Page MenuHome GnuPG
Feed Advanced Search

Apr 22 2022

gniibe closed T5884: dotlock is not perfect (errornously remove .lock as stale lockfile) as Resolved.
Apr 22 2022, 6:44 AM · Bug Report, gnupg (gpg23)
gniibe closed T5884: dotlock is not perfect (errornously remove .lock as stale lockfile), a subtask of T5109: Initial socket connection to server, as Resolved.
Apr 22 2022, 6:44 AM · gnupg24, gnupg (gpg23)
gniibe added a comment to T5935: scd: SSH emulation of gpg-agent doesn't work well with sntrup761x25519-sha512@openssh.com.

I confirmed that the patch above works with newer Gnuk (>= 1.2.16).

Apr 22 2022, 4:49 AM · workaround, gnupg (gpg23), ssh, Bug Report, scd

Apr 21 2022

werner set External Link to https://lists.gnupg.org/pipermail/gnupg-announce/2022q2/000472.html on T5743: Release GnuPG 2.3.5.
Apr 21 2022, 6:17 PM · Release Info, gnupg (gpg23)
werner closed T5743: Release GnuPG 2.3.5 as Resolved.
Apr 21 2022, 5:59 PM · Release Info, gnupg (gpg23)
werner triaged T5937: Release GnuPG 2.3.6 as Low priority.
Apr 21 2022, 5:53 PM · Release Info, gnupg (gpg23)
ikloecker added a task to D552: gpg: Support specifiying user ID to revoke as UID hash for --quick-revoke-uid: T5936: gpg: Support specifiying user ID to revoke as UID hash for --quick-revoke-uid.
Apr 21 2022, 4:50 PM · gnupg (gpg23)
ikloecker added a revision to T5936: gpg: Support specifiying user ID to revoke as UID hash for --quick-revoke-uid: D552: gpg: Support specifiying user ID to revoke as UID hash for --quick-revoke-uid.
Apr 21 2022, 4:50 PM · gnupg (gpg23), Restricted Project, Feature Request
ikloecker placed T5936: gpg: Support specifiying user ID to revoke as UID hash for --quick-revoke-uid up for grabs.
Apr 21 2022, 4:50 PM · gnupg (gpg23), Restricted Project, Feature Request
ikloecker requested review of D552: gpg: Support specifiying user ID to revoke as UID hash for --quick-revoke-uid.
Apr 21 2022, 4:49 PM · gnupg (gpg23)
ikloecker created T5936: gpg: Support specifiying user ID to revoke as UID hash for --quick-revoke-uid.
Apr 21 2022, 4:43 PM · gnupg (gpg23), Restricted Project, Feature Request
werner added a project to T5935: scd: SSH emulation of gpg-agent doesn't work well with sntrup761x25519-sha512@openssh.com: gnupg (gpg23).
Apr 21 2022, 7:35 AM · workaround, gnupg (gpg23), ssh, Bug Report, scd

Apr 19 2022

gniibe moved T5929: gnupg fails to add ssh key to control entry in FIPS mode with libgcrypt 1.10.1 from Backlog to Next on the FIPS board.
Apr 19 2022, 11:07 AM · FIPS, gnupg (gpg23), Bug Report

Apr 14 2022

werner triaged T5930: Use the FIPS-compatible digest&sign API as Normal priority.

Passing fds etc adds complex extra code to gpg-agent. This was not the original design goal, although we violated this anyway by have some OpenPGP specific code there. This needs more thinking. Due to our internal use of OCB we can't make it FIPS compliant without large changes.

Apr 14 2022, 1:42 PM · FIPS, Feature Request
werner triaged T5931: OpenSSH 8.9, 9.0, and 9.1 can't authenticate with gpg-agent and usb token (Gnuk >= 1.2.16 is required) as High priority.

I have not yet tested OpenSSH 9 and thus the patch to master is here just as a test. Please better use gnupg 2.3 (stable) instead of 2.2 (LTS) because it is unlikely that we will backport all this new ssh stuff.

Apr 14 2022, 12:36 PM · gnupg24, workaround, Documentation, gnupg (gpg23), ssh, gpgagent
gniibe claimed T5929: gnupg fails to add ssh key to control entry in FIPS mode with libgcrypt 1.10.1.

Patches applied and pushed. For the common/t-ssh-utils, I applied my fix for the use case with key on command line when FIPS mode is enabled (MD5 error is OK, in this case).

