Page MenuHome GnuPG
Feed Advanced Search

Jun 5 2015

dkg set Version to 0.9.3 on T1996: pinentry-gtk-2 returns an empty passphrase string if typed passphrase is longer than 32 chars.
Jun 5 2015, 2:05 AM · Bug Report, Debian, pinentry

Jun 4 2015

bjmgeek added a comment to T1992: pinentry in text mode is skewed when using PuTTY and GNU screen.

Jun 4 2015, 6:41 PM · Bug Report, Debian, pinentry
bjmgeek added a comment to T1992: pinentry in text mode is skewed when using PuTTY and GNU screen.

OK, I'll try that too.

Jun 4 2015, 6:41 PM · Bug Report, Debian, pinentry
bjmgeek added a comment to T1992: pinentry in text mode is skewed when using PuTTY and GNU screen.

Jun 4 2015, 6:27 PM · Bug Report, Debian, pinentry
bjmgeek added a comment to T1992: pinentry in text mode is skewed when using PuTTY and GNU screen.

I will try this afternoon.

Jun 4 2015, 6:27 PM · Bug Report, Debian, pinentry
neal added a comment to T1992: pinentry in text mode is skewed when using PuTTY and GNU screen.

Also, see if you can reproduce the problem without screen. Thanks.

Jun 4 2015, 6:08 PM · Bug Report, Debian, pinentry
neal added a comment to T1992: pinentry in text mode is skewed when using PuTTY and GNU screen.

I tried your screen configuration and I couldn't reproduce the problem.

Perhaps putty is configuring something differently. Can you reproduce the
problem when putty is not used (e.g., directly on the console or ssh'ing from a
GNU/Linux box)?

Jun 4 2015, 5:56 PM · Bug Report, Debian, pinentry

Jun 3 2015

bjmgeek added a comment to T1992: pinentry in text mode is skewed when using PuTTY and GNU screen.

Jun 3 2015, 7:10 AM · Bug Report, Debian, pinentry
bjmgeek added a comment to T1992: pinentry in text mode is skewed when using PuTTY and GNU screen.

On Tue, Jun 2, 2015, 11:19 PM Neal Walfield via BTS <gnupg@bugs.g10code.com>
wrote:

Jun 3 2015, 7:10 AM · Bug Report, Debian, pinentry
bjmgeek added a comment to T1992: pinentry in text mode is skewed when using PuTTY and GNU screen.

Jun 3 2015, 6:04 AM · Bug Report, Debian, pinentry
bjmgeek added a comment to T1992: pinentry in text mode is skewed when using PuTTY and GNU screen.

Here is my .screenrc

#change the hardstatus settings to give
an window list at the bottom of the
#screen, with the time and date and with
the current window highlighted
hardstatus alwayslastline
hardstatus string '%{= bK}%-Lw%{=
KW}%50>%n%f* %t%{= bK}%+Lw%< %{= kG}%-=%D
%d %M %Y %c:%s%{+b y} %H %l'

deflogin on
shell /usr/bin/bash
vbell on

Jun 3 2015, 5:59 AM · Bug Report, Debian, pinentry
neal added a comment to T1992: pinentry in text mode is skewed when using PuTTY and GNU screen.

Thanks for your quick reply. I meant: what program were you running on your
Debian box in screen? I doubt you directly called pinentry. Were you running
mutt? Were you running gpg?

Thanks.

Jun 3 2015, 5:19 AM · Bug Report, Debian, pinentry
bjmgeek added a comment to T1992: pinentry in text mode is skewed when using PuTTY and GNU screen.

Jun 3 2015, 12:56 AM · Bug Report, Debian, pinentry
bjmgeek added a comment to T1992: pinentry in text mode is skewed when using PuTTY and GNU screen.

I was using PuTTY 6.4 on Windows 7 64 bit.

Jun 3 2015, 12:56 AM · Bug Report, Debian, pinentry

Jun 1 2015

neal added a comment to T1992: pinentry in text mode is skewed when using PuTTY and GNU screen.

Jun 1 2015, 5:03 PM · Bug Report, Debian, pinentry
neal added a comment to T1992: pinentry in text mode is skewed when using PuTTY and GNU screen.

I just tried running pinentry-curses under screen on debian in an
xfce4-terminal. (You can run it directly from the command line by running
pinentry-curses and then typing 'getpin'.) I wasn't able to reproduce what I
saw in your screenshot. Also, I saw the proper symbolic characters to paint the
widget's borders (see screenshot).

