Page MenuHome GnuPG
Feed Advanced Search

Mar 4 2016

bernhard added projects to T2276: keyring_search failed and failed to rebuild keyring cache: Legacy key: gnupg (gpg21), gnupg, Bug Report.
Mar 4 2016, 3:04 PM · Bug Report, gnupg, gnupg (gpg21)

Mar 3 2016

aheinecke added projects to T2275: Corrupted keybox if created by gpgsm: gnupg (gpg21), gnupg, Bug Report.
Mar 3 2016, 6:20 PM · Bug Report, gnupg, gnupg (gpg21)
aheinecke set Version to 2.1.11 on T2275: Corrupted keybox if created by gpgsm.
Mar 3 2016, 6:20 PM · Bug Report, gnupg, gnupg (gpg21)
justus added a comment to T2235: gnupg-2.1.11, compile error for: make -f build-aux/speedo.mk native.

D344: 787_fix-2235.patch

Mar 3 2016, 1:58 PM · gnupg, dirmngr, Bug Report
justus closed T2235: gnupg-2.1.11, compile error for: make -f build-aux/speedo.mk native as Resolved.
Mar 3 2016, 1:58 PM · gnupg, dirmngr, Bug Report
justus added a comment to T2235: gnupg-2.1.11, compile error for: make -f build-aux/speedo.mk native.

I believe your problem is fixed in 9f0ba508. With that change I was able to
build gnupg-2.1.11 using speedo in a very minimal Debian jessie chroot.

To test this change, please apply the attached patch (generated using 'git diff
gnupg-2.1.11 dirmngr/Makefile.am' from gnupg master).

If the problem persists, feel free to reopen this bug.

Mar 3 2016, 1:58 PM · gnupg, dirmngr, Bug Report
justus claimed T2235: gnupg-2.1.11, compile error for: make -f build-aux/speedo.mk native.
Mar 3 2016, 12:33 PM · gnupg, dirmngr, Bug Report
justus added a comment to T2235: gnupg-2.1.11, compile error for: make -f build-aux/speedo.mk native.

That particular problem is fixed in 9a1778ab. Can you be more specific on the
other problem(s)?

Mar 3 2016, 12:33 PM · gnupg, dirmngr, Bug Report
justus closed T2261: Disable gpgtar tests when configured with --disable-gpgtar as Resolved.
Mar 3 2016, 12:27 PM · Bug Report, gnupg
justus added a comment to T2261: Disable gpgtar tests when configured with --disable-gpgtar.

Thanks for the patch, but I decided to fix it by skipping the test instead.

Fixed in a883d4c0.

Mar 3 2016, 12:27 PM · Bug Report, gnupg
neal added a comment to T2269: Session key encrypted with AES, but SED packet encrypted with AES256.

The reason that we encrypted the SED packet with AES256 is that is the preferred
cipher in my public key. I think that the cipher for the s2k function should be
chosen similarly.

Mar 3 2016, 10:37 AM · Bug Report, gnupg

Mar 2 2016

neal added projects to T2274: Data decrypted via a pk-esk packet should be better checked: gnupg, Bug Report.
Mar 2 2016, 8:47 PM · Bug Report, gnupg
neal updated subscribers of T2274: Data decrypted via a pk-esk packet should be better checked.
Mar 2 2016, 8:47 PM · Bug Report, gnupg
justus closed T2262: Use protable unix commands and arguments in tests as Resolved.
Mar 2 2016, 6:02 PM · Bug Report, gnupg
justus added a comment to T2262: Use protable unix commands and arguments in tests.

Merged, thanks!

Mar 2 2016, 6:02 PM · Bug Report, gnupg
justus added a comment to T2258: successive runs of `gpg-agent --enable-ssh-support` kills the $SSH_AUTH_SOCK file.

Fixed in 3e1b451c.

