Page MenuHome GnuPG
Feed Advanced Search

Sep 9 2021

werner added a project to T5494: gpg-agent doesn't support security-key (sk) key types: gnupg (gpg23).

Interesting idea.

Sep 9 2021, 1:03 PM · gnupg24, gnupg (gpg23), Feature Request, ssh
rhansen added a comment to T5494: gpg-agent doesn't support security-key (sk) key types.

How difficult would it be to teach gpg-agent to fall back to another SSH agent if given an unsupported key?

Sep 9 2021, 11:13 AM · gnupg24, gnupg (gpg23), Feature Request, ssh

Sep 8 2021

ikloecker claimed T5592: AppImage of Kleopatra.
Sep 8 2021, 10:49 AM · Restricted Project, kleopatra, Feature Request
ikloecker created T5592: AppImage of Kleopatra.
Sep 8 2021, 10:48 AM · Restricted Project, kleopatra, Feature Request
ikloecker added a comment to T5589: add context menu for normal operation after installation.

Which product do you refer to? Kleopatra? gpg4win? Something else?
Which operating system are you using? Windows? Linux? Something else?

Sep 8 2021, 10:29 AM · Installer, FAQ, gpg4win

Sep 7 2021

luweitest created T5589: add context menu for normal operation after installation.
Sep 7 2021, 5:22 PM · Installer, FAQ, gpg4win
werner added a comment to T5576: New set of API for public key cryptography.

I see.

Sep 7 2021, 10:37 AM · libgcrypt, Feature Request
gniibe added a comment to T5576: New set of API for public key cryptography.

BTW, the reason of the name "pkey" is that because gcry_pk_ctl is already occupied.
It will be changed, if needed.

Sep 7 2021, 9:52 AM · libgcrypt, Feature Request
gniibe added a comment to T5576: New set of API for public key cryptography.

Today, I pushed an example for RSA-PSS.

Sep 7 2021, 9:50 AM · libgcrypt, Feature Request

Sep 6 2021

Jakuje added a comment to T5576: New set of API for public key cryptography.

I added couple of minor comments. I hope they went into somewhere.

Sep 6 2021, 2:58 PM · libgcrypt, Feature Request
werner moved T5576: New set of API for public key cryptography from Backlog to Next on the FIPS board.
Sep 6 2021, 11:18 AM · libgcrypt, Feature Request
gniibe added a comment to T5576: New set of API for public key cryptography.

I created an experimental branch:
https://dev.gnupg.org/source/libgcrypt/history/gniibe%252Fnew-pk-api/

Sep 6 2021, 9:38 AM · libgcrypt, Feature Request

Sep 3 2021

raf created T5586: Please add dane lookup to --auto-key-retrieve.
Sep 3 2021, 12:53 PM · gnupg (gpg14), Feature Request

Aug 30 2021

gniibe triaged T5576: New set of API for public key cryptography as High priority.
Aug 30 2021, 5:07 AM · libgcrypt, Feature Request

Aug 29 2021

sunknudsen added a comment to T5575: Supplying more than one passphrase or PIN using passphrase-fd.

Thanks for helping out @werner.

Aug 29 2021, 5:23 PM · gnupg, yubikey, Feature Request
werner added projects to T5575: Supplying more than one passphrase or PIN using passphrase-fd: yubikey, gnupg.

You can write your own pinentry script instead of the loopback thing. The use the envvar PINENTRY-USER_DATA to communicate with the pinentry.

Aug 29 2021, 5:00 PM · gnupg, yubikey, Feature Request
sunknudsen created T5575: Supplying more than one passphrase or PIN using passphrase-fd.
Aug 29 2021, 4:38 PM · gnupg, yubikey, Feature Request

Aug 26 2021

Sanmilie added a comment to T5570: Add to detect external interference validation the card type : Securite carte à puce .

by the way when the applet is selected, I return
D2760001240103045343000000010000
this can be used to detect the manufacturer number

Aug 26 2021, 7:09 PM · Feature Request, scd
Sanmilie added a comment to T5570: Add to detect external interference validation the card type : Securite carte à puce .

Card ATR at the cool reset
Card ATR is : 3B 9C 95 81 01 50 53 43 50 2D 53 43 53 56 31 2E 30 8E
Historical Byte is 53435356312E30
CARD ATS-to-ATR is : 3B 8C 80 01 50 53 43 50 2D 53 43 53 56 31 2E 30 0A
CARD ATS is : 11 78 80 B8 02 50 53 43 50 2D 53 43 53 56 31 2E 30
Historical Byte is 53435356312E30
This can by detected for the card type.

