- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Advanced Search
Tue, Oct 28
Mon, Oct 27
Workaround is to use --with-keygrip and delete both <keygrip>.key files. Problem here is that one part may be on a smartcard or one part might be shared (although not allowed) with other keys.
Fri, Oct 24
But you are able to do this w/o gpgol being active?
Thu, Oct 23
gpgconf does not know about the global config files. Nor does it known about things like gpg.conf-2 etc.
Wed, Oct 22
I'd sad we keep it as it is now (unless we see a regression). The real and only correct solution is the use of a daemon to serialize access.
Tue, Oct 21
That might be related to T2196 which has been hopefully fixed in 2.2.50 and also in the next 2.6. Closing this task.
That might be related to T2196 which has been hopefully fixed in 2.2.50 and also in the next 2.6. Closing this task.
I applied it to the 2.4 branch but please do not continue to translate for 2.4. 2.6 (master) is the new target.
Implemented but not tested at all.
Oct 20 2025
Oct 16 2025
Oct 15 2025
Oct 14 2025
Oct 13 2025
At which point did were you asked for the passphrase for decryption? You flushed the gpg-agent cache, right?
Oct 10 2025
The problem here is that iobuf_readbyte returns -1 on error and on EOF. parse_packet is not able to distinguish that because for histroic reasons we do not return a gpg-error code (GPG_ERR_EOF). To fix this we need to change all callers of parse_packet to not act upon -1 but only on an error code.
Oct 9 2025
Except for the release/unlock thing after keybox_compress I already have the other fixes in my 2.2 commits. I noticed that the gpgsm keydb lock/release stuff differes from the one for gpg: For gpg we use the keybox_lock function but that is bot used at all by gpgsm. In theory this should be unified but I fear a regression risk and thus for 2.2 we better don't touch it.
Shall we merge this with T2196 ? BTW, I have some unpushed commit and a test installer.