It seems libtool fails to add the standard C and C++ libraries to the link command line. On Linux I have "[...] -lstdc++ -lm -lc [...]" in the libtool link command line. Looks like a bug in the tooling (macports or libtool).
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Advanced Search
Mar 25 2024
Mar 24 2024
Mar 23 2024
Thanks, that patch works for me.
Mar 18 2024
Mar 15 2024
We have discussed this yesterday. The idea/plan is to release the core library and the bindings as separate tarballs (created from the same repo) in the future.
Mar 11 2024
This can be tested with Kleopatra by configuring an invalid keyserver and then updating an OpenPGP certificate.
Mar 1 2024
In 2.4 we have rG1383aa475 which does
Pushed the change in: rGf50c543326c2: agent: Allow simple KEYINFO command when restricted.
Feb 29 2024
No, thank you both for the speedy responses :)
Thanks a lot for your quick testing.
The commit rGff42ed0d69bb: gpg: Enhance agent_probe_secret_key to return bigger value. of GnuPG 2.2 introduced this bug.
Ah, thanks Werner, I'll keep that in mind.
Feb 28 2024
Although I don't think this is the case here one should be aware that tests mail fail due to global configuration of GnuPG (/etc/gnupg/*.conf). There is no easy way so solve this except for running a per-test local installation of GnuPG using the gpgconf.ctl feature.
You can get more information by applying a patch below (and also tests/json/Makefile.in):
diff --git a/tests/json/Makefile.am b/tests/json/Makefile.am index 90fba79e..7523bb6b 100644 --- a/tests/json/Makefile.am +++ b/tests/json/Makefile.am @@ -106,6 +106,8 @@ gpg-agent.conf: # a key from a smartcard reader (error might be: Unusable secret key) echo pinentry-program $(abs_srcdir)/../gpg/pinentry > ./gpg-agent.conf echo disable-scdaemon >> ./gpg-agent.conf + echo debug-all >> ./gpg-agent.conf + echo log-file /tmp/gpg-agent-logfile.log >> ./gpg-agent.conf
T4820 is not related (it's a failure of t-keylist-secret in t-json), while this is failure of t-decrypt.
Feb 27 2024
Arghh, a GPGME_DEBUG=3 which shows basic I/O preparation does not exhibit the bug.
Fixing gpg is easy but there is some bug lingering in gpgme which might be a recent regression. An strace shows
Feb 23 2024
Feb 20 2024
gpg --list-packets shows this:
In T6977#183049, @Karam wrote:Uploaded the corrupted file.
Uploaded the corrupted file.
Feb 16 2024
Can you make this corrupted file available to us?
Hello,
So after testing on gpgme-1.17.1, with run-verify under tests as you mentioned, with corrupted file it hangs forever.
Now we can say it's a bug in gpgme_op_verify.
Feb 15 2024
Feb 8 2024
We provide the examples for a reason. Actually, two reasons: To test our changes ourselves. And to provide working examples for others. If your code doesn't work then you'll have to figure out where the example and your code differ. If the example doesn't work then we'll have a look.
@Karam, please test as suggested by @ikloecker.
@werner I 'm not passing nullptr to gpgme_data_release.
@ikloecker Honestly I didn't test it.
Is there anything wrong with code ? have anyone encountered such behavior ?
I was trying adding a timeout as a workaround for gpgme_op_verify to avoid hanging but it depends on the file size and how much it will take to verify it signature...
Feb 7 2024
Oh well, it does not use the c++ binding .
Yes that probably gets lost along the way, where we communicate with scdaemon to generate the key. Needs to be tracked down. Such things can be very confusing to users. Especially if that increases the PIN Retry counter!
Jan 31 2024
Jan 24 2024
Just a reminder, this is important for 384 bit keys (see T6379).
Jan 18 2024
Jan 15 2024
I think this is resolved now.
Jan 11 2024
The problem has been addressed for all OpenPGP crypto operations on files.
This is currently not possible (blocked by T6927: gpgsm: Accept file names for input and output in server mode).
Jan 8 2024
Jan 5 2024
All non-archive jobs have been extended to allow reading the input directly from files and to allow writing the output. directly to files.
gpg 2.4 now returns ERROR status lines for failed --quick-add-subkey and --quick-add-adsk.
Jan 4 2024
I did not relaize that when we originally implemented that feature we already exposed it through GPGME. So this has been fixed since 2020.
Dec 22 2023
Done. I have verified with the test runner run-verifyopaquejob that verification still works and that the warning is gone.
I would use ALGO of gpgme_createsubkey to pass the fingerprint of the ADSK. This can be justified because the algorithm is an implict property of the fingerprint. Obviously we also nee a new flag to do switch to this behaviour. A new GPGME_CREATE_ADSK comes to mind.
In T6880#180682, @TobiasFella wrote:In the C++/Qt parts:
I think we then don't really *need* anything, since we can just set the fingerprint in the context for the job, but it would make sense to introduce a function that wraps this into a nice API.
My concept would be to:
- add a GENKEY_EXTRAFLAG_ADDADSK for _gpgme_engine_op_genkey and gpg_genkey (or do that more implicitely, e.g., by detecting !USERID && KEY && PUBKEY) and pass the subkey fingerprint in pubkey
- use gpgme_op_createsubkey; pass the adsk fingerprint in a new variable in context
For the similar task to add an existing subkey to a key we have GpgAddExistingSubkeyEditInteractor. This uses the much more complicated gpg --edit-key interface. Maybe we want to avoid this.
Dec 21 2023
Before adding code please first come up with a description of the planned API extension.
Dec 14 2023
Werner and Tobias are both correct. If a new subkey is generated from scratch then gpg uses the current time as key creation time and sets the expiration date (in the internal in-memory representation of a public key) to the key creation time plus the expiration value.
Sorry, I should have been more precise in my description of the problem. Specifically with --quick-addkey, gpg's behavior seems to be that the expiration, when given using seconds=... is treated as seconds from now.
Dec 13 2023
FWIW, when updating the expiration time gpg does this:
My explanation of gpgme's behavior was not quite correct: Specifically in the QGpgMEQuickJobs for creating (sub)keys, the API uses QDateTimes, which are then converted to seconds since epoch.
That's both not correct. gpg takes the expiration time in seconds since creation time. For a new key this is close to the corrent time but not really. For an prolonging an expiration, this is of course different - the creation time of the key needs to be taken in account. I recall that we once had a discussion and agreed to keep it at time after the creation of the key. This avoids problems with the expiration going negative.
Dec 12 2023
Dec 11 2023
Ack, I was not sure if we fixed it and forgot to add the commit here.
I haven't looked into it and I think this has really low priority. I'm pretty sure it's a problem with a the out-of-correct-order destruction of (static?) objects on shutdown. If I remember correctly then it is triggered by the DeviceInfoWatcher.
Ingo do you know if we have fixed this?
Nov 28 2023
Nov 27 2023
Okay, I known do the same what we do for a single root certificate, that is mark it as "not trusted" ('n').
Nov 25 2023
My very simple patch for this would be:
Nov 23 2023
Nov 20 2023
works, VS-Desktop-3.1.90.287-Beta
Nov 17 2023
This is a generic parent task and does not require workboards for specific branches.