Page MenuHome GnuPG
Feed All Stories

Jan 22 2015

aheinecke added a comment to T1816: Corrupted pubring causes long loop in gnupg (keydb_search failed: Invalid packet).

Thanks!
I'll test it. Any idea what could have caused this corruption in the first place?

Jan 22 2015, 4:46 PM · Bug Report, gnupg
werner added a project to T1816: Corrupted pubring causes long loop in gnupg (keydb_search failed: Invalid packet): Restricted Project.
Jan 22 2015, 4:45 PM · Bug Report, gnupg
werner added a comment to T1816: Corrupted pubring causes long loop in gnupg (keydb_search failed: Invalid packet).

I have pushed a fix: commit 09e8f35. If you are using libgpg-error from git,
please also update it.

The test case still takes quite long the first time but after that things are
better. The reason for this is that gpg does a --rebuild-keydb-caches.

Jan 22 2015, 4:45 PM · Bug Report, gnupg
werner removed a project from T1816: Corrupted pubring causes long loop in gnupg (keydb_search failed: Invalid packet): In Progress.
Jan 22 2015, 4:45 PM · Bug Report, gnupg
werner added a project to T1816: Corrupted pubring causes long loop in gnupg (keydb_search failed: Invalid packet): In Progress.
Jan 22 2015, 2:20 PM · Bug Report, gnupg
aheinecke added a comment to T1816: Corrupted pubring causes long loop in gnupg (keydb_search failed: Invalid packet).

Uh sorry, yes it terminates after over a minute. Sorry I should have waited
longer but 100% CPU for over a minute is quite a lot of calculations ;-).
Changed the title.

Jan 22 2015, 11:33 AM · Bug Report, gnupg
aheinecke renamed T1816: Corrupted pubring causes long loop in gnupg (keydb_search failed: Invalid packet) from Corrupted pubring causes endless loop in gnupg (keydb_search failed: Invalid packet) to Corrupted pubring causes long loop in gnupg (keydb_search failed: Invalid packet).
Jan 22 2015, 11:33 AM · Bug Report, gnupg
werner added a comment to T1816: Corrupted pubring causes long loop in gnupg (keydb_search failed: Invalid packet).

Are you sure that it is an endless loop? My tests only show that it takes loooong.

Jan 22 2015, 11:10 AM · Bug Report, gnupg
js added a comment to T1811: Own key's validity gets set from ultimate to undef when signing a key that signed you.

Here's how to reproduce it:

$ mkdir 1 2
$ chmod 700 1 2
$ cp ~/.gnupg/gpg-agent.conf 1
$ cp ~/.gnupg/gpg-agent.conf 2
$ gpg2 --homedir 1 --yes --quick-gen-key "Test User 1"
gpg: keybox '1/pubring.kbx' created
We need to generate a lot of random bytes. It is a good idea to perform
some other action (type on the keyboard, move the mouse, utilize the
disks) during the prime generation; this gives the random number
generator a better chance to gain enough entropy.
We need to generate a lot of random bytes. It is a good idea to perform
some other action (type on the keyboard, move the mouse, utilize the
disks) during the prime generation; this gives the random number
generator a better chance to gain enough entropy.
gpg: 1/trustdb.gpg: trustdb created
gpg: key E2D6B58A marked as ultimately trusted
gpg: directory '1/openpgp-revocs.d' created
public and secret key created and signed.

gpg: checking the trustdb
gpg: 3 marginal(s) needed, 1 complete(s) needed, PGP trust model
gpg: depth: 0 valid: 1 signed: 0 trust: 0-, 0q, 0n, 0m, 0f, 1u
pub rsa2048/E2D6B58A 2015-01-22

