Page MenuHome GnuPG
Feed Advanced Search

Jul 13 2017

aheinlein added a comment to T3270: No reasonable error codes on decryption failure.

Thank you very much for addressing this so quickly. I agree that corrupt data needs no further details here.

Jul 13 2017, 8:29 AM · gpgme, Bug Report
marcus assigned T2816: TOFU API in gpgme not documented to neal.
Jul 13 2017, 1:55 AM · gpgme, Bug Report, TOFU

Jul 12 2017

werner changed the status of T3270: No reasonable error codes on decryption failure from Open to Testing.

Thanks. Indeed we should have better error codes. However, passing all error codes from the backend to the user is not useful.

Jul 12 2017, 6:46 PM · gpgme, Bug Report
werner claimed T3270: No reasonable error codes on decryption failure.
Jul 12 2017, 2:35 PM · gpgme, Bug Report
aheinlein added a comment to T3270: No reasonable error codes on decryption failure.

I am using Debian 9 with the packaged versions. For gnupg this is 2.1.18.

Jul 12 2017, 1:31 PM · gpgme, Bug Report
werner added a comment to T3270: No reasonable error codes on decryption failure.

@aheinlein we need to know the gnupg version you are using with GPGME.

Jul 12 2017, 11:47 AM · gpgme, Bug Report

Jul 11 2017

wiz added a comment to T2919: fix gpgme/gpgsm pipe server session with use_descriptor_passing (was: mutt + gpgme problems with some Outlook S/MIME emails).

I've since tried neomutt-20170707 which includes stbuehler's patch, but I see the same error cases as before.

Jul 11 2017, 3:43 PM · gpgme, Bug Report
justus triaged T3270: No reasonable error codes on decryption failure as Normal priority.

This is not specific to Python, and it may not even be a bug in GPGME, but in gpg. Needs some more investigation.

Jul 11 2017, 12:34 PM · gpgme, Bug Report
justus triaged T3272: Make groups available through GPGME as Wishlist priority.
Jul 11 2017, 12:30 PM · gpgme, Feature Request
justus closed T3271: Expose recipients on decryption failure as Resolved.

Fixed in 1e68f93dc547ae75b921e43db35e3599de92e2cb.

Jul 11 2017, 12:30 PM · gpgme, Python, Bug Report
justus claimed T3271: Expose recipients on decryption failure.
Jul 11 2017, 10:37 AM · gpgme, Python, Bug Report
aheinlein created T3272: Make groups available through GPGME.
Jul 11 2017, 10:34 AM · gpgme, Feature Request
aheinlein created T3271: Expose recipients on decryption failure.
Jul 11 2017, 10:27 AM · gpgme, Python, Bug Report
aheinlein created T3270: No reasonable error codes on decryption failure.
Jul 11 2017, 10:24 AM · gpgme, Bug Report

Jul 10 2017

lovetox added a comment to T3263: GPGME: Python bindings dont work after build.

Thanks, LD_LIBRARY_PATH solved the problem

Jul 10 2017, 5:28 PM · Python, gpgme, Bug Report
justus closed T3263: GPGME: Python bindings dont work after build as Invalid.

This is a bug tracker, not a support forum.

Jul 10 2017, 4:47 PM · Python, gpgme, Bug Report
werner triaged T3263: GPGME: Python bindings dont work after build as Normal priority.
Jul 10 2017, 4:21 PM · Python, gpgme, Bug Report
werner assigned T3263: GPGME: Python bindings dont work after build to justus.
Jul 10 2017, 4:20 PM · Python, gpgme, Bug Report

Jul 8 2017

lovetox created T3263: GPGME: Python bindings dont work after build.
Jul 8 2017, 2:48 AM · Python, gpgme, Bug Report

Jul 5 2017

stbuehler added a comment to T2919: fix gpgme/gpgsm pipe server session with use_descriptor_passing (was: mutt + gpgme problems with some Outlook S/MIME emails).

Hi, I found a workaround for neomutt (see https://github.com/neomutt/neomutt/pull/662).

