On Mon, 20 Feb 2006 17:14:52 +0100, Marcus Meissner said: > While files with other content report: > $ gpg -o xx xx.any > gpg: no valid OpenPGP data found. > gpg: processing message failed: eof > $ echo $? > 2 > $ Just to explain this one: The code uses a heuristic to test whether it is a binary or armored messages. If it decided that it is armored, the de-armoring code is run and that one will eventually complain that this does not look like OpenPGP. We added this diagnostic quite some time ago on because too often garbled armored messages led to user confusion. The thing with binary messages is that gpg will happily parse them if they look like an OpenPGP packets and only terminate with an error if they don't. It is easy to make up OpenPGP data without any actual use. Minor changes in the parser may change what gpg considers acceptable. The exact semantics have never been defined, so I don't considere this a bug. gpg is not a OpenPGP packet validator. Changing that now will probably break more things than do any good. There are a few non-security related issues with the last update; we are right now sorting them out. Shalom-Salam, Werner
Attachment:
pgpQTpUGZoqGW.pgp
Description: PGP signature