Mar 2 2016, 5:05 PM · gnupg, Bug Report
justus closed T2258: successive runs of `gpg-agent --enable-ssh-support` kills the $SSH_AUTH_SOCK file as Resolved.
Mar 2 2016, 5:05 PM · gnupg, Bug Report
justus claimed T2258: successive runs of `gpg-agent --enable-ssh-support` kills the $SSH_AUTH_SOCK file.
Mar 2 2016, 3:56 PM · gnupg, Bug Report
justus added a project to T2258: successive runs of `gpg-agent --enable-ssh-support` kills the $SSH_AUTH_SOCK file: gnupg.
Mar 2 2016, 3:56 PM · gnupg, Bug Report

Mar 1 2016

neal added projects to T2270: gpg caches bad symmetric passwords: gnupg, Bug Report.
Mar 1 2016, 9:49 PM · Bug Report, gnupg
neal added projects to T2269: Session key encrypted with AES, but SED packet encrypted with AES256: gnupg, Bug Report.
Mar 1 2016, 8:20 PM · Bug Report, gnupg
neal closed T2252: Provide --alternate-keyserver to avoid "No valid OpenPGP data found" response as Resolved.
Mar 1 2016, 11:53 AM · gnupg, OpenPGP, Feature Request
neal added a comment to T2252: Provide --alternate-keyserver to avoid "No valid OpenPGP data found" response.

Marking as resolved since this is available in 2.1 and we are not going to
backport this to 1.4 or 2.0. Thanks.

Mar 1 2016, 11:53 AM · gnupg, OpenPGP, Feature Request
aheinecke added projects to T2267: Fix "Invalid Parameter passed to C runtime function" warnings on Windows: Feature Request, gpgagent, gnupg.
Mar 1 2016, 9:49 AM · Windows 32, Windows, gnupg, gpgagent, Feature Request

Feb 25 2016

neal removed a project from T2187: gpg2 --gen-revoke 0x${FINGERPRINT} produces infinite output stream: Restricted Project.
Feb 25 2016, 11:19 AM · Bug Report, gnupg
neal closed T2187: gpg2 --gen-revoke 0x${FINGERPRINT} produces infinite output stream as Resolved.
Feb 25 2016, 11:19 AM · Bug Report, gnupg
neal added a comment to T2187: gpg2 --gen-revoke 0x${FINGERPRINT} produces infinite output stream.

I assume that this patch solved the problem. Thanks for reporting!

Feb 25 2016, 11:19 AM · Bug Report, gnupg

Feb 24 2016

sa added a comment to T1967: GnuPG should select a key for signing without trying to use missing subkeys.

Attached a patch to call agent_probe_secret_key() during finish_lookup().

This partially solves the problem by not trying to use subkeys that have no
secret key present. This does not unexpectedly change the existing behaviour
because GnuPG will currently return an error if the automatically selected
secret key is not present.

It does not solve the issue of having multiple potential signing subkeys on
different smartcards, because these are always considered to be present (if the
subkey has been associated with a smartcard).

Feb 24 2016, 9:39 PM · gnupg (gpg22), Feature Request
sa added a comment to T1967: GnuPG should select a key for signing without trying to use missing subkeys.

D297: 785_sign-fix.patch

Feb 24 2016, 9:39 PM · gnupg (gpg22), Feature Request
guilhem added a comment to T2236: Importing a key with badly ordered packets doesn't reorder it, and while --edit-key does reorder it doesn't move the signature packets to the right place.

Hi Neal,

Thanks for the patch, works great on the couple of keys I tried it on.
Unfortunately I'm unsure how to build OpenPGP keys with deliberately wrongly
ordered packets, so my tests are probably not exhaustive :-( But looking at
your code (from an outsider's perspective), I can't see how revocation
certificates etc would be handled differently from certificate signatures.

I found two issues though:

+ ndataa = pubkey_get_nsig (a->pubkey_algo);
+ ndatab = pubkey_get_nsig (a->pubkey_algo);

I guess it should be "b->pubkey_algo" on the second line.

