Page MenuHome GnuPG
Feed Advanced Search

Jul 17 2019

dkg added a comment to T4632: Make it easier to cross-compile gpg-error.

Thanks for the feedback. I'll go ahead and close any tickets that come in via debian that expect to be able to cross compile without having at least once had a native compiler on the platform to generate the appropriate lock-obj-pub-*.h.

Jul 17 2019, 7:05 PM · gpgrt, Feature Request
werner closed T4632: Make it easier to cross-compile gpg-error as Wontfix.

In fact this specific scheme of indirect access to pthread objects is there to minimize dependencies of libgpg-error. It makes cross-compiling a bit harder but that is anyway the case because you need to check a lot of things for a new platform.

Jul 17 2019, 12:12 PM · gpgrt, Feature Request
werner triaged T4630: libgcrypt: POWER GHASH Vector Acceleration as Low priority.
Jul 17 2019, 12:07 PM · Feature Request, libgcrypt
werner triaged T4635: ship gpgscm and necessary *.scm files from gpgrt as Low priority.

It is on on my private todo list but thanks for opening a public issue for tracking.

Jul 17 2019, 12:02 PM · Tests, gpgrt, Feature Request
dkg created T4635: ship gpgscm and necessary *.scm files from gpgrt.
Jul 17 2019, 2:12 AM · Tests, gpgrt, Feature Request
dkg added a comment to T3389: canonical OpenPGP certificate export.

@stm it kind of is a last-resort already, given that it's only in the event where the signature creation dates are equal, but sure, i wouldn't mind adjusting the proposal to say that (sigs) means "sort by date, then issuer, then binary content" -- but what do we think "sort by issuer" means?

Jul 17 2019, 1:28 AM · gnupg, Feature Request

Jul 16 2019

dkg created T4632: Make it easier to cross-compile gpg-error.
Jul 16 2019, 11:18 PM · gpgrt, Feature Request
werner triaged T4529: libgcrypt: POWER AES Vector Acceleration as Normal priority.

Please do not change the priority back. That is a maintainer's task. I consider this along with adding replicas of issues to a bit rude.

Jul 16 2019, 8:33 AM · libgcrypt, Feature Request
werner triaged T4530: libgcrypt: POWER SHA-2 Vector Acceleration as Normal priority.

Please do not change the priority back without discussing this with the maintainer first. Thanks.

Jul 16 2019, 8:31 AM · libgcrypt, Feature Request
werner closed T4629: POWER AES Vector Acceleration as Spite.
Jul 16 2019, 8:27 AM · libgcrypt, Feature Request

Jul 15 2019

johnmar raised the priority of T4530: libgcrypt: POWER SHA-2 Vector Acceleration from Normal to Needs Triage.
Jul 15 2019, 9:09 PM · libgcrypt, Feature Request
johnmar raised the priority of T4529: libgcrypt: POWER AES Vector Acceleration from Normal to Needs Triage.
Jul 15 2019, 9:09 PM · libgcrypt, Feature Request
johnmar updated the task description for T4629: POWER AES Vector Acceleration.
Jul 15 2019, 8:45 PM · libgcrypt, Feature Request
johnmar created T4629: POWER AES Vector Acceleration.
Jul 15 2019, 8:38 PM · libgcrypt, Feature Request
dkg added a comment to T4607: enable `import-clean` by default.

Due to T4628, i no longer think that import-clean is a good idea by default.

Jul 15 2019, 7:29 PM · Feature Request

Jul 14 2019

ilf added a comment to T4605: automatically upgrade from `pubring.gpg` to `pubring.kbx`.

Maybe GnuPG could display a prompt if it detects a pubring.gpg and no pubring.kbx. Something like:

Jul 14 2019, 6:11 PM · gnupg24, gnupg (gpg23), Feature Request
aheinecke closed T4553: Compatibilty with encrypted mails sent to SecurePIM as Resolved.

It turned out to be a downstream issue and the change in message class was enough from our side.

Jul 14 2019, 11:15 AM · Feature Request, gpg4win, gpgol

Jul 10 2019

steve added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

We as GPGTools would also like to see this addition being integrated into GnuPG, since we do plan to switch to keys.openpgp.org in the near future, as we have long been hoping for a key server with better performance and among other things email verification. Without this change, revocations would not work as expected in combination with hagrid however. Preferably of course in the 2.2.X branch.

