ZER-0-N3

Probable bug in Gnome Keysign

Mar 7th, 2018
90
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 16.96 KB | None | 0 0
  1. tantrojan@tantrojan-X556UR:~/Desktop/gnome-keysign-master$ python2 gnome-keysign.py
  2. keysign.i18n (DEBUG): Translated for gettext (C)
  3. keysign.i18n (DEBUG): Translated for Python (C)
  4. keysign.app (DEBUG): Running main with args: []
  5. keysign.gpgmeh (DEBUG): Key <Swig Object of type 'gpgme_key_t' at 0x7f0db6ab5148> is invalid: 0 (i:0, d:0, e:0, r:0)
  6. keysign.gpgkey (DEBUG): UID from gpgme: 'Tanmoy Ghosh <tg.99ghosh@gmail.com>'
  7. keysign.gpgmeh (DEBUG): Key <Swig Object of type 'gpgme_key_t' at 0x7f0db6ab51f0> is invalid: 0 (i:0, d:0, e:0, r:0)
  8. keysign.gpgkey (DEBUG): UID from gpgme: 'Tanmoy Chu <tanmoy19998@gmail.com>'
  9. keysign.keylistwidget (DEBUG): KLW with keys: [Key(expiry=datetime.datetime(2018, 4, 5, 18, 4, 56), fingerprint='717EC9DBD8EB9AFBE460CC39EA38DA86A573E9DE', uidslist=[UID(expiry=None, uid=u'Tanmoy Ghosh <tg.99ghosh@gmail.com>', name=u'Tanmoy Ghosh', comment=u'', email=u'tg.99ghosh@gmail.com')]), Key(expiry=datetime.datetime(2018, 4, 6, 15, 3, 52), fingerprint='939FDEB5813B554141CC48DFF93121E7C4B450B5', uidslist=[UID(expiry=None, uid=u'Tanmoy Chu <tanmoy19998@gmail.com>', name=u'Tanmoy Chu', comment=u'', email=u'tanmoy19998@gmail.com')])]
  10. keysign.keylistwidget (DEBUG): Adding key: Key(expiry=datetime.datetime(2018, 4, 5, 18, 4, 56), fingerprint='717EC9DBD8EB9AFBE460CC39EA38DA86A573E9DE', uidslist=[UID(expiry=None, uid=u'Tanmoy Ghosh <tg.99ghosh@gmail.com>', name=u'Tanmoy Ghosh', comment=u'', email=u'tg.99ghosh@gmail.com')])
  11. keysign.keylistwidget (INFO): format dicT: {u'expiry': u'', u'name': u'Tanmoy Ghosh', u'email': u'tg.99ghosh@gmail.com'}
  12. keysign.keylistwidget (DEBUG): handling kv: u'expiry' u''
  13. keysign.keylistwidget (DEBUG): handling kv: u'name' u'Tanmoy Ghosh'
  14. keysign.keylistwidget (DEBUG): handling kv: u'email' u'tg.99ghosh@gmail.com'
  15. keysign.keylistwidget (INFO): Formatting UID {u'email': u'tg.99ghosh@gmail.com', u'name': u'Tanmoy Ghosh', u'expiry': u''}
  16. keysign.keylistwidget (INFO): Formatted UID: u'Tanmoy Ghosh\t<i>tg.99ghosh@gmail.com</i>\t<small></small>'
  17. keysign.keylistwidget (INFO): Formatting key {'uidslist': '[UID(expiry=None, uid=u&apos;Tanmoy Ghosh &lt;tg.99ghosh@gmail.com&gt;&apos;, name=u&apos;Tanmoy Ghosh&apos;, comment=u&apos;&apos;, email=u&apos;tg.99ghosh@gmail.com&apos;)]', 'fingerprint': '717EC9DBD8EB9AFBE460CC39EA38DA86A573E9DE', 'expiry': '2018-04-05 18:04:56'}