Also, since the "check" command of the GnuPG prompt can modify the keyblock, it
should set "modify" accordingly:

-8<----------------------------------------------------------------------------------->8-
diff --git a/g10/keyedit.c b/g10/keyedit.c
index d7c2a4b..ede350a 100644

  • a/g10/keyedit.c

+++ b/g10/keyedit.c
@@ -2190,8 +2190,9 @@ keyedit_menu (ctrl_t ctrl, const char *username, strlist_t
locusr,

         break;

       case cmdCHECK:
  • check_all_keysigs (keyblock, count_selected_uids (keyblock),
  • !strcmp (arg_string, "selfsig"));

+ if (check_all_keysigs (keyblock, count_selected_uids (keyblock),
+ !strcmp (arg_string, "selfsig")))
+ modified = 1;

         break;

       case

cmdSIGN:-8<----------------------------------------------------------------------------------->8-

I understand that by default only selfsigs are reordered for performance
reasons. May I suggest to also consider the key to sign with (for instance
specified with "--local-user")? This can be useful, otherwise in order to avoid
potential duplicates signers might have to type "check" before signing a key.

Also (repeating what we discussed about on IRC so it gets indexed on the web :-)
Due to the append-only nature of keyservers, an uploaded badly ordered key
can't be fixed on the keyserver. As a consequence, with the current algorithm
each refresh would undo fixing the packets' order and removing the duplicates.
Ideally keys would be reordered upon import, and the merge algorithm would avoid
duplicate (for instance it could assume the local copy to be properly ordered,
and not add a packet to the local copy if said packet was found elsewhere on the
keyblock).

Feb 24 2016, 6:25 PM · gnupg (gpg22), Bug Report
lorenz added a comment to T2230: gpgsm decryption with smartcard fails with "Invalid session key".

For what it's worth, with the following trivial patch the decryption works:

diff --git a/sm/decrypt.c b/sm/decrypt.c
index a560272..aa6e874 100644

  • a/sm/decrypt.c

+++ b/sm/decrypt.c
@@ -74,9 +74,9 @@ prepare_decryption (ctrl_t ctrl, const char *hexkeygrip, const
char *desc,

    log_printhex ("pkcs1 encoded session key:", seskey, seskeylen);

  n=0;
  • if (seskeylen == 24)

+ if (seskeylen == 24 || seskeylen == 16)

{
  • /* Smells like a 3-des key. This might happen because a SC has

+ /* Smells like a 3-des or AES key. This might happen because a SC has

          already done the unpacking. */
     }
   else

I am not sure this is a good solution, though, it is probably better to somehow
pass along the information whether the padding is already stripped or not.

Kind regards,

Lorenz
Feb 24 2016, 4:05 PM · Restricted Project, gnupg, scd, Bug Report, S/MIME
aheinecke set Version to 2.1.11 on T2266: Gpg4win: Migrate Keyring to Keybox.
Feb 24 2016, 3:57 PM · Feature Request, gnupg, gpg4win
aheinecke added projects to T2266: Gpg4win: Migrate Keyring to Keybox: gpg4win, gnupg, Bug Report.
Feb 24 2016, 3:57 PM · Feature Request, gnupg, gpg4win
aheinecke added a comment to T2135: Keyring locking on Windows broken.

I've tested it with pubring now too and it works.
Justus mentioned in jabber that he noticed some more errors after this patch in
the scheme tests. I've not tried them.

Feb 24 2016, 3:39 PM · Bug Report, gpg4win, Windows, gnupg, Windows 32
werner lowered the priority of T2135: Keyring locking on Windows broken from High to Normal.
Feb 24 2016, 2:24 PM · Bug Report, gpg4win, Windows, gnupg, Windows 32
werner added a comment to T2135: Keyring locking on Windows broken.

Okay, so I can backport this to 2.0 ?

Feb 24 2016, 2:24 PM · Bug Report, gpg4win, Windows, gnupg, Windows 32

Feb 22 2016

aheinecke added a comment to T2135: Keyring locking on Windows broken.

Tested this with keybox and it appears to be working. When running a keylist
while importing the import holds for a bit and continues after the keylist.
Not tested this with keyring yet.

Feb 22 2016, 11:14 AM · Bug Report, gpg4win, Windows, gnupg, Windows 32

Feb 19 2016

neal added a comment to T2229: make check 14 0f 35 tests failed.

