Page MenuHome GnuPG
Feed Advanced Search

Thu, Nov 6

ikloecker requested review of D615: gpg: Emit status error for unsupported export of secret dual key.
Thu, Nov 6, 8:11 AM · gnupg26
gniibe added a comment to T7873: Decrypt to foo.gpg.part files and rename.

Here is my idea to implement the feature:
(1) Extend struct iobuf_struct to have a field of temporary output (of int), just after real_fname.

  • OUTPUTFILE: When it's 1, a file generated with real_fname original suffix removed and appended .tmp is used for the output

(2) Modify get_output_file in plaintext.c and make_outfile_name in openfile.c, so that OUTPUTFILE above is used and the field in iobuf_struct is marked.
(3) Modify proc_encrypted in mainproc.c so that rename .tmp file to the OUTPUTFILE or remove it when failure.

Thu, Nov 6, 3:54 AM · Feature Request, gnupg26
gniibe added a comment to T7649: gnupg: Use KEM interface for encryption/decryption.

Let me explain the background.

Thu, Nov 6, 12:57 AM · gnupg26

Wed, Nov 5

onickolay added a comment to T7649: gnupg: Use KEM interface for encryption/decryption.

@gniibe Thanks for the detailed reply. Looks like we were lucky to hit v2.5.12 when building our CI containers few weeks ago, rebuilding those now with 2.5.13 fixed the problem. Thanks again!

Wed, Nov 5, 7:25 PM · gnupg26
ebo edited projects for T7333: Allow gpg to auto-upload a new own key to LDAP servers, added: vsd34; removed vsd33.
Wed, Nov 5, 11:56 AM · vsd34, gnupg26, gnupg22
gniibe closed T7845: gpgsm: Use KEM interface for encryption as Resolved.
Wed, Nov 5, 2:25 AM · gnupg26
gniibe closed T7845: gpgsm: Use KEM interface for encryption, a subtask of T7649: gnupg: Use KEM interface for encryption/decryption, as Resolved.
Wed, Nov 5, 2:25 AM · gnupg26
gniibe closed T7811: gpgsm: Use KEM interface for decryption, a subtask of T7649: gnupg: Use KEM interface for encryption/decryption, as Resolved.
Wed, Nov 5, 2:24 AM · gnupg26
gniibe closed T7811: gpgsm: Use KEM interface for decryption as Resolved.
Wed, Nov 5, 2:24 AM · gnupg26

Mon, Nov 3

gniibe closed T7138: Windows (Semi-hosted environment): filename and network access, a subtask of T6508: Port GnuPG to 64-bit Windows, as Resolved.
Mon, Nov 3, 3:41 AM · Windows 64, Feature Request, gnupg26
gniibe added a comment to T7649: gnupg: Use KEM interface for encryption/decryption.

@onickolay The change was originally introduced for PQC stuff. And then, we applied use of KEM API (of libgcrypt) also for ordinary ECDH, so, it affected ordinary ECDH encryption (between 2.5.9 and 2.5.12).
The intention is follow the recommendation of use of KEM. IIUC, next FIPS certification will require use of KEM, possibly.

Mon, Nov 3, 1:37 AM · gnupg26

Sun, Nov 2

onickolay added a comment to T7649: gnupg: Use KEM interface for encryption/decryption.

@gniibe @werner Is this change is supposed to work only for PQC stuff, or non-PQC as well, and where it is defined? As it breaks RNP tests for ordinary ECDH encryption (as it looks up for 0x40 prefix). It's not a problematic to update our code, but just want to know the reason for that.

Sun, Nov 2, 3:23 PM · gnupg26

Mon, Oct 27

timegrid added a comment to T7875: GnuPG: Deletion of kyber key fails.

Note that currently Kleopatra (gpg4win 5 beta) fails to delete the key, which might impact other operations. I'm currently trying to figure out, if some other bugs/quirks are a subsequent error or not.

Mon, Oct 27, 12:33 PM · Bug Report, PQC, gnupg26
werner triaged T7875: GnuPG: Deletion of kyber key fails as Normal priority.

Workaround is to use --with-keygrip and delete both <keygrip>.key files. Problem here is that one part may be on a smartcard or one part might be shared (although not allowed) with other keys.

