Page MenuHome GnuPG
Feed Advanced Search

May 19 2020

werner closed T4092: Certificate requests generated from card-based ECDSA keys are incorrectly marked as RSA-signed as Resolved.
May 19 2020, 2:43 PM · Restricted Project, Feature Request, S/MIME
werner added a comment to T4888: GpgSM: Support ECC key generation by gpgsm_genkey.

Finished if an existing key is used. See rG6dc3846d78192e393be73c16c72750734a9174d1 for examples.

May 19 2020, 2:42 PM · Restricted Project, Feature Request, S/MIