Page MenuHome GnuPG
Feed Advanced Search

Fri, Mar 14

werner moved T7457: gpg --full-gen-key doesn't show list of keys on card (regression) from Backlog to QA on the gnupg24 board.

Done

Fri, Mar 14, 1:20 PM · gnupg26, gnupg24, Bug Report
ikloecker reopened T7457: gpg --full-gen-key doesn't show list of keys on card (regression) as "Open".

Re-opening because I think rGaa36f6ae8bae needs to be backported to GnuPG 2.4 (see T7568). The fix for T7309 which introduced the regression has been backported to GnuPG 2.4.

Fri, Mar 14, 8:54 AM · gnupg26, gnupg24, Bug Report
dkg added a comment to T7547: signatures from revoked or expired keys show up as missing keys.

I've offered https://github.com/bestpractical/gnupg-interface/pull/16 to GnuPG::Interface, and am testing it out in debian unstable.

Fri, Mar 14, 12:33 AM · gnupg26, gnupg24, Bug Report

Thu, Mar 13

dkg added a comment to T7547: signatures from revoked or expired keys show up as missing keys.

I'll work on making a patch to offer a flexible test suite.

Thu, Mar 13, 6:21 PM · gnupg26, gnupg24, Bug Report
dkg added a comment to T7547: signatures from revoked or expired keys show up as missing keys.

Alternately, i suppose we could ask GnuPG::Interface to drop the variant parts of that test entirely. @werner, If you have a preference for what they test, it would be good to know. I suspect your opinion would carry weight with the maintainer there.

Thu, Mar 13, 6:20 PM · gnupg26, gnupg24, Bug Report
werner added a comment to T7547: signatures from revoked or expired keys show up as missing keys.

Well, we also have the gpgme test suite which tests a couple of other things and for obvious reasons we need to keep this stable. Granted, sometimes we had to change the gpgme test suite as well. My personal preference would be your second choice.

Thu, Mar 13, 5:51 PM · gnupg26, gnupg24, Bug Report
dkg added a comment to T7547: signatures from revoked or expired keys show up as missing keys.

Thanks for the fix for the double-free on --no-sig-cache, that appears to be an issue on all released gpg versions, as i can crash them directly when i --no-sig-cache.

Thu, Mar 13, 5:04 PM · gnupg26, gnupg24, Bug Report

Wed, Mar 12

dkg added a comment to T7547: signatures from revoked or expired keys show up as missing keys.

Interestingly, from this i'm learning that the patch actually *normalizes* the output so that we see the same thing regardless of ordering. the different output based on certificate order happens only in the unpatched version.

Wed, Mar 12, 5:34 PM · gnupg26, gnupg24, Bug Report
dkg added a comment to T7547: signatures from revoked or expired keys show up as missing keys.

Please test without the --import keys.pgp -- just import filtered.pgp or filtered2.pgp.

Wed, Mar 12, 5:18 PM · gnupg26, gnupg24, Bug Report
werner added a comment to T7547: signatures from revoked or expired keys show up as missing keys.

I can't replicate your findings here . In a test directory w/o a gpg.conf:

Wed, Mar 12, 4:02 PM · gnupg26, gnupg24, Bug Report
werner added a comment to T7547: signatures from revoked or expired keys show up as missing keys.

Uihhh

Wed, Mar 12, 3:35 PM · gnupg26, gnupg24, Bug Report
dkg added a comment to T7547: signatures from revoked or expired keys show up as missing keys.

with --no-sig-cache --check-sigs i get the following error with the patch applied:

Wed, Mar 12, 2:29 PM · gnupg26, gnupg24, Bug Report
werner added a comment to T7547: signatures from revoked or expired keys show up as missing keys.

Did you also tried with --no-sig-cache ? That could help to get a better insight into the reason for that difference.

Wed, Mar 12, 9:27 AM · gnupg26, gnupg24, Bug Report

Tue, Mar 11

dkg added a comment to T7547: signatures from revoked or expired keys show up as missing keys.

OK, now i really don't know what the issue is on the 2.4 branch. trying to replicate it with and without this patch, the --with-colons output of --check-sigs appears to depend on the order in which the certificates were ingested.

Tue, Mar 11, 11:05 PM · gnupg26, gnupg24, Bug Report
dkg added a comment to T7547: signatures from revoked or expired keys show up as missing keys.

hm, digging a bit further, i think the above changes have to do with third-party signatures using SHA1, *not* with expired certifiers. in 2.4.7, i see a change from % to ! for these certifications. (2.2.x, which i know is EOL) shows the difference between ? and !. I'm trying to make a simpler replicator now.

