In T7627#200387, @werner wrote:
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Feed Advanced Search
Advanced Search
Advanced Search
May 19 2025
May 19 2025
• ebo moved T6907: gpgme: Explicitly tell gpg that we want to verify signed data from Restricted Project Column to Restricted Project Column on the Restricted Project board.
• ebo moved T6688: Kleopatra GPGME: Reported assert on exit from Restricted Project Column to Restricted Project Column on the Restricted Project board.
May 8 2025
May 8 2025
• ikloecker added a comment to T7620: gpgme_get_key fails to detect secret encryption subkey after key generation on card (until context is recreated).
In T7620#200845, @Saturneric wrote:I think it would be much better if GnuPG automatically performed a key listing immediately after key generation when a smartcard is involved. This would allow GnuPG to detect the presence of the subkey on the card right away, rather than leaving it marked as a stub until the user manually lists keys.
Saturneric added a comment to T7620: gpgme_get_key fails to detect secret encryption subkey after key generation on card (until context is recreated).
I see that you generated the secret encryption subkey with backup. This means that the secret subkey is generated on your computer, then copied to the card, and then deleted from your computer. The deletion is the reason why the subkey is marked as stub. Only after listing the keys on the card gpg notices that the secret key is actually on the card.
May 7 2025
May 7 2025
works for me, thanks
May 6 2025
May 6 2025
• ikloecker added a comment to T7620: gpgme_get_key fails to detect secret encryption subkey after key generation on card (until context is recreated).
The first call of get_key receives the following key listing from gpg:
2025-05-05 21:50:23 gpgme[57059] _gpgme_io_read: check: sec:-:256:19:C4A24EB0B5F2E025:1746474606:::u:::s 2025-05-05 21:50:23 gpgme[57059] _gpgme_io_read: check: cESCA:::D2760001240100000006180489130000::brainp 2025-05-05 21:50:23 gpgme[57059] _gpgme_io_read: check: oolP256r1:23::0:<LF> 2025-05-05 21:50:23 gpgme[57059] _gpgme_io_read: check: fpr:::::::::DEC0948C398A6E7B50746EC6C4A24EB0B5F2 2025-05-05 21:50:23 gpgme[57059] _gpgme_io_read: check: E025:<LF> 2025-05-05 21:50:23 gpgme[57059] _gpgme_io_read: check: grp:::::::::06BDACFBDEDBC5783A75AE5E7251FA3369C4 2025-05-05 21:50:23 gpgme[57059] _gpgme_io_read: check: 0FF4:<LF> 2025-05-05 21:50:23 gpgme[57059] _gpgme_io_read: check: uid:-::::1746474606::2222D8E2F373B9BDEE0DEA2A20A 2025-05-05 21:50:23 gpgme[57059] _gpgme_io_read: check: 9402214E9F984::Eric <eric@bktus.com>::::::::::0: 2025-05-05 21:50:23 gpgme[57059] _gpgme_io_read: check: <LF> 2025-05-05 21:50:23 gpgme[57059] _gpgme_io_read: check: ssb:-:256:19:EAFC5EA29B758B22:1746474606::::::a: 2025-05-05 21:50:23 gpgme[57059] _gpgme_io_read: check: ::D2760001240100000006180489130000::brainpoolP25 2025-05-05 21:50:23 gpgme[57059] _gpgme_io_read: check: 6r1:23:<LF> 2025-05-05 21:50:23 gpgme[57059] _gpgme_io_read: check: fpr:::::::::1AD596DDEC9B8CF3C1AC6C41EAFC5EA29B75 2025-05-05 21:50:23 gpgme[57059] _gpgme_io_read: check: 8B22:<LF> 2025-05-05 21:50:23 gpgme[57059] _gpgme_io_read: check: grp:::::::::52F0797C0B0439BBD718E2534D46656A6C45 2025-05-05 21:50:23 gpgme[57059] _gpgme_io_read: check: 6A78:<LF> 2025-05-05 21:50:23 gpgme[57059] _gpgme_io_read: check: ssb:-:256:18:A874804DB497B91C:1746474606::::::e: 2025-05-05 21:50:23 gpgme[57059] _gpgme_io_read: check: ::#::brainpoolP256r1:23:<LF> 2025-05-05 21:50:23 gpgme[57059] _gpgme_io_read: check: fpr:::::::::33B273C7BD46E4EB63DD6874A874804DB497 2025-05-05 21:50:23 gpgme[57059] _gpgme_io_read: check: B91C:<LF> 2025-05-05 21:50:23 gpgme[57059] _gpgme_io_read: check: grp:::::::::34A1F8D9B2AA0CF07C2E042D70E10F9D4EBE 2025-05-05 21:50:23 gpgme[57059] _gpgme_io_read: check: E734:<LF>
Note the line
ssb:-:256:18:A874804DB497B91C:1746474606::::::e:::#::brainpoolP256r1:23:<LF>
where the # marks the subkey as stub.
