is fixed for 2.0.
http://git.gnupg.org/cgi-bin/gitweb.cgi?
p=gnupg.git;a=commit;h=ae22d629b6028aa994ff09f012e1cb029575eeae
Mar 24 2013
Mar 23 2013
Following the calling chain, we eventually call the OS itself using select(2).
This happens twice. The first call works. The 2nd call hangs in a loop, with
select(2) returning <0 and errno set to EINTR (call was interrupted).
Mar 22 2013
Mar 21 2013
Mar 20 2013
Done in master.
If you use --textmode during encryption the native line endings on the
decryption system are used. Adding an extra option to for arbitrary conversions
is IMHO not a good idea beause it violates the Unix principle of having
dedicated tools which work together. tr(1) does what you want.
Ah yes, that Serpent case again. We have a fix for that but a brief inspection
made me believe that it will only happen if the serpent.c code is used outside
of the Libgcrypt. It is an alignment problem. Please give me a few days to
prepare an updated patch.
I just verified that the issue only appears on 64 bit sparc, all others like 32
bit i386, 32 bit sparc and 64 bit amd64 work fine, so it is most likely a byte-
order issue.
Mar 19 2013
Mar 18 2013
Argh, I did quite some fixes for the 1.5.1 release and assumed that I applied
this one as well. Now pushed but too late for 1.5.1 :-(. However, there is no
need to use automake for a released version.
You are using version 1.4.5 and not 1.5.0.
Two hints: Your are using the Solaris as and ld - better try with a native GNU
toolchain. You have some global CLFAGS set which add a lot of extra and useless
include paths. Please remove them.
I close the bug because it is pretty old. Feel free to re-open it if you have
newer info and tried with 1.5.0.
Done in commit d3132553 for 1.5. Needs to be fixed in master.
1.6 (current master) now has a feature to switch to a pure /dev/random based RNG.
Mar 13 2013
We still have a copyright assignment policy in effect. Thus I can't accept your
patch right now. This will change in 2 weeks.
Ok, no problem.
Patches should be send to gnupg-devel and not to the bug tracker.
Thanks for information, next time I'll send patches directly there. Should I
send also this one to be reviewed on mailing list?
BTW, HEAD of branch?
master, forgot to mention, sorry about that.
Milan
Mar 12 2013
We still have a copyright assignment policy in effect. Thus I can't accept your
patch right now. This will change in 2 weeks.
Patches should be send to gnupg-devel and not to the bug tracker. BTW, HEAD of
which branch?
Mar 6 2013
Still have this issue. Here is an updated patch against 2.0.19. Please
consider including it, or provide some feedback if this is a bad idea / should
be done a different way.
Marking this as a bug since it restores useful functionality that was lost.
Feb 28 2013
Am able to reliably trigger the flaw, by using a curl-shim gpg from another
machine on the same network as the keyserver. Close network proximity without
being the exact same machine makes it much easier to trigger the race.
Feb 27 2013
Feb 23 2013
Feb 22 2013
The error still shows up in 2.1.0, again amd64 only.
As I said, gpg does not mess around with the encoding. The content is an opaque
data for gpg. Your problem is outside of GnuPG.
Do not use an outdated version of GnuPG.
1.2 has long reached end of life.
Anyway, your problem is corrupted input data. Newer version may give a sensible
error message but neityer woulde abale to decrypt your data.
Feb 19 2013
Feb 18 2013
Feb 14 2013
Thank You for your email.
Do you mean the file name or the content of the file? gpg does not care about
the content and the file name is used verbatim. However, for display purposes
shown meta data (e.g. the informational only file name in the encrypted data) is
converted to the used character set. For any non-attended use you should use
--status-fd to get the meta data which is either UTF-8 (if gpg generated) or
whatever the sending party used.
Feb 13 2013
We are having issues decryting an encrypted file with gpg (algorithm RSA 2048
encryption) when the file has special international characters. The decrypted
file has special characted decoded incorrectly for example
Sadurní as Sadurnà and García as GarcÃa. The gpg (GnuPG) 1.4.5 is installed on
the LUNIX RHEL 5.6 server.
Please let me know if there is patch/version that supports international
characters.
Feb 7 2013
Jan 23 2013
Jan 19 2013
Jan 18 2013
Ooops.