Page MenuHome GnuPG
Feed Advanced Search

Mar 17 2020

gniibe closed T4880: npth: Add functions to wake up condition variable, a subtask of T4864: New scdaemon command to watch device removal, as Invalid.
Mar 17 2020, 2:59 AM · Restricted Project, Feature Request, scd, Bug Report
gniibe closed T4880: npth: Add functions to wake up condition variable as Invalid.

It is my confusion. The API is available. I only looked for symbols in the library.
It is #define-d macro to pthread_cond_*.

Mar 17 2020, 2:59 AM · Feature Request, npth
gniibe added a comment to T4880: npth: Add functions to wake up condition variable.

For Windows, it is available. I don't know the reason why it has not been available for POSIX.

Mar 17 2020, 1:51 AM · Feature Request, npth

Mar 16 2020

gniibe added a subtask for T4864: New scdaemon command to watch device removal: T4880: npth: Add functions to wake up condition variable.
Mar 16 2020, 6:03 AM · Restricted Project, Feature Request, scd, Bug Report
gniibe added a parent task for T4880: npth: Add functions to wake up condition variable: T4864: New scdaemon command to watch device removal.
Mar 16 2020, 6:03 AM · Feature Request, npth
gniibe created T4880: npth: Add functions to wake up condition variable.
Mar 16 2020, 6:02 AM · Feature Request, npth

Mar 14 2020

werner added a comment to T4856: GPG: Key Exchange Put public OpenPGP key into signature.

I think that this chnage is useful enough to be backported to 2.2. Done that.

Mar 14 2020, 8:14 PM · Feature Request, gpgol, Keyserver, gnupg

Mar 13 2020

werner changed the status of T4856: GPG: Key Exchange Put public OpenPGP key into signature from Open to Testing.
Mar 13 2020, 5:29 PM · Feature Request, gpgol, Keyserver, gnupg
werner added a comment to T4856: GPG: Key Exchange Put public OpenPGP key into signature.

You can test it now out using GnuPG master: Just add --include-key-block and you can then verify using an empty keyring. Currently --auto-key-retrieve is not needed but we need to think on how we can enable or disable this during verification.

Mar 13 2020, 5:28 PM · Feature Request, gpgol, Keyserver, gnupg
werner added a comment to T4872: Support opaque MPI with gcry_mpi_print.

I am not sure whether this is related but when using Libgcrypt master and verifying a signature created with an ed25519 key, I get the error below with valgrind. Both with 2.2. current and 2.3. It does not happen with the current Libgcrypt 1.8.

Mar 13 2020, 5:25 PM · Restricted Project, Feature Request, libgcrypt
werner added a project to T4856: GPG: Key Exchange Put public OpenPGP key into signature: Feature Request.
Mar 13 2020, 1:17 PM · Feature Request, gpgol, Keyserver, gnupg

Mar 12 2020

dkg added a comment to T4878: gpgsm's default for include-certs should include the signing cert if it is self-signed.

For reference, here's an error message from openssl smime when it is trying to verify an e-mail message with no embedded certificate at all (despite it knowing about the relevant certificate):

Mar 12 2020, 2:01 PM · gnupg24, gnupg (gpg23), S/MIME, Feature Request
werner changed the status of T4788: System wide configuration of the GnuPG system from Open to Testing.

There are likely some bugs in the new code and I also want to do some improvements; see rGb4f1159a5bd7. But things should basically work as before and thus I set this again to testing