Jul 5 2017, 3:42 PM · gpgme, Bug Report

Jul 3 2017

marcus edited projects for T3147: Make a GPGME release, added: g10code Sprint; removed g10code Sprint (KW 26).
Jul 3 2017, 10:06 AM · gpgme (gpgme 1.23.x), g10code Sprint

Jun 27 2017

marcus edited projects for T3147: Make a GPGME release, added: g10code Sprint (KW 26); removed g10code Sprint (KW 25).
Jun 27 2017, 9:59 AM · gpgme (gpgme 1.23.x), g10code Sprint

Jun 21 2017

justus assigned T3214: gpgme fails to build with gcc 7 (std::bind, etc) to aheinecke.
Jun 21 2017, 10:45 AM · gpgme, Bug Report
justus triaged T3215: gpgme_op_import_keys() -- unclear documentation, problematic behavior as Normal priority.
Jun 21 2017, 10:44 AM · gpgme, Bug Report
dkg created T3215: gpgme_op_import_keys() -- unclear documentation, problematic behavior.
Jun 21 2017, 12:41 AM · gpgme, Bug Report

Jun 20 2017

dkg created T3214: gpgme fails to build with gcc 7 (std::bind, etc).
Jun 20 2017, 8:13 PM · gpgme, Bug Report

Jun 19 2017

marcus edited projects for T3147: Make a GPGME release, added: g10code Sprint (KW 25); removed g10code Sprint (KW 24).
Jun 19 2017, 12:46 PM · gpgme (gpgme 1.23.x), g10code Sprint

Jun 14 2017

marcus closed T924: Version of ltmain.sh in gpgme-1.1.6 is old and breaks on OS-X 10.5 as Spite.

Refile if problems with current versions.

Jun 14 2017, 6:57 PM · gpgme, Bug Report

Jun 12 2017

marcus edited projects for T3147: Make a GPGME release, added: g10code Sprint (KW 24); removed g10code Sprint (KW 23).
Jun 12 2017, 10:05 AM · gpgme (gpgme 1.23.x), g10code Sprint

Jun 8 2017

justus triaged T3056: gpgme-1.8.0: test failures on NetBSD as Normal priority.
Jun 8 2017, 2:59 PM · gpgme (gpgme 1.23.x), gpgagent, gnupg (gpg23)
justus closed T3059: Make information that a verifyresult / decrypt result was compliant to a compliance mode available through GPGME as Resolved.
Jun 8 2017, 2:24 PM · g10code Sprint (KW 22), gpgme, gnupg

Jun 7 2017

justus reopened T3059: Make information that a verifyresult / decrypt result was compliant to a compliance mode available through GPGME as "Open".

GnuPG needs to report compliance when decrypting symmetrically encrypted packet.

Jun 7 2017, 11:02 AM · g10code Sprint (KW 22), gpgme, gnupg

Jun 6 2017

marcus edited projects for T3147: Make a GPGME release, added: g10code Sprint (KW 23); removed g10code Sprint (KW 22).
Jun 6 2017, 10:16 AM · gpgme (gpgme 1.23.x), g10code Sprint

Jun 1 2017

justus closed T3059: Make information that a verifyresult / decrypt result was compliant to a compliance mode available through GPGME as Resolved.

Implemented in gpg, gpgsm, and gpgme with all bindings.

Jun 1 2017, 2:19 PM · g10code Sprint (KW 22), gpgme, gnupg
ilovezfs added a comment to T3181: GPGME's GpgmeppConfig.cmake uses .so not .dylib on macOS.

@aheinecke thanks! My apologies for not making that clear in the initial report.

Jun 1 2017, 11:27 AM · gpgme, Bug Report
aheinecke added a comment to T3181: GPGME's GpgmeppConfig.cmake uses .so not .dylib on macOS.

*facepalm* Ooops. I see. Thanks for the report. I'll fix it.

