Page MenuHome GnuPG
Feed Advanced Search

Jan 19 2024

aheinecke closed T6708: Allow to inhibit the use of a default PGP keyserver as Resolved.
Jan 19 2024, 9:39 PM · gnupg24 (gnupg-2.4.4), gnupg22 (gnupg-2.2.42), Restricted Project, vsd, Feature Request
aheinecke added a comment to T6946: gpgv: Help automatic reject too short keys.

The min-rsa option was introduced due because the de-vs compliance allowed 2048 bit until the end of 2023 and we used a trick in our configuration file to switch that relaxed handling off with this year. I don't think that the --ciompliance option is really useful becuase it would also disallow ed25519.

A better option would be an --assert-algo option similar to the --assert-signer which we already have in gpg.

Jan 19 2024, 8:53 PM · gnupg24 (gnupg-2.4.5), Feature Request, gpgv
aheinecke added a comment to T6951: Photo ID capability in Kleopatra.

But thanks for reporting! I really like feature requests so please do not feel discouraged to request more features.

Jan 19 2024, 8:47 PM · Feature Request
aheinecke closed T6951: Photo ID capability in Kleopatra as Wontfix.

Sorry, but this is a "Wontfix" we do not support this by choice. We think that adding photos to certificates both gives a wrong sense like "I know that picture, iit must be this person" and also increases the sizes of the certificates a lot. It is in our opinion a misfeature in the OpnePGP specificationl.

Jan 19 2024, 8:43 PM · Feature Request
andreisrr created T6951: Photo ID capability in Kleopatra.
Jan 19 2024, 2:39 PM · Feature Request
andreisrr created T6949: Kleopatra & GnuPG - higher key sizes made available.
Jan 19 2024, 2:23 PM · Feature Request
werner triaged T6946: gpgv: Help automatic reject too short keys as Normal priority.

I noticed the Debian bug and was about to answer but a feature request is also a good thing.

Jan 19 2024, 12:27 PM · gnupg24 (gnupg-2.4.5), Feature Request, gpgv
ikloecker added a comment to T6708: Allow to inhibit the use of a default PGP keyserver.

I would also suggest that we show the git last git commit in Kleo's About dialog. That makes it far easier to see what we are testing. The Kleo version numbers are a bit arbitrary.

Jan 19 2024, 9:54 AM · gnupg24 (gnupg-2.4.4), gnupg22 (gnupg-2.2.42), Restricted Project, vsd, Feature Request
werner added a comment to T6708: Allow to inhibit the use of a default PGP keyserver.

I would also suggest that we show the git last git commit in Kleo's About dialog. That makes it far easier to see what we are testing. The Kleo version numbers are a bit arbitrary.

Jan 19 2024, 9:03 AM · gnupg24 (gnupg-2.4.4), gnupg22 (gnupg-2.2.42), Restricted Project, vsd, Feature Request
werner added a comment to T6708: Allow to inhibit the use of a default PGP keyserver.

Sorry, it was my fault building the test installer.

Jan 19 2024, 9:01 AM · gnupg24 (gnupg-2.4.4), gnupg22 (gnupg-2.2.42), Restricted Project, vsd, Feature Request
ikloecker added a comment to T6708: Allow to inhibit the use of a default PGP keyserver.

To be clear: This ticket is only about GnuPG (more precisely dirmngr) and the changes are included in VSD and Gpg4win.

Jan 19 2024, 8:34 AM · gnupg24 (gnupg-2.4.4), gnupg22 (gnupg-2.2.42), Restricted Project, vsd, Feature Request

Jan 18 2024

aheinecke added a comment to T6708: Allow to inhibit the use of a default PGP keyserver.

Hi, ebo I would still think this is resolved. Because it was never meant that the user manually enters the value of "none" because there is no hint for the user that "none" is a reserved word. It should either be administratively configured which does not make much sense for Gpg4win or provided by the distribution. If left empty the default of GnuPG should be used. If we really want users to deactivate keyserver access by using "none" in the dirmngr.conf a much better solution would be a checkbox for this. In that case I would open a new issue.

