Page MenuHome GnuPG
Feed Advanced Search

May 29 2018

tookmund added a project to T4001: Import and Export for python bindings: gpgme.
May 29 2018, 5:27 PM · gpgme, patch, Python, Feature Request
tookmund created T4001: Import and Export for python bindings.
May 29 2018, 5:08 PM · gpgme, patch, Python, Feature Request
JJworx updated the task description for T3999: automatically turn on/offer encryption if recipients' keys are known.
May 29 2018, 12:56 PM · gpgol, Feature Request
JJworx created T3999: automatically turn on/offer encryption if recipients' keys are known.
May 29 2018, 12:55 PM · gpgol, Feature Request

May 28 2018

werner raised the priority of T3622: --export-options export-minimal,export-clean includes unusable subkeys from Normal to High.
May 28 2018, 7:11 PM · Feature Request, gnupg (gpg22)
werner added a comment to T3277: decrypting data symmetrically doesn't reliably convey confidentiality property.

From the autocrypt page:

May 28 2018, 7:09 PM · Feature Request, gnupg (gpg22)
werner added a comment to T3277: decrypting data symmetrically doesn't reliably convey confidentiality property.

Let me state it again: Using symmetric encryption for authentication is Bad Thing™.

May 28 2018, 6:48 PM · Feature Request, gnupg (gpg22)
werner closed T3993: A Solution for Sending Messages Safely from EFAIL-safe Senders to EFAIL-unsafe Receivers as Wontfix.

Please discuss this at gnupg-devel. A bug tracker is not a useful here.

May 28 2018, 2:45 PM · Feature Request

May 22 2018

craigph created T3993: A Solution for Sending Messages Safely from EFAIL-safe Senders to EFAIL-unsafe Receivers.
May 22 2018, 4:22 AM · Feature Request

May 16 2018

ccharabaruk added a comment to T3883: Add Win32-OpenSSH support to gpg-agent's ssh-agent.

@werner I was hoping to make a modified gpg-agent build that would let me walk through what's going on after the nonce is sent but it looks like the gpg4win process only takes in a package of pre-built gpg binaries which rules that out. As far as I can figure out, after the nonce is read and accepted, libassuan creates a stream object out of the socket and then finding nothing in the stream terminates the ssh handler. We send the actual client request immediately after the nonce but in a separate call to send() so I now wonder if by not having anything read in at the same time as the nonce gpg-agent or libassuan thinks that it's a 0-length stream.

May 16 2018, 6:54 PM · Not A Bug, workaround, gnupg24, Windows, ssh

May 15 2018

werner closed T3970: Change capabilities / usage flags in edit-key as Resolved.

Yes, this is on purpose, we display only the most important commands, similar to --help

May 15 2018, 1:19 PM · Feature Request

May 14 2018

werner triaged T3976: Add possibility to execute external command on (smart card) usage as Low priority.

A smartcard may do several dozen operations per second and thus spawning a tool each time is not the best option. A generic notification scheme would be better. OTOH, notifications about secret key operations may accidentally create an oracle - which is not good.

May 14 2018, 8:43 AM · Feature Request

May 13 2018

damadmai created T3976: Add possibility to execute external command on (smart card) usage.
May 13 2018, 3:09 PM · Feature Request
damadmai reopened T3970: Change capabilities / usage flags in edit-key as "Open".

cross-sign is also missing.

May 13 2018, 12:01 PM · Feature Request

May 10 2018

damadmai added a comment to T3970: Change capabilities / usage flags in edit-key.

Great! I did not notice this feature!
Is it on purpose that this is not shown by hitting TAB in the --edit-key command prompt (and auto-completion)?

May 10 2018, 4:46 PM · Feature Request
werner closed T3969: Support uid specification for quick-add-key as in quick-add-uid as Wontfix.

The fingerprint is required because that is the unique identifier for a key. Without that we would need to presetn a menu to select between keys. This would make scripting complicated again. On the command line c+p is easy enough to hget the fingerprint. c+P is also the reason why we print the fingerprint by default without spaces.

May 10 2018, 10:52 AM · Feature Request
werner closed T3970: Change capabilities / usage flags in edit-key as Resolved.