Jun 1 2017, 11:26 AM · gpgme, Bug Report
ilovezfs added a comment to T3181: GPGME's GpgmeppConfig.cmake uses .so not .dylib on macOS.

@aheinecke Yes, the issue is with INTERFACE_LINK_LIBRARIES not IMPORTED_LOCATION.

Jun 1 2017, 11:01 AM · gpgme, Bug Report
aheinecke added a comment to T3181: GPGME's GpgmeppConfig.cmake uses .so not .dylib on macOS.

Uhm I thought this was fixed with 2e661b9e1a9b50656a5c9646d7444a98477010c1 that should have been part of GPGME-1.9.0 are you sure that you are not seeing this with an older version?

Jun 1 2017, 10:49 AM · gpgme, Bug Report
justus assigned T3181: GPGME's GpgmeppConfig.cmake uses .so not .dylib on macOS to aheinecke.
Jun 1 2017, 10:44 AM · gpgme, Bug Report

May 31 2017

aheinecke added a comment to T3059: Make information that a verifyresult / decrypt result was compliant to a compliance mode available through GPGME.

Yes.

May 31 2017, 11:05 AM · g10code Sprint (KW 22), gpgme, gnupg
justus added a comment to T3059: Make information that a verifyresult / decrypt result was compliant to a compliance mode available through GPGME.

Reading that PDF I guess we need the same functionality in gpgsm too, right?

May 31 2017, 9:56 AM · g10code Sprint (KW 22), gpgme, gnupg

May 30 2017

justus added revisions to T3059: Make information that a verifyresult / decrypt result was compliant to a compliance mode available through GPGME: D430: Implement 'is_de_vs' for decryption results and signatures. xxx, D429: gpg: Report compliance with CO_DE_VS. xxx.
May 30 2017, 2:40 PM · g10code Sprint (KW 22), gpgme, gnupg
justus added a comment to T3059: Make information that a verifyresult / decrypt result was compliant to a compliance mode available through GPGME.
In T3059#98047, @werner wrote:

DSA is signature-only but VS-NfD is only about encryption. Thus signatures are out of scope.

May 30 2017, 1:48 PM · g10code Sprint (KW 22), gpgme, gnupg
werner added a comment to T3059: Make information that a verifyresult / decrypt result was compliant to a compliance mode available through GPGME.

DSA is signature-only but VS-NfD is only about encryption. Thus signatures are out of scope. Even key management is out of scope. OTOH, certain algorithms are simply not allowed. This means we can't use SHA-1 except for specified and approved usages (in our case OpenPGP fingerprints).

May 30 2017, 1:42 PM · g10code Sprint (KW 22), gpgme, gnupg
werner added a comment to T3059: Make information that a verifyresult / decrypt result was compliant to a compliance mode available through GPGME.

Yes. mark them as non-compliant.

May 30 2017, 1:38 PM · g10code Sprint (KW 22), gpgme, gnupg
justus added a comment to T3059: Make information that a verifyresult / decrypt result was compliant to a compliance mode available through GPGME.
In T3059#98039, @justus wrote:

Afaics the document does not specify the following. OpenPGP messages can carry multiple signatures, and the session key can be encrypted by multiple keys. I will implement the following logic:

  1. A verification operation is compliant if one of the signatures is compliant.
  2. A decryption operation is compliant if all of the algorithms used to encrypt the session keys are compliant.

Sounds exactly right to me.

May 30 2017, 12:52 PM · g10code Sprint (KW 22), gpgme, gnupg
aheinecke added a comment to T3059: Make information that a verifyresult / decrypt result was compliant to a compliance mode available through GPGME.
In T3059#98039, @justus wrote:

Afaics the document does not specify the following. OpenPGP messages can carry multiple signatures, and the session key can be encrypted by multiple keys. I will implement the following logic:

  1. A verification operation is compliant if one of the signatures is compliant.
  2. A decryption operation is compliant if all of the algorithms used to encrypt the session keys are compliant.
May 30 2017, 11:34 AM · g10code Sprint (KW 22), gpgme, gnupg
justus added a comment to T3059: Make information that a verifyresult / decrypt result was compliant to a compliance mode available through GPGME.

