-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Advanced Search
Aug 14 2023
Aug 12 2023
Apr 19 2023
Apr 14 2023
Mar 19 2022
Aug 23 2021
Actually, I think there's a way to make gpg_strerror_r more usable on its own. I previously said
I find it quite difficult to use strerror_r and gpg_strerror_r. With having to guess and retry to get an appropriate buffer length, a wrapper which dynamically allocates the string seems to be needed.
May 16 2021
Dec 22 2020
Granted I'm not familiar with the functions and it may not be applicable, but the DNS resolver functions in the GNU C Library have semi-recently gained parameters (RES_USE_DNSSEC) to check for DNSSEC validation IIRC. Recent versions of glibc also don't trust the 'ad' bit unless an indication of its trustworthiness is set in /etc/resolv.conf, say if using a local validating resolver, so one can be sure that it's trustworthy. It also appears musl libc may support this.
Dec 20 2020
In a discussion we decided that we need a deadline for GnuPG 2.3.0 so that we finally release it.
Nov 16 2020
Nov 14 2020
In T3189#117959, @gniibe wrote:Do we need to expose the secmem routines, as a public interface of gpgrt?
I would find it useful. For example I'm making a utility that gets a passphrase with GPGME and gpg-agent, and would like to copy it into a buffer that lives on after closing the context.