Page MenuHome GnuPG
Feed Advanced Search

Mar 16 2023

danisanti updated the task description for T6413: Add mailmap feature to GnuPG for GDPR compliance.
Mar 16 2023, 1:49 PM · Feature Request
danisanti updated the task description for T6413: Add mailmap feature to GnuPG for GDPR compliance.
Mar 16 2023, 1:47 PM · Feature Request
danisanti created T6413: Add mailmap feature to GnuPG for GDPR compliance.
Mar 16 2023, 1:45 PM · Feature Request

Mar 15 2023

werner assigned T6234: Implement access to smartcards via a generic pkcs#11 interface to gniibe.
Mar 15 2023, 11:43 AM · gnupg, Feature Request, scd
werner moved T6363: Add progress status output to gpgtar from Backlog to WiP on the gnupg22 board.
Mar 15 2023, 11:29 AM · gpgme (gpgme 1.23.x), gnupg22 (gnupg-2.2.42), gnupg24 (gnupg-2.4.1), Feature Request
aheinecke triaged T6403: Kleopatra: Warn if a certificate in a group is deleted as Normal priority.

I changed the title of the issue to make it about adding the warning. I also think that is a good idea to avoid confusion / accidents.

Mar 15 2023, 10:16 AM · vsd33 (vsd-3.3.0), Restricted Project, Feature Request, kleopatra
aheinecke renamed T6403: Kleopatra: Warn if a certificate in a group is deleted from Kleopatra: handling of keys/certificates which are in a group to Kleopatra: Warn if a certificate in a group is deleted.
Mar 15 2023, 10:15 AM · vsd33 (vsd-3.3.0), Restricted Project, Feature Request, kleopatra

Mar 13 2023

uwi added a comment to T6408: Multiple key rings (Groups).

Seeing that there are "groups" in Kleopatra, I read the docs, and they suggested that the groups are for addressing multiple recipients.

Mar 13 2023, 1:56 PM · Feature Request, gpg4win
aheinecke closed T6408: Multiple key rings (Groups) as Invalid.

Settings -> Configure Groups.

Mar 13 2023, 11:37 AM · Feature Request, gpg4win
uwi created T6408: Multiple key rings (Groups).
Mar 13 2023, 10:55 AM · Feature Request, gpg4win

Mar 8 2023

gniibe moved T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt from Backlog to Next on the FIPS board.
Mar 8 2023, 2:39 AM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS
gniibe changed the status of T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt from Open to Testing.

Thank you.
Applied to both (master and 1.10).

Mar 8 2023, 2:39 AM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS

Mar 7 2023

ikloecker added a comment to T6403: Kleopatra: Warn if a certificate in a group is deleted.

This pretty much highlights a general problem of groups: If the distribution groups for the email client are managed independently from the certificate groups then there will inevitably be discrepancies. The obvious solution is the usage of groups managed by a central service for email addresses and certificates. (Or an encrypted mailing list service.)

Mar 7 2023, 9:56 AM · vsd33 (vsd-3.3.0), Restricted Project, Feature Request, kleopatra

Mar 6 2023

tobhe added a comment to T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.

Right, thanks for the review! Updated patches below.

Mar 6 2023, 5:11 PM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS
Jakuje added a comment to T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.

Actually, the same issue is in the mac case, which I missed on first couple of reviews:

-  enum gcry_mac_algos alg = va_arg (arg_ptr, enum gcry_cipher_algos);
+  enum gcry_mac_algos alg = va_arg (arg_ptr, enum gcry_mac_algos);
Mar 6 2023, 5:01 PM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS
Jakuje added a comment to T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.

Going through the code once more, there is one typo to be fixed:

+_gcry_fips_indicator_md (va_list arg_ptr)
+{
+  enum gcry_md_algos alg = va_arg (arg_ptr, enum gcry_cipher_algos);

should say

+_gcry_fips_indicator_md (va_list arg_ptr)
+{
+  enum gcry_md_algos alg = va_arg (arg_ptr, enum gcry_md_algos);

otherwise ack.

