Page MenuHome GnuPG
Feed Advanced Search

Nov 2 2023

ciudadex added a comment to T6783: Import secret keys created in Kleopatra with Windows 11 to Ubuntu.

thanks for your reply
gpg -K
gpg: enabled debug flags: memstat
/home/usernet/.gnupg/pubring.kbx
uid [ absoluta ]
uid [ absoluta ]
ssb cv25519 2022-02-13 [E]
gpg -h
gpg (GnuPG) 2.2.4
libgcrypt 1.8.1
Copyright (C) 2017 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later https://gnu.org/licenses/gpl.html
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.

Nov 2 2023, 6:59 PM · Ubuntu, gnupg, Support
werner triaged T6783: Import secret keys created in Kleopatra with Windows 11 to Ubuntu as Normal priority.

It is a bit hard for us to decipher the Spanish diagnostics. Before we can try to help you please update to a deent version of gpg and libgcrypt. At least the version for Ubuntu is way too old; Libgcrypt is 5 years old, the current version of the lTS branch is 1.8.10. GnuPG is also 10 years old and in the mean time we have fixed several critical bugs; the current version of this legacy branch is 2.2.41! Note that Ubuntu might have fixed some bugs despit ethe version number - we just can't know.

Nov 2 2023, 8:33 AM · Ubuntu, gnupg, Support

Apr 13 2023

gniibe closed T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt as Resolved.

Fixed in 1.10.2.

Apr 13 2023, 3:13 AM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS

Mar 8 2023

gniibe moved T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt from Backlog to Next on the FIPS board.
Mar 8 2023, 2:39 AM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS
gniibe changed the status of T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt from Open to Testing.

Thank you.
Applied to both (master and 1.10).

Mar 8 2023, 2:39 AM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS

Mar 6 2023

tobhe added a comment to T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.

Right, thanks for the review! Updated patches below.

Mar 6 2023, 5:11 PM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS
Jakuje added a comment to T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.

Actually, the same issue is in the mac case, which I missed on first couple of reviews:

-  enum gcry_mac_algos alg = va_arg (arg_ptr, enum gcry_cipher_algos);
+  enum gcry_mac_algos alg = va_arg (arg_ptr, enum gcry_mac_algos);
Mar 6 2023, 5:01 PM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS
Jakuje added a comment to T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.

Going through the code once more, there is one typo to be fixed:

+_gcry_fips_indicator_md (va_list arg_ptr)
+{
+  enum gcry_md_algos alg = va_arg (arg_ptr, enum gcry_cipher_algos);

should say

+_gcry_fips_indicator_md (va_list arg_ptr)
+{
+  enum gcry_md_algos alg = va_arg (arg_ptr, enum gcry_md_algos);

otherwise ack.

Mar 6 2023, 4:46 PM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS

Mar 1 2023

Jakuje added a comment to T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.

We came to the same conclusion -- the SHAKE digests are not usable for sign/verify operations the way how it is implemented now. But it would be more clear if we would have explicit allow-list.

Mar 1 2023, 7:57 PM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS
tobhe added a comment to T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.

After consulting with our certs lab and studying the code I think SHAKE should not be a problem for now. All of the _gcry_digest_spec_shakeXXX seem to neither have an mdlen nor a read() function. pk_sign and pk_verify seem to both call md_read() which should fail because of the missing read function, kdf checks _gcry_md_get_algo_dlen() which should also disallow SHAKE.

Mar 1 2023, 12:55 PM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS

Feb 27 2023

tobhe added a comment to T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.

Good catch. A similar problem might arise with SHA384 according to section D.R which states

Feb 27 2023, 3:15 PM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS
neverpanic added a comment to T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.

One potential pitfall here is that SHAKE-128 and SHAKE-256 must not be available for use in signature operations. That's because https://csrc.nist.gov/CSRC/media/Projects/cryptographic-module-validation-program/documents/fips%20140-3/FIPS%20140-3%20IG.pdf section C.C disallows the use of SHAKE in higher-level algorithms:

Feb 27 2023, 3:01 PM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS
neverpanic added a comment to T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.

These look good to me.

Feb 27 2023, 1:45 PM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS
tobhe added a comment to T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.

Right, we have received the same feedback from our cert lab but I haven't found time to update the bug yet. Here are the updated patches:

Feb 27 2023, 12:19 PM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS
neverpanic added a comment to T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.

This marks GCRY_MD_CRC32, GCRY_MD_CRC24_RFC2440 and GCRY_MD_CRC32_RFC1510 as approved.