  18. keysign.keylistwidget (INFO): Formatted key: u'<b>717EC9DBD8EB9AFBE460CC39EA38DA86A573E9DE</b>\nTanmoy Ghosh\t<i>tg.99ghosh@gmail.com</i>\t<small></small>\n<small>Expires: 2018-04-05 18:04:56</small>'
  19. keysign.keylistwidget (DEBUG): Adding key: Key(expiry=datetime.datetime(2018, 4, 6, 15, 3, 52), fingerprint='939FDEB5813B554141CC48DFF93121E7C4B450B5', uidslist=[UID(expiry=None, uid=u'Tanmoy Chu <tanmoy19998@gmail.com>', name=u'Tanmoy Chu', comment=u'', email=u'tanmoy19998@gmail.com')])
  20. keysign.keylistwidget (INFO): format dicT: {u'expiry': u'', u'name': u'Tanmoy Chu', u'email': u'tanmoy19998@gmail.com'}
  21. keysign.keylistwidget (DEBUG): handling kv: u'expiry' u''
  22. keysign.keylistwidget (DEBUG): handling kv: u'name' u'Tanmoy Chu'
  23. keysign.keylistwidget (DEBUG): handling kv: u'email' u'tanmoy19998@gmail.com'
  24. keysign.keylistwidget (INFO): Formatting UID {u'email': u'tanmoy19998@gmail.com', u'name': u'Tanmoy Chu', u'expiry': u''}
  25. keysign.keylistwidget (INFO): Formatted UID: u'Tanmoy Chu\t<i>tanmoy19998@gmail.com</i>\t<small></small>'
  26. keysign.keylistwidget (INFO): Formatting key {'uidslist': '[UID(expiry=None, uid=u&apos;Tanmoy Chu &lt;tanmoy19998@gmail.com&gt;&apos;, name=u&apos;Tanmoy Chu&apos;, comment=u&apos;&apos;, email=u&apos;tanmoy19998@gmail.com&apos;)]', 'fingerprint': '939FDEB5813B554141CC48DFF93121E7C4B450B5', 'expiry': '2018-04-06 15:03:52'}
  27. keysign.keylistwidget (INFO): Formatted key: u'<b>939FDEB5813B554141CC48DFF93121E7C4B450B5</b>\nTanmoy Chu\t<i>tanmoy19998@gmail.com</i>\t<small></small>\n<small>Expires: 2018-04-06 15:03:52</small>'
  28. keysign.KeyPresent (DEBUG): Our builder is: <Gtk.Builder object at 0x7f0db6a910a0 (GtkBuilder at 0x5568f4c9aa50)>
  29. keysign.QRCode (DEBUG): Encoding OPENPGP4FPR:
  30. keysign.QRCode (DEBUG): stride: 32 size: 29
  31. keysign.keyfprscan (DEBUG): Init KFSW <keyfprscan.KeyFprScanWidget object at 0x7f0db6a48140 (uninitialized at 0x(nil))> None
  32. keysign.keyfprscan (DEBUG): Inited parent KFSW <keyfprscan.KeyFprScanWidget object at 0x7f0db6a48140 (keysign+keyfprscan+KeyFprScanWidget at 0x5568f4d50740)>
  33. keysign.app (DEBUG): Switched Stack! (<GParamObject 'visible-child'>,)
  34. keysign.app (DEBUG): Switched Send Stack! (<GParamObject 'visible-child'>,)
  35. keysign.app (DEBUG): Keylist becomes visible!
  36. keysign.app (DEBUG): send stack becomes visible!
