This reverts commit 8ac134be5e57680eb1c6ef596e5de085825e83ee, because it is no longer needed.
See #34245 (comment)
Also, use the shorter pathlib read_text, which is available since Python 3.5
This reverts commit 8ac134be5e57680eb1c6ef596e5de085825e83ee, because it is no longer needed.
See #34245 (comment)
Also, use the shorter pathlib read_text, which is available since Python 3.5
This reverts commit 8ac134be5e57680eb1c6ef596e5de085825e83ee, because it
is no longer needed.
<!--e57a25ab6845829454e8d69fc972939a-->
The following sections might be updated with supplementary metadata relevant to reviewers and maintainers.
<!--006a51241073e994b41acfe9ec718e94-->
For details see: https://corecheck.dev/bitcoin/bitcoin/pulls/34318.
<!--021abf342d371248e50ceaed478a90ca-->
See the guideline for information on the review process.
If your review is incorrectly listed, please copy-paste <code><!--meta-tag:bot-skip--></code> into the comment that the bot should ignore.
<!--5faf32d7da4f0f540f40219e4f7537a3-->
ACK fa38ffac6ff560bf76a2bfa48a300a79d31ba466
If anybody is interested, the problem with the key was indeed that the so-called "backsig" on one of the subkeys was using sha-1. From what I learned it seems that a backsig is only generated once on creation, while a fresh "binding signature" is generated every time an expiry is bumped, or a preference changed. So even if a good binding signature using a strong hash algorithm is present, verification may fail with an old backsig. To solve this, I re-generated the subkey with the existing key material and a faked creation time.
Can we add a pre-merge check for this to avoid it next time?
ACK fa38ffa
If anybody is interested, the problem with the key was indeed that the so-called "backsig" on one of the subkeys was using sha-1. From what I learned it seems that a backsig is only generated once on creation, while a fresh "binding signature" is generated every time an expiry is bumped, or a preference changed. So even if a good binding signature using a strong hash algorithm is present, verification may fail with an old backsig. To solve this, I re-generated the subkey with the existing key material and a faked creation time.
The following passes on my machine:
git -c gpg.program="$(pwd)/contrib/verify-commits/gpg.sh" verify-commit aeaa67a9eac0decb89c60a67f9755ca10cbcc1d9
ACK fa38ffac6ff560bf76a2bfa48a300a79d31ba466.
utACK fa38ffac6ff560bf76a2bfa48a300a79d31ba466
Revert and refactor look clean to me