Page MenuHome GnuPG
Feed Advanced Search

Jul 6 2016

werner added a project to T2402: New option to encrypt with a key taken from a file: Unreleased.
Jul 6 2016, 4:10 PM · gnupg, OpenPGP, Feature Request
werner added a comment to T2402: New option to encrypt with a key taken from a file.

We got it for 2.1: -f or --recipient-file

Jul 6 2016, 4:10 PM · gnupg, OpenPGP, Feature Request
werner closed T2402: New option to encrypt with a key taken from a file as Resolved.
Jul 6 2016, 4:10 PM · gnupg, OpenPGP, Feature Request
werner added a comment to T2404: gpg-connect-agent should have an --scdaemon option in parallel to the --dirmngr option.

The only reason I can see that scdaemon is not started by gpg-agent are
processes which run before a login, for example from PAM. But then the
autostart feature probably not needed.

Jul 6 2016, 4:09 PM · gnupg, Feature Request

Jul 5 2016

dkg added a comment to T2404: gpg-connect-agent should have an --scdaemon option in parallel to the --dirmngr option.

hm, if there's a guarantee that scdaemon will only ever be launched as a
subprocess from gpg-agent, then maybe we don't need it.

If there's ever any expectation that some other program will launch scdaemon,
then it would be nice to use the unified launch mechanism provided by gpgconf.

Jul 5 2016, 11:31 PM · gnupg, Feature Request
aheinecke closed T2295: Provide 64-bit gpgol.dll for new 64-bit versions of Office as Resolved.
Jul 5 2016, 2:47 PM · Windows 64, Windows, Feature Request, gpgol
aheinecke added a comment to T2295: Provide 64-bit gpgol.dll for new 64-bit versions of Office.

Gpg4win 2.3.1 and 2.3.2 included 64 bit versions of gpgol.

Jul 5 2016, 2:47 PM · Windows 64, Windows, Feature Request, gpgol

Jul 4 2016

werner added a comment to T2404: gpg-connect-agent should have an --scdaemon option in parallel to the --dirmngr option.

Do you really want to use it? The problem is that you won't have a Pinentry and
some other minor goodies. The better way is to let gpg-agent route command to
scdaemon. For example

  gpg-connect-agent "scd help" /bye

shows scdaemons help.

Jul 4 2016, 12:41 PM · gnupg, Feature Request

Jul 2 2016

jukivili added a comment to T2388: Inform callers about memory alignment requirements of a cipher implementation.

Currently, there is no need for alignmask API. Implementations that we have at
the moment can handle unaligned data and some have fast paths for word-aligned
in/out buffers (which malloc can provide).

We could add section in documentation about appropiate memory alignment for best
performance, and tell to align buffers to cacheline size.

Jul 2 2016, 1:53 PM · libgcrypt, Feature Request

Jul 1 2016

aheinecke claimed T2314: Improve detection of gpgme_data_identify.
Jul 1 2016, 11:02 AM · gpgme, Feature Request, gpg4win
aheinecke added a comment to T2314: Improve detection of gpgme_data_identify.

Fix for the difference in detection of armored vs. binary detached signatures
was trivial so I've pushed it with rev. 570bf2a

Looks good to me know. I'll start using it in Kleopatra and we will see what
breaks :-)

Have not tested different S/MIME messages yet.

Jul 1 2016, 11:02 AM · gpgme, Feature Request, gpg4win

Jun 30 2016

dkg added projects to T2404: gpg-connect-agent should have an --scdaemon option in parallel to the --dirmngr option: Feature Request, gnupg.
Jun 30 2016, 6:36 PM · gnupg, Feature Request
aheinecke added a comment to T2381: Add more support for profiles in gpgconf.

Talked to werner about it. The way something like trust-model should be
switchable would be best to handle with profiles.

There is at least one profile planned for EasyGPG. Something like "Silent" or
automated. Riseup and VSNFD will probably also want to create profiles.

I think apply-defaults could be extended for this with a defaults file for each
profile.
Then something like:

gpgconf --list-defaults

    List all available default files.

Where the output format could be similar to list-components.
name:description:filename:

filename is the path to the config file.

Then --apply-defaults could be extended to take an optional filename as an
argument. (Like --list-config, --check-config)

With --dry-run it should only check if all the settings marked as no-change are
set correctly and indicate it through the return code.

