Hello Werner,

Werner Koch <w...@gnupg.org> (Di 06 Nov 2012 15:01:42 CET):
> Hi,
> 
> I just pushed fixes to master and stable 2.0.
> 
>     Allow decryption with card keys > 3072 bit
>     
>     * scd/command.c (MAXLEN_SETDATA): New.
>     (cmd_setdata): Add option --append.
>     * g10/call-agent.c (agent_scd_pkdecrypt): Use new option for long data
>     
>     * scd/app-openpgp.c (struct app_local_s): Add field manufacturer.
>     (app_select_openpgp): Store manufacturer.
>     (do_decipher): Print a note for broken cards.
>     
>     --
>     
>     Please note that I was not able to run a full test because I only have
>     broken cards (S/N < 346) available.

Before I started exploring how to run full tests … what is the supposed
procedure?

I just built the stable-2-0 branch and installed it (->
/usr/local/stow/gpg -> /usr/local/)

It seems to work, as soon as the complete gpg2-"toolchain" is in-place.
(I do not understand, why the Debian X11/Xsession.d/90gpg-agent has
"/usr/bin/gpg-agend" hard-wired.)

I'm able to decrypt a message crypted with my 4096bit key.

> Please let me know if that works for you.  Given that the last 2.0
> release is more than 6 months old and we fixed a couple of bugs in the
> meantime, I may do a new release if this thing works for you.

So, no further tests, just "it works for me" :)

The master branch I didn't test yet. I'll give you a notice as soon as I
did.

    Best regards from Dresden/Germany
    Viele Grüße aus Dresden
    Heiko
-- 
 SCHLITTERMANN.de ---------------------------- internet & unix support -
 Heiko Schlittermann, Dipl.-Ing. (TU) - {fon,fax}: +49.351.802998{1,3} -
 gnupg encrypted messages are welcome --------------- key ID: 7CBF764A -
 gnupg fingerprint: 9288 F17D BBF9 9625 5ABC  285C 26A9 687E 7CBF 764A -
(gnupg fingerprint: 3061 CFBF 2D88 F034 E8D2  7E92 EE4E AC98 48D0 359B)-

Attachment: signature.asc
Description: Digital signature

Reply via email to