Key fingerprint = E618 DF9C A599 A3A5 D5B2  B8FE 57C0 450E E2D6 B58A

uid [ultimate] Test User 1
sub rsa2048/C3D1C503 2015-01-22

$ gpg2 --homedir 2 --yes --quick-gen-key "Test User 2"
gpg: keybox '2/pubring.kbx' created
We need to generate a lot of random bytes. It is a good idea to perform
some other action (type on the keyboard, move the mouse, utilize the
disks) during the prime generation; this gives the random number
generator a better chance to gain enough entropy.
We need to generate a lot of random bytes. It is a good idea to perform
some other action (type on the keyboard, move the mouse, utilize the
disks) during the prime generation; this gives the random number
generator a better chance to gain enough entropy.
gpg: 2/trustdb.gpg: trustdb created
gpg: key C767617A marked as ultimately trusted
gpg: directory '2/openpgp-revocs.d' created
public and secret key created and signed.

gpg: checking the trustdb
gpg: 3 marginal(s) needed, 1 complete(s) needed, PGP trust model
gpg: depth: 0 valid: 1 signed: 0 trust: 0-, 0q, 0n, 0m, 0f, 1u
pub rsa2048/C767617A 2015-01-22

Key fingerprint = 4741 1B55 ADF9 4000 DFE9  60CF DDF2 7707 C767 617A

uid [ultimate] Test User 2
sub rsa2048/BFC45B68 2015-01-22

$ gpg2 --homedir 1 --export | gpg2 --homedir 2 --import
gpg: key E2D6B58A: public key "Test User 1" imported
gpg: Total number processed: 1
gpg: imported: 1
$ gpg2 --homedir 2 --sign-key E2D6B58A

pub rsa2048/E2D6B58A

created: 2015-01-22  expires: never       usage: SC  
trust: unknown       validity: unknown

sub rsa2048/C3D1C503

created: 2015-01-22  expires: never       usage: E

[ unknown] (1). Test User 1

pub rsa2048/E2D6B58A

created: 2015-01-22  expires: never       usage: SC  
trust: unknown       validity: unknown

Primary key fingerprint: E618 DF9C A599 A3A5 D5B2 B8FE 57C0 450E E2D6 B58A

     Test User 1

Are you sure that you want to sign this key with your
key "Test User 2" (C767617A)

Really sign? (y/N) y

$ gpg2 --homedir 2 --export | gpg2 --homedir 1 --import
gpg: key C767617A: public key "Test User 2" imported
gpg: key E2D6B58A: "Test User 1" 1 new signature
gpg: Total number processed: 2
gpg: imported: 1
gpg: new signatures: 1
gpg: 3 marginal(s) needed, 1 complete(s) needed, PGP trust model
gpg: depth: 0 valid: 1 signed: 0 trust: 0-, 0q, 0n, 0m, 0f, 1u
$ gpg2 --homedir 1 --list-keys

1/pubring.kbx

pub rsa2048/E2D6B58A 2015-01-22
uid [ultimate] Test User 1
sub rsa2048/C3D1C503 2015-01-22

pub rsa2048/C767617A 2015-01-22
uid [ unknown] Test User 2
sub rsa2048/BFC45B68 2015-01-22

$ # Still ok!
$ gpg2 --homedir 1 --sign-key C767617A

pub rsa2048/C767617A

created: 2015-01-22  expires: never       usage: SC  
trust: unknown       validity: unknown

sub rsa2048/BFC45B68

created: 2015-01-22  expires: never       usage: E

[ unknown] (1). Test User 2

pub rsa2048/C767617A

created: 2015-01-22  expires: never       usage: SC  
trust: unknown       validity: unknown

Primary key fingerprint: 4741 1B55 ADF9 4000 DFE9 60CF DDF2 7707 C767 617A

     Test User 2

Are you sure that you want to sign this key with your
key "Test User 1" (E2D6B58A)

Really sign? (y/N) y

$ gpg2 --homedir 1 --list-keys
gpg: checking the trustdb
gpg: 3 marginal(s) needed, 1 complete(s) needed, PGP trust model
gpg: depth: 0 valid: 1 signed: 1 trust: 0-, 0q, 0n, 0m, 0f, 1u
gpg: depth: 1 valid: 1 signed: 1 trust: 1-, 0q, 0n, 0m, 0f, 0u

1/pubring.kbx

pub rsa2048/E2D6B58A 2015-01-22
uid [ undef ] Test User 1
sub rsa2048/C3D1C503 2015-01-22

pub rsa2048/C767617A 2015-01-22
uid [ full ] Test User 2
sub rsa2048/BFC45B68 2015-01-22

$ # Broken!