For EasyGPG I think a config file could be:

  • gpg-agent max-cache-ttl [change] 30758400 gpg-agent default-cache-ttl [change] 30758400 gpg trust-model [no-change] tofu+pgp gpg auto-key-retrieve [change] gpg auto-key-locate [change] local,wkd,dane,pka,cert,keyserver
Jun 30 2016, 4:00 PM · In Progress, gnupg (gpg22), gnupg, Feature Request
aheinecke renamed T2381: Add more support for profiles in gpgconf from Expose trust-model through gpgconf to Add support for profiles in gpgconf.
Jun 30 2016, 4:00 PM · In Progress, gnupg (gpg22), gnupg, Feature Request

Jun 29 2016

werner added projects to T2402: New option to encrypt with a key taken from a file: Feature Request, OpenPGP, gnupg.
Jun 29 2016, 12:40 PM · gnupg, OpenPGP, Feature Request

Jun 24 2016

aheinecke added a comment to T2314: Improve detection of gpgme_data_identify.

Jun 24 2016, 2:35 PM · gpgme, Feature Request, gpg4win
aheinecke added a comment to T2314: Improve detection of gpgme_data_identify.

Thanks.

I've created some examples to test it. They are all done with alfa@example.com
test key. Found an issue through that.

-ba (detached ascii armored signature) is detected as PGP-Signed and not as
PGP-Signature.

examples/plain.txt.asc: PGP-signed

A discussion about KMail handling PGP/Inline encodings [1] also makes me wonder
if data_identfiy should also return the output charset of text messages if it is
provided in the Armor Header. Afaik there is currently no API in gpgme to check
this and semantically It would make sense to me to parse this in identify, too.
But this is more of a question wether or not you think it makes sense to do this
directly. I'm not strongly opinionated about this.

1: https://bugs.kde.org/show_bug.cgi?id=248058

Jun 24 2016, 2:35 PM · gpgme, Feature Request, gpg4win
syscomet added projects to T2398: finger support using SRV DNS records: dirmngr, Feature Request.
Jun 24 2016, 12:23 PM · gnupg, Feature Request, dirmngr

Jun 23 2016

werner added a project to T2314: Improve detection of gpgme_data_identify: Restricted Project.
Jun 23 2016, 10:18 AM · gpgme, Feature Request, gpg4win
werner removed a project from T2314: Improve detection of gpgme_data_identify: In Progress.
Jun 23 2016, 10:18 AM · gpgme, Feature Request, gpg4win
werner added a comment to T2314: Improve detection of gpgme_data_identify.

Done with commit cf37a57.
Note that only the first 2k are inspected.

Jun 23 2016, 10:18 AM · gpgme, Feature Request, gpg4win

Jun 21 2016

werner added a comment to T2314: Improve detection of gpgme_data_identify.

Binary PGP messages are now detected. Not well tested but the run-verify test
tool can help to check the feature.

Jun 21 2016, 4:25 PM · gpgme, Feature Request, gpg4win
werner added a project to T2314: Improve detection of gpgme_data_identify: In Progress.
Jun 21 2016, 4:25 PM · gpgme, Feature Request, gpg4win
werner renamed T2314: Improve detection of gpgme_data_identify from Improve detection of gpgme_data_indentify to Improve detection of gpgme_data_identify.
Jun 21 2016, 10:46 AM · gpgme, Feature Request, gpg4win

Jun 20 2016

werner added a comment to T2314: Improve detection of gpgme_data_identify.

I need to implement a partial OpenPGP parser to decide what a certain PGP
Message is about and also bot all binary OpenPGP files. Please have some patience.

Jun 20 2016, 9:40 PM · gpgme, Feature Request, gpg4win

Jun 18 2016

dkg added a comment to T2348: Improve detection of IPv6 and IPv4 availibility.