Aug 26 2021, 6:57 PM · Feature Request, scd
werner added a project to T5570: Add to detect external interference validation the card type : Securite carte à puce : Feature Request.

Is there another way to to detect your card (I assume a Javacard) without relying on the openpgp card application vendor-id like we do it with the Yubikey? I want to avoid a possible early but expensive AID selection just to get the vendor-id.

Aug 26 2021, 6:29 PM · Feature Request, scd

Aug 25 2021

gniibe closed T5530: Add "prehash" support to DSA and ECDSA signing, a subtask of T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation, as Resolved.
Aug 25 2021, 3:29 AM · FIPS, libgcrypt, Feature Request
gniibe closed T5530: Add "prehash" support to DSA and ECDSA signing as Resolved.
Aug 25 2021, 3:29 AM · Restricted Project, FIPS, libgcrypt, Feature Request
gniibe closed T5529: Support internal hashing for RSA-PSS, a subtask of T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation, as Resolved.
Aug 25 2021, 3:28 AM · FIPS, libgcrypt, Feature Request
gniibe closed T5529: Support internal hashing for RSA-PSS as Resolved.
Aug 25 2021, 3:28 AM · libgcrypt, Feature Request

Aug 23 2021

pert added a comment to T5135: Provide more practical thread-safe strerror, perhaps with strerror_l.

Actually, I think there's a way to make gpg_strerror_r more usable on its own. I previously said

I find it quite difficult to use strerror_r and gpg_strerror_r. With having to guess and retry to get an appropriate buffer length, a wrapper which dynamically allocates the string seems to be needed.

Aug 23 2021, 7:47 PM · gpgrt, Feature Request

Aug 13 2021

calestyo added a comment to T5554: support symmetric encryption with multiple passphrases.

At first I've had simply tried to give multiple --symmetric options (which of course didn't work).

Aug 13 2021, 11:27 PM · symmetric, gnupg, Feature Request
werner triaged T5554: support symmetric encryption with multiple passphrases as Normal priority.

I have no clear idea on how to style the UI for this feature. Technically it is simple but we need top query several passphrases. loopback mode with a list of passphrases might be easiest way to do that.

Aug 13 2021, 11:19 PM · symmetric, gnupg, Feature Request
werner changed the edit policy for Feature Request.
Aug 13 2021, 10:58 PM
calestyo created T5554: support symmetric encryption with multiple passphrases.
Aug 13 2021, 3:32 AM · symmetric, gnupg, Feature Request

Aug 11 2021

ikloecker added a comment to T3659: pinentry falls back to curses on wayland.

@fvogt I've now added a logging category. Thanks for the suggestion.

Aug 11 2021, 5:50 PM · Restricted Project, Wayland, Feature Request, pinentry

Aug 4 2021

fvogt added a comment to T3659: pinentry falls back to curses on wayland.

As far as I understood, $WAYLAND_DISPLAY does not need to be set because there is a well-defined default, but I guess most of the time it's set anyway.

Aug 4 2021, 10:10 AM · Restricted Project, Wayland, Feature Request, pinentry
gniibe added a comment to T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation.

Ah, I understand the point (at least, partially); My understanding is: With FIPS mode, at the module boundary (== libgcrypt), it ensures that all cipher/digest/etc. operations are done under the standard compliance, and it is considered wrong (violation) when non-FIPS mode operation (such as SHA-1) and FIPS mode operation are mixed.

Aug 4 2021, 5:39 AM · FIPS, libgcrypt, Feature Request

Aug 3 2021

ikloecker added a comment to T3659: pinentry falls back to curses on wayland.

QGuiApplication checks $XDG_SESSION_TYPE maybe to find out whether to use X11 or Wayland if $DISPLAY and $WAYLAND_DISPLAY are both set.

Aug 3 2021, 4:58 PM · Restricted Project, Wayland, Feature Request, pinentry
Jakuje added a comment to T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation.

In RHEL, we do not have anything about PCT so the PCT requirement is not completely clear to me: https://git.centos.org/rpms/libgcrypt/blob/c8s/f/SOURCES

Aug 3 2021, 1:33 PM · FIPS, libgcrypt, Feature Request
fvogt added a comment to T3659: pinentry falls back to curses on wayland.

I gave it a try and it works here now with $DISPLAY unset, thanks!

