For argparse we use /etc as a default but applications may use gpgrt_set_confdir to set a different one. Howeever if we already have a new get_sysconfdir function, it is easy and useful to change the default on Unix.
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Advanced Search
Nov 3 2025
In GnuPG we use CSIDL_COMMON_APPDATA and append "\GNU\etc\gnupg". If this can't be found we use the rootdir, that is he installation directory of the binary or one up if installed below a bin directory. The reason for using GNU and not POSIX or Unix is merely to avoid name clashes with other software ported to Windows. There was no real standard for this on Windows.
We already did this for Libgcrypt 1.8 but take care that an installer includig Libgcrypt should run something like
The question is who shall correct the wrong encoding of notation data (assuming it is flagged as human readable). Escaping is a solution but needs a lot of extra bytes.
It is not an ADSK issue. The problem is that the new subkey has not been entered into the fingerprint table and can thus not be found.
I think at line 82 we should use xtrymalloc as always in gpg-agent. xtrymalloc expands to gcry_malloc.
Oct 28 2025
Oct 27 2025
Workaround is to use --with-keygrip and delete both <keygrip>.key files. Problem here is that one part may be on a smartcard or one part might be shared (although not allowed) with other keys.
Oct 24 2025
But you are able to do this w/o gpgol being active?
Oct 23 2025
gpgconf does not know about the global config files. Nor does it known about things like gpg.conf-2 etc.
Oct 22 2025
I'd sad we keep it as it is now (unless we see a regression). The real and only correct solution is the use of a daemon to serialize access.
Oct 21 2025
That might be related to T2196 which has been hopefully fixed in 2.2.50 and also in the next 2.6. Closing this task.
That might be related to T2196 which has been hopefully fixed in 2.2.50 and also in the next 2.6. Closing this task.
I applied it to the 2.4 branch but please do not continue to translate for 2.4. 2.6 (master) is the new target.
Implemented but not tested at all.
Oct 20 2025
Oct 16 2025
Oct 15 2025
Oct 14 2025
Oct 13 2025
At which point did were you asked for the passphrase for decryption? You flushed the gpg-agent cache, right?
Oct 10 2025
The problem here is that iobuf_readbyte returns -1 on error and on EOF. parse_packet is not able to distinguish that because for histroic reasons we do not return a gpg-error code (GPG_ERR_EOF). To fix this we need to change all callers of parse_packet to not act upon -1 but only on an error code.
Oct 9 2025
Except for the release/unlock thing after keybox_compress I already have the other fixes in my 2.2 commits. I noticed that the gpgsm keydb lock/release stuff differes from the one for gpg: For gpg we use the keybox_lock function but that is bot used at all by gpgsm. In theory this should be unified but I fear a regression risk and thus for 2.2 we better don't touch it.