Mon, Oct 27, 12:17 PM · Bug Report, PQC, gnupg26

Fri, Oct 24

werner triaged T7873: Decrypt to foo.gpg.part files and rename as Normal priority.
Fri, Oct 24, 9:37 AM · Feature Request, gnupg26

Thu, Oct 23

werner merged T7779: dirmngr: use different keyserver for sending and receiving certificates into T7866: Allow separate LDAP keyserver for uploading.
Thu, Oct 23, 1:40 PM · LDAP, Feature Request, gnupg26

Wed, Oct 22

werner moved T7804: de-vs compliance not shown if also password encrypted from WIP to QA on the gnupg26 board.
Wed, Oct 22, 2:26 PM · gnupg22 (gnupg-2.2.49), vsd33 (vsd-3.3.3), Bug Report, vsd, gnupg26
werner moved T1825: Add a re-encrypt to additional key from Backlog to QA on the gnupg26 board.
Wed, Oct 22, 2:25 PM · gnupg26, Restricted Project, Feature Request
werner changed the status of T1825: Add a re-encrypt to additional key from Open to Testing.
Wed, Oct 22, 2:25 PM · gnupg26, Restricted Project, Feature Request
werner moved T7855: keybox/keydb locking issue in 2.6 from Backlog to QA on the gnupg26 board.
Wed, Oct 22, 2:24 PM · gnupg26, gpd5x
werner moved T7866: Allow separate LDAP keyserver for uploading from WIP to QA on the gnupg26 board.
Wed, Oct 22, 2:24 PM · LDAP, Feature Request, gnupg26
werner changed the status of T7840: Oddity with 7816 change_reference_data from Open to Testing.
Wed, Oct 22, 2:23 PM · Bug Report, gnupg22, gnupg26, scd
werner added a comment to T7855: keybox/keydb locking issue in 2.6 .

I'd sad we keep it as it is now (unless we see a regression). The real and only correct solution is the use of a daemon to serialize access.

Wed, Oct 22, 1:34 PM · gnupg26, gpd5x
gniibe added a comment to T7855: keybox/keydb locking issue in 2.6 .

Still, there is a fundamental problem with keydb locking.

  • It only assures no-data-corruption.
  • When a process doing write access, another process reading the resource may encounter a problem (inconsistent data read), since data could be changed while accessing.
    • Currently, write access may occur with keybox compress, this means that users are not safe to invoke multiple gpg/gpgsm simultaneously (to be sure).
      • It would be: only keybox compress when users explicitly ask.
    • We could introduce a lock to read access... BUT naively adding a lock (both for read and write or read-multiple-write-one) results possible deadlock in gpgsm
      • in gpgsm, gpgsm_walk_cert_chain and gpgsm_validate_chain access the resource of keydb in a way of:
        • While it has a handle kh, by find_up routine, it may call keydb_store_cert by callback routine; The callback does write access to the resource opening another handle.
        • Currently, it works because of no lock for read access and keydb_store_cert appends data at the end.
Wed, Oct 22, 9:20 AM · gnupg26, gpd5x
gniibe changed the status of T7855: keybox/keydb locking issue in 2.6 from Open to Testing.

All changes in gniibe/t7855 are pushed into master.

Wed, Oct 22, 4:38 AM · gnupg26, gpd5x

Tue, Oct 21

werner changed the status of T7866: Allow separate LDAP keyserver for uploading from Open to Testing.

Implemented but not tested at all.

Tue, Oct 21, 10:48 AM · LDAP, Feature Request, gnupg26
werner triaged T7866: Allow separate LDAP keyserver for uploading as Normal priority.
Tue, Oct 21, 10:42 AM · LDAP, Feature Request, gnupg26
gniibe changed the status of T7805: Permission denied on batch deletion of mixed (openpgp+smime) certs, a subtask of T7855: keybox/keydb locking issue in 2.6 , from Open to Testing.
Tue, Oct 21, 6:50 AM · gnupg26, gpd5x
gniibe changed the status of T7138: Windows (Semi-hosted environment): filename and network access, a subtask of T6508: Port GnuPG to 64-bit Windows, from Open to Testing.
Tue, Oct 21, 4:57 AM · Windows 64, Feature Request, gnupg26

Fri, Oct 17

gniibe added a comment to T7855: keybox/keydb locking issue in 2.6 .

