If you encounter real world certificates with these parameters we can bump up the priority.
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Advanced Search
Feb 18 2025
Jan 24 2025
Jan 19 2025
I think I can understand you, too much complexity.
Jan 17 2025
See this comment which is related to T4538:
Jan 7 2025
Also works in VSD-beta-478
Dec 19 2024
Dec 16 2024
Dec 11 2024
Oct 29 2024
Oct 4 2024
Test on a dedicated Windows box (T 460, i5-6300U@2.40GHz, harddisk):
VSD Version | gpg version | Load time |
3.1.26 | 2.2.41 | 1:59 |
3.2.4 beta-2 | 2.2.45 beta 25 | 0:46 |
Overall effect of these changes tested on a small Windows VM is only 47 -> 26 seconds. Did also tests with --kbx-buffer-size but that does not make it better than the default, either.
Oct 1 2024
works, the Root-CA of the above example is only shown once any more. Gpg4win-Beta-50
Sep 30 2024
Will be available in 2.2.45 and 2.5.2
Now we are at 4 seconds. Available in master and 2.2.
Sep 27 2024
With that patch we are down to about 6 seconds.
Aug 14 2024
Did a quick manual test import and encryption/decryption with VS-Desktop-3.2.93.1-Beta with the relevant test-X509 certificate.
Works as expected.
Aug 13 2024
I made a ticket on bugzilla with ready-made tests for S/MIME, but on close inspection a different structure appears for S/MIME and another for qualified signature (openssl could not verify token extracted from CAdES-BASELINE-T signature). However, these tests can be very useful.
Aug 7 2024
FWIW, I received that mail but I hope that this bug is at least fixed with today's fix for T7213. Thus not re-opening.
This patch has a new fix for T5793 which is now only used where needed.
I don't think that we can do much manual testing here because we have all test cases anyway in the regression test suite and our local non-public regression tests (which has the p12 files we are not allowed to publish)
Aug 6 2024
Alright. Done for master; backport will come soon.
Jul 31 2024
The garbled data might be due to a bug in dumpasn1 (version 2021-02-12).
Jul 25 2024
Jun 20 2024
Jun 6 2024
Can't find a mail - closing the ticket. Feel free to reopen or send me a mail to werner dot koch at gnupg.org but replace the org by com.
May 13 2024
May 12 2024
Yes, I think we should support this. Also X448. Thanks for the report and the samples.
May 7 2024
Apr 24 2024
Apr 2 2024
Mar 12 2024
Right. I think this task inherited the assignee from its parent task.
Mar 6 2024
I've sent you an email about it. It might have html elements due to markdown-here.
Sorry, for not following up earlier. Can you please do me a favor and run the last tests again, this time adding -v and --debug 1 to the invocation? Feel free to forward the output to my private address is that is easier (wk at gnupg.org).
Feb 27 2024
Feb 21 2024
Way to old. Does anyone still uses CAcert?
Feb 7 2024
The additional debug info are:
gpgsm: DBG: p12_parse:1998: err=0 prk=0x0000000000000000,0x0000000000000000 gpgsm: DBG: p12_parse:2006: err=0 prk=0x0000000000000000,0x0000000000000000 gpgsm: DBG: p12_parse:2021: err=0 prk=0x0000000000000000,0x0000000000000000 gpgsm: DBG: p12_parse:2054: err=0 prk=0x0000000000000000,0x0000000000000000 gpgsm: DBG: p12_parse:2061: err=0 prk=0x0000000000000000,0x0000000000000000 gpgsm: DBG: p12_parse:2069: err=0 prk=0x0000000000000000,0x0000000000000000 gpgsm: DBG: p12_parse:2081: err=0 prk=0x0000000000000000,0x0000000000000000 gpgsm: error parsing or decrypting the PKCS#12 file gpgsm: total number processed: 4 gpgsm: unchanged: 4
Feb 6 2024
Could you write a quick patch file for that? (I don't have a working source build, I am using the Fedora spec file + patches)
The old debug output is in genral okay but what I would do is to add a couple of log_debug calls like
@werner I managed to recover the old .p12 that has the error. And this is still replicable. Is there a debug flag that would be useful or can we setup some private live-debugging for this?