Afaics the document does not specify the following. OpenPGP messages can carry multiple signatures, and the session key can be encrypted by multiple keys. I will implement the following logic:

May 30 2017, 11:26 AM · g10code Sprint (KW 22), gpgme, gnupg
justus added a comment to T3059: Make information that a verifyresult / decrypt result was compliant to a compliance mode available through GPGME.
In T3059#98015, @werner wrote:

g10/misc.c:gnupg_pk_is_compliant is my take on puble key algorithms.

May 30 2017, 9:15 AM · g10code Sprint (KW 22), gpgme, gnupg

May 29 2017

werner added a comment to T3059: Make information that a verifyresult / decrypt result was compliant to a compliance mode available through GPGME.

See kerckhoffs:~wk/ST-Gpg4VSNfD-v0.6.pdf - eventually this will be published but right now we don't have clearance from the BSI to do that.

May 29 2017, 5:43 PM · g10code Sprint (KW 22), gpgme, gnupg
werner added a comment to T3059: Make information that a verifyresult / decrypt result was compliant to a compliance mode available through GPGME.

g10/misc.c:gnupg_pk_is_compliant is my take on puble key algorithms. For cipher algorithm, we will only allow AES* and digest SHA-2-*. Other details are in a document we have in an project internal wiki - I'll send you a copy.

May 29 2017, 5:38 PM · g10code Sprint (KW 22), gpgme, gnupg
justus added a comment to T3059: Make information that a verifyresult / decrypt result was compliant to a compliance mode available through GPGME.

Ok, good to know. However, I still need more information about what it means to comply with CO_DE_VS. Any pointers?

May 29 2017, 4:22 PM · g10code Sprint (KW 22), gpgme, gnupg
werner added a comment to T3059: Make information that a verifyresult / decrypt result was compliant to a compliance mode available through GPGME.

I thought about this but in the end it is unlikely that we will see request for other protection profiles. Thus I did spend a single bit on the German thing. Further, it is quite possible that a message matches several profiles and than bit fields come really handy. For the very limited circle of users a dedicated sub system for such things would be overkill.

May 29 2017, 4:05 PM · g10code Sprint (KW 22), gpgme, gnupg
justus added a comment to T3059: Make information that a verifyresult / decrypt result was compliant to a compliance mode available through GPGME.

The GPGME API uses field names like 'is_de_vs', but isn't that short-sighted because we hardcode names of compliance modes into the API? Also, 'vs' seems to match both 'VERSCHLUSSSACHE – VERTRAULICH' and 'VERSCHLUSSSACHE – NUR FÜR DEN DIENSTGEBRAUCH'.

May 29 2017, 4:01 PM · g10code Sprint (KW 22), gpgme, gnupg
justus added a project to T3059: Make information that a verifyresult / decrypt result was compliant to a compliance mode available through GPGME: g10code Sprint (KW 22).
May 29 2017, 12:44 PM · g10code Sprint (KW 22), gpgme, gnupg
justus added a comment to T3059: Make information that a verifyresult / decrypt result was compliant to a compliance mode available through GPGME.

I need more information about what it means to comply with CO_DE_VS. Any pointers?

May 29 2017, 12:42 PM · g10code Sprint (KW 22), gpgme, gnupg
justus claimed T3059: Make information that a verifyresult / decrypt result was compliant to a compliance mode available through GPGME.
May 29 2017, 10:49 AM · g10code Sprint (KW 22), gpgme, gnupg
marcus edited projects for T3147: Make a GPGME release, added: g10code Sprint (KW 22); removed g10code Sprint (KW 21).
May 29 2017, 10:16 AM · gpgme (gpgme 1.23.x), g10code Sprint

May 23 2017

justus closed T3008: GPGME: Unit test suite failure with gpg 2.0.24 as Resolved.

https://build.opensuse.org/package/live_build_log/openSUSE:Leap:42.3:Staging:A:DVD/gpgme/standard/x86_64 looks good. Closing this task.