  37. keysign.send (INFO): Activated key Key(expiry=datetime.datetime(2018, 4, 6, 15, 3, 52), fingerprint='939FDEB5813B554141CC48DFF93121E7C4B450B5', uidslist=[UID(expiry=None, uid=u'Tanmoy Chu <tanmoy19998@gmail.com>', name=u'Tanmoy Chu', comment=u'', email=u'tanmoy19998@gmail.com')])
  38. keysign.gpgmeh (DEBUG): Exported '939FDEB5813B554141CC48DFF93121E7C4B450B5': '-----BEGIN PGP PUBLIC KEY BLOCK-----\n\nmQENBFqfsgABCADCIeXrfrKt5QgUo+2hcxetAtIwXrsJENUDLdsUmre8Cn8wDDs4\nPikv3I1xcVV3KaQ2oTLGJSj/epIYrSSpETcShHqQWCQHOEBBz+z5FQqRdokSL8Nn\n2QATSnlaO9s7NmsaTdhjJR2+CTsuCRgKOOGC3Q08wF4tmJubLVyKjaZg+rs2OuHT\np6C9mZ+MiBO31KCdiopZ8X+rlPooMg7os6+CNtb+Cj6te43PVWwBz+ImNTMOzbcn\n8/DdQQby2WCYj3vI9+Zm1gNbIOw+D31BPy+ckHklbyyy+6gfUCvjasFscuLsPjj6\nwqwCa0N3tH81/pN89V1L5Ze6q/n7ldKTNCPXABEBAAG0IlRhbm1veSBDaHUgPHRh\nbm1veTE5OTk4QGdtYWlsLmNvbT6JAT0EEwEIACcFAlqfsgACGwMFCQAnjQAFCwkI\nBwIGFQgJCgsCBBYCAwECHgECF4AACgkQ+TEh58S0ULV8oAf/T7zr9ulg13YKJCCe\nS67VRgOIbW1Il6/WNd/zbhk+dKXXZiS5kqUs1ftm/I8ALfjN9+imH2h/rRdL/UsY\n+bTDsGw5Y/Isr4vDC7c+clMJox98d72cSHRuAlqn5ytJkKKISCzZB4Gk0q0KJ5tf\n4+XaabnxXuWAVDgefRRLL3utD2EYKMrNVtK4hdE1MnAm8aSwaNzCebETciypDZEm\nn6wsw11WyTgTc32GK8KxN1jTToHRYhHln3kjVvZWvQiNJ2s2t8UBRxichePduQgx\neUM9Kpl1Qhe2tna6xkIJaIxjKhUoCgUdIqfeGD1d3CcSas7FYzhYQYm3H6wSczns\nyuUqn7kBDQRan7IAAQgA01tdG3IQrXNn5DO9/p0XFuv3OwLeiUj06w/nZPU1YIx5\n/oTxFj8LswOeoJYzv3bGvnzoM2gKIaK7IMSnSlYrg0JV5j1y8gpxovxgAMIB6W2e\na9N15Qxonn5NdGnqxKJq2z6Q5P8a6PRyOlqAS4lD8rKpfsajZmVI/KociLqd/lih\nGkLaJdLS8iulH7xVJofEDc2Z5imJNOo4YKqzkEZiifQ8WxIidVSsEN5cLS4EtwI3\naCYSAgiiQfQPFLn91/MB97AM7xTsMo2tUinD3C9HJkrQQO+LwbkKfI3vddJerZVk\nmVUi/MAsECZgmuJBB77+K2rI67rCUxdVe9L4bwBXAQARAQABiQElBBgBCAAPBQJa\nn7IAAhsMBQkAJ40AAAoJEPkxIefEtFC1rfsIAITzkgMbaDh/HHTrlqm2MQYS9PPj\nt8lsnCdsb+0QdNjym+my26vFRN9W1GzIR1hBxmj5TqBJS0MesICeV6Y8ZQHN5yh/\nRTuY4GVfbKqUFThvyLUXMNU7dZNgDg1BaWFKuFGAmZtYCgMqLvQIZ2DXNwn6t47O\nF+cpgXN61Sl6ygxuDU3yVzaCXpaO7fG8R9X2++CPszPJzjCDtHAiIsT5KmZP50ZG\ntwSo3Qjxxd3lrEDgb752k7qHXSvCug1fq/NIaMa+amTG2YQUHbLp1ifCZeO9zpoz\ntM/KdFsF3MwgNNWHIeQ2o1dG0yF1pb7T+DU1GyGXFBDE5Mr7JEjYXyQgCCc=\n=pIJ0\n-----END PGP PUBLIC KEY BLOCK-----\n'
  39. keysign.util (INFO): MAC of '-----BEGIN PGP PUBLI' is 'EEF5555989CDDCCA0A3E'
  40. keysign.avahioffer (INFO): Requesting to start
  41. keysign.Keyserver (INFO): Trying port 9001
  42. keysign.Keyserver (INFO): Requesting Avahi with txt: {'version': '0.9.6', 'fingerprint': '939FDEB5813B554141CC48DFF93121E7C4B450B5'}