Jan 18 2024, 3:54 PM · gnupg24 (gnupg-2.4.4), gnupg22 (gnupg-2.2.42), Restricted Project, vsd, Feature Request
ebo added a comment to T6708: Allow to inhibit the use of a default PGP keyserver.

The fix was not included in the Testbuid...

Jan 18 2024, 3:33 PM · gnupg24 (gnupg-2.4.4), gnupg22 (gnupg-2.2.42), Restricted Project, vsd, Feature Request
ebo reopened T6708: Allow to inhibit the use of a default PGP keyserver as "Open".
Jan 18 2024, 12:13 PM · gnupg24 (gnupg-2.4.4), gnupg22 (gnupg-2.2.42), Restricted Project, vsd, Feature Request
ebo moved T6708: Allow to inhibit the use of a default PGP keyserver from QA to WiP on the gnupg24 board.
Jan 18 2024, 12:12 PM · gnupg24 (gnupg-2.4.4), gnupg22 (gnupg-2.2.42), Restricted Project, vsd, Feature Request
ebo added a comment to T6708: Allow to inhibit the use of a default PGP keyserver.

Does not work in Gpg4win-4.2.1-beta178

Jan 18 2024, 12:11 PM · gnupg24 (gnupg-2.4.4), gnupg22 (gnupg-2.2.42), Restricted Project, vsd, Feature Request
ebo closed T6736: Year 2038 issue for key validity date, a subtask of T4195: Fix time API in gpgme, as Resolved.
Jan 18 2024, 11:43 AM · gnupg, kleopatra, Restricted Project, gpgme, Feature Request
ebo renamed T6420: Kleopatra: improve layout of and text in smartcard management view from Kleopatra: improvement of smartcard management view to Kleopatra: improve layout of and text in smartcard management view.
Jan 18 2024, 9:43 AM · vsd33 (vsd-3.3.0), Feature Request, Restricted Project, kleopatra

Jan 17 2024

werner added a comment to T6943: Add tool to detect and clean unsolicited copies of smartcard keys.

Example output:

Jan 17 2024, 3:13 PM · gnupg24 (gnupg-2.4.4), Feature Request
werner triaged T6943: Add tool to detect and clean unsolicited copies of smartcard keys as High priority.
Jan 17 2024, 3:10 PM · gnupg24 (gnupg-2.4.4), Feature Request

Jan 16 2024

werner moved T6710: Improve Speedo for Linux to set DT_RUNPATH. from WiP to QA on the gnupg24 board.
Jan 16 2024, 10:49 AM · gnupg24 (gnupg-2.4.4), Feature Request
werner triaged T6941: gpgsm/dirmngr: support for end-entity certificates with an empty "Subject DN" as Normal priority.

Interesting. I need to look closer at it. I scheduled it for 2.4 but it won't be in the forthcoming 2.4.4. There are still other interesting things on the short list (e.g. timestamping support) but we may do that only in 2.6.

Jan 16 2024, 10:47 AM · gnupg26, S/MIME, Feature Request
werner triaged T6940: gpgsm: .p12 AES-256-CBC support as Normal priority.

Thanks for the report. It comes right in time for the next release. It might already be fixed due to a lot of changes in the pkcs#12 parser.

Jan 16 2024, 10:39 AM · gnupg24 (gnupg-2.4.4), Feature Request

Jan 15 2024

zablockil created T6941: gpgsm/dirmngr: support for end-entity certificates with an empty "Subject DN".
Jan 15 2024, 7:19 PM · gnupg26, S/MIME, Feature Request
zablockil created T6940: gpgsm: .p12 AES-256-CBC support.
Jan 15 2024, 6:43 PM · gnupg24 (gnupg-2.4.4), Feature Request
werner triaged T6873: v2.4 unnecessarily prompts on multi-key encryption despite 1st key being unlocked as Normal priority.
Jan 15 2024, 1:58 PM · Feature Request, gnupg24, Bug Report
werner added projects to T6873: v2.4 unnecessarily prompts on multi-key encryption despite 1st key being unlocked: gnupg24, Feature Request.
Jan 15 2024, 1:57 PM · Feature Request, gnupg24, Bug Report
aheinecke closed T6889: gpgme: QGpgMEQuickJob creates keys with wrong expiry as Resolved.