Apr 14 2022, 4:45 AM · FIPS, gnupg (gpg23), Bug Report

Apr 13 2022

Jakuje created T5930: Use the FIPS-compatible digest&sign API.
Apr 13 2022, 7:54 PM · FIPS, Feature Request
Jakuje added a project to T5929: gnupg fails to add ssh key to control entry in FIPS mode with libgcrypt 1.10.1: FIPS.
Apr 13 2022, 4:15 PM · FIPS, gnupg (gpg23), Bug Report
Jakuje created T5929: gnupg fails to add ssh key to control entry in FIPS mode with libgcrypt 1.10.1.
Apr 13 2022, 4:14 PM · FIPS, gnupg (gpg23), Bug Report

Apr 12 2022

smlx added a comment to T5555: Cannot add existing ECDSA key as a signing subkey.

For anyone stumbling across this issue I created a docker image containing gpg with the patch above applied: https://github.com/smlx/gnupg-piv-agent

Apr 12 2022, 3:59 AM · gnupg24, Bug Report

Apr 7 2022

gniibe added projects to T5921: No sharing of log_fd between child process: gnupg (gpg23), Bug Report.
Apr 7 2022, 8:39 AM · Bug Report, gnupg (gpg23)

Mar 29 2022

gniibe added projects to T5029: server socket/pipe handling in GnuPG: Restricted Project, Windows.
Mar 29 2022, 2:59 AM · Windows, scd, gnupg (gpg23)
gniibe added a project to T5029: server socket/pipe handling in GnuPG: scd.
Mar 29 2022, 2:59 AM · Windows, scd, gnupg (gpg23)
gniibe added a comment to T5029: server socket/pipe handling in GnuPG.

The patch I proposed was partial one, not fully solved the problem of socket resource leak on Windows.

Mar 29 2022, 2:59 AM · Windows, scd, gnupg (gpg23)

Mar 25 2022

gniibe removed a project from T5531: dirmngr --validate broken for DER encoded files: Restricted Project.
Mar 25 2022, 11:45 PM · gnupg (gpg23), dirmngr, Bug Report
werner triaged T5898: Two fixes for the gnupg-2.3.4 test suite when running on MS-Windows as Normal priority.
Mar 25 2022, 1:28 PM · Windows, gnupg (gpg23), Bug Report
werner triaged T5894: Various issues with system headers and _WIN32_WINNT value in MinGW build of gnupg-2.3.4 as Normal priority.
Mar 25 2022, 1:27 PM · gnupg, Feature Request
fvogt closed T5531: dirmngr --validate broken for DER encoded files as Resolved.

Confirmed to work, thanks!

Mar 25 2022, 9:54 AM · gnupg (gpg23), dirmngr, Bug Report
gniibe claimed T5701: Mismatch between enums and config table.

Thank you. Applied.

Mar 25 2022, 6:31 AM · gnupg (gpg23), Bug Report
gniibe claimed T5538: gpg-agent's keytocard cmd should use a better default creation time..

Implemented.

Mar 25 2022, 6:16 AM · gpgagent, gnupg (gpg23)
gniibe closed T5439: Bug of t-keydb.c as Invalid.
Mar 25 2022, 5:13 AM · gnupg (gpg23)
gniibe added a comment to T5531: dirmngr --validate broken for DER encoded files.

it still shows the no certificate or invalid encoded error message:

Mar 25 2022, 12:42 AM · gnupg (gpg23), dirmngr, Bug Report

Mar 24 2022

fvogt added a comment to T5531: dirmngr --validate broken for DER encoded files.

I gave it a try. It works now, but it still shows the no certificate or invalid encoded error message:

Mar 24 2022, 9:50 AM · gnupg (gpg23), dirmngr, Bug Report
gniibe merged T5673: Using empty passphrase key pair, gpg2.2.9 fails to decrypt with error "No secret key" on a gpg1.4/2.0 keyring format even though the secret keys migration was successful into T5804: Using empty passphrase key pair, gpg2.3.4 fails to decrypt with error "No passphrase given" on a gpg1.4/2.0 keyring format even though the secret keys migration was successful .
Mar 24 2022, 6:02 AM · gnupg24, Bug Report
gniibe claimed T5531: dirmngr --validate broken for DER encoded files.

Thank you. Confirmed.

Mar 24 2022, 5:57 AM · gnupg (gpg23), dirmngr, Bug Report
gniibe closed T5573: kbxutil shows [bad] checksum as Resolved.
Mar 24 2022, 5:47 AM · gnupg (gpg23)
gniibe added a project to T5888: uid changed from [ultimate] to [ unknown]: Restricted Project.