Tue, Mar 11, 9:18 PM · gnupg26, gnupg24, Bug Report
werner changed the status of T7547: signatures from revoked or expired keys show up as missing keys from Testing to Open.
Tue, Mar 11, 11:00 AM · gnupg26, gnupg24, Bug Report
dkg added a comment to T7547: signatures from revoked or expired keys show up as missing keys.

With the patch "gpg: Fix regression for the recent malicious subkey DoS fix", there is a change in how gpg --check-sigs reports certifications from expired keys.

Tue, Mar 11, 1:02 AM · gnupg26, gnupg24, Bug Report

Fri, Mar 7

dkg added a comment to T7547: signatures from revoked or expired keys show up as missing keys.

it would be great to include a test in the test suite that ensures that the --status output behaves as expected in the face of expired or revoked keys.

Fri, Mar 7, 7:58 PM · gnupg26, gnupg24, Bug Report

Thu, Mar 6

werner moved T7547: signatures from revoked or expired keys show up as missing keys from Backlog to QA on the gnupg24 board.
Thu, Mar 6, 5:58 PM · gnupg26, gnupg24, Bug Report
werner changed the status of T7547: signatures from revoked or expired keys show up as missing keys from Open to Testing.
Thu, Mar 6, 5:58 PM · gnupg26, gnupg24, Bug Report
werner claimed T7547: signatures from revoked or expired keys show up as missing keys.
Thu, Mar 6, 2:56 PM · gnupg26, gnupg24, Bug Report
werner lowered the priority of T7547: signatures from revoked or expired keys show up as missing keys from Unbreak Now! to High.

Please use "unbreak now" only for *released* software with a criticial bug.

Thu, Mar 6, 11:23 AM · gnupg26, gnupg24, Bug Report
ikloecker moved T7547: signatures from revoked or expired keys show up as missing keys from Backlog to WIP on the gnupg26 board.
Thu, Mar 6, 9:37 AM · gnupg26, gnupg24, Bug Report
ikloecker edited projects for T7547: signatures from revoked or expired keys show up as missing keys, added: gnupg24, gnupg26; removed gnupg.
Thu, Mar 6, 9:36 AM · gnupg26, gnupg24, Bug Report

Feb 12 2025

werner closed T7480: Release GnuPG 2.5.4 as Resolved.
Feb 12 2025, 12:01 PM · gnupg26, gnupg, Release Info

Feb 5 2025

werner changed the status of T7506: GnuPG: Error when adding ECDSA subkey in batch mode with quick-add-key "Wrong key usage" from Open to Testing.
Feb 5 2025, 3:10 PM · gnupg26, gnupg24, Bug Report
werner added a comment to T7501: policy compliance options collide incompatibly without warning.

No real world bug reports for this and thus a backport has a small risk of a regression.

Feb 5 2025, 2:19 PM · gnupg26, Bug Report
werner moved T7506: GnuPG: Error when adding ECDSA subkey in batch mode with quick-add-key "Wrong key usage" from Backlog to Done on the gnupg26 board.
Feb 5 2025, 11:26 AM · gnupg26, gnupg24, Bug Report

Feb 4 2025

dkg added a comment to T7501: policy compliance options collide incompatibly without warning.

Thanks for the followup. As a downstream maintainer, it would help me a lot to know why this won't be fixed for 2.4. Do you forsee a specific problem with it? Does the subtle change in semantics of previously unspecified combinations/permutations of options represent something you're trying to avoid on the stable release channel? Are there bugs that users should be worried about?

Feb 4 2025, 6:12 PM · gnupg26, Bug Report
werner added a comment to T7501: policy compliance options collide incompatibly without warning.

Sorry, this will not be fixed for 2.4.

Feb 4 2025, 2:17 PM · gnupg26, Bug Report
dkg added a comment to T7501: policy compliance options collide incompatibly without warning.

please prefer the patch here over the one on the mailing list. my followups to the mailing list are not going through due to some kind of intermittent IPv4/IPv6 deliverability issue. Sorry for the confusion.

Feb 4 2025, 8:29 AM · gnupg26, Bug Report
dkg added a comment to T7501: policy compliance options collide incompatibly without warning.

