I guess we can close this one.
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Advanced Search
Dec 12 2022
Dec 6 2022
This overlaps with T5959: Kleopatra: Show key source in details widget if it is not unkown.
Another idea (based on above ideas): We add an optional column named "Valid For" and only list the usages that are currently possible. If the encryption subkey is expired, then the key will probably only be valid for signing and certifying. This should be easier to understand than my fancy color coding idea while still giving the user a hint what a certain certificate can be used for. I'd still abbreviate the usage to a single letter in English. Translators could still use more letters if a single letter would be ambiguous.
If you enter a wrong password in a window, the error message will only be given after you have answered all requests for the transport passwords.
No. We now ignore expired key with --mirror, --create, and --install-key.
Dec 5 2022
Nov 30 2022
works
Nov 29 2022
Nov 23 2022
Actually we have two gpgme versions in gpg4win because gnupg is a "sub"-installer inside of gpg4win and it comes with its own gpgme. That gpgme is the release version but the one used by gpg4win's kleopatra is often a newer snapshot.
Nov 22 2022
Keyserver option is no longer shown in the OpenPGP tab of GnuPG System
works
Nov 18 2022
I put rCc34c9e70055e: fips: Mark AES key wrapping as approved. under this task, so that it can be referred in the release note.
Nov 17 2022
We need to do this also for CHANGE REFERENCE DATA - however, there should be an extra option so that we can debug this despite of the redacting.
Nov 16 2022
Nov 10 2022
works
The distinction between reader and card is not easy and PS/SC is also not helpful here. The user needs to resort to trial and error. With 2.3 things are much easier because we do not need to select the reader anymore.
works
Nov 7 2022
Nov 4 2022
Merged PIPE connection part into master.
I updated *.m4 scripts in gogol:
Nov 3 2022
Hello, if I understand the issue correctly this issue is about saving a decrypted email as a file to a local disk and not to Outlook? We would like to save the mail as a file like a normal mail file.
Nov 2 2022
For *.m4 scripts, I pushed changes to prefer gpgrt-config with *.pc files than *-config scripts (T5034).
Before the change, it was not coherent; gpgrt-config gpg-error is preferred to gpg-error-config (if available), but libassuan-config was used if available.
After the change, gpgrt-config is used to configure gpg-error and libassuan, etc.
Oct 31 2022
Oct 28 2022
Yep. Closed now.
Will go into 2.3.9 and gpg4win 4.0.5
You are using a somewhat special setup and not what has been tested with gpg (i.e. putty). In particular Cygwin based tools do not interoperate well with non-Cygwin tools.
@jukivili: This has been released with 1.10.0 - shall we close this bug?
Shall we really backport this to 2.2 given that ECC for S/MIME is in most cases a smartcard thing?
Has been release quite some time ago (2.3.8 and earlier)
Will be released with 2.3.9
Oct 27 2022
Oct 26 2022
@aheinecke Please show me how you configure your libassuan-master (and the output which detects host's gpg-error-config erroneously).
Oct 25 2022
I have pushed the patch, but still it did not work for me properly over everything and I had to add --enable-install-gpg-error-config to libgpg-error. This was because of at least the 64 bit build of libassuan-master it picked up gpg-error-config from my host system. I then tried to add --with-gpg-error-prefix to the assuan call but that failed because it only looked for gpg-error-config in this prefix and not for any gpgrt-config and failed immediately with a command not found error.
Oct 24 2022
works as proposed by werner.
Go ahead if you want to do that.
Oct 20 2022
Oct 19 2022
Please note that: libgcrypt offers ECDH functionality by gcry_pk_encrypt/gcry_pk_decrypt to construct OpenPGP public-key encryption/decryption.
So, this is only for OAEP but not for ECDH? FWIW, GnUPG uses OAEP only for S/MIME.
It's not that needed, in my opinion, as nobody actually uses ECB itself (in real use case). But I understand the point of (possibly, students') benchmarking.
Oct 18 2022
Cool, I will try it out ASAP. You must have read my mind. Only yesterday evening I ran into problems because the current code in src/Makefile.am to symlink the static libs did not work on my new dev system with a lib64 layout and thought that I needed just a patch like this to fix it properly.
Oct 16 2022
Oct 14 2022
Pushed the change, although it is not enabled yet (since the feature will be only available by newer libgcrypt, 1.11).
Pushed.
Pushed to master.
By 1/N...5/N, it works. And it shows the API needs clarification and possible modification/fixes; As written in the comment of system-w32.c, fd == POSIX fd semantics is good, which asks API/ABI break.
Oct 12 2022
Oct 11 2022
Oct 10 2022
Oct 9 2022
In T5790#163980, @manonfgoo wrote:
Oct 8 2022
In T5790#163886, @werner wrote:[Merging didn't work]
Can you test the Patch, does it work for you ?
Oct 7 2022
Here is the patch as file:
The patch applies with -p1 to the master brach, alternatively I could push a commit, but my user does not seam to be allowed to do so:
[Merging didn't work]