(that last comment was with 2.1.13)

Jun 18 2016, 1:35 AM · gnupg, Feature Request, dirmngr
dkg set Version to 2.1.13 on T2348: Improve detection of IPv6 and IPv4 availibility.
Jun 18 2016, 1:35 AM · gnupg, Feature Request, dirmngr
dkg added a comment to T2348: Improve detection of IPv6 and IPv4 availibility.

fwiw, when i'm on a network that doesn't support IPv6, i get this:

0 dkg@alice:~$ gpg --send $KEYID
gpg: sending key REDACTED to hkps://hkps.pool.sks-keyservers.net
gpg: keyserver send failed: Invalid argument
gpg: keyserver send failed: Invalid argument
2 dkg@alice:~$

in dirmngr's logs:

2016-06-17 19:30:17 dirmngr[27999.2] DBG: gnutls:L3: ASSERT: mpi.c:246
2016-06-17 19:30:17 dirmngr[27999.2] DBG: gnutls:L5: REC[0x7f61f400fc10]:
Allocating epoch #0
2016-06-17 19:30:17 dirmngr[27999.2] can't connect to '2001:ba8:1f1:f2d4::2':
Invalid argument
2016-06-17 19:30:17 dirmngr[27999.2] error connecting to
'https://[2001:ba8:1f1:f2d4::2]:443': Invalid argument
2016-06-17 19:30:17 dirmngr[27999.2] DBG: gnutls:L5: REC[0x7f61f400fc10]: Start
of epoch cleanup
2016-06-17 19:30:17 dirmngr[27999.2] DBG: gnutls:L5: REC[0x7f61f400fc10]: End of
epoch cleanup

I think this instance of dirmngr was started on a network that has both IPv4 and
IPv6.

if i do:

     gpg-connect-agent --dirmngr killdirmngr /bye

and then try the --send again, it goes through fine.

Jun 18 2016, 1:35 AM · gnupg, Feature Request, dirmngr

Jun 17 2016

aheinecke added a comment to T2314: Improve detection of gpgme_data_identify.

Would it be possible to also detect if data should be decrypt_verified or just
verified?

I'm having trouble with PGP MESSAGES that can be either encrypted or Opaque
Signed, or nothing.

If I do a decrypt_verify I get a No Data error in the result because decryption
failed. Should I just ignore No Data error and check for the status of the
signatures in that case?

Jun 17 2016, 4:23 PM · gpgme, Feature Request, gpg4win
smueller_chronox.de added projects to T2388: Inform callers about memory alignment requirements of a cipher implementation: Feature Request, libgcrypt.
Jun 17 2016, 11:30 AM · libgcrypt, Feature Request

Jun 13 2016

TARehman added a comment to T2273: Using GPA and Kleopatra in gpg4win does not allow you to change cipher-algo.

I did not see anything in the FAQ dealing specifically with the GUI not
working. That is what this bug is about. I agree that changing the cipher-algo
should be done cautiously, but either the front-end should not permit it to
appear to happen, or the front-end should actually do the expected behavior
(namely, changing the config files).

Jun 13 2016, 10:02 PM · gnupg, Bug Report, S/MIME
TARehman reopened T2273: Using GPA and Kleopatra in gpg4win does not allow you to change cipher-algo as "Open".
Jun 13 2016, 10:02 PM · gnupg, Bug Report, S/MIME

Jun 8 2016

aheinecke added a comment to T1143: better heuristic for choosing an encryption key based on a User ID.

Just noticed this issue as it was mentioned in T2359 which is "my" issue
about this topic ;-)
I've actually implemented the algorithm outlined in T1143 (dkg on Sep 23 2009, 06:53 PM / Roundup) in libkleo/ QGgpME
for a better opportunistic encryption support in kmail (
https://phabricator.kde.org/T2520 )

Werner told me that something like that will be done in GnuPG itself. Afaik the
current plan is to have --locate-keys use a similar algorithm to return exactly
one "best" key if a mailbox is given. And if I understood werner correctly this
would then also be the key used when you would do a "gpg -er <mailbox>"

Should this be closed as Superseded?

Jun 8 2016, 7:15 PM · Duplicate, gnupg, Feature Request
werner added a comment to T2359: Query which key will be used for a given mailbox.

related: T1143

Jun 8 2016, 6:10 PM · gnupg (gpg22), gnupg, Feature Request
werner closed T1394: man page documents some unsupported parameters as Resolved.
Jun 8 2016, 6:06 PM · gnupg, Debian, Feature Request
werner added a comment to T1394: man page documents some unsupported parameters.

