build: Update to newer autoconf constructs.
m4: Update with newer autoconf constructs.
m4: Update with newer autoconf constructs.
build: Update to new autoconf constructs.
I think that it is not gpg-agent but pinentry which causes millions of futex syscall errors.
For interactive use case, pinentry may be the point of contention.
I might be wrong if your key is not protected by passphrase.
scd:openpgp: Drop support for GnuPG 1.
scd:openpgp: Allow keygrip to be used to reference a key
Indeed, I think this might be a driver problem.
Merge branch 'gpgme-1.13.1' into 'master'
Allow creating an OpenPGP key for the keys on an OpenPGP card
Trigger update of displayed information after generating new card keys
Bump required GPGME version to 1.13.1
Merge branch 'gpgme-1.13.1' into 'master'
Revert this one for the moment
Make it compile without deprecated method
Merge branch 'gpgme-1.13.1' into 'master'
Laurent Montel <montel@kde.org> committed
rKLEOPATRA5818c059877a: Make it compile without deprecated method (authored by Laurent Montel <montel@kde.org>).
Make it compile without deprecated method
Merge branch 'gpgme-1.13.1' into 'master'
Laurent Montel <montel@kde.org> committed
rKLEOPATRAafac8e79aaf0: Revert this one for the moment (authored by Laurent Montel <montel@kde.org>).
Revert this one for the moment
Merge branch 'gpgme-1.14.0' into 'master'
Merge branch 'gpgme-1.14.0' into 'master'
Merge branch 'gpgme-1.13.1' into 'master'
Bump required GPGME version to 1.13.1
Merge branch 'gpgme-1.13.1' into 'master'
Bump required GPGME version to 1.13.1
• gniibe renamed
T4956: agent: Discrepancy of handling MPI for the interpretation of signed and unsigned from
agent: Disrepancy of handling MPI for the interpretation of signed and unsigned to
agent: Discrepancy of handling MPI for the interpretation of signed and unsigned.
• gniibe renamed
T4964: ecc: Discrepancy of handling MPI for the interpretation of signed and unsigned from
ecc: Disrepancy of handling MPI for the interpretation of signed and unsigned to
ecc: Discrepancy of handling MPI for the interpretation of signed and unsigned.
Laurent Montel <montel@kde.org> committed
rLIBKLEO02030e20d818: GIT_SILENT: Increase compile without deprecated method (authored by Laurent Montel <montel@kde.org>).
GIT_SILENT: Increase compile without deprecated method
Laurent Montel <montel@kde.org> committed
rKLEOPATRAca92096f0e84: GIT_SILENT: Increase compile without deprecated method (authored by Laurent Montel <montel@kde.org>).
GIT_SILENT: Increase compile without deprecated method
I don't see any problems in your PC/SC log, at all. If it is the failure of vendor's driver, we actually have no way to fix.
Laurent Montel <montel@kde.org> committed
rLIBKLEO66fc5813b977: GIT_SILENT: time to increase version (authored by Laurent Montel <montel@kde.org>).
GIT_SILENT: time to increase version
Laurent Montel <montel@kde.org> committed
rKLEOPATRA294eddb1e66f: GIT_SILENT: time to increase version (authored by Laurent Montel <montel@kde.org>).
GIT_SILENT: time to increase version
Laurent Montel <montel@kde.org> committed
rLIBKLEO29b5eaf9fe64: GIT_SILENT: prepare 5.16.0 rc (authored by Laurent Montel <montel@kde.org>).
GIT_SILENT: prepare 5.16.0 rc
Laurent Montel <montel@kde.org> committed
rKLEOPATRA023dad1f0035: GIT_SILENT: prepare 5.16.0 rc (authored by Laurent Montel <montel@kde.org>).
GIT_SILENT: prepare 5.16.0 rc
I have been able to resolve the problem by writing:
I would find it useful. For example I'm making a utility that gets a passphrase with GPGME and gpg-agent, and would like to copy it into a buffer that lives on after closing the context.
Laurent Montel <montel@kde.org> committed
rLIBKLEO1d39d82db959: GIT_SILENT: prepare 5.16.0 rc (authored by Laurent Montel <montel@kde.org>).
GIT_SILENT: prepare 5.16.0 rc
Laurent Montel <montel@kde.org> committed
rKLEOPATRAc5be1082aa4b: GIT_SILENT: prepare 5.16.0 rc (authored by Laurent Montel <montel@kde.org>).
GIT_SILENT: prepare 5.16.0 rc
gpg: Fix the encrypt+sign hash algo preference selection for ECDSA.
Improve support-de: some minor rephrasings.
gpg: Provide better diagnostic for replaced card keys.
gpg: Fix the encrypt+sign hash algo preference selection for ECDSA.
MSI: Print warning about x86 MSI installers
Add zlib depdency for Kleopatra
• werner edited Description on
Support.
Please ask on a mailing list - this is a bug tracker and somehow expects bug descriptions.
Add patch for gpgme to fix kleo master build
qt: Fix export of qDebug GpgME::Error overload
Sorry, I do not understand what kind of bug you are trying to report. it seems that you have a question about some software and you assume this is gpg4win. "invalid pocket" is however not an error any of our software emits.
gpgconf: Yet another fix for --apply-profile.
gpgconf: Yet another fix for --apply-profile.
Update libassuan kleo and gpgme
scd: Skip unknown options in command SERIALNO
swdb: Released gpgme 1.15.0
Note that Kleopatra verifies the currently active card before starting the generation of new keys. This prevents the destruction of keys on the wrong card.
I am trying to solve this problem since one month
build: Use ~/.gnupg-autogen.sh for the release targets
Ömer Fadıl Usta <omerusta@gmail.com> committed
rKLEOPATRA8c32133fcd3b: Merge branch 'work/usta_boostfix' into 'master' (authored by Ömer Fadıl Usta <omerusta@gmail.com>).
Merge branch 'work/usta_boostfix' into 'master'
Merge branch 'gpgme-1.14.0' into 'master'
Bump required GPGME version to 1.14.0
Bump required GPGME version to 1.14.0
Merge branch 'gpgme-1.14.0' into 'master'
BTW, the idea is to fade out support for gpg --card-status and --card-edit. Thus no new features there. New features shall only go into gpg-card.
Fixing is definitely a good idea. shows almost the same information as except that it shows the correct "Version" and "Serial number". It would probably make sense to unify the code of and 's command.
Thanks for your report, but your excerpt is irrelevant.
core: Support exporting secret keys.
po: Update Japanese Translations.
python: Fix a test for newer GnuPG (>= 2.3).