Aug 3 2021, 11:03 AM · Restricted Project, Wayland, Feature Request, pinentry

Aug 2 2021

ikloecker moved T3659: pinentry falls back to curses on wayland from Restricted Project Column to Restricted Project Column on the Restricted Project board.
Aug 2 2021, 5:41 PM · Restricted Project, Wayland, Feature Request, pinentry
ikloecker closed T3659: pinentry falls back to curses on wayland as Resolved.

Should now work for pinentry-qt on Wayland even if DISPLAY is not set.

Aug 2 2021, 5:38 PM · Restricted Project, Wayland, Feature Request, pinentry
ikloecker moved T3659: pinentry falls back to curses on wayland from Restricted Project Column to Restricted Project Column on the Restricted Project board.
Aug 2 2021, 5:08 PM · Restricted Project, Wayland, Feature Request, pinentry
ikloecker added a project to T3659: pinentry falls back to curses on wayland: Restricted Project.
Aug 2 2021, 5:08 PM · Restricted Project, Wayland, Feature Request, pinentry
ikloecker claimed T3659: pinentry falls back to curses on wayland.
Aug 2 2021, 5:08 PM · Restricted Project, Wayland, Feature Request, pinentry

Jul 31 2021

jukivili claimed T4486: Add AEAD mode AES-SIV to libgcrypt (RFC 5297).
Jul 31 2021, 12:36 PM · Feature Request, libgcrypt

Jul 30 2021

bernhard added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

bug has been closed as Wontfix [..] I see no reason to continue the discussion in the bugtracker.

Jul 30 2021, 5:23 PM · gnupg (gpg23), Feature Request
werner added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

This bug has been closed as Wontfix more than a year ago. I see no reason to continue the discussion in the bugtracker.

Jul 30 2021, 9:20 AM · gnupg (gpg23), Feature Request

Jul 29 2021

dkg added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

I share your concerns about centralization of keyserver infrastructure. Rejecting this security fix doesn't help keep keyservers decentralized, though.

Jul 29 2021, 9:27 PM · gnupg (gpg23), Feature Request
gniibe changed the status of T5530: Add "prehash" support to DSA and ECDSA signing from Open to Testing.
Jul 29 2021, 5:00 AM · Restricted Project, FIPS, libgcrypt, Feature Request
gniibe changed the status of T5530: Add "prehash" support to DSA and ECDSA signing, a subtask of T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation, from Open to Testing.
Jul 29 2021, 5:00 AM · FIPS, libgcrypt, Feature Request

Jul 28 2021

bernhard added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

It is now over 10 months that the proponents of these additions have not followed up on the discussion.

Jul 28 2021, 3:42 PM · gnupg (gpg23), Feature Request
werner removed a parent task for T4694: manage first-party attestations: Restricted Maniphest Task.
Jul 28 2021, 3:20 PM · Keyserver, Feature Request

Jul 26 2021

fvogt added a comment to T3659: pinentry falls back to curses on wayland.

Huh, can't believe I somehow missed that this actually got a reply three years ago...

Jul 26 2021, 2:50 PM · Restricted Project, Wayland, Feature Request, pinentry

Jul 23 2021

gniibe triaged T5530: Add "prehash" support to DSA and ECDSA signing as Normal priority.
Jul 23 2021, 8:18 AM · Restricted Project, FIPS, libgcrypt, Feature Request
gniibe updated the task description for T5529: Support internal hashing for RSA-PSS.
Jul 23 2021, 7:36 AM · libgcrypt, Feature Request
gniibe updated the task description for T5529: Support internal hashing for RSA-PSS.
Jul 23 2021, 7:22 AM · libgcrypt, Feature Request
gniibe triaged T5529: Support internal hashing for RSA-PSS as Normal priority.
Jul 23 2021, 4:26 AM · libgcrypt, Feature Request

Jul 16 2021

gniibe added a comment to T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation.

And... as long as I read the PCT patches, it is not needed to export those API to users.
It is only needed internally for PCT tests (at most).

Jul 16 2021, 10:12 AM · FIPS, libgcrypt, Feature Request
gniibe added a comment to T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation.

I am considering API enhancement, for this task.

Jul 16 2021, 10:01 AM · FIPS, libgcrypt, Feature Request

Jul 12 2021

werner assigned T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation to gniibe.
Jul 12 2021, 11:20 AM · FIPS, libgcrypt, Feature Request
werner raised the priority of T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation from Normal to High.
Jul 12 2021, 11:20 AM · FIPS, libgcrypt, Feature Request
gniibe added a comment to T4873: Enable AES GCM in FIPS mode.