Thank you for the reproducible test case. Confirmed.

Mar 24 2022, 5:23 AM · gnupg (gpg23), Bug Report
gniibe claimed T5888: uid changed from [ultimate] to [ unknown].
Mar 24 2022, 5:11 AM · gnupg (gpg23), Bug Report

Mar 23 2022

gniibe removed a project from T5804: Using empty passphrase key pair, gpg2.3.4 fails to decrypt with error "No passphrase given" on a gpg1.4/2.0 keyring format even though the secret keys migration was successful : Info Needed.
Mar 23 2022, 9:09 AM · gnupg24, Bug Report
gniibe added a comment to T5804: Using empty passphrase key pair, gpg2.3.4 fails to decrypt with error "No passphrase given" on a gpg1.4/2.0 keyring format even though the secret keys migration was successful .

Thank you.

Mar 23 2022, 7:11 AM · gnupg24, Bug Report

Mar 22 2022

eliz added a comment to T5897: Fix MinGW compilation error with 'struct _stat32' in common/sysutils.c from gnupg-2.3.4.

I guess I don't understand what you mean by "native building". This build was with MinGW, which is as "native" as MinGW64 is.
The reason for the problem is (AFAIU) that MinGW64 went after Microsoft's change in stat due to the 32-bit vs 64-bit time and off_t values issue.s That change breaks backward compatibility in more than one way: programs compiled on some versions of Windows will not run on other versions. mingw.org's MinGW kept the original semantics and symbols, which is why _stat32 exists in the mingw.org's headers, but is not exposed by default.

Mar 22 2022, 1:52 PM · gnupg24, toolchain, Feature Request, patch
werner triaged T5897: Fix MinGW compilation error with 'struct _stat32' in common/sysutils.c from gnupg-2.3.4 as Normal priority.

Turned into a feature request because native building on Windows is not supported.

Mar 22 2022, 11:49 AM · gnupg24, toolchain, Feature Request, patch
werner added projects to T5898: Two fixes for the gnupg-2.3.4 test suite when running on MS-Windows: gnupg (gpg23), Windows.
Mar 22 2022, 7:45 AM · Windows, gnupg (gpg23), Bug Report

Mar 21 2022

gniibe added a comment to T5884: dotlock is not perfect (errornously remove .lock as stale lockfile).

Now, the problem is not about the case of pid == getpid () any more.

Mar 21 2022, 9:56 AM · Bug Report, gnupg (gpg23)
werner added a comment to T5884: dotlock is not perfect (errornously remove .lock as stale lockfile).

That would be bad for unattended use cases. Recording the time the lock file was created might be a solution. Then cleanup only after 15 minutes or so.

Mar 21 2022, 8:37 AM · Bug Report, gnupg (gpg23)
gniibe added a comment to T5884: dotlock is not perfect (errornously remove .lock as stale lockfile).

Note that there is a race condition still (after a fix of one race condition which may be somewhat likely and reproducible, and another fix of race condition when there is a stale lockfile).

Mar 21 2022, 5:16 AM · Bug Report, gnupg (gpg23)
gniibe added a comment to T5884: dotlock is not perfect (errornously remove .lock as stale lockfile).

Fixed another race in commit: rG2f1afc129662: common: Fix another race condition, and address the other one.

Mar 21 2022, 5:09 AM · Bug Report, gnupg (gpg23)

Mar 19 2022

engel97 added a comment to T5804: Using empty passphrase key pair, gpg2.3.4 fails to decrypt with error "No passphrase given" on a gpg1.4/2.0 keyring format even though the secret keys migration was successful .

{F3381469}I uploaded the whole homedir containing the keys after they were migrated by the new gnupg2.3.4. It should have all of the keys in there. Don't worry, these keys are just for testing and not used anywhere.

Mar 19 2022, 4:21 AM · gnupg24, Bug Report

Mar 18 2022

gniibe added a comment to T5884: dotlock is not perfect (errornously remove .lock as stale lockfile).

Before the fix above, https://bugs.debian.org/972525 can be explained by the following scenario:

Mar 18 2022, 7:59 AM · Bug Report, gnupg (gpg23)
gniibe added a project to T5884: dotlock is not perfect (errornously remove .lock as stale lockfile): Restricted Project.

Fixed in master. Should be backported when found stable.

