great hack
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Advanced Search
Nov 16 2022
We should consider to break the Assuan API maybe we can do that without too many problems for the current use cases.
Nov 15 2022
Nov 14 2022
I don't understand the last two points: This is only about the three standard descriptors but how shall we supply more descriptors? At least in GPGME we definitely need more.
Nov 13 2022
Nov 12 2022
I just moved Phabricator to a new machine and created separte certificates for files.gnupg.net and dev.gnupg.org.
Nov 11 2022
You need to handle them in a correct way. Just checking with gpg is
not enough because you don't know what has been signed. You need to
look at the signed data which gpg gives you by using the --output
option. And there you see only the signed data and not the extra
"aaa" you added after having signed the plaintext. It is not
different from adding stuff before the -----BEGIN PGP SIGNED ... line.
Nov 10 2022
Actually I am not sure whether this is really a bug and that the fix is needed. What has been signed and verified is what gpg has seen and what --output has written. For example a line in the cleartext format may read "- From my " but what actually has been signed was "From my". If a line has been truncated --output will write only the truncated and thus verified data and not what was in the cleartext format.
The distinction between reader and card is not easy and PS/SC is also not helpful here. The user needs to resort to trial and error. With 2.3 things are much easier because we do not need to select the reader anymore.
Thanks. There should also be SPDX indentifiers everywhere.
Nov 9 2022
AFAIK, Microsoft stated that the value of a HANDLE will always fit into a DWORD; i.e. only the lower 32 bits are used even on a 64 bit Windows.
Nov 4 2022
Nov 3 2022
Hi Vincent,
Nov 2 2022
Oct 31 2022
Oct 28 2022
Meanwhile I have _some_ doubts that the v5 format is a good idea. It will introduce a lot of problems and thus a more lean way of replacing the fingerprint should be re-considered. Even if that means, we have to live with two kinds of fingerprints for a decade or so.
We won't do that. FWIW: We started to work on a 64 bit WIndows version of GnuPG.
Given that the OpenPGP WG practically decided to fork OpenPGP I don't see a reason why we should keep this bug open.
I can't see what we shall do here.
Will go into 2.3.9 and gpg4win 4.0.5
You are using a somewhat special setup and not what has been tested with gpg (i.e. putty). In particular Cygwin based tools do not interoperate well with non-Cygwin tools.
@jukivili: This has been released with 1.10.0 - shall we close this bug?
Shall we really backport this to 2.2 given that ECC for S/MIME is in most cases a smartcard thing?
Has been release quite some time ago (2.3.8 and earlier)
Will be released with 2.3.9
Fixed for master but not yet tested.
Is this still an issue or is the new gpgconf -X feature sufficient to detect this case?
An outer signature or even a new packet to sign the list of encrypted session keys might also be an option which does not disturb older implementations.
Is that still required wit the new gpgme global flag "inst-type"?