Lastly, pushed a change into gniibe/t7855 branch.
rGf861b2a33f96: gpg,gpgsm: Fix thinko for FP closing under no lock.

Fri, Oct 17, 9:01 AM · gnupg26, gpd5x

Thu, Oct 16

gniibe added a comment to T7855: keybox/keydb locking issue in 2.6 .

I pushed further changes into gniibe/t7855 branch.
rG2fe62809014e: gpg,gpgsm: Serialize write access to keybox/keyring to protect.

Thu, Oct 16, 9:30 AM · gnupg26, gpd5x

Wed, Oct 15

gniibe added a subtask for T7855: keybox/keydb locking issue in 2.6 : T7805: Permission denied on batch deletion of mixed (openpgp+smime) certs.
Wed, Oct 15, 9:36 AM · gnupg26, gpd5x
gniibe added a comment to T7855: keybox/keydb locking issue in 2.6 .

For remaining changes in 2.2, I pushed changes into gniibe/t7855 branch.
rGbd65b06b74c2: gpg,gpgsm: Don't lock recursively when KEEP_LOCK is enabled.
rG423fd047da87: kbx,gpg,gpgsm: Add FP-close method for keydb to close before unlock.
rG966258ac5f99: gpgsm: Fix delete and store certificate locking glitches.

Wed, Oct 15, 8:10 AM · gnupg26, gpd5x
gniibe added a comment to T7855: keybox/keydb locking issue in 2.6 .

I pushed changes into gniibe/t7855 for compressing the keybox.
rG8cc2a0e0ffee: gpg: Minor clean up for keydb_lock API.
rGe4d3c3aa2220: kbx,gpg,gpgsm: Introduce keybox_compress_when_no_other_users.
rG3e441d5b299f: kbx,gpg,gpgsm: More changes for compressing the keybox.

Wed, Oct 15, 2:37 AM · gnupg26, gpd5x

Tue, Oct 14

gniibe added a comment to T7855: keybox/keydb locking issue in 2.6 .

Then, we need to integrate following commits of 2.2 into gniibe/t7855 branch:
rG43fe9073aa81: gpg,gpgsm: Tweak the locking of the pubring.kbx
rG8491aca73cff: gpg: Revert the always locking introduced with 43fe9073aa
rGad4a5117ab1c: gpgsm: Properly release the lock when compressing a pubring.
rG7962eca3a023: gpgsm: Change delete and store certificate locking glitches.
rG22f9c4a3b3c1: gpg: Release lock after close also in the compress code path.

Tue, Oct 14, 8:08 AM · gnupg26, gpd5x
gniibe added a comment to T7855: keybox/keydb locking issue in 2.6 .

I created gniibe/t7855 branch for this issue.
To start with, I forward-port/cherry-pick 2.2 commits to the branch:
rG39430d9f78dc: build,common,g13,sm,tools: Require GpgRT 1.56.
rGe71aca2a628d: common: New function gnupg_remove_ext.
rGe38c5f7d5873: w32:common: Take care of possible race on startup under Windows.
rG7bfd37e305c0: common,w32: Always use share mode readwrite for the keybox.

Tue, Oct 14, 8:04 AM · gnupg26, gpd5x

Oct 10 2025

gniibe added a comment to T7855: keybox/keydb locking issue in 2.6 .

I understand that this is for 2.6.

Oct 10 2025, 9:24 AM · gnupg26, gpd5x

Oct 9 2025

werner renamed T7855: keybox/keydb locking issue in 2.6 from keybox/keydb locking issue to keybox/keydb locking issue in 2.6 .
Oct 9 2025, 5:54 PM · gnupg26, gpd5x
werner edited projects for T7855: keybox/keydb locking issue in 2.6 , added: gnupg26; removed vsd34, vsd33.

Except for the release/unlock thing after keybox_compress I already have the other fixes in my 2.2 commits. I noticed that the gpgsm keydb lock/release stuff differes from the one for gpg: For gpg we use the keybox_lock function but that is bot used at all by gpgsm. In theory this should be unified but I fear a regression risk and thus for 2.2 we better don't touch it.