You are lucky. This has been possible for quite some time and since 2.2.6 it is an official part of the API. See T3816

May 10 2018, 10:49 AM · Feature Request

May 9 2018

damadmai created T3970: Change capabilities / usage flags in edit-key.
May 9 2018, 6:19 PM · Feature Request
damadmai created T3969: Support uid specification for quick-add-key as in quick-add-uid.
May 9 2018, 5:44 PM · Feature Request

May 3 2018

catenacyber added a comment to T3914: Integration with oss-fuzz.

Ok, so I guess that you can close this ticket.

May 3 2018, 10:34 AM · Feature Request

May 2 2018

aheinecke added a comment to T3458: Add sha224sum.exe / sha384sum.exe / sha512sum.exe to Gpg4win installation.

By standard I mean "behaves" somewhat like coreutils. Filename encoding,.. meh I see that this could be a problem.

May 2 2018, 1:30 PM · gpg4win, Feature Request

Apr 30 2018

BenM claimed T3505: Port GPGME's Python bindings to Windows.

Clearly getting SWIG and Windows to play together nicely is a bit of a big ask, but it may be possible to leverage GPGME's compiled libraries with something like CFFI's ABI calling method (yeah, I know, ABI is never ideal, but it's better than what Windows has now).

Apr 30 2018, 12:43 AM · Feature Request, gpgme, Python

Apr 28 2018

jharvell added a comment to T3950: gnupg-2.2.6 fails to find correct library config programs when cross-compiling for ARM.

You need to give the --with-foo options for each package.

Apr 28 2018, 7:12 PM · Feature Request
werner added a comment to T3914: Integration with oss-fuzz.

No, we won't cripple GnuPG for testing purposes. You intended to test something else than the provided GnuPG.

Apr 28 2018, 12:39 PM · Feature Request
werner triaged T3950: gnupg-2.2.6 fails to find correct library config programs when cross-compiling for ARM as Low priority.

SYSROOT support is not yet fully implemented. You need to give the --with-foo options for each package.
I will retitle this bug to indicates tha tit is a feature request.

Apr 28 2018, 12:29 PM · Feature Request

Apr 27 2018

catenacyber added a comment to T3914: Integration with oss-fuzz.

I now have all three fuzz targets stable now, and not finding more bugs besides the reported memory leaks
https://github.com/gpg/gnupg/compare/master...catenacyber:7651c60
What do you think of it ? Do you want to use it for continuous integration ?

Apr 27 2018, 5:39 PM · Feature Request

Apr 26 2018

werner triaged T3932: [GPA] Add option to wrap lines as Normal priority.
Apr 26 2018, 11:17 AM · gpa, Feature Request

Apr 23 2018

entail created T3932: [GPA] Add option to wrap lines.
Apr 23 2018, 9:40 PM · gpa, Feature Request

Apr 21 2018

ccharabaruk added a comment to T3883: Add Win32-OpenSSH support to gpg-agent's ssh-agent.

I just took a look through assuan-socket.c and it appears that we just need to send the nonce and don't need to read anything back. We also found a bug on our side that was preventing the nonce from being sent, which has been fixed. The error message logged above no longer happens.

Apr 21 2018, 9:16 PM · Not A Bug, workaround, gnupg24, Windows, ssh
werner added a comment to T3883: Add Win32-OpenSSH support to gpg-agent's ssh-agent.

The nonce is a string of octets thus it needs to be passed verbatim. I would need to study the code in libassun/src/assuan-socket.c to tell more.

Apr 21 2018, 12:11 AM · Not A Bug, workaround, gnupg24, Windows, ssh

Apr 20 2018

ccharabaruk added a comment to T3883: Add Win32-OpenSSH support to gpg-agent's ssh-agent.

@werner After sending the nonce value from the socket file, does anything need to be read back before ssh-agent commands can be sent? Are there any byte ordering requirements for sending the nonce or can they be sent in the same order as they are in the file?

Apr 20 2018, 5:41 PM · Not A Bug, workaround, gnupg24, Windows, ssh
werner added a comment to T3775: enable mixed hidden/non-hidden recipients during encryption.

My experience is that using a string is much easier and less error prone that to build up and allocate an error obj objects. A string leads to less code and bugs are easier to detect. There are enough patter on to handle strings in a safe way and key specs are in most cases already available in string form (e.g. hex fingerprints), be it from a mail interface, as a result of a database query or from the command line.