Jan 22 2015, 10:10 AM · gnupg, Bug Report
js added a comment to T1811: Own key's validity gets set from ultimate to undef when signing a key that signed you.

I applied c595659 manually to 2.1.1, this doesn't change anything.

I'd try it with the latest git master, however I don't see any way to securely check it
out as it is only offered via the insecure git:// protocol.

Jan 22 2015, 9:40 AM · gnupg, Bug Report
werner added a comment to T1816: Corrupted pubring causes long loop in gnupg (keydb_search failed: Invalid packet).

FWIW: It is sufficient to just import the key in question.

Jan 22 2015, 8:47 AM · Bug Report, gnupg
werner added a project to T1811: Own key's validity gets set from ultimate to undef when signing a key that signed you: Restricted Project.
Jan 22 2015, 8:32 AM · gnupg, Bug Report
werner added a comment to T1811: Own key's validity gets set from ultimate to undef when signing a key that signed you.

I am not able to repeat that with the latest git version.
This is probably due to the fix by commit c595659.

Jan 22 2015, 8:32 AM · gnupg, Bug Report

Jan 21 2015

headsup added a comment to T1814: Add option to output the signed text with --verify.

That's fine... or just make the wording in the man page more clear. Under
--verify, it talks about using --output with cleartext signed data. That seemed
to imply (to me) that --output is used _with_ --verify. I think it should be
clearer that --output is to be used _without_ --verify or that --output has no
effect when using --verify.

So this could be treated as just a documentation bug rather than create yet
another new option.

For what it's worth, I don't think backward compatibility is an important
concern here. If someone was using --output with --verify before, they likely
were under the impression that the combination worked when in reality the two
options together just weren't a valid combination. It seems unlikely that
anyone would depend on --output being ignored when used with --verify, and so
making the combination work now should not cause legitimate compatibility problems.

If the combination of --output with --verify is not made to work, there should
probably be a warning emitted (in addition to fixing the documentation).

In summary, it seems to me that viable options are at least the following:

  • make --output work with --verify (possibly bad for compatibility reasons in

the rare use case of someone depending on current behavior of the currently
invalid combination)

  • fix man page in the --verify section - specifically, clarify the text

discussing using --output

  • add some new option
  • warn if an invalid combination of options exists (e.g., --verify with

--current in the current implementation <= 2.1.1)

These are not necessarily exclusive choices.

I guess I would prefer to allow the combination to work or warn and fix the
docs. Not as keen to add yet another new option - there's already a lot.

I can work up a patch if we can settle on a direction.

Jan 21 2015, 5:45 PM · gnupg, Feature Request
werner added a project to T1813: [patch] dirmngr/Makefile.am - add gnutls cflags: gnupg.
Jan 21 2015, 3:54 PM · gnupg, Bug Report, gnupg (gpg21), dirmngr
werner closed T1813: [patch] dirmngr/Makefile.am - add gnutls cflags as Resolved.
Jan 21 2015, 3:54 PM · gnupg, Bug Report, gnupg (gpg21), dirmngr
werner added a comment to T1813: [patch] dirmngr/Makefile.am - add gnutls cflags.

Applied as 091c35e. Thanks.

Jan 21 2015, 3:54 PM · gnupg, Bug Report, gnupg (gpg21), dirmngr
werner added a project to T1814: Add option to output the signed text with --verify: gnupg.
Jan 21 2015, 3:31 PM · gnupg, Feature Request
werner renamed T1814: Add option to output the signed text with --verify from --output with --verify doesn't emit signed data file to Add option to output the signed text with --verify.
Jan 21 2015, 3:31 PM · gnupg, Feature Request
werner added a project to T1814: Add option to output the signed text with --verify: Feature Request.
Jan 21 2015, 3:31 PM · gnupg, Feature Request
werner removed a project from T1814: Add option to output the signed text with --verify: Bug Report.
Jan 21 2015, 3:31 PM · gnupg, Feature Request
werner added a comment to T1814: Add option to output the signed text with --verify.