Mar 18 2022, 6:59 AM · Bug Report, gnupg (gpg23)
gniibe added a comment to T5884: dotlock is not perfect (errornously remove .lock as stale lockfile).

I pushed a change for t-dotlock.c for testing.

Mar 18 2022, 4:41 AM · Bug Report, gnupg (gpg23)
gniibe updated the task description for T5884: dotlock is not perfect (errornously remove .lock as stale lockfile).
Mar 18 2022, 2:22 AM · Bug Report, gnupg (gpg23)
gniibe updated the task description for T5884: dotlock is not perfect (errornously remove .lock as stale lockfile).
Mar 18 2022, 2:21 AM · Bug Report, gnupg (gpg23)
gniibe triaged T5884: dotlock is not perfect (errornously remove .lock as stale lockfile) as High priority.
Mar 18 2022, 2:19 AM · Bug Report, gnupg (gpg23)

Mar 17 2022

gniibe added a project to T5804: Using empty passphrase key pair, gpg2.3.4 fails to decrypt with error "No passphrase given" on a gpg1.4/2.0 keyring format even though the secret keys migration was successful : Info Needed.
Mar 17 2022, 1:53 AM · gnupg24, Bug Report

Mar 16 2022

gniibe added a comment to T5804: Using empty passphrase key pair, gpg2.3.4 fails to decrypt with error "No passphrase given" on a gpg1.4/2.0 keyring format even though the secret keys migration was successful .

I can't replicate this symptom (gpg1 generated key, no problem after migration).
Could you share the *.key file under private-keys-v1.d?

Mar 16 2022, 10:15 AM · gnupg24, Bug Report

Mar 9 2022

werner added a comment to T5856: Forcing aead when creating sign & encrypted files creates inconsistent results.

Reagarding the OpenPGP specs: there is a new draft with LOTS of changes to already agreed upon formats and conducted interop tests. Almost everything we implemented in GnuPG and RNP has had rough consensus in the WG. Minor things like AEAD chunk size were the contested pieces. However, now they want to change everything with the possible outcome of discretization the long established trust in the stability and durability of the PGP data and key format.

Mar 9 2022, 2:19 PM · gnupg (gpg23), Bug Report
gniibe changed the status of T5856: Forcing aead when creating sign & encrypted files creates inconsistent results from Open to Testing.
Mar 9 2022, 3:13 AM · gnupg (gpg23), Bug Report
gniibe added a comment to T5856: Forcing aead when creating sign & encrypted files creates inconsistent results.

Sorry. While v5 things in the specification is still in flux, from the viewpoint of the implementation, this patch is 100% valid and it makes sense.

Mar 9 2022, 3:12 AM · gnupg (gpg23), Bug Report

Mar 8 2022

gniibe added a comment to T5856: Forcing aead when creating sign & encrypted files creates inconsistent results.

Thank you for the report.

Mar 8 2022, 10:40 AM · gnupg (gpg23), Bug Report

Mar 7 2022

gniibe claimed T5856: Forcing aead when creating sign & encrypted files creates inconsistent results.
Mar 7 2022, 11:23 AM · gnupg (gpg23), Bug Report
gniibe lowered the priority of T5704: Ed448/X448 defined in draft-ietf-openpgp-crypto-refresh-04 from High to Normal.
Mar 7 2022, 11:17 AM · gnupg24, OpenPGP, gnupg (gpg23)
gniibe triaged T5590: OpenPGP: Curve 448, modernize? as Normal priority.
Mar 7 2022, 11:15 AM · rationale, gnupg, OpenPGP

Mar 2 2022

jukivili closed T5852: Use iobuf_copy where instead of manual iobuf_get/iobuf_put or iobuf_read/iobuf_write loops as Resolved.
Mar 2 2022, 8:17 PM · gnupg (gpg23)
dpereira added a comment to T4588: gpg-agent should guess pinentry's full path (using $PATH) if `pinentry-program` does not supply a full path.

What about at least accepting env variables OR tilde expansions? That will make it easier to integrate with dotfiles that intentionally use a home-dir based executable without having to pass the full path, so it could work cross platforms.

Mar 2 2022, 8:12 PM · gnupg24, gpgagent

Mar 1 2022

gniibe changed the status of T5853: Decrypting OCB encrypted file fails... from Open to Testing.
Mar 1 2022, 5:04 AM · gnupg (gpg23), Bug Report
gniibe added a comment to T5852: Use iobuf_copy where instead of manual iobuf_get/iobuf_put or iobuf_read/iobuf_write loops.