Fixed in the repo (commit 536c721)

Jun 8 2016, 6:06 PM · gnupg, Debian, Feature Request
werner closed T1444: Check keyid after downloading key from keyserver and before importing it as Resolved.
Jun 8 2016, 5:56 PM · gnupg, Feature Request
werner added a comment to T1444: Check keyid after downloading key from keyserver and before importing it.

We have meanwhile implemented such a check.

Jun 8 2016, 5:56 PM · gnupg, Feature Request
werner removed a project from T1831: Remove gpgkey2ssh, source and build target: Stalled.
Jun 8 2016, 5:53 PM · gnupg, Feature Request
werner added a comment to T1831: Remove gpgkey2ssh, source and build target.

gpgkey2ssh has been removed from master (2.1)

Jun 8 2016, 5:53 PM · gnupg, Feature Request
werner closed T1831: Remove gpgkey2ssh, source and build target as Resolved.
Jun 8 2016, 5:53 PM · gnupg, Feature Request
werner added a comment to T459: gnupg could provide more detailed debugging error codes - especially for enigmail.

Most thingd have probably been implemented in the meantime.

Jun 8 2016, 5:50 PM · gnupg, Feature Request

Jun 6 2016

werner added a project to T2379: default to --with-fingerprint, introduce --without-fingerprint: Restricted Project.
Jun 6 2016, 5:08 PM · gnupg, Feature Request
werner added a comment to T2379: default to --with-fingerprint, introduce --without-fingerprint.

7257ea2 switches to none.

There is also a new option --with-subkey-fingerprint which keeps the compact
fingerprint format also for subkeys. The Lead-in text for fingerprints n the
listing is in any case not anymore printed if keyid-format is none.

Jun 6 2016, 5:08 PM · gnupg, Feature Request
werner removed a project from T2379: default to --with-fingerprint, introduce --without-fingerprint: In Progress.
Jun 6 2016, 5:08 PM · gnupg, Feature Request
werner added a comment to T2379: default to --with-fingerprint, introduce --without-fingerprint.

Just pushed the --keyid-format=none feature. Changing the default will be done
with another commit.

Jun 6 2016, 4:06 PM · gnupg, Feature Request
werner added a project to T2379: default to --with-fingerprint, introduce --without-fingerprint: In Progress.
Jun 6 2016, 4:06 PM · gnupg, Feature Request
aheinecke added a comment to T2380: Auto-refresh key if it is close to its expiration date..

Replacing revoked keys made me wonder if we actually need an auto-refresh key.
If we try to return one valid key with --locate-keys wouldn't it make more sense
semantically if we use the auto-key-locate mechanisms with locate-keys when a
key is expired in the local store?

This would also work better for revoked keys where a Parcimonie style auto
refresh would pick up the revocation and locate-keys would then look for a new key.

Jun 6 2016, 3:56 PM · vsd34, gnupg, OpenPGP, Feature Request
aheinecke added a comment to T2359: Query which key will be used for a given mailbox.

How do you plan to handle the case that "local" lookup only yields expired or
revoked keys. Will GnuPG then automatically fall back to other locate-keys methods?
This would be my wish so that a MUA / User of that command does not have to care
about that case :-)

Jun 6 2016, 3:50 PM · gnupg (gpg22), gnupg, Feature Request
aheinecke added projects to T2381: Add more support for profiles in gpgconf: Feature Request, gnupg (gpg21), gnupg.
Jun 6 2016, 2:22 PM · In Progress, gnupg (gpg22), gnupg, Feature Request
werner added projects to T2380: Auto-refresh key if it is close to its expiration date.: Feature Request, OpenPGP, gnupg.
Jun 6 2016, 11:40 AM · vsd34, gnupg, OpenPGP, Feature Request

Jun 4 2016

werner added a comment to T2379: default to --with-fingerprint, introduce --without-fingerprint.

This is the current output with keyid-format=none

pub dsa2048 2007-12-31 [SC] [expires: 2018-12-31]

80615870F5BAD690333686D0F2AD85AC1E42B367

uid [ full ] Werner Koch <wk@gnupg.org>
uid [ full ] Werner Koch <wk@[...]>
uid [ unknown] Werner Koch <werner@[...]>
sub dsa1024 2011-11-02 [S]
sub rsa2048 2014-01-02 [E] [expires: 2016-12-31]

The problem I have is how to decide when to use the compact fingerprint format.
My idea is to always use the compact format unless --fingerprint switched back
to the old format (which is easier to read).