(OpenSSL for FIPS support is a bit tricky, which is described in README-FIPS.md in their distribution. It offers OpenSSL FIPS provider as shared library fips.so.)

Jul 12 2021, 3:38 AM · FIPS, libgcrypt, Feature Request

Jul 8 2021

Jakuje added a comment to T4873: Enable AES GCM in FIPS mode.

I have couple of references from libssh:

Jul 8 2021, 2:57 PM · FIPS, libgcrypt, Feature Request
werner added a comment to T4873: Enable AES GCM in FIPS mode.

gniibe: Can you please check what openssl does exactly. The problem is that we currently have no permanent state for Libgcrypt (i.e. something stored on disk per user or even better global)

Jul 8 2021, 2:29 PM · FIPS, libgcrypt, Feature Request
werner added a comment to T4873: Enable AES GCM in FIPS mode.

FWIW: Unfortunately everyone is moving to GCM, even Outlook. While GnuPG was evaluated by the German BSI we had discussions about this and their evaluators were wary about GCM due to its brittleness thus our use of OCB was very welcomed. OTOH, another approved product meanwhile comes with GCM for S/MIME and thus it seems thatGCM is accepted.

Jul 8 2021, 2:20 PM · FIPS, libgcrypt, Feature Request
Jakuje added a comment to T5521: Use of conscious language.

There is no point in questioning whether a couple of words change racism or any other human problems of these days. It will not.

Jul 8 2021, 10:38 AM · gnupg24, Won't Fix, Feature Request, gnupg (gpg23), libgcrypt
Jakuje added a comment to T4873: Enable AES GCM in FIPS mode.

Right. The AES-GCM was not allowed in FIPS mode until recently and I think now it is acceptable only for certain protocols (TLS, SSH), which guarantee that the IV is handled "correctly". As mentioned by gniibe, the requirements is that one should not be able to set IV to any specific value. The IV should be incremented automatically inside of the library (with some mask length + some generator configuration), somehow similarly as it is done with openssl, which would probably requite a new API in libgcrypt.

Jul 8 2021, 10:09 AM · FIPS, libgcrypt, Feature Request
gniibe added a comment to T4873: Enable AES GCM in FIPS mode.

If I understand correctly, to conform FIPS, we need to ensure Key/IV pair uniqueness (See "Implementation Guidance for FIPS 140-3", Annex C. "C.H Key/IV Pair Uniqueness Requirements from SP 800-38D").
Use of the API to set IV by any value may be considered bad.

Jul 8 2021, 3:55 AM · FIPS, libgcrypt, Feature Request

Jul 7 2021

Saturneric added a comment to T5468: About the API of GpgME to revoke key pairs and subkeys..

Thanks for the reply, this source code file and suggestions are very useful. Let gpg execute commands is a solution, but it is not optimal compared to providing a functional interface.
In addition, it is reversible to revoke the subkey by expiring it. But I will use the solutions you provide at this stage, knowing that you have time to provide better solutions. thank you!

Jul 7 2021, 6:26 PM · gpgme, Feature Request
werner triaged T5521: Use of conscious language as Wishlist priority.

Sorry, this is not acceptable to me. <rant>You don't change racism by avoid words which are may be connected to racism. Master is a term used for example to indicate that a person is proficient in her profession. Slave is (in theory) a historic term to describe, well slaves. That is humans who are non-free and are not allowed to control their lives - like the majority of humans these days - they are just called different and the methods of suppression are different than in the past. In fact a Roman slave (but not a medieval bondsman) had well defined and esteemed rights not something the majority of US citizen with a dark skin has in practice. Term abolished, racism abolished, works as good as freeing the US slaves in the 1856, the 1960, or still today. It did not work. Mr. Kings hope has not yet realized itself and is now maybe farther away than we all had hoped in the second half of the last century. Don't cover facts by changing words used in a very different context.</rant>

Jul 7 2021, 5:48 PM · gnupg24, Won't Fix, Feature Request, gnupg (gpg23), libgcrypt
werner triaged T5480: Export keys + manual as Low priority.
Jul 7 2021, 2:28 PM · Info Needed, gpg4win, Feature Request
ikloecker added a comment to T5468: About the API of GpgME to revoke key pairs and subkeys..

