[solved] Re: gpg 2.0.11 reports invalid packets on keys from gpg 1.4.9 and keyservers
John Marshall
john.marshall at riverwillow.com.au
Tue May 26 11:49:23 CEST 2009
On Tue, 26 May 2009, 10:29 +0200, Werner Koch wrote:
> An older libgcrypt actually showed the problem:
>
> an mpi of size 0 is not allowed
> an mpi of size 0 is not allowed
> gpg: read_block: read error: Invalid packet
>
> thus finding the bug was easy after John sent me the full bad key. The
> bug is due to an inconsistency between Libgcrypt and and GnuPG-1.4.
> That problem must have been there for many years and will be fixed in
> Libgcrypt 1.5.0. For the time being I implemented a workaround in
> GnuPG. It is already commited SVN to trunk; find a patch below.
Thank you Werner,
I re-built GnuPG 2.0.11 with a patched parse-packet.c on one of my
systems here and it now handles that key with no problem.
--
John Marshall
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 196 bytes
Desc: not available
URL: </pipermail/attachments/20090526/a1bfa737/attachment.pgp>
More information about the Gnupg-devel
mailing list