Mar 6 2023, 4:46 PM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS
ebo created T6403: Kleopatra: Warn if a certificate in a group is deleted.
Mar 6 2023, 11:06 AM · vsd33 (vsd-3.3.0), Restricted Project, Feature Request, kleopatra
werner renamed T6234: Implement access to smartcards via a generic pkcs#11 interface from Write app-p11.c to Implement access to smartcards via a generic pkcs#11 interface.
Mar 6 2023, 8:52 AM · gnupg, Feature Request, scd

Mar 3 2023

werner added a comment to D546: build: Find correct version string for Python >= 3.10.

That's why I added some tags and also set me a reminder. We will try to get this into the next GPGME release we plan for this month.

Mar 3 2023, 4:02 PM · Python, Feature Request, gpgme
DanielNoord updated subscribers of D546: build: Find correct version string for Python >= 3.10.

@werner Seeing as you seem to be actively maintaining this project: is there any way to move this forward? This is breaking quite a few builds of development environments for my company and we are now applying similar patches ourselves but it would be nice to get this merged upstream.

Mar 3 2023, 10:36 AM · Python, Feature Request, gpgme
werner added projects to D546: build: Find correct version string for Python >= 3.10: gpgme, Feature Request, Python.
Mar 3 2023, 10:15 AM · Python, Feature Request, gpgme

Mar 2 2023

werner added a comment to T6398: Support X.509 nameConstraints.

(my example cert is 0x09BB0EEE)

Mar 2 2023, 3:08 PM · Restricted Project, Feature Request, libksba
werner triaged T6398: Support X.509 nameConstraints as Normal priority.
Mar 2 2023, 3:04 PM · Restricted Project, Feature Request, libksba
bjk added a comment to T2696: SETREPEAT support for pinentry-curses.

Added SETQUALITYBAR support with some fixes for glitches when an error string was set. Wide characters seem to work OK.

Mar 2 2023, 6:02 AM · pinentry, Feature Request

Mar 1 2023

Jakuje added a comment to T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.

We came to the same conclusion -- the SHAKE digests are not usable for sign/verify operations the way how it is implemented now. But it would be more clear if we would have explicit allow-list.

Mar 1 2023, 7:57 PM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS
tobhe added a comment to T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.

After consulting with our certs lab and studying the code I think SHAKE should not be a problem for now. All of the _gcry_digest_spec_shakeXXX seem to neither have an mdlen nor a read() function. pk_sign and pk_verify seem to both call md_read() which should fail because of the missing read function, kdf checks _gcry_md_get_algo_dlen() which should also disallow SHAKE.

Mar 1 2023, 12:55 PM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS

Feb 28 2023

aheinecke merged task T4699: X.509 certificate request more comfortable into T6117: Kleopatra: Make creation of S/MIME certificate signing request accessible.
Feb 28 2023, 9:03 AM · Restricted Project, kleopatra, S/MIME, gpg4win, Feature Request
aheinecke added a comment to T4699: X.509 certificate request more comfortable.

I am closing this as a duplicate of T6117 even though it is not really a duplicate. But for me it does not make sense to keep this as a different issue because simplifying the dialog is directly related to making it more accessible.

Feb 28 2023, 9:03 AM · Restricted Project, kleopatra, S/MIME, gpg4win, Feature Request

Feb 27 2023

tobhe added a comment to T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.

Good catch. A similar problem might arise with SHA384 according to section D.R which states

Feb 27 2023, 3:15 PM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS
neverpanic added a comment to T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.

One potential pitfall here is that SHAKE-128 and SHAKE-256 must not be available for use in signature operations. That's because https://csrc.nist.gov/CSRC/media/Projects/cryptographic-module-validation-program/documents/fips%20140-3/FIPS%20140-3%20IG.pdf section C.C disallows the use of SHAKE in higher-level algorithms:

Feb 27 2023, 3:01 PM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS
neverpanic added a comment to T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.

These look good to me.

Feb 27 2023, 1:45 PM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS
tobhe added a comment to T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.

Right, we have received the same feedback from our cert lab but I haven't found time to update the bug yet. Here are the updated patches:

Feb 27 2023, 12:19 PM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS
neverpanic added a comment to T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.

This marks GCRY_MD_CRC32, GCRY_MD_CRC24_RFC2440 and GCRY_MD_CRC32_RFC1510 as approved.