Oct 9 2025, 5:54 PM · gnupg26, gpd5x

Oct 8 2025

gniibe changed the status of T7845: gpgsm: Use KEM interface for encryption, a subtask of T7649: gnupg: Use KEM interface for encryption/decryption, from Open to Testing.
Oct 8 2025, 6:57 AM · gnupg26
gniibe changed the status of T7845: gpgsm: Use KEM interface for encryption from Open to Testing.
Oct 8 2025, 6:57 AM · gnupg26

Oct 7 2025

gniibe triaged T7845: gpgsm: Use KEM interface for encryption as High priority.
Oct 7 2025, 8:56 AM · gnupg26
gniibe changed the status of T7811: gpgsm: Use KEM interface for decryption, a subtask of T7649: gnupg: Use KEM interface for encryption/decryption, from Open to Testing.
Oct 7 2025, 8:53 AM · gnupg26
gniibe changed the status of T7811: gpgsm: Use KEM interface for decryption from Open to Testing.
Oct 7 2025, 8:53 AM · gnupg26

Oct 6 2025

gniibe added a comment to T7811: gpgsm: Use KEM interface for decryption.

Reading the commit log message in rG6dc3846d7819: sm: Support creation of EdDSA certificates.
I created a file to keygen.

Key-Type: ECDSA
Key-Length: 1024
Key-Grip: 0286DCA85E771F64AB9FD9C89717369524D55471
Key-Usage: sign,encrypt
Hash-Algo: sha384
Serial: random
Name-DN: CN=dummy test nistp384
Oct 6 2025, 7:28 AM · gnupg26

Oct 2 2025

werner moved T7840: Oddity with 7816 change_reference_data from Backlog to WIP on the gnupg26 board.
Oct 2 2025, 3:11 PM · Bug Report, gnupg22, gnupg26, scd
werner triaged T7840: Oddity with 7816 change_reference_data as Normal priority.
Oct 2 2025, 2:54 PM · Bug Report, gnupg22, gnupg26, scd

Sep 26 2025

gniibe added a comment to T7811: gpgsm: Use KEM interface for decryption.

This is current work of mine:

Sep 26 2025, 10:50 AM · gnupg26

Sep 24 2025

werner added a comment to T7730: gpg: retrieve a certificate from an LDAP server before sending it to the LDAP server.

Also implemented for 2.2

Sep 24 2025, 4:58 PM · gnupg22, gnupg26, Feature Request, gpd5x
werner added a comment to T7333: Allow gpg to auto-upload a new own key to LDAP servers.

Will be backported after 2.2.49

Sep 24 2025, 2:41 PM · vsd34, gnupg26, gnupg22
werner moved T7333: Allow gpg to auto-upload a new own key to LDAP servers from WiP to Backlog on the gnupg22 board.
Sep 24 2025, 2:40 PM · vsd34, gnupg26, gnupg22
werner claimed T7730: gpg: retrieve a certificate from an LDAP server before sending it to the LDAP server.
Sep 24 2025, 1:38 PM · gnupg22, gnupg26, Feature Request, gpd5x
werner moved T7804: de-vs compliance not shown if also password encrypted from QA to gnupg-2.2.49 on the gnupg22 board.
Sep 24 2025, 1:24 PM · gnupg22 (gnupg-2.2.49), vsd33 (vsd-3.3.3), Bug Report, vsd, gnupg26
werner moved T5447: Add feature to delete a key from an LDAP server from QA to gnupg-2.2.49 on the gnupg22 board.
Sep 24 2025, 1:24 PM · gnupg22 (gnupg-2.2.49), vsd33 (vsd-3.3.3), gnupg26, LDAP
ebo moved T7804: de-vs compliance not shown if also password encrypted from WiP to vsd-3.3.3 on the vsd33 board.
Sep 24 2025, 12:15 PM · gnupg22 (gnupg-2.2.49), vsd33 (vsd-3.3.3), Bug Report, vsd, gnupg26
ebo added a comment to T7804: de-vs compliance not shown if also password encrypted.

Tested with VS-Desktop-3.3.90.12-Beta

Sep 24 2025, 12:13 PM · gnupg22 (gnupg-2.2.49), vsd33 (vsd-3.3.3), Bug Report, vsd, gnupg26

Sep 23 2025

werner moved T7804: de-vs compliance not shown if also password encrypted from WiP to QA on the gnupg22 board.

