Page MenuHome GnuPG
Feed Advanced Search

Apr 5 2016

werner added a project to T2290: Allow gpgv2 to use armored GPG keys as keyring file with trusted keys: Won't Fix.
Apr 5 2016, 5:55 PM · gnupg24, Feature Request
werner added a comment to T2290: Allow gpgv2 to use armored GPG keys as keyring file with trusted keys.

Although the patch is not very intrusive to other parts of GnuPG,
I do not like it for several reasons:

  • Armored is detected by the file's suffix. That is not the Unix way.
  • open and close is used - we should avoid that in new code. Always use es_ functions for better portability.
  • There is new function to create some temp dir despite that we already have such functions elsewhere. I have not seen the immediate reason for it.

My suggestion was to read the file into an estream object and change
the dearmor and keydb_add_resources to be able to work with it. There
is a unarmor_pump_new function which could be a starting point.
Granted, this would be a much more intrusive change and thus I doubt
that it is useful to spend too resources on it.

Can you please back out that commit.

BTW, please do not put a "cleanup" label in the mid of a function and
according to GNU standards initialized variables deserve separate
lines and statements.

Apr 5 2016, 5:55 PM · gnupg24, Feature Request
justus claimed T1506: New key generation usability enhancements.
Apr 5 2016, 4:36 PM · In Progress, gnupg, Feature Request
justus added a project to T1506: New key generation usability enhancements: In Progress.
Apr 5 2016, 4:36 PM · In Progress, gnupg, Feature Request
justus added a comment to T1506: New key generation usability enhancements.

Thanks for your suggestions. We have simplified the key generation process, do
you mind to re-evaluate it?

% gpg2 --gen-key
gpg: WARNING: unsafe permissions on homedir
'/home/teythoon/repos/g10/local/gnupghome'
gpg (GnuPG) 2.1.12-beta119; Copyright (C) 2016 Free Software Foundation, Inc.
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.

gpg: NOTE: THIS IS A DEVELOPMENT VERSION!
gpg: It is only intended for test purposes and should NOT be
gpg: used in a production environment or with production keys!
Note: Use "gpg2 --full-gen-key" for a full featured key generation dialog.

GnuPG needs to construct a user ID to identify your key.

Real name: Otto Normalverbraucher
Email address: otto@example.invalid
You selected this USER-ID:

    "Otto Normalverbraucher <otto@example.invalid>"

Change (N)ame, (E)mail, or (O)kay/(Q)uit? o
We need to generate a lot of random bytes. It is a good idea to perform
some other action (type on the keyboard, move the mouse, utilize the
disks) during the prime generation; this gives the random number
generator a better chance to gain enough entropy.
We need to generate a lot of random bytes. It is a good idea to perform
some other action (type on the keyboard, move the mouse, utilize the
disks) during the prime generation; this gives the random number
generator a better chance to gain enough entropy.
gpg: key 81F88C88 marked as ultimately trusted
gpg: revocation certificate stored as
'/home/teythoon/repos/g10/local/gnupghome/openpgp-revocs.d/5FB9D2A5255C94E3D06B5B563C8167E481F88C88.rev'
public and secret key created and signed.

gpg: checking the trustdb
gpg: public key of ultimately trusted key 909DD699 not found
gpg: public key of ultimately trusted key 5F2FA2F6 not found
gpg: public key of ultimately trusted key 5B81A1FD not found
gpg: marginals needed: 3 completes needed: 1 trust model: PGP
gpg: depth: 0 valid: 5 signed: 0 trust: 0-, 0q, 0n, 0m, 0f, 5u
pub rsa2048/81F88C88 2016-04-05 [S]

Key fingerprint = 5FB9 D2A5 255C 94E3 D06B  5B56 3C81 67E4 81F8 8C88

uid [ultimate] Otto Normalverbraucher <otto@example.invalid>
sub rsa2048/3E5BDFAF 2016-04-05 []

Apr 5 2016, 4:36 PM · In Progress, gnupg, Feature Request
justus closed T1844: dirmngr-client should auto-detect when input is in PEM form as Resolved.
Apr 5 2016, 4:12 PM · Feature Request, gnupg, dirmngr
justus claimed T1844: dirmngr-client should auto-detect when input is in PEM form.
Apr 5 2016, 4:12 PM · Feature Request, gnupg, dirmngr
justus added a comment to T1844: dirmngr-client should auto-detect when input is in PEM form.