Thanks! I'm mark this as resolved.

Feb 19 2016, 6:59 PM · Bug Report, gnupg
neal removed a project from T2229: make check 14 0f 35 tests failed: Restricted Project.
Feb 19 2016, 6:59 PM · Bug Report, gnupg
neal closed T2229: make check 14 0f 35 tests failed as Resolved.
Feb 19 2016, 6:59 PM · Bug Report, gnupg
neal added a project to T2236: Importing a key with badly ordered packets doesn't reorder it, and while --edit-key does reorder it doesn't move the signature packets to the right place: Restricted Project.
Feb 19 2016, 6:57 PM · gnupg (gpg22), Bug Report
neal added a comment to T2236: Importing a key with badly ordered packets doesn't reorder it, and while --edit-key does reorder it doesn't move the signature packets to the right place.

I've pushed a slightly different version of this patch (2d1d795). Please test
not only that --edit-key detects duplicates and reorders out of place
signatures, but also that revocation certifications, self-sigs, etc. are
correctly checked. Thanks!

Feb 19 2016, 4:42 PM · gnupg (gpg22), Bug Report
uldis added projects to T2262: Use protable unix commands and arguments in tests: gnupg, Bug Report.
Feb 19 2016, 8:04 AM · Bug Report, gnupg
uldis added a comment to T2262: Use protable unix commands and arguments in tests.

D363: 781_gnupg_test_with_portable_shell_commands.patch

Feb 19 2016, 8:04 AM · Bug Report, gnupg
uldis added a comment to T2261: Disable gpgtar tests when configured with --disable-gpgtar.

D362: 780_gnupg_do_not_run_gpgtar_test_when_not_built.patch

Feb 19 2016, 8:00 AM · Bug Report, gnupg
uldis added projects to T2261: Disable gpgtar tests when configured with --disable-gpgtar: gnupg, Bug Report.
Feb 19 2016, 8:00 AM · Bug Report, gnupg

Feb 18 2016

t8m added a comment to T2229: make check 14 0f 35 tests failed.

Yes, that patch fixed the problem for me.

Feb 18 2016, 5:24 PM · Bug Report, gnupg

Feb 16 2016

neal added a comment to T2250: OpenPGP ASCII armor should be more robust.

I've pushed this.

Feb 16 2016, 4:45 PM · gnupg, Feature Request
neal closed T2250: OpenPGP ASCII armor should be more robust as Resolved.
Feb 16 2016, 4:45 PM · gnupg, Feature Request
neal added a comment to T2236: Importing a key with badly ordered packets doesn't reorder it, and while --edit-key does reorder it doesn't move the signature packets to the right place.

The branch neal/issue2236 contains an initial fix. It does two things:

  • It identifies duplicate signatures (based on their message digest) and removes

duplicates.

  • Instead of blindly moving signatures around, this systematically tests each

signature against its alleged component (= primary key / subkey / user id) and
if it is bad, it tries the other components in the key block and moves it if
appropriate. (If it doesn't belong to any components, then the sig is just left
where it is and GnuPG will ignore it).

I've tested this with a few keys and it seems to work well. Lucas' key just has
a lot of duplicate signatures.