Apr 20 2018, 9:13 AM · gpgme, Feature Request

Apr 19 2018

dkg added a comment to T3775: enable mixed hidden/non-hidden recipients during encryption.

I think i can understand why this decision was made, but i'm not convinced it's a great solution. In particular, string-based arguments for C libraries are asking for trouble, and compound string arguments of the type described above are even more risky.

Apr 19 2018, 9:01 PM · gpgme, Feature Request
werner added a comment to T2179: GPA - clipboard encryption - use textmode.

The use of --textmode is in general not a good idea. The GPA on Windows will work just fine regardless of line endings. Notepad.exe also does not care about line endings as does other proper text handling software. If there is a problem c+p from the GPA "clipboard" do the system clipboard we can fix that.

Apr 19 2018, 6:37 PM · gpa, Feature Request
werner moved T3505: Port GPGME's Python bindings to Windows from Backlog to Python stuff on the gpgme board.
Apr 19 2018, 6:08 PM · Feature Request, gpgme, Python
werner triaged T3921: Make adding an arbitrary (sub)key easier as Low priority.
Apr 19 2018, 5:24 PM · gnupg24, Feature Request
werner created T3921: Make adding an arbitrary (sub)key easier.
Apr 19 2018, 5:24 PM · gnupg24, Feature Request
werner lowered the priority of T3914: Integration with oss-fuzz from Normal to Low.
Apr 19 2018, 10:45 AM · Feature Request
catenacyber added a comment to T3914: Integration with oss-fuzz.

Work is in progress, but you can already see :

Apr 19 2018, 9:29 AM · Feature Request

Apr 18 2018

catenacyber added a comment to T3914: Integration with oss-fuzz.

You may want to check with Hanno Böck

Apr 18 2018, 9:22 AM · Feature Request

Apr 17 2018

werner triaged T3782: `gpg --sign-key` has prompt implies attempting to sign revoked User IDs even though it won't. as Normal priority.
Apr 17 2018, 8:25 PM · Feature Request, gnupg
werner triaged T3734: Extract signature key ID with gpgme as Normal priority.
Apr 17 2018, 8:22 PM · gpgme, Feature Request
werner triaged T3719: List keys in colon-separated format, i.e. make --list-only respect --with-colons as Normal priority.

The semantics of --list-only are not well defined. Needs some overhaul.

Apr 17 2018, 8:20 PM · gnupg, Feature Request
werner triaged T3517: dirmngr: retry without SRV due to buggy routers as High priority.

An option to ignore SRV records would also be good for debugging. Thus I raised the priority and truned this into a feature request.

Apr 17 2018, 8:03 PM · Feature Request, dns, dirmngr
werner triaged T3659: pinentry falls back to curses on wayland as Normal priority.

Then please set DISPLAY ;-)

Apr 17 2018, 7:55 PM · Restricted Project, Wayland, Feature Request, pinentry
werner triaged T3914: Integration with oss-fuzz as Normal priority.

Thanks for the description and the patch. I know what fuzzing is and GnuPG underwent quite some public and non-public fuzzing already. You may want to check with Hanno Böck to see how fuzzing can be done with gpg.

Apr 17 2018, 7:26 PM · Feature Request
catenacyber added a comment to T3914: Integration with oss-fuzz.

Sorry myself.
I will try to be clearer :

Apr 17 2018, 6:19 PM · Feature Request
werner added a comment to T3914: Integration with oss-fuzz.

Sorry, I do not understand your request. Please describe what you want; linking to some arbitrary external sites is not sufficient.

Apr 17 2018, 5:09 PM · Feature Request
catenacyber created T3914: Integration with oss-fuzz.
Apr 17 2018, 1:35 PM · Feature Request
werner closed T3831: Extend GPGME's offline mode to the OpenPGP engine as Resolved.

Implemented in gpgme 1.11.0 if gpg >= 2.1.23 is used.

Apr 17 2018, 11:14 AM · gpgme, Feature Request
werner closed T3451: gpgme should report whether a given User ID is marked as "primary" or not. as Wontfix.
Apr 17 2018, 10:39 AM · gpgme, Feature Request
werner closed T3526: Missing function to calculate wkdhash as Wontfix.
Apr 17 2018, 10:22 AM · Feature Request, gpgme
werner closed T3775: enable mixed hidden/non-hidden recipients during encryption as Resolved.

