What do you mean by "exporting revocation certificates"? Once such a certificate is imported you simply export the public key including the revocation signature. Otherwise, simply takes the revocation certificates from ${GNUPGHOME}/openpgp-revocs.d where they are written to, if you generate a key. Kleopatra uses gpg directly to generate a revocation certificate mimicking what gpgme would do: See https://dev.gnupg.org/source/kleo/browse/master/src/commands/genrevokecommand.cpp.
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Advanced Search
Jul 7 2021
Jul 6 2021
Jun 24 2021
Jun 21 2021
Jun 20 2021
Jun 18 2021
ggp-agent has no support for U2F and it can't work with these key types. Given that Yubikeys also have proper keys (even eddsa) I doubt that we will implement support for ecdsa-sk OpenSSH feature any time soon,
Jun 16 2021
Some ideas:
- the someflags thing will probably just be a reserved parameter
- If DATA is not NULL but an MD is set the sign function should fail
- Should ownership of MD be moved to the CTX?
In an email from @werner couple days back, I got a suggestion that we could use hashing tied to the context, rather than this one-shot call tied only to digests. I circled back this suggestion to Stephan and he confirmed that it should be fine from the FIPS point of view so I am posting the suggested API here too:
ctx = gcry_pk_new (someflags) md = gcry_md_open (...) gcry_ctx_set_md (md); gcry_pk_sign_ext (ctx, result, data, skey) [...] gcry_ctx_release (ctx);
OK. I think that the patch at SUSE is updated one which works.
As I understand correctly, this is a kind of very old patch, which intended to work around old libgcrypt limitation of RSA PSS.
I think that {D1476} is still a sketch (not real code which works). I would guess an intended use, but it's good to have concrete example program which uses the feature being added.
FWIW, there is also this newer patch: https://dev.gnupg.org/differential/diff/1476/
and SUSE seems to already use a modified API:
https://sources.suse.com/SUSE:Maintenance:15118/libgcrypt.SUSE_SLE-15_Update/26a8df5f96d27d6abca7bd7ba9b0def0/libgcrypt-FIPS-RSA-DSA-ECDSA-hashing-operation.patch
Jun 15 2021
Our public key functions are stateless. For several reasons it would be good to have an option to keep some state (think pre-computations). Our gcry_ctx_t would be a perfect fit for this and it will allow us to join a pubkey function with for example a hash function.
Does the patch really work, or is it a sketch to describe the intended use?
Jun 10 2021
The private key contains the public key. Thus there is no need to export the public key if you already got the secret key.
Jun 2 2021
There is also the issue that options flagged as ignore or forced in the global config file won't have an effect either. But indeed we could mark them as non-change.
Jun 1 2021
May 19 2021
I did a new test and found that if it is a single file regardless of disk size, no error appears, but when there are multiple files in a single encrypted folder with a size greater than 1.5GB, the error occurs. Traverse a directory like Zorvek and Aheinecke wrote would be an optimal solution or at least some alert messsage to be aware of the action no supported.
I have allowed myself to edit this task to more reflect what this is about. Although the error is of course in my opinion more of a bug because it is so bad but I would rather fix it with this feature.
I actually agree that this makes sense. I mean at least Kleo could say: "Hey we have detected 50 files that are encryped in this folder tree, do you really want to decrypt them all?"
May 10 2021
GnuPG (more precisely gpg-agent) does cache the password for some time in memory. The default is 10 minutes. Add
default-cache-ttl n
where n is the number of seconds to cache the password, to ~/.gnupg/gpg-agent.conf.
May 8 2021
Apr 26 2021
Update:
It looks like OpenSSH version 8 now supports ssh-agent's handling REQUEST_IDENTITIES.
Apr 21 2021
Apr 20 2021
I just realized that my example is incorrect. It doesn't make sense to support multiple issuer subpackets on self signatures. But it is useful to do so on binary signatures and third-party certifications. Here's a better example, which gpg correctly supports. As such, this issue should be closed. Sorry for the noise.
Apr 19 2021
aheinecke: I agree, we should not port everything back just because we could do that.