Thanks for the fix, @werner ! Here's a comparable patch for the 2.4 branch as well, but without the change to de-vs as i think the comment in rGc2ff47d5bcd2953fc2095ef2242af2c7e9cd4420 indicated that you only wanted to rebase de-vs to --gnupg in the 2.5.x series.

Feb 4 2025, 5:54 AM · gnupg26, Bug Report

Feb 3 2025

werner closed T7472: Cannot decrypt a message encrypted to a Kyber subkey with AES128 as Resolved.

@gouttegd: Good idea. I did this with the above patches.

Feb 3 2025, 12:00 PM · PQC, gnupg26, Bug Report
werner moved T7501: policy compliance options collide incompatibly without warning from Backlog to Done on the gnupg26 board.
Feb 3 2025, 11:50 AM · gnupg26, Bug Report
werner edited projects for T7501: policy compliance options collide incompatibly without warning, added: gnupg26; removed gnupg.
Feb 3 2025, 11:50 AM · gnupg26, Bug Report
werner triaged T7506: GnuPG: Error when adding ECDSA subkey in batch mode with quick-add-key "Wrong key usage" as Normal priority.
Feb 3 2025, 9:06 AM · gnupg26, gnupg24, Bug Report

Jan 23 2025

ebo renamed T7491: Kleopatra: Confusing additional pinentry on creation of new keypair with ADSK configured from Kleopatra: Confusing additional pinentry on while new keypair with ADSK configured to Kleopatra: Confusing additional pinentry on creation of new keypair with ADSK configured .
Jan 23 2025, 9:18 AM · gpgagent, gnupg26, gnupg
werner triaged T7491: Kleopatra: Confusing additional pinentry on creation of new keypair with ADSK configured as Normal priority.
Jan 23 2025, 8:28 AM · gpgagent, gnupg26, gnupg

Jan 10 2025

gniibe closed T7436: Allow ssh to sign data larger than the assuan line length. as Resolved.

Fixed in 2.5.2.

Jan 10 2025, 8:00 AM · ssh, Feature Request, gnupg26

Jan 9 2025

werner triaged T7480: Release GnuPG 2.5.4 as Low priority.
Jan 9 2025, 10:01 AM · gnupg26, gnupg, Release Info

Jan 8 2025

werner moved T7472: Cannot decrypt a message encrypted to a Kyber subkey with AES128 from Backlog to QA on the gnupg26 board.
Jan 8 2025, 5:25 PM · PQC, gnupg26, Bug Report
werner closed T2169: Smartcard card-edit generate fails when off-card backup of encryption key is selected as Resolved.
Jan 8 2025, 2:35 PM · gnupg24, gnupg26, Bug Report, gpgagent, gnupg (gpg21)
werner moved T2169: Smartcard card-edit generate fails when off-card backup of encryption key is selected from Backlog to done on the gnupg24 board.
Jan 8 2025, 2:35 PM · gnupg24, gnupg26, Bug Report, gpgagent, gnupg (gpg21)
werner moved T2169: Smartcard card-edit generate fails when off-card backup of encryption key is selected from Backlog to Done on the gnupg26 board.
Jan 8 2025, 2:34 PM · gnupg24, gnupg26, Bug Report, gpgagent, gnupg (gpg21)
werner added a comment to T2169: Smartcard card-edit generate fails when off-card backup of encryption key is selected.

Got a simple fix for this which does two things:

  1. Correctly act upon an error from the backup file writing
  2. Print a warning note.
Jan 8 2025, 2:04 PM · gnupg24, gnupg26, Bug Report, gpgagent, gnupg (gpg21)
m.eik added a comment to T2169: Smartcard card-edit generate fails when off-card backup of encryption key is selected.

Shall we handle this with additional retry prompts, w/o a timeout? I think this makes sense because creating keys with a backup file and a passphrase is a manual task anyway.

Jan 8 2025, 12:20 PM · gnupg24, gnupg26, Bug Report, gpgagent, gnupg (gpg21)
werner reopened T2169: Smartcard card-edit generate fails when off-card backup of encryption key is selected as "Open".
Jan 8 2025, 11:35 AM · gnupg24, gnupg26, Bug Report, gpgagent, gnupg (gpg21)
werner edited projects for T2169: Smartcard card-edit generate fails when off-card backup of encryption key is selected, added: gnupg26, gnupg24; removed gnupg.