Mar 12 2020, 10:36 AM · gnupg (gpg23), Feature Request, gpg4win, g10code
werner triaged T4873: Enable AES GCM in FIPS mode as Low priority.
Mar 12 2020, 9:59 AM · FIPS, libgcrypt, Feature Request
werner triaged T4878: gpgsm's default for include-certs should include the signing cert if it is self-signed as Low priority.
Mar 12 2020, 9:59 AM · gnupg24, gnupg (gpg23), S/MIME, Feature Request
dkg created T4878: gpgsm's default for include-certs should include the signing cert if it is self-signed.
Mar 12 2020, 7:51 AM · gnupg24, gnupg (gpg23), S/MIME, Feature Request
gniibe changed the status of T4597: Support GCM modes for ntbtls. from Open to Testing.
Mar 12 2020, 6:33 AM · Restricted Project, Feature Request, ntbtls
gniibe changed the status of T4641: Libassuan: enable the environment to set compiler and linker flags for helper tools from Open to Testing.
Mar 12 2020, 6:32 AM · Restricted Project, libassuan, Feature Request
gniibe changed the status of T4673: 2.3-only: Don't fallback to PC/SC on failure by the internal CCID driver, only use PC/SC when --disable-ccid is specified from Open to Testing.
Mar 12 2020, 6:31 AM · gnupg (gpg23), Restricted Project, scd, Feature Request

Mar 11 2020

gniibe changed the status of T4872: Support opaque MPI with gcry_mpi_print from Open to Testing.

Fixed in master.

Mar 11 2020, 8:13 AM · Restricted Project, Feature Request, libgcrypt
gniibe added a comment to T4872: Support opaque MPI with gcry_mpi_print.

A program like tests/t-mpi-point assumes gcry_mpi_print can do that.
We have a sort of regression with --debug option with t-mpi-point, the point q is not printed out correctly.

Mar 11 2020, 8:12 AM · Restricted Project, Feature Request, libgcrypt
gniibe added a project to T4872: Support opaque MPI with gcry_mpi_print: Feature Request.
Mar 11 2020, 8:10 AM · Restricted Project, Feature Request, libgcrypt

Mar 10 2020

werner added a comment to T4873: Enable AES GCM in FIPS mode.

This requires re-evaluation of Libgcrypt to match the current FIPS specs.

Mar 10 2020, 4:13 PM · FIPS, libgcrypt, Feature Request
pmgdeb created T4873: Enable AES GCM in FIPS mode.
Mar 10 2020, 11:31 AM · FIPS, libgcrypt, Feature Request

Mar 5 2020

werner added a comment to T4863: Yubikey 5Ci for iPhone.

Okay, I recall that I have seen these Yubikeys. Can you tell me which GPG app you intended to use? I am not aware of any GnuPG ports to the iPhone.

Mar 5 2020, 10:10 AM · yubikey, Feature Request

Mar 4 2020

JW-D added a comment to T4863: Yubikey 5Ci for iPhone.

The new Yubikey 5Ci does NOT work with NFC, this is wrong. This Yubikey is delivered with two connectors: A lightning and an USB-C, see: https://www.mtrix.de/shop/yubikey-5ci/. The key can be connected to a laptop and an iPhone by plug-in. So the new Yubikey 5Ci does not require NFC at all. You refer to the Yubikey 5 NFC. This technology is not supported by developers because they do not have experiences there. With the plug and play functionality of a lightning connector it is easier and few application already exist (e.g. Yubico authenticator and several password manager in the professional edition). Hope this information will be useful for you.

Mar 4 2020, 7:04 PM · yubikey, Feature Request
werner triaged T4863: Yubikey 5Ci for iPhone as Normal priority.
Mar 4 2020, 9:17 AM · yubikey, Feature Request
werner added a comment to T4863: Yubikey 5Ci for iPhone.

Supporting NFC tokens requires implementing secure messaging for cards. This is on our todo list anyway but has had no priority. I have a couple of Yubikeys but not done any work on NFC.