I've make some changes to pinentry-curses recently. Perhaps you can try that
version (git). If you get the same results, does hitting control-L correctly
repaint the screen?

What program were you running? Perhaps it messed with the terminal settings.

Jun 1 2015, 5:03 PM · Bug Report, Debian, pinentry

May 21 2015

bjmgeek added projects to T1992: pinentry in text mode is skewed when using PuTTY and GNU screen: pinentry, Debian, Bug Report.
May 21 2015, 11:00 PM · Bug Report, Debian, pinentry
bjmgeek set Version to 0.9.0 on T1992: pinentry in text mode is skewed when using PuTTY and GNU screen.
May 21 2015, 11:00 PM · Bug Report, Debian, pinentry

May 19 2015

gniibe closed T1422: Improve misleading message when trying to decrypt a file without the public key available as Resolved.
May 19 2015, 3:28 AM · Bug Report, gnupg, Debian
gniibe added a comment to T1422: Improve misleading message when trying to decrypt a file without the public key available.

Fixed in b3fd30451a5464b124b0296afbc341cb98b3977c.

May 19 2015, 3:28 AM · Bug Report, gnupg, Debian

May 18 2015

gniibe claimed T1422: Improve misleading message when trying to decrypt a file without the public key available.
May 18 2015, 4:17 AM · Bug Report, gnupg, Debian
gniibe added a comment to T1422: Improve misleading message when trying to decrypt a file without the public key available.

Now, we have a patch to fix in the Debian bug tracker.

May 18 2015, 4:17 AM · Bug Report, gnupg, Debian

May 11 2015

werner changed Version from 1.4.9 to master on T1098: Better ordering of "help" output in --edit-key mode.
May 11 2015, 8:55 PM · Documentation, gnupg, Debian, Feature Request
werner added a project to T1098: Better ordering of "help" output in --edit-key mode: Documentation.
May 11 2015, 8:55 PM · Documentation, gnupg, Debian, Feature Request
werner removed a project from T1098: Better ordering of "help" output in --edit-key mode: Stalled.
May 11 2015, 8:55 PM · Documentation, gnupg, Debian, Feature Request
werner added a comment to T1098: Better ordering of "help" output in --edit-key mode.

This is about updating the docs. Will be done for 2.1 only.

May 11 2015, 8:55 PM · Documentation, gnupg, Debian, Feature Request
werner added a comment to T1089: Please store requests in a cache to avoid sending out duplicate requests (mailto: interface).

This reminds me that we don't have a mail keyserver in 2.1 yet. Need to
evaluate whether it will be useful.

May 11 2015, 8:53 PM · gnupg (gpg23), gnupg, Debian, Feature Request
werner raised the priority of T1089: Please store requests in a cache to avoid sending out duplicate requests (mailto: interface) from Wishlist to Normal.
May 11 2015, 8:53 PM · gnupg (gpg23), gnupg, Debian, Feature Request
werner removed a project from T1089: Please store requests in a cache to avoid sending out duplicate requests (mailto: interface): Stalled.
May 11 2015, 8:53 PM · gnupg (gpg23), gnupg, Debian, Feature Request
werner raised the priority of T1038: Specify and use multiple keyservers from Wishlist to Normal.
May 11 2015, 8:50 PM · gnupg (gpg21), gnupg, Debian, Feature Request
werner added a comment to T1038: Specify and use multiple keyservers.

(funny due date removed)

Lot of things pertaining to keyservers changed in the meantime and we have a
couple of other things in mind as well.

May 11 2015, 8:50 PM · gnupg (gpg21), gnupg, Debian, Feature Request
werner removed Due Date on T1038: Specify and use multiple keyservers.
May 11 2015, 8:50 PM · gnupg (gpg21), gnupg, Debian, Feature Request
werner closed T1792: hkps: Hostname verification uses the wrong hostname as Resolved.
May 11 2015, 7:55 PM · gnupg, Bug Report, Debian, dirmngr
werner removed a project from T1792: hkps: Hostname verification uses the wrong hostname: Restricted Project.
May 11 2015, 7:55 PM · gnupg, Bug Report, Debian, dirmngr
werner set External Link to https://bugs.debian.org/778480 on T1841: gpg-connect-agent: percent+ function doesn't encode '+'.
May 11 2015, 7:42 PM · Debian, Bug Report, gnupg
werner added a project to T1841: gpg-connect-agent: percent+ function doesn't encode '+': Restricted Project.
May 11 2015, 7:42 PM · Debian, Bug Report, gnupg
werner added a comment to T1841: gpg-connect-agent: percent+ function doesn't encode '+'.