1.11 features a set of extended encryption functions which may optionally take a string as key specifications. In contrast to the array of key objects this string is a linefeed delimited list of key specifications which are passed verbatim to gpg. For OpenPGP a keyword feature is supported. For example the string

Apr 17 2018, 10:20 AM · gpgme, Feature Request

Apr 14 2018

ccharabaruk added a comment to T3883: Add Win32-OpenSSH support to gpg-agent's ssh-agent.

I've been working with one of Microsoft's developers on a temporary tool that should bridge the connection between named pipes and the Unix sockets emulation used by gpg-agent but things appear to trip up with sending the nonce. From the position of the tool, the nonce value is successfully sent (send returns 16), but never seems to be picked up by gpg-agent. Instead both gpg-agent and the bridge sit there until whatever tool is using them (I test using ssh-add -l) is terminated, at which point gpg-agent immediately spits up the message

Apr 14 2018, 4:37 AM · Not A Bug, workaround, gnupg24, Windows, ssh

Apr 11 2018

Syssou added a comment to T3867: [DIRMNGR] Key server should be tried if passed with --keyserver, regardless of the "dead" mark.

The following post assumes that we want gpg --search to try to search; meaning that we don't want gpg to exit immediately because of the dead marks, without having sent a single network request to anyone.
The post is a bit long; sorry about that.

Apr 11 2018, 4:31 PM · Feature Request, dirmngr
JJworx created T3893: Timeout for receive-keys.
Apr 11 2018, 9:58 AM · Enigmail, FAQ, gnupg
BenM added a comment to T3272: Make groups available through GPGME.

A work-around is now available for this in Python in the GPGME source. The relative path from the top of the GPGME source directory is here lang/python/examples/howto/groups.py. Like all the other scripts in the same directory, it also appears in the GPGME Python Bindings HOWTO, under the Miscellaneous heading near the end.

Apr 11 2018, 3:07 AM · gpgme, Feature Request

Apr 10 2018

werner added a comment to T3883: Add Win32-OpenSSH support to gpg-agent's ssh-agent.

Rhat's for the client, right. I never used it. We used to run a Windows 8 instance in a VM to run tests via ssh on it. That worked most not really stable. For obvious reasons I am more interested in the server part ;-)

Apr 10 2018, 8:15 AM · Not A Bug, workaround, gnupg24, Windows, ssh
ccharabaruk added a comment to T3883: Add Win32-OpenSSH support to gpg-agent's ssh-agent.

I would argue that the Windows port of OpenSSH is not unstable at this point, especially given that Microsoft is even providing it as an installable feature in the next regular Windows 10 release. The fact that the port is now using actual OpenSSH version numbers instead of their own 0.x versions lends credence to this as well.

Apr 10 2018, 2:19 AM · Not A Bug, workaround, gnupg24, Windows, ssh

Apr 9 2018

werner closed T3816: please expose "change-usage" subcommand for --edit-key as Resolved.

Will be in 2.2.6.

Apr 9 2018, 10:59 AM · gnupg (gpg22), Feature Request
werner triaged T3883: Add Win32-OpenSSH support to gpg-agent's ssh-agent as Normal priority.

Thanks for the pointer. But as long as the Windows ssh server is that instable I see no urgent need to add this to GnuPG.

Apr 9 2018, 10:25 AM · Not A Bug, workaround, gnupg24, Windows, ssh

Apr 7 2018

ccharabaruk created T3883: Add Win32-OpenSSH support to gpg-agent's ssh-agent.
Apr 7 2018, 12:59 AM · Not A Bug, workaround, gnupg24, Windows, ssh

Apr 4 2018

aheinecke triaged T3870: Remove attachment clip sign on signed message, if no other attachment as Normal priority.

I doubt that I will be able to fix this. The problem is that for Outlook we build the signed mail structure, which is a multipart MIME message. If you receive such a mail with a non crypto client you see the plain text and a pgp-signature attachment. That is why Outlook shows it as "attachment".

Apr 4 2018, 10:43 AM · gpgol, gpg4win, Feature Request

Mar 29 2018

JJworx added a project to T3870: Remove attachment clip sign on signed message, if no other attachment: gpgol.
Mar 29 2018, 9:03 AM · gpgol, gpg4win, Feature Request

Mar 28 2018

JJworx created T3870: Remove attachment clip sign on signed message, if no other attachment.
Mar 28 2018, 10:42 AM · gpgol, gpg4win, Feature Request

Mar 27 2018

Syssou added a comment to T3867: [DIRMNGR] Key server should be tried if passed with --keyserver, regardless of the "dead" mark.