This has never been the case and for backward compatibility we can't simply
chnage it.

We can add a new command or option to allow that. I changed the title and
category to reflect this.

Jan 21 2015, 3:31 PM · gnupg, Feature Request
werner closed T1812: gpg2 --gen-key does not accept valid email address as Resolved.
Jan 21 2015, 3:28 PM · Bug Report, Not A Bug, gnupg
werner lowered the priority of T1819: "gpg --gen-key" failed on Windows from High to Normal.
Jan 21 2015, 3:28 PM · Duplicate, Windows 32, gnupg (gpg21), Windows, Bug Report, gnupg
jgjl added a comment to T1812: gpg2 --gen-key does not accept valid email address.

Ok, thanks for the feedback.

Jan 21 2015, 1:08 AM · Bug Report, Not A Bug, gnupg

Jan 20 2015

liudonghua set Version to 2.1.1 on T1819: "gpg --gen-key" failed on Windows.
Jan 20 2015, 3:30 PM · Duplicate, Windows 32, gnupg (gpg21), Windows, Bug Report, gnupg
liudonghua added projects to T1819: "gpg --gen-key" failed on Windows: gnupg, Bug Report.
Jan 20 2015, 3:30 PM · Duplicate, Windows 32, gnupg (gpg21), Windows, Bug Report, gnupg
liudonghua added a comment to T1819: "gpg --gen-key" failed on Windows.

Jan 20 2015, 3:30 PM · Duplicate, Windows 32, gnupg (gpg21), Windows, Bug Report, gnupg

Jan 19 2015

werner added a project to T1817: Changing expiration on subkeys breaks subkeys: Won't Fix.
Jan 19 2015, 4:55 PM · Won't Fix, gnupg (gpg20), gnupg (gpg14), Bug Report, gnupg
werner added a comment to T1817: Changing expiration on subkeys breaks subkeys.

It is known that the secret keyrings easily gets out of sync. Thus do not rely
on that information. Always use the public key ring for such info.

We won't fix that in < 2.1

Jan 19 2015, 4:55 PM · Won't Fix, gnupg (gpg20), gnupg (gpg14), Bug Report, gnupg
werner added a comment to T1818: gnupg fails (buffer overflow detected) to encrypt archive when called from duplicity.

D281: 541_0001-Fix-a-problem-with-select-and-high-fds.patch

Jan 19 2015, 4:51 PM · Info Needed, gnupg, gnupg (gpg14), Bug Report, Debian
werner added a comment to T1818: gnupg fails (buffer overflow detected) to encrypt archive when called from duplicity.

Given that it seems not easy to reproduce this bug can you please test
commit 8adb5ff or the attsched patch to see whether this helps.

If it does not help, can you do a gpg build with debug symbols and run your case
again. If possible attach a debugger for a backtrace or produce it with a dump file.

Jan 19 2015, 4:51 PM · Info Needed, gnupg, gnupg (gpg14), Bug Report, Debian
werner added a comment to T1794: Ultimate ownertrust does not (always) imply ultimate validity in default trust model.

A patch has been submitted, which should fix the problem. commit c595659

Jan 19 2015, 3:50 PM · Bug Report, gnupg
werner added a project to T1794: Ultimate ownertrust does not (always) imply ultimate validity in default trust model: Restricted Project.
Jan 19 2015, 3:50 PM · Bug Report, gnupg

Jan 18 2015

freg set Version to 1.4.18 on T1818: gnupg fails (buffer overflow detected) to encrypt archive when called from duplicity.
Jan 18 2015, 11:31 AM · Info Needed, gnupg, gnupg (gpg14), Bug Report, Debian
freg added projects to T1818: gnupg fails (buffer overflow detected) to encrypt archive when called from duplicity: Debian, Bug Report.
Jan 18 2015, 11:31 AM · Info Needed, gnupg, gnupg (gpg14), Bug Report, Debian