Fixed in 9354293.

Apr 5 2016, 4:12 PM · Feature Request, gnupg, dirmngr
justus closed T1211: gpg-agent should disable ptrace as Resolved.
Apr 5 2016, 3:34 PM · Won't Fix, Feature Request, gnupg, Not A Bug, gpgagent
justus added a comment to T1509: gnupg2 (gpg-agent): Disable producing of core dumps for gpg-agent via prctl(PR_SET_DUMPABLE, 0) as ssh-agent does.

gpg-agent does disable core dumps both in the stable and modern version.
Furthermore I have to agree with Werner here, if there is a process that can
ptrace your gpg-agent, then you have already lost anyway.

Apr 5 2016, 2:59 PM · gnupg, Debian, gnupg (gpg20), Feature Request, gpgagent
justus closed T1509: gnupg2 (gpg-agent): Disable producing of core dumps for gpg-agent via prctl(PR_SET_DUMPABLE, 0) as ssh-agent does as Resolved.
Apr 5 2016, 2:59 PM · gnupg, Debian, gnupg (gpg20), Feature Request, gpgagent

Apr 4 2016

justus closed T2290: Allow gpgv2 to use armored GPG keys as keyring file with trusted keys as Resolved.
Apr 4 2016, 5:55 PM · gnupg24, Feature Request
justus added a comment to T2290: Allow gpgv2 to use armored GPG keys as keyring file with trusted keys.

Fixed in abb352d.

Apr 4 2016, 5:55 PM · gnupg24, Feature Request

Apr 1 2016

justus added a comment to T2290: Allow gpgv2 to use armored GPG keys as keyring file with trusted keys.

Ok, if you agree that this is a useful feature then I will implement it.

Apr 1 2016, 5:52 PM · gnupg24, Feature Request
werner added a comment to T2280: Wish for a new keygen API.

Adding an API to the --quick-* commands of gpg 2.1 is no my shortlist for GPGME.
This will make things much easier - including key signing.

Apr 1 2016, 5:24 PM · gnupg, gnupg (gpg21), Feature Request
werner added a comment to T2290: Allow gpgv2 to use armored GPG keys as keyring file with trusted keys.

I can understand the reason to avoid binary data in a repo.

I have not checked but iff we use estream to access a plain old keyring it would
be possible to use the existing unarmor code and feed that to an es_fopenmem
object.

Apr 1 2016, 5:13 PM · gnupg24, Feature Request
werner added a comment to T2254: Add FLTK frontend for pinentry (for weak computers).

No, FLTK is not lightweight. It actually adds the requirement for a C++
compiler to GnuPG. And pinentry-w32 shall of course not die!

Apr 1 2016, 5:06 PM · pinentry, Feature Request
werner added a project to T1967: GnuPG should select a key for signing without trying to use missing subkeys: Feature Request.
Apr 1 2016, 5:01 PM · gnupg (gpg22), Feature Request
justus claimed T2290: Allow gpgv2 to use armored GPG keys as keyring file with trusted keys.
Apr 1 2016, 4:18 PM · gnupg24, Feature Request
justus added a comment to T2290: Allow gpgv2 to use armored GPG keys as keyring file with trusted keys.

It is not trivial, but I guess we could create a temporary keyring and import
the key. But to be honest I don't understand why storing base64-encoded random
junk is somehow better than storing the junk itself, I mean it wont diff better
or something.