I have fixed it for the gca functions percent and percent+ but won't do it in
the generic percent_exacpe C function. Changing the latter may introduce
regressions.

Fixed for 2.0 and 2.1.

May 11 2015, 7:42 PM · Debian, Bug Report, gnupg

Apr 3 2015

gniibe added a comment to T1509: gnupg2 (gpg-agent): Disable producing of core dumps for gpg-agent via prctl(PR_SET_DUMPABLE, 0) as ssh-agent does.

As I wrote to #712744, distribution nowadays is conservative enough for its
default kernel settings, and it doesn't require each application to have special
settings.

I think that we will be able to close this soon.

Apr 3 2015, 5:51 AM · gnupg, Debian, gnupg (gpg20), Feature Request, gpgagent

Mar 19 2015

werner added projects to T1792: hkps: Hostname verification uses the wrong hostname: Restricted Project, gnupg.
Mar 19 2015, 3:40 PM · gnupg, Bug Report, Debian, dirmngr
werner added a comment to T1792: hkps: Hostname verification uses the wrong hostname.

Thanks. Fixed with commit dc10d46.

Mar 19 2015, 3:40 PM · gnupg, Bug Report, Debian, dirmngr

Mar 17 2015

davidw added a comment to T1792: hkps: Hostname verification uses the wrong hostname.

The attached patch fixes hkps: hostname verification and makes
hkps: use SNI correctly.

The patch is against GnuPG 2.1.2. It has been tested successfully against
hkps://hkps.pool.sks-keyservers.net on FreeBSD 10.1 using GnuTLS 3.2.21 and the
2.1 setup instructions at https://sks-keyservers.net/overview-of-pools.php#pool_hkps

Mar 17 2015, 5:21 AM · gnupg, Bug Report, Debian, dirmngr
davidw added a comment to T1792: hkps: Hostname verification uses the wrong hostname.

D275: 586_poolname_and_SNI.patch

Mar 17 2015, 5:21 AM · gnupg, Bug Report, Debian, dirmngr

Mar 16 2015

werner closed T1781: "gpg --list-keys" fails when $GNUPGHOME is not writable as Resolved.
Mar 16 2015, 3:13 PM · Not A Bug, Debian, Bug Report, gnupg

Feb 17 2015

dkg added projects to T1845: sending large keys to keyserver push fails with silent hang and "assuan_inquire failed: Too much data for IPC layer": libassuan, Bug Report, Debian.
Feb 17 2015, 10:05 PM · gnupg, gnupg (gpg21), Debian, Bug Report

Feb 16 2015

dkg added projects to T1841: gpg-connect-agent: percent+ function doesn't encode '+': gnupg, Bug Report, Debian.
Feb 16 2015, 9:57 AM · Debian, Bug Report, gnupg
dkg set Version to 2.0.26 on T1841: gpg-connect-agent: percent+ function doesn't encode '+'.
Feb 16 2015, 9:57 AM · Debian, Bug Report, gnupg

Feb 4 2015

werner added a project to T1818: gnupg fails (buffer overflow detected) to encrypt archive when called from duplicity: Info Needed.
Feb 4 2015, 9:24 AM · Info Needed, gnupg, gnupg (gpg14), Bug Report, Debian

Jan 27 2015

werner added projects to T1818: gnupg fails (buffer overflow detected) to encrypt archive when called from duplicity: gnupg (gpg14), gnupg.
Jan 27 2015, 8:42 AM · Info Needed, gnupg, gnupg (gpg14), Bug Report, Debian

Jan 26 2015

werner added a comment to T1064: gpgsm: manual page misses to document options.

Should be fixed by commit 017c6f8fba9ae141a46084d6961ba60c4230f97a
on 2014-06-24.

Jan 26 2015, 2:59 PM · backport, gnupg, Debian, Feature Request
werner closed T1064: gpgsm: manual page misses to document options as Resolved.
Jan 26 2015, 2:59 PM · backport, gnupg, Debian, Feature Request

Jan 19 2015

werner added a comment to T1818: gnupg fails (buffer overflow detected) to encrypt archive when called from duplicity.

D281: 541_0001-Fix-a-problem-with-select-and-high-fds.patch

Jan 19 2015, 4:51 PM · Info Needed, gnupg, gnupg (gpg14), Bug Report, Debian
werner added a comment to T1818: gnupg fails (buffer overflow detected) to encrypt archive when called from duplicity.