Jan 15 2015

jas set Version to 1.4.18 & 2.0.26 on T1817: Changing expiration on subkeys breaks subkeys.
Jan 15 2015, 10:23 PM · Won't Fix, gnupg (gpg20), gnupg (gpg14), Bug Report, gnupg
jas added projects to T1817: Changing expiration on subkeys breaks subkeys: gnupg, Bug Report.
Jan 15 2015, 10:23 PM · Won't Fix, gnupg (gpg20), gnupg (gpg14), Bug Report, gnupg

Jan 14 2015

aheinecke set External Link to http://files.kolab.org/incoming/aheinecke/broken-pubring.gpg on T1816: Corrupted pubring causes long loop in gnupg (keydb_search failed: Invalid packet).
Jan 14 2015, 5:48 PM · Bug Report, gnupg
aheinecke updated subscribers of T1816: Corrupted pubring causes long loop in gnupg (keydb_search failed: Invalid packet).
Jan 14 2015, 5:48 PM · Bug Report, gnupg
aheinecke set Version to gnupg-2.1.1 on T1816: Corrupted pubring causes long loop in gnupg (keydb_search failed: Invalid packet).
Jan 14 2015, 5:48 PM · Bug Report, gnupg
aheinecke added projects to T1816: Corrupted pubring causes long loop in gnupg (keydb_search failed: Invalid packet): gnupg, Bug Report.
Jan 14 2015, 5:48 PM · Bug Report, gnupg
werner added projects to T1815: whirlpool.c requires u64 type: libgcrypt, Bug Report.
Jan 14 2015, 11:11 AM · Bug Report, libgcrypt
werner set Version to <= 1.7 on T1815: whirlpool.c requires u64 type.
Jan 14 2015, 11:11 AM · Bug Report, libgcrypt

Jan 13 2015

werner lowered the priority of T1811: Own key's validity gets set from ultimate to undef when signing a key that signed you from High to Normal.
Jan 13 2015, 3:23 PM · gnupg, Bug Report
werner added a project to T1811: Own key's validity gets set from ultimate to undef when signing a key that signed you: gnupg.
Jan 13 2015, 3:23 PM · gnupg, Bug Report
headsup set Version to 2.1.1 (at least) on T1814: Add option to output the signed text with --verify.
Jan 13 2015, 1:40 AM · gnupg, Feature Request
headsup added a project to T1814: Add option to output the signed text with --verify: Bug Report.
Jan 13 2015, 1:40 AM · gnupg, Feature Request
headsup added a comment to T1813: [patch] dirmngr/Makefile.am - add gnutls cflags.

D280: 540_gpg211-dirmngr.patch

Jan 13 2015, 1:03 AM · gnupg, Bug Report, gnupg (gpg21), dirmngr
headsup added projects to T1813: [patch] dirmngr/Makefile.am - add gnutls cflags: dirmngr, gnupg (gpg21), Bug Report.
Jan 13 2015, 1:03 AM · gnupg, Bug Report, gnupg (gpg21), dirmngr

Jan 12 2015

js renamed T1811: Own key's validity gets set from ultimate to undef when signing a key that signed you from Signing a key using my own Ed25519 key results in losing all trust in my own key to Own key's validity gets set from ultimate to undef when signing a key that signed you.
Jan 12 2015, 11:05 PM · gnupg, Bug Report
js raised the priority of T1811: Own key's validity gets set from ultimate to undef when signing a key that signed you from Normal to High.
Jan 12 2015, 11:05 PM · gnupg, Bug Report
js added a comment to T1811: Own key's validity gets set from ultimate to undef when signing a key that signed you.

Ok, the same seems to happen with just RSA keys. It seems the ultimate trust is killed
as soon as you sign someone who signs you. Increasing priority as a result, as this
means that even without any experimental features, GPG will complain about your own
signatures.

Jan 12 2015, 11:05 PM · gnupg, Bug Report
werner added a project to T1812: gpg2 --gen-key does not accept valid email address: Not A Bug.
Jan 12 2015, 8:18 AM · Bug Report, Not A Bug, gnupg
werner added a comment to T1812: gpg2 --gen-key does not accept valid email address.