Mar 4 2020, 9:17 AM · yubikey, Feature Request

Mar 3 2020

gniibe triaged T4864: New scdaemon command to watch device removal as Normal priority.
Mar 3 2020, 8:26 AM · Restricted Project, Feature Request, scd, Bug Report
gniibe claimed T4864: New scdaemon command to watch device removal.
Mar 3 2020, 8:26 AM · Restricted Project, Feature Request, scd, Bug Report

Mar 1 2020

JW-D created T4863: Yubikey 5Ci for iPhone.
Mar 1 2020, 5:17 PM · yubikey, Feature Request

Feb 28 2020

dkg added a comment to T4788: System wide configuration of the GnuPG system.

i'd be unlikely to ship anything as /etc/gnupg/gpg.conf or /etc/gnupg/dirmngr.conf just because of the mess that admins have to deal with when shipped config files change.

Feb 28 2020, 11:20 PM · gnupg (gpg23), Feature Request, gpg4win, g10code
werner changed the status of T4788: System wide configuration of the GnuPG system from Testing to Open.

Arggh, gpgconf uses its own option parser so adding the global config file there will require some extra work.

Feb 28 2020, 2:40 PM · gnupg (gpg23), Feature Request, gpg4win, g10code
aheinecke updated subscribers of T4788: System wide configuration of the GnuPG system.

@dkg You might find this interesting. Debian could do stuff in /etc/gnupg/gpg.conf or /etc/gnupg/dirmngr.conf without patching GnuPG to change some defaults.

Feb 28 2020, 11:31 AM · gnupg (gpg23), Feature Request, gpg4win, g10code

Feb 27 2020

werner changed the status of T4788: System wide configuration of the GnuPG system from Open to Testing.

All done in master with the latest libgpg-error (see T4859). There is always a global configure file in /etc/gnupg (or whatever "gpgconf --list-dirs sysconfdir" prints). The name of the configure file is the same as the user config file (gpg.conf, gpgsm.conf, gpg-agent.conf, ...) but for gpg.conf no versioned config names are used.

Feb 27 2020, 2:58 PM · gnupg (gpg23), Feature Request, gpg4win, g10code
werner triaged T4855: The trusted-key option requires a long key ID and won't take a fingerprint as Normal priority.

Internally only the long key id is is used thus the fingerprint might give a wrong impression. OTOH, to allow easy migration to future versions, extracting the keyid from the fingerprint is a good idea.

Feb 27 2020, 10:14 AM · gnupg (gpg22), Feature Request

Feb 26 2020

aheinecke added a comment to T4513: dirmngr should try the configured keyservers anyway even if they are all dead.

But searching on Keyservers is also in my opinion not a common use case for Kleopatra users.

Thanks for engaging constructively.

Feb 26 2020, 12:03 PM · Feature Request, Keyserver, dirmngr

Feb 21 2020

werner added a comment to T4788: System wide configuration of the GnuPG system.

Okay, we now have global conf files in master. The extra flags to ignore or force certain options will be added to libgpg-error.

Feb 21 2020, 9:50 PM · gnupg (gpg23), Feature Request, gpg4win, g10code
dkg added a comment to T4513: dirmngr should try the configured keyservers anyway even if they are all dead.

In T4513#132770, @aheinecke wrote:

Werner could you maybe at least check for an internet connection, I don't know how to do it on Linux but on Windows it's easy because windows has API for that.

Feb 21 2020, 6:33 PM · Feature Request, Keyserver, dirmngr

Feb 19 2020

Valodim added a comment to T4513: dirmngr should try the configured keyservers anyway even if they are all dead.

But searching on Keyservers is also in my opinion not a common use case for Kleopatra users.

Feb 19 2020, 6:43 PM · Feature Request, Keyserver, dirmngr
werner added a comment to T4513: dirmngr should try the configured keyservers anyway even if they are all dead.

and by that bypassing all key source tracking as done by gpg. In any case searching by name or mail address on a keyserver should not be done - at least not by a GUI tool as used by non experienced users.

Feb 19 2020, 4:34 PM · Feature Request, Keyserver, dirmngr
patrick added a comment to T4513: dirmngr should try the configured keyservers anyway even if they are all dead.