May 23 2017, 2:40 PM · gpgme, Bug Report
marcus changed the status of T2426: gpgme - Inappropriate ioctl for device from Invalid to Resolved.
May 23 2017, 9:38 AM · Python, Fedora, Bug Report, gpgme
marcus renamed T2426: gpgme - Inappropriate ioctl for device from NATIONAL SECURITY. FEDERAL OFFENSE 12-20yrs FEDERAL PRISON to gpgme - Inappropriate ioctl for device.
May 23 2017, 9:38 AM · Python, Fedora, Bug Report, gpgme

May 22 2017

marcus edited projects for T3147: Make a GPGME release, added: g10code Sprint (KW 21); removed g10code Sprint (KW 20).
May 22 2017, 10:43 AM · gpgme (gpgme 1.23.x), g10code Sprint

May 15 2017

marcus edited projects for T3147: Make a GPGME release, added: g10code Sprint (KW 20); removed g10code Sprint (KW 19).
May 15 2017, 10:35 AM · gpgme (gpgme 1.23.x), g10code Sprint

May 11 2017

marcus edited projects for T3147: Make a GPGME release, added: g10code Sprint (KW 19); removed g10code Sprint (KW 18).
May 11 2017, 6:20 PM · gpgme (gpgme 1.23.x), g10code Sprint

May 10 2017

aheinecke abandoned D418: core: Don't split gpgconf strings on comma.

I've accidentally pushed this commit. But I'm very sure it's Ok anyway and pretty trivial. And it's been over a month to object. I really need this patch to get keygen working with default_pubkey_algo in kleopatra. It was also included in the last gpg4win betas.

May 10 2017, 10:34 AM · gpgme

May 9 2017

werner added a comment to T2820: GPGME: Allow to set the keyring for a context.

Well, this will be a different thing and more related to the to-be-implemented key origin feature.
I would thus suggest to open a new task for this.

May 9 2017, 9:07 AM · Won't Fix, gpgme, Feature Request
aheinecke added a comment to T2820: GPGME: Allow to set the keyring for a context.

I think we are talking "aneinander vorbei". AFAIK we agreed (on the Osnabrück meeting) that we will cater to this usecase: Multiple different keyrings for some operations. Or "curated" keyring. Through GPGK and so we will have some API (key probably not a keyring for a context) like this in GPGME at some point in the next years. This is why I think this issue might be kept open to say: Yes we see the usecase but we will not solve it by exposing, what you call a hack, through GPGME. But we will solve it at some point with a better solution.

May 9 2017, 9:05 AM · Won't Fix, gpgme, Feature Request

May 8 2017

werner closed T2820: GPGME: Allow to set the keyring for a context as Resolved.

Back to you original problem: What you are trying to do is a hack to work around properties of GnuPG. Namely, that GnuPG stores its state in a _directory_ and you are modifying parts of this state (e.g. pubring.gpg). This is why GPGME allows you to switch to another directory but obviously does not allow you to modify parts of a directory (i.e. the state).

May 8 2017, 7:20 PM · Won't Fix, gpgme, Feature Request
aheinecke added a comment to T2820: GPGME: Allow to set the keyring for a context.

FWIW I strongly disagree with the sentiment that GPGME should be a "dumbed down" "Easy" GnuPG API. It should be GnuPG made stable -> A stable and reliable C API for the Free Software OpenPGP implementation GnuPG. But this is off topic. SCNR. It's much easier just to use process calls in many cases but I understand why this should not be done and leads to maintenance problems / bugs.

May 8 2017, 5:39 PM · Won't Fix, gpgme, Feature Request
aheinecke reopened T2820: GPGME: Allow to set the keyring for a context as "Open".

As discussed: The proper solution for this is GPGK, a Pubkey deaemon for GnuPG that would cater to audited / monitored keyrings. The usecase has not gone away and from my talks with people in the community and my general experience it is not "special" and definitely not "very special". It's important for Software Developers using GPGME that want to have keyrings for their Software Seperate from the general GnuPG user setup.