Jul 10 2019, 2:05 PM · gnupg (gpg23), Feature Request
gniibe claimed T4597: Support GCM modes for ntbtls..

I pushed my change as: rT7b2c4d9dd50b: Support GCM.
Please test.

Jul 10 2019, 4:51 AM · Restricted Project, Feature Request, ntbtls

Jul 8 2019

stm added a comment to T3389: canonical OpenPGP certificate export.

then they are sorted by their binary content.

Jul 8 2019, 9:46 PM · gnupg, Feature Request
jukivili added a revision to T4530: libgcrypt: POWER SHA-2 Vector Acceleration: D490: PowerPC optimized routines for AES and SHA2 using PowerISA 2.07 instructions..
Jul 8 2019, 2:57 PM · libgcrypt, Feature Request
jukivili added a revision to T4529: libgcrypt: POWER AES Vector Acceleration: D490: PowerPC optimized routines for AES and SHA2 using PowerISA 2.07 instructions..
Jul 8 2019, 2:57 PM · libgcrypt, Feature Request
jukivili added revisions to T4529: libgcrypt: POWER AES Vector Acceleration: D493: AES block modes for PPC, D494: rijndael/ppc: re-implement single-block mode, and implement OCB block cipher.
Jul 8 2019, 2:55 PM · libgcrypt, Feature Request
gniibe added a comment to T4158: UIF (User Interaction Flag) DO support.

No. I intentionally select: Not-backporting this feature.
The feature is added for Yubikey, in the specification.
Use of the feature by Data-Object is not that so useful.

Jul 8 2019, 9:21 AM · Restricted Project, Feature Request, scd, gnupg

Jul 5 2019

werner added a comment to T4607: enable `import-clean` by default.

That is a limit for the web key service to publish a certificate. IIRC, Debian developers do not use this but Debian creates the WKD from a database.

Jul 5 2019, 6:34 PM · Feature Request
dkg added a comment to T4607: enable `import-clean` by default.

This is especially relevant if you are not going to implement the fallback to import-clean that was proposed in T4591.

Jul 5 2019, 5:58 PM · Feature Request
dkg added a comment to T4607: enable `import-clean` by default.

I see that you have lowered the WKD limit to 64KiB with 6396f8d115f21ae15571b683e9ac9d1d7e3f44f4 -- i think this is a mistake, as reasonable certificates can be several times that size (e.g. zack's cleaned certificate, mentioned above). I'd prefer a limit of 256KiB.

Jul 5 2019, 5:56 PM · Feature Request
Valodim added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

and from my understanding they are sending the self-signatures anyway.

Jul 5 2019, 3:31 PM · gnupg (gpg23), Feature Request
dkg added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

This is not just about keys.openpgp.org. It's about any keystore that implements user id redaction, for whatever reason. When you say "what they can do is accept only user ids which…" i think you mean "the userid-redacting keystores can instead redistribute user ids which …". Is that right?

Jul 5 2019, 3:07 PM · gnupg (gpg23), Feature Request
werner added a comment to T4158: UIF (User Interaction Flag) DO support.

I think we should not backport this to 2.2 - okay?

Jul 5 2019, 11:14 AM · Restricted Project, Feature Request, scd, gnupg
werner lowered the priority of T4393: GnuPG should always accept key updates even if the update does not contain UIDs from Normal to Low.
Jul 5 2019, 8:02 AM · gnupg (gpg23), Feature Request
werner added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

Not sending the user id packet, is just a bad idea because that user id exists and from my understanding they are sending the self-signatures anyway. They should not try to argue with the GDPR here, that is privacy theater. The key itself is a personal data and due to technical reasons this data is required. What they can do is to accept only user ids which carry just only mail address and no comments or name. posteo.de for example requires this for years and the WKD drafts has a feature to support this.

Jul 5 2019, 7:58 AM · gnupg (gpg23), Feature Request
werner added a comment to T4607: enable `import-clean` by default.

You are right. I again mixed this up with gpg-wks-client. Over there we have a limit implemented unsing --max-output to avoid compression based attacks.

Jul 5 2019, 7:51 AM · Feature Request

Jul 4 2019

dkg added a comment to T4607: enable `import-clean` by default.