Jun 4 2016, 9:23 PM · gnupg, Feature Request
werner added a comment to T2379: default to --with-fingerprint, introduce --without-fingerprint.

I started working on this.

Jun 4 2016, 9:10 PM · gnupg, Feature Request
werner added a comment to T2379: default to --with-fingerprint, introduce --without-fingerprint.

I tried it but I think it looks prettier without. A rationale might be that the
fingerprint is a property of the "pub" (public key) and the line should be
considered a continuation line.

Jun 4 2016, 7:40 PM · gnupg, Feature Request
dkg added a comment to T2379: default to --with-fingerprint, introduce --without-fingerprint.

This looks great to me. I've always been frustrated by the c+p difficulty.

Does it make sense to put an "fpr" at the beginning of the fingerprint line, to
match with "pub" and "uid" ?

For example:

pub dsa2048 2007-12-31 [SC] [expires: 2018-12-31]
fpr 80615870F5BAD690333686D0F2AD85AC1E42B367
uid [ full ] Werner Koch <wk@gnupg.org>

Have you started work on this change or would you like patches?

Jun 4 2016, 5:55 PM · gnupg, Feature Request
werner added a comment to T2379: default to --with-fingerprint, introduce --without-fingerprint.

The current --with-fingerprint output is

pub dsa2048/F2AD85AC1E42B367 2007-12-31 [SC] [expires: 2018-12-31]

Key fingerprint = 8061 5870 F5BA D690 3336  86D0 F2AD 85AC 1E42 B367

uid [ full ] Werner Koch <wk@gnupg.org>

One problem I have with this format is the c+p of the fingerrpint is
not easy, because you need to mark the entire fingerprint and then use
quotes to use it. What about changing the default format (i.e. w/o
any fingerprint options to

pub dsa2048/F2AD85AC1E42B367 2007-12-31 [SC] [expires: 2018-12-31]

80615870F5BAD690333686D0F2AD85AC1E42B367

uid [ full ] Werner Koch <wk@gnupg.org>

or

pub dsa2048/1E42B367 2007-12-31 [SC] [expires: 2018-12-31]

80615870F5BAD690333686D0F2AD85AC1E42B367

uid [ full ] Werner Koch <wk@gnupg.org>

or

pub dsa2048 2007-12-31 [SC] [expires: 2018-12-31]

80615870F5BAD690333686D0F2AD85AC1E42B367

uid [ full ] Werner Koch <wk@gnupg.org>

or aligned in some other way?

Personally I would like to keep the long keyid at least for subkeys
because it makes the key listing easier to read and forced selection
of a signing subkey easier. However, removing information which is
in most cases useless and partly dangerous has a higher priority.
Thus a listing of my key may look like this:

pub dsa2048 2007-12-31 [SC] [expires: 2018-12-31]

80615870F5BAD690333686D0F2AD85AC1E42B367

uid [ full ] Werner Koch <wk@gnupg.org>
uid [ full ] Werner Koch <wk@[...]>
uid [ full ] Werner Koch <werner@[...]>
sub dsa1024 2011-11-02 [S]
sub rsa2048 2014-01-02 [E] [expires: 2016-12-31]

To implement that I would indeed suggest a keyid format "none" which
will be the default and select the above new listing format.

Jun 4 2016, 11:26 AM · gnupg, Feature Request
werner claimed T2379: default to --with-fingerprint, introduce --without-fingerprint.
Jun 4 2016, 11:26 AM · gnupg, Feature Request
werner added a project to T1445: keyid-format fingerprint: gnupg.
Jun 4 2016, 11:03 AM · Duplicate, gnupg, Feature Request
werner added a project to T1445: keyid-format fingerprint: Duplicate.
Jun 4 2016, 11:03 AM · Duplicate, gnupg, Feature Request
werner added a comment to T1445: keyid-format fingerprint.

Duplicate of T2379

Jun 4 2016, 11:03 AM · Duplicate, gnupg, Feature Request
werner closed T1445: keyid-format fingerprint as Resolved.
Jun 4 2016, 11:03 AM · Duplicate, gnupg, Feature Request

Jun 3 2016

dkg added projects to T2379: default to --with-fingerprint, introduce --without-fingerprint: Feature Request, gnupg.
Jun 3 2016, 11:08 PM · gnupg, Feature Request
dkg added a comment to T1445: keyid-format fingerprint.