What do you mean by "exporting revocation certificates"? Once such a certificate is imported you simply export the public key including the revocation signature. Otherwise, simply takes the revocation certificates from ${GNUPGHOME}/openpgp-revocs.d where they are written to, if you generate a key. Kleopatra uses gpg directly to generate a revocation certificate mimicking what gpgme would do: See https://dev.gnupg.org/source/kleo/browse/master/src/commands/genrevokecommand.cpp.

Jul 7 2021, 10:24 AM · gpgme, Feature Request

Jul 6 2021

werner lowered the priority of T4884: PKCS #15 support in gpgsm from High to Normal.
Jul 6 2021, 6:12 PM · Feature Request, gnupg, scd, S/MIME
werner triaged T5468: About the API of GpgME to revoke key pairs and subkeys. as Normal priority.
Jul 6 2021, 6:10 PM · gpgme, Feature Request

Jun 24 2021

werner renamed T5284: Allow gpgme to export w/o attributes from gpgme uses incorrect flags for minimal, no uid export of public keys to Allow gpgme to export w/o attributes.
Jun 24 2021, 6:24 PM · Feature Request, gpgme
werner moved T5353: gpgme: Implement keylist_data for gpgsm from Backlog to For a future release on the gpgme board.
Jun 24 2021, 6:21 PM · gnupg24, gnupg (gpg23), gpgme, Feature Request

Jun 21 2021

werner triaged T5503: Add APIs to sign (and encrypt?) with a specific subkey as Normal priority.
Jun 21 2021, 5:16 PM · gpgme, Feature Request
gahr created T5503: Add APIs to sign (and encrypt?) with a specific subkey.
Jun 21 2021, 5:09 PM · gpgme, Feature Request

Jun 20 2021

werner activated P5 bak.
Jun 20 2021, 6:16 PM · Feature Request
Fred23 archived P5 bak.
Jun 20 2021, 6:02 PM · Feature Request

Jun 18 2021

werner triaged T5494: gpg-agent doesn't support security-key (sk) key types as Low priority.

ggp-agent has no support for U2F and it can't work with these key types. Given that Yubikeys also have proper keys (even eddsa) I doubt that we will implement support for ecdsa-sk OpenSSH feature any time soon,

Jun 18 2021, 11:31 PM · gnupg24, gnupg (gpg23), Feature Request, ssh
svenschwermer updated the task description for T5494: gpg-agent doesn't support security-key (sk) key types.
Jun 18 2021, 7:50 PM · gnupg24, gnupg (gpg23), Feature Request, ssh
svenschwermer created T5494: gpg-agent doesn't support security-key (sk) key types.
Jun 18 2021, 7:48 PM · gnupg24, gnupg (gpg23), Feature Request, ssh

Jun 16 2021

werner added a comment to T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation.

Some ideas:

  • the someflags thing will probably just be a reserved parameter
  • If DATA is not NULL but an MD is set the sign function should fail
  • Should ownership of MD be moved to the CTX?
Jun 16 2021, 11:11 AM · FIPS, libgcrypt, Feature Request
Jakuje added a comment to T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation.

In an email from @werner couple days back, I got a suggestion that we could use hashing tied to the context, rather than this one-shot call tied only to digests. I circled back this suggestion to Stephan and he confirmed that it should be fine from the FIPS point of view so I am posting the suggested API here too:

ctx = gcry_pk_new (someflags)
md = gcry_md_open (...)
gcry_ctx_set_md (md);
gcry_pk_sign_ext (ctx, result, data, skey)
[...]
gcry_ctx_release (ctx);
Jun 16 2021, 10:52 AM · FIPS, libgcrypt, Feature Request
gniibe added a comment to T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation.

OK. I think that the patch at SUSE is updated one which works.
As I understand correctly, this is a kind of very old patch, which intended to work around old libgcrypt limitation of RSA PSS.

Jun 16 2021, 10:34 AM · FIPS, libgcrypt, Feature Request
gniibe added a comment to T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation.

I think that {D1476} is still a sketch (not real code which works). I would guess an intended use, but it's good to have concrete example program which uses the feature being added.

Jun 16 2021, 8:45 AM · FIPS, libgcrypt, Feature Request
werner added a comment to T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation.

