- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Advanced Search
Feb 17 2015
Feb 16 2015
Jan 28 2015
Jason Donenfeld has a patch for this:
http://thread.gmane.org/gmane.comp.encryption.gpg.devel/19654
Jan 2 2015
i've tested this with gnupg 2.1.1, and gnupg 2.1.1 does provide a non-zero
return code if the passphrase fails.
Dec 17 2014
Dec 4 2014
oh, and this appears to be the case for 1.4.x, 2.0.x, and 2.1.x
That link to the debian bts is a little wacky, somehow roundup is attaching the
comma to the end of it. it should be: https://bugs.debian.org/771976
Dec 2 2014
Any word on this? It would be nice to see something like this merged.
Nov 6 2014
Sep 16 2014
Jun 3 2014
Jul 11 2013
Jan 13 2013
Sep 23 2011
Can i get an update on where this patch stands? I'm concerned that people are
actively sniffing around the idea of crafting duplicate short keyids:
Aug 4 2011
Attached is a proposed patch that should permit passing long keyIDs or full
fingerprints to the keyservers.
Given that the referenced draft was written in 2003, we now have 8 years of
documented expectations that keyservers can do this. The dominant keyserver
implementation today (SKS) can handle this with no trouble.
this is not a limitation of the keyservers; gpg itself is stripping all but the
short keyid. adding "--keyserver-options debug" to the command shows that in
every case, gpg is requesting the following URL:
Mar 4 2011
I appreciate that PKCS#12 is stupid and baroque, but if the goal is
interoperability with other software, it seems like other GNU tools would be a
reasonable target at least :)
Mar 3 2011
Feb 3 2011
Oct 15 2010
A colleague just observed that expiration dates are also missing when
--list-secret-keys is used without a matching string.
May 5 2010
Sep 23 2009
Aug 27 2009
May 19 2009
Feb 5 2009
Here is an example OpenPGP certificate with only the certify flag set, if you
want to test with it.
Oct 4 2008
Oct 1 2008
I'm happy to assign copyright for this patch to the FSF, if that's needed.
Sep 15 2008
Aug 8 2008
Interestingly, batch mode appears to detect the overflow. In that case,
overflows are silently rewritten to the creation timestamp plus one second:
Aug 7 2008
Actually, the capabilities *are* listed with the secret keys, as long as you
provide a string to match against. The only case where they aren't listed is
when there's no matching string.
Aug 5 2008
This seems to happen whether or not i'm logged in.
I've tested this with gnupg and gnupg2, and both seem to behave this way.
May 6 2008
Whoops! Of course, the second line of the demonstration should actually read:
Any word on this? The patch should be short enough for a quick review. It
problem can be demonstrated by setting GPGID to the key id of an RSA key, and doing:
Apr 11 2008
Apr 9 2008
gpgkey2ssh very poorly documented (no manpage, no help output), but it is
shipped with the source tarball, so i figure it should work properly at least
when the correct parameters are offered.