May 8 2017, 5:35 PM · Won't Fix, gpgme, Feature Request
justus added a project to T3147: Make a GPGME release: g10code Sprint (KW 18).
May 8 2017, 3:36 PM · gpgme (gpgme 1.23.x), g10code Sprint
justus created T3147: Make a GPGME release.
May 8 2017, 3:35 PM · gpgme (gpgme 1.23.x), g10code Sprint
werner closed T2820: GPGME: Allow to set the keyring for a context as Resolved.

GPGME is about making GPG easy and not to cover very special use cases. I'll thus close this bug.

May 8 2017, 2:07 PM · Won't Fix, gpgme, Feature Request

May 5 2017

werner created T3137: Document API changes also in the GPGME manual.
May 5 2017, 12:16 PM · gpgme (gpgme 1.23.x), Documentation

Apr 28 2017

werner accepted D423: some spelling fixes (gpgme).

texinfo.texi has been source copied from the GNU repo and thus the typos are probably already fixed upstream. Anyway, I agree to fix them here; in particular because there are some discussion in the GNU project to move away from texinfo.

Apr 28 2017, 10:55 AM · gpgme

Apr 24 2017

aheinecke closed T3023: [PATCH] dn.cpp:170:46: error: format not a string literal and no format arguments [-Werror=format-security] as Resolved.

I accepted the patch so this ticket should have been resolved. Sorry.

Apr 24 2017, 5:55 PM · gpgme, Bug Report
aheinecke added a comment to D418: core: Don't split gpgconf strings on comma.

Ping. Is this patch ok? I'm pretty sure it is and I've included it in Gpg4win but before I can push the default_pubkey_algo respecting change to Kleopatra I need this to work in GPGME.

Apr 24 2017, 2:50 PM · gpgme

Apr 14 2017

wiz updated the task description for T2919: fix gpgme/gpgsm pipe server session with use_descriptor_passing (was: mutt + gpgme problems with some Outlook S/MIME emails).
Apr 14 2017, 10:31 AM · gpgme, Bug Report
wiz changed Version from 1.6.0 to 1.8.0 on T2919: fix gpgme/gpgsm pipe server session with use_descriptor_passing (was: mutt + gpgme problems with some Outlook S/MIME emails).
Apr 14 2017, 10:31 AM · gpgme, Bug Report
wiz added a comment to T2919: fix gpgme/gpgsm pipe server session with use_descriptor_passing (was: mutt + gpgme problems with some Outlook S/MIME emails).

I've updated to gpgme-1.8.0 and tried again.
I have one mail that I'll call "bad" which gives me in mutt:

Apr 14 2017, 10:31 AM · gpgme, Bug Report

Apr 11 2017

justus closed T3057: gpgme: add option to turn off python support as Resolved.

This works fine with GPGME 1.9.0 and master.

Apr 11 2017, 2:04 PM · gpgme

Apr 8 2017

ka7 retitled D423: some spelling fixes (gpgme) from some spelling fixes to some spelling fixes (gpgme).
Apr 8 2017, 8:21 PM · gpgme
ka7 created D423: some spelling fixes (gpgme).
Apr 8 2017, 6:23 PM · gpgme

Apr 5 2017

aheinecke updated the test plan for D418: core: Don't split gpgconf strings on comma.
Apr 5 2017, 6:40 PM · gpgme
aheinecke updated the diff for D418: core: Don't split gpgconf strings on comma.

Patch now fixes the problem in gpgme

Apr 5 2017, 6:26 PM · gpgme
werner requested changes to D418: core: Don't split gpgconf strings on comma.

I guess I should do this.

Apr 5 2017, 5:45 PM · gpgme
werner edited projects for D418: core: Don't split gpgconf strings on comma, added: gpgme; removed gnupg.
Apr 5 2017, 5:44 PM · gpgme
justus added a comment to T3057: gpgme: add option to turn off python support.

Ah right, that is bad...