Starting program: /home/us/neal/work/gpg/build/gnupg/g10/gpg2 --check-key
0x06EAA066E397832F
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
gpg: WARNING: unsafe permissions on homedir '/tmp/luca'
gpg: NOTE: THIS IS A DEVELOPMENT VERSION!
gpg: It is only intended for test purposes and should NOT be
gpg: used in a production environment or with production keys!
gpg: Ignored 852 duplicate signatures (total: 2079).
gpg: public key E397832F: timestamp: 2009-07-01 14:44:59 (1246459499)
gpg: user id: Luca Capello <luca@pca.it>
gpg: sig: class: 0x10, issuer: 109E6244, timestamp: 2013-02-05 02:24:16
(1360031056), digest: eb c3
gpg: Good signature over last major component!
gpg: sig: class: 0x13, issuer: E397832F, timestamp: 2009-07-01 14:44:59
(1246459499), digest: 93 7a
gpg: Good signature over last major component!
gpg: sig: class: 0x13, issuer: E397832F, timestamp: 2009-07-01 14:58:17
(1246460297), digest: 53 4f
gpg: Good signature over last major component!
gpg: sig: class: 0x13, issuer: E397832F, timestamp: 2010-10-10 21:44:51
(1286747091), digest: be d5
gpg: Good signature over last major component!
gpg: user id: Luca Capello <gismo@debian.org>
gpg: sig: class: 0x10, issuer: 109E6244, timestamp: 2013-02-05 02:24:16
(1360031056), digest: 4e 92
gpg: Good signature over last major component!
gpg: sig: class: 0x13, issuer: E397832F, timestamp: 2009-07-01 14:57:12
(1246460232), digest: 9c 3d
gpg: Good signature over last major component!
gpg: sig: class: 0x13, issuer: E397832F, timestamp: 2010-10-10 21:52:18
(1286747538), digest: 54 c1
gpg: Good signature over last major component!
gpg: user id: Luca Capello <luca.capello@infomaniak.ch>
gpg: sig: class: 0x13, issuer: E397832F, timestamp: 2016-01-24 14:44:42
(1453646682), digest: 79 a4
gpg: Good signature over last major component!
gpg: user id: Luca Capello <luca.capello@infomaniak.com>
gpg: sig: class: 0x13, issuer: E397832F, timestamp: 2016-01-29 22:49:59
(1454107799), digest: 43 19
gpg: Good signature over last major component!
gpg: subkey 2BB95F4B: timestamp: 2009-07-01 14:55:55 (1246460155)
gpg: sig: class: 0x18, issuer: E397832F, timestamp: 2009-07-01 14:55:55
(1246460155), digest: 4b d9
gpg: Good signature over last major component!
gpg: subkey 3BE9F36D: timestamp: 2009-07-01 15:09:03 (1246460943)
gpg: sig: class: 0x18, issuer: E397832F, timestamp: 2009-07-01 15:09:03
(1246460943), digest: c2 f9
gpg: Good signature over last major component!
gpg: Couldn't check 1216 signatures due to missing issuer keys.

Interestingly, your key contains a bad signature (the hash has been corrupted).

The reason that I haven't pushed this to master is that I need to work our how
the output should look. Also, this functionality will probably only be
available via the --edit-key menu. This patch includes an argument --check-key,
which will probably be removed.

If you have an opportunity to test this, I'd appreciate it.

Feb 16 2016, 3:56 PM · gnupg (gpg22), Bug Report
dkg added a comment to T2134: iconv.dll is still a problem.

fwiw, i've now got most of GnuPG cross-building for win32 from a debian platform
using win-iconv. win-iconv doesn't seem to be a terrible choice to me.

Feb 16 2016, 8:10 AM · Feature Request, gnupg

Feb 15 2016

werner added a comment to T2250: OpenPGP ASCII armor should be more robust.

Great

Feb 15 2016, 8:50 PM · gnupg, Feature Request
werner added a comment to T2252: Provide --alternate-keyserver to avoid "No valid OpenPGP data found" response.

I guess you are reporting for GnuPG 2.0 or 1.4.
We already implemented your suggestion in 2.1.

Feb 15 2016, 8:44 PM · gnupg, OpenPGP, Feature Request
justus added a comment to T2250: OpenPGP ASCII armor should be more robust.

Yes, that patch works for me.

Feb 15 2016, 11:33 AM · gnupg, Feature Request

Feb 14 2016

neal closed T2240: calc_header_length as Resolved.
Feb 14 2016, 4:25 PM · Bug Report, gnupg
neal added a comment to T2240: calc_header_length.

Given how trivial the fix is, I applied that.

Feb 14 2016, 4:25 PM · Bug Report, gnupg
neal added a comment to T2250: OpenPGP ASCII armor should be more robust.

