- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Advanced Search
Feb 21 2022
Actually all changes Kleopatra does go through gpgconf. Thus is is normal that gpgconf overwrites things.
Feel free to ask me by PM if you run into problems (wk at gnupg.org). Two of my colleagues are Vim users and thus have an interest in a well working plugin :-). Thanks.
Feb 20 2022
Try with hkp:// - I assume that you are missing the new Lets Encrypt CA certificates
Why are you using the log output for scripting? This is not its intended use. You need to use --status-fd. Log output is purely for human consumption it not a stable API. BTW, --fixed-list-mode has gone ages ago but it does not harm.
Feb 18 2022
There is another hacker working on finishing it. I only provided the framework.
What is the problem here? Some compiler warning about fully legal code?
Feb 17 2022
It seems you have replaced the scdaemon module from GnuPG by a 3rd party module (which exhibits a version number 0.10.0) - this is not supported and you will of course run into errors.
What you uploaded are files with a length of zero bytes. That is not valid data. The hang should not happen of course.
Setting the management key has been implemented only for Yubikeys. So for Gemalto this won't work.
I wonder why a platform has no cmp but comes with printf, which is a modern POSIX extension to Unix.
Feb 16 2022
Why can't we hide internal symbols in c++ as we are doing in other libs for ages? Were the internal symbols only accidentally exposed?
Feb 15 2022
Folks, you are opening a can of worms. The only secure why to sign a file is to have a detached signature. That is often non-practical and thus putting the signature/MAC at one certain position and exempt just this one position from hashing is the next best alternative. Any more complicated rules will inevitably introduce security flaws. If a binary is stripped, it is a different binary than a non-stripped one, if it is linked with another linker, it is a different one. And that binary will even be able to figure this out and change behavior. Please keep it simple.
Guess why GnuPG has its own Tor aware resolver ;-) To debug this kind of stuff you need to debug dirmngr, by adding for example
Feb 14 2022
As well as GnuPG VS-Desktop. 3.1.21. We should also do a new gpg4win release.
Feb 11 2022
Feb 10 2022
Actually is was/is a chain of bugs due to changing some URLs in confirmation mails from http to https.
GpgOL 2.5.2 has been released
Feb 9 2022
Feb 8 2022
Let's try this for 2.3
Feb 7 2022
Breaking the flawless decryption of existing old data is unfortunately a highly controversy topic. Recall the no-more-v3 packet support or the required MDC. It was technically okay and 99.99% of the users didn't even notice it. But some were very vocational.
Feb 6 2022
I am not sure what all the other ode changes are about. There is no explanation.
disk full. Fixed. Thanks.
Feb 4 2022
Feb 3 2022
Why not simply cast to uintmax_t ? That makes the string easier to read.
Feb 2 2022
it will be but we first prefer to do some final tests with that version. Feel free to also test. Either this or the next micro version will eventually be announced.
Check that the server does not prohibit TLS 1.2 - a few server admins allow only TLS 1.3 for whatever security threats they have in mind.
Feb 1 2022
This code
Jan 31 2022
Thanks
Jan 28 2022
Thanks for the report. To keep things easy the empty comment is now translated to "(none)".