@werner, i don't think there is a 64K limit either, at least not in 2.2.16. Here is 2.2.16 with an empty homedir fetching Zack's certificate here which is > 97KiB:

Jul 4 2019, 11:02 PM · Feature Request
jaymzh added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

Just want to weigh in here to say this would be incredibly useful given the shift to the new keyserver model. See T4604 for more context.

Jul 4 2019, 10:33 PM · gnupg (gpg23), Feature Request
werner triaged T4605: automatically upgrade from `pubring.gpg` to `pubring.kbx` as Normal priority.
Jul 4 2019, 4:01 PM · gnupg24, gnupg (gpg23), Feature Request
werner closed T4607: enable `import-clean` by default as Resolved.
Jul 4 2019, 4:00 PM · Feature Request
werner added a parent task for T4607: enable `import-clean` by default: T4606: Release GnuPG 2.2.17.
Jul 4 2019, 3:47 PM · Feature Request
aheinecke created T4609: GpgOL: Add "Save decrypted copy".
Jul 4 2019, 9:18 AM · Feature Request, gpgol
werner added a comment to T4607: enable `import-clean` by default.

Well, I mixed this up. On sending a a new key to the server export-minimal is used. Receiving a key uses keep-uid=REQUESTED and a 64k limit.

Jul 4 2019, 8:51 AM · Feature Request

Jul 3 2019

wiktor-k added a comment to T4108: Support for verifying OpenPGP standalone and timestamp signatures.

I'm also interested in fine details especially w.r.t. interfacing with GnuPG. I've seen multiple timestamping standards starting from RFC3161, to blockchains or secure time protocols even (ab)using Certificate Transparency logs and ideas on how to append the signature (timestamp flag vs unhashed notations) so I'll be eager to hear the details on the ML @stm!

Jul 3 2019, 10:31 PM · gnupg24, gnupg (gpg23), Feature Request
dkg added a comment to T4607: enable `import-clean` by default.

in 2.2.16, anyway, gnupg does not appear to apply import-minimal for WKD.

Jul 3 2019, 9:10 PM · Feature Request
werner added a comment to T4108: Support for verifying OpenPGP standalone and timestamp signatures.

Indeed we are in urgent need for a timestamping service. I was already pondering with the idea to integrate existing X.509 stamping services into OpenPGP signatures. Please write to gnupg-devel if you want to reach a wider audience. Unfortunately I need to abstain for getting involved in your project; there are too many other things to do.

Jul 3 2019, 8:14 PM · gnupg24, gnupg (gpg23), Feature Request
werner added a comment to T4607: enable `import-clean` by default.

One reason is that you may want to look at older key- or self-signatures which import-clean removes. I can imgine use cases where this has been used for something. People are ofteh doing inetresting things with standard tools.

Jul 3 2019, 8:07 PM · Feature Request
stm added a comment to T4108: Support for verifying OpenPGP standalone and timestamp signatures.

Recently, I started a new project at savannah for developing free software and documentation in order to operate a Distributed OpenPGP Timestamping Service. Everyone is welcome to join.

Jul 3 2019, 7:55 PM · gnupg24, gnupg (gpg23), Feature Request
dkg added a comment to T4607: enable `import-clean` by default.

hm, i see your point. If you could spell out what the specific regression(s) in more detail, though, that might help us to reason about their impact.

Jul 3 2019, 6:52 PM · Feature Request
werner added a comment to T4607: enable `import-clean` by default.

I agree for keyserver imports. For all other imports this would be a severe regression and thus the wrong thing to do.

Jul 3 2019, 6:38 PM · Feature Request
dkg added a comment to T4605: automatically upgrade from `pubring.gpg` to `pubring.kbx`.

if you want to add a separate subcommand for that, i would be happy to abandon migrate-pubring-from-classic-gpg.

Jul 3 2019, 6:16 PM · gnupg24, gnupg (gpg23), Feature Request
dkg created T4607: enable `import-clean` by default.
Jul 3 2019, 6:05 PM · Feature Request
werner added a comment to T4605: automatically upgrade from `pubring.gpg` to `pubring.kbx`.

I somehow expected such a feature request ;-). However, I do not think that an automatic migration is is appropriate for the stable branch.

