I have analyzed this. In the ribbon we get a mailitem OOM object as reference, but that can be a different pointer then the one we used for decryption / verification. Our trick for this was to assign mailitems a custom uuid property and then look for that from the riboon pointer so that we can update accoringly with our internal Mail object representation.
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
All Stories
Sep 1 2023
Fixed. I'll copy the ideas in comment T6698#175165 to a separate task.
At least GnuPG only shows the most recent key signature tag. So if we leave it out when adding another signature then we remove this.
Yes remove this / leave this empty. I think the idea was that if you certify lots of users and wanted to have the same tag. But I guess that would be covered by bulk signing anyway and can actually be more trouble if you accidentally use the wrong tag.
Compiles for me, too with Qt 6.5.2 from tumbleweed.
Well the message is content-type multipart/mixed. For GpgOL to investigate the mail it needs to be multipart/signed oder application/encrypted or application/pgp-encrypted. (and some other things) But multipart/mixed is something that we don't take a second look at because this means "unencrypted mail with attachments."
Fixed. Backport? (Depends on first preparations for bulk certification and is probably not really relevant for VSD.)
The official build for Arch Linux doesn't seem to run into this problem. The Qt6 build is configured with
./configure \ --prefix=/usr \ --disable-fd-passing \ --disable-static \ --disable-gpgsm-test \ --enable-languages=cpp,qt6
Current progress is here: https://invent.kde.org/pim/kleopatra/-/merge_requests/57
Thanks. For the record, done at https://lists.gnupg.org/pipermail/gnupg-users/2023-August/066692.html.
Aug 31 2023
What I would like to be able to do would be:
Why do you need an integer - for real random this must be larger than 64 bits and then you have problems to to find a suitable type for a variable.
This is now mostly done. These 3 patches make it work:
For reference this is the code used to fill the pubkey table:
static gpg_error_t store_into_pubkey (enum kbxd_store_modes mode, enum pubkey_types pktype, const unsigned char *ubid, const void *blob, size_t bloblen) { gpg_error_t err; const char *sqlstr; sqlite3_stmt *stmt = NULL;
You are right - issuing an SQL statement returns the rrror. Hwoever, the selfcheck from sqlitebrowser does not show any errors.
I guess we should follow the GNU standards and provide only info files ;-)
Firstly, I clean up the code with each individual thread for monitoring something; That's T6692 and T6693.
Then, I pushed rG76a2f180286e: agent: Better interaction between main loop and cache expiration. and rG92de0387f04b: agent: Introduce management of timer to expire cache entries.
No more use of tick, but timers.
Other problems of yat2m transformation:
https://bugs.debian.org/1050886
Aug 30 2023
Nothing to test (except that the tool tips are now shown for the widgets).
In T6679#174951, @werner wrote:The copy of the database we received for this case is not damaged. A possible problem might be insufficient rights to read the database. For example created with an Admin account and then later used by a different user.
The copy of the database we received for this case is not damaged. A possible problem might be insufficient rights to read the database. For example created with an Admin account and then later used by a different user.