Apr 1 2016, 4:18 PM · gnupg24, Feature Request

Mar 30 2016

aheinecke closed T2299: Use sha2 internally in gpg4win build as Resolved.
Mar 30 2016, 5:35 PM · Feature Request, gpg4win
aheinecke added a comment to T2299: Use sha2 internally in gpg4win build.

Just did it.

Mar 30 2016, 5:35 PM · Feature Request, gpg4win
aheinecke added projects to T2299: Use sha2 internally in gpg4win build: gpg4win, Feature Request.
Mar 30 2016, 1:51 PM · Feature Request, gpg4win

Mar 29 2016

werner added a comment to T1303: Please support GCRYSEXP_FMT_BASE64.

In sexp.c we use suitable_encoding to decide on how to print the value: Either
as token, as an escaped string or as a hex-string. This is only done when using
FMT_ADVANCED. We could come up with some heuristics on how to print in base64
instead of hex (i.e. |YWJj| instead of #616263#) but that has the drawback that
the output would not be readable by older versions of libgcrypt.

Hwoever, what can be done is to make do_vsexp_sscan work with base64 encoding -
as of now such a value is simply ignored.

Mar 29 2016, 3:07 PM · Feature Request, libgcrypt
werner removed a project from T2295: Provide 64-bit gpgol.dll for new 64-bit versions of Office: Bug Report.
Mar 29 2016, 1:22 PM · Windows 64, Feature Request, Windows, gpgol
werner added a comment to T2295: Provide 64-bit gpgol.dll for new 64-bit versions of Office.

Actually we are working on a 64 bit version.

Mar 29 2016, 1:22 PM · Windows 64, Feature Request, Windows, gpgol
werner added a project to T2295: Provide 64-bit gpgol.dll for new 64-bit versions of Office: Feature Request.
Mar 29 2016, 1:22 PM · Windows 64, Feature Request, Windows, gpgol
werner lowered the priority of T2295: Provide 64-bit gpgol.dll for new 64-bit versions of Office from Unbreak Now! to Wishlist.
Mar 29 2016, 1:22 PM · Windows 64, Feature Request, Windows, gpgol

Mar 23 2016

aheinecke added a comment to T2254: Add FLTK frontend for pinentry (for weak computers).

Werner what is your opinion on this?

pinentry-w32 is broken. It does not handle variable string sizes and there is no
easy way to fix that. Afaik it was never intended as the "default" windows
pinentry but only as a crutch for windows ce experiments.

Would fltk be lightweight enough for your to replace pinentry-w32 in your
installer? In that case I think we should take a serious look at this patch as a
minimal pinentry version for windows.

(And delete pinentry-w32 instead)

Mar 23 2016, 6:52 PM · pinentry, Feature Request
aheinecke assigned T2254: Add FLTK frontend for pinentry (for weak computers) to werner.
Mar 23 2016, 6:52 PM · pinentry, Feature Request
aheinecke added a comment to T2280: Wish for a new keygen API.

I think in my previous messages the most important feature I'm missing was not
clear as I've mostly talked about subkeys and ECC curves. But what really
hinders me in making Kleopatra's key gen dialog more user friendly immediately,
even with default parameters for the key, is the API limit of only one user ID.

Mar 23 2016, 6:40 PM · gnupg, gnupg (gpg21), Feature Request
werner added a project to T2291: Smartcard interaction improvement (was: Shadowed private key design (for smartcard)): Feature Request.
Mar 23 2016, 5:54 PM · Restricted Project, Feature Request, gnupg
werner removed a project from T2291: Smartcard interaction improvement (was: Shadowed private key design (for smartcard)): Bug Report.
Mar 23 2016, 5:54 PM · Restricted Project, Feature Request, gnupg

Mar 22 2016

till added projects to T2290: Allow gpgv2 to use armored GPG keys as keyring file with trusted keys: Feature Request, gnupg.
Mar 22 2016, 6:18 PM · gnupg24, Feature Request
werner added a project to T1736: FIPS 186-4 compliance patches: Restricted Project.
Mar 22 2016, 5:58 PM · libgcrypt, Feature Request
werner added a comment to T1736: FIPS 186-4 compliance patches.

