Page MenuHome GnuPG
Feed Advanced Search

Aug 3 2021

Jakuje added a comment to T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation.

In RHEL, we do not have anything about PCT so the PCT requirement is not completely clear to me: https://git.centos.org/rpms/libgcrypt/blob/c8s/f/SOURCES

Aug 3 2021, 1:33 PM · FIPS, libgcrypt, Feature Request
fvogt added a comment to T3659: pinentry falls back to curses on wayland.

I gave it a try and it works here now with $DISPLAY unset, thanks!

Aug 3 2021, 11:03 AM · Restricted Project, Wayland, Feature Request, pinentry

Aug 2 2021

ikloecker moved T3659: pinentry falls back to curses on wayland from Restricted Project Column to Restricted Project Column on the Restricted Project board.
Aug 2 2021, 5:41 PM · Restricted Project, Wayland, Feature Request, pinentry
ikloecker closed T3659: pinentry falls back to curses on wayland as Resolved.

Should now work for pinentry-qt on Wayland even if DISPLAY is not set.

Aug 2 2021, 5:38 PM · Restricted Project, Wayland, Feature Request, pinentry
ikloecker moved T3659: pinentry falls back to curses on wayland from Restricted Project Column to Restricted Project Column on the Restricted Project board.
Aug 2 2021, 5:08 PM · Restricted Project, Wayland, Feature Request, pinentry
ikloecker added a project to T3659: pinentry falls back to curses on wayland: Restricted Project.
Aug 2 2021, 5:08 PM · Restricted Project, Wayland, Feature Request, pinentry
ikloecker claimed T3659: pinentry falls back to curses on wayland.
Aug 2 2021, 5:08 PM · Restricted Project, Wayland, Feature Request, pinentry

Jul 31 2021

jukivili claimed T4486: Add AEAD mode AES-SIV to libgcrypt (RFC 5297).
Jul 31 2021, 12:36 PM · Feature Request, libgcrypt

Jul 30 2021

bernhard added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

bug has been closed as Wontfix [..] I see no reason to continue the discussion in the bugtracker.

Jul 30 2021, 5:23 PM · gnupg (gpg23), Feature Request
werner added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

This bug has been closed as Wontfix more than a year ago. I see no reason to continue the discussion in the bugtracker.

Jul 30 2021, 9:20 AM · gnupg (gpg23), Feature Request

Jul 29 2021

dkg added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

I share your concerns about centralization of keyserver infrastructure. Rejecting this security fix doesn't help keep keyservers decentralized, though.

Jul 29 2021, 9:27 PM · gnupg (gpg23), Feature Request
gniibe changed the status of T5530: Add "prehash" support to DSA and ECDSA signing from Open to Testing.
Jul 29 2021, 5:00 AM · Restricted Project, FIPS, libgcrypt, Feature Request
gniibe changed the status of T5530: Add "prehash" support to DSA and ECDSA signing, a subtask of T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation, from Open to Testing.
Jul 29 2021, 5:00 AM · FIPS, libgcrypt, Feature Request

Jul 28 2021

bernhard added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

It is now over 10 months that the proponents of these additions have not followed up on the discussion.

Jul 28 2021, 3:42 PM · gnupg (gpg23), Feature Request
werner removed a parent task for T4694: manage first-party attestations: Restricted Maniphest Task.
Jul 28 2021, 3:20 PM · Keyserver, Feature Request

Jul 26 2021

fvogt added a comment to T3659: pinentry falls back to curses on wayland.

Huh, can't believe I somehow missed that this actually got a reply three years ago...

Jul 26 2021, 2:50 PM · Restricted Project, Wayland, Feature Request, pinentry

Jul 23 2021

gniibe triaged T5530: Add "prehash" support to DSA and ECDSA signing as Normal priority.
Jul 23 2021, 8:18 AM · Restricted Project, FIPS, libgcrypt, Feature Request
gniibe updated the task description for T5529: Support internal hashing for RSA-PSS.
Jul 23 2021, 7:36 AM · libgcrypt, Feature Request
gniibe updated the task description for T5529: Support internal hashing for RSA-PSS.
Jul 23 2021, 7:22 AM · libgcrypt, Feature Request
gniibe triaged T5529: Support internal hashing for RSA-PSS as Normal priority.
Jul 23 2021, 4:26 AM · libgcrypt, Feature Request

Jul 16 2021

gniibe added a comment to T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation.

And... as long as I read the PCT patches, it is not needed to export those API to users.
It is only needed internally for PCT tests (at most).

