- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Advanced Search
Mar 29 2022
The patch I proposed was partial one, not fully solved the problem of socket resource leak on Windows.
Done in master to be 1.11 for server side rC754ad5815b5b: random: Remove use of experimental random daemon.
Done in 1.10.1.
Mar 28 2022
I read OpenSSL implementation.
It does NOT implement backtracking.
In openssl/crypto/x509/x509_vfy.c, it has a function find_issuer which does:
- exclude a issuer when it's already in ctx->chain (can avoid recursion forever)
- prefer the first non-expired one, else take the most recently expired one.
When we will find reproducible test case, please reopen.
Mar 25 2022
Thank you. Applied.
Implemented.
Thank you for the error output.
it still shows the no certificate or invalid encoded error message:
Mar 24 2022
And I move functions from pinentry.c to pinentry-curses.c, so that pinentry-w32.exe can be build with no libiconv (which is actually not used).
Thank you for your report.
Merged into T5804.
Thank you. Confirmed.
Thank you for the reproducible test case. Confirmed.
Pushed the change removing the definition.
GetNativeSystemInfo. Would you like me to submit a patch that used that in jent_ncpu?
Mar 23 2022
Thank you. Confirmed.
Thank you.
Considering again, I think that just removing the definition of the struct timespec in npth.h is the best approach, given the situation, it's been there for MINGW64 and it's now in original MinGW.
Thank you. I understand the situation by looking at mingwrt-5.4.2-mingw32-src.tar.xz.
In libgcrypt (1.10), we have a copy of the jitterentropy 3.3.0 from:
http://www.chronox.de/jent.html
or https://github.com/smuellerDD/jitterentropy-library
Mar 22 2022
I had thought that we need to combine hkdf so that key and iv can generate within libgcrypt internally.
Probably, this assumption of mine may be wrong.
Thank you. Confirmed and applied.
Thank you for your report.
Please specify your MinGW version.
Please specify the version of MinGW, which you are using. (We use Mingw-w64 for GnuPG Project.)
Mar 21 2022
Now, the problem is not about the case of pid == getpid () any more.
Note that there is a race condition still (after a fix of one race condition which may be somewhat likely and reproducible, and another fix of race condition when there is a stale lockfile).
Fixed another race in commit: rG2f1afc129662: common: Fix another race condition, and address the other one.
Mar 19 2022
Mar 18 2022
For the logic of detecting unlocking, it should work when h->use_o_excl == 1.
Before the fix above, https://bugs.debian.org/972525 can be explained by the following scenario:
Fixed in master. Should be backported when found stable.
I pushed a change for t-dotlock.c for testing.
Mar 17 2022
I can't replicate this symptom when I use gnupg1 for creating keys with no passphrase.
I think that the particular issue of Let's Encrypt Certificate was handled correctly already.
Mar 16 2022
I can't replicate this symptom (gpg1 generated key, no problem after migration).
Could you share the *.key file under private-keys-v1.d?
I think that this commit rG8fd150b05b74: gpg: Remove all support for v3 keys and always create v4-signatures. matters.