2.2 test can be done with GnuPG-VS-Desktop-3.3.90.12-Beta-Standard.msi from Sep 17

Sep 23 2025, 1:47 PM · gnupg22 (gnupg-2.2.49), vsd33 (vsd-3.3.3), Bug Report, vsd, gnupg26

Sep 19 2025

William closed T7791: encryption fails with "Invalid Length" error when using Kyber1024 keys as Resolved.
Sep 19 2025, 6:21 PM · PQC, gnupg26, Bug Report

Sep 17 2025

ebo moved T7804: de-vs compliance not shown if also password encrypted from Backlog to WiP on the vsd33 board.
Sep 17 2025, 8:45 AM · gnupg22 (gnupg-2.2.49), vsd33 (vsd-3.3.3), Bug Report, vsd, gnupg26

Sep 16 2025

werner changed the status of T7804: de-vs compliance not shown if also password encrypted from Open to Testing.

Backported to 2.2 but not yes tested with 2.2

Sep 16 2025, 3:31 PM · gnupg22 (gnupg-2.2.49), vsd33 (vsd-3.3.3), Bug Report, vsd, gnupg26
ebo added a project to T7804: de-vs compliance not shown if also password encrypted: vsd33.
Sep 16 2025, 2:54 PM · gnupg22 (gnupg-2.2.49), vsd33 (vsd-3.3.3), Bug Report, vsd, gnupg26

Sep 15 2025

gniibe updated the task description for T7811: gpgsm: Use KEM interface for decryption.
Sep 15 2025, 7:21 AM · gnupg26
gniibe updated the task description for T7811: gpgsm: Use KEM interface for decryption.
Sep 15 2025, 7:20 AM · gnupg26
gniibe lowered the priority of T7811: gpgsm: Use KEM interface for decryption from High to Normal.
Sep 15 2025, 7:07 AM · gnupg26
gniibe triaged T7811: gpgsm: Use KEM interface for decryption as High priority.
Sep 15 2025, 7:07 AM · gnupg26

Sep 9 2025

timegrid moved T7730: gpg: retrieve a certificate from an LDAP server before sending it to the LDAP server from WIP to QA on the gpd5x board.
Sep 9 2025, 3:52 PM · gnupg22, gnupg26, Feature Request, gpd5x
timegrid moved T7757: Kleopatra: Error "no data" on decryption of tar.gpg archive from WIP to Done on the gpd5x board.

Looks good to me on gpg4win-5.0.0-beta369 @ win10

Sep 9 2025, 10:57 AM · gnupg26, gpd5x, kleopatra

Sep 8 2025

timegrid moved T7759: Kleopatra: Notepad encryption with S/MIME fails from QA to Done on the gpd5x board.

Looks good to me on gpg4win-5.0.0-beta369 @ win10.
Can't reproduce it anymore, message is S/MIME decrypted instantly:

Sep 8 2025, 3:43 PM · gnupg26, gpgme, kleopatra, gpd5x

Sep 5 2025

werner moved T7759: Kleopatra: Notepad encryption with S/MIME fails from Backlog to QA on the gpd5x board.
Sep 5 2025, 2:39 PM · gnupg26, gpgme, kleopatra, gpd5x
werner changed the status of T7759: Kleopatra: Notepad encryption with S/MIME fails from Open to Testing.

Uses gpgme-2.0.0 with the above mentioned patches. I have seen no problems in my quick tests.

Sep 5 2025, 2:38 PM · gnupg26, gpgme, kleopatra, gpd5x

Sep 4 2025

werner added a project to T7335: S/MIME keys are not listed correctly: gnupg26.

Is that really the same bug? I would be interested in seeing a more detailed report. BTW, Windows or Linux? Used standard beta installer on Windows?

Sep 4 2025, 9:52 PM · gnupg26, gnupg, Bug Report

Sep 3 2025

werner added a comment to T7804: de-vs compliance not shown if also password encrypted.