There is a regression due to the regression fix in rGb30c15bf7c5336c4abb1f9dcd974cd77ba6c61a7 (from Dec 24 2015) or some related commits:

Jan 8 2025, 11:35 AM · gnupg24, gnupg26, Bug Report, gpgagent, gnupg (gpg21)

Jan 7 2025

werner triaged T7368: dirmngr/dns.c files to compile due to type-mismatch caused by missing _XOPEN_SOURCE on Solaris and derivatives as Normal priority.
Jan 7 2025, 8:35 AM · gnupg26, dns, Solaris, Bug Report

Jan 6 2025

gniibe closed T6523: gpgscm: call-with-io deadlock when larger stderr output, a subtask of T6512: keyboxd with data pipe, as Resolved.
Jan 6 2025, 7:32 AM · gnupg26, Bug Report
gniibe closed T6523: gpgscm: call-with-io deadlock when larger stderr output as Resolved.
Jan 6 2025, 7:32 AM · gnupg26, Bug Report

Jan 3 2025

gouttegd added a comment to T7472: Cannot decrypt a message encrypted to a Kyber subkey with AES128.

Change the encryption code to only allow 256 bit session keys with Kyber regardless of the preferences, iff --require-pqc-encryption is set. […] We could as well also encforce AES-256 also without that option.

What if we encrypt to several recipients, only some of them having a Kyber encryption key? Should we still enforce AES-256 in that case regardless of the preferences, and assume that by now everybody should support AES-256?

Jan 3 2025, 4:50 PM · PQC, gnupg26, Bug Report
gouttegd added a comment to T7472: Cannot decrypt a message encrypted to a Kyber subkey with AES128.

Love it! I think I am going to use “post-heffalump crypto” from now on. :D

Jan 3 2025, 11:43 AM · PQC, gnupg26, Bug Report
werner added a comment to T7472: Cannot decrypt a message encrypted to a Kyber subkey with AES128.

But keep https://www.cs.auckland.ac.nz/~pgut001/pubs/heffalump_crypto.pdf in mind ;-)

Jan 3 2025, 10:04 AM · PQC, gnupg26, Bug Report

Jan 2 2025

gouttegd added a comment to T7472: Cannot decrypt a message encrypted to a Kyber subkey with AES128.

I wrote it with PQC security level in mind which requires AES256 for the session key as well.

Jan 2 2025, 4:39 PM · PQC, gnupg26, Bug Report
werner added a comment to T7472: Cannot decrypt a message encrypted to a Kyber subkey with AES128.

That is what I expected. Meanwhile I re-read the code and history and can tell that the comment is not correct. I wrote it with PQC security level in mind which requires AES256 for the session key as well. However, during the migration phase and as long as --require-pqc-encryption is not enable we should allow an AES-128 session key. This is for the rare case that encryption is also done for non pqc keys which don't have the AES-256 capability set.

Jan 2 2025, 4:23 PM · PQC, gnupg26, Bug Report
gouttegd added a comment to T7472: Cannot decrypt a message encrypted to a Kyber subkey with AES128.

Here you are:

Jan 2 2025, 4:09 PM · PQC, gnupg26, Bug Report
werner triaged T7472: Cannot decrypt a message encrypted to a Kyber subkey with AES128 as High priority.

At gnupg/g10/pubkey-enc.c you will find

Jan 2 2025, 3:33 PM · PQC, gnupg26, Bug Report

Dec 19 2024

werner raised the priority of T3979: GPGSM: Authenticated encryption from Wishlist to Normal.
Dec 19 2024, 10:33 AM · gnupg26, S/MIME

Dec 12 2024

alexk added a comment to T5054: Preservation of modification date upon decryption/extraction..

There is another customer request for this too.

Dec 12 2024, 11:34 AM · gnupg26, Bug Report, gpgtar

Dec 6 2024

gniibe changed the status of T7436: Allow ssh to sign data larger than the assuan line length. from Open to Testing.
Dec 6 2024, 6:32 AM · ssh, Feature Request, gnupg26

Dec 5 2024

werner closed T7316: Curve25519/v5 key cannot be exported, a subtask of T7315: Allow exporting of PQC keys., as Resolved.
Dec 5 2024, 4:32 PM · gnupg26, OpenPGP, PQC, gnupg
werner closed T7316: Curve25519/v5 key cannot be exported as Resolved.
Dec 5 2024, 4:32 PM · gnupg26, OpenPGP, PQC, gnupg
werner closed T7042: AEAD mode does not properly handle modified cipher text as Resolved.
Dec 5 2024, 4:25 PM · gnupg26, Bug Report
werner moved T7289: Release GnuPG 2.5.2 from Backlog to Done on the gnupg26 board.
Dec 5 2024, 11:48 AM · gnupg, Release Info, gnupg26
werner updated the task description for T7289: Release GnuPG 2.5.2.
Dec 5 2024, 11:47 AM · gnupg, Release Info, gnupg26
werner added a project to T6545: Support CRL extension issuingDistributionPoint: workaround.