  43. keysign.Keyserver (INFO): Trying to add Avahi Service
  44. keysign.network.AvahiPublisher (INFO): Adding service 'HTTP Keyserver 939FDEB5813B554141CC48DFF93121E7C4B450B5' of type '_gnome-keysign._tcp' with fpr '[[dbus.Byte(118), dbus.Byte(101), dbus.Byte(114), dbus.Byte(115), dbus.Byte(105), dbus.Byte(111), dbus.Byte(110), dbus.Byte(61), dbus.Byte(48), dbus.Byte(46), dbus.Byte(57), dbus.Byte(46), dbus.Byte(54)], [dbus.Byte(102), dbus.Byte(105), dbus.Byte(110), dbus.Byte(103), dbus.Byte(101), dbus.Byte(114), dbus.Byte(112), dbus.Byte(114), dbus.Byte(105), dbus.Byte(110), dbus.Byte(116), dbus.Byte(61), dbus.Byte(57), dbus.Byte(51), dbus.Byte(57), dbus.Byte(70), dbus.Byte(68), dbus.Byte(69), dbus.Byte(66), dbus.Byte(53), dbus.Byte(56), dbus.Byte(49), dbus.Byte(51), dbus.Byte(66), dbus.Byte(53), dbus.Byte(53), dbus.Byte(52), dbus.Byte(49), dbus.Byte(52), dbus.Byte(49), dbus.Byte(67), dbus.Byte(67), dbus.Byte(52), dbus.Byte(56), dbus.Byte(68), dbus.Byte(70), dbus.Byte(70), dbus.Byte(57), dbus.Byte(51), dbus.Byte(49), dbus.Byte(50), dbus.Byte(49), dbus.Byte(69), dbus.Byte(55), dbus.Byte(67), dbus.Byte(52), dbus.Byte(66), dbus.Byte(52), dbus.Byte(53), dbus.Byte(48), dbus.Byte(66), dbus.Byte(53)]]'
  45. keysign.send (INFO): Bluetooth as been skipped
  46. keysign.Keyserver (INFO): Serving now on ('::', 9001, 0, 0), this is probably blocking...
  47. keysign.send (INFO): Use this for discovering the other key: 'OPENPGP4FPR:939FDEB5813B554141CC48DFF93121E7C4B450B5#MAC=EEF5555989CDDCCA0A3E'
  48. keysign.KeyPresent (DEBUG): Our builder is: <Gtk.Builder object at 0x7f0db6aa1fa0 (GtkBuilder at 0x5568f4c9a9e0)>
  49. keysign.QRCode (DEBUG): Encoding OPENPGP4FPR:939FDEB5813B554141CC48DFF93121E7C4B450B5#MAC=EEF5555989CDDCCA0A3E
  50. keysign.QRCode (DEBUG): stride: 48 size: 45
  51. keysign.app (DEBUG): Switched Send Stack! (<GParamObject 'visible-child'>,)
  52. keysign.send (DEBUG): Setting kpw: <KeyPresent.KeyPresentWidget object at 0x7f0db6d03410 (GtkBox at 0x5568f4cf1560)>
  53. keysign.app (INFO): Activated key Key(expiry=datetime.datetime(2018, 4, 6, 15, 3, 52), fingerprint='939FDEB5813B554141CC48DFF93121E7C4B450B5', uidslist=[UID(expiry=None, uid=u'Tanmoy Chu <tanmoy19998@gmail.com>', name=u'Tanmoy Chu', comment=u'', email=u'tanmoy19998@gmail.com')])
  54. keysign.app (DEBUG): KPW to wait for map: <KeyPresent.KeyPresentWidget object at 0x7f0db6d03410 (GtkBox at 0x5568f4cf1560)> (True)
  55. keysign.app (DEBUG): keypresent becomes visible!