I think this is resolved now.

Jan 15 2024, 10:46 AM · Feature Request, gpgme
ebo added a project to T6420: Kleopatra: improve layout of and text in smartcard management view: vsd33.
Jan 15 2024, 9:40 AM · vsd33 (vsd-3.3.0), Feature Request, Restricted Project, kleopatra

Jan 12 2024

werner moved T5768: Dirmngr: Use windows proxy settings if system proxy settings should be used from Restricted Project Column to Restricted Project Column on the Restricted Project board.
Jan 12 2024, 3:52 PM · Feature Request, gnupg, Restricted Project
werner closed T5768: Dirmngr: Use windows proxy settings if system proxy settings should be used as Resolved.
Jan 12 2024, 3:52 PM · Feature Request, gnupg, Restricted Project
werner moved T6719: Support Proxy-Authorization: Negotiate on Windows from Backlog to WiP on the gnupg24 board.
Jan 12 2024, 3:27 PM · gnupg24, gnupg22, Feature Request, Restricted Project
werner changed the status of T6710: Improve Speedo for Linux to set DT_RUNPATH. from Open to Testing.

Now you can untar and run

Jan 12 2024, 1:55 PM · gnupg24 (gnupg-2.4.4), Feature Request
ebo added a parent task for T6739: Allow "refresh key/signatures" from key's context menu (from key list): T6935: Kleopatra: Key search and refresh related improvements.
Jan 12 2024, 12:18 PM · vsd33 (vsd-3.3.0), Restricted Project, kleopatra, Feature Request

Jan 11 2024

werner moved T6710: Improve Speedo for Linux to set DT_RUNPATH. from Backlog to WiP on the gnupg24 board.
Jan 11 2024, 4:12 PM · gnupg24 (gnupg-2.4.4), Feature Request
werner added a comment to T5085: Filter APDUs in log output.

The extra option --debug-allow-pin-logging was implemented with commit rGe43bd2a7a78.

Jan 11 2024, 4:05 PM · gnupg, Feature Request, scd
werner triaged T6924: Kleopatra: Make columns of subkey details editable as Normal priority.
Jan 11 2024, 8:58 AM · vsd33 (vsd-3.3.0), Feature Request, kleopatra, Restricted Project

Jan 8 2024

werner moved T6059: ntbtls: use of shorter hash for ECC from Backlog to WIP on the ntbtls board.
Jan 8 2024, 2:04 PM · Feature Request, Restricted Project, ntbtls
werner edited projects for T6059: ntbtls: use of shorter hash for ECC, added: Feature Request; removed vsd32.

Yeah we should do an ntbtls release. As a core library it does no matter much which workboard we use. Let's remove it the vsd tag.

Jan 8 2024, 2:01 PM · Feature Request, Restricted Project, ntbtls

Jan 5 2024

arkadesOrg added a comment to T6796: gpg does create socketdir after every operation.

thats great news! I will test the keyword with Archlinux's Builds System (and Fakeroot) as soon as possible!

Jan 5 2024, 6:29 PM · gnupg24 (gnupg-2.4.4), Feature Request
werner moved T5897: Fix MinGW compilation error with 'struct _stat32' in common/sysutils.c from gnupg-2.3.4 from Backlog to done on the gnupg24 board.
Jan 5 2024, 12:05 PM · gnupg24, toolchain, Feature Request, patch
werner moved T3390: Showing complete OpenPGP key flags from Backlog to done on the gnupg24 board.
Jan 5 2024, 12:04 PM · gnupg24, patch, Feature Request
werner moved T3398: fingerprint-based import screener is no defense against malice from Backlog to done on the gnupg24 board.
Jan 5 2024, 12:02 PM · gnupg24, gnupg (gpg23), Feature Request
werner added a comment to T4160: ed488 support.

I sued the done column because we have not assigned it to any milestone.

