- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Advanced Search
Oct 27 2025
Workaround is to use --with-keygrip and delete both <keygrip>.key files. Problem here is that one part may be on a smartcard or one part might be shared (although not allowed) with other keys.
Oct 24 2025
But you are able to do this w/o gpgol being active?
Oct 23 2025
gpgconf does not know about the global config files. Nor does it known about things like gpg.conf-2 etc.
Oct 22 2025
I'd sad we keep it as it is now (unless we see a regression). The real and only correct solution is the use of a daemon to serialize access.
Oct 21 2025
That might be related to T2196 which has been hopefully fixed in 2.2.50 and also in the next 2.6. Closing this task.
That might be related to T2196 which has been hopefully fixed in 2.2.50 and also in the next 2.6. Closing this task.
I applied it to the 2.4 branch but please do not continue to translate for 2.4. 2.6 (master) is the new target.
Implemented but not tested at all.
Oct 20 2025
Oct 16 2025
Oct 15 2025
Oct 14 2025
Oct 13 2025
At which point did were you asked for the passphrase for decryption? You flushed the gpg-agent cache, right?
Oct 10 2025
The problem here is that iobuf_readbyte returns -1 on error and on EOF. parse_packet is not able to distinguish that because for histroic reasons we do not return a gpg-error code (GPG_ERR_EOF). To fix this we need to change all callers of parse_packet to not act upon -1 but only on an error code.
Oct 9 2025
Except for the release/unlock thing after keybox_compress I already have the other fixes in my 2.2 commits. I noticed that the gpgsm keydb lock/release stuff differes from the one for gpg: For gpg we use the keybox_lock function but that is bot used at all by gpgsm. In theory this should be unified but I fear a regression risk and thus for 2.2 we better don't touch it.
Shall we merge this with T2196 ? BTW, I have some unpushed commit and a test installer.
Oct 7 2025
We recently noticed problem at a customer site with creating the standard rsa3072 keys. It basically stopped working. A likely cause for this seems to be some anti-malware software slowing down file system calls. In the wake of this we looked again at our file locking strategy and found a few things which are not as they should be. For example the release of the lock before a Close call. Trying to fix this unfortunately caused other problems, thus a couple of fixes are needed.
Oct 6 2025
(auto resolved due to the keyword "resolved" in the commit message)
Oct 4 2025
That is on purpose. With a signed mail you have at least a way to tell who sent the mail. An unsigned but encrypted mail can be send by anyone and you netter don't use HTML links there.