  56. keysign.network.AvahiPublisher (DEBUG): state change: 1
  57. keysign.network.AvahiPublisher (DEBUG): state change: 2
  58. keysign.network.AvahiPublisher (INFO): Service established.
  59. keysign.network.AvahiBrowser (INFO): Found service 'HTTP Keyserver 939FDEB5813B554141CC48DFF93121E7C4B450B5' type '_gnome-keysign._tcp' domain 'local'
  60. keysign.network.AvahiBrowser (INFO): Found service 'HTTP Keyserver 939FDEB5813B554141CC48DFF93121E7C4B450B5' type '_gnome-keysign._tcp' domain 'local'
  61. keysign.network.AvahiBrowser (INFO): Service resolved; name: 'HTTP Keyserver 939FDEB5813B554141CC48DFF93121E7C4B450B5', address: 'fe80::64b7:6ee6:9347:3662',port: '9001', and txt: '{'version': '0.9.6', 'fingerprint': '939FDEB5813B554141CC48DFF93121E7C4B450B5'}'
  62. keysign.avahidiscovery (INFO): discovered something: HTTP Keyserver 939FDEB5813B554141CC48DFF93121E7C4B450B5 fe80::64b7:6ee6:9347:3662:9001:939FDEB5813B554141CC48DFF93121E7C4B450B5
  63. keysign.network.AvahiBrowser (INFO): emitted 'None'
  64. keysign.network.AvahiBrowser (INFO): Service resolved; name: 'HTTP Keyserver 939FDEB5813B554141CC48DFF93121E7C4B450B5', address: '172.16.38.84',port: '9001', and txt: '{'version': '0.9.6', 'fingerprint': '939FDEB5813B554141CC48DFF93121E7C4B450B5'}'
  65. keysign.avahidiscovery (INFO): discovered something: HTTP Keyserver 939FDEB5813B554141CC48DFF93121E7C4B450B5 172.16.38.84:9001:939FDEB5813B554141CC48DFF93121E7C4B450B5
  66. keysign.network.AvahiBrowser (INFO): emitted 'None'
  67. keysign.scan_barcode (INFO): Launching pipeline autovideosrc
  68. ! tee name=t
  69. t. ! queue ! videoconvert
  70. ! zbar cache=true attach_frame=true
  71. ! fakesink
  72. t. ! queue ! videoconvert
  73. ! gtksink sync=false name=imagesink enable-last-sample=false
  74.  
  75. keysign.scan_barcode (INFO): About to remove children from <scan_barcode.BarcodeReaderGTK object at 0x7f0db6a48280 (keysign+scan_barcode+BarcodeReaderGTK at 0x5568f4d50f80)>
  76. keysign.scan_barcode (INFO): Adding sink widget: <__gi__.GtkGstWidget object at 0x7f0db6a6e550 (GtkGstWidget at 0x5568f4058910)>
  77. keysign.app (DEBUG): scanner becomes visible!