(btw, "fingerprint" should be 40 hex chars, not 32 as if suggested)

Jun 3 2016, 11:02 PM · Duplicate, gnupg, Feature Request
dkg reopened T1445: keyid-format fingerprint as "Open".
Jun 3 2016, 11:02 PM · Duplicate, gnupg, Feature Request
dkg removed a project from T1445: keyid-format fingerprint: Won't Fix.
Jun 3 2016, 11:02 PM · Duplicate, gnupg, Feature Request
dkg added a comment to T1445: keyid-format fingerprint.

For modern gnupg, we no longer support v3 keys, and we're considering making
--with-fingerprint the default (see
https://lists.gnupg.org/pipermail/gnupg-devel/2016-January/030748.html), so i
think this suggestion should actually be reconsidered.

Jun 3 2016, 11:02 PM · Duplicate, gnupg, Feature Request

Jun 2 2016

werner reassigned T1506: New key generation usability enhancements from justus to gnupg-hackers.
Jun 2 2016, 11:17 PM · In Progress, gnupg, Feature Request
werner added a comment to T1506: New key generation usability enhancements.

Not really making it simpler but --quick-gen-key can now take an expiration date.

Let's keep this bug open to track other improvements.

Jun 2 2016, 11:17 PM · In Progress, gnupg, Feature Request
werner updated subscribers of T1506: New key generation usability enhancements.
Jun 2 2016, 11:17 PM · In Progress, gnupg, Feature Request
aheinecke added a comment to T2280: Wish for a new keygen API.

Ok,
Let me summarize how I understand the workflow is supposed to be:

  • Generate a Key with the limited batch keygen.
  • After key creation add subkeys as wanted with --quick-addkey
  • Add additional UID's with --quick-adduid

I think I can work with that.
For full flexibility T2364 would be nice so that one could create a certify
only key this way and subkeys for everything else.

But yeah thats icing on the cake.

Still does not solve the Problem how to figure out which algrithms with which
parameters / capabilities are supportet but meh, I guess you can't have everything..

Jun 2 2016, 4:24 PM · gnupg, gnupg (gpg21), Feature Request
werner added a comment to T1506: New key generation usability enhancements.

We also have --quick-addkey now.

Jun 2 2016, 4:13 PM · In Progress, gnupg, Feature Request
werner added a project to T2280: Wish for a new keygen API: Restricted Project.
Jun 2 2016, 4:11 PM · gnupg, gnupg (gpg21), Feature Request
werner added a comment to T2280: Wish for a new keygen API.

We now have gpg --quick-addkey fpr algo usage expire
(for2.1.13)

Jun 2 2016, 4:11 PM · gnupg, gnupg (gpg21), Feature Request
werner added a project to T2064: please allow unattended secret key deletion: In Progress.
Jun 2 2016, 4:08 PM · gnupg, Feature Request

Jun 1 2016

MrBazuki added a comment to T2373: GPA should explain problems with expired subkeys..

Thanks!

Jun 1 2016, 2:41 PM · Feature Request, gpa
werner renamed T2363: warn user about private key's expiration from warn user about key's expiration to warn user about private key's expiration.
Jun 1 2016, 2:24 PM · gnupg, Feature Request
werner added a project to T2373: GPA should explain problems with expired subkeys.: Feature Request.
Jun 1 2016, 2:20 PM · Feature Request, gpa
werner removed a project from T2373: GPA should explain problems with expired subkeys.: Bug Report.
Jun 1 2016, 2:20 PM · Feature Request, gpa
werner added a comment to T2373: GPA should explain problems with expired subkeys..

$ gpg mBank17044.asc
pub rsa2048/375EB336C8086B9E 2015-01-19
uid AR17044 <XXXXXXXXXXXX@mbank.pl>
sub rsa2048/75E684B9017985DF 2014-12-29 [expires: 2016-01-20]

[uid redacted]
As you can see, the encryption subkey expired in January. Thus the holder of
the key does not want you to encrypt to this key after that date. We know that
GPA should give a better error message. I'll change your report to a wish to
implement this.