Feb 27 2023, 11:44 AM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS

Feb 16 2023

werner triaged T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt as Low priority.
Feb 16 2023, 11:43 AM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS
tobhe created T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.
Feb 16 2023, 3:41 AM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS

Sep 27 2022

tobhe added a member for Ubuntu: tobhe.
Sep 27 2022, 1:38 AM

Feb 12 2021

werner closed T5259: Release Libgcrypt 1.9.1, a subtask of T5271: libgcrypt 1.9.0 compilation fails on Ubuntu xenial, as Resolved.
Feb 12 2021, 12:34 PM · Ubuntu, Bug Report, libgcrypt

Jan 29 2021

werner closed T5271: libgcrypt 1.9.0 compilation fails on Ubuntu xenial as Resolved.
Jan 29 2021, 11:27 AM · Ubuntu, Bug Report, libgcrypt
werner changed the status of T5259: Release Libgcrypt 1.9.1, a subtask of T5271: libgcrypt 1.9.0 compilation fails on Ubuntu xenial, from Open to Testing.
Jan 29 2021, 11:25 AM · Ubuntu, Bug Report, libgcrypt
werner added a subtask for T5271: libgcrypt 1.9.0 compilation fails on Ubuntu xenial: T5259: Release Libgcrypt 1.9.1.
Jan 29 2021, 10:21 AM · Ubuntu, Bug Report, libgcrypt
werner removed a parent task for T5271: libgcrypt 1.9.0 compilation fails on Ubuntu xenial: T5259: Release Libgcrypt 1.9.1.
Jan 29 2021, 10:20 AM · Ubuntu, Bug Report, libgcrypt
gniibe added a parent task for T5271: libgcrypt 1.9.0 compilation fails on Ubuntu xenial: T5259: Release Libgcrypt 1.9.1.
Jan 29 2021, 1:04 AM · Ubuntu, Bug Report, libgcrypt

Jan 28 2021

syscomet added a comment to T5271: libgcrypt 1.9.0 compilation fails on Ubuntu xenial.

Patch lets it build on xenial for me, thank you.

Jan 28 2021, 11:00 PM · Ubuntu, Bug Report, libgcrypt
jukivili added a comment to T5271: libgcrypt 1.9.0 compilation fails on Ubuntu xenial.

Patch for this bug is available here, "attachment-0001.bin": https://lists.gnupg.org/pipermail/gcrypt-devel/2021-January/005079.html

Jan 28 2021, 7:50 PM · Ubuntu, Bug Report, libgcrypt
syscomet added a comment to T5271: libgcrypt 1.9.0 compilation fails on Ubuntu xenial.

I committed the partial result docker container, so I can restart it for investigation. So:

Jan 28 2021, 7:42 PM · Ubuntu, Bug Report, libgcrypt
jukivili added a comment to T5271: libgcrypt 1.9.0 compilation fails on Ubuntu xenial.

I tested xenial with gcc-5.3 (xenial distro repo) and gcc-5.4 (xenial-updates distro repo) and libgcrypt 1.9.0 from git repo and from tarball. I did not get any errors.

Jan 28 2021, 7:56 AM · Ubuntu, Bug Report, libgcrypt
werner created T5271: libgcrypt 1.9.0 compilation fails on Ubuntu xenial.
Jan 28 2021, 7:30 AM · Ubuntu, Bug Report, libgcrypt

Dec 11 2018

werner closed T1166: Connecting once-per-key for keys with keyserver preference vs server violate reconnection limit as Wontfix.
Dec 11 2018, 12:39 PM · Ubuntu, gnupg, Feature Request

Sep 21 2017

werner closed T3247: SIGILL in prepare_macpads() at md.c:681 as Resolved.

Closing due to compiler error.

Sep 21 2017, 3:39 PM · clang, Ubuntu, libgcrypt, Bug Report

Jul 6 2017

jukivili added a comment to T3247: SIGILL in prepare_macpads() at md.c:681.

I did some experimenting and clang SIGILL does not trigger with commonly used, but non-conforming, variable-length object with "struct hack", as below:

Jul 6 2017, 1:22 PM · clang, Ubuntu, libgcrypt, Bug Report

Jul 5 2017

werner added a comment to T3247: SIGILL in prepare_macpads() at md.c:681.

With an integer overflow.

Jul 5 2017, 3:23 PM · clang, Ubuntu, libgcrypt, Bug Report
marcus added a comment to T3247: SIGILL in prepare_macpads() at md.c:681.