Feb 27 2023, 11:44 AM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS
bjk added a comment to T2696: SETREPEAT support for pinentry-curses.

Added curses-repeat branch which needs testing for wide chars and other stuff in case i missed something

Feb 27 2023, 6:22 AM · pinentry, Feature Request

Feb 22 2023

aheinecke closed T6353: gpgme: add option to disable S/MIME CRL checks as Resolved.

Oh sorry I only saw this now. We have "gpgme_set_offline" for this use case which disables CRL checks in the S/MIME case. It is more general because it also disables OCSP for example and might disable more online actions like fetching chain certificates etc.

Feb 22 2023, 1:14 PM · gpgme, Feature Request

Feb 16 2023

werner triaged T6369: gpgme: add a faster variant of gpgme_get_key() as High priority.
Feb 16 2023, 6:12 PM · gpgme, Feature Request
werner triaged T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt as Low priority.
Feb 16 2023, 11:43 AM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS

Feb 14 2023

positron added a comment to T6370: Print diagnostics to explain certain expiration cases.

Understood. I appreciate the time you took to analyse the issue. Thanks.

Feb 14 2023, 6:27 PM · Feature Request, gnupg
werner renamed T6370: Print diagnostics to explain certain expiration cases from Impossible to change expiration date for some keys to Print diagnostics to explain certain expiration cases.
Feb 14 2023, 5:20 PM · Feature Request, gnupg
werner added a comment to T6369: gpgme: add a faster variant of gpgme_get_key().

Indeed. The called function dates back to 2004. We really need to rework this and cache the value - it might be required to take the file_name into account.

Feb 14 2023, 8:54 AM · gpgme, Feature Request

Feb 13 2023

aheinecke added a comment to T6369: gpgme: add a faster variant of gpgme_get_key().

@werner I saw the call in _gpgme_set_engine_info at line 452 https://dev.gnupg.org/source/gpgme/browse/master/src/engine.c$452 which I think leads down to _gpgme_get_program_version in version.c which does a spawn and uses no cache.

Feb 13 2023, 8:10 PM · gpgme, Feature Request
werner added a comment to T6369: gpgme: add a faster variant of gpgme_get_key().

I had the same suspicion andIchecked the code. afaics all values are taken from a cache (see dirinfo.c). Thus no real overhead.

Feb 13 2023, 4:49 PM · gpgme, Feature Request
aheinecke added a comment to T6369: gpgme: add a faster variant of gpgme_get_key().

The context cloning should not be that expensive compared to invoking gpg. Thus let us first see how to speed up this in the common case.

Feb 13 2023, 11:01 AM · gpgme, Feature Request
lazka added a comment to T6369: gpgme: add a faster variant of gpgme_get_key().

That's what I was initially trying to do, but then I saw https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=blob;f=src/keylist.c;h=1c01bd42b8497932d218e4d525794ed98e712bf5;hb=HEAD#l1362 and I wasn't sure if I needed to copy that logic to avoid introducing any regressions.

Feb 13 2023, 9:40 AM · gpgme, Feature Request
werner added a comment to T6369: gpgme: add a faster variant of gpgme_get_key().

If you got a limited list of, say, fingerprints, you should put them into an array and use gpgme_op_keylist_ext_start tolist only those keys. This will be much faster.

Feb 13 2023, 9:32 AM · gpgme, Feature Request
lazka added a comment to T6369: gpgme: add a faster variant of gpgme_get_key().

Finally, what's your use case? gpgme_get_key() is meant to be used for getting individual keys. It's not meant to be used to get 1000 keys in a loop.

Feb 13 2023, 9:05 AM · gpgme, Feature Request
lazka added a comment to T6369: gpgme: add a faster variant of gpgme_get_key().

If you mean gcc optimization flags, then yes.

Feb 13 2023, 9:00 AM · gpgme, Feature Request
ikloecker added a comment to T6369: gpgme: add a faster variant of gpgme_get_key().

Finally, what's your use case? gpgme_get_key() is meant to be used for getting individual keys. It's not meant to be used to get 1000 keys in a loop.

Feb 13 2023, 8:50 AM · gpgme, Feature Request
ikloecker added a comment to T6369: gpgme: add a faster variant of gpgme_get_key().