  78. keysign.app (DEBUG): Switched Stack! (<GParamObject 'visible-child'>,)
  79. keysign.receive (DEBUG): Entry changed <keyfprscan.KeyFprScanWidget object at 0x7f0db6a48140 (keysign+keyfprscan+KeyFprScanWidget at 0x5568f4d50740)>: <Gtk.Entry object at 0x7f0db6a482d0 (GtkEntry at 0x5568f4d2a6b0)>
  80. keysign.util (DEBUG): Parsed '939F DEB5 813B 5541 41CC\n48DF F931 21E7 C4B4 50B5' into ParseResult(scheme='', netloc='', path='939F DEB5 813B 5541 41CC\n48DF F931 21E7 C4B4 50B5', params='', query='', fragment='')
  81. keysign.util (DEBUG): Parsed barcode into {u'fingerprint': '939F DEB5 813B 5541 41CC\n48DF F931 21E7 C4B4 50B5'}
  82. keysign.util (DEBUG): Parsed '939F DEB5 813B 5541 41CC\n48DF F931 21E7 C4B4 50B5' into ParseResult(scheme='', netloc='', path='939F DEB5 813B 5541 41CC\n48DF F931 21E7 C4B4 50B5', params='', query='', fragment='')
  83. keysign.util (DEBUG): Parsed barcode into {u'fingerprint': '939F DEB5 813B 5541 41CC\n48DF F931 21E7 C4B4 50B5'}
  84. keysign.util (DEBUG): Parsed '939F DEB5 813B 5541 41CC\n48DF F931 21E7 C4B4 50B5' into ParseResult(scheme='', netloc='', path='939F DEB5 813B 5541 41CC\n48DF F931 21E7 C4B4 50B5', params='', query='', fragment='')
  85. keysign.util (DEBUG): Parsed barcode into {u'fingerprint': '939F DEB5 813B 5541 41CC\n48DF F931 21E7 C4B4 50B5'}
  86. keysign.discover (INFO): Trying to use this code with Avahi: 939F DEB5 813B 5541 41CC
  87. 48DF F931 21E7 C4B4 50B5
  88. keysign.avahidiscovery (INFO): Trying to find key with '939F DEB5 813B 5541 41CC\n48DF F931 21E7 C4B4 50B5'
  89. keysign.util (DEBUG): Parsed '939F DEB5 813B 5541 41CC\n48DF F931 21E7 C4B4 50B5' into ParseResult(scheme='', netloc='', path='939F DEB5 813B 5541 41CC\n48DF F931 21E7 C4B4 50B5', params='', query='', fragment='')
  90. keysign.util (DEBUG): Parsed barcode into {u'fingerprint': '939F DEB5 813B 5541 41CC\n48DF F931 21E7 C4B4 50B5'}
  91. keysign.util (WARNING): Cleaned fingerprint to 939FDEB5813B554141CC48DFF93121E7C4B450B5
  92. keysign.util (DEBUG): Starting HTTP request
  93. urllib3.connectionpool (DEBUG): Starting new HTTP connection (1): 172.16.1.12
  94. urllib3.connectionpool (DEBUG): http://172.16.1.12:3128 "GET http://[[172.16.38.84]:9001/ HTTP/1.1" 400 1190
  95. keysign.util (DEBUG): finished downloading 1190 bytes
  96. keysign.gpgmeh (DEBUG): Import Result: <ImportResult considered: 0, imported: 0, imported_rsa: 0, imports: [], new_revocations: 0, new_signatures: 0, new_sub_keys: 0, new_user_ids: 0, no_user_id: 0, not_imported: 0, secret_imported: 0, secret_read: 0, secret_unchanged: 0, skipped_new_keys: 0, unchanged: 0>
  97. Unhandled error in Deferred:
  98. Unhandled Error
  99. Traceback (most recent call last):
  100. File "/usr/local/lib/python2.7/dist-packages/Twisted-13.1.0-py2.7-linux-x86_64.egg/twisted/internet/defer.py", line 421, in errback
  101. self._startRunCallbacks(fail)
  102. File "/usr/local/lib/python2.7/dist-packages/Twisted-13.1.0-py2.7-linux-x86_64.egg/twisted/internet/defer.py", line 488, in _startRunCallbacks