No problem. Both patches look good.

Mar 1 2022, 3:14 AM · gnupg (gpg23)

Feb 27 2022

jukivili updated subscribers of T5852: Use iobuf_copy where instead of manual iobuf_get/iobuf_put or iobuf_read/iobuf_write loops.

Does these patches look ok? @gniibe @werner

Feb 27 2022, 5:55 PM · gnupg (gpg23)

Feb 24 2022

jukivili added a comment to T5853: Decrypting OCB encrypted file fails....

Thanks. All my tests work now.

Feb 24 2022, 6:01 PM · gnupg (gpg23), Bug Report
werner closed T5820: Slow symmetric decryption speed as Resolved.
Feb 24 2022, 2:15 PM · gnupg (gpg23), Bug Report
werner added a comment to T5820: Slow symmetric decryption speed.

Cool. I did some quick tests with 2.2 on my pretty old X220 and it really makes sense to apply the patch there as well.:

Feb 24 2022, 2:07 PM · gnupg (gpg23), Bug Report
werner edited projects for T5852: Use iobuf_copy where instead of manual iobuf_get/iobuf_put or iobuf_read/iobuf_write loops, added: gnupg (gpg23); removed gnupg.
Feb 24 2022, 12:43 PM · gnupg (gpg23)
werner triaged T5856: Forcing aead when creating sign & encrypted files creates inconsistent results as High priority.
Feb 24 2022, 10:34 AM · gnupg (gpg23), Bug Report
Jakuje updated the task description for T5856: Forcing aead when creating sign & encrypted files creates inconsistent results.
Feb 24 2022, 9:10 AM · gnupg (gpg23), Bug Report
Jakuje created T5856: Forcing aead when creating sign & encrypted files creates inconsistent results.
Feb 24 2022, 9:10 AM · gnupg (gpg23), Bug Report

Feb 23 2022

gniibe added a comment to T5853: Decrypting OCB encrypted file fails....

It was the bug of generating AEAD packet, which does:

Feb 23 2022, 1:33 AM · gnupg (gpg23), Bug Report
gniibe triaged T5853: Decrypting OCB encrypted file fails... as High priority.

Sorry for pushing immature fix. I located the cause, but I didn't have enough concentration for fix.

Feb 23 2022, 1:17 AM · gnupg (gpg23), Bug Report
gniibe claimed T5853: Decrypting OCB encrypted file fails....
Feb 23 2022, 1:14 AM · gnupg (gpg23), Bug Report

Feb 22 2022

jukivili added a comment to T5853: Decrypting OCB encrypted file fails....

Just more background what I'm doing with these tests. I started testing with set of different sized test files (generated from urandom) to detect any bugs in my changes, which try to reduce amount of memory copies in iobuf_read/iobuf_write. Size ranges for these test-files are 0...17408, 32256...66560 and 130560...132096 bytes. These files are encrypted with different settings (public key/symmetric/cfb/ocb/different algos) and then decrypted and decrypted file compared to original.

Feb 22 2022, 6:08 PM · gnupg (gpg23), Bug Report
jukivili added a comment to T5853: Decrypting OCB encrypted file fails....

I tested the fix. It appears to break OCB encrypting files shorter than 65515 bytes:

$ gpg --batch --symmetric --passphrase=bug --output=enc_065514.gpg --rfc4880bis --force-aead --cipher-algo AES128 --compress-algo none plain_065514
$ ls -laF *065514*
-rw-rw-r-- 1 jussi jussi   100 Feb  22 18:51 enc_065514.gpg
-rw-rw-r-- 1 jussi jussi 65514 Feb  22 18:42 plain_065514
$ sha256sum plain_065514
5711955703f4d96f510ad5a660c3ccd0d01f0b2dd2561ba6586159ad941cbcde  plain_065514
$ gpg --batch --decrypt --passphrase=bug --output=- enc_065514.gpg | sha256sum
gpg: AES.OCB encrypted session key
gpg: encrypted with 1 passphrase
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855  -
Feb 22 2022, 5:54 PM · gnupg (gpg23), Bug Report

Feb 21 2022

jukivili created T5853: Decrypting OCB encrypted file fails....
Feb 21 2022, 7:07 PM · gnupg (gpg23), Bug Report

Feb 17 2022

irl added a comment to T5837: gpg-card: Authenticate to PIV applet with non-3DES card management key.

Setting the management key has been implemented only for Yubikeys. So for Gemalto this won't work.