Jul 16 2021, 10:12 AM · FIPS, libgcrypt, Feature Request
gniibe added a comment to T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation.

I am considering API enhancement, for this task.

Jul 16 2021, 10:01 AM · FIPS, libgcrypt, Feature Request

Jul 12 2021

werner assigned T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation to gniibe.
Jul 12 2021, 11:20 AM · FIPS, libgcrypt, Feature Request
werner raised the priority of T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation from Normal to High.
Jul 12 2021, 11:20 AM · FIPS, libgcrypt, Feature Request
gniibe added a comment to T4873: Enable AES GCM in FIPS mode.

(OpenSSL for FIPS support is a bit tricky, which is described in README-FIPS.md in their distribution. It offers OpenSSL FIPS provider as shared library fips.so.)

Jul 12 2021, 3:38 AM · FIPS, libgcrypt, Feature Request

Jul 8 2021

Jakuje added a comment to T4873: Enable AES GCM in FIPS mode.

I have couple of references from libssh:

Jul 8 2021, 2:57 PM · FIPS, libgcrypt, Feature Request
werner added a comment to T4873: Enable AES GCM in FIPS mode.

gniibe: Can you please check what openssl does exactly. The problem is that we currently have no permanent state for Libgcrypt (i.e. something stored on disk per user or even better global)

Jul 8 2021, 2:29 PM · FIPS, libgcrypt, Feature Request
werner added a comment to T4873: Enable AES GCM in FIPS mode.

FWIW: Unfortunately everyone is moving to GCM, even Outlook. While GnuPG was evaluated by the German BSI we had discussions about this and their evaluators were wary about GCM due to its brittleness thus our use of OCB was very welcomed. OTOH, another approved product meanwhile comes with GCM for S/MIME and thus it seems thatGCM is accepted.

Jul 8 2021, 2:20 PM · FIPS, libgcrypt, Feature Request
Jakuje added a comment to T5521: Use of conscious language.

There is no point in questioning whether a couple of words change racism or any other human problems of these days. It will not.

Jul 8 2021, 10:38 AM · gnupg24, Won't Fix, Feature Request, gnupg (gpg23), libgcrypt
Jakuje added a comment to T4873: Enable AES GCM in FIPS mode.

Right. The AES-GCM was not allowed in FIPS mode until recently and I think now it is acceptable only for certain protocols (TLS, SSH), which guarantee that the IV is handled "correctly". As mentioned by gniibe, the requirements is that one should not be able to set IV to any specific value. The IV should be incremented automatically inside of the library (with some mask length + some generator configuration), somehow similarly as it is done with openssl, which would probably requite a new API in libgcrypt.

Jul 8 2021, 10:09 AM · FIPS, libgcrypt, Feature Request
gniibe added a comment to T4873: Enable AES GCM in FIPS mode.

If I understand correctly, to conform FIPS, we need to ensure Key/IV pair uniqueness (See "Implementation Guidance for FIPS 140-3", Annex C. "C.H Key/IV Pair Uniqueness Requirements from SP 800-38D").
Use of the API to set IV by any value may be considered bad.

Jul 8 2021, 3:55 AM · FIPS, libgcrypt, Feature Request

Jul 7 2021

Saturneric added a comment to T5468: About the API of GpgME to revoke key pairs and subkeys..

Thanks for the reply, this source code file and suggestions are very useful. Let gpg execute commands is a solution, but it is not optimal compared to providing a functional interface.
In addition, it is reversible to revoke the subkey by expiring it. But I will use the solutions you provide at this stage, knowing that you have time to provide better solutions. thank you!

Jul 7 2021, 6:26 PM · gpgme, Feature Request
werner triaged T5521: Use of conscious language as Wishlist priority.

Sorry, this is not acceptable to me. <rant>You don't change racism by avoid words which are may be connected to racism. Master is a term used for example to indicate that a person is proficient in her profession. Slave is (in theory) a historic term to describe, well slaves. That is humans who are non-free and are not allowed to control their lives - like the majority of humans these days - they are just called different and the methods of suppression are different than in the past. In fact a Roman slave (but not a medieval bondsman) had well defined and esteemed rights not something the majority of US citizen with a dark skin has in practice. Term abolished, racism abolished, works as good as freeing the US slaves in the 1856, the 1960, or still today. It did not work. Mr. Kings hope has not yet realized itself and is now maybe farther away than we all had hoped in the second half of the last century. Don't cover facts by changing words used in a very different context.</rant>

Jul 7 2021, 5:48 PM · gnupg24, Won't Fix, Feature Request, gnupg (gpg23), libgcrypt
werner triaged T5480: Export keys + manual as Low priority.
Jul 7 2021, 2:28 PM · Info Needed, gpg4win, Feature Request
ikloecker added a comment to T5468: About the API of GpgME to revoke key pairs and subkeys..