I noticed your address elsewhere and wondered whether my script can handle it.
They do. However, gpg has not a complete parser but tries to make sure that the
user id looks like a valid address.

Use --allow-freeform-uid and enter what ever you like.

Jan 12 2015, 8:18 AM · Bug Report, Not A Bug, gnupg

Jan 11 2015

jgjl set Version to gpg (GnuPG/MacGPG2) 2.0.26 on T1812: gpg2 --gen-key does not accept valid email address.
Jan 11 2015, 7:46 PM · Bug Report, Not A Bug, gnupg
jgjl added projects to T1812: gpg2 --gen-key does not accept valid email address: gnupg, Bug Report.
Jan 11 2015, 7:46 PM · Bug Report, gnupg, Not A Bug

Jan 10 2015

js added a comment to T1811: Own key's validity gets set from ultimate to undef when signing a key that signed you.

Ok, it seems to be that the problem arises as soon as I sign a key which then in turn
signs me back. If I import a signature and have not signed that key myself, everything
works as expected. But if I then go to sign that key, it goes to undef. If, OTOH, I
sign someone's key and export that, everything is fine. But as soon as they sign me
back, it goes to undef.

Jan 10 2015, 7:58 PM · gnupg, Bug Report
js added a comment to T1811: Own key's validity gets set from ultimate to undef when signing a key that signed you.

Ok, it gets even funnier. Now I managed to trigger it reliably by having an RSA key
sign my Ed25519 key. Each time I import it, the signature goes from ultimate to undef.
If I import with --import-options import-minimal, it strips all signatures from my
Ed25519 key and the trust goes back to ultimate.

Jan 10 2015, 7:54 PM · gnupg, Bug Report
js added a comment to T1811: Own key's validity gets set from ultimate to undef when signing a key that signed you.

I just noticed: This only happens with an RSA key with 2 sub keys. I just successfully
signed an RSA key with only 1 sub key.

Jan 10 2015, 7:33 PM · gnupg, Bug Report
js added a project to T1811: Own key's validity gets set from ultimate to undef when signing a key that signed you: Bug Report.
Jan 10 2015, 7:29 PM · gnupg, Bug Report
js set Version to 2.1.1 on T1811: Own key's validity gets set from ultimate to undef when signing a key that signed you.
Jan 10 2015, 7:29 PM · gnupg, Bug Report
werner added a comment to T1809: add option for SHA256 and SHA512 fingerprint.

MD5 is not used bu OpenPGP. It is allowed for backward compatibility but even
that has been dropped for GnuPG 2.1.

The use of SHA-1 fingerprints is hardwired into OpenPGP and to change this a
complete new key format needs to be specified. In any case the fingerprints
are not a problem right now.

Using Base64 fingerprints are actually a bad idea because they are to hard to
compare for a human.

Jan 10 2015, 6:20 PM · gnupg, Feature Request, Won't Fix

Jan 9 2015

kolAflash added a comment to T1809: add option for SHA256 and SHA512 fingerprint.

P.S.
SHA512 probably would be the right thing. If someone's too lazy to compare such
a long fingerprint, he can still choose just to compare just one half of it.

Jan 9 2015, 2:44 PM · gnupg, Feature Request, Won't Fix
kolAflash added a comment to T1809: add option for SHA256 and SHA512 fingerprint.

Sure, a standard for that would be great.

MD5 is pretty much broken for security purposes and I would wonder, if that's
not also true in the context of OpenPGP.

You're probably much closer to the people responsible for the OpenPGP standard.
Are there any efforts to introduce SHA512-BASE64 fingerprints? (or at least SHA256)

Jan 9 2015, 2:38 PM · gnupg, Feature Request, Won't Fix
werner added projects to T1809: add option for SHA256 and SHA512 fingerprint: Won't Fix, gnupg.
Jan 9 2015, 1:00 PM · gnupg, Feature Request, Won't Fix
werner added a comment to T1809: add option for SHA256 and SHA512 fingerprint.

Such fingerprints are not specifed by OpenPGP. It is also questionable whether
this will be used, given that one could also print an 256 bit ECC key directly.
Yeah, that is a bit different than the fingerprint but it raises the importance
of have a standard before coming up with an arbitrary fingerprint scheme.