A workaround exists with the new option --ignore-crl-extensions.

Dec 5 2024, 10:19 AM · workaround, gnupg26, Restricted Project, libksba, gnupg22, Feature Request
gniibe claimed T7436: Allow ssh to sign data larger than the assuan line length..
Dec 5 2024, 7:02 AM · ssh, Feature Request, gnupg26

Dec 3 2024

werner renamed T7436: Allow ssh to sign data larger than the assuan line length. from Allow ssh to sign larger data than the assuan line length. to Allow ssh to sign data larger than the assuan line length..
Dec 3 2024, 4:18 PM · ssh, Feature Request, gnupg26
ebo renamed T7436: Allow ssh to sign data larger than the assuan line length. from Allow ssh to sign larger data tha the assuan line length. to Allow ssh to sign larger data than the assuan line length..
Dec 3 2024, 4:14 PM · ssh, Feature Request, gnupg26
werner triaged T7436: Allow ssh to sign data larger than the assuan line length. as Normal priority.
Dec 3 2024, 3:31 PM · ssh, Feature Request, gnupg26

Dec 2 2024

werner triaged T7373: gpg --export-secret-keys exits with General error if the password prompt was canceled as Normal priority.
Dec 2 2024, 1:54 PM · Feature Request, gnupg26, gnupg

Nov 29 2024

gniibe closed T6606: Use new API of libassuan 3, a subtask of T6599: INT2FD and npth_accept, as Resolved.
Nov 29 2024, 8:10 AM · Windows 64, Feature Request, gnupg26
gniibe closed T6606: Use new API of libassuan 3 as Resolved.

Done for 2.5.0.

Nov 29 2024, 8:10 AM · Windows 64, Feature Request, gnupg26
gniibe closed T6597: Introduce FD_DBG to handle the cases for displaying the value, a subtask of T6508: Port GnuPG to 64-bit Windows, as Resolved.
Nov 29 2024, 8:08 AM · Windows 64, Feature Request, gnupg26
gniibe closed T6597: Introduce FD_DBG to handle the cases for displaying the value as Resolved.

Done in 2.5.0.

Nov 29 2024, 8:08 AM · Windows 64, Feature Request, gnupg26
gniibe closed T6592: GPGSM: Use estream_t instead of FD, a subtask of T6508: Port GnuPG to 64-bit Windows, as Resolved.
Nov 29 2024, 8:05 AM · Windows 64, Feature Request, gnupg26
gniibe closed T6592: GPGSM: Use estream_t instead of FD as Resolved.

Fixed in 2.5.0.

Nov 29 2024, 8:05 AM · Windows 64, Feature Request, gnupg26
gniibe closed T6562: gpgtar: --status-fd requires HANDLE (not POSIX fd) when spawning a process, a subtask of T6551: translate_sys2libc_fd_int on Windows 64-bit, as Resolved.
Nov 29 2024, 8:05 AM · Windows 64, Feature Request, gnupg26
gniibe closed T6562: gpgtar: --status-fd requires HANDLE (not POSIX fd) when spawning a process as Resolved.

Fixed in 2.5.0.

Nov 29 2024, 8:05 AM · Windows 64, Feature Request, gnupg26

Nov 25 2024

ikloecker moved T7379: Kleopatra: Learning certificates of Signature v2.0 card fails if a Yubikey is plugged in as well from Backlog to WIP on the gpd5x board.
Nov 25 2024, 6:14 PM · gpd5x, kleopatra
ikloecker added a project to T7379: Kleopatra: Learning certificates of Signature v2.0 card fails if a Yubikey is plugged in as well: gpd5x.
Nov 25 2024, 6:14 PM · gpd5x, kleopatra

Nov 11 2024

werner triaged T7379: Kleopatra: Learning certificates of Signature v2.0 card fails if a Yubikey is plugged in as well as Normal priority.
Nov 11 2024, 8:46 AM · gpd5x, kleopatra

Nov 8 2024

werner triaged T7381: gpg-mail-tube: Allow the use of templates instead of static texts. as Normal priority.
Nov 8 2024, 11:10 AM · Feature Request, gnupg26

Nov 5 2024

werner edited projects for T5054: Preservation of modification date upon decryption/extraction., added: Bug Report, gnupg26; removed gnupg24, Feature Request.