What do you mean by "exporting revocation certificates"? Once such a certificate is imported you simply export the public key including the revocation signature. Otherwise, simply takes the revocation certificates from ${GNUPGHOME}/openpgp-revocs.d where they are written to, if you generate a key. Kleopatra uses gpg directly to generate a revocation certificate mimicking what gpgme would do: See https://dev.gnupg.org/source/kleo/browse/master/src/commands/genrevokecommand.cpp.

Jul 7 2021, 10:24 AM · gpgme, Feature Request

Jul 6 2021

werner lowered the priority of T4884: PKCS #15 support in gpgsm from High to Normal.
Jul 6 2021, 6:12 PM · Feature Request, gnupg, scd, S/MIME
werner triaged T5468: About the API of GpgME to revoke key pairs and subkeys. as Normal priority.
Jul 6 2021, 6:10 PM · gpgme, Feature Request

Jun 24 2021

werner renamed T5284: Allow gpgme to export w/o attributes from gpgme uses incorrect flags for minimal, no uid export of public keys to Allow gpgme to export w/o attributes.
Jun 24 2021, 6:24 PM · Feature Request, gpgme
werner moved T5353: gpgme: Implement keylist_data for gpgsm from Backlog to For a future release on the gpgme board.
Jun 24 2021, 6:21 PM · gnupg24, gnupg (gpg23), gpgme, Feature Request

Jun 21 2021

werner triaged T5503: Add APIs to sign (and encrypt?) with a specific subkey as Normal priority.
Jun 21 2021, 5:16 PM · gpgme, Feature Request
gahr created T5503: Add APIs to sign (and encrypt?) with a specific subkey.
Jun 21 2021, 5:09 PM · gpgme, Feature Request

Jun 20 2021

werner activated P5 bak.
Jun 20 2021, 6:16 PM · Feature Request
Fred23 archived P5 bak.
Jun 20 2021, 6:02 PM · Feature Request

Jun 18 2021

werner triaged T5494: gpg-agent doesn't support security-key (sk) key types as Low priority.

ggp-agent has no support for U2F and it can't work with these key types. Given that Yubikeys also have proper keys (even eddsa) I doubt that we will implement support for ecdsa-sk OpenSSH feature any time soon,

Jun 18 2021, 11:31 PM · gnupg24, gnupg (gpg23), Feature Request, ssh
svenschwermer updated the task description for T5494: gpg-agent doesn't support security-key (sk) key types.
Jun 18 2021, 7:50 PM · gnupg24, gnupg (gpg23), Feature Request, ssh
svenschwermer created T5494: gpg-agent doesn't support security-key (sk) key types.
Jun 18 2021, 7:48 PM · gnupg24, gnupg (gpg23), Feature Request, ssh

Jun 16 2021

werner added a comment to T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation.

Some ideas:

  • the someflags thing will probably just be a reserved parameter
  • If DATA is not NULL but an MD is set the sign function should fail
  • Should ownership of MD be moved to the CTX?
Jun 16 2021, 11:11 AM · FIPS, libgcrypt, Feature Request
Jakuje added a comment to T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation.

In an email from @werner couple days back, I got a suggestion that we could use hashing tied to the context, rather than this one-shot call tied only to digests. I circled back this suggestion to Stephan and he confirmed that it should be fine from the FIPS point of view so I am posting the suggested API here too:

ctx = gcry_pk_new (someflags)
md = gcry_md_open (...)
gcry_ctx_set_md (md);
gcry_pk_sign_ext (ctx, result, data, skey)
[...]
gcry_ctx_release (ctx);
Jun 16 2021, 10:52 AM · FIPS, libgcrypt, Feature Request
gniibe added a comment to T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation.

OK. I think that the patch at SUSE is updated one which works.
As I understand correctly, this is a kind of very old patch, which intended to work around old libgcrypt limitation of RSA PSS.

Jun 16 2021, 10:34 AM · FIPS, libgcrypt, Feature Request
gniibe added a comment to T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation.