This has been released with 2.3.0 and no relevant problems have reported in the last two weeks, thus closing.
Apr 18 2021
t-link does not do antthing useful, anyway. I don't think it is justified to add dlopen stuff. Running real test is anyway a manual action; for a full test automation we would need to emulate all supported cards.
Apr 17 2021
the t-link test should dlopen scute.so in runtime rather than link against it in build-time.
Apr 16 2021
As of slibtool commit 9c5ba5eb, scute now builds out of the box. I'd still recommend taking the above into consideration, though.
For what it's worth, scute is in violation of gnu libtool's documentation. Building with gnu libtool:
Apr 15 2021
Making this task up to HIGH priority, so that people can easily find this change in 2.3.0.
Apr 13 2021
In T5394#145082, @werner wrote:Regarding slibtool: I would actually like to have an easier to maintain tool than libtool (of which we use our own version) for GnuPG related software. However, its requirement "the compiler should support -std=c99" is currently a no-starter for libgcrypt and some other libs.
Done for 2.2. and 2.3.
Done in 2.3.0.
Done in 2.3.0.
Done in 2.3.
Apr 12 2021
Apr 9 2021
Mar 28 2021
Hey @wener.. As I mentioned in the original post, there's a default-new-key-algo setting... Is it still not possible to use specify something like "rsa4096/cert,rsa4096/encr,rsa4096/sign,rsa4096/auth"?? Would love to see some progress on this. Glad to help test.
Mar 26 2021
Looks good to me, it no longer returns immediately with the error when there are no readers and the command itself seems to work. Thanks.
Ah, I see that when there is no card reader, it returns "Service is not running" with PC/SC.
Let's fix that.
Mar 25 2021
When testing under Windows "scd devinfo --watch" returns immediately with ERR 100663614 Service is not running <SCD>
Probably also if you would use PC/SC on Linux but I have not tested this.
Mar 22 2021
I was also somewhat surprised to see that the max-cache-ttl options were rendered ineffective my moving the keys to a card.
Mar 16 2021
Mar 11 2021
Thanks for the Gpg4win praise; however we don't have the required resources yet to take this up.
New option --force-sign-key for 2.2.28 and 2.3. Also added support to gpgme.
Mar 9 2021
Pushed to master with two commits:
Actually we considerto remove this feature from the GUI because with the global config we have a more versatile feature now.
Mar 8 2021
and item 6. Now for more testing.
Mar 7 2021
Following @turkja 's advice, here's a python script I wrote that does exactly that:
Mar 6 2021
Fixed typos and applied to master. Thanks.
Mar 5 2021
Items 1 to 5 have now been resolved.
Mar 4 2021
So we now get UTF-8 argv in all GnuPG modules. Globing has been enabled for gpg using our own globing code instead of the ASCII only "int _dowildcard = 1;" mingw way.
Feb 22 2021
In T5286#143493, @shaoyj wrote:Excuse me, where is the link to this blog you mentioned?
@bobwxc wrote:
And I found a blog seems written by the SM2 implementation author of libgcrybt -- Tianjia Zhang. He/She drew a red circle on a standard picture of the Z_A.
Excuse me, where is the link to this blog you mentioned?
Feb 21 2021
In T5286#142947, @werner wrote:We need more information on the why and when of this change. We don't want to maintain different versions of the same algorithm. The I-D expired more than 6 years ago and thus it should not be used as a reference.
Feb 18 2021
I'm sorry, if my wording sounded harsh.
Feb 17 2021
In T1756#143328, @gniibe wrote:In T1756#131862, @whites11 wrote:I understand this is kind of an edge case, but having the possibility to use signed ssh keys would be very useful to me.
??? Do you understand how ssh keys are handled by ssh client and ssh-agent?
In T1756#131862, @whites11 wrote:I understand this is kind of an edge case, but having the possibility to use signed ssh keys would be very useful to me.
Feb 13 2021
Could you tell what is the status of this ticket? Is it planned for the development?
For some users usage is problematic when there are other readers recognized, provided by the OS or hardware platform, and ordered before the target device which in turn blocks access to it.