Jan 9 2015, 1:00 PM · gnupg, Feature Request, Won't Fix
werner closed T1808: Wrong default value in german translation in --card-edit factory-reset as Resolved.
Jan 9 2015, 12:53 PM · Bug Report, gnupg, gnupg (gpg21), i18n
werner added a comment to T1808: Wrong default value in german translation in --card-edit factory-reset.

That is easy to fix - commit 3197f69 pushed.

Thanks.

Jan 9 2015, 12:53 PM · Bug Report, gnupg, gnupg (gpg21), i18n
werner closed T1708: Unable to cross compile libgcrypt on x86_64 as Resolved.
Jan 9 2015, 12:46 PM · Bug Report, libgcrypt
werner removed a project from T1708: Unable to cross compile libgcrypt on x86_64: Info Needed.
Jan 9 2015, 12:46 PM · Bug Report, libgcrypt
werner added a comment to T1708: Unable to cross compile libgcrypt on x86_64.

Thanks for testing

Jan 9 2015, 12:46 PM · Bug Report, libgcrypt
werner lowered the priority of T1810: Overhaul rndunix.c and rndw32.c from High to Normal.
Jan 9 2015, 12:44 PM · Bug Report, libgcrypt
werner added projects to T1810: Overhaul rndunix.c and rndw32.c: libgcrypt, Bug Report.
Jan 9 2015, 12:44 PM · Bug Report, libgcrypt
werner set Version to 1.7 on T1810: Overhaul rndunix.c and rndw32.c.
Jan 9 2015, 12:44 PM · Bug Report, libgcrypt

Jan 8 2015

bernhard added a comment to T1624: Gpgtar fails when files have non ASCII characters.

It probably would have been better to create two issues:
a) Dataloss with Kleo in 2.2.2 (fixed now)
b) crash with gpa

Jan 8 2015, 12:03 PM · gnupg, Windows 32, Windows, Bug Report
bernhard added a comment to T1746: Bug report - GPG a folder to *.tar.gpg loss all files!.

Jonny, can you confirm that the problem is gone with 2.2.3?

Jan 8 2015, 12:02 PM · Bug Report, gnupg, gpg4win
bernhard lowered the priority of T1624: Gpgtar fails when files have non ASCII characters from Unbreak Now! to High.
Jan 8 2015, 11:58 AM · gnupg, Windows 32, Windows, Bug Report
bernhard reassigned T1624: Gpgtar fails when files have non ASCII characters from aheinecke to werner.
Jan 8 2015, 11:58 AM · gnupg, Windows 32, Windows, Bug Report
kolAflash added a project to T1809: add option for SHA256 and SHA512 fingerprint: Feature Request.
Jan 8 2015, 11:42 AM · gnupg, Feature Request, Won't Fix

Jan 7 2015

Diaoul reopened T1708: Unable to cross compile libgcrypt on x86_64 as "Open".
Jan 7 2015, 8:15 PM · Bug Report, libgcrypt
Diaoul added a comment to T1708: Unable to cross compile libgcrypt on x86_64.

Yes it works fine, sorry I did not respond earlier. I'm using your patch since
you published it:
https://github.com/SynoCommunity/spksrc/blob/develop/cross/libgcrypt/patches/001-asm-allow-building-x86-and-amd64-using-old-compilers.patch

Jan 7 2015, 8:15 PM · Bug Report, libgcrypt
nervengift set Version to 2.1.1 on T1808: Wrong default value in german translation in --card-edit factory-reset.
Jan 7 2015, 3:23 PM · Bug Report, gnupg, gnupg (gpg21), i18n
nervengift added projects to T1808: Wrong default value in german translation in --card-edit factory-reset: i18n, gnupg (gpg21), gnupg, Bug Report.
Jan 7 2015, 3:23 PM · Bug Report, gnupg, gnupg (gpg21), i18n

Jan 6 2015

hollaburoo added a comment to T1807: Failing unit tests for libgcrypt.

