sks-devel
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Sks-devel] Re: zero-length MPIs (was: Re: mpi error with check-trus


From: David Shaw
Subject: Re: [Sks-devel] Re: zero-length MPIs (was: Re: mpi error with check-trustdb in 1.4.2 - resolved)
Date: Fri, 2 Sep 2005 08:31:04 -0400
User-agent: Mutt/1.5.8i

On Wed, Aug 31, 2005 at 04:07:38AM +0200, Peter Palfrader wrote:
> On Thu, 11 Aug 2005, Jason Harris wrote:
> 
> > On Thu, Aug 11, 2005 at 09:54:59PM +0200, Peter Palfrader wrote:
> > > On Thu, 11 Aug 2005, Jason Harris wrote:
> > 
> > > > Fetching them from keyserver.kjsl.com is now possible with gnupg-1.4.2.
> > > > To patch pks, add this to the middle of decode_mpi() (in pgputil.c):
> > > > 
> > > >   /* skip packets with 0-length MPIs for GPG's benefit (gnupg-1.4.2) */
> > > >   if (mpi->nbits == 0) {
> > > >     return (0);
> > > >   }
> > > 
> > > can we do that in SKS too?  please!
> > 
> > Try the patch below.  0x1A9537E7 is another offending key, and all eight
> > work now:
> 
> Do we also have a patch that cleans up keys like CD15A883 and CA57AD7C?

You could probably do this in SKS (or pksd) but it would be fairly
expensive to check all the subpackets of all signatures.

GnuPG 1.4.3 will handle these keys without warning (as well as the
zero-length MPI problem).

David




reply via email to

[Prev in Thread] Current Thread [Next in Thread]