I agree that this is a tricky problem, but it should really be improved.

Feb 19 2020, 4:05 PM · Feature Request, Keyserver, dirmngr
werner added a comment to T4513: dirmngr should try the configured keyservers anyway even if they are all dead.

The problem is not to check whether there is a connection but on how to decide whether something is a pool or an explictly added single keyserver and how often should we try to connect or read from it. Without marking hosts as dead the auto search features won't work well.

Feb 19 2020, 1:30 PM · Feature Request, Keyserver, dirmngr
aheinecke added a comment to T4513: dirmngr should try the configured keyservers anyway even if they are all dead.

@Valodim probably not so much as dirmngr might behave differently and not mark hosts as dead.

Feb 19 2020, 1:17 PM · Feature Request, Keyserver, dirmngr
werner added a comment to T4513: dirmngr should try the configured keyservers anyway even if they are all dead.

The proper solution is of course to use pkill instead of killall. SCNR.

Feb 19 2020, 12:43 PM · Feature Request, Keyserver, dirmngr
Valodim updated subscribers of T4513: dirmngr should try the configured keyservers anyway even if they are all dead.

I can attest to the "growing bit of popular lore": Roughly half the support requests I get to support@keys.openpgp.org boil down to an exchange of "it just doesn't work with a 'general error' message" -> "try killall dirmngr" -> "that did it". I have heard similar stories from @patrick from Enigmail users, and more than once heard people applying poweruser trickery like "I just have killall dirmngr in my resume.d".

Feb 19 2020, 11:37 AM · Feature Request, Keyserver, dirmngr

Feb 7 2020

werner closed T4539: libgpg-error on Windows: strerror_s can be used instead of strerror_r as Resolved.
Feb 7 2020, 1:49 PM · gpgrt, Feature Request
werner closed T4643: gpgrt: enable the environment to set compiler and linker flags for helper tools as Resolved.
Feb 7 2020, 1:48 PM · gpgrt, Feature Request
werner closed T4772: Release libgpg-error 1.37, a subtask of T4539: libgpg-error on Windows: strerror_s can be used instead of strerror_r, as Resolved.
Feb 7 2020, 1:47 PM · gpgrt, Feature Request

Feb 3 2020

Joey_D added a comment to T4699: X.509 certificate request more comfortable.

Hi Andre, did you already get anywhere with this task? Thanks a lot in advance, Joachim

Feb 3 2020, 9:22 PM · Restricted Project, kleopatra, S/MIME, gpg4win, Feature Request

Jan 21 2020

slandden added a comment to T4630: libgcrypt: POWER GHASH Vector Acceleration.

Yes, I need to optimize it.

Jan 21 2020, 9:31 PM · Feature Request, libgcrypt
johnmar added a comment to T4630: libgcrypt: POWER GHASH Vector Acceleration.

Hi @slandden. Have you made any progress since the last time I asked?

Jan 21 2020, 9:16 PM · Feature Request, libgcrypt

Jan 17 2020

james added a comment to T4807: Mime Compatibility with Symantec PGP.

It can force it on the outbound. https://support.symantec.com/us/en/article.tech164655.html
It also allow SIMME pass-through. https://support.symantec.com/us/en/article.tech166867.html

Jan 17 2020, 6:12 PM · gpgol, Feature Request
gniibe changed the status of T3416: gpg should select available signing key on card (even with -u option), a subtask of T2291: Smartcard interaction improvement (was: Shadowed private key design (for smartcard)), from Open to Testing.
Jan 17 2020, 8:12 AM · Restricted Project, gnupg, Feature Request
gniibe changed the status of T3416: gpg should select available signing key on card (even with -u option) from Open to Testing.

Implemented in master.

Jan 17 2020, 8:12 AM · Restricted Project, Feature Request, gnupg

Jan 16 2020

werner added a comment to T2291: Smartcard interaction improvement (was: Shadowed private key design (for smartcard)).