Given that it seems not easy to reproduce this bug can you please test
commit 8adb5ff or the attsched patch to see whether this helps.

If it does not help, can you do a gpg build with debug symbols and run your case
again. If possible attach a debugger for a backtrace or produce it with a dump file.

Jan 19 2015, 4:51 PM · Info Needed, gnupg, gnupg (gpg14), Bug Report, Debian

Jan 18 2015

freg set Version to 1.4.18 on T1818: gnupg fails (buffer overflow detected) to encrypt archive when called from duplicity.
Jan 18 2015, 11:31 AM · Info Needed, gnupg, gnupg (gpg14), Bug Report, Debian
freg added projects to T1818: gnupg fails (buffer overflow detected) to encrypt archive when called from duplicity: Debian, Bug Report.
Jan 18 2015, 11:31 AM · Info Needed, gnupg, gnupg (gpg14), Bug Report, Debian

Dec 22 2014

werner added a comment to T1792: hkps: Hostname verification uses the wrong hostname.

Well, that is quite possible. I have seen other reports about this. I have not
yet come around to look at the hkps bugs.

Dec 22 2014, 2:47 PM · gnupg, Bug Report, Debian, dirmngr

Dec 20 2014

kyrias added projects to T1792: hkps: Hostname verification uses the wrong hostname: dirmngr, Debian, Bug Report.
Dec 20 2014, 4:55 PM · gnupg, Bug Report, Debian, dirmngr

Dec 11 2014

werner added a project to T1781: "gpg --list-keys" fails when $GNUPGHOME is not writable: Not A Bug.
Dec 11 2014, 3:46 PM · Not A Bug, Debian, Bug Report, gnupg
werner added a comment to T1781: "gpg --list-keys" fails when $GNUPGHOME is not writable.

Yes, this is the case for a very long time. I also won't call this a
bug.

There is no way to protect an update by a lock without having write
permissions to the same directory. Well, one could setup a second
file system hierarchy below /var/run and use that for the locking
file. However, this assume that all process accessing the files are
on the local machine. One of the reasons why we can't use a locking
API are remotely mounted file systems. See the comments in
common/dotlock.c .

And yes, we need lock the file even if the local process as no write
permissions to the directory - other processes may have and the
reading process may thus read garbage.

By using --lock-never you assert that there is no other processing
writing to the gpg data files. Thus using this is the Right Thing.

Dec 11 2014, 3:46 PM · Not A Bug, Debian, Bug Report, gnupg
werner closed T1415: gpgme_cancel() does not stop gpg process from finishing asynchronous call as Resolved.
Dec 11 2014, 12:02 PM · gpgme, Bug Report, Debian
werner removed a project from T1415: gpgme_cancel() does not stop gpg process from finishing asynchronous call: Too Old.
Dec 11 2014, 12:02 PM · gpgme, Bug Report, Debian
werner added a comment to T1415: gpgme_cancel() does not stop gpg process from finishing asynchronous call.

I assume this is related to T1630 which has been fixed

Dec 11 2014, 12:02 PM · gpgme, Bug Report, Debian

Dec 8 2014

werner set External Link to https://bugs.debian.org/771976 on T1781: "gpg --list-keys" fails when $GNUPGHOME is not writable.
Dec 8 2014, 12:55 PM · Not A Bug, Debian, Bug Report, gnupg

Dec 4 2014

dkg added a comment to T1781: "gpg --list-keys" fails when $GNUPGHOME is not writable.

oh, and this appears to be the case for 1.4.x, 2.0.x, and 2.1.x

Dec 4 2014, 3:21 AM · Not A Bug, Debian, Bug Report, gnupg
dkg added a comment to T1781: "gpg --list-keys" fails when $GNUPGHOME is not writable.