Thank you for your answer ! :)

Mar 27 2018, 6:46 PM · Feature Request, dirmngr
werner claimed T3816: please expose "change-usage" subcommand for --edit-key.
Mar 27 2018, 6:25 PM · gnupg (gpg22), Feature Request
werner triaged T3867: [DIRMNGR] Key server should be tried if passed with --keyserver, regardless of the "dead" mark as Normal priority.

You can do a

Mar 27 2018, 6:18 PM · Feature Request, dirmngr

Mar 25 2018

BenM added a comment to T3211: [website] Atom/RSS feed for releases, news and/or blog.

This does not require org-feed.el as far as I can tell, but it does require components of current Org Mode HTML export and publishing features which do not appear to be available in the current gnupg.org website build system.

Mar 25 2018, 2:07 PM · Feature Request

Mar 24 2018

BenM added a comment to T3211: [website] Atom/RSS feed for releases, news and/or blog.

A more recent request for this feature has been made via the devel mailing list:

Mar 24 2018, 1:25 AM · Feature Request

Mar 22 2018

steve added a comment to T3730: Add support to HTTP Basic Auth for Keyservers.

Hi Werner. Did you by any chance already find the time to look into the changes?

Mar 22 2018, 2:37 PM · gnupg24, Feature Request

Mar 15 2018

aheinecke closed T2266: Gpg4win: Migrate Keyring to Keybox as Wontfix.

I looked into it a bit. As bulk import is highly inefficient copying the keyring lots and lots of times the migration of a keyring with 1000keys takes around 6 Minutes.

Mar 15 2018, 1:01 PM · Feature Request, gnupg, gpg4win

Mar 14 2018

bernhard added a comment to T3277: decrypting data symmetrically doesn't reliably convey confidentiality property.

The use case that @Valodim and @dkg are thinking of probably is using a setup-code that humans use to transfer from one device do another to decrypt a symmetrically encrypted setup-package, this issue is linked from:

https://autocrypt.org/level1.html#setup-message-import
Mar 14 2018, 5:30 PM · Feature Request, gnupg (gpg22)

Mar 8 2018

werner created T3831: Extend GPGME's offline mode to the OpenPGP engine.
Mar 8 2018, 1:33 PM · gpgme, Feature Request

Mar 2 2018

bernhard added a comment to T3734: Extract signature key ID with gpgme.

There was a second person asking for a list-packets feature to verify if a file is encrypted correctly at gnupg-devel.

Mar 2 2018, 5:22 PM · gpgme, Feature Request

Mar 1 2018

aheinecke renamed T3798: GpgOL: Memoryhole integration from Memoryhole integration to GpgOL: Memoryhole integration.
Mar 1 2018, 5:19 PM · gpgol, Feature Request
aheinecke triaged T3798: GpgOL: Memoryhole integration as Wishlist priority.

I'm not a fan of memoryhole. To say my criticism in one sentence: "Memoryhole is trying to sell the hide of the boar before it has been hunted."

Mar 1 2018, 5:13 PM · gpgol, Feature Request

Feb 27 2018

werner triaged T3816: please expose "change-usage" subcommand for --edit-key as High priority.
Feb 27 2018, 9:50 PM · gnupg (gpg22), Feature Request

Feb 26 2018

werner triaged T3808: Unable to safely delete IDs with shared secret keys as Normal priority.
Feb 26 2018, 9:48 AM · Feature Request
cvhc edited projects for T3808: Unable to safely delete IDs with shared secret keys, added: Feature Request; removed Bug Report.

Ok, I understand it. Project tag changed :)

Feb 26 2018, 9:18 AM · Feature Request

Feb 24 2018

stm created T3807: Mandatory OpenPGP Primary Key Binding Signature (sigclass 0x19).
Feb 24 2018, 9:44 AM · Documentation, gnupg

Feb 22 2018

tjarosch added a comment to T1621: Support multiple cards (not just readers).

I also struggled to get two cards running at the same time. Host system is Fedora 26 with gnupg 2.2.4.

Feb 22 2018, 11:59 PM · gnupg, Feature Request
werner closed T1967: GnuPG should select a key for signing without trying to use missing subkeys as Resolved.