BTW, I just pushed some new features to maste for the gpg-card tool. You can now do

Jan 16 2020, 9:37 PM · Restricted Project, gnupg, Feature Request
aheinecke added a comment to T4807: Mime Compatibility with Symantec PGP.

Is this about any special version of Symantec? As far as I knew Symantec Endpoint Security Desktop (or whatever they call it nowadays) supports reading PGP/MIME and even sending it if forced.

Jan 16 2020, 1:32 PM · gpgol, Feature Request
gniibe raised the priority of T3416: gpg should select available signing key on card (even with -u option) from Normal to High.
Jan 16 2020, 5:43 AM · Restricted Project, Feature Request, gnupg
gniibe added a comment to T3416: gpg should select available signing key on card (even with -u option).

With new "KEYINFO" command of scdaemon, finally, we can move on to support better selection of signing key.
(Note: having a private key on multiple cards had already been solved in T4301: Handling multiple subkeys on two SmartCards.)

Jan 16 2020, 5:40 AM · Restricted Project, Feature Request, gnupg
gniibe added a project to T2291: Smartcard interaction improvement (was: Shadowed private key design (for smartcard)): Restricted Project.
Jan 16 2020, 5:29 AM · Restricted Project, gnupg, Feature Request
gniibe changed the status of T2291: Smartcard interaction improvement (was: Shadowed private key design (for smartcard)) from Open to Testing.

In master, it has been implemented.

Jan 16 2020, 5:29 AM · Restricted Project, gnupg, Feature Request
gniibe changed the status of T4695: Remove SERIALNO as an identifier to select keys, a subtask of T2291: Smartcard interaction improvement (was: Shadowed private key design (for smartcard)), from Open to Testing.
Jan 16 2020, 5:25 AM · Restricted Project, gnupg, Feature Request
gniibe changed the status of T4695: Remove SERIALNO as an identifier to select keys from Open to Testing.
Jan 16 2020, 5:25 AM · Restricted Project, Feature Request, gnupg
gniibe added a comment to T4695: Remove SERIALNO as an identifier to select keys.

The first "SCD SERIALNO" command let scdaemon re-scan smartcards/tokens.

Jan 16 2020, 5:24 AM · Restricted Project, Feature Request, gnupg
gniibe added a comment to T4695: Remove SERIALNO as an identifier to select keys.

With new "KEYINFO" command in scdaemon, a list of card keys can be retrieved by:

Jan 16 2020, 5:22 AM · Restricted Project, Feature Request, gnupg
gniibe closed T4784: Remove referring a key by $AUTHKEYID, $ENCRKEYID, and $SIGNKEYID as Resolved.
Jan 16 2020, 5:17 AM · scd, Feature Request, gnupg
gniibe closed T4784: Remove referring a key by $AUTHKEYID, $ENCRKEYID, and $SIGNKEYID, a subtask of T4695: Remove SERIALNO as an identifier to select keys, as Resolved.
Jan 16 2020, 5:17 AM · Restricted Project, Feature Request, gnupg
gniibe added a comment to T4784: Remove referring a key by $AUTHKEYID, $ENCRKEYID, and $SIGNKEYID.

There is no use cases for $SIGNKEYID.

Jan 16 2020, 5:16 AM · scd, Feature Request, gnupg
gniibe added a comment to T4784: Remove referring a key by $AUTHKEYID, $ENCRKEYID, and $SIGNKEYID.

$ENCRKEYID use case have been removed.

Jan 16 2020, 5:14 AM · scd, Feature Request, gnupg

Jan 14 2020

james added a comment to T4807: Mime Compatibility with Symantec PGP.

The base64 for the version is not needed. I rebuilt and did a test for that. I was testing with Outlook 2016 to Outlook.com to another exchange server. One of the servers in the chain is converting the mime parts to base64.
The MAPI headers in gpgol are causing the auto-decryption of Symantec to stop checking for the MIME attachments. On internal emails the MAPI format is retained and that causes an issue with the symantec client. When they leave the exchange server the base MIME format is what is sent and that works with the Symantec client.

