- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
All Stories
Dec 12 2022
AFAIU, gpgrt-config works well now for the multilib MinGW target.
Dec 11 2022
Dec 10 2022
Dec 9 2022
I*m sorry, but I haven't found a way to determine what version of gnupg I am running. Just in case things got confused, I am not the thread opener, my version of gnupg is not whats been stated in the opening post but rather whatever is current on Arch Linux: Linux 6.0.11-arch1-1
I ran gpgsm --version though which returns this:
gpgsm (GnuPG) 2.2.40
Please update to a recent gnupg versions. 2.3.3 or if you really need the LTS version use 2.2.40. Instead of using a log you can import on the command line:
After years of using S/MIME I ran into a strange situation importing my new S/MIME certs to Kleopatra yesterday which ultimately led me to this thread.
My case is slightly different because my original passwords were short (2w7g9r1e and 2y8m7i5t), but it feels related so I thought I'd share nevertheless.
I also reproduced this bug. I am using a PIV configured YubiKey 5C NFC for GNOME Smartcard login, which uses pam_pkcs11, and pam_pkcs11 uses opensc to read it via pcscd.
The current WKD/WKS draft offers no direct guidance to WKD clients about the type of filtering they should do.
Dec 8 2022
The problem with expired keys may still happen for GpgSignKeyEditInteractor, but Kleopatra doesn't allow certifying expired keys or user IDs. Therefore, I don't look into this.
OK I can confirm that with ae9258fb and f1802682 commits I was ble to update my rpm packages to 1.18.0.
I've hit that issu on downloading two times so I think that there are two nodes behind LB :P
Just checked those two commits and I see in autoconf output:
checking for gpg-error-config... no checking for gpgrt-config... /usr/bin/gpgrt-config configure: Use gpgrt-config with /usr/lib64 as gpg-error-config checking for GPG Error - version >= 1.36... yes (1.46-unknown) configure: Use gpgrt-config as libassuan-config checking for LIBASSUAN - version >= 2.4.2... yes (2.5.5-unknown) checking LIBASSUAN API version... okay
So looks like there is more use of *-config scripts and those detections takes longer time so it would be good to move that as well to pkgconfig.
External projects should have been using pkgconfig since a long time. The *-config scripts are for systems which lack pkgconfig.
In T6305#165907, @ebo wrote:With GnuPG VSD 3.1.25 the Certify action is not disabled for me. Neither on Windows nor on Linux system.
I cannot find the commit which fixes this issue.
With GnuPG VSD 3.1.25 the Certify action is not disabled for me. Neither on Windows nor on Linux system.
How did you manage to certify an expired key? For me the Certify action is always disabled for an expired key or user ID.
Should be fixed. Tested as described in the above comment T5960#165845.
Thank you for your report.
Please look T6204.
Closed as duplicate.