Not completely fixed?

Werner Koch wk at
Tue Feb 21 13:57:49 CET 2006

On Mon, 20 Feb 2006 17:14:52 +0100, Marcus Meissner said:

> While files with other content report:
> $ gpg -o xx xx.any
> gpg: no valid OpenPGP data found.
> gpg: processing message failed: eof
> $ echo $?
> 2
> $

Just to explain this one: The code uses a heuristic to test whether it
is a binary or armored messages.  If it decided that it is armored,
the de-armoring code is run and that one will eventually complain that
this does not look like OpenPGP.  We added this diagnostic quite some
time ago on because too often garbled armored messages led to user

The thing with binary messages is that gpg will happily parse them if
they look like an OpenPGP packets and only terminate with an error if
they don't.  It is easy to make up OpenPGP data without any actual
use.  Minor changes in the parser may change what gpg considers
acceptable.  The exact semantics have never been defined, so I don't
considere this a bug.  gpg is not a OpenPGP packet validator.

Changing that now will probably break more things than do any good.

There are a few non-security related issues with the last update; we
are right now sorting them out.


-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 199 bytes
Desc: not available
Url : /pipermail/attachments/20060221/56779c86/attachment.pgp

More information about the Gnupg-devel mailing list