Tested with Gpg4win-5.0.2-beta2
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Advanced Search
Mar 4 2026
Mar 3 2026
Feb 27 2026
config file: Sorry, I got confused, it has to be %APPDATA%\GnuPG VS-Desktop\kleopatrarc in this case (VS-Desktop-4.0.90.1203-Beta), of course. And this one works.
Registry entry SOFTWARE\GnuPG VS-Desktop\Kleopatra\CMS\SaveCSRAsPEM does not work, though. But this is a separate issue, seems all Registry entries do not work in that build.
- config file: According to T7717: Location of qt-application config files %APPDATA%/Gpg4win/kleopatrarc should work.
- registry: According to T5707: Kleopatra: Use windows registry additionally to config files this should be SOFTWARE\Gpg4win\Kleopatra\CMS\SaveCSRAsPEM now
Works with VS-Desktop-4.0.90.1203-Beta when putting this in C:\Program Files\GnuPG VS-Desktop\share\kleopatrarc
CSR is then saved as .pem file with ascii-armored content.
Feb 26 2026
Feb 25 2026
Feb 24 2026
Also backported for VSD 3.4.
Now also available in Gpg4win 5.
Feb 23 2026
Ready for testing in VSD 3.3
What about always using PEM for all generated CSRs? As far as I can see, gpgsm command line always uses PEM when generating CSRs.
Feb 20 2026
Feb 19 2026
I haven't tested it, but it looks good
Like this patch?
Feb 17 2026
Feb 13 2026
Feb 10 2026
Meanwhile all executables are signed.
Investigating GNU ld, I learned that there is no easy way (~= no way) to suppress the warnings (other than 2>/dev/null). It was implemented by the special section named gnu.warning.SYM where SYM is a symbol. I think that this is not-so-good for glibc to notify its users about possible static link problem, by gnu.warning.SYM.
Feb 9 2026
Sorry for the ambiguity. The request was only about mentioning (bpX) for the first two choices, not to add more combinations.
Physical experiment feature support should better not be widely used.
Although it is technicall possible to use all combinations, we should limit in the menu them to those as listed above. Too many algorithms pose an interop problem. Thus we provide brainpool because it is required in Germany and the two IETF curves for the general internet (for those who are playing mitigation against against physical experiments).
Feb 6 2026
Note: In vsd it must be restricted to the bp algorithms then
Feb 5 2026
The blue Kleopatra icon is now used for the Windows builds of Gpg4win and GPD and for the corresponding AppImages.
Feb 4 2026
Feb 3 2026
Thanks. Will go int the next version.
Done and backported for VSD 3.4
I misunderstood this, the mail can be forwarded with attachment if you first deselect the mail and then select it again. So the workaround is OK.
We decided to still use the term "Valid" (with description/tooltip "Certificates that are neither expired nor revoked (except disabled ones)"). This matches the use of the term "invalid" for expired and revoked certificates as in "Certificates that are invalid because they have expired (except disabled ones)".
Feb 2 2026
Backported for VSD 3.4
Done. Example (with default text in English and German translation):
[Welcome] welcome-text[$i]=<h2>Hello, World!</h2> welcome-text[$i][de]=<h2>Hallo, Welt!</h2>
Feb 1 2026
Jan 30 2026
TL;DR
This ticket was created because building static-linked gpgv shows warnings from glibc for getpwnam and getpwuid.
Basically, we can/should ignore the warnings from glibc at link time (for normal use cases), because it is irrelevant.
Jan 29 2026
Let us mark this as a feature requests. gepwnam(3) is a standard libc function and if glibc does not support it; this is more likely a glibc bug than a bug in an application.
We decided not to do this.
Jan 28 2026
Jan 27 2026
Option works in Gpg4win-5.0.1 with GnuPG 2.5.17
Jan 26 2026
I think this is still open (and requires T6537: Make KIO::move work on Windows when moving between different partitions).
Jan 25 2026
@werner I added an implementation https://dev.gnupg.org/D622
that matches Linux behavior and avoids the message about secure memory not being supported on Windows. The change is scoped to the pinentry tool and intentionally follows Linux behavior. Does this approach look reasonable to you?
Jan 23 2026
I don't think that we will implement that any time soon. Today we too often require more mlock-able memory than available and in this case Libgcrypt resorts to allocating new memory arenas which are not locked. This is not as worse as one might think: the majro advantage with secmem is that a free() on secmem allocated memory will also wipe that memory. A better solution has always been to use an encrypted swap/paging file. 25 years ago, it was not easy to configure but today there should be no problem and hopefully already the default.
While key generation works now with an expiry date up to 2106-02-04, the representation on the command line is a bit ugly.
Current state needs to be tested
We need to test the current state
Jan 22 2026
Backported for VSD 3.4