Jan 5 2024, 12:01 PM · gnupg24, gnupg (gpg23), Feature Request
werner moved T4160: ed488 support from WiP to done on the gnupg24 board.
Jan 5 2024, 12:00 PM · gnupg24, gnupg (gpg23), Feature Request
werner moved T4160: ed488 support from QA to WiP on the gnupg24 board.
Jan 5 2024, 11:59 AM · gnupg24, gnupg (gpg23), Feature Request
werner closed T4160: ed488 support as Resolved.

Fixed a long time ago.

Jan 5 2024, 11:58 AM · gnupg24, gnupg (gpg23), Feature Request
werner changed the status of T6796: gpg does create socketdir after every operation from Open to Testing.

With rG239c1fdc28dcd0dc7aa5341be7c966da2231642a we now have a socketdir keyword for gpgconf.ctl. man gpgconf and look for that file. Will be released with 2.4.4.

Jan 5 2024, 11:39 AM · gnupg24 (gnupg-2.4.4), Feature Request
werner moved T6919: Add support for smartcafe cards from Backlog to QA on the gnupg24 board.
Jan 5 2024, 11:32 AM · gnupg24 (gnupg-2.4.4), Restricted Project, Feature Request, scd

Jan 4 2024

werner triaged T6919: Add support for smartcafe cards as Normal priority.
Jan 4 2024, 4:26 PM · gnupg24 (gnupg-2.4.4), Restricted Project, Feature Request, scd
werner closed T1839: Can't Encrypt with PIV-I Encryption Certificate - Unsupported Certificate as Resolved.

Note that we now have also an option instead of the workaround from 2015

Jan 4 2024, 4:18 PM · dirmngr, gnupg, Feature Request, S/MIME
aheinecke merged T6876: GPGME(++) Add "include-key-block" and "auto-key-import" to context flags into T4856: GPG: Key Exchange Put public OpenPGP key into signature.
Jan 4 2024, 8:50 AM · Feature Request, gpgol, Keyserver, gnupg

Jan 3 2024

ebo added a parent task for T6403: Kleopatra: Warn if a certificate in a group is deleted: T6916: Kleopatra group related improvements.
Jan 3 2024, 12:05 PM · vsd33 (vsd-3.3.0), Restricted Project, Feature Request, kleopatra

Dec 27 2023

gniibe triaged T6909: pinentry: Drop pinentry-emacs support as Normal priority.
Dec 27 2023, 4:01 AM · Feature Request, pinentry, Emacs

Dec 26 2023

gniibe closed T2440: scdaemon grabs card exclusively; it'd be nice if it didn't as Resolved.

GnuPG 2.2 and 2.4 now have --pcsc-shared option for a user who can control his action in detail.
So, closing this bug report.

Dec 26 2023, 7:00 AM · scd, Feature Request, gnupg

Dec 20 2023

andrewgdotcom added a comment to T6900: GnuPG: Accept revocation certificates without UserID.

@aheinecke as promised, attached some test vectors:

Dec 20 2023, 12:42 PM · Feature Request, gnupg

Dec 19 2023

andrewgdotcom added a comment to T6900: GnuPG: Accept revocation certificates without UserID.

This has always worked on the client site since we implemented keyserver access.

Dec 19 2023, 3:57 PM · Feature Request, gnupg
werner added a comment to T6900: GnuPG: Accept revocation certificates without UserID.

I see no problem to return only revocation packets. Clients must verify them anyway against their public keys and the fingerprint makes this easy. Verification against a primary key delivered along the revocation is more or less useless because that primary key must anyway been looked up in the client's keyring and th local existance of a primary key is anyway required to ask a keyserver for a revocation.

Dec 19 2023, 1:49 PM · Feature Request, gnupg
andrewgdotcom added a comment to T6900: GnuPG: Accept revocation certificates without UserID.

The trick here is that during import gpg tracks those invalid signatures and then tries to apply them to other keys.

Dec 19 2023, 1:17 PM · Feature Request, gnupg
werner added a comment to T6900: GnuPG: Accept revocation certificates without UserID.