Jul 3 2019, 4:30 PM · gnupg24, gnupg (gpg23), Feature Request
dkg created T4605: automatically upgrade from `pubring.gpg` to `pubring.kbx`.
Jul 3 2019, 4:25 PM · gnupg24, gnupg (gpg23), Feature Request
historic_bruno added a comment to T4597: Support GCM modes for ntbtls..
Jul 3 2019, 2:22 PM · Restricted Project, Feature Request, ntbtls

Jul 2 2019

Valodim added a comment to T4597: Support GCM modes for ntbtls..

Done. Hopefully this works now :)

Jul 2 2019, 5:39 PM · Restricted Project, Feature Request, ntbtls
werner added a comment to T4597: Support GCM modes for ntbtls..

Anything using CBC mode - ECC is just fine.

Jul 2 2019, 4:19 PM · Restricted Project, Feature Request, ntbtls
Valodim added a comment to T4597: Support GCM modes for ntbtls..

Which is a bad idea because CBC is still a very common cipher mode.

Jul 2 2019, 4:02 PM · Restricted Project, Feature Request, ntbtls

Jul 1 2019

werner renamed T4597: Support GCM modes for ntbtls. from TLS handshake failed: Fatal alert message received (hkps://keys.openpgp.org, Windows, GPG4Win 3.1.9, NTBTLS 0.1.2) to Support GCM modes for ntbtls..
Jul 1 2019, 5:48 PM · Restricted Project, Feature Request, ntbtls
werner triaged T4597: Support GCM modes for ntbtls. as Normal priority.

They can't agree on a common ciphersuite. The reason is that the server does not support any CBC mode. Which is a bad idea because CBC is still a very common cipher mode.

Jul 1 2019, 5:46 PM · Restricted Project, Feature Request, ntbtls
werner added a comment to T3321: Make it possible to combine GpgMEpp and QGpgme with MSVC compiled binaries.

Okay, so the open task is to build gpgme with MSVC in a way that different libnames are used and that we can distribute them along our standard DLLs? Given the easy we can now ssh into Windows there won't be a need to Wine things.

Jul 1 2019, 3:38 PM · Feature Request, gpgme
aheinecke added a comment to T3321: Make it possible to combine GpgMEpp and QGpgme with MSVC compiled binaries.

One issue with this is that Qt Webengine (chrome) cannot be built with mingw. Fixing that would be a major project.

Jul 1 2019, 2:54 PM · Feature Request, gpgme
aheinecke added a comment to T3321: Make it possible to combine GpgMEpp and QGpgme with MSVC compiled binaries.

High priority and half a year no action....

Jul 1 2019, 2:48 PM · Feature Request, gpgme

Jun 28 2019

dkg added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

sorry to keep pinging this, but given the ongoing flooding attacks (e.g. T4591) and how SKS and similar keyservers are unable to safely transmit flooded certificates, i think this kind of fix is urgent if we expect gpg to be able to retrieve revocations safely. What's the status here?

Jun 28 2019, 10:05 AM · gnupg (gpg23), Feature Request

Jun 26 2019

wiktor-k added a comment to T4584: --quick-sign-key offers no way to override a current certification.

For the record in my original message I asked about adding self-signatures.

Jun 26 2019, 11:12 AM · Restricted Project, gnupg (gpg22), Feature Request
werner triaged T4584: --quick-sign-key offers no way to override a current certification as Normal priority.
Jun 26 2019, 7:53 AM · Restricted Project, gnupg (gpg22), Feature Request

Jun 25 2019

werner triaged T4580: Update the password checking algorithm as Low priority.
Jun 25 2019, 10:24 AM · gpgagent, Feature Request
equwal created T4580: Update the password checking algorithm.
Jun 25 2019, 2:44 AM · gpgagent, Feature Request

Jun 24 2019

Valodim added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

It's been a while, any word on this? I sent the DCO as requested. Are there any technical concerns left to address?

Jun 24 2019, 12:48 PM · gnupg (gpg23), Feature Request

Jun 21 2019

Valodim added a comment to T4493: Default to HKPS, not HKP.