Jan 14 2020, 5:50 PM · gpgol, Feature Request

Jan 13 2020

werner added a comment to T4807: Mime Compatibility with Symantec PGP.

Using base64 encoding for a fixed format part in us-ascii is not a good idea because in practise many PGP/MIME decoders won't be able to detect and then decyrypt such a message.

Jan 13 2020, 9:14 AM · gpgol, Feature Request
gniibe added a comment to T4784: Remove referring a key by $AUTHKEYID, $ENCRKEYID, and $SIGNKEYID.

$AUTHKEYID use cases have been removed.

Jan 13 2020, 8:53 AM · scd, Feature Request, gnupg

Jan 12 2020

james created T4807: Mime Compatibility with Symantec PGP.
Jan 12 2020, 5:28 AM · gpgol, Feature Request

Jan 10 2020

whites11 added a comment to T1756: gpg-agent doesn't accept ssh certificates.

I am wondering if there is any workaround or work in progress about this old ticket.
I understand this is kind of an edge case, but having the possibility to use signed ssh keys would be very useful to me.

Jan 10 2020, 2:37 PM · gnupg, Feature Request

Jan 9 2020

werner created T4803: Print a diagnostic for a missing encryption subkey.
Jan 9 2020, 2:34 PM · Feature Request, OpenPGP, gnupg

Jan 4 2020

neg3ntropy added a comment to T169: Add a way to generate keypairs from a passphrase.

As a user I think that this capability would be a great addition to PGP and it might even make it a standard tool for key generation across cryptocurrencies.

Jan 4 2020, 9:59 PM · gnupg, Feature Request

Dec 23 2019

werner added a parent task for T4694: manage first-party attestations: T4795: GUI to manage first party attestations.
Dec 23 2019, 11:23 AM · Keyserver, Feature Request
werner added a subtask for T4795: GUI to manage first party attestations: T4694: manage first-party attestations.
Dec 23 2019, 11:23 AM · OpenPGP, Feature Request
werner created T4795: GUI to manage first party attestations.
Dec 23 2019, 11:22 AM · OpenPGP, Feature Request
werner added a parent task for T2291: Smartcard interaction improvement (was: Shadowed private key design (for smartcard)): Restricted Maniphest Task.
Dec 23 2019, 11:03 AM · Restricted Project, Feature Request, gnupg
werner removed a subtask for T4695: Remove SERIALNO as an identifier to select keys: Restricted Maniphest Task.
Dec 23 2019, 11:02 AM · Restricted Project, Feature Request, gnupg
werner added a parent task for T4694: manage first-party attestations: Restricted Maniphest Task.
Dec 23 2019, 10:58 AM · Keyserver, Feature Request

Dec 20 2019

dkg added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

It has now been over 6 months since the patches were available to fix this problem and they have not been adopted upstream.

Dec 20 2019, 6:56 PM · gnupg (gpg23), Feature Request
werner raised the priority of T4788: System wide configuration of the GnuPG system from Wishlist to High.
Dec 20 2019, 12:24 PM · gnupg (gpg23), Feature Request, gpg4win, g10code

Dec 19 2019

gniibe added a comment to T4784: Remove referring a key by $AUTHKEYID, $ENCRKEYID, and $SIGNKEYID.

Considering the concrete use case(s), it is more rational to support listing by capability.

