Got it. This was a bug that was around for ages but only started to occur in the verificationresult when we started in 3.0 to show the KeyID / Options for the unknown certificates.
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Advanced Search
Apr 3 2018
Mar 27 2018
Mar 26 2018
Again, thanks for your time testing it again.
- it is reproducible
- Kleopatra crashes at the end of the verification of a signature
- it is a openPGP signature
- please see first picture
- I have only openPGP certificates in Kleopatra
Thanks for trying out the beta and your report.
This was fixed. The check for VS-NfD mode was crashing.
Mar 22 2018
Thanks for your report. This has been fixed for the next version ( https://bugs.kde.org/show_bug.cgi?id=391222 )
Mar 21 2018
The second user ID in my test case was an "URL". So we now use what ever the "raw" user id data is as the Name if both name and email are empty.
I don't find an easy way to fix this.
Did not really help. It does not work for English somehow and even with a different language like french very few additional buttons were translated. Still a weird mix.
Mar 20 2018
The field is now renamed to "Activate GnuPG Profile" to make it more clear the the button activates a new profile.
I've added this to libkleo formatting now. But seeing it and thinking more about it I don't like it. As I think that the export is mostly for "You give this to others" information about the subkeys is too verbose. The current header should suffice as "some info for differentiating between keys".
Kleopatra now shows this:
Cancel is now handled and the key is not removed if the user canceled.
Mar 19 2018
Mar 16 2018
With the tab layout I think that this is resolved.
Mar 15 2018
Mar 14 2018
This is fixed by no longer using kleopatra for this ( T3509 )
Mar 12 2018
Mar 8 2018
Leaving this open until we have a new version of GnuPG in the installer. While Kleopatra should no longer crash it won't properly work without the patch to GnuPG.
Got confirmation In Bugs.kde.org that this is fixed https://bugs.kde.org/show_bug.cgi?id=389792 as my tests also showed this -> resolved.
We have this now. There might be bugs but in general this works.
Mar 7 2018
Yes sorry, I decided against a release specially for that is it is not super critical, no data loss.
A beta of the next version where this is fixed is available now: https://files.gpg4win.org/Beta/gpg4win-3.1.0-beta-current.exe
Mar 6 2018
When we detect GnuPG > Version 2.1.15 Kleopatra now offers (and has it as default for ECC) to use cv25519 / EdDSA
Mar 5 2018
Mar 3 2018
It looks like you're having the same issue that I reported: T3761.
Hey, @uwestoehr. It looks like you're having the same issue that I reported: T3761.
Mar 1 2018
rW981a6fae5355 Fixes the problem with Kleopatra's config files.
Feb 28 2018
With the attached commit gpgconf works. Key generation in Kleopatra also handles the case now that gpgconf does not work.
The underlying problem is that gpgconf does not work in such an environment.
Feb 19 2018
Feb 15 2018
This is coming along nicely. It might take longer then with Kleopatra if the key is large (as the new resolver does a full keylisting on every start) but that should be OK and we have plans to optimize that anyway.
Feb 12 2018
Feb 6 2018
Steps 1. and 2. are now implemented in the async-enc branch of GpgOL. The keyresolver patches are updated for me and partially commited.
Feb 5 2018
Jan 30 2018
Ah under Linux we ran into an assert which made finding the problem easy. The bug was introduced by the fix for T3602. Will be fixed in the next release. Apologies for the inconvenience.
Thanks for your report. I tried this several times. Could not reproduce it at first but I could get it to crash sometimes. Even without GpgEX just by double clicking the signature file.
Jan 29 2018
Confirming this bug in Gpg4win version 3.0.3 (previous version was OK).
Jan 25 2018
- Collect all data in OOM, then start a thread to do the encryption.
- Do a proof of concept that this actually works and outlook lets us do it with our usual window message async handling.
- Update my Keyresolver patches in Libkleo and build a "libkleo-tool" to do the key resolving.
- Figure out Window Management / Create a Qt Overlay over the Mail window to block it from closing while encryption happens. This will resolve all bugs related to window mangement of the current key resolution.
Jan 19 2018
In T3714#109752, @werner wrote:I have not checked whether we make this available in the GPGME API
Jan 18 2018
There can't be an MDC warning if MDC is not used ;-)
As far as I can see GnuPG does not emit appropriate status lines:
Jan 17 2018
Jan 15 2018
Jan 10 2018
The status is now shown and updated.
No longer blocks with that commit. Keylistjob is started in the background. As long as the keylistjob is running the validity is shown as "Updating..."
Jan 9 2018
Jan 8 2018
I believe that this was fixed in T3658 which reported more clearly what was attempted to verify and what failed.
Indeed, thanks for the note. I added the variable only later on for the check of protocol unknown and overlooked to update the setProtocol call.
I've updated the code accordingly.
@aheinecke thanks for the fix. But I have a suggestion for the code(I only looked at the diff):