cpp: Support new key capability flags
cpp: Support new flags for direct signing/encryption of files
cpp,doc: Fix typos in API documentation and source code comments
cpp,tests: Launch dirmngr with gpg-conf
cpp: Handle smart card op failure status messages
cpp: Add information about revocation keys to Key
qt,cpp: Implement adding ADSKs to existing keys
cpp: Remove commented out and disabled code
cpp: Remove obsolete files
cpp: Fix includes in public headers
Merge branch 'ikloecker/t7118-revkeys'
build,cpp: Create forwarding headers in a gpgme++ folder
cpp: Add safer member function returning text describing an error
cpp: Deprecate Error::asString and update users
cpp: Go with default answer on unknown question by key edit interface
build,cpp: Fix include paths in forwarding headers in gpgme++ folder
cpp: Add support for setting owner trust and for disabling keys
cpp: Add support for new flag fields beta_compliance
cpp: Add pkgconfig file for gpgmepp
cpp: Add/change some includes
Add files for building the project with autotools
cpp: Put attributes before declarations
Avoid clashes of gpgme++ headers with other headers
doc: Fix a few license headers
build: Add support for cmake and remove support for autotools
build: Move common cmake and compiler settings to cmake modules
build: Generate the export header
build: Generate version file and cmake config files with cmake modules
build: Create VERSION file with full version and commit ID
build: Generate and install pkg-config file with cmake
build: Add cmake files for building the tests
build: Add "uninstall" target
build: Add "dist" and "distcheck" targets
build: Generate ChangeLog and add it to the tarball
build: Add the usual Git hooks
build: Add custom targets only on Unix-like systems
build: Add "gen-swdb", "release", and "sign-release" targets
chacha20: add RISC-V vector intrinsics implementation
Add SHA3 acceleration for RISC-V Zbb extension
Add GHASH RISC-V Zbb+Zbc implementation
Add RISC-V vector permute AES
bithelp: add count trailing zero bits variant for RISC-V
hwf: add detection of RISC-V (64-bit) hardware features
l10n daemon script <scripty@kde.org> committed
rKLEOPATRA52492f8d70dc: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
cipher: Check and mark non-compliant cipher modes in the SLI
l10n daemon script <scripty@kde.org> committed
rKLEOPATRAc61599029ba4: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
l10n daemon script <scripty@kde.org> committed
rKLEOPATRAed2761119997: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
l10n daemon script <scripty@kde.org> committed
rKLEOPATRAc41559f44e15: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
I created
The commit rC6dffd105e2e2 works for me.
It is a bit of exponent at time Montgomery exponentiation.
I don't put an optimization for the reduction as I don't know if it's OK for patent-wise (looks like expired, though).
l10n daemon script <scripty@kde.org> committed
rKLEOPATRA66056d725243: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
Port away from CertificateRequester
If you encounter real world certificates with these parameters we can bump up the priority.
Why do we need a word list if we are a password storage tool?
l10n daemon script <scripty@kde.org> committed
rKLEOPATRA9e84b3a4523e: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
Rename eff_large wordlist to en
Select local wordlist if it exists
Ensure QRegularExpression are only created once
Add german word list for passphrase generator
Avoid detaching in for loops
Fix highlight of password store entry delegate
Replace usage of deprecated Error::asString()
build: Explicitly look for gpgmepp
• ebo moved
T6894: Kleopatra improved drop behavior from
Restricted Project Column to
Restricted Project Column on the
Restricted Project board.
In contrast to Gpg4win 4.4 in VSD 3.3.0 dragging a plain file onto Kleopatra will return an error. Decryption and importing certificates works, though.
Port away from CertificateRequester
Port away from CertificateRequester
There is a new report where mails are not shown with the following settings:
Fix some cases of error messages for sign/encrypt operations
• werner updated the task description for
T7255: Release GnuPG 2.2.45.
• werner updated the task description for
T7255: Release GnuPG 2.2.45.
build: Fix generation of ChangeLog on secondary working trees
• ebo renamed
T7491: Kleopatra: Confusing additional pinentry on creation of new keypair with ADSK configured from
Kleopatra: Confusing additional pinentry on while new keypair with ADSK configured to
Kleopatra: Confusing additional pinentry on creation of new keypair with ADSK configured .
msi: Fix location of shield.ico and do not depend on sign.mk
l10n daemon script <scripty@kde.org> committed
rKLEOPATRA49da3b247369: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
l10n daemon script <scripty@kde.org> committed
rKLEOPATRA8da58252a0f8: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
certifygroupcommand: Remove space before ellipsis
Kleopatra has no influence on this. This does surely also happen when a new keypair is created on the command line.
Works as well for VS-Desktop-3.2.94.481-Beta
agent: Fix ssh-agent's request_identities for skipped keys.
Port away from CertificateRequester
In VS-Desktop-3.2.94.481-Beta the feature is not available in the context menu in Kleopatra.
So in VSD 3.3.0 this will be missing. What works is disable/enable on the command line and Kleopatra will then not list a disabled certificate with most filters.
VS-Desktop-3.2.94.481-Beta: OK
VS-Desktop-3.2.94.481-Beta: OK