May 5 2025
May 5 2025
Saturneric added a comment to T7620: gpgme_get_key fails to detect secret encryption subkey after key generation on card (until context is recreated).
I have now identified the exact conditions and a reproducible path for the issue I previously reported. I will also attach the relevant gpgme.log.
• werner added a comment to T7620: gpgme_get_key fails to detect secret encryption subkey after key generation on card (until context is recreated).
I doubt that this is a gpgme problem. With a gpgme log we will be able see the exact commands send to gpg and replicate this on the command line.
• ikloecker moved T7627: gpgme(qt) testsuite error on 32bit archs with 64bit time_t from Backlog to QA for next release on the gpgme board.
Should be fixed.
For gpgme 2 we changed the data types of the time fields to unsigned: rMf2d40473b522e348d96a70c089d2191d0b978098 . Since this change breaks the ABI we use the above change for the 1.24 branch.
• werner changed the status of T3325: Allow encryption/signing in GPGME using a specified subkey from Open to Testing.
• werner triaged T7627: gpgme(qt) testsuite error on 32bit archs with 64bit time_t as Normal priority.
tested @ikloecker's patch succesful on amdahl.
The following patch for gpgme 1.24 should fix the test.
diff --git a/lang/cpp/src/key.cpp b/lang/cpp/src/key.cpp index 42046aa..2b14d90 100644 --- a/src/key.cpp +++ b/src/key.cpp @@ -633,7 +633,7 @@ time_t Subkey::creationTime() const
I did a local change (on amdahl.d.o) changing _gpgme_subkey.expires to long long (ABI-break) and all tests succeeded.
It looks like the entirety of gpgme timestamping was missed when the 64bit time transition happened in Debian and Ubuntu.
• ikloecker edited projects for T7627: gpgme(qt) testsuite error on 32bit archs with 64bit time_t, added: gpgme; removed gpgmeqt, qt.
This looks like a problem in gpgme. struct _gpgme_subkey stores the expiration date as long int expires which is a signed 32-bit value on all 32-bit architectures. gpgmepp casts this to time_t, but that doesn't help if the 32-bit value is already negative. The same problem exists with all other timestamps in gpgme (i.e. key creation date, signature expiration date, etc.).
• ikloecker added a comment to T7620: gpgme_get_key fails to detect secret encryption subkey after key generation on card (until context is recreated).
The logs of gpgme would be helpful, i.e. run your test program with GPGME_DEBUG=8:$(pwd)/gpgme-$(date +"%Y-%m-%d-%H%M%S").log to create a log file with gpgme's logs.
Apr 26 2025
Apr 26 2025
Apr 22 2025
Apr 22 2025
Apr 16 2025
Apr 16 2025
• ebo closed T7600: Kleopatra: gpg.exe hangs on trying to exportably certify an already locally signed certificate with multiple UIDs as Resolved.
This is resolved in the final Beta15.
Apr 14 2025
Apr 14 2025
Apr 11 2025
Apr 11 2025
ballapete added a comment to T7533: gpgme-1.24.1 and gpgme-1.24.2 do not compile on Mac OS X 10.4.11, Tiger, because of problem with strcasecmp/strncasecmp in gpgme-tool.c.