I think that {D1476} is still a sketch (not real code which works). I would guess an intended use, but it's good to have concrete example program which uses the feature being added.

Jun 16 2021, 8:45 AM · FIPS, libgcrypt, Feature Request
werner added a comment to T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation.

FWIW, there is also this newer patch: https://dev.gnupg.org/differential/diff/1476/
and SUSE seems to already use a modified API:
https://sources.suse.com/SUSE:Maintenance:15118/libgcrypt.SUSE_SLE-15_Update/26a8df5f96d27d6abca7bd7ba9b0def0/libgcrypt-FIPS-RSA-DSA-ECDSA-hashing-operation.patch

Jun 16 2021, 8:40 AM · FIPS, libgcrypt, Feature Request

Jun 15 2021

werner added a comment to T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation.

Our public key functions are stateless. For several reasons it would be good to have an option to keep some state (think pre-computations). Our gcry_ctx_t would be a perfect fit for this and it will allow us to join a pubkey function with for example a hash function.

Jun 15 2021, 1:42 PM · FIPS, libgcrypt, Feature Request
gniibe added a comment to T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation.

Does the patch really work, or is it a sketch to describe the intended use?

Jun 15 2021, 12:37 PM · FIPS, libgcrypt, Feature Request

Jun 10 2021

werner added a project to T5480: Export keys + manual: gpg4win.

The private key contains the public key. Thus there is no need to export the public key if you already got the secret key.

Jun 10 2021, 10:39 PM · Info Needed, gpg4win, Feature Request
rda updated the task description for T5480: Export keys + manual.
Jun 10 2021, 3:39 PM · Info Needed, gpg4win, Feature Request
rda created T5480: Export keys + manual.
Jun 10 2021, 3:36 PM · Info Needed, gpg4win, Feature Request

Jun 2 2021

Saturneric created T5468: About the API of GpgME to revoke key pairs and subkeys..
Jun 2 2021, 9:08 PM · gpgme, Feature Request
werner triaged T5463: gpgconf: Options that gpgconf won't change should be flagged as read-only as Normal priority.

There is also the issue that options flagged as ignore or forced in the global config file won't have an effect either. But indeed we could mark them as non-change.

Jun 2 2021, 5:00 PM · gnupg24, gnupg (gpg23), Feature Request

Jun 1 2021

ikloecker created T5463: gpgconf: Options that gpgconf won't change should be flagged as read-only.
Jun 1 2021, 11:21 AM · gnupg24, gnupg (gpg23), Feature Request

May 19 2021

cesar.portilla added a comment to T5324: Kleopatra: Add recursive folder decryption.

I did a new test and found that if it is a single file regardless of disk size, no error appears, but when there are multiple files in a single encrypted folder with a size greater than 1.5GB, the error occurs. Traverse a directory like Zorvek and Aheinecke wrote would be an optimal solution or at least some alert messsage to be aware of the action no supported.

May 19 2021, 9:12 PM · kleopatra, Feature Request, gpg4win
aheinecke added a comment to T5324: Kleopatra: Add recursive folder decryption.

I have allowed myself to edit this task to more reflect what this is about. Although the error is of course in my opinion more of a bug because it is so bad but I would rather fix it with this feature.

May 19 2021, 2:25 PM · kleopatra, Feature Request, gpg4win
aheinecke renamed T5324: Kleopatra: Add recursive folder decryption from Decrypt Folder Fails to Kleopatra: Add recursive folder decryption.
May 19 2021, 2:25 PM · kleopatra, Feature Request, gpg4win
aheinecke added a comment to T5324: Kleopatra: Add recursive folder decryption.

I actually agree that this makes sense. I mean at least Kleo could say: "Hey we have detected 50 files that are encryped in this folder tree, do you really want to decrypt them all?"

May 19 2021, 2:21 PM · kleopatra, Feature Request, gpg4win
werner edited projects for T5324: Kleopatra: Add recursive folder decryption, added: Feature Request; removed Support, Bug Report.
May 19 2021, 9:50 AM · kleopatra, Feature Request, gpg4win

May 10 2021

ikloecker closed T5426: [Pinentry]: add remeber password checkbox in pinentry-qt. as Wontfix.

GnuPG (more precisely gpg-agent) does cache the password for some time in memory. The default is 10 minutes. Add

default-cache-ttl n

where n is the number of seconds to cache the password, to ~/.gnupg/gpg-agent.conf.