A possible exception here is that .onion TLDs should stick with HKP by default

Jun 21 2019, 11:16 AM · dirmngr, Feature Request
werner triaged T4578: python3 gpg module should offer an "encrypt" function that takes an email.message.EmailMessage and returns a new one as Normal priority.
Jun 21 2019, 10:04 AM · gpgme, Python, Feature Request

Jun 19 2019

dkg added a comment to T4578: python3 gpg module should offer an "encrypt" function that takes an email.message.EmailMessage and returns a new one.

I note that "the best" seems like it might be a pretty subjective thing. The standard GnuPG framing asks about the validity of keys for the User ID in question. Perhaps the caller could indicate whether they want to require full validity for each key to make this key selection more strict.

Jun 19 2019, 7:22 PM · gpgme, Python, Feature Request
dkg added a comment to T4578: python3 gpg module should offer an "encrypt" function that takes an email.message.EmailMessage and returns a new one.

The function would do something like:

  • from msg, extract all e-mail addresses from to, cc, bcc fields
  • find "the best" keys that match these addresses, storing them in keylist
  • copy msg to tmp, remove bcc header from tmp
  • wrap armored output of gpg.Context.encrypt(bytes(tmp), recipients=keylist) in the necessary RFC 3156 cladding, copying most headers from msg (maybe stubbing out the subject), producing an email.message.EmailMessage object.
Jun 19 2019, 7:19 PM · gpgme, Python, Feature Request
dkg created T4578: python3 gpg module should offer an "encrypt" function that takes an email.message.EmailMessage and returns a new one.
Jun 19 2019, 6:59 PM · gpgme, Python, Feature Request

Jun 18 2019

dkg added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

we now have a DCO from @Valodim

Jun 18 2019, 2:05 PM · gnupg (gpg23), Feature Request

Jun 16 2019

dkg added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

@werner, My usual approach for private branches is to prefix with dkg/, but (a) playfair rejects branch names with a /, and (b) i'm not the author of these patches, and i didn't want to claim credit that doesn't belong to me.

Jun 16 2019, 5:40 PM · gnupg (gpg23), Feature Request

Jun 14 2019

werner added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

Please use a private branch as usual. There has been no agreement or a discussion over this change nor do we have a DCO from him.

Jun 14 2019, 6:10 PM · gnupg (gpg23), Feature Request
dkg added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

I've pushed @Valodim's proposed patches to the fix-4393 branch in our git repo. they look good to me, and i think they should be merged to master.

Jun 14 2019, 6:08 PM · gnupg (gpg23), Feature Request

Jun 6 2019

werner added a comment to T4544: More prompts before key deletion.

Nope

Jun 6 2019, 7:39 AM · gnupg, Feature Request, patch
matheusmoreira renamed T4544: More prompts before key deletion from Key deletion: more prompts, new commands to More prompts before key deletion.
Jun 6 2019, 5:39 AM · gnupg, Feature Request, patch
matheusmoreira reopened T4544: More prompts before key deletion as "Open".

Here are the patches without any new commands:

Jun 6 2019, 3:58 AM · gnupg, Feature Request, patch
matheusmoreira added a comment to T4544: More prompts before key deletion.

@werner Only patches 2 and 3 introduce new commands. What do you think about the other changes?

Jun 6 2019, 3:20 AM · gnupg, Feature Request, patch

Jun 5 2019

werner closed T4544: More prompts before key deletion as Wontfix.

In case I not already mentioned it: There won't be any new commands to delete a key. Of course you are free to change GnuPG as you like but I won't apply them here.

Jun 5 2019, 6:18 PM · gnupg, Feature Request, patch
matheusmoreira changed Version from 2.2.15 to 2.2.16 on T4544: More prompts before key deletion.
Jun 5 2019, 11:53 AM · gnupg, Feature Request, patch

Jun 4 2019

aheinecke changed the status of T4553: Compatibilty with encrypted mails sent to SecurePIM from Testing to Open.

The change in message class did not help.