Tiger-Patches.diff2 KBDownload
patch set used.ballapete added a comment to T7533: gpgme-1.24.1 and gpgme-1.24.2 do not compile on Mac OS X 10.4.11, Tiger, because of problem with strcasecmp/strncasecmp in gpgme-tool.c.
I tried to apply crude patches. Since _POSIX_C_SOURCE is defined when <string.h> is included (in pre-compiled source I see
• werner added a comment to T7600: Kleopatra: gpg.exe hangs on trying to exportably certify an already locally signed certificate with multiple UIDs.
That error code is actually not an error code but it is the ERROR state from the Kleo SFM. We have seen that yesterday already.
• ebo added a comment to T7600: Kleopatra: gpg.exe hangs on trying to exportably certify an already locally signed certificate with multiple UIDs.
this exact case is fixed in VS-Desktop-3.3.90.12-Beta
Adding further UIDs and making more certifications still works, too.
• ebo updated the task description for T7600: Kleopatra: gpg.exe hangs on trying to exportably certify an already locally signed certificate with multiple UIDs.
Apr 10 2025
Apr 10 2025
• ikloecker added a comment to T7600: Kleopatra: gpg.exe hangs on trying to exportably certify an already locally signed certificate with multiple UIDs.
Very likely this bug exists since 2017 when support for promotion of local certifications to exportable certifications was added.
• ikloecker changed the status of T7600: Kleopatra: gpg.exe hangs on trying to exportably certify an already locally signed certificate with multiple UIDs from Open to Testing.
• ikloecker added projects to T7600: Kleopatra: gpg.exe hangs on trying to exportably certify an already locally signed certificate with multiple UIDs: gpd5x, gpgme.
Fixed in gpgmepp for gpd5x. I think for VSD 3.3 we'll add a patch to gpg4win.
Mar 19 2025
Mar 19 2025
Attached is a patch which adds gpgme_subkey_set_flag() to handle both encryption and signing keys. Or maybe it would be better to add another signing function that does recpstring?
Mar 14 2025
Mar 14 2025
BTW, do we really need a C++ API for this? Might make sense due to the need for a context.
Mar 10 2025
Mar 10 2025
calvin added a comment to T7541: libassuan AC_DEFINE_UNQUOTED m4 fix needs propagating to pinentry and gnupg2.
This was using GCC to build, but on AIX. I believe support for dollar signs in identifiers are platform specific.
• gniibe added a comment to T7541: libassuan AC_DEFINE_UNQUOTED m4 fix needs propagating to pinentry and gnupg2.
GCC allows dollars in identifier, that's the reason why we haven't encountered this issue, I suppose.
• gniibe changed the status of T7541: libassuan AC_DEFINE_UNQUOTED m4 fix needs propagating to pinentry and gnupg2 from Open to Testing.
• gniibe triaged T7541: libassuan AC_DEFINE_UNQUOTED m4 fix needs propagating to pinentry and gnupg2 as Normal priority.
• gniibe added a project to T7541: libassuan AC_DEFINE_UNQUOTED m4 fix needs propagating to pinentry and gnupg2: gpgme.
Thank you for your report.
Feb 28 2025
Feb 28 2025
• ebo moved T6880: GPGME (++/qt): Add support for --quick-add-adsk from WiP to vsd-3.3.0 on the vsd33 board.
Feb 26 2025
Feb 26 2025
New API gpgme_op_random_bytes is now in master (gpgme 2.0). Use tests/run-genrandom --help for testing. Extra features will come soon.
Feb 24 2025
Feb 24 2025
Feb 21 2025
Feb 21 2025
Finally removed with gpgme 2.0
Feb 16 2025
Feb 16 2025
Feb 10 2025
Feb 10 2025
Feb 4 2025
Feb 4 2025
Okay, thanks!
Fixed in master and the new gpgme-1.24-branch. Thus this fix will be in 2.0.0 and 1.24.2
Feb 3 2025
Feb 3 2025
• werner triaged T7508: GPGME gpgme_pubkey_algo_string Returns "unknown" for RSA Keys as High priority.