Feb 5 2024
I would have expected an error message right after
Feb 2 2024
Unfortunately I have deleted the .p12 with the CA chain, and I don't know how I've generated it. It also contained my production certificates so, kinda sensitive to upload here.
Okay, I push the change for the extended salt size. Regarding the import of CA certificates, I have not seen any problems. In fact it is pretty common. Did you test with with 2.4.4. A test file would be helpful.
Ok, I have tried again the series of workarounds that I initially posted on the main description, and I managed to fix it by striping the CA certificates. So the current issues here are:
- Allocated salt is too small. https://dev.gnupg.org/T6757#182217 fixes for now
- Cannot import a .p12 that includes CA certificates as well
Jan 30 2024
We got a bit further, not sure what debug level you want, guru I've found to be too excessive:
Can you please try this patch:
That is an old bug report with a couple of fixes introduced over the years. As of now we sometimes see hangs on Windows on our test VMs. The common cause here seems to be USB card reader issues. Let's close this bug and wait for another bug report with current software versions.
@werner I have just tested this, and although it fixed it for one certificate, this one in this issue still fails. Here is the new debug given
Jan 25 2024
Openssl since version 3 supports aes-gcm and aria-gcm in cms. CMS has a different wrapper for AEAD. openssl Pull Request. I created test files (nistp384 key, certificates, messages), perhaps it will be useful.
Jan 24 2024
Hidden for Gpg4win-4.3.0-beta571, too
Closing because we believe things are fixed and our test suite confirms that. Feel free to -reopen in case your own file does not import with 2.4.4.
The test file is now part of our test suite and passes.
We meanwhile have a lot of test cases in our test suite and we see no issue. Closing this bug; feel free to re-open if it is not fixed for your case in 2.4.4.
Jan 16 2024
Interesting. I need to look closer at it. I scheduled it for 2.4 but it won't be in the forthcoming 2.4.4. There are still other interesting things on the short list (e.g. timestamping support) but we may do that only in 2.6.
Jan 5 2024
Hope so too. If there was a docker image or something I would gladly test it, otherwise I'll report back as soon as a release is out
We can't test this but assume that the fix for T6752 is sufficient here.
Jan 4 2024
Note that we now have also an option instead of the workaround from 2015
Dec 16 2023
We were hoping before christmas. But it is unlikely due to some other stuff we had to do. Early Jan. Definitely a priority for us right now to get it out.
Dec 15 2023
@werner Any news on when will 2.4.4 will land? I cannot figure out how to build the project from source, and I couldn't adapt the Fedora packaging to build it either. I would like to have a way to finally sign my git commits.
Dec 12 2023
Checking if the key is not otherwise used is unrelated and should be a diifferent Task since this also relates to OpenPGP. For me this Task is about creating a similar API for gpgsm (--delete-secret-key) that we have for OpenPGP.
Dec 11 2023
As it is so complicated to check all possibilities:
Searching by keygrip is actually fast with keyboxd.
Actually prio is rather low or even Wontfix. Since it has been this way forever and no one really complained. I think deleting secret keys esp. for S/MIME where you can't just create a testing key but need to have it signed by a CA is not really there.
I know I discussed this with werner several times and never really understood it because it makes for an inconsistent user interface / user experience. You delete an OpenPGP Secret key and then the keyfile is gone, you delete an S/MIME secret key and then the keyfile still exists. But it has been so forever T960
Maybe kleopatra should for the very rare cases where a key is used by multiple certificates do a search for the keygrip and warn if this also deletes the secret portion of another secret key? But that would then be also true for OpenPGP.
Dec 4 2023
Fixed. This regression was introduced with the fix for T5697: Kleopatra: Crashes or hangs on circular certificate chains.
Which certificate list? The list in the main view? Or the certificate list of a smart card?
Nov 28 2023
Nov 27 2023
Thank you very much on behalf of our S/MIME users. This also makes it easier for us in the frontend to show a consistent UI.
Tested on Windows with Kleopatra and 2.2 and with gpgme and 2.4 on Unix.