Jun 4 2019, 1:34 PM · Feature Request, gpg4win, gpgol
aheinecke changed the status of T4479: GpgOL: S/MIME Addressbook integration from Open to Testing.
Jun 4 2019, 11:00 AM · gpg4win, Feature Request, gpgol
aheinecke added a subtask for T4479: GpgOL: S/MIME Addressbook integration: T4389: Gpg4win 3.1.8.
Jun 4 2019, 11:00 AM · gpg4win, Feature Request, gpgol
aheinecke changed the status of T4388: GpgOL: Add draft encryption as an option. from Open to Testing.
Jun 4 2019, 10:41 AM · Feature Request, gpg4win, gpgol
werner reopened T3383: scdaemon option 'card-timeout' does not have any effect, a subtask of T3362: Prevent Smartcard from caching PIN when cache-ttl is set accordingly, as Open.
Jun 4 2019, 7:45 AM · Feature Request
gniibe claimed T3950: gnupg-2.2.6 fails to find correct library config programs when cross-compiling for ARM.
Jun 4 2019, 4:41 AM · Feature Request
gniibe closed T3383: scdaemon option 'card-timeout' does not have any effect, a subtask of T3362: Prevent Smartcard from caching PIN when cache-ttl is set accordingly, as Resolved.
Jun 4 2019, 3:01 AM · Feature Request
gniibe closed T3119: gpg: Improve public key decryption, a subtask of T2291: Smartcard interaction improvement (was: Shadowed private key design (for smartcard)), as Resolved.
Jun 4 2019, 2:34 AM · Restricted Project, Feature Request, gnupg
gniibe closed T1854: Problems with same encryption and signing key on smartcard as Resolved.

While it's not recommended, current master has a support of sharing same raw key materials. I think that it now works (I don't try, though).
Closing.

Jun 4 2019, 2:33 AM · gnupg, Feature Request, scd

Jun 3 2019

aheinecke added a subtask for T4553: Compatibilty with encrypted mails sent to SecurePIM: T4389: Gpg4win 3.1.8.
Jun 3 2019, 3:28 PM · Feature Request, gpg4win, gpgol
aheinecke created T4553: Compatibilty with encrypted mails sent to SecurePIM.
Jun 3 2019, 3:24 PM · Feature Request, gpg4win, gpgol
aheinecke added a subtask for T4552: Compatibility with mails sent from SecurePIM: T4389: Gpg4win 3.1.8.
Jun 3 2019, 3:19 PM · Feature Request, gpg4win, gpgol
aheinecke created T4552: Compatibility with mails sent from SecurePIM.
Jun 3 2019, 3:18 PM · Feature Request, gpg4win, gpgol

Jun 1 2019

ametzler1 added a comment to T4487: libksba: please refresh ASN.1 components from more recent RFCs with BSD licensing.

gniibe wrote:

Jun 1 2019, 6:09 PM · libksba, Feature Request

May 31 2019

gniibe added a comment to T4487: libksba: please refresh ASN.1 components from more recent RFCs with BSD licensing.

RFC 5280 only addresses about BCP78 and not about TLP, while RFC 5652, RFC 5755, RFC 5911 and RFC 5912 address explicitly about TLP. In this situation, I wonder if it's better to take the definitions of Extensions, UniqueIdentifier, and GeneralNames from RFC 5280. To be conservative, I don't include them now.

May 31 2019, 7:32 AM · libksba, Feature Request
gniibe added a comment to T4487: libksba: please refresh ASN.1 components from more recent RFCs with BSD licensing.

I pushed more changes to include modules in RFC 5911 and RFC 5912.

May 31 2019, 5:50 AM · libksba, Feature Request
gniibe added a comment to T4487: libksba: please refresh ASN.1 components from more recent RFCs with BSD licensing.

Comparing old cms.asn and new cms.asn, now I understand how RFC 3370 matters. I added those things back from RFC 5911 (which cites RFC 3370) which comes with BSD license for code.

May 31 2019, 4:52 AM · libksba, Feature Request

May 30 2019

dkg added a comment to T4487: libksba: please refresh ASN.1 components from more recent RFCs with BSD licensing.

@gniibe thank you!

May 30 2019, 10:53 PM · libksba, Feature Request
gniibe added a comment to T4487: libksba: please refresh ASN.1 components from more recent RFCs with BSD licensing.

I did some work (since Debian is important for us).
Please have a look at my topic branch: gniibe/fix-4487
or:
https://dev.gnupg.org/source/libksba/history/gniibe%252Ffix-4487/
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=shortlog;h=refs/heads/gniibe/fix-4487

May 30 2019, 10:18 AM · libksba, Feature Request