Bug 473055 - Failed times user could type for encrypted mail is inconsistent with that in failed message [NEEDINFO]
Failed times user could type for encrypted mail is inconsistent with that in ...
Product: Red Hat Enterprise Linux 5
Classification: Red Hat
Component: evolution (Show other bugs)
All Linux
medium Severity medium
: ---
: ---
Assigned To: Matthew Barnes
Depends On:
  Show dependency treegraph
Reported: 2008-11-26 05:31 EST by Yolkfull Chow
Modified: 2014-06-02 09:23 EDT (History)
5 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2014-06-02 09:23:27 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---
pm-rhel: needinfo? (yzhou)

Attachments (Terms of Use)

  None (edit)
Description Yolkfull Chow 2008-11-26 05:31:35 EST
Description of problem:
When receiving an encrypted message,click "Cancel" for the popup window of "Typing passphrase...".  And then click the button before text "VHDL document attachment(encrypted.asc)" and type wrong passphrase for the popup window always,
you will find user could type six times,however be warned "3 bad passphrases given".

Version-Release number of selected component (if applicable):
evolution-2.12.3-8.el5_2.3 - x86_64 (zh_TW)

How reproducible:

Steps to Reproduce:
1. Send a PGP encrypted message to the account itself
2. open the message by clicking on it, in the popup window,click "Cancel"
3. click the button before text "VHDL document attachment(encrypted.asc)",and type wrong passphrase always
Actual results:
The warn message show that "3 bad passphrases given" however user could type wrong passphrase for six times.

Expected results:
The times in warn message should be consistent with actual times that user could type.

Additional info:
Comment 2 RHEL Product and Program Management 2014-03-07 08:56:07 EST
This bug/component is not included in scope for RHEL-5.11.0 which is the last RHEL5 minor release. This Bugzilla will soon be CLOSED as WONTFIX (at the end of RHEL5.11 development phase (Apr 22, 2014)). Please contact your account manager or support representative in case you need to escalate this bug.
Comment 3 RHEL Product and Program Management 2014-06-02 09:23:27 EDT
Thank you for submitting this request for inclusion in Red Hat Enterprise Linux 5. We've carefully evaluated the request, but are unable to include it in RHEL5 stream. If the issue is critical for your business, please provide additional business justification through the appropriate support channels (https://access.redhat.com/site/support).

Note You need to log in before you can comment on or make changes to this bug.