gpgme assert crash during op_encrypt_sign
J Robert Ray
jrray at spacemeat.com
Wed Aug 21 00:20:01 CEST 2002
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Marcus Brinkmann wrote:
| Can you please try out the following change:
|
| 2002-08-20 Marcus Brinkmann <marcus at g10code.de>
|
| * gpgme.c (_gpgme_set_op_info): Append data on subsequent calls.
| * encrypt-sign.c (encrypt_sign_status_handler): Remove op_info
| handling.
|
| Just try the latest CVS while you are at it :) Can't harm (except if you
| rely on the import function, which we will fix later today).
Thank you for the quick patch, it does indeed prevent the assert, but
now I have I much more insidious problem.
1) First I sign a key and set the trust level for it to full.
2) I test the trustdb by running "gpg -r <keyid> -a --encrypt" and
verify that gpg does not prompt me that the key is untrusted.
3) Then, I run my test program, it fails to encrypt_sign to this key,
returning no valid recipients.
4) I quit out of my test program and try to test the trustdb again as in
step 2, this time gpg tells me the key is untrusted.
Once I run "gpg --update-trustdb" the test in step 2 begins to work
again. But step 3 always fails.
This leads me to suspect gpgme is corrupting the trustdb somehow. Sorry
if this is a wild accusation. :)
Could this be an artifact of using gpgme_recipients_add_name()? I read
that using this function is the same as adding with VALIDITY_UNKNOWN.
What I want to happen is to not indicate a trust/validity level at all
and defer to gpg's trustdb.
- - Robert
- --
http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xBB929E54
Key fingerprint = BEA9 490C D2B9 AD83 E88B 3148 3136 34E4 BB92 9E54
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.1.90-nr1 (Windows XP)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQE9YrJBMTY05LuSnlQRApNzAJ949WxT1P1tRliFPM7yuy2ll+YLVwCfaC1o
pmPUlYJG4qiBRX/e6BBUv54=
=QljX
-----END PGP SIGNATURE-----
More information about the Gnupg-devel
mailing list