May 10 2021, 9:23 AM · Feature Request

May 8 2021

evan0g created T5426: [Pinentry]: add remeber password checkbox in pinentry-qt..
May 8 2021, 11:17 AM · Feature Request

Apr 26 2021

gniibe added a comment to T1756: gpg-agent doesn't accept ssh certificates.

Update:
It looks like OpenSSH version 8 now supports ssh-agent's handling REQUEST_IDENTITIES.

Apr 26 2021, 8:32 AM · gnupg, Feature Request

Apr 21 2021

werner triaged T5407: gpg fails to import second secret key in .pfx (PKCS12) file as Normal priority.
Apr 21 2021, 9:09 PM · gnupg24, gnupg (gpg23), Feature Request, S/MIME

Apr 20 2021

neal closed T5403: Consider all Issuer subpackets when validating a signature as Invalid.
Apr 20 2021, 11:54 AM · OpenPGP, Feature Request
neal added a comment to T5403: Consider all Issuer subpackets when validating a signature.

I just realized that my example is incorrect. It doesn't make sense to support multiple issuer subpackets on self signatures. But it is useful to do so on binary signatures and third-party certifications. Here's a better example, which gpg correctly supports. As such, this issue should be closed. Sorry for the noise.

Apr 20 2021, 11:54 AM · OpenPGP, Feature Request
werner triaged T5403: Consider all Issuer subpackets when validating a signature as Low priority.
Apr 20 2021, 11:48 AM · OpenPGP, Feature Request

Apr 19 2021

werner moved T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation from Backlog to For 1.10 on the libgcrypt board.
Apr 19 2021, 6:16 PM · FIPS, libgcrypt, Feature Request
werner closed T4673: 2.3-only: Don't fallback to PC/SC on failure by the internal CCID driver, only use PC/SC when --disable-ccid is specified as Resolved.
Apr 19 2021, 5:56 PM · gnupg (gpg23), Restricted Project, scd, Feature Request
werner closed T4735: Please provide an option to make --verify accept only signatures from specific trusted UID as Resolved.

aheinecke: I agree, we should not port everything back just because we could do that.

Apr 19 2021, 5:55 PM · gnupg (gpg23), Feature Request
werner edited projects for T4921: Support import of PKCS#12 encoded ECC private keys., added: gnupg (gpg22); removed gnupg (gpg23).
Apr 19 2021, 5:52 PM · gnupg22 (gnupg-2.2.42), backport, Feature Request, S/MIME
werner closed T4398: Rework Console and command line handling on Windows as Resolved.

This has been released with 2.3.0 and no relevant problems have reported in the last two weeks, thus closing.

Apr 19 2021, 5:48 PM · Feature Request, gnupg (gpg23)

Apr 18 2021

werner added a comment to T5394: scute: Build failure with slibtool.

t-link does not do antthing useful, anyway. I don't think it is justified to add dlopen stuff. Running real test is anyway a manual action; for a full test automation we would need to emulate all supported cards.

Apr 18 2021, 7:40 PM · toolchain, Feature Request, scute

Apr 17 2021

gouttegd added a comment to T5394: scute: Build failure with slibtool.

the t-link test should dlopen scute.so in runtime rather than link against it in build-time.

Apr 17 2021, 4:15 PM · toolchain, Feature Request, scute

Apr 16 2021

midipix added a comment to T5394: scute: Build failure with slibtool.

As of slibtool commit 9c5ba5eb, scute now builds out of the box. I'd still recommend taking the above into consideration, though.

Apr 16 2021, 4:53 PM · toolchain, Feature Request, scute
midipix added a comment to T5394: scute: Build failure with slibtool.

For what it's worth, scute is in violation of gnu libtool's documentation. Building with gnu libtool:

Apr 16 2021, 10:21 AM · toolchain, Feature Request, scute

Apr 15 2021

werner assigned T5294: Displaying the date and time at which you've replied to an email when using GPgOL to aheinecke.
Apr 15 2021, 9:15 AM · gpgol, Feature Request
werner added a project to T4673: 2.3-only: Don't fallback to PC/SC on failure by the internal CCID driver, only use PC/SC when --disable-ccid is specified: gnupg (gpg23).
Apr 15 2021, 8:39 AM · gnupg (gpg23), Restricted Project, scd, Feature Request
gniibe raised the priority of T4673: 2.3-only: Don't fallback to PC/SC on failure by the internal CCID driver, only use PC/SC when --disable-ccid is specified from Normal to High.

Making this task up to HIGH priority, so that people can easily find this change in 2.3.0.