This is a standard dynamic sized array:

Jul 5 2017, 3:05 PM · clang, Ubuntu, libgcrypt, Bug Report
werner added a comment to T3247: SIGILL in prepare_macpads() at md.c:681.

Sorry, this is a standard C feature and the only way to have dynamic sized arrays. CLANG simply does not get this pattern right. Grep for pgut001's very comments on such ill behaving compilers (including gcc).

Jul 5 2017, 2:59 PM · clang, Ubuntu, libgcrypt, Bug Report
marcus added a comment to T3247: SIGILL in prepare_macpads() at md.c:681.

At a meta level, I really think that writing more conservative code that enables compilers to do a better job checking for safety is a good idea. The tricks we do with structs are premature optimization from a time when compilers were dumb as a doornail.

Jul 5 2017, 2:56 PM · clang, Ubuntu, libgcrypt, Bug Report
marcus added a comment to T3247: SIGILL in prepare_macpads() at md.c:681.

Maybe casting to a void* helps to disable the check in the compiler.

Jul 5 2017, 2:52 PM · clang, Ubuntu, libgcrypt, Bug Report
gniibe added a comment to T3247: SIGILL in prepare_macpads() at md.c:681.

I can replicate the issue on my system.
It is not the line 681, actually.

Jul 5 2017, 4:07 AM · clang, Ubuntu, libgcrypt, Bug Report

Jul 4 2017

gniibe claimed T3247: SIGILL in prepare_macpads() at md.c:681.

I think that the problem is in your usage with your tool. Please have a look at md_open function in cipher/md.c.
This bug is not the one in libgcrypt, but in the compiler.

Jul 4 2017, 6:27 AM · clang, Ubuntu, libgcrypt, Bug Report
gniibe closed T3246: md5.c:119:3: runtime error: unsigned integer overflow: 2612846078 + 3614090360 cannot be represented in type 'unsigned int' as Invalid.

Same argument can apply to MD5. See T3249: sha256.c:265:3: runtime error: unsigned integer overflow: 4084723048 + 1633837952 cannot be represented in type 'unsigned int' of SHA2.

Jul 4 2017, 5:10 AM · clang, Ubuntu, libgcrypt, Bug Report
gniibe closed T3250: random-csprng.c:1070:16: runtime error: unsigned integer overflow: 0 - 1 cannot be represented in type 'size_t' (aka 'unsigned long') as Invalid.

See T3245: cipher-gcm-intel-pclmul.c:418:17: runtime error: unsigned integer overflow: 0 - 1 cannot be represented in type 'size_t' (aka 'unsigned long').

Jul 4 2017, 5:08 AM · clang, Ubuntu, libgcrypt, Bug Report
gniibe closed T3245: cipher-gcm-intel-pclmul.c:418:17: runtime error: unsigned integer overflow: 0 - 1 cannot be represented in type 'size_t' (aka 'unsigned long') as Invalid.

See T3248: mpiutil.c:501:37: runtime error: unsigned integer overflow: 0 - 1 cannot be represented in type 'unsigned long' for unsigned integer overflow.

Jul 4 2017, 5:06 AM · clang, Ubuntu, libgcrypt, Bug Report
gniibe closed T3248: mpiutil.c:501:37: runtime error: unsigned integer overflow: 0 - 1 cannot be represented in type 'unsigned long' as Invalid.

It is intentionally used.
And in the C programming language, it is defined that unsigned integer never overflows (it is computed as modulo 2).

Jul 4 2017, 4:58 AM · clang, Ubuntu, libgcrypt, Bug Report
gniibe closed T3251: sha512.c:342:25: runtime error: unsigned integer overflow: 17296268247117069635 + 2271443192277056827 cannot be represented in type 'unsigned long' as Invalid.

See T3249: sha256.c:265:3: runtime error: unsigned integer overflow: 4084723048 + 1633837952 cannot be represented in type 'unsigned int'.