Jun 1 2016, 2:20 PM · Feature Request, gpa
werner lowered the priority of T2373: GPA should explain problems with expired subkeys. from Normal to Wishlist.
Jun 1 2016, 2:20 PM · Feature Request, gpa
werner renamed T2373: GPA should explain problems with expired subkeys. from GPGME library error to GPA should explain problems with expired subkeys..
Jun 1 2016, 2:20 PM · Feature Request, gpa

May 30 2016

werner removed a project from T1537: gpgv does not handle expired or revoked keys: Documentation.
May 30 2016, 8:06 AM · Feature Request, gnupg
werner added a project to T1537: gpgv does not handle expired or revoked keys: Feature Request.
May 30 2016, 8:06 AM · Feature Request, gnupg

May 27 2016

werner added a comment to T2366: No DEP/ASLR or other security mitigations for GpgEX/GpgOL.

Duplicate of T2171

May 27 2016, 9:54 AM · Feature Request, Windows 64, gpgol, gpg4win, Windows, Windows 32
werner removed a project from T2366: No DEP/ASLR or other security mitigations for GpgEX/GpgOL: Bug Report.
May 27 2016, 9:54 AM · Feature Request, Windows 64, gpgol, gpg4win, Windows, Windows 32
werner added a project to T2366: No DEP/ASLR or other security mitigations for GpgEX/GpgOL: Feature Request.
May 27 2016, 9:54 AM · Feature Request, Windows 64, gpgol, gpg4win, Windows, Windows 32

May 24 2016

aheinecke updated subscribers of T2314: Improve detection of gpgme_data_identify.
May 24 2016, 10:07 AM · gpgme, Feature Request, gpg4win
aheinecke assigned T2314: Improve detection of gpgme_data_identify to werner.
May 24 2016, 10:07 AM · gpgme, Feature Request, gpg4win
aheinecke added a comment to T2314: Improve detection of gpgme_data_identify.

CRL detection is not really important. But detection of binary data is so that I
can properly handle .pgp and .gpg file extensions.

Detached signatures are also important so that I can look / guess for the signed
data and setup the verify operation accordingly or handle it in the GUI if no
Data is found. Maybe we can use flags for this so we don't break the current
behaviror that does not distinguish between detached signatures?

May 24 2016, 10:07 AM · gpgme, Feature Request, gpg4win

May 20 2016

werner added a project to T2360: Add support for TOFU in GpgME: In Progress.
May 20 2016, 1:37 PM · gnupg (gpg22), gpgme, Feature Request

May 19 2016

werner added a comment to T2362: pretty printing time left to expiration.

FWIW: pretty printing a time has a problem with i18n. It is too different for
gettext to handle.

May 19 2016, 10:22 AM · gnupg, Feature Request

May 18 2016

aheinecke added projects to T2364: gen-key --batch does not support certify only keys: KDE, Feature Request, gnupg.
May 18 2016, 5:33 PM · gnupg, Feature Request, KDE
aheinecke set Version to master on T2364: gen-key --batch does not support certify only keys.
May 18 2016, 5:33 PM · gnupg, Feature Request, KDE
aheinecke set External Link to https://bugs.kde.org/show_bug.cgi?id=363148 on T2364: gen-key --batch does not support certify only keys.
May 18 2016, 5:33 PM · gnupg, Feature Request, KDE
neal updated subscribers of T2363: warn user about private key's expiration.
May 18 2016, 5:12 PM · gnupg, Feature Request
neal added projects to T2363: warn user about private key's expiration: Feature Request, gnupg.
May 18 2016, 5:12 PM · gnupg, Feature Request
mstan renamed T2362: pretty printing time left to expiration from warn user about key's expiration to pretty printing time left to expiration.
May 18 2016, 5:02 PM · gnupg, Feature Request
mstan added a comment to T2362: pretty printing time left to expiration.

That might be an option like '--pretty-expiration KEYID' that simply outputs in
a human readable format how much time is left before the key KEYID expires. That
simply saves the user from doing id mentally. Furthermore, the output could also
be made script-eatable

May 18 2016, 5:02 PM · gnupg, Feature Request
mstan added projects to T2362: pretty printing time left to expiration: Feature Request, gnupg.
May 18 2016, 4:57 PM · gnupg, Feature Request

May 17 2016

justus closed T2264: Merging pyme as language binding in gpgme master as Resolved.
May 17 2016, 4:43 PM · gpgme, Feature Request