In contrast to gnupg22 master did not proper show OCB compliance - not everything has yet been forward ported. But we can do so now and test master by setting GNUPG_ASSUME_COMPLIANCE=de-vs

Sep 3 2025, 4:27 PM · gnupg22 (gnupg-2.2.49), vsd33 (vsd-3.3.3), Bug Report, vsd, gnupg26
werner edited projects for T7804: de-vs compliance not shown if also password encrypted, added: gnupg22; removed gnupg24.
Sep 3 2025, 4:20 PM · gnupg22 (gnupg-2.2.49), vsd33 (vsd-3.3.3), Bug Report, vsd, gnupg26
werner triaged T7804: de-vs compliance not shown if also password encrypted as Normal priority.
Sep 3 2025, 3:48 PM · gnupg22 (gnupg-2.2.49), vsd33 (vsd-3.3.3), Bug Report, vsd, gnupg26

Sep 2 2025

werner moved T7333: Allow gpg to auto-upload a new own key to LDAP servers from Backlog to QA on the gnupg26 board.
Sep 2 2025, 3:00 PM · vsd34, gnupg26, gnupg22
werner moved T7333: Allow gpg to auto-upload a new own key to LDAP servers from Backlog to WiP on the gnupg22 board.
Sep 2 2025, 3:00 PM · vsd34, gnupg26, gnupg22
werner moved T7730: gpg: retrieve a certificate from an LDAP server before sending it to the LDAP server from WIP to QA on the gnupg26 board.
Sep 2 2025, 2:59 PM · gnupg22, gnupg26, Feature Request, gpd5x
werner moved T7788: Invalid selection in addkey from QA to Done on the gnupg26 board.
Sep 2 2025, 2:58 PM · gnupg26, Bug Report
werner moved T7788: Invalid selection in addkey from Backlog to QA on the gnupg26 board.
Sep 2 2025, 2:58 PM · gnupg26, Bug Report
werner moved T7649: gnupg: Use KEM interface for encryption/decryption from WIP to QA on the gnupg26 board.
Sep 2 2025, 2:57 PM · gnupg26
werner moved T7491: Confusing additional pinentry on creation of new keypair with ADSK configured from WIP to QA on the gnupg26 board.
Sep 2 2025, 2:57 PM · gpgagent, gnupg26, gnupg
werner moved T7742: Extend the LDAP scheme for non-NTDS installations from WIP to QA on the gnupg26 board.
Sep 2 2025, 2:56 PM · dirmngr, LDAP, gnupg26
werner moved T7757: Kleopatra: Error "no data" on decryption of tar.gpg archive from Done to QA on the gnupg26 board.
Sep 2 2025, 2:56 PM · gnupg26, gpd5x, kleopatra

Sep 1 2025

gniibe added a comment to T7759: Kleopatra: Notepad encryption with S/MIME fails.

I fixed the problem (which I identified above) in gniibe/t7759 branch. There might be other causes/problems for the particular symptom, so, I don't know the fix resolves the symptom or not, though. Anyhow, I believe that this is an improvement.

Sep 1 2025, 4:16 AM · gnupg26, gpgme, kleopatra, gpd5x

Aug 27 2025

werner added a comment to T6465: Store the ECDH parameters in the key file.

@gniibe: Now that we use the KEM API, how do we proceed with this ticket?

Aug 27 2025, 4:16 PM · gnupg26, OpenPGP, scd, Bug Report
werner lowered the priority of T7618: gpgsm: Allow selecting keys by SHA2 fpr from Normal to Wishlist.

The problem here is that we don't have the sha-2 fingerprint in our SQL tables. Thus we would not only need to do a full table search but also parse the actual blob to compute the sha-2 fingerprint.

Aug 27 2025, 4:14 PM · S/MIME, gnupg26, Feature Request
werner lowered the priority of T6678: GPGSM: Add support for cert extension 2.5.29.54 Inhibit anyPolicy from Normal to Wishlist.
Aug 27 2025, 4:04 PM · gnupg26, S/MIME, Restricted Project
werner changed the status of T7491: Confusing additional pinentry on creation of new keypair with ADSK configured from Open to Testing.
Aug 27 2025, 4:02 PM · gpgagent, gnupg26, gnupg
werner moved T7491: Confusing additional pinentry on creation of new keypair with ADSK configured from Backlog to WIP on the gnupg26 board.
Aug 27 2025, 3:40 PM · gpgagent, gnupg26, gnupg
werner renamed T7491: Confusing additional pinentry on creation of new keypair with ADSK configured from Kleopatra: Confusing additional pinentry on creation of new keypair with ADSK configured to Confusing additional pinentry on creation of new keypair with ADSK configured .
Aug 27 2025, 3:09 PM · gpgagent, gnupg26, gnupg
werner closed T7713: Allow to skip the qualified signature confirmation prompt as Resolved.

