Lot's of changes since 2.4.
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Advanced Search
Sep 26 2023
Sep 25 2023
Sep 19 2023
Sep 15 2023
Just started wondering how much of this slow down is because of MingW libc not having very well optimized memcpy/memmove/memchr/strlen/etc. Is there profiling tools like 'perf' on Linux that could be used for Windows builds?
For Windows things are actually more complicate. It seems to be common practise of sysadmins to provide PAC files which are used to map URLs to proxys and to decide whether a proxy is to be used at all. Fortunately Windows provides an API to find the proxy for a specific URL. We should use this.
Sep 13 2023
Sep 7 2023
Sep 6 2023
ack
We have a fix for now and thus I lower the priority. Given that EasyPG mimics the GPGME API we should here also use another pipe to convey the passphrase (e.g. for symmetric encryption).
Aug 30 2023
Aug 29 2023
Thank you for the response, @werner! (original reporter here)
BTW. you should use gpg --quick-set-expire FINGERPRINT 5y this is easier for scripting. Using
--export-options no-export-clean should keep the old signatures.
gpg only uses the latest self-signatures and ignores old one. Thus I do not understand your problem.
Aug 22 2023
Aug 21 2023
We should not backport this to 2.2; better update to the current stable version (2.4)
Using Ubuntu, it's GnuPG 2.2 (which doesn't have the fix of T4585). Without the fix, killing gpg (by CTRL-C) causes problematic situation where pinentry remains asking.
That's because gpg-agent and pinentry don't know the frontend side has been killed. T4585 introduced a watching thread into gpg-agent, so that it can correctly detect lost of frontend.
Aug 18 2023
Hi @gniibe - thanks for your fix.
Pushed the fix for SIGINT handling of pinentry-tty and pinentry-curses by: rPa6f63fe37dbf: tty,curses: Upon SIGINT, let pinentry exit gracefully.
This fix should improve the situation.
Thank you for the report.
I found a bug in pinentry-curses and pinentry-tty for handling SIGINT. I am going to fix this.
Aug 14 2023
In T6085#162923, @ikloecker wrote:In T6085#162918, @ebo wrote:well, when creating openPGP keys with kleopatra I did not see any hints. I do not think that the issue would be vaild for password based encryption. There the common usecase is autogeneration, anyway
Autogeneration isn't viable if an organization has stupid password constraints that the autogenerated passwords do not satisfy. In particular, the autogenerated passwords do not contain any non-alphanumeric characters, but many password policies require such a character.
Aug 10 2023
Aug 9 2023
Aug 8 2023
Aug 2 2023
Jul 26 2023
Currently, Kleopatra cannot do anything about this. get_passphrase in protect-tool.c asks those questions and doesn't support a way to give the user more context (e.g. by providing the file name). Once gpg-agent allows giving context, Kleopatra can add for example the file name to the data to import.
Jul 25 2023
Applied to master.
Applied to 2.4.
Jul 24 2023
yes, one down, two to go...
Meanwhile the AppImage (same binaries as the current Gpg4win version) can be found here among the binary releases: https://gnupg.org/download/index.html
@jukivili Good to know.
My vote would be to invert the logic of the last patch and add "no-hashing-in-parallel" as a compatibility flag and make the other behavior default and then to push it at least to master or even to 2.4.
Jul 14 2023
There are some more surprising results like on my windows test keyring it would always report "5 new signatures" regardless of how often I ran the script ;)
Update the patch to allow --compatibility-flags hashing-in-parallel.
Jul 13 2023
Problem with SHA-256 on x86-64 is that it took long time for Intel to introduce SHA acceleration (SHA1 & SHA256) to their main CPU products.
Jul 12 2023
Fixed in master.
Will backport into 2.4, after testing.
Jul 10 2023
So some more data from 2.4.3. Once unpatched and once with your patch.
Jul 7 2023
Am I correct that the reason for the speed up is that it can use a second CPU's engine. If there is a real performance improvement here, we should add this for example using a --compatibility-flag. This way we can gather experience and eventually make it the default. The compatibility flags won't introduce an API incompatibility.
I found this important to do because the SHA-256 results from your test looked extremly slow.
Updated the patch:
Jul 6 2023
I did a little bit of testing with okular, and it kind of gives similar numbers.
This is a patch for master (which uses nPth for gpg):
I'm trying to use a thread for computation of hashing. It works, but no performance gain, due to nPth.
I do:
npth_unprotect (); gcry_md_write (mfx->md, mfx->buf, mfx->written); npth_protect ();
to expect hashing is done in parallel.
Jul 5 2023
It seemed I was wrong that it is due to buffering.
In the use case of --sign and --encrypt, hashing is done with IOBUF's 64KiB buffer (already).
I observed the benchmark by libgcrypt (Windows emulation 32-bit on Debian):
Jul 4 2023
Jul 3 2023
OK. I'll take the signing part (possible performance improvement).
I looked through the code. What I observed is:
- By jussi's improvements, AEAD code is optimized with AEAD_ENC_BUFFER_SIZE of 64KiB
- this contributes much for better performance
- If we invoke gpg --sign | gpg --encrypt then we can take advantage of multiple CPUs (but gpg is currently not automatically threaded in that way)
- signing could be improved likewise, using larger buffer like 64KiB
- CFB+MDC, it uses two functions together; encryption and hashing, and not with larger buffer like 64KiB
- when signed, it also does hashing for signing, so three functions
Jun 26 2023
! In T6561#172087, @werner wrote:
FWIW, gpg shows the actual cipher and encryption mode with -v. For example
FWIW, gpg shows the actual cipher and encryption mode with -v. For example
In T6561#172083, @werner wrote:s/CBC/CFB+MDC/
s/CBC/CFB+MDC/
Jun 22 2023
See for T6545 for a new request to support IDP.
Jun 20 2023
Thank you.
Applied to master, 2.4 branch and 2.2 branch.
Thank you.
Applied to master, 2.4 branch, and 2.2 branch.
Jun 12 2023
I consider the entire idea of receiving a passphrase and data on the same channel to be a bad for security and robust coding. The whole thing is a historical oddity which we kept for the sake of mutt(1)'s legacy way of invoking pgp. Thus I won't consider 3) the best option.
To summarize, here is the situation:
- Ideally, it would be good to modify GnuPG and Emacs EasyPG to implement status handling and input handling in better way.
Jun 10 2023
Ah, I see https://dev.gnupg.org/rG2f872fa68c6576724b9dabee9fb0844266f55d0d applies cleanly. I guess can go with that, although would prefer it if on the 2.4 branch.
Is there a commit we could backport downstream to 2.4.x? We've had quite a few reports of this.
Jun 5 2023
To align the default expiration time with the BSI approval and other related software we change this now to 3 years.
Jun 1 2023
The problem of hang of tests/openpgp/multisig.scm is solved by rGef4f22b9d98b: gpg: Graceful exit for signature checking with --batch.
But the problem itself is not yet solved.
It is reproducible by testing tests/openpgp/multisig.scm with keyboxd enabled (it hangs), with the modification of following.
May 31 2023
May 30 2023
May 26 2023
May 24 2023
I pushed the change which keeps old status report behavior to master.
Let me test the change.
looks simpler to me.
May 23 2023
Hmm, for the latter this: