In T4726#130341, @werner wrote:This is a misunderstanding. The extraction of mail addresses is only doe for key lookups on remote services. Thus the -r case is as intended.
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Feed All Stories
All Stories
All Stories
Oct 23 2019
Oct 23 2019
ringelkrat added a comment to T4726: auto-key-locate only works with raw e-mail addresses (not angle-brackets).
• werner added a comment to T4726: auto-key-locate only works with raw e-mail addresses (not angle-brackets).
This is a misunderstanding. The extraction of mail addresses is only doe for key lookups on remote services. Thus the -r case is as intended.
• werner closed T4725: Dubious filename in literal data packet when encrypting with GPGME/GnuPGv1.4.23 as Wontfix.
That seems to be gpg 1.4 which we do not fully support.
ecc: clean up.
• gniibe committed rCec7d3d9f780f: ecc: Make sure the size of bytes is same (2). (authored by • gniibe).
ecc: Make sure the size of bytes is same (2).
• gniibe committed rCb280dbf75b99: ecc: Make sure the size of bytes is same. (authored by • gniibe).
ecc: Make sure the size of bytes is same.
justus added a comment to T4725: Dubious filename in literal data packet when encrypting with GPGME/GnuPGv1.4.23.
ringelkrat added a comment to T4726: auto-key-locate only works with raw e-mail addresses (not angle-brackets).
Is this task maybe related to T1927?
ringelkrat updated subscribers of T4726: auto-key-locate only works with raw e-mail addresses (not angle-brackets).
Thank you @dkg for creating the bug report! I would like to glean the following information from the above mentioned discussion.
Merge branch 'master' into gniibe/x448
ecc: ECDH clean up for use of ec->nbits.
• gniibe committed rCc5a7191c1bd1: ecc: Use opaque MPI for _gcry_ecc_mul_point. (authored by • gniibe).
ecc: Use opaque MPI for _gcry_ecc_mul_point.
• gniibe committed rCbbe15758c893: ecc: Fix _gcry_ecc_mont_decodepoint for data by old implementation. (authored by • gniibe).
ecc: Fix _gcry_ecc_mont_decodepoint for data by old implementation.
dkg added a comment to T4725: Dubious filename in literal data packet when encrypting with GPGME/GnuPGv1.4.23.
@justus can you provide an example of the gpgme code you're using that generates this weirdness?
Oct 22 2019
Oct 22 2019
• Charles86 created T4724: https://twitter.com/charleslewisni4/status/1051021429637025792?s=20 in the S1 Public space.
Merge branch 'master' into gniibe/x448
ecc: Fix key generation for ECDH.
Merge branch 'master' into gniibe/x448
Merge branch 'master' into gniibe/x448
ecc: Fix debug output.
ecc: Simplify using mpi_ec_t directly.
• gniibe committed rCe921ad5b3ad0: ecc: Add NAME member to struct mpi_ec_ctx_s. (authored by • gniibe).
ecc: Add NAME member to struct mpi_ec_ctx_s.
• gniibe committed rC5415bc578080: ecc: Consolidate with _gcry_mpi_ec_internal_new. (authored by • gniibe).
ecc: Consolidate with _gcry_mpi_ec_internal_new.
ecc: Fix for NBITS support.
• gniibe committed rCc7b97ac9bdf9: ecc: Add new function _gcry_mpi_ec_internal_new. (authored by • gniibe).
ecc: Add new function _gcry_mpi_ec_internal_new.
• gniibe committed rC488704be6e04: ecc: Add key generation support to mpi_ec_get_elliptic_curve. (authored by • gniibe).
ecc: Add key generation support to mpi_ec_get_elliptic_curve.
• gniibe committed rCc2aa333dd88b: ecc: Support flags and debug print in _gcry_mpi_ec_internal_new. (authored by • gniibe).
ecc: Support flags and debug print in _gcry_mpi_ec_internal_new.
• gniibe committed rC10b8cc280a53: ecc: Simplify ecc_encrypt_raw and ecc_decrypt_raw. (authored by • gniibe).
ecc: Simplify ecc_encrypt_raw and ecc_decrypt_raw.
• gniibe committed rCa258ae728de6: ecc: Simply use unsigned int for cofactor, not MPI. (authored by • gniibe).
ecc: Simply use unsigned int for cofactor, not MPI.
• gniibe committed rC61a051828253: ecc: More fixes for cofactor with PUBKEY_FLAG_PARAM. (authored by • gniibe).
ecc: More fixes for cofactor with PUBKEY_FLAG_PARAM.