I have done testing using my QES certificate with all combinations of the two options.

Aug 27 2025, 12:02 PM · S/MIME, Feature Request, gnupg26
werner moved T7759: Kleopatra: Notepad encryption with S/MIME fails from Backlog to WIP on the gnupg26 board.
Aug 27 2025, 10:34 AM · gnupg26, gpgme, kleopatra, gpd5x
werner changed the status of T7791: encryption fails with "Invalid Length" error when using Kyber1024 keys from Open to Testing.
Aug 27 2025, 9:54 AM · PQC, gnupg26, Bug Report
gniibe claimed T7791: encryption fails with "Invalid Length" error when using Kyber1024 keys.

Thank you for the report.

Aug 27 2025, 8:10 AM · PQC, gnupg26, Bug Report
gniibe added a comment to T7759: Kleopatra: Notepad encryption with S/MIME fails.

Similar situation could happen with gpgsm + gpg-agent, when gpg-agent is invoked by gpgsm.
(1) No gpg-agent.
(2) In gpgme, by engine-gpgsm, gpgsm is invoked with --logger.
(3) In gpgsm_keylist, it makes sure gpg-agent is available by GETINFO agent-check, using gpgsm_assuan_simple_command.
(4) In the server side, it tries to connect gpg-agent, invokes gpg-agent, and connect to the agent again.
(5) On Windows, it may takes time to invoke gpg-agent. And it may try to connect multiple times. Each trial may generate debug messages.
(6) When it takes too much time, the debug messages are too much. It may fill the pipe.
(7) And it blocks at log_string in my_libassuan_log_handler.
(8) ... it hangs.

Aug 27 2025, 6:53 AM · gnupg26, gpgme, kleopatra, gpd5x
gniibe added a comment to T7759: Kleopatra: Notepad encryption with S/MIME fails.

Hypothetical scenario (gpgsm --server + dirmngr):
(0) It may hang when much debug messages are generated by libassuan to the pipe of --logger (diag_cb).
(1) In gpgme, by engine-gpgsm, gpgsm is invoked with --logger.
(2) If it's the case of standard gpgme interactions which uses gpgsm_io_event, no problem. Because the data on diag_cb is consumed well.
(3) In case of gpgsm_encrypt (or other commands), it uses gpgsm_assuan_simple_command which does not consume the data on diag_cb pipe at all.
(4) In particular, in set_recipients, gpgsm_assuan_simple_command is called by the number of recipients times.
(5) IIUC, in the server side, to handle RECIPIENT command, dirmngr is used by the call chain of:

  • cmd_recipient
  • gpgsm_add_to_certlist
  • gpgsm_validate_chain...
  • gpgsm_dirmngr_isvalid

(6) In gpgsm_dirmngr_isvalid function, libassuan is used as client side, it generates debug messages.
(7) When there are many recipients, the debug message may be big enough to fill the pipe.
(8) When pipe is filled, it blocks at log_string in my_libassuan_log_handler, waiting the data in pipe is consumed.
(9) ... it hangs.

Aug 27 2025, 5:12 AM · gnupg26, gpgme, kleopatra, gpd5x

Aug 25 2025

werner closed T7792: Adding four additional options after selecting Kyber (encrypt only) when using addkey as Resolved.

Thanks for reporting/requesting.

Aug 25 2025, 4:53 PM · PQC, gnupg26, Feature Request
werner triaged T7791: encryption fails with "Invalid Length" error when using Kyber1024 keys as High priority.
Aug 25 2025, 4:34 PM · PQC, gnupg26, Bug Report
werner triaged T7792: Adding four additional options after selecting Kyber (encrypt only) when using addkey as Normal priority.
Aug 25 2025, 4:30 PM · PQC, gnupg26, Feature Request

Aug 21 2025

werner closed T7788: Invalid selection in addkey as Resolved.
Aug 21 2025, 11:43 AM · gnupg26, Bug Report