Moreover, if you have performance problems on Windows, then it's not the best idea to strace the code on Linux.

Feb 13 2023, 8:47 AM · gpgme, Feature Request
ikloecker added a comment to T6369: gpgme: add a faster variant of gpgme_get_key().

Just asking the obvious: You are using an optimized release build for your benchmarks, right?

Feb 13 2023, 8:45 AM · gpgme, Feature Request

Feb 12 2023

lazka added a comment to T6369: gpgme: add a faster variant of gpgme_get_key().

Benchmark script:

Feb 12 2023, 4:49 PM · gpgme, Feature Request
lazka added a comment to T6369: gpgme: add a faster variant of gpgme_get_key().

yeah, I'd guess it's creating a new gpg instance with it. strace shows extra clone/pipe/read/fcntl syscalls with the new context.

Feb 12 2023, 4:29 PM · gpgme, Feature Request
werner added a project to T6369: gpgme: add a faster variant of gpgme_get_key(): gpgme.
Feb 12 2023, 4:16 PM · gpgme, Feature Request
werner added a comment to T6369: gpgme: add a faster variant of gpgme_get_key().

The context cloning should not be that expensive compared to invoking gpg. Thus let us first see how to speed up this in the common case.

Feb 12 2023, 4:15 PM · gpgme, Feature Request
lazka created T6369: gpgme: add a faster variant of gpgme_get_key().
Feb 12 2023, 4:04 PM · gpgme, Feature Request

Feb 10 2023

aheinecke added a comment to T6072: Kleopatra: Display "gpgconf -X" .

Output of --show-configs should also be added as a button or directly visible when the selftest of Kleopatra fails.

Feb 10 2023, 4:28 PM · vsd33 (vsd-3.3.0), Restricted Project, kleopatra, Feature Request
gniibe added a comment to T6234: Implement access to smartcards via a generic pkcs#11 interface.

I try experiment using Python PKCS#11 (https://python-pkcs11.readthedocs.io/en/latest/index.html)

Feb 10 2023, 4:09 AM · gnupg, Feature Request, scd
gniibe added a comment to T6234: Implement access to smartcards via a generic pkcs#11 interface.

I concluded that (at first, for the initial try) it's not good to start this under scdaemon, because of two different abstractions for accessing the device (the way of scdaemon and the way of PKCS#11).
It's good to start with something like tpm2d. The goal would be integration into scdaemon or tpm2d.

Feb 10 2023, 3:59 AM · gnupg, Feature Request, scd

Feb 8 2023

ikloecker added a comment to T6366: Allow "interactive" import of keys.

Nobody stops you from removing any unwanted keys from the keyring. Nobody stops you from importing all keys to a temporary keyring (using a temporary GNUPGHOME), export only those keys you want in your proper keyring, import those in your proper keyring, and then ditch the temporary keyring (resp. GNUPGHOME). gpg doesn't stop you from doing any of this.

Feb 8 2023, 9:13 AM · kleopatra, Feature Request
werner triaged T6366: Allow "interactive" import of keys as Low priority.
Feb 8 2023, 8:04 AM · kleopatra, Feature Request

Feb 7 2023

uwi added a comment to T6366: Allow "interactive" import of keys.

Well, I think it's a matter of taste what keys a user wants to have in which keyring. Some users want only the keys they actually use.
I think policy or the algorithm should not take the decision away from the user. "Free software for unfree users" doesn't make much sense. Maybe I'm just so old that I still think the computer should do what the user wants it to do, and not the other way around (which seems to be a current trend).

Feb 7 2023, 9:07 PM · kleopatra, Feature Request
werner added a project to T6366: Allow "interactive" import of keys: kleopatra.

It does not matter what you have in you keyring. It does not harm to have arbitrary keys there.