I am pretty sure this was my fault: rM62b6c1f16 is the culprit.
Jan 20 2025
Jan 20 2025
• ebo closed T7320: Kleopatra: Decrypting and verifying a pgp-encrypted archive fails with "no data" as Resolved.
VSD-Beta-481: Encrypting/signing with gpgtar on the cli and decrypting/verifying with Kleopatra works
Jan 20 2025, 3:55 PM · gpgme (gpgme 1.24.x), vsd33 (vsd-3.3.0), kleopatra, Restricted Project, Bug Report
• ebo moved T7320: Kleopatra: Decrypting and verifying a pgp-encrypted archive fails with "no data" from QA to vsd-3.3.0 on the vsd33 board.
Jan 20 2025, 3:55 PM · gpgme (gpgme 1.24.x), vsd33 (vsd-3.3.0), kleopatra, Restricted Project, Bug Report
Jan 13 2025
Jan 13 2025
• TobiasFella moved T6971: Kleopatra: "General Error" is given instead of "Wrong PIN" from QA to vsd-3.3.0 on the vsd33 board.
works with VSD-beta-478
Jan 6 2025
Jan 6 2025
Jan 2 2025
Jan 2 2025
I have replaced the expiring test key with a new non-expiring test key.
@ikloecker: Do you still have the private key for tests/json/key-with-revokers.asc somewhere? We need to remove the expiration date due to T7471.
Dec 28 2024
Dec 28 2024
Dec 20 2024
Dec 20 2024
• ebo moved T6554: Kleopatra: Reports success when gpgtar is kill with SIGTERM or SIGKILL while folder is encrypted from QA to vsd-3.3.0 on the vsd33 board.
Dec 16 2024
Dec 16 2024
• ebo moved T7320: Kleopatra: Decrypting and verifying a pgp-encrypted archive fails with "no data" from WiP to QA on the vsd33 board.
Dec 16 2024, 11:19 AM · gpgme (gpgme 1.24.x), vsd33 (vsd-3.3.0), kleopatra, Restricted Project, Bug Report
Dec 13 2024
Dec 13 2024
(ignore the last commit, I assigned the wrong task to it)
Dec 10 2024
Dec 10 2024
• werner added a comment to T7262: gpgme: Move C++ bindings, Qt bindings and Python bindings to separate git repositories.
In T7262#195642, @ametzler1 wrote:I read this as bumping the version-number e.g. from 1.24.5 to 2.0.0 without e.g. bumping the soname or changing the api_version as specified in the .pc file. (FWIW I think that is a great plan.)
Dec 9 2024
Dec 9 2024
• ikloecker added a comment to T7262: gpgme: Move C++ bindings, Qt bindings and Python bindings to separate git repositories.
We'll do this with QGpgME 3. And it's easy to add new functions by using the NVI pattern and, if needed, virtual functions in the attached private classes. I've been using this technique for quite some time now.
• aheinecke added a comment to T7262: gpgme: Move C++ bindings, Qt bindings and Python bindings to separate git repositories.
Ah, ok I understood it as "we will change the soname for other reasons e.g. so that both versions are co installable but we will not break ABI". And I would prefer the break for qgpgme at least because of the mentioned problem not because I don't care about ABI stability but because I do and this is a big problem which only exists, because I didn't do it with the last repo move. There is no technical reason anymore for the abstract base classes.
ametzler1 added a comment to T7262: gpgme: Move C++ bindings, Qt bindings and Python bindings to separate git repositories.
Werner wrote:
We will bump the gpgme core version to 2.0 to indicate this split despite that there will be non-ABI/API incompatibility.
• aheinecke added a comment to T7262: gpgme: Move C++ bindings, Qt bindings and Python bindings to separate git repositories.
If the major version for QGpgME is bumped, shouldn't we at least remove the virtual base classes. Eg: delete FooJob and rename QGpgMEFooJob to FooJob. I did regret not doing this when i moved them out of libkleo since this architecture no longer makes sense in the standalone libnrary and technically the virtual bases make it nearly impossible to maintain ABI stability when adding functions. The reason for those was only because libkleo had that idea of different backends namely gpgme and chiasmus. But a Library called QGpgME should never provide another backend then GPGME IMO.