Meanwhile I also commited the Fedora patch.

Mar 22 2016, 5:58 PM · libgcrypt, Feature Request
werner removed a project from T1736: FIPS 186-4 compliance patches: In Progress.
Mar 22 2016, 5:58 PM · libgcrypt, Feature Request
aheinecke added a comment to T2280: Wish for a new keygen API.

Leaving the GUI vs. Commandline argument aside. I still think the batch keygen
API needs to be "modernized"

E.g. with improved authentication support in gnupg 2.1 it will become more
common to generate a key with an authentication subkey. Even the common case of
different Certify / Sign / Encrypt subkeys is not supported by the current API.

Maybe the Curves / Algos can be split up but I think gpgme needs API to query
supported Curves / Algos from GnuPG as this is more dynamic in GnuPG 2.1 then it
has been in previous versions.

Mar 22 2016, 10:33 AM · gnupg, gnupg (gpg21), Feature Request

Mar 18 2016

civ added a comment to T1736: FIPS 186-4 compliance patches.

Great! Thank you, Werner.

Mar 18 2016, 9:05 PM · libgcrypt, Feature Request
werner updated subscribers of T1736: FIPS 186-4 compliance patches.
Mar 18 2016, 6:02 PM · libgcrypt, Feature Request
werner added a project to T1736: FIPS 186-4 compliance patches: In Progress.
Mar 18 2016, 6:01 PM · libgcrypt, Feature Request
werner added a comment to T1736: FIPS 186-4 compliance patches.

Well it took quite some time but I have now commited all 10 patches to master.
I have a fixed a few things (mostly style).

I have not yet added the Fedora patch. I'll ask Tomáš whether he can send me a
signed off patch.

Mar 18 2016, 6:01 PM · libgcrypt, Feature Request
werner added a comment to T1701: SP 800-90A deterministic Random Bit Generator.

Applied to master will go into 1.7.

Mar 18 2016, 8:50 AM · patch, libgcrypt, Feature Request
werner closed T1701: SP 800-90A deterministic Random Bit Generator as Resolved.
Mar 18 2016, 8:50 AM · patch, libgcrypt, Feature Request

Mar 17 2016

werner added a comment to T2233: Missing feedback when sending key to key server.

There won't be any output if the keyserver responds with success. In other
cases you will see an error message (modulo the resolved bug T1832).
However, even if the keyserver responded with OK, there is no guarantee that the
keyserver worked as expected or that it properly syncs with other keyservers.

To make sure that you key is really on the keyservers, you should ask an
arbitrary keyserver for your key after giving it a few days to sync up.

Mar 17 2016, 3:52 PM · gnupg, Feature Request
werner added a comment to T2280: Wish for a new keygen API.

The actual plan is to restrict the wauys how gpgme can create keys. In the
future there will be only one way to create a key and no way to select an
algorithm. Those who want to use non-default algorithm should resort to the
command line and the --expert option.

Mar 17 2016, 3:22 PM · gnupg, gnupg (gpg21), Feature Request

Mar 14 2016

werner removed a project from T2273: Using GPA and Kleopatra in gpg4win does not allow you to change cipher-algo: Bug Report.
Mar 14 2016, 1:32 PM · gnupg, Bug Report, S/MIME
werner added projects to T2273: Using GPA and Kleopatra in gpg4win does not allow you to change cipher-algo: Feature Request, Won't Fix.
Mar 14 2016, 1:32 PM · gnupg, Bug Report, S/MIME

Mar 13 2016

sa added a comment to T1967: GnuPG should select a key for signing without trying to use missing subkeys.

Updated patch to check that the requested key usage is SIG before checking for a
secret key.

Mar 13 2016, 3:09 PM · gnupg (gpg22), Feature Request
sa added a comment to T1967: GnuPG should select a key for signing without trying to use missing subkeys.