Feb 7 2023, 4:58 PM · kleopatra, Feature Request
uwi created T6366: Allow "interactive" import of keys.
Feb 7 2023, 3:21 PM · kleopatra, Feature Request

Feb 1 2023

werner moved T6234: Implement access to smartcards via a generic pkcs#11 interface from Backlog to WiP on the gnupg24 board.
Feb 1 2023, 9:42 AM · gnupg, Feature Request, scd
werner added a parent task for T6234: Implement access to smartcards via a generic pkcs#11 interface: T6364: More device (including virtual) support.
Feb 1 2023, 9:41 AM · gnupg, Feature Request, scd
werner shifted T6234: Implement access to smartcards via a generic pkcs#11 interface from the Restricted Space space to the S1 Public space.
Feb 1 2023, 9:41 AM · gnupg, Feature Request, scd
werner changed the status of T6212: The ssh keys are no longer returned in the order from control file after T5996 from Open to Testing.
Feb 1 2023, 9:36 AM · gnupg24 (gnupg-2.4.1), ssh, Feature Request
werner moved T6212: The ssh keys are no longer returned in the order from control file after T5996 from QA to WiP on the gnupg24 board.
Feb 1 2023, 9:36 AM · gnupg24 (gnupg-2.4.1), ssh, Feature Request
werner moved T6212: The ssh keys are no longer returned in the order from control file after T5996 from WiP to QA on the gnupg24 board.

See the the commit for a description of the changes.

Feb 1 2023, 9:29 AM · gnupg24 (gnupg-2.4.1), ssh, Feature Request

Jan 31 2023

werner moved T6212: The ssh keys are no longer returned in the order from control file after T5996 from Backlog to WiP on the gnupg24 board.
Jan 31 2023, 12:40 PM · gnupg24 (gnupg-2.4.1), ssh, Feature Request
werner moved T6363: Add progress status output to gpgtar from WiP to gnupg-2.4.1 on the gnupg24 board.
Jan 31 2023, 12:35 PM · gpgme (gpgme 1.23.x), gnupg22 (gnupg-2.2.42), gnupg24 (gnupg-2.4.1), Feature Request
ikloecker added a comment to T6353: gpgme: add option to disable S/MIME CRL checks.

If you want this to happen, then you should consider contributing a patch. Please see doc/HACKING for the formal requirements.

Jan 31 2023, 12:05 PM · gpgme, Feature Request
werner added a project to T5768: Dirmngr: Use windows proxy settings if system proxy settings should be used: Feature Request.
Jan 31 2023, 10:07 AM · Feature Request, gnupg, Restricted Project
werner added a project to T6353: gpgme: add option to disable S/MIME CRL checks: gpgme.
Jan 31 2023, 10:01 AM · gpgme, Feature Request

Jan 30 2023

werner added a project to T6363: Add progress status output to gpgtar: gpgme.

I guess we need some gpgme support as well.

Jan 30 2023, 4:01 PM · gpgme (gpgme 1.23.x), gnupg22 (gnupg-2.2.42), gnupg24 (gnupg-2.4.1), Feature Request
werner added a comment to T6363: Add progress status output to gpgtar.

How with --status-fd passed to gpgtar we will get these progress lines:

Jan 30 2023, 3:47 PM · gpgme (gpgme 1.23.x), gnupg22 (gnupg-2.2.42), gnupg24 (gnupg-2.4.1), Feature Request
werner triaged T6363: Add progress status output to gpgtar as Normal priority.
Jan 30 2023, 2:59 PM · gpgme (gpgme 1.23.x), gnupg22 (gnupg-2.2.42), gnupg24 (gnupg-2.4.1), Feature Request
aheinecke added a project to T6072: Kleopatra: Display "gpgconf -X" : Restricted Project.

I am adding gpgcom, as a tag, the first minimal task would be to create such a page with the debug output from gpgconf -X with options to copy / or save them to a file. Not sure if that should be a subtask, because on the other hand this would be a start of this "Debug Tab"

Jan 30 2023, 10:20 AM · vsd33 (vsd-3.3.0), Restricted Project, kleopatra, Feature Request
werner added a comment to T6072: Kleopatra: Display "gpgconf -X" .

What I need in particular is a way to get the output of gpgconf -X.

Jan 30 2023, 10:16 AM · vsd33 (vsd-3.3.0), Restricted Project, kleopatra, Feature Request
werner closed T3398: fingerprint-based import screener is no defense against malice as Wontfix.

Those "curated keyrings" and keyservers don't work together. The whole idea of automated but curated keyrings is dead end.