That link to the debian bts is a little wacky, somehow roundup is attaching the
comma to the end of it. it should be: https://bugs.debian.org/771976

Dec 4 2014, 3:20 AM · Not A Bug, Debian, Bug Report, gnupg
dkg added projects to T1781: "gpg --list-keys" fails when $GNUPGHOME is not writable: gnupg, Bug Report, Debian.
Dec 4 2014, 3:02 AM · Not A Bug, Debian, Bug Report, gnupg

Oct 3 2014

werner closed T1732: Don't break existing keys larger than 4k as Resolved.
Oct 3 2014, 6:20 PM · Not A Bug, Debian, Bug Report, gnupg
werner set External Link to https://bugs.debian.org/739424 on T1732: Don't break existing keys larger than 4k.
Oct 3 2014, 6:19 PM · Not A Bug, Debian, Bug Report, gnupg
werner reopened T1732: Don't break existing keys larger than 4k as "Open".
Oct 3 2014, 6:19 PM · Not A Bug, Debian, Bug Report, gnupg
werner added a comment to T1732: Don't break existing keys larger than 4k.

dkg developed a reasonsable patch which will be included in the next 1.4 version.

Oct 3 2014, 6:19 PM · Not A Bug, Debian, Bug Report, gnupg

Oct 2 2014

werner closed T1732: Don't break existing keys larger than 4k as Resolved.
Oct 2 2014, 7:11 PM · Not A Bug, Debian, Bug Report, gnupg
werner added a comment to T1732: Don't break existing keys larger than 4k.

No bug and I already set this bug to resolved.

Oct 2 2014, 7:11 PM · Not A Bug, Debian, Bug Report, gnupg

Oct 1 2014

ciaby added a comment to T1732: Don't break existing keys larger than 4k.

Judging by the lack of reply, I assume that this bug won't be fixed, correct?

Oct 1 2014, 3:41 AM · Not A Bug, Debian, Bug Report, gnupg

Sep 26 2014

ciaby reopened T1732: Don't break existing keys larger than 4k as "Open".
Sep 26 2014, 6:23 PM · Not A Bug, Debian, Bug Report, gnupg
ciaby added a comment to T1732: Don't break existing keys larger than 4k.

I read that. It says that RSA-2048 keys are going to be safe until 2030. Doesn't
sound like a lot to me... Considering the average human lifespan, I could be
around until 2070. So, nope, not enough.
If all the emails I sent till now have been intercepted and stored (which seems
to be the case according to Snowden), using a RSA-2048 key simply means that all
my private correspondence is going to be public (or at least accessible) in 16
years time. Now, the only thing I'm asking is to raise the amount of secure
memory allocated by GnuPG to 128k to let people use key sizes up to 16384,
something that was even allowed by the keygen itself.

Sep 26 2014, 6:23 PM · Not A Bug, Debian, Bug Report, gnupg
werner added a comment to T1732: Don't break existing keys larger than 4k.

Please read the FAQ starting with
https://gnupg.org/faq/gnupg-faq.html#default_rsa2048

Sep 26 2014, 12:54 PM · Not A Bug, Debian, Bug Report, gnupg
werner closed T1732: Don't break existing keys larger than 4k as Resolved.
Sep 26 2014, 12:54 PM · Not A Bug, Debian, Bug Report, gnupg
ciaby added a comment to T1732: Don't break existing keys larger than 4k.

By the way, is this all bullshit?
AES-256 == RSA-15360 / DSA-15360 (NIST)
http://csrc.nist.gov/groups/SMA/ispab/documents/minutes/2006-03/E_Barker-
March2006-ISPAB.pdf

AES=256 == RSA-15424 / DSA-15424 (ECRYPT2)
http://www.ecrypt.eu.org/documents/D.SPA.20.pdf

Sep 26 2014, 4:36 AM · Not A Bug, Debian, Bug Report, gnupg

Sep 25 2014

ciaby added a comment to T1732: Don't break existing keys larger than 4k.

Ok, got it. So I can just throw away my key and make a new one?
Fantastic. Thanks a lot.
Sounds a lot like "640K ought to be enough for anybody".
So long, and thanks for all the good work on GnuPG (seriously).

Sep 25 2014, 10:11 PM · Not A Bug, Debian, Bug Report, gnupg
werner added a comment to T1732: Don't break existing keys larger than 4k.

No.

Please read the FAQ on key sizes and if you have a lot of time the countless
discussions on gnupg-users. No, you are not paranoid but you are tuning the
wrong parameters. IT will never be a standard. There will never be any keys
larger than 4k RSA in real use.

Sep 25 2014, 9:46 PM · Not A Bug, Debian, Bug Report, gnupg
ciaby added a comment to T1732: Don't break existing keys larger than 4k.

Yes, I know how to change the code and make it work on _my_ machine.
There is the tiny problem that everyone else has to do it, too.
Can we make that change the default? I don't see a big problem in using 64k or
128k instead of 32k of secure memory.
By the way, 16k of key size is ridiculous now, but it's going to be kind of
standard in the not so distant future. Or am I too paranoid? :)
Just trying to have a GnuPG key which is future-proof, also taking in
consideration the possible use of quantum computers in the future.