While reviewing this task I noticed that I wrote adding a -p option. This is non-sense, because -p is to preserve permissions at extract time; this is unrelated to the last modification time. Standard tar extract files and set the modification to the one given in the tarball - unless you use -m to use the current time. Thus this task is actually a bug and not a feature request. For backward compatibility this will be done only for gnupg26 for now.

Nov 5 2024, 3:30 PM · gnupg26, Bug Report, gpgtar

Oct 29 2024

werner edited projects for T6545: Support CRL extension issuingDistributionPoint, added: gnupg26; removed gnupg24.
Oct 29 2024, 1:31 PM · workaround, gnupg26, Restricted Project, libksba, gnupg22, Feature Request
werner edited projects for T5401: Imported ECC/Ed25519 subkey has unusable key file in private-keys-v1.d, added: gnupg26; removed gnupg24.
Oct 29 2024, 1:30 PM · gnupg26, Bug Report
werner removed a project from T6647: Finish implementation of --export-secret-ssh-key: gnupg24.
Oct 29 2024, 1:29 PM · gnupg26, Feature Request
werner edited projects for T1235: adding automatic refresh-key, added: gnupg26; removed gnupg24.
Oct 29 2024, 1:24 PM · gnupg26, gnupg22, Restricted Project, Feature Request
werner edited projects for T6941: gpgsm/dirmngr: support for end-entity certificates with an empty "Subject DN", added: gnupg26; removed gnupg24.
Oct 29 2024, 1:23 PM · gnupg26, S/MIME, Feature Request
werner edited projects for T6956: GnuPG: Allow import of gpgsk files, added: gnupg26; removed gnupg24.
Oct 29 2024, 1:23 PM · gnupg26, Feature Request, Restricted Project
werner edited projects for T6678: GPGSM: Add support for cert extension 2.5.29.54 Inhibit anyPolicy, added: gnupg26; removed gnupg24.
Oct 29 2024, 1:21 PM · gnupg26, S/MIME, Restricted Project
werner edited projects for T7041: Yubikey (PGP + PIV) --pcsc-shared: PIN requires every time, added: gnupg26; removed gnupg24.

You should use gpg-agent's integrated ssh-agent. It is anyway much more convenient. I'll move this task to gnupg26, though.

Oct 29 2024, 1:16 PM · gnupg26, yubikey, scd, Bug Report
werner edited projects for T7099: Disable the import of certain card objects, added: gnupg26; removed gnupg24.
Oct 29 2024, 1:13 PM · gnupg26, scd, Restricted Project, Feature Request
werner moved T7298: gpg --quick-set-expire fails for V5 subkeys from Backlog to QA on the gnupg24 board.
Oct 29 2024, 1:12 PM · gnupg24, gnupg26, Bug Report
werner changed the status of T7298: gpg --quick-set-expire fails for V5 subkeys from Open to Testing.

Backported to 2.4 to go into 2.4.6

Oct 29 2024, 1:12 PM · gnupg24, gnupg26, Bug Report

Oct 8 2024

gniibe changed the status of T7316: Curve25519/v5 key cannot be exported, a subtask of T7315: Allow exporting of PQC keys., from Open to Testing.
Oct 8 2024, 8:38 AM · gnupg26, OpenPGP, PQC, gnupg
gniibe changed the status of T7316: Curve25519/v5 key cannot be exported from Open to Testing.
Oct 8 2024, 8:38 AM · gnupg26, OpenPGP, PQC, gnupg
gniibe added a comment to T7316: Curve25519/v5 key cannot be exported.

Pushed the fix for exporting OpenPGP v5 key: rG57dce1ee62c2: common,gpg,scd,sm: Fix for Curve25519 OID supporting new and old.

Oct 8 2024, 8:38 AM · gnupg26, OpenPGP, PQC, gnupg

Oct 4 2024

werner edited projects for T4537: gpgsm support for timestamp signatures, added: gnupg26; removed gnupg24.
Oct 4 2024, 12:14 PM · gnupg26, S/MIME, Feature Request