Jul 4 2017, 4:54 AM · clang, Ubuntu, libgcrypt, Bug Report
geeknik created T3251: sha512.c:342:25: runtime error: unsigned integer overflow: 17296268247117069635 + 2271443192277056827 cannot be represented in type 'unsigned long'.
Jul 4 2017, 3:11 AM · clang, Ubuntu, libgcrypt, Bug Report
geeknik created T3250: random-csprng.c:1070:16: runtime error: unsigned integer overflow: 0 - 1 cannot be represented in type 'size_t' (aka 'unsigned long').
Jul 4 2017, 3:11 AM · clang, Ubuntu, libgcrypt, Bug Report
geeknik created T3248: mpiutil.c:501:37: runtime error: unsigned integer overflow: 0 - 1 cannot be represented in type 'unsigned long'.
Jul 4 2017, 3:11 AM · clang, Ubuntu, libgcrypt, Bug Report
geeknik created T3247: SIGILL in prepare_macpads() at md.c:681.
Jul 4 2017, 3:11 AM · clang, Ubuntu, libgcrypt, Bug Report
geeknik created T3246: md5.c:119:3: runtime error: unsigned integer overflow: 2612846078 + 3614090360 cannot be represented in type 'unsigned int'.
Jul 4 2017, 3:11 AM · clang, Ubuntu, libgcrypt, Bug Report
geeknik created T3245: cipher-gcm-intel-pclmul.c:418:17: runtime error: unsigned integer overflow: 0 - 1 cannot be represented in type 'size_t' (aka 'unsigned long').
Jul 4 2017, 3:10 AM · clang, Ubuntu, libgcrypt, Bug Report

Jun 8 2017

justus closed T3138: Help: "Error- key importing failed" - "gpg: starting migration from earlier GnuPG versions" ? as Invalid.

Hello. Please note that this is a bug tracker and not a support forum. Nevertheless, let's investigate.

Jun 8 2017, 3:07 PM · Enigmail, Ubuntu, gnupg

May 5 2017

quakhe added projects to T3138: Help: "Error- key importing failed" - "gpg: starting migration from earlier GnuPG versions" ?: gnupg, Ubuntu, Enigmail.
May 5 2017, 3:17 PM · Enigmail, Ubuntu, gnupg

May 3 2017

justus placed T1166: Connecting once-per-key for keys with keyserver preference vs server violate reconnection limit up for grabs.
May 3 2017, 10:32 AM · Ubuntu, gnupg, Feature Request

Mar 30 2017

admin created Ubuntu.
Mar 30 2017, 6:42 PM

Dec 9 2015

werner added a comment to T1166: Connecting once-per-key for keys with keyserver preference vs server violate reconnection limit.

The keyserver preferences are major privacy problem. They should not be used
and in fact they are ignored in Tor mode. Thus we should not put too much work
in fixing this wish.

Dec 9 2015, 3:27 PM · Ubuntu, gnupg, Feature Request

Dec 8 2015

justus added a comment to T1166: Connecting once-per-key for keys with keyserver preference vs server violate reconnection limit.

Now that we have a dirmngr daemon, this should be feasible. I plan to implement
it like this:

Add two flags to the KS_GET command, --enqueue and --drain-queue. --enqueue
merely enqueues the key id and returns immediately, unless --drain-queue is
given.

This will also help us address issue #1827.

Dec 8 2015, 11:45 AM · Ubuntu, gnupg, Feature Request
justus claimed T1166: Connecting once-per-key for keys with keyserver preference vs server violate reconnection limit.
Dec 8 2015, 11:45 AM · Ubuntu, gnupg, Feature Request

May 11 2015

werner removed a project from T1046: --quiet --passphrase ... outputs passphrase message: Stalled.
May 11 2015, 8:51 PM · Won't Fix, Ubuntu, gnupg, Feature Request
werner closed T1046: --quiet --passphrase ... outputs passphrase message as Resolved.
May 11 2015, 8:51 PM · Won't Fix, Ubuntu, gnupg, Feature Request

Nov 21 2014

werner closed T1751: GPA crash on Ubuntu with "Unsupported certificate" as Resolved.
Nov 21 2014, 9:37 AM · Ubuntu, Bug Report, gpa
werner added a comment to T1751: GPA crash on Ubuntu with "Unsupported certificate".

0.9.6 will be release today, thus I close it.

GNOME--

Nov 21 2014, 9:37 AM · Ubuntu, Bug Report, gpa

Nov 19 2014

aheinecke added a comment to T1751: GPA crash on Ubuntu with "Unsupported certificate".

It's not crashing for me with master but its not fixed.

I acidentally ran into this while checking out a windows crash and found the cause:
echo $GPG_AGENT_INFO /run/user/1000/keyring-Lvs93w/gpg:0:1

At least this was my problem and as "Ubuntu" is the platform it is likely that
this was the original problem.

I've commented in the launchpad report.

Nov 19 2014, 4:03 PM · Ubuntu, Bug Report, gpa
aheinecke changed Version from 0.9.4 to master on T1751: GPA crash on Ubuntu with "Unsupported certificate".
Nov 19 2014, 4:03 PM · Ubuntu, Bug Report, gpa

Nov 7 2014

werner added a comment to T1751: GPA crash on Ubuntu with "Unsupported certificate".