Will go into 2.2.5

Feb 22 2018, 10:56 AM · gnupg (gpg22), Feature Request
werner claimed T1967: GnuPG should select a key for signing without trying to use missing subkeys.
Feb 22 2018, 10:51 AM · gnupg (gpg22), Feature Request
werner triaged T3622: --export-options export-minimal,export-clean includes unusable subkeys as Normal priority.
Feb 22 2018, 10:37 AM · Feature Request, gnupg (gpg22)

Feb 19 2018

werner added a comment to T3458: Add sha224sum.exe / sha384sum.exe / sha512sum.exe to Gpg4win installation.

Note that there is no standard for this. In particular the encoding of filenames with special characters are different in almost all implementations. I tried to find a common ground for our implementation.

Feb 19 2018, 5:05 PM · gpg4win, Feature Request
aheinecke added a comment to T3458: Add sha224sum.exe / sha384sum.exe / sha512sum.exe to Gpg4win installation.

Just to be clear I think this issue is valid and we should add more checksum tools in the future. But I would want them to use libgcrypt and confirm to the standard *sum command line arguments like -c.

Feb 19 2018, 12:04 PM · gpg4win, Feature Request

Feb 16 2018

werner added a project to T3798: GpgOL: Memoryhole integration: gpgol.
Feb 16 2018, 5:54 PM · gpgol, Feature Request
blu-IT added a comment to T3798: GpgOL: Memoryhole integration.

Hi Werner,

Feb 16 2018, 12:46 PM · gpgol, Feature Request
werner added a comment to T3798: GpgOL: Memoryhole integration.

This is a MUA thing. Do you ask whether we plan to add it to GpgOL?

Feb 16 2018, 11:19 AM · gpgol, Feature Request
blu-IT created T3798: GpgOL: Memoryhole integration.
Feb 16 2018, 10:45 AM · gpgol, Feature Request
werner closed T3797: Allow Monero donations as Wontfix.

See T3796

Feb 16 2018, 8:55 AM · Feature Request
werner closed T3796: Allow Bitcoin Cash donations as Wontfix.

Sorry, we won't do this any time soon. We may even shut the Bitcoin thing down. I was too troublesome from a bookkeeping POV.

Feb 16 2018, 8:53 AM · Feature Request
authentication created T3797: Allow Monero donations.
Feb 16 2018, 6:18 AM · Feature Request
authentication created T3796: Allow Bitcoin Cash donations.
Feb 16 2018, 5:46 AM · Feature Request

Feb 14 2018

werner triaged T3775: enable mixed hidden/non-hidden recipients during encryption as Normal priority.

I don't think that -R is a good way to implement BCC - it would be better to encrypt it separately. But people may have different ideas on this.

Feb 14 2018, 5:44 PM · gpgme, Feature Request

Feb 6 2018

wltjr added a comment to T2905: EFL-based pinentry.

No clue what their problem is, I have a few projects scanned by Coverity. Most are forks that I took over, but one is not really. Not sure why they took such issues here.

Feb 6 2018, 4:46 PM · pinentry, Feature Request
werner added a comment to T2905: EFL-based pinentry.

Okay. Thanks for the report. I once looked at Coverty but decided not to use it because of their rules which would not allow me to document and fix a possible security vulnerability without following their process. If there is a security problem I will fix it according to my schedule and not allow anyone to delay it.

Feb 6 2018, 11:40 AM · pinentry, Feature Request

Feb 5 2018

wltjr added a comment to T2905: EFL-based pinentry.

After fighting with Coverity over a fork of pinentry that has EFL. I setup to have Coverity scan. Which found some like 22 defects. Coverity unable to identify that I have any affiliation, after I spent/wasted hours getting a build to upload to Coverity to scan. Just to fight with some unhelpful person basically standing in the way of FOSS project, a wonderful Mel Llaguno. Decided for security reasons I be denied ability to use Coverity to scan pinentry for defects, even in the EFL interface I made and am the author of. Which also means I cannot fix other issues with pinentry or aide further in development....

Feb 5 2018, 11:39 PM · pinentry, Feature Request

Feb 4 2018

dkg created T3775: enable mixed hidden/non-hidden recipients during encryption.
Feb 4 2018, 10:08 PM · gpgme, Feature Request