Oct 21 2019
Oct 21 2019
rjhansen committed rDf5e0951e3e4e: Modified the PGPNET email address to reflect its new home. (authored by rjhansen).
Modified the PGPNET email address to reflect its new home.
Oct 19 2019
Oct 19 2019
paz added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.
On July, 19th, @werner wrote:
You need to wait a bit more.
Oct 18 2019
Oct 18 2019
Still unresolved...
Or... it could be a feature, not bug, so that failure of -e -r someone can be examined by --locate-keys someone.
ecc: Simplify compute_keygrip.
ecc: Clean up key generation code.
Let me clarify the point.
Oct 17 2019
Oct 17 2019
• werner committed rG76d606d95dc1: doc: Typo fix for gpg.texi in desc of --local-sigs. (authored by • werner).
doc: Typo fix for gpg.texi in desc of --local-sigs.
Valodim added a comment to T4593: dirmngr should not apply Kristian's CA when fetching from a keyserver that is not `hkps.pool.sks-keyservers.net`.
GnuPG ships a non-PKI certificate, specifically to authenticate hkps.pool.sks-keyservers.net. Now due to an implementation detail, this has been shown to potentially lead to authentication of other domains by this certificate, if a maintainer changes the default keyserver via the DIRMNGR_DEFAULT_KEYSERVER variable in configure.ac. Now arguably, this variable isn't exposed via ./configure, so it's not "officially" configurable - but evidently maintainers do want to change it. A trivial one-line patch was supplied to change the unintended and potentially security-problematic behavior into the (I believe) obviously intended one.
gpg: More fix of get_best_pubkey_byname.
I think that we should apply further change:
diff --git a/g10/getkey.c b/g10/getkey.c index 077209415..1c337149c 100644 --- a/g10/getkey.c +++ b/g10/getkey.c @@ -1369,7 +1369,7 @@ get_best_pubkey_byname (ctrl_t ctrl, enum get_pubkey_modes mode, *retctx = NULL;
I found more wrong cases of get_best_pubkey_byname.
For ranking results,
(1) It may return non-encryption primary key as the most relevant key, when its validity is higher.
(2) It may not select encryption primary key even if its creation time is newer.
• gniibe committed rG627a990f8e30: doc: Fix documentation about --locate-keys. (authored by • gniibe).
doc: Fix documentation about --locate-keys.
• gniibe committed rG286d4c607574: gpg: Fix two other cases in get_best_pubkey_byname. (authored by • gniibe).
gpg: Fix two other cases in get_best_pubkey_byname.
Oct 16 2019
Oct 16 2019
Fix building t-lock for WIN32
jukivili committed rCf9d8b5a0369c: hash-common: avoid integer division to reduce call overhead (authored by jukivili).
hash-common: avoid integer division to reduce call overhead
I also think this makes the most sense.
In my opinion, --locate-key should locate encryption key.
• gniibe committed rGf2734381ae14: gpg: Fix get_best_pubkey_byname to consider the first match. (authored by • gniibe).
gpg: Fix get_best_pubkey_byname to consider the first match.
Oct 15 2019
Oct 15 2019
rjhansen committed rD6f9f2ca94823: Revert "October 2019 review. See discussion in GnuPG-Users." (authored by rjhansen).
Revert "October 2019 review. See discussion in GnuPG-Users."
rjhansen committed rDb514e66bad27: Revert "October 2019 review. See discussion in GnuPG-Users." (authored by rjhansen).
Revert "October 2019 review. See discussion in GnuPG-Users."
rjhansen committed rD1c23025c02e3: October 2019 review. See discussion in GnuPG-Users. (authored by rjhansen).
October 2019 review. See discussion in GnuPG-Users.
rjhansen committed rD841a985f2a22: October 2019 review. See discussion in GnuPG-Users. (authored by rjhansen).
October 2019 review. See discussion in GnuPG-Users.
pow added a comment to T4654: Gemalto Ezio Shield (CT710): CCID command failed: Parameter error at offset 7.
@gniibe oh, I see thanks for pointing out precisely main the problem. I will check the hardware supply chain RoHS 2002/95/EC
There are some problems with the definition of --locate-key. Further discussion required.
• werner changed the status of T4665: gpg --delete-key of subkey leaves dangling subkey binding signature from Open to Testing.
• werner lowered the priority of T4665: gpg --delete-key of subkey leaves dangling subkey binding signature from Normal to Wishlist.