The following simple patch works for me and make check still passes. I think it
makes sense to apply this patch given that this workaround is no more
complicated than an existing workaround for something similar (immediately
preceding my change). Can you please test to make sure it works for you?

Feb 14 2016, 4:02 PM · gnupg, Feature Request
neal added a comment to T2250: OpenPGP ASCII armor should be more robust.

D351: 776_0001-gpg-Make-ASCII-armor-decoding-more-robust-to-encodin.patch

Feb 14 2016, 4:02 PM · gnupg, Feature Request
neal added a comment to T2255: Doesn't import secret key on console mode.

gpg doesn't normally directly ask for a password. Instead, operations that
require a password are typically handled by gpg-agent, which is a small server
that is started on demand. (Normally, there is only a single gpg-agent per
user.) When gpg-agent needs a password, it invokes a pinentry program. The
default pinentry can be determined using `gpgconf --list-config'. This can be
overridden using the pinentry-program configuration option in gpg-agent.conf.
(If you change that file, you'll need to restart gpg-agent using something like
`gpgconf --reload gpg-agent'.)

There are several different pinentry programs: pinentry-gtk-2, pinentry-qt,
pinentry-curses and pinentry-tty. (pinentry is typically an alias that is
configured by the system's package manager.) Even if you use pinentry-gtk-2, it
will normally fall back the curses backend if there is no X display.

The issue you might be having is that pinentry might be showing up on a
different display / console.

So, I think this might just be a configuration problem. Nevertheless, I
encourage you to investigate some more and try to figure out what is going on
and report back here. Thanks!

Feb 14 2016, 3:03 PM · Not A Bug, Bug Report, gnupg

Feb 13 2016

gjuniioor added projects to T2255: Doesn't import secret key on console mode: gnupg, Bug Report.
Feb 13 2016, 7:36 AM · Not A Bug, Bug Report, gnupg

Feb 12 2016

neal added a comment to T2229: make check 14 0f 35 tests failed.

This should be fixed in acac103. (I was able to exactly reproduce your problem
and the patch fixed it for me.) If you are able to test and it works for you,
please report back here.

Thanks!

Feb 12 2016, 10:13 PM · Bug Report, gnupg
neal added a project to T2229: make check 14 0f 35 tests failed: Restricted Project.
Feb 12 2016, 10:13 PM · Bug Report, gnupg
uldis added a comment to T2251: Tests not working if build folder path longer than 81 character.

Note, tests work together with patch from T2253

Feb 12 2016, 5:10 PM · Bug Report, gnupg
uldis lowered the priority of T2251: Tests not working if build folder path longer than 81 character from Normal to Low.
Feb 12 2016, 5:07 PM · Bug Report, gnupg
uldis added a comment to T2251: Tests not working if build folder path longer than 81 character.

Attached patch for gpg-preset-passphrase. eval_redirect code copied from
libassuna and modifies.
Second patch creates socked redirection for tests if neccesary

Feb 12 2016, 5:07 PM · Bug Report, gnupg
uldis added a project to T2251: Tests not working if build folder path longer than 81 character: Bug Report.
Feb 12 2016, 5:07 PM · Bug Report, gnupg
uldis removed a project from T2251: Tests not working if build folder path longer than 81 character: Feature Request.
Feb 12 2016, 5:07 PM · Bug Report, gnupg
uldis added a comment to T2251: Tests not working if build folder path longer than 81 character.

D352: 769_gnupg2-2.1.11_redirect_socket_for_tests.patch

Feb 12 2016, 5:05 PM · Bug Report, gnupg
uldis added a comment to T2251: Tests not working if build folder path longer than 81 character.

D353: 768_gnupg2-2.1.11_gpg_preset_passphrase_socket_redirect.patch

Feb 12 2016, 5:05 PM · Bug Report, gnupg
werner added a comment to T2229: make check 14 0f 35 tests failed.

From looking at the strace in T2229 (t8m on Feb 02 2016, 10:32 AM / Roundup) it seems that the client died after
having seen the first PROGRESS line. The client in this case is
gpg-preset-passphrase which is an old hack and not a proper Assuan
client. It received the 'S PROGRESS' line but does not expect it and
returns an error.