Sep 25 2014, 9:17 PM · Not A Bug, Debian, Bug Report, gnupg
werner added a project to T1732: Don't break existing keys larger than 4k: Not A Bug.
Sep 25 2014, 8:51 PM · Not A Bug, Debian, Bug Report, gnupg
werner added a comment to T1732: Don't break existing keys larger than 4k.

Sorry, there is a limit on the size of secret keys which depends on
several factors. We allow for way longer keys than can be generated
by gpg to take the fuzziness in account, but only up to some limit.
You are on your own if you want to use ridiculous long keys.

Hint: You may increase the size of the secure memory my changing the
line

    /* initialize the secure memory. */
    got_secmem=secmem_init( 32768 );

in g10/gpg.c. Use a larger value there and it will work.

Sep 25 2014, 8:51 PM · Not A Bug, Debian, Bug Report, gnupg
ciaby added projects to T1732: Don't break existing keys larger than 4k: gnupg, Bug Report, Debian.
Sep 25 2014, 1:31 AM · Not A Bug, Debian, Bug Report, gnupg

Sep 17 2014

werner added a project to T1428: --fingerprint and --with-fingerprint create slightly different results: gnupg (gpg21).
Sep 17 2014, 7:00 PM · gnupg (gpg21), Debian, Bug Report, gnupg

Sep 3 2014

werner closed T1622: exits with a fatal error regarding missing trustdb although key is imported as Resolved.
Sep 3 2014, 9:47 AM · Debian, Bug Report, gnupg
werner added a comment to T1622: exits with a fatal error regarding missing trustdb although key is imported.

also fixed in 2.0

Sep 3 2014, 9:47 AM · Debian, Bug Report, gnupg
werner reopened T1622: exits with a fatal error regarding missing trustdb although key is imported as "Open".
Sep 3 2014, 9:47 AM · Debian, Bug Report, gnupg

Jul 3 2014

werner added a project to T1661: Gnupg directories not variable in the documentation: Feature Request.
Jul 3 2014, 11:28 AM · Feature Request, Debian, gnupg
werner lowered the priority of T1661: Gnupg directories not variable in the documentation from Normal to Wishlist.
Jul 3 2014, 11:28 AM · Feature Request, Debian, gnupg
werner removed a project from T1661: Gnupg directories not variable in the documentation: Bug Report.
Jul 3 2014, 11:28 AM · Feature Request, Debian, gnupg

Jul 1 2014

aheinecke set External Link to https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725804 on T1661: Gnupg directories not variable in the documentation.
Jul 1 2014, 10:58 AM · Feature Request, Debian, gnupg
aheinecke updated subscribers of T1661: Gnupg directories not variable in the documentation.
Jul 1 2014, 10:58 AM · Feature Request, Debian, gnupg
aheinecke set Version to 2.0.25 on T1661: Gnupg directories not variable in the documentation.
Jul 1 2014, 10:58 AM · Feature Request, Debian, gnupg
aheinecke added projects to T1661: Gnupg directories not variable in the documentation: gnupg, Bug Report, Debian.
Jul 1 2014, 10:58 AM · Feature Request, Debian, gnupg

Jun 30 2014

werner added a comment to T1042: Auto-generate a revocation certificate?.

Done for 2.1 with commit 03018ef

Jun 30 2014, 4:44 PM · gnupg, Debian, Feature Request
werner closed T1042: Auto-generate a revocation certificate? as Resolved.
Jun 30 2014, 4:44 PM · gnupg, Debian, Feature Request
werner changed Version from 2.x to 2.1 on T1042: Auto-generate a revocation certificate?.
Jun 30 2014, 4:44 PM · gnupg, Debian, Feature Request

Jun 23 2014

werner closed T1622: exits with a fatal error regarding missing trustdb although key is imported as Resolved.
Jun 23 2014, 10:17 AM · Debian, Bug Report, gnupg
werner removed a project from T1622: exits with a fatal error regarding missing trustdb although key is imported: Restricted Project.
Jun 23 2014, 10:17 AM · Debian, Bug Report, gnupg

Mar 7 2014

werner added a comment to T1622: exits with a fatal error regarding missing trustdb although key is imported.

Also applied to master.

Mar 7 2014, 10:43 AM · Debian, Bug Report, gnupg