• werner committed rGd8052db74a0d: gpg: Also delete key-binding signature when deleting a subkey. (authored by • werner).
gpg: Also delete key-binding signature when deleting a subkey.
• werner committed rGd1bc12d1b66e: gpg: Also delete key-binding signature when deleting a subkey. (authored by • werner).
gpg: Also delete key-binding signature when deleting a subkey.
• gniibe committed rG2906636b929f: Revert "gpg: The first key should be in candidates." (authored by • gniibe).
Revert "gpg: The first key should be in candidates."
• werner committed rG652ca4b2bf98: gpg: Extend --quick-gen-key for creating keys from a card. (authored by • werner).
gpg: Extend --quick-gen-key for creating keys from a card.
• gniibe committed rG44604209c1cf: gpg: Put the first key in candidates correctly. (authored by • gniibe).
gpg: Put the first key in candidates correctly.
po: Update Japanese translation.
• gniibe committed rG66eb953f4380: gpg: The first key should be in candidates. (authored by • gniibe).
gpg: The first key should be in candidates.
• gniibe committed rG2924ac374eb8: gpg: Fix a memory leak in get_best_pubkey_byname. (authored by • gniibe).
gpg: Fix a memory leak in get_best_pubkey_byname.
scd,ccid: Add 08e6:34c2 (GEMPC_EZIO).
• gniibe added projects to T4654: Gemalto Ezio Shield (CT710): CCID command failed: Parameter error at offset 7: Restricted Project, scd.
@pow, thanks for a reference. But problem here is that there are multiple products with same name.
Oct 14 2019
Oct 14 2019
Laurent Montel <montel@kde.org> committed rLIBKLEOafe7635652c1: GIT_SILENT: Time to increase dependancy. Now we depend against new KF5… (authored by Laurent Montel <montel@kde.org>).
GIT_SILENT: Time to increase dependancy. Now we depend against new KF5…
Laurent Montel <montel@kde.org> committed rKLEOPATRA881779fcc637: GIT_SILENT: Time to increase dependancy. Now we depend against new KF5… (authored by Laurent Montel <montel@kde.org>).
GIT_SILENT: Time to increase dependancy. Now we depend against new KF5…
npreining added a comment to T2760: Populate comment field when exporting authentication key for SSH.
@werner Yes, that sounds great, and would help already a lot, but extending it for card keys would be optimal. Thanks for your work.
• werner edited projects for T2760: Populate comment field when exporting authentication key for SSH, added: gnupg (gpg23), ssh; removed gnupg.
In master (to be 2.3) you can add a Label: line into the sub key file of on-disk keys. I use this for quite some time now to show me alabel for my on-disk ssh keys so that I known which one was requested. We can and should extend this to card keys.
npreining added a comment to T2760: Populate comment field when exporting authentication key for SSH.
Same here, having YubiKeys and on-disk ssh keys from several computers, it is a bit a pain not to know which key is actually used. Any chances to get at least an update via manual editing of the comment?
Oct 12 2019
Oct 12 2019
• werner committed rG926cccef8541: doc: Fix c+p bug in the examples for --import-filter. (authored by • werner).
doc: Fix c+p bug in the examples for --import-filter.
• werner committed rGbeeab41e47d3: doc: Fix c+p bug in the examples for --import-filter. (authored by • werner).
doc: Fix c+p bug in the examples for --import-filter.
Oct 11 2019
Oct 11 2019
bjmgeek added a comment to T3020: Lock files not compatible between Windows and Linux (invalid size).
I've also noticed this issue on windows when trying to symlink %APPDATA%\gnupg to $HOME/.gnupg under msys32.
bjmgeek awarded T3020: Lock files not compatible between Windows and Linux (invalid size) a Haypence token.
• gniibe committed rCff0f1782560e: ecc: Handle ephemeral key as opaque octets. (authored by • gniibe).
ecc: Handle ephemeral key as opaque octets.
Laurent Montel <montel@kde.org> committed rLIBKLEOaab68f33c6d8: GIT_SILENT: Prepare 5.12.3 (authored by Laurent Montel <montel@kde.org>).
GIT_SILENT: Prepare 5.12.3
Laurent Montel <montel@kde.org> committed rKLEOPATRAacb3bc5fb57d: GIT_SILENT: Prepare 5.12.3 (authored by Laurent Montel <montel@kde.org>).
GIT_SILENT: Prepare 5.12.3
Oct 10 2019
Oct 10 2019
ecc: again.
ecc: Fix X448 entry.