D296: 793_sign-fix.patch

Mar 13 2016, 3:09 PM · gnupg (gpg22), Feature Request

Mar 10 2016

aheinecke added projects to T2280: Wish for a new keygen API: Feature Request, gnupg (gpg21), gnupg.
Mar 10 2016, 8:13 PM · gnupg, gnupg (gpg21), Feature Request

Mar 1 2016

neal closed T2252: Provide --alternate-keyserver to avoid "No valid OpenPGP data found" response as Resolved.
Mar 1 2016, 11:53 AM · gnupg, OpenPGP, Feature Request
neal added a comment to T2252: Provide --alternate-keyserver to avoid "No valid OpenPGP data found" response.

Marking as resolved since this is available in 2.1 and we are not going to
backport this to 1.4 or 2.0. Thanks.

Mar 1 2016, 11:53 AM · gnupg, OpenPGP, Feature Request
aheinecke added projects to T2267: Fix "Invalid Parameter passed to C runtime function" warnings on Windows: Feature Request, gpgagent, gnupg.
Mar 1 2016, 9:49 AM · Windows 32, Windows, gnupg, gpgagent, Feature Request

Feb 26 2016

aheinecke added a comment to T2227: Sign GpgOL to support group deployments.

Reading about
http://www.heise.de/security/meldung/Erpressungs-Trojaner-verschluesselt-mit-PGP-3116677.html

made me think that signing all binaries may not be the best idea. For our
installer we can rule out that it does something malicious as we control what it
does. So signing it is fine. Same goes probably for GpgOL etc.

But the actual encryption stuff (libgcrypt / gnupg) can, of course, be used for
malicious purposes. So there would be the potential for malware using binaries
signed by us. This could hurt our reputation. (technically in terms of Windows
Code Signing Reputation or Anti Virus software)

At least something we should keep in mind while thinking about changes to what
we sign.

Feb 26 2016, 4:20 PM · gpgol, Feature Request
ueno added a comment to T2263: use FD passing instead of /tmp/emacs$UID/pinentry.

I have done some experiment with it, and it works (though I had
to add ASSUAN_*_FDPASSING flags to a couple of places in gnupg).
However, I think I still need some more opinions to make it a
reviewable state.

First, to make all the things work, gpg would need a new
option (or an envvar?) to tell the FD number. Naively, it could
be named as --emacs-fd, which only works if INSIDE_EMACS is set.
However, it might be too specific, and sounds over-engineering to
me.

Instead, we could add a more generic option, say, --pinentry-fd.
With that option, any pinentry could talk to the caller through
the FD with the Assuan protocol. For security, the effect of the
option shall be restricted only when --pinentry-mode=loopback is
set and working.

In that case, it's tempting to make gpg-agent directly talk to
the FD, instead of spawning pinentry. However, it cannot take
advantage of pinentry's libsecret support and the diversion to
other pinentries (GTK+, ...). Also, it might be a similar
concept of --pinentry-program, which I proposed and was rejected.

What do you think?

Actually, I'm not sure about the current recommendation on the
custom passphrase input options. Given the recent bug fixes,
could --pinentry-mode=loopback be publicly promoted? If so,
I'm happy to withdraw this (and perhaps INSIDE_EMACS stuff) and
add a hack to use --pinentry-mode=loopback.

Feb 26 2016, 10:09 AM · pinentry, Feature Request

Feb 25 2016

neal added a comment to T2263: use FD passing instead of /tmp/emacs$UID/pinentry.

I think this is reasonable. If you want to implement it, I'll review the
patches. Thanks.

Feb 25 2016, 11:17 AM · pinentry, Feature Request

Feb 24 2016

sa added a comment to T1967: GnuPG should select a key for signing without trying to use missing subkeys.

Attached a patch to call agent_probe_secret_key() during finish_lookup().

This partially solves the problem by not trying to use subkeys that have no
secret key present. This does not unexpectedly change the existing behaviour
because GnuPG will currently return an error if the automatically selected
secret key is not present.