Jan 30 2023, 8:58 AM · gnupg24, gnupg (gpg23), Feature Request

Jan 26 2023

werner triaged T6233: Extract Card Holder Information for the PIV card from the "Printed Information" Object as Low priority.
Jan 26 2023, 11:26 AM · gnupg, scd, Feature Request

Jan 24 2023

aheinecke added a parent task for T6198: KMail: Port to keyresolver from libkleo: Unknown Object (Maniphest Task).
Jan 24 2023, 12:48 PM · Restricted Project, Feature Request, KDE, kleopatra
werner added a comment to T6212: The ssh keys are no longer returned in the order from control file after T5996.

Let's first collect all keys, assign a priority, sort, and only then send them back to ssh.

Jan 24 2023, 10:06 AM · gnupg24 (gnupg-2.4.1), ssh, Feature Request
werner closed T6283: could the newer jq255 Elliptic Curve be interesting to implement? as Wontfix.

Well, I do not yet see a use case for this. The current rush towards PQC makes it unlikely that newer curves will get in widespread use. Iff we have a large application which requires this curves, we can reconsider,

Jan 24 2023, 9:53 AM · libgcrypt, Feature Request

Jan 23 2023

albrechtd created T6353: gpgme: add option to disable S/MIME CRL checks.
Jan 23 2023, 9:08 AM · gpgme, Feature Request

Jan 19 2023

werner removed a project from T4537: gpgsm support for timestamp signatures: gnupg (gpg23).
Jan 19 2023, 4:52 PM · gnupg26, S/MIME, Feature Request
werner removed a project from T4446: please add --quick-revoke-subkey: gnupg (gpg23).
Jan 19 2023, 4:52 PM · Restricted Project, gnupg24, Feature Request
werner removed a project from T4406: Allow the use of the default-new-key-algo format for --quick-gen-key.: gnupg (gpg23).
Jan 19 2023, 4:51 PM · gnupg24, Feature Request
werner removed a project from T3921: Make adding an arbitrary (sub)key easier: gnupg (gpg23).
Jan 19 2023, 4:51 PM · gnupg24, Feature Request
werner removed a project from T3730: Add support to HTTP Basic Auth for Keyservers: gnupg (gpg23).
Jan 19 2023, 4:50 PM · gnupg24, Feature Request
werner updated the task description for T2760: Populate comment field when exporting authentication key for SSH.
Jan 19 2023, 4:50 PM · gnupg24, ssh, Feature Request
werner removed a project from T3513: Change of trust of new uid not immediately reflected in user interface: gnupg (gpg23).
Jan 19 2023, 4:50 PM · gnupg24, OpenPGP, Feature Request
werner updated the task description for T2337: gpg command line language wrong.
Jan 19 2023, 4:50 PM · gnupg24, Feature Request, gpg4win
werner updated the task description for T2290: Allow gpgv2 to use armored GPG keys as keyring file with trusted keys.
Jan 19 2023, 4:49 PM · gnupg24, Feature Request
werner removed a project from T5649: Issue better error message for invalid OpenPGP RSA keys: gnupg (gpg23).
Jan 19 2023, 4:49 PM · gnupg24, OpenPGP, Feature Request
werner updated the task description for T2186: --encrypt-to ambiguous with a expired and revoked key.
Jan 19 2023, 4:48 PM · gnupg24, Feature Request
werner removed a project from T5837: gpg-card: Authenticate to PIV applet with non-3DES card management key: gnupg (gpg23).
Jan 19 2023, 4:47 PM · gnupg24, scd, Feature Request
werner removed a project from T5897: Fix MinGW compilation error with 'struct _stat32' in common/sysutils.c from gnupg-2.3.4: gnupg (gpg23).
Jan 19 2023, 4:47 PM · gnupg24, toolchain, Feature Request, patch
werner removed a project from T5930: Use the FIPS-compatible digest&sign API: gnupg (gpg23).
Jan 19 2023, 4:47 PM · FIPS, Feature Request
werner removed a project from T5964: gnupg should use the KDFs implemented in libgcrypt: gnupg (gpg23).
Jan 19 2023, 4:47 PM · gnupg26, FIPS, Feature Request