My actual plan is to rework the imp[ort/export of secret keys to gpg-agent. Right now gpg-agent has knowledge of OpenPGP for import/export. This is not good and the required conversion should be moved to a helper tools for easier testing and to have this out of the gpg-agent process. For Kyber we right now don't use any conversion mut store the secret keys in gpg-agent's native format. Thus the passphrase is not necessary. We need to figure out why we have this problem here.
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Advanced Search
Wed, Jan 28
Tue, Jan 27
This ticket is explicitly about Kleopatra included in Gpg4win.
In T8059#212270, @bernhard wrote:Kleopatra is also run on GNU/Linux Distributions.
Kleopatra is also run on GNU/Linux Distributions.
Mon, Jan 26
This is still open. It cannot be tested because Gpg4win still doesn't use KIO::move on Windows (because the above patch has not yet been merged).
I think this is still open (and requires T6537: Make KIO::move work on Windows when moving between different partitions).
Fri, Jan 23
While key generation works now with an expiry date up to 2106-02-04, the representation on the command line is a bit ugly.
Current state needs to be tested
We need to test the current state
Thu, Jan 22
Fixed and backported for VSD 3.4
Backported for VSD 3.4
I have split out the "Tab navigation in the Smartcard Dialog is broken" issue because it's unrelated to this ticket: T8051: Kleopatra: Tab navigation in smartcard table is broken
Backported for VSD 3.4
I think this is a very good idea. Go ahead an backport, I'll change the ticket description accordingly.
Wed, Jan 21
We need to retest this with vsd34 as @ikloecker backported some tab related things after the 3.3.4 release.
Backported for VSD 3.4
I'll wait for feedback before I backport this.
Instead of adding yet another option I have optimized the case that a single archive containing a single top-level folder is decrypted/extracted (which, typically, is the result of encrypting a folder). In this case, the single top-level folder extracted from the archive is moved to the user-given output folder instead of the outer temporary folder the archive was extracted to. I think that's what most users anyway expect so that an option is superfluous. In case the extracted folder clashes with an existing folder in the user-given output folder then, as usual, the moved folder gets a numbered suffix to avoid the naming collision.
I'm fine with the current state in 5.0, I could live with keeping it like that for GPD, i.e. the import list (which will not be used often, anyway) has it's on memory.
In T7455#211913, @ikloecker wrote:In T7455#211465, @timegrid wrote:Issues found:
- The "Finish" button in the "Sign/Encrypt" dialog turns to "Sign/Encrypt" sometimes after successful execution:
I've seen this at least once. No really related to this ticket, but I'll have a quick look.
In T7455#211465, @timegrid wrote:Issues found:
- If pgp is preselected, the "Sign..." operation will also check "Encrypt for others":
Implemented and backported for VSD 3.4
It also happens on CLI:
With Gpg4win 5.0.0 the LISTKEYS after the server lookup lists the (ephemeral?) ca@gnupg.test certificate and (!) the bob@gnupg.test certificate (and some other certificates, but I guess those are from other tests).
- VSD 3.3.4
- Gpg4win 5.0.0
Jan 20 2026
- gpg4win 5.0.0 @ win11
gpgme logs (also of vsd-3.3.4) will be useful.
I have not checked but I guess that the certificate is marked as ephemeal and kleopatra either lists ephemeral certificates or the ephemeral flag got removed to to a validation process,
Note: This does not happen on vsd-3.3.4
Fixed and backported for VSD 3.4
Jan 19 2026
The gpgme logs show that the information for revoked keys should be there. We just need to check for it (and somehow visualize it).
pub:o:3072:1:3DA05D6B0A5998AF:1768822823:1863514800:::::::: fpr:::::::::C70F6D8F32DFE96F5C47C40B3DA05D6B0A5998AF: uid:o::::::::search (valid) <search@gnupg.test>\r:
gpgme.log (vsd 3.3.4):
Fixed.
Another possibility would be to just add a revoked column (expiration date is already shown) to keep closer to the ldap schema.