It does not solve the issue of having multiple potential signing subkeys on
different smartcards, because these are always considered to be present (if the
subkey has been associated with a smartcard).

Feb 24 2016, 9:39 PM · gnupg (gpg22), Feature Request
sa added a comment to T1967: GnuPG should select a key for signing without trying to use missing subkeys.

D297: 785_sign-fix.patch

Feb 24 2016, 9:39 PM · gnupg (gpg22), Feature Request
aheinecke added a comment to T2254: Add FLTK frontend for pinentry (for weak computers).

I wonder if we could / should use this as a replacement for Pinentry-w32?

Pinentry-w32 should die and FLTK could be lightweight enough that werner would
include it in gnupg-w32?

Feb 24 2016, 2:25 PM · pinentry, Feature Request
ueno added a comment to T2263: use FD passing instead of /tmp/emacs$UID/pinentry.

Does this mean that pinentry-emacs will only work when an emacs instance calls

gpg?

Yes, it is the intention of this proposal.

Does pinentry-emacs need to support the case that a program other than

emacs calls gpg?

I don't think it is worth being supported. It would be rather confusing if a
GUI program internally using gpg asked passphrases from Emacs window.

Feb 24 2016, 3:09 AM · pinentry, Feature Request

Feb 23 2016

neal added a comment to T2254: Add FLTK frontend for pinentry (for weak computers).

I tend to agree with Werner: adding another pinentry program increases our
maintenance burden, but the new pinentry doesn't add any convincing features,
AFAIK. If there are some significant benefits, please add them. Otherwise, I
think I'll change this issue to wont-fix. Sorry. Nevertheless, thank you for
your contribution! I hope you'll find another way to contribute.

Feb 23 2016, 9:33 PM · pinentry, Feature Request
neal added a comment to T2263: use FD passing instead of /tmp/emacs$UID/pinentry.

Does this mean that pinentry-emacs will only work when an emacs instance calls
gpg? Does pinentry-emacs need to support the case that a program other than
emacs calls gpg?

Feb 23 2016, 9:30 PM · pinentry, Feature Request
aheinecke added projects to T2264: Merging pyme as language binding in gpgme master: Feature Request, gpgme.
Feb 23 2016, 10:21 AM · gpgme, Feature Request
aheinecke updated subscribers of T2264: Merging pyme as language binding in gpgme master.
Feb 23 2016, 10:21 AM · gpgme, Feature Request
ueno set Version to 0.9.7 on T2263: use FD passing instead of /tmp/emacs$UID/pinentry.
Feb 23 2016, 8:29 AM · pinentry, Feature Request
ueno added projects to T2263: use FD passing instead of /tmp/emacs$UID/pinentry: Feature Request, pinentry.
Feb 23 2016, 8:29 AM · pinentry, Feature Request

Feb 22 2016

werner added a comment to T2254: Add FLTK frontend for pinentry (for weak computers).

Given that FLTK is a C++ library and we already have a Qt frontend, I am not
sure whether adding this is a good idea. The problem is the usual ABI break due
to compiler or library changes. We already had our problems in the past with
the two Qt versions we supported. Adding FLTK would introduce those problems again.

Why are Qt or GTK+ not sufficient for small boxes?

Feb 22 2016, 9:53 AM · pinentry, Feature Request

Feb 16 2016

neal added a comment to T2250: OpenPGP ASCII armor should be more robust.

I've pushed this.

Feb 16 2016, 4:45 PM · gnupg, Feature Request
neal closed T2250: OpenPGP ASCII armor should be more robust as Resolved.
Feb 16 2016, 4:45 PM · gnupg, Feature Request
madrat added a comment to T2254: Add FLTK frontend for pinentry (for weak computers).

"There are not many comments."
The code should comment itself, and /* some comment for block */ really need
only for description the strongly non-obvious actions - like complex math,
optimization (with answer why optimize here) or factorization algorithm O(1) :-).

Feb 16 2016, 9:31 AM · pinentry, Feature Request
madrat added a comment to T2254: Add FLTK frontend for pinentry (for weak computers).