Appended. Yes, it is considered an invalid signature and ignored. Anyone can insert an invalid signature. The trick here is that during import gpg tracks those invalid signatures and then tries to apply them to other keys. The use case here is this:

Dec 19 2023, 12:56 PM · Feature Request, gnupg
andrewgdotcom added a comment to T6900: GnuPG: Accept revocation certificates without UserID.

If you need the fingerprint, why don't you take it from the revocation certificate - for many years it is in subpacket 33.

Dec 19 2023, 12:51 PM · Feature Request, gnupg
aheinecke added a comment to T6900: GnuPG: Accept revocation certificates without UserID.

Hi, Andre.
...

Thanks for the explanation. To me this sounds very reasonable and I think that I am starting to better understand your use case in Hockeypuck.
Having a test example key + the intended revocation update would help at least me to dig into it a bit and see how this might conflict with RFC4880.

Dec 19 2023, 12:48 PM · Feature Request, gnupg
andrewgdotcom added a comment to T6900: GnuPG: Accept revocation certificates without UserID.

I'm curious about the parsing implications of this bit:

Dec 19 2023, 12:46 PM · Feature Request, gnupg
werner added a comment to T6900: GnuPG: Accept revocation certificates without UserID.

Well, the quoted paragraph ended with a

Dec 19 2023, 12:46 PM · Feature Request, gnupg
andrewgdotcom added a comment to T6900: GnuPG: Accept revocation certificates without UserID.

Individual UID revocation sigs are not particularly useful, because they cannot be validated without the original UID. Such things are out of scope.

Dec 19 2023, 12:04 PM · Feature Request, gnupg
aheinecke added a comment to T6900: GnuPG: Accept revocation certificates without UserID.

Hi,
so I talked to werner about this, and of course GnuPG accepts minimal revocations.
A revocation certificate. So that was my point. As he understood you, you wanted to revoke not the whole key but only a single user id but without the user id packet? Sorry I am not really the protocol expert. But for me a revoked key without any user ids sounds to me just like a "standard" revocation certificate revoking the whole key. And as said, that is well within the the Standard and accepted, and even used by GnuPG. E.g. in case of a keyrollover we attach such a minimal revocation certificate to WKD keys when we deliver key updates.

Dec 19 2023, 11:40 AM · Feature Request, gnupg
aheinecke added a comment to T6900: GnuPG: Accept revocation certificates without UserID.

From a technical standpoint I think the most minimal revocations which are technically possible should be accepted and thus I endorse the feature request.

Dec 19 2023, 9:34 AM · Feature Request, gnupg
bernhard added a comment to T6900: GnuPG: Accept revocation certificates without UserID.

In any case this is technically required

Dec 19 2023, 9:30 AM · Feature Request, gnupg
werner closed T6900: GnuPG: Accept revocation certificates without UserID as Wontfix.

Actually the public key is personalized data as much as a mail address. In any case this is technically required and users take an informed decisions when they distribute their public key to a site not controlled by them.

Dec 19 2023, 9:24 AM · Feature Request, gnupg

Dec 18 2023

aheinecke added a comment to T6900: GnuPG: Accept revocation certificates without UserID.

Just to clarify, above ticket does not reflect my Opinion. It is a direct quote from a different ticket. It is my expert opinion that a combination of "Name <email> + Cryptographic Data" is not a personalised dataset since anyone can create it. But let us please not argue about that.

Dec 18 2023, 8:17 PM · Feature Request, gnupg
aheinecke added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

Perhaps we need to open a new issue for this, to keep the discussion more focused?

Dec 18 2023, 8:07 PM · gnupg (gpg23), Feature Request
aheinecke raised the priority of T6900: GnuPG: Accept revocation certificates without UserID from Normal to Needs Triage.
Dec 18 2023, 8:05 PM · Feature Request, gnupg
aheinecke triaged T6900: GnuPG: Accept revocation certificates without UserID as Normal priority.
Dec 18 2023, 8:05 PM · Feature Request, gnupg
andrewgdotcom added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

@bernhard Following up on discussion elsewhere:

Dec 18 2023, 7:37 PM · gnupg (gpg23), Feature Request

Dec 14 2023

ikloecker added a comment to T6889: gpgme: QGpgMEQuickJob creates keys with wrong expiry.