We should re-implement that tool in terms of gpg-connect-agent and for
the test scripts use gpg-connect-agent directly. Justus is currently
reworking the test suite anyway.

Feb 12 2016, 1:34 PM · Bug Report, gnupg
neal added a comment to T2250: OpenPGP ASCII armor should be more robust.

It seems like detecting and correcting this simple manging would be
straightforward to do and relatively self contained.

Feb 12 2016, 1:33 PM · gnupg, Feature Request
mdeslaur added a comment to T2246: Regression: home dir no longer automatically created.

Patch looks good, thanks!

Feb 12 2016, 1:10 PM · Bug Report, gnupg
uldis added a comment to T2251: Tests not working if build folder path longer than 81 character.

My mistake. I was talking about gpg-preset-passphrase.
Redirect in gpg-agent works as expected.

Feb 12 2016, 10:10 AM · Bug Report, gnupg
gniibe added a comment to T2246: Regression: home dir no longer automatically created.

Sorry, here it is.

Feb 12 2016, 6:32 AM · Bug Report, gnupg
gniibe added a comment to T2246: Regression: home dir no longer automatically created.

D347: 767_0001-g10-Make-sure-to-have-the-directory-for-trustdb-v3.patch

Feb 12 2016, 6:32 AM · Bug Report, gnupg
mdeslaur added a comment to T2246: Regression: home dir no longer automatically created.

I think you attached the original patch once again by mistake...

Feb 12 2016, 5:54 AM · Bug Report, gnupg
gniibe added a comment to T2246: Regression: home dir no longer automatically created.

D348: 766_0001-g10-Make-sure-to-have-the-directory-for-trustdb-v3.patch

Feb 12 2016, 1:59 AM · Bug Report, gnupg
gniibe added a comment to T2246: Regression: home dir no longer automatically created.

This would be final version.
If !create, we can let it return earlier.

Feb 12 2016, 1:59 AM · Bug Report, gnupg
gniibe added a comment to T2246: Regression: home dir no longer automatically created.

You are right to have the check against CREATE.
I'll include that check.

Feb 12 2016, 1:39 AM · Bug Report, gnupg

Feb 11 2016

friendlydev added projects to T2252: Provide --alternate-keyserver to avoid "No valid OpenPGP data found" response: Feature Request, OpenPGP, gnupg.
Feb 11 2016, 6:50 PM · gnupg, OpenPGP, Feature Request
guilhem added a comment to T2236: Importing a key with badly ordered packets doesn't reorder it, and while --edit-key does reorder it doesn't move the signature packets to the right place.

I found the following comment above g10/keyedit.c' fix_key_signature_order
function, which is responsible for printing the "moving a key signature to the
correct place" lines upon --edit-key.

  /*
   * There are some keys out (due to a bug in gnupg), where the sequence
   * of the packets is wrong.  This function fixes that.
   * Returns: true if the keyblock has been fixed.
   *        
   * Note:  This function does not work if there is more than one user ID.
   */

When was the mentioned bug introduced and fixed? git blame tells me the comment
predates Thu Jun 5 07:14:21 2003 +0000, date when cvs2svn created branch
'GNUPG-1-9-BRANCH' (commit 72503314). But Lucas' key was generated much later,
on 2009-07-01.

Of the 100 keys with lowest MSD http://pgp.cs.uu.nl/doc/top_1000.html, 27 have
badly ordered packets; 26 of these have multiple UIDs; and only 20 of the 120
uids with a creation date have been generated before 2009-07-01.

Is there a technical reason which "This function does not work if there is more
than one user ID"? (I guess gpg could try to verify the sig against each
UID/UAT to find out which one it binds to.) Or is Luca's key (among many
others) broken from a WoT perspective due to the multiple UIDs?