This is likely fixed in 0.9.5 release Sep 1.

Nov 7 2014, 8:03 AM · Ubuntu, Bug Report, gpa

Nov 6 2014

bernhard added projects to T1751: GPA crash on Ubuntu with "Unsupported certificate": gpa, Bug Report, Ubuntu.
Nov 6 2014, 4:41 PM · Ubuntu, Bug Report, gpa
bernhard set Version to 0.9.4 on T1751: GPA crash on Ubuntu with "Unsupported certificate".
Nov 6 2014, 4:41 PM · Ubuntu, Bug Report, gpa
bernhard updated subscribers of T1751: GPA crash on Ubuntu with "Unsupported certificate".
Nov 6 2014, 4:41 PM · Ubuntu, Bug Report, gpa

Feb 21 2011

werner removed a project from T1308: Installing gnupg-agent makes ubuntu unable to login: Bug Report.
Feb 21 2011, 5:36 PM · Ubuntu
werner closed T1308: Installing gnupg-agent makes ubuntu unable to login as Invalid.
Feb 21 2011, 5:36 PM · Ubuntu
werner lowered the priority of T1308: Installing gnupg-agent makes ubuntu unable to login from High to Normal.
Feb 21 2011, 5:36 PM · Ubuntu
werner added a comment to T1308: Installing gnupg-agent makes ubuntu unable to login.

Please provide a proper test case which is independent of the
distribution. Do not report distribution specific problems to an
upstream package. Thanks.

Feb 21 2011, 5:36 PM · Ubuntu

Dec 18 2010

shankao added projects to T1308: Installing gnupg-agent makes ubuntu unable to login: Bug Report, Ubuntu.
Dec 18 2010, 5:01 PM · Ubuntu
shankao set Version to 2.0.14-2ubuntu1 on T1308: Installing gnupg-agent makes ubuntu unable to login.
Dec 18 2010, 5:01 PM · Ubuntu
shankao set External Link to https://bugs.launchpad.net/ubuntu/+source/gnupg2/+bug/659509 on T1308: Installing gnupg-agent makes ubuntu unable to login.
Dec 18 2010, 5:01 PM · Ubuntu

Jun 18 2010

werner added a comment to T1240: gpg --list-packets causes EOF infite loop on specific file.

This has already been fixed in the trunk. I just backported it to 1.4 and 2.0.
(svn rev 5361).

Jun 18 2010, 10:09 AM · Ubuntu, Bug Report, gnupg
werner closed T1240: gpg --list-packets causes EOF infite loop on specific file as Resolved.
Jun 18 2010, 10:09 AM · Ubuntu, Bug Report, gnupg

Jun 17 2010

dleidert set External Link to http://bugs.launchpad.net/bugs/595553 on T1240: gpg --list-packets causes EOF infite loop on specific file.
Jun 17 2010, 6:34 PM · Ubuntu, Bug Report, gnupg
dleidert set Version to 1.4.10 on T1240: gpg --list-packets causes EOF infite loop on specific file.
Jun 17 2010, 6:34 PM · Ubuntu, Bug Report, gnupg
dleidert added a comment to T1240: gpg --list-packets causes EOF infite loop on specific file.

Jun 17 2010, 6:34 PM · Ubuntu, Bug Report, gnupg
dleidert added projects to T1240: gpg --list-packets causes EOF infite loop on specific file: gnupg, Bug Report, Ubuntu.
Jun 17 2010, 6:34 PM · Ubuntu, Bug Report, gnupg

Dec 10 2009

werner added a comment to T1166: Connecting once-per-key for keys with keyserver preference vs server violate reconnection limit.

That is a hard to fix problem. We don't have the infrastructure to merge
keyserver requests. Adding this to gpg will be quite some work. A tentative
plan to implement this would require a local daemon to cache requests (e.g.
enhancing dirmngr) and to rework gpg to allow for asynchronous updates.

Dec 10 2009, 11:33 AM · Ubuntu, gnupg, Feature Request

Dec 8 2009

dleidert added a comment to T1166: Connecting once-per-key for keys with keyserver preference vs server violate reconnection limit.

From my investigation the only workaround seems to be the no-honor-keyserver-url
option. What I could imagine is, to test, if the given keyserver pref of a key
is equal to the specified preferred keyserver and delay this key processing and
process it with all other keys without keyserver prefs. However this won't solve
the problem completely, as all other keys would still be processed one after the
other (which BTW sounds reasonable to me).