Apr 15 2021, 7:20 AM · gnupg (gpg23), Restricted Project, scd, Feature Request
gniibe closed T4158: UIF (User Interaction Flag) DO support as Resolved.
Apr 15 2021, 4:09 AM · Restricted Project, Feature Request, scd, gnupg

Apr 13 2021

midipix added a comment to T5394: scute: Build failure with slibtool.

Regarding slibtool: I would actually like to have an easier to maintain tool than libtool (of which we use our own version) for GnuPG related software. However, its requirement "the compiler should support -std=c99" is currently a no-starter for libgcrypt and some other libs.

Apr 13 2021, 9:13 PM · toolchain, Feature Request, scute
werner closed T5387: Accept key signatures from LDAP servers as Resolved.

Done for 2.2. and 2.3.

Apr 13 2021, 2:56 PM · Feature Request, gnupg (gpg22)
werner triaged T5394: scute: Build failure with slibtool as Normal priority.
Apr 13 2021, 8:13 AM · toolchain, Feature Request, scute
gniibe closed T3416: gpg should select available signing key on card (even with -u option) as Resolved.

Done in 2.3.0.

Apr 13 2021, 8:07 AM · Restricted Project, Feature Request, gnupg
gniibe closed T3416: gpg should select available signing key on card (even with -u option), a subtask of T2291: Smartcard interaction improvement (was: Shadowed private key design (for smartcard)), as Resolved.
Apr 13 2021, 8:07 AM · Restricted Project, Feature Request, gnupg
gniibe closed T4695: Remove SERIALNO as an identifier to select keys, a subtask of T2291: Smartcard interaction improvement (was: Shadowed private key design (for smartcard)), as Resolved.
Apr 13 2021, 8:06 AM · Restricted Project, Feature Request, gnupg
gniibe closed T4695: Remove SERIALNO as an identifier to select keys as Resolved.

Done in 2.3.0.

Apr 13 2021, 8:06 AM · Restricted Project, Feature Request, gnupg
gniibe closed T2291: Smartcard interaction improvement (was: Shadowed private key design (for smartcard)) as Resolved.

Done in 2.3.

Apr 13 2021, 8:05 AM · Restricted Project, Feature Request, gnupg

Apr 12 2021

gniibe closed T4888: GpgSM: Support ECC key generation by gpgsm_genkey, a subtask of T4098: GpgSM: Add ECC support, as Resolved.
Apr 12 2021, 12:21 PM · gnupg (gpg23), Feature Request, S/MIME
gniibe closed T4888: GpgSM: Support ECC key generation by gpgsm_genkey as Resolved.
Apr 12 2021, 12:21 PM · Restricted Project, Feature Request, S/MIME

Apr 9 2021

werner triaged T5387: Accept key signatures from LDAP servers as High priority.
Apr 9 2021, 12:25 PM · Feature Request, gnupg (gpg22)

Mar 28 2021

ageis added a comment to T4514: Batch mode/unattended key generation: support multiple subkeys.

Hey @wener.. As I mentioned in the original post, there's a default-new-key-algo setting... Is it still not possible to use specify something like "rsa4096/cert,rsa4096/encr,rsa4096/sign,rsa4096/auth"?? Would love to see some progress on this. Glad to help test.

Mar 28 2021, 8:08 AM · gnupg24, gnupg (gpg23), Feature Request

Mar 26 2021

aheinecke closed T4864: New scdaemon command to watch device removal as Resolved.

Looks good to me, it no longer returns immediately with the error when there are no readers and the command itself seems to work. Thanks.

Mar 26 2021, 10:38 AM · Restricted Project, Feature Request, scd, Bug Report
gniibe added a comment to T4864: New scdaemon command to watch device removal.

Ah, I see that when there is no card reader, it returns "Service is not running" with PC/SC.
Let's fix that.

Mar 26 2021, 2:34 AM · Restricted Project, Feature Request, scd, Bug Report

Mar 25 2021

aheinecke reopened T4864: New scdaemon command to watch device removal as "Open".

When testing under Windows "scd devinfo --watch" returns immediately with ERR 100663614 Service is not running <SCD>
Probably also if you would use PC/SC on Linux but I have not tested this.

Mar 25 2021, 11:07 AM · Restricted Project, Feature Request, scd, Bug Report

Mar 22 2021

werner triaged T5353: gpgme: Implement keylist_data for gpgsm as Normal priority.
Mar 22 2021, 1:41 PM · gnupg24, gnupg (gpg23), gpgme, Feature Request