Dear Neal, I thank you for answer.

This issue's the main goal is getting an answer to a question - Do you plan
support FLTK. I suppose that it may be closed with comment "not need this
toolkit" - so I do not format according to the GNU coding standards - There are
many contentious issues about the format code - 80 chars per line is more then
enough for assembler, but for C++ with templates - not sure.
Your code is your rules, so If you plan to accept FLTK support - I fix all notes.

"Using email"
email "madrat@users.noreply.github.com" is also my email, which I use in
github.com and because I use local git, it will be inserted automatically.

"the rest of the code has a fair number of violations"
For my studies and knowledge - can you post sample of violation?

Feb 16 2016, 9:21 AM · pinentry, Feature Request
dkg added a comment to T2134: iconv.dll is still a problem.

fwiw, i've now got most of GnuPG cross-building for win32 from a debian platform
using win-iconv. win-iconv doesn't seem to be a terrible choice to me.

Feb 16 2016, 8:10 AM · Feature Request, gnupg

Feb 15 2016

werner added a comment to T2250: OpenPGP ASCII armor should be more robust.

Great

Feb 15 2016, 8:50 PM · gnupg, Feature Request
werner added a comment to T2252: Provide --alternate-keyserver to avoid "No valid OpenPGP data found" response.

I guess you are reporting for GnuPG 2.0 or 1.4.
We already implemented your suggestion in 2.1.

Feb 15 2016, 8:44 PM · gnupg, OpenPGP, Feature Request
justus added a comment to T2250: OpenPGP ASCII armor should be more robust.

Yes, that patch works for me.

Feb 15 2016, 11:33 AM · gnupg, Feature Request

Feb 14 2016

krejzi added a comment to T2244: pinentry not saving/using saved GPG key password.

This is Linux From Scratch, pinentry 0.9.7, pinentry -> pinentry-gtk-2, with
fallback to ncurses. No other pinentry program works.

This is KDE environment, Qt pinentry crashes. I can confirm that there's a
keyring password in the Login keyring, which is the only keyring I use.

Nonetheless, the password won't be asked again while the gpg-agent is running,
the password was entered at least once, and the "Remember password (or
whatever)" box was checked.

As soon as gpg-agent is terminated or a session restarted (which also terminates
gpg-agent), next time I try to use the pgp key, I get asked for its passphrase.

Feb 14 2016, 5:00 PM · pinentry, Feature Request
neal added a comment to T2244: pinentry not saving/using saved GPG key password.

What distribution are you using? What pinentry program? Can you take a look
using seahorse to make sure that your password is saved. Once it is saved, it
shouldn't be removed.

Feb 14 2016, 4:54 PM · pinentry, Feature Request
neal added a comment to T2250: OpenPGP ASCII armor should be more robust.

The following simple patch works for me and make check still passes. I think it
makes sense to apply this patch given that this workaround is no more
complicated than an existing workaround for something similar (immediately
preceding my change). Can you please test to make sure it works for you?

Feb 14 2016, 4:02 PM · gnupg, Feature Request
neal added a comment to T2250: OpenPGP ASCII armor should be more robust.

D351: 776_0001-gpg-Make-ASCII-armor-decoding-more-robust-to-encodin.patch

Feb 14 2016, 4:02 PM · gnupg, Feature Request
neal added a project to T2254: Add FLTK frontend for pinentry (for weak computers): pinentry.
Feb 14 2016, 3:24 PM · pinentry, Feature Request
neal updated subscribers of T2254: Add FLTK frontend for pinentry (for weak computers).

Thanks for your contribution! A few comments based on a quick skim of the code:

Why are you using the apparently invalid email address
"madrat@users.noreply.github.com" in the headers?

The code is not formatted according to the GNU coding standards (indentation
using tabs instead of 2 spaces; some lines are longer than 80 characters). I'm
not sure how important this is since the rest of the code has a fair number of
violations.

There are not many comments.

