[Top][All Lists]
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Sks-devel] Re: zero-length MPIs (was: Re: mpi error with check-trustdb
From: |
Peter Palfrader |
Subject: |
[Sks-devel] Re: zero-length MPIs (was: Re: mpi error with check-trustdb in 1.4.2 - resolved) |
Date: |
Thu, 11 Aug 2005 21:54:59 +0200 |
User-agent: |
Mutt/1.5.9i |
On Thu, 11 Aug 2005, Jason Harris wrote:
> On Thu, Aug 11, 2005 at 12:02:17PM -0400, Jason Harris wrote:
> > On Wed, Aug 10, 2005 at 10:30:09PM -0500, John Clizbe wrote:
>
> > > Tracked down the two offending keys and deleted them with 1.4.1. They both
> > > failed to import from a keyserver with 1.4.2 with the same mpi error, so
> > > I'm
> > > marking it off to key cruft.
>
> Here are some more offending keys:
>
> 0xA0B3E88B
> 0xFC05DA69
> 0x0FCF6738
> 0xCC78C893
> 0x98FDE37C
> 0x74C9DE33
> 0x57023F00 - corrupt subkey
>
> Fetching them from keyserver.kjsl.com is now possible with gnupg-1.4.2.
> To patch pks, add this to the middle of decode_mpi() (in pgputil.c):
>
> /* skip packets with 0-length MPIs for GPG's benefit (gnupg-1.4.2) */
> if (mpi->nbits == 0) {
> return (0);
> }
can we do that in SKS too? please!
--
PGP signed and encrypted | .''`. ** Debian GNU/Linux **
messages preferred. | : :' : The universal
| `. `' Operating System
http://www.palfrader.org/ | `- http://www.debian.org/