Feb 17 2022, 11:20 AM · gnupg24, scd, Feature Request
werner claimed T5837: gpg-card: Authenticate to PIV applet with non-3DES card management key.
Feb 17 2022, 10:49 AM · gnupg24, scd, Feature Request
gniibe closed T5393: gnupg coverity static analysis reports as Resolved.
Feb 17 2022, 5:50 AM · gnupg (gpg23), Bug Report
gniibe closed T5742: Apparent regressions between 2.2.32 and 2.2.33 of GnuPG as Resolved.
Feb 17 2022, 5:46 AM · Restricted Project, Bug Report, gnupg (gpg23)

Feb 8 2022

motp added a comment to T5494: gpg-agent doesn't support security-key (sk) key types.

It would be awesome if you could implement this \o/

Feb 8 2022, 4:40 PM · gnupg24, gnupg (gpg23), Feature Request, ssh
werner triaged T5820: Slow symmetric decryption speed as High priority.

Let's try this for 2.3

Feb 8 2022, 8:20 AM · gnupg (gpg23), Bug Report

Jan 28 2022

werner lowered the priority of T5804: Using empty passphrase key pair, gpg2.3.4 fails to decrypt with error "No passphrase given" on a gpg1.4/2.0 keyring format even though the secret keys migration was successful from High to Normal.
Jan 28 2022, 7:20 AM · gnupg24, Bug Report
werner added projects to T5804: Using empty passphrase key pair, gpg2.3.4 fails to decrypt with error "No passphrase given" on a gpg1.4/2.0 keyring format even though the secret keys migration was successful : gnupg (gpg23), Bug Report.
Jan 28 2022, 7:20 AM · gnupg24, Bug Report

Jan 22 2022

werner closed T5588: GnuPG 2.3.2 --disable-tofu --disable-sqlite unusable as Resolved.
Jan 22 2022, 6:19 PM · gnupg (gpg23), Gentoo, Bug Report

Jan 20 2022

werner triaged T5718: Provide list of supported/compliant key algorithms as Normal priority.
Jan 20 2022, 8:37 PM · gnupg24, gnupg (gpg23), Feature Request
werner renamed T5764: Broken umlauts in the new Windows Terminal from Broken umlauts to Broken umlauts in the new Windows Terminal.
Jan 20 2022, 8:23 PM · gnupg24, i18n, gnupg (gpg23), Bug Report, gpg4win

Jan 18 2022

werner triaged T5790: Cannot use "Retired Cert Key Mgm [1-20]” Slots on YubiKey as Normal priority.
Jan 18 2022, 7:20 AM · gnupg24, gnupg (gpg23), scd, Feature Request

Jan 17 2022

aheinecke closed T4777: Pinentry sometimes mixes languages as Resolved.

Saw this again and the commit was not in the Stable 2.2 branch. I have cherry picked it. This should resolve this issue.

Jan 17 2022, 9:02 AM · gnupg (gpg23), S/MIME, gpgagent
gniibe added a project to T5742: Apparent regressions between 2.2.32 and 2.2.33 of GnuPG: Restricted Project.

Backported to 2.2, too.

Jan 17 2022, 6:24 AM · Restricted Project, Bug Report, gnupg (gpg23)

Jan 12 2022

werner claimed T5718: Provide list of supported/compliant key algorithms.
Jan 12 2022, 8:40 PM · gnupg24, gnupg (gpg23), Feature Request
werner added a comment to T5718: Provide list of supported/compliant key algorithms.

No, these are simply the technically available algorithms. I'll see what I can do.

Jan 12 2022, 8:40 PM · gnupg24, gnupg (gpg23), Feature Request
werner added a comment to T5742: Apparent regressions between 2.2.32 and 2.2.33 of GnuPG.

Thanks for diving into the history of that code.

Jan 12 2022, 8:55 AM · Restricted Project, Bug Report, gnupg (gpg23)
gniibe added a comment to T5742: Apparent regressions between 2.2.32 and 2.2.33 of GnuPG.

Here is the backport to 2.2:

Jan 12 2022, 7:35 AM · Restricted Project, Bug Report, gnupg (gpg23)
gniibe added a comment to T5742: Apparent regressions between 2.2.32 and 2.2.33 of GnuPG.

In the original code, register_trusted_keyid is used in keygen.c, so that it updates user_utk_list, thus, will be into utk_list.
This should be done, by adding the keyid to utk_list directly.

Jan 12 2022, 5:41 AM · Restricted Project, Bug Report, gnupg (gpg23)