When commenting out large blocks of code (as you do in main.cxx), please use #if
0 ... #endif rather than using /* ... */.

@werner: Do we want to add support for FLTK? If so, I'll take a closer look at
this. My main concern is that this is another thing that we have to maintain
and I'm not sure the gtk pinentry is really just a burden for weak computers.

Feb 14 2016, 3:23 PM · pinentry, Feature Request
neal updated subscribers of T2254: Add FLTK frontend for pinentry (for weak computers).
Feb 14 2016, 3:23 PM · pinentry, Feature Request

Feb 12 2016

madrat added a comment to T2254: Add FLTK frontend for pinentry (for weak computers).

FL/fl_utf8.H in some distros is Fl/fl_utf8.h

Feb 12 2016, 10:10 PM · pinentry, Feature Request
madrat added a comment to T2254: Add FLTK frontend for pinentry (for weak computers).

D354: 774_fltk.patch

Feb 12 2016, 10:10 PM · pinentry, Feature Request
madrat added a comment to T2254: Add FLTK frontend for pinentry (for weak computers).

input field tests removed

Feb 12 2016, 9:55 PM · pinentry, Feature Request
madrat added a comment to T2254: Add FLTK frontend for pinentry (for weak computers).

D355: 773_fltk.patch

Feb 12 2016, 9:55 PM · pinentry, Feature Request
madrat added a comment to T2254: Add FLTK frontend for pinentry (for weak computers).

D356: 772_fltk.patch

Feb 12 2016, 9:44 PM · pinentry, Feature Request
madrat added a comment to T2254: Add FLTK frontend for pinentry (for weak computers).

forget add resources

Feb 12 2016, 9:44 PM · pinentry, Feature Request
madrat added a comment to T2254: Add FLTK frontend for pinentry (for weak computers).

D357: 771_fltk.patch

Feb 12 2016, 6:02 PM · pinentry, Feature Request
madrat added a comment to T2254: Add FLTK frontend for pinentry (for weak computers).

Patch adds fltk support to pinentry

Feb 12 2016, 6:02 PM · pinentry, Feature Request
madrat set Version to git on T2254: Add FLTK frontend for pinentry (for weak computers).
Feb 12 2016, 5:17 PM · pinentry, Feature Request
madrat added a project to T2254: Add FLTK frontend for pinentry (for weak computers): Feature Request.
Feb 12 2016, 5:17 PM · pinentry, Feature Request
madrat added a comment to T2254: Add FLTK frontend for pinentry (for weak computers).

D358: 770_fltk.patch

Feb 12 2016, 5:17 PM · pinentry, Feature Request
uldis added a comment to T2251: Tests not working if build folder path longer than 81 character.

D352: 769_gnupg2-2.1.11_redirect_socket_for_tests.patch

Feb 12 2016, 5:05 PM · Bug Report, gnupg
uldis added a comment to T2251: Tests not working if build folder path longer than 81 character.

D353: 768_gnupg2-2.1.11_gpg_preset_passphrase_socket_redirect.patch

Feb 12 2016, 5:05 PM · Bug Report, gnupg
neal added a comment to T2250: OpenPGP ASCII armor should be more robust.

It seems like detecting and correcting this simple manging would be
straightforward to do and relatively self contained.

Feb 12 2016, 1:33 PM · gnupg, Feature Request
uldis added a comment to T2251: Tests not working if build folder path longer than 81 character.

My mistake. I was talking about gpg-preset-passphrase.
Redirect in gpg-agent works as expected.

Feb 12 2016, 10:10 AM · Bug Report, gnupg

Feb 11 2016

friendlydev added projects to T2252: Provide --alternate-keyserver to avoid "No valid OpenPGP data found" response: Feature Request, OpenPGP, gnupg.
Feb 11 2016, 6:50 PM · gnupg, OpenPGP, Feature Request
uldis set Version to 2.1.11 on T2251: Tests not working if build folder path longer than 81 character.
Feb 11 2016, 4:16 PM · Bug Report, gnupg