  103. self._runCallbacks()
  104. File "/usr/local/lib/python2.7/dist-packages/Twisted-13.1.0-py2.7-linux-x86_64.egg/twisted/internet/defer.py", line 575, in _runCallbacks
  105. current.result = callback(current.result, *args, **kw)
  106. File "/usr/local/lib/python2.7/dist-packages/Twisted-13.1.0-py2.7-linux-x86_64.egg/twisted/internet/defer.py", line 1126, in gotResult
  107. _inlineCallbacks(r, g, deferred)
  108. --- <exception caught here> ---
  109. File "/usr/local/lib/python2.7/dist-packages/Twisted-13.1.0-py2.7-linux-x86_64.egg/twisted/internet/defer.py", line 1068, in _inlineCallbacks
  110. result = result.throwExceptionIntoGenerator(g)
  111. File "/usr/local/lib/python2.7/dist-packages/Twisted-13.1.0-py2.7-linux-x86_64.egg/twisted/python/failure.py", line 389, in throwExceptionIntoGenerator
  112. return g.throw(self.type, self.value, self.tb)
  113. File "/home/tantrojan/Desktop/gnome-keysign-master/keysign/receive.py", line 145, in _receive
  114. msg_tuple = yield self.discover.start()
  115. File "/usr/local/lib/python2.7/dist-packages/Twisted-13.1.0-py2.7-linux-x86_64.egg/twisted/internet/defer.py", line 1068, in _inlineCallbacks
  116. result = result.throwExceptionIntoGenerator(g)
  117. File "/usr/local/lib/python2.7/dist-packages/Twisted-13.1.0-py2.7-linux-x86_64.egg/twisted/python/failure.py", line 389, in throwExceptionIntoGenerator
  118. return g.throw(self.type, self.value, self.tb)
  119. File "/home/tantrojan/Desktop/gnome-keysign-master/keysign/discover.py", line 37, in start
  120. key_data = yield threads.deferToThread(self.discovery.find_key, self.userdata)
  121. File "/usr/local/lib/python2.7/dist-packages/Twisted-13.1.0-py2.7-linux-x86_64.egg/twisted/python/threadpool.py", line 191, in _worker
  122. result = context.call(ctx, function, *args, **kwargs)
  123. File "/usr/local/lib/python2.7/dist-packages/Twisted-13.1.0-py2.7-linux-x86_64.egg/twisted/python/context.py", line 118, in callWithContext
  124. return self.currentContext().callWithContext(ctx, func, *args, **kw)
  125. File "/usr/local/lib/python2.7/dist-packages/Twisted-13.1.0-py2.7-linux-x86_64.egg/twisted/python/context.py", line 81, in callWithContext
  126. return func(*args,**kw)
  127. File "/home/tantrojan/Desktop/gnome-keysign-master/keysign/avahidiscovery.py", line 131, in find_key
  128. key = super(AvahiKeysignDiscoveryWithMac, self).find_key(userdata)
  129. File "/home/tantrojan/Desktop/gnome-keysign-master/keysign/avahidiscovery.py", line 121, in find_key
  130. if fingerprint_from_keydata(downloaded_key) != cleaned:
  131. File "/home/tantrojan/Desktop/gnome-keysign-master/keysign/gpgmeh.py", line 351, in fingerprint_from_keydata
  132. openpgpkey = openpgpkey_from_data(keydata)
  133. File "/home/tantrojan/Desktop/gnome-keysign-master/keysign/gpgmeh.py", line 323, in openpgpkey_from_data
  134. result.imported)
  135. exceptions.ValueError: Keydata did not contain exactly one key, but 0
Add Comment
Please, Sign In to add comment