build: Update with newer autoconf constructs.
build: Update to newer autoconf constructs.
build: Update to newer autoconf constructs.
build: Use modern Autoconf check for types.
build: Update to newer autoconf constructs.
build: Use modern Autoconf check for type.
m4: Update with newer autoconf constructs.
Merge remote-tracking branch 'origin/release/20.12'
Make it compile with libgpg-error < 1.36
Ömer Fadıl Usta <omerusta@gmail.com> committed
rKLEOPATRA64d4421d1edf: Merge branch 'work/usta_boostfix' into 'master' (authored by Ömer Fadıl Usta <omerusta@gmail.com>).
Merge branch 'work/usta_boostfix' into 'master'
ids: draft-koch-openpgp-webkey-service-11.txt
Merge branch 'gpgme-1.13.1' into 'master'
Merge branch 'gpgme-1.13.1' into 'master'
Allow creating an OpenPGP key for the keys on a PIV card
Allow restricting the key lookup by keygrip to OpenPGP or S/MIME keys
Use a fresh output for second pass verify
Fix parsing of multipart/signed with one part
After patching the above mentioned if-clause the command fails on the first try, but it succeeds on the second try
po: Update italian translation
A fix has been released; see T5052.
swdb: Release gnupg 2.2.24
Yuri Chornoivan <yurchor@ukr.net> committed
rKLEOPATRA152ff283e385: Fix tag (authored by Yuri Chornoivan <yurchor@ukr.net>).
Fix tag
I change this to a feature request: Allow several processes to run public key decryption using the same set of private keys.
Note that you actually run 30 independent processes with gpg 1.4 but with gpg-agent there is just one process to handle the private key operations (decrypt). To utilize more cores you need to setup several GNUPGHOME with the same private keys.
m4: Update with newer autoconf constructs.
build: Update to newer autoconf constructs.
build: Update to newer autoconf constructs.
m4: Update with newer autoconf constructs.
m4: Update with newer autoconf constructs.
build: Update to new autoconf constructs.
I think that it is not gpg-agent but pinentry which causes millions of futex syscall errors.
For interactive use case, pinentry may be the point of contention.
I might be wrong if your key is not protected by passphrase.
scd:openpgp: Drop support for GnuPG 1.
scd:openpgp: Allow keygrip to be used to reference a key
Indeed, I think this might be a driver problem.
Merge branch 'gpgme-1.13.1' into 'master'
Allow creating an OpenPGP key for the keys on an OpenPGP card
Trigger update of displayed information after generating new card keys
Bump required GPGME version to 1.13.1
Merge branch 'gpgme-1.13.1' into 'master'
Revert this one for the moment
Make it compile without deprecated method
Merge branch 'gpgme-1.13.1' into 'master'
Laurent Montel <montel@kde.org> committed
rKLEOPATRA5818c059877a: Make it compile without deprecated method (authored by Laurent Montel <montel@kde.org>).
Make it compile without deprecated method
Merge branch 'gpgme-1.13.1' into 'master'
Laurent Montel <montel@kde.org> committed
rKLEOPATRAafac8e79aaf0: Revert this one for the moment (authored by Laurent Montel <montel@kde.org>).
Revert this one for the moment
Merge branch 'gpgme-1.14.0' into 'master'
Merge branch 'gpgme-1.14.0' into 'master'
Merge branch 'gpgme-1.13.1' into 'master'
Bump required GPGME version to 1.13.1
Merge branch 'gpgme-1.13.1' into 'master'
Bump required GPGME version to 1.13.1
• gniibe renamed
T4956: agent: Discrepancy of handling MPI for the interpretation of signed and unsigned from
agent: Disrepancy of handling MPI for the interpretation of signed and unsigned to
agent: Discrepancy of handling MPI for the interpretation of signed and unsigned.
• gniibe renamed
T4964: ecc: Discrepancy of handling MPI for the interpretation of signed and unsigned from
ecc: Disrepancy of handling MPI for the interpretation of signed and unsigned to
ecc: Discrepancy of handling MPI for the interpretation of signed and unsigned.
Laurent Montel <montel@kde.org> committed
rLIBKLEO02030e20d818: GIT_SILENT: Increase compile without deprecated method (authored by Laurent Montel <montel@kde.org>).
GIT_SILENT: Increase compile without deprecated method
Laurent Montel <montel@kde.org> committed
rKLEOPATRAca92096f0e84: GIT_SILENT: Increase compile without deprecated method (authored by Laurent Montel <montel@kde.org>).
GIT_SILENT: Increase compile without deprecated method
I don't see any problems in your PC/SC log, at all. If it is the failure of vendor's driver, we actually have no way to fix.
Laurent Montel <montel@kde.org> committed
rLIBKLEO66fc5813b977: GIT_SILENT: time to increase version (authored by Laurent Montel <montel@kde.org>).
GIT_SILENT: time to increase version
Laurent Montel <montel@kde.org> committed
rKLEOPATRA294eddb1e66f: GIT_SILENT: time to increase version (authored by Laurent Montel <montel@kde.org>).
GIT_SILENT: time to increase version
Laurent Montel <montel@kde.org> committed
rLIBKLEO29b5eaf9fe64: GIT_SILENT: prepare 5.16.0 rc (authored by Laurent Montel <montel@kde.org>).
GIT_SILENT: prepare 5.16.0 rc
Laurent Montel <montel@kde.org> committed
rKLEOPATRA023dad1f0035: GIT_SILENT: prepare 5.16.0 rc (authored by Laurent Montel <montel@kde.org>).
GIT_SILENT: prepare 5.16.0 rc
I have been able to resolve the problem by writing:
I would find it useful. For example I'm making a utility that gets a passphrase with GPGME and gpg-agent, and would like to copy it into a buffer that lives on after closing the context.
Laurent Montel <montel@kde.org> committed
rLIBKLEO1d39d82db959: GIT_SILENT: prepare 5.16.0 rc (authored by Laurent Montel <montel@kde.org>).
GIT_SILENT: prepare 5.16.0 rc
Laurent Montel <montel@kde.org> committed
rKLEOPATRAc5be1082aa4b: GIT_SILENT: prepare 5.16.0 rc (authored by Laurent Montel <montel@kde.org>).
GIT_SILENT: prepare 5.16.0 rc
gpg: Fix the encrypt+sign hash algo preference selection for ECDSA.
Improve support-de: some minor rephrasings.
gpg: Provide better diagnostic for replaced card keys.
gpg: Fix the encrypt+sign hash algo preference selection for ECDSA.