Michael Smith <micha...@syapse.com> writes:

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA512
>
>> Libgcrypt has the fix for the secure memory.  Thus the above should not
>> happen unless you have set an ulimit.  Are you sure that the running
>> gpg-agent is up-to-date?
>>
>>    gpg-connect-agent 'getinfo version' /bye
>
> $ gpg-connect-agent 'getinfo version' /bye
> D 2.1.19
> OK
>
> I am on a MacBook Pro and haven't changed any defaults related to
> ulimits, but I'll take a look.
>
>> We need to have a test case to replicate and valgrind the problem.
>
> How can I help further to create a test case?

Can you please check which version of libgcrypt the agent is linked to?
E.g. by using 'otool':

$ otool -L repos/gnupg/obj/agent/gpg-agent
repos/gnupg/obj/agent/gpg-agent:
        /Users/justus/local/lib/libgcrypt.20.dylib (compatibility version 
22.0.0, current version 22.3.0)
        /Users/justus/local/lib/libgpg-error.0.dylib (compatibility version 
21.0.0, current version 21.0.0)
        /Users/justus/local/lib/libassuan.0.dylib (compatibility version 8.0.0, 
current version 8.3.0)
        /Users/justus/pkg/lib/libnpth.0.dylib (compatibility version 1.0.0, 
current version 1.5.0)
        /Users/justus/pkg/lib/libiconv.2.dylib (compatibility version 8.0.0, 
current version 8.1.0)
        /usr/lib/libSystem.B.dylib (compatibility version 1.0.0, current 
version 1238.0.0)

Are you building GnuPG yourself?

Justus

Attachment: signature.asc
Description: PGP signature

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to