So no behavioural change at all, just something to make future ABI compat easier.
Dec 5 2024
Dec 5 2024
Dec 4 2024
Dec 4 2024
Nov 25 2024
Nov 25 2024
• ebo closed T6554: Kleopatra: Reports success when gpgtar is kill with SIGTERM or SIGKILL while folder is encrypted as Resolved.
tested with Gpg4win-Beta-75++
Nov 21 2024
Nov 21 2024
• ebo moved T6971: Kleopatra: "General Error" is given instead of "Wrong PIN" from Backlog to QA for next release on the gpgme board.
• ebo moved T6971: Kleopatra: "General Error" is given instead of "Wrong PIN" from Restricted Project Column to Restricted Project Column on the Restricted Project board.
Error on generate keys on card is now: "Failed to generate new card keys and a certificate: Wrong PIN"
• ebo removed a project from T7203: GpgME: Implement S/MIME-specific variant of QGpgMESignEncryptJob: Restricted Project.
Nov 18 2024
Nov 18 2024
Nov 14 2024
Nov 14 2024
• ikloecker moved T6971: Kleopatra: "General Error" is given instead of "Wrong PIN" from Backlog to QA on the vsd33 board.
• ikloecker moved T6971: Kleopatra: "General Error" is given instead of "Wrong PIN" from Restricted Project Column to Restricted Project Column on the Restricted Project board.
• ikloecker added a project to T6971: Kleopatra: "General Error" is given instead of "Wrong PIN": vsd33.
This fix is also in VSD 3.3
• ikloecker moved T6554: Kleopatra: Reports success when gpgtar is kill with SIGTERM or SIGKILL while folder is encrypted from Restricted Project Column to Restricted Project Column on the Restricted Project board.
• ikloecker moved T6554: Kleopatra: Reports success when gpgtar is kill with SIGTERM or SIGKILL while folder is encrypted from Backlog to QA on the vsd33 board.
This is included in test installers since some time already.
• ikloecker added a project to T6554: Kleopatra: Reports success when gpgtar is kill with SIGTERM or SIGKILL while folder is encrypted: vsd33.
This change is also used for VSD 3.3
Nov 11 2024
Nov 11 2024
Nov 7 2024
Nov 7 2024
Nov 6 2024
Nov 6 2024
• ebo moved T7320: Kleopatra: Decrypting and verifying a pgp-encrypted archive fails with "no data" from WiP to QA for next release on the gpgme board.
Nov 6 2024, 10:09 AM · gpgme (gpgme 1.24.x), vsd33 (vsd-3.3.0), kleopatra, Restricted Project, Bug Report
• ebo moved T7320: Kleopatra: Decrypting and verifying a pgp-encrypted archive fails with "no data" from Restricted Project Column to Restricted Project Column on the Restricted Project board.
This works with gpg4win-beta-70.
Nov 6 2024, 10:09 AM · gpgme (gpgme 1.24.x), vsd33 (vsd-3.3.0), kleopatra, Restricted Project, Bug Report
Nov 5 2024
Nov 5 2024
• ikloecker triaged T7374: gpgme: The export operation seems to ignore failures reported by gpg as Low priority.
• ebo moved T7320: Kleopatra: Decrypting and verifying a pgp-encrypted archive fails with "no data" from Backlog to WiP on the gpgme board.
Nov 5 2024, 11:13 AM · gpgme (gpgme 1.24.x), vsd33 (vsd-3.3.0), kleopatra, Restricted Project, Bug Report
Oct 30 2024
Oct 30 2024
wiktor-k added a comment to T4060: Add ability to mark critical notations as "recognized" during signature verification.
I've checked and can confirm this is working as intended.
Oct 29 2024
Oct 29 2024
• werner moved T4060: Add ability to mark critical notations as "recognized" during signature verification from Backlog to QA for next release on the gpgme board.
Alright, finally supported by gpgme (fot 1.24) For testing you may use