Werner and Tobias are both correct. If a new subkey is generated from scratch then gpg uses the current time as key creation time and sets the expiration date (in the internal in-memory representation of a public key) to the key creation time plus the expiration value.

Dec 14 2023, 2:01 PM · Feature Request, gpgme
TobiasFella added a comment to T6889: gpgme: QGpgMEQuickJob creates keys with wrong expiry.

Sorry, I should have been more precise in my description of the problem. Specifically with --quick-addkey, gpg's behavior seems to be that the expiration, when given using seconds=... is treated as seconds from now.

Dec 14 2023, 9:25 AM · Feature Request, gpgme

Dec 13 2023

werner added a comment to T6889: gpgme: QGpgMEQuickJob creates keys with wrong expiry.

FWIW, when updating the expiration time gpg does this:

Dec 13 2023, 7:19 PM · Feature Request, gpgme
TobiasFella added a comment to T6889: gpgme: QGpgMEQuickJob creates keys with wrong expiry.

My explanation of gpgme's behavior was not quite correct: Specifically in the QGpgMEQuickJobs for creating (sub)keys, the API uses QDateTimes, which are then converted to seconds since epoch.

Dec 13 2023, 7:14 PM · Feature Request, gpgme
werner added a comment to T6889: gpgme: QGpgMEQuickJob creates keys with wrong expiry.

That's both not correct. gpg takes the expiration time in seconds since creation time. For a new key this is close to the corrent time but not really. For an prolonging an expiration, this is of course different - the creation time of the key needs to be taken in account. I recall that we once had a discussion and agreed to keep it at time after the creation of the key. This avoids problems with the expiration going negative.

Dec 13 2023, 7:06 PM · Feature Request, gpgme
werner added projects to T6889: gpgme: QGpgMEQuickJob creates keys with wrong expiry: gpgme, Feature Request.
Dec 13 2023, 6:52 PM · Feature Request, gpgme

Dec 12 2023

aheinecke edited projects for T4446: please add --quick-revoke-subkey, added: Restricted Project; removed OpenPGP.

We could also use this for T6874: Kleopatra subkey management improvements

Dec 12 2023, 8:20 AM · Restricted Project, gnupg24, Feature Request

Dec 11 2023

aheinecke closed T6350: Kleopatra: disable trust change on not certified keys as Resolved.

I think this works as intended now with the new certify interface. Also if you grant a key full ownertrust as now is the only option the self certification automatically becomes valid so this then shows as certified.

Dec 11 2023, 12:14 PM · Feature Request, kleopatra, Restricted Project

Nov 23 2023

werner added a parent task for T6620: Add a way to extract ECC key parameters from a public key: T6465: Store the ECDH parameters in the key file.
Nov 23 2023, 12:04 PM · Restricted Project, kleopatra, Feature Request, gpgme

Nov 19 2023

dvratil added a comment to T6198: KMail: Port to keyresolver from libkleo.

Just my five cents:

Nov 19 2023, 8:42 PM · Restricted Project, Feature Request, KDE, kleopatra

Nov 17 2023

werner lowered the priority of T4195: Fix time API in gpgme from High to Normal.
Nov 17 2023, 11:01 AM · gnupg, kleopatra, Restricted Project, gpgme, Feature Request
werner edited projects for T4195: Fix time API in gpgme, added: gnupg; removed gnupg22.

This is a generic parent task and does not require workboards for specific branches.