NOTE: exposing capability is orthogonal issue
Dec 19 2019, 12:23 AM · scd, Feature Request, gnupg

Dec 18 2019

gniibe renamed T4784: Remove referring a key by $AUTHKEYID, $ENCRKEYID, and $SIGNKEYID from Remove referring by $AUTHKEYID, $ENCRKEYID, and $SIGNKEYID to Remove referring a key by $AUTHKEYID, $ENCRKEYID, and $SIGNKEYID.
Dec 18 2019, 2:36 AM · scd, Feature Request, gnupg
gniibe lowered the priority of T4784: Remove referring a key by $AUTHKEYID, $ENCRKEYID, and $SIGNKEYID from Unbreak Now! to Normal.
Dec 18 2019, 2:30 AM · scd, Feature Request, gnupg
gniibe created T4784: Remove referring a key by $AUTHKEYID, $ENCRKEYID, and $SIGNKEYID.
Dec 18 2019, 2:22 AM · scd, Feature Request, gnupg
gniibe added a subtask for T4695: Remove SERIALNO as an identifier to select keys: Restricted Maniphest Task.
Dec 18 2019, 1:36 AM · Restricted Project, Feature Request, gnupg
gniibe added a subtask for T4695: Remove SERIALNO as an identifier to select keys: T4301: Handling multiple subkeys on two SmartCards.
Dec 18 2019, 1:35 AM · Restricted Project, Feature Request, gnupg

Dec 17 2019

werner added a comment to T4695: Remove SERIALNO as an identifier to select keys.

Many cards have some printed information and I consider them important to avoid testing one by one all the cards from my pocket.
This I am really in favor of beeing asked to insert the respective card. The new text format private key files make it much easier to maintain this info

Dec 17 2019, 4:36 PM · Restricted Project, Feature Request, gnupg

Dec 12 2019

werner added a project to T3883: Add Win32-OpenSSH support to gpg-agent's ssh-agent: gnupg (gpg23).
Dec 12 2019, 1:08 PM · Not A Bug, workaround, gnupg24, Windows, ssh
werner claimed T3883: Add Win32-OpenSSH support to gpg-agent's ssh-agent.
Dec 12 2019, 1:07 PM · Not A Bug, workaround, gnupg24, Windows, ssh
werner added a comment to T3883: Add Win32-OpenSSH support to gpg-agent's ssh-agent.

Although I don't use the ssh client on Windows I had to integrate the Windows ssh server into our release process (GlobalSign sent us a Windows-only token, for the new cert and so we can't anymore use osslsigncode). The ssh server is really stable and so it makes a lot of sense to better integrate our ssh-agent into Windows.

Dec 12 2019, 1:07 PM · Not A Bug, workaround, gnupg24, Windows, ssh

Dec 10 2019

Valodim added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

That sounds like you might have a different issue in mind?

Dec 10 2019, 11:51 AM · gnupg (gpg23), Feature Request
werner added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

Figuring out the matching user id for a new key signature. Right, --import-options repair-key is the the default and does the same. However, it was also the major cause for the recent trouble with the keyservers because it tried to verify all signatures. repair-keys was made the default (T2236) because it seemed to be nearly for free - which was a false assumption. We should not use this option by default and only consider properly placed signathures as valid. This of course also means that a userid is required.

Dec 10 2019, 8:33 AM · gnupg (gpg23), Feature Request

Dec 9 2019

dkg added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

@werner, i don't understand your last remark. what "required computations" do you think the proposed patches are "moving" from the server to the client?

Dec 9 2019, 6:07 PM · gnupg (gpg23), Feature Request
johnmar added a comment to T4630: libgcrypt: POWER GHASH Vector Acceleration.

Oh, no worries! Just wanted to confirm, that's all.

Dec 9 2019, 5:54 PM · Feature Request, libgcrypt
slandden added a comment to T4630: libgcrypt: POWER GHASH Vector Acceleration.

I am about half way. Sorry for the slowness.

Dec 9 2019, 5:51 PM · Feature Request, libgcrypt
jukivili added a comment to T4630: libgcrypt: POWER GHASH Vector Acceleration.

I've been wondering this also. I can start working on this.

Dec 9 2019, 5:50 PM · Feature Request, libgcrypt