Apr 5 2017, 12:37 PM · gpgme
wiz reopened T3057: gpgme: add option to turn off python support as "Open".
Apr 5 2017, 12:34 PM · gpgme
wiz added a comment to T3057: gpgme: add option to turn off python support.

I just tried this, but this doesn't disable the detection, and if that fails, the configure script stops:

checking for swig... /usr/pkg/bin/swig
checking for a Python interpreter with version >= 2.7... python2.7
checking for python2.7... /usr/pkg/bin/python2.7
checking for python2.7 version... 2.7
checking for python2.7 platform... netbsd7
checking for python2.7 script directory... ${prefix}/lib/python2.7/site-packages
checking for python2.7 extension module directory... ${exec_prefix}/lib/python2.7/site-packages
checking for python2.7... (cached) /usr/pkg/bin/python2.7
checking for a version of Python >= '2.1.0'... yes
checking for the distutils Python package... yes
checking for Python include path... -I/usr/pkg/include/python2.7
checking for Python library path... -L/usr/pkg/lib -lpython2.7
checking for Python site-packages path... /usr/pkg/lib/python2.7/site-packages
checking python extra libraries... -lutil -lm
checking python extra linking flags... -Wl,--export-dynamic
checking consistency of all components of python development environment... no
configure: WARNING:
  Could not link test program to Python. Maybe the main Python library has been
  installed in some non-standard library path. If so, pass it to configure,
  via the LDFLAGS environment variable.
  Example: ./configure LDFLAGS="-L/usr/non-standard-path/python/lib"
  ============================================================================
   You probably have to install the development version of the Python package
   for your distribution.  The exact name of this package varies among them.
  ============================================================================
Apr 5 2017, 12:34 PM · gpgme
justus closed T3057: gpgme: add option to turn off python support as Resolved.

Sure there is. Do ../configure --enable-languages= to build no bindings at all.

Apr 5 2017, 12:20 PM · gpgme
aheinecke added a parent task for T3059: Make information that a verifyresult / decrypt result was compliant to a compliance mode available through GPGME: T3058: Implement GUI for compliance mode.
Apr 5 2017, 12:09 PM · g10code Sprint (KW 22), gpgme, gnupg
aheinecke created T3059: Make information that a verifyresult / decrypt result was compliant to a compliance mode available through GPGME in the S1 Public space.
Apr 5 2017, 12:09 PM · g10code Sprint (KW 22), gpgme, gnupg
wiz created T3057: gpgme: add option to turn off python support in the S1 Public space.
Apr 5 2017, 11:30 AM · gpgme
wiz added a comment to T3056: gpgme-1.8.0: test failures on NetBSD.

Oh, to make it clear - I was testing the pkgsrc version with the additional patches used by pkgsrc, see http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/security/gpgme/patches/

Apr 5 2017, 11:20 AM · gpgme (gpgme 1.23.x), gpgagent, gnupg (gpg23)
wiz updated the task description for T3056: gpgme-1.8.0: test failures on NetBSD.
Apr 5 2017, 11:16 AM · gpgme (gpgme 1.23.x), gpgagent, gnupg (gpg23)
wiz created T3056: gpgme-1.8.0: test failures on NetBSD in the S1 Public space.
Apr 5 2017, 11:15 AM · gpgme (gpgme 1.23.x), gpgagent, gnupg (gpg23)

Apr 4 2017

kai removed a project from T2963: gpgme_op_revuid fails silently trying to revoke a non-existent uid: Duplicate.
Apr 4 2017, 3:02 PM · gpgme, Bug Report
marcus moved T2963: gpgme_op_revuid fails silently trying to revoke a non-existent uid from Backlog to Done on the Duplicate board.
Apr 4 2017, 2:52 PM · gpgme, Bug Report
marcus merged T2962: --quick-revoke-uid fails silently trying to revoke a non-existent uid into T2963: gpgme_op_revuid fails silently trying to revoke a non-existent uid.
Apr 4 2017, 2:51 PM · gpgme, Bug Report