Feb 11 2016, 4:41 PM · gnupg (gpg22), Bug Report
uldis set Version to 2.1.11 on T2251: Tests not working if build folder path longer than 81 character.
Feb 11 2016, 4:16 PM · Bug Report, gnupg
uldis added projects to T2251: Tests not working if build folder path longer than 81 character: Feature Request, gnupg.
Feb 11 2016, 4:16 PM · Bug Report, gnupg
justus set Version to 2.1.11 on T2250: OpenPGP ASCII armor should be more robust.
Feb 11 2016, 10:43 AM · gnupg, Feature Request
justus added projects to T2250: OpenPGP ASCII armor should be more robust: Feature Request, gnupg.
Feb 11 2016, 10:43 AM · gnupg, Feature Request

Feb 10 2016

mdeslaur added a comment to T2246: Regression: home dir no longer automatically created.

D349: 765_0001-g10-Make-sure-to-have-the-directory-for-trustdb-v2.patch

Feb 10 2016, 1:23 PM · Bug Report, gnupg
mdeslaur added a comment to T2246: Regression: home dir no longer automatically created.

Thanks for the patch, but it still needs a small change. You don't want to
create the directory or the lock file if the user specified --no-auto-check-trustdb.

How about this patch?

Feb 10 2016, 1:23 PM · Bug Report, gnupg
gniibe added a project to T2246: Regression: home dir no longer automatically created: Restricted Project.
Feb 10 2016, 2:37 AM · Bug Report, gnupg
gniibe added a comment to T2246: Regression: home dir no longer automatically created.

Please try attached patch.
While I understand it's a regression (and it's urgent for you), I downgrade the
priority.
It will be soon in the repo.

Feb 10 2016, 2:37 AM · Bug Report, gnupg
gniibe added a comment to T2246: Regression: home dir no longer automatically created.

D350: 764_0001-g10-Make-sure-to-have-the-directory-for-trustdb.patch

Feb 10 2016, 2:37 AM · Bug Report, gnupg
gniibe lowered the priority of T2246: Regression: home dir no longer automatically created from High to Normal.
Feb 10 2016, 2:37 AM · Bug Report, gnupg
gniibe added a comment to T2246: Regression: home dir no longer automatically created.

Thank you for the report. Confirmed. It was my mistake, I didn't test the code
path with no homedir.

Feb 10 2016, 12:53 AM · Bug Report, gnupg
gniibe claimed T2246: Regression: home dir no longer automatically created.
Feb 10 2016, 12:53 AM · Bug Report, gnupg
gniibe closed T2150: Generating keys on OpenPGP card yields wrong public key as Resolved.
Feb 10 2016, 12:25 AM · Bug Report, gnupg, gnupg (gpg21)
gniibe removed a project from T2150: Generating keys on OpenPGP card yields wrong public key: Restricted Project.
Feb 10 2016, 12:25 AM · Bug Report, gnupg, gnupg (gpg21)

Feb 8 2016

mdeslaur added projects to T2246: Regression: home dir no longer automatically created: gnupg, Bug Report.
Feb 8 2016, 2:42 PM · Bug Report, gnupg

Feb 5 2016

dkg added a comment to T2134: iconv.dll is still a problem.

I'm also interested in this, since i want to make it possible to easily build a
win32 version of gpgv.exe on debian systems. This is possible without iconv at
all in 1.4.x, but i would rather we ship a gpgv from 2.1.x in the future.

Feb 5 2016, 4:38 PM · Feature Request, gnupg

Feb 2 2016

neal added a comment to T2241: Encrypt to all encryption subkeys.

Why is this a reasonable assumption? This proposal changes the way that GnuPG
has been working for years and will inevitably break someone's setup. It would
be much better for the receiver to use a non-critical notation to indicate the
desired behavior.

Feb 2 2016, 8:27 PM · gnupg, OpenPGP, Feature Request
neal added a comment to T2240: calc_header_length.

D345: 761_0001-gpg-Fix-calc_header_length-when-LEN-is-0-and-improve.patch

Feb 2 2016, 8:11 PM · Bug Report, gnupg
neal added a comment to T2240: calc_header_length.

Since it was so trivial to create, I've attach an alternative patch with my
proposed change. Please let me know which one to apply.

Feb 2 2016, 8:11 PM · Bug Report, gnupg