I'm running Ubuntu 14.10 on x84_64.

The toolchain is... whatever it is that Linuxbrew uses?

Here is a gist with significantly more detail (stacktraces, logs, configure
output, etc.): https://gist.github.com/anonymous/38a7178239568f946cd2

Jan 6 2015, 3:45 PM · Info Needed, Bug Report, libgcrypt
werner added a comment to T1805: gpg-agent: Wakes up periodically.

Linux specific things are a no-go unless really needed.

Yes, things could be adjusted to wake up only if reallyneeded but it requires
more code.

What is the problem you try to solve? Do you have any measurements that show
that battery life is improved by changing this?

Jan 6 2015, 10:38 AM · Feature Request, gnupg
werner added a comment to T1807: Failing unit tests for libgcrypt.

Please describe the problem and here and not just on some external tracker. Do
not forget to describe platform and toolchain used. Thanks.

Jan 6 2015, 10:34 AM · Info Needed, Bug Report, libgcrypt
eric_debian.org added a comment to T1805: gpg-agent: Wakes up periodically.

Well if my reading is correct, the housekeeping happens in handle_tick(). 3
things are happening:

  1. Checks for lost parent. This could be converted to a signal (at least on

linux)

  1. Checks for socket permissions. This is checked only every 60 seconds, so we

don't need to wake up every two seconds to check it.

  1. Checks for lost connection to scdaemon... does this have to happen so

frequently?

dirmngr also seems to wake up often to check the if it's time to do housekeeping
(which it does every 10 minutes). Seems like this could also be improved?

scdaemon does seem harder, but not everyone is using smartcards.

Jan 6 2015, 7:34 AM · Feature Request, gnupg
hollaburoo set Version to 1.6.2 on T1807: Failing unit tests for libgcrypt.
Jan 6 2015, 5:30 AM · Info Needed, Bug Report, libgcrypt
hollaburoo added projects to T1807: Failing unit tests for libgcrypt: libgcrypt, Bug Report.
Jan 6 2015, 5:30 AM · Info Needed, Bug Report, libgcrypt

Jan 5 2015

werner added a project to T1702: file descriptor warning fixes for NetBSD when set*id: Restricted Project.
Jan 5 2015, 7:39 PM · Bug Report, libgcrypt
werner added a comment to T1702: file descriptor warning fixes for NetBSD when set*id.

Fixed for 1.7 with commit 8174723.

Jan 5 2015, 7:39 PM · Bug Report, libgcrypt
werner added a project to T1704: SCO OpenServer build fix: Won't Fix.
Jan 5 2015, 7:13 PM · Won't Fix, Bug Report, libgcrypt
werner closed T1704: SCO OpenServer build fix as Resolved.
Jan 5 2015, 7:13 PM · Won't Fix, Bug Report, libgcrypt
werner closed T1782: wrong return type for _gcry_vcontrol as Resolved.
Jan 5 2015, 7:12 PM · Bug Report, libgcrypt
werner added a comment to T1708: Unable to cross compile libgcrypt on x86_64.

Path is in the repo so it will go into 1.7. Might have also been backported to 1.6.

Jan 5 2015, 7:11 PM · Bug Report, libgcrypt
werner closed T1708: Unable to cross compile libgcrypt on x86_64 as Resolved.
Jan 5 2015, 7:11 PM · Bug Report, libgcrypt
werner added a comment to T1707: Resource leak in file "cipher/elgamal.c" in function "elg_generate_ext" at line 644.

This has been fixed for 1.7. It will not be fixed for 1.5.

Jan 5 2015, 7:09 PM · Bug Report, libgcrypt
werner closed T1707: Resource leak in file "cipher/elgamal.c" in function "elg_generate_ext" at line 644 as Resolved.
Jan 5 2015, 7:09 PM · Bug Report, libgcrypt
werner closed T1706: Resource leak in file "cipher/pubkey.c" in function "gcry_pk_encrypt" at line 2876 and "gcry_pk_genkey" at line 3623 as Resolved.
Jan 5 2015, 7:05 PM · Won't Fix, Bug Report, libgcrypt