FWIW, there is also this newer patch: https://dev.gnupg.org/differential/diff/1476/
and SUSE seems to already use a modified API:
https://sources.suse.com/SUSE:Maintenance:15118/libgcrypt.SUSE_SLE-15_Update/26a8df5f96d27d6abca7bd7ba9b0def0/libgcrypt-FIPS-RSA-DSA-ECDSA-hashing-operation.patch

Jun 16 2021, 8:40 AM · FIPS, libgcrypt, Feature Request

Jun 15 2021

werner added a comment to T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation.

Our public key functions are stateless. For several reasons it would be good to have an option to keep some state (think pre-computations). Our gcry_ctx_t would be a perfect fit for this and it will allow us to join a pubkey function with for example a hash function.

Jun 15 2021, 1:42 PM · FIPS, libgcrypt, Feature Request
gniibe added a comment to T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation.

Does the patch really work, or is it a sketch to describe the intended use?

Jun 15 2021, 12:37 PM · FIPS, libgcrypt, Feature Request

Jun 10 2021

werner added a project to T5480: Export keys + manual: gpg4win.

The private key contains the public key. Thus there is no need to export the public key if you already got the secret key.

Jun 10 2021, 10:39 PM · Info Needed, gpg4win, Feature Request
rda updated the task description for T5480: Export keys + manual.
Jun 10 2021, 3:39 PM · Info Needed, gpg4win, Feature Request
rda created T5480: Export keys + manual.
Jun 10 2021, 3:36 PM · Info Needed, gpg4win, Feature Request

Jun 2 2021

Saturneric created T5468: About the API of GpgME to revoke key pairs and subkeys..
Jun 2 2021, 9:08 PM · gpgme, Feature Request
werner triaged T5463: gpgconf: Options that gpgconf won't change should be flagged as read-only as Normal priority.

There is also the issue that options flagged as ignore or forced in the global config file won't have an effect either. But indeed we could mark them as non-change.

Jun 2 2021, 5:00 PM · gnupg24, gnupg (gpg23), Feature Request

Jun 1 2021

ikloecker created T5463: gpgconf: Options that gpgconf won't change should be flagged as read-only.
Jun 1 2021, 11:21 AM · gnupg24, gnupg (gpg23), Feature Request

May 19 2021

cesar.portilla added a comment to T5324: Kleopatra: Add recursive folder decryption.

I did a new test and found that if it is a single file regardless of disk size, no error appears, but when there are multiple files in a single encrypted folder with a size greater than 1.5GB, the error occurs. Traverse a directory like Zorvek and Aheinecke wrote would be an optimal solution or at least some alert messsage to be aware of the action no supported.

May 19 2021, 9:12 PM · kleopatra, Feature Request, gpg4win
aheinecke added a comment to T5324: Kleopatra: Add recursive folder decryption.

I have allowed myself to edit this task to more reflect what this is about. Although the error is of course in my opinion more of a bug because it is so bad but I would rather fix it with this feature.

May 19 2021, 2:25 PM · kleopatra, Feature Request, gpg4win
aheinecke renamed T5324: Kleopatra: Add recursive folder decryption from Decrypt Folder Fails to Kleopatra: Add recursive folder decryption.
May 19 2021, 2:25 PM · kleopatra, Feature Request, gpg4win
aheinecke added a comment to T5324: Kleopatra: Add recursive folder decryption.

I actually agree that this makes sense. I mean at least Kleo could say: "Hey we have detected 50 files that are encryped in this folder tree, do you really want to decrypt them all?"

May 19 2021, 2:21 PM · kleopatra, Feature Request, gpg4win
werner edited projects for T5324: Kleopatra: Add recursive folder decryption, added: Feature Request; removed Support, Bug Report.
May 19 2021, 9:50 AM · kleopatra, Feature Request, gpg4win

May 10 2021

ikloecker closed T5426: [Pinentry]: add remeber password checkbox in pinentry-qt. as Wontfix.

GnuPG (more precisely gpg-agent) does cache the password for some time in memory. The default is 10 minutes. Add

default-cache-ttl n

where n is the number of seconds to cache the password, to ~/.gnupg/gpg-agent.conf.

May 10 2021, 9:23 AM · Feature Request

May 8 2021

evan0g created T5426: [Pinentry]: add remeber password checkbox in pinentry-qt..
May 8 2021, 11:17 AM · Feature Request

Apr 26 2021

gniibe added a comment to T1756: gpg-agent doesn't accept ssh certificates.

Update:
It looks like OpenSSH version 8 now supports ssh-agent's handling REQUEST_IDENTITIES.

Apr 26 2021, 8:32 AM · gnupg, Feature Request