Nov 17 2023, 10:59 AM · gnupg, kleopatra, Restricted Project, gpgme, Feature Request

Nov 16 2023

ikloecker changed the status of T6566: GpgOL: newly generated key not loaded in the security confirmation dialog, a subtask of T6198: KMail: Port to keyresolver from libkleo, from Open to Testing.
Nov 16 2023, 1:23 PM · Restricted Project, Feature Request, KDE, kleopatra

Nov 14 2023

werner closed T4873: Enable AES GCM in FIPS mode as Resolved.
Nov 14 2023, 1:17 PM · FIPS, libgcrypt, Feature Request
werner closed T4873: Enable AES GCM in FIPS mode, a subtask of T5870: libgcrypt: AEAD API for FIPS 140 (in future), as Resolved.
Nov 14 2023, 1:17 PM · Feature Request, FIPS, libgcrypt

Nov 13 2023

werner triaged T6796: gpg does create socketdir after every operation as Normal priority.
Nov 13 2023, 4:18 PM · gnupg24 (gnupg-2.4.4), Feature Request

Nov 10 2023

werner moved T6719: Support Proxy-Authorization: Negotiate on Windows from Backlog to WiP on the gnupg22 board.
Nov 10 2023, 9:11 AM · gnupg24, gnupg22, Feature Request, Restricted Project
werner moved T6545: Support CRL extension issuingDistributionPoint from WiP to Backlog on the gnupg22 board.
Nov 10 2023, 9:08 AM · workaround, gnupg26, Restricted Project, libksba, gnupg22, Feature Request

Nov 9 2023

aheinecke added a comment to T6574: GnuPG / Gpg4win: Replace sha1sum.c with a tool in GnuPG.

So as a replacement for what we have in Kleopatra this would work.

Nov 9 2023, 6:22 PM · Restricted Project, Feature Request, gnupg, gpg4win
werner changed the status of T6736: Year 2038 issue for key validity date, a subtask of T4195: Fix time API in gpgme, from Open to Testing.
Nov 9 2023, 2:17 PM · gnupg, kleopatra, Restricted Project, gpgme, Feature Request

Nov 3 2023

aheinecke updated subscribers of T6574: GnuPG / Gpg4win: Replace sha1sum.c with a tool in GnuPG.

So with my ryzen 9 on tumbleweed:

Nov 3 2023, 4:09 PM · Restricted Project, Feature Request, gnupg, gpg4win

Oct 31 2023

aheinecke added a comment to T6574: GnuPG / Gpg4win: Replace sha1sum.c with a tool in GnuPG.

For a very long time i would have agreed with you. But i now understand the usecase. You misunderstand that feature just like i had. It is not about checksum verification or checking. It is for detecting changes in folder trees so that you know when to reencrypt and update your encrypted archive of that tree. Yes this could be done somewhere else but the usecase is valid for kleopatra.

Oct 31 2023, 11:14 PM · Restricted Project, Feature Request, gnupg, gpg4win
ikloecker added a comment to T6574: GnuPG / Gpg4win: Replace sha1sum.c with a tool in GnuPG.

I would rather like to see the checksum stuff be ripped out of Kleopatra into a simple standalone app. It's complete overkill to start the Kleopatra battleship if the user just wants to calculate or verify a checksum of a downloaded file. The UI of the checksum tool in Kleopatra is anyway still not accessible (T6099: Kleopatra: Make checksum verification accessible). How about we redesign the UI from scratch with accessibility in mind from the start?

Oct 31 2023, 10:17 PM · Restricted Project, Feature Request, gnupg, gpg4win
TobiasFella added a comment to T6574: GnuPG / Gpg4win: Replace sha1sum.c with a tool in GnuPG.

The tobias/gpgsum branch in gnupg now contains my implementation of this. Together with the attached patches to kleopatra and libkleo, it can properly handle unicode filenames on windows. I'll put those patches up for review at KDE in the next days.

Oct 31 2023, 5:02 PM · Restricted Project, Feature Request, gnupg, gpg4win
ebo added a parent task for T6420: Kleopatra: improve layout of and text in smartcard management view: T6785: Kleopatra: Improvements related to smart cards.
Oct 31 2023, 2:25 PM · vsd33 (vsd-3.3.0), Feature Request, Restricted Project, kleopatra

Oct 30 2023

ebo changed the status of T6736: Year 2038 issue for key validity date, a subtask of T4195: Fix time API in gpgme, from Testing to Open.
Oct 30 2023, 4:02 PM · gnupg, kleopatra, Restricted Project, gpgme, Feature Request