Dec 8 2009, 6:37 PM · Ubuntu, gnupg, Feature Request
dleidert added projects to T1166: Connecting once-per-key for keys with keyserver preference vs server violate reconnection limit: Feature Request, gnupg, Ubuntu.
Dec 8 2009, 6:31 PM · Ubuntu, gnupg, Feature Request
dleidert set Version to 1.4.10, 2.0.* on T1166: Connecting once-per-key for keys with keyserver preference vs server violate reconnection limit.
Dec 8 2009, 6:31 PM · Ubuntu, gnupg, Feature Request

Sep 3 2009

werner added a project to T1046: --quiet --passphrase ... outputs passphrase message: Stalled.
Sep 3 2009, 7:21 PM · Won't Fix, Ubuntu, gnupg, Feature Request

Jul 20 2009

werner removed a project from T1090: Using --send-keys without key should exit with an error or print warning: In Progress.
Jul 20 2009, 11:35 AM · Ubuntu, gnupg, Feature Request
werner added a comment to T1090: Using --send-keys without key should exit with an error or print warning.

Done for 2.0 in svn r5082; will also be packaged with gnupg 1.4.10.

Jul 20 2009, 11:35 AM · Ubuntu, gnupg, Feature Request
werner closed T1090: Using --send-keys without key should exit with an error or print warning as Resolved.
Jul 20 2009, 11:35 AM · Ubuntu, gnupg, Feature Request
werner added a comment to T1090: Using --send-keys without key should exit with an error or print warning.

We can't print an error message because that would let gpg treturn with an error
code and lead to problesm with scripts which assume the current way of doing
things. A warning is possible but Unix tools generally don't do that.

Jul 20 2009, 11:31 AM · Ubuntu, gnupg, Feature Request
werner added a project to T1090: Using --send-keys without key should exit with an error or print warning: In Progress.
Jul 20 2009, 11:31 AM · Ubuntu, gnupg, Feature Request

Jul 17 2009

dleidert added projects to T1090: Using --send-keys without key should exit with an error or print warning: Feature Request, gnupg, Ubuntu.
Jul 17 2009, 11:12 AM · Ubuntu, gnupg, Feature Request
dleidert set External Link to https://bugs.launchpad.net/bugs/389694 on T1090: Using --send-keys without key should exit with an error or print warning.
Jul 17 2009, 11:12 AM · Ubuntu, gnupg, Feature Request

Jul 13 2009

werner added a comment to T1085: Minor issues in Dutch translationregarding fully vs. ultimately.

Fixed in SVN. Thanks.

Jul 13 2009, 11:23 AM · Ubuntu, Bug Report, gnupg
werner closed T1085: Minor issues in Dutch translationregarding fully vs. ultimately as Resolved.
Jul 13 2009, 11:23 AM · Ubuntu, Bug Report, gnupg

Jul 10 2009

dleidert added projects to T1085: Minor issues in Dutch translationregarding fully vs. ultimately: gnupg, Bug Report, Ubuntu.
Jul 10 2009, 12:03 PM · Ubuntu, Bug Report, gnupg
dleidert set External Link to https://bugs.launchpad.net/bugs/397395 on T1085: Minor issues in Dutch translationregarding fully vs. ultimately.
Jul 10 2009, 12:03 PM · Ubuntu, Bug Report, gnupg

Jul 9 2009

werner added a comment to T1046: --quiet --passphrase ... outputs passphrase message.

The first part is not easy to fix and would require quite some rework. I don't
think this is justified.

Jul 9 2009, 4:24 PM · Won't Fix, Ubuntu, gnupg, Feature Request

May 12 2009

dleidert added a comment to T1046: --quiet --passphrase ... outputs passphrase message.

Forget the second part. It prints this message only, if it indeed needs input
and giving --yes works in this case too. So there was a fault on my side.

May 12 2009, 1:05 PM · Won't Fix, Ubuntu, gnupg, Feature Request

May 11 2009

dleidert reopened T1046: --quiet --passphrase ... outputs passphrase message as "Open".
May 11 2009, 11:35 AM · Won't Fix, Ubuntu, gnupg, Feature Request
dleidert added a comment to T1046: --quiet --passphrase ... outputs passphrase message.

Maybe we misunderstood(?). The gpg-agent is not used.

May 11 2009, 11:35 AM · Won't Fix, Ubuntu, gnupg, Feature Request