You mean that a disabled certificate with secret key isn't listed with bold font? That's probably because we have an appearance filter for disabled certificates which takes precedence.
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Advanced Search
Nov 7 2024
Gpg4win-Beta-70:
Looks ok.
Gpg4win-Beta-70:
All 4 items in the task description are realized as described.
gpg4win-Beta-70: works.
I disabled a certificate, it was not shown anymore in the "all" view. Change to the "Disabled" filter and enabled it again -> it shows again with the "All" filter.
Disabling a private certificate does not allow it for signing and not for encrypting to it. It is also not offered for these any more.
But verifying files which were signed by it works.
Nov 5 2024
Nov 4 2024
Oct 31 2024
@TobiasFella prepared the installation in https://dev.gnupg.org/rW9218ebfb7c01478a6fa7b2892fec4d9fd83ba273 . I left some comments on this commit.
right. the installer needs to install kleopatradebugcommandsrc next to libkleopatrarc
- Name is now: "Show GnuPG Configuration"
- When I choose that, the window which opens has a title and a close button, the file extension on saving is .txt
Oct 30 2024
I've checked and can confirm this is working as intended.
Kleopatra just checks if the option "default-new-key-adsk" is set (i.e. it doesn't matter if it's an option with scalar value or list value). The other two options that were changed are not used by Kleopatra.
Oct 29 2024
Alright, finally supported by gpgme (fot 1.24) For testing you may use
Oct 25 2024
Solved for gnupg 2.2, 2.4 and 2.6. GPGME support still missing.
Oct 24 2024
I created a branch: https://dev.gnupg.org/source/libgcrypt/history/gniibe%252Ft7340/
Oct 18 2024
Oct 17 2024
Oct 16 2024
Autoconf archive has AX_TLS: https://www.gnu.org/software/autoconf-archive/ax_tls.html
Also, AX_GCC_VAR_ATTRIBUTE(tls_model) could be used: https://www.gnu.org/software/autoconf-archive/ax_gcc_var_attribute.html
Oct 15 2024
Oct 14 2024
Oct 10 2024
I do not want to do that for 2.2.45 (T7255) because we want to do that release RSN
Oct 9 2024
Oct 4 2024
Test on a dedicated Windows box (T 460, i5-6300U@2.40GHz, harddisk):
VSD Version | gpg version | Load time |
3.1.26 | 2.2.41 | 1:59 |
3.2.4 beta-2 | 2.2.45 beta 25 | 0:46 |
Overall effect of these changes tested on a small Windows VM is only 47 -> 26 seconds. Did also tests with --kbx-buffer-size but that does not make it better than the default, either.
Oct 2 2024
Backported for VSD 3.3 together with changes made for T6666.
Oct 1 2024
Sep 30 2024
Will be available in 2.2.45 and 2.5.2
Now we are at 4 seconds. Available in master and 2.2.
Sep 27 2024
With that patch we are down to about 6 seconds.
Sep 26 2024
I see only links to our own pages and to the emailselfdefense - which is a good resource.
Note: The code for this is in the work/mmontkowski branch but has not yet been merged with master. Before we take this bug up again, we need to look closer at the ribbon UI events as remarked by Andre on July 29.
Sep 25 2024
I don't think it makes sense to add such a feature/bug fix to the old versions.
ok. For the tooltip I would now favor the same addition to all current tool tips where it applies:
"(w/o disabled ones)", e.g. "All certificates (except disabled ones)".
Sep 24 2024
I would exclude them.
What about all other filters? For example "Not Certified", "Not Fully Certified", "My Own", "OpenPGP"? Should the disabled certificates also be excluded for those filters?
ok, discussed this with Werner and Alexander, result was:
Sep 23 2024
Sep 20 2024
Sep 18 2024
Setting to Testing and WiP to reflect status of the subtasks and to get it removed from the Open Tasks list.
This was implemented by Tobias
Sep 16 2024
Sep 10 2024
Given that we backported it to gnupg22 we should go ahead and implement that flag. For example: if the flag is set for any root CA we will show compliance only if that flag is set for the specific root CA. This way we can introduce this feature w/o too much backward incompatibility. We could also hide the feature behind a compatibility flag. There is no reason why we should not add the de-vs trustlist flag to our vsd configuraion files, right away.
Sep 9 2024
Sep 5 2024
Sep 4 2024
In T4060#190972, @werner wrote:We need a way to pass --known-notation to gpgme_op_verify
We need a way to pass --known-notation to gpgme_op_verify
Aug 30 2024
Aug 28 2024
So we need a way to launch scdaemon via userv and make sure that the scdaemon user gives proper permissions to its socket file. gpg-agent also nees to check for a proper version of scdaemon and gpgme needs to be aware of this as well (if it want to directly connect to scdaemon).
Aug 23 2024
Also added a new gpgme context flag "proc-all-sigs" and a --porc-all-sigs option to gpgme's run-verify.c tool.
The new option `--proc-all-sigs' will be available in 2.5.1, 2.4.6, and 2.2.45.
Aug 21 2024
Aug 20 2024
Aug 16 2024
Aug 14 2024
Aug 13 2024
I made a ticket on bugzilla with ready-made tests for S/MIME, but on close inspection a different structure appears for S/MIME and another for qualified signature (openssl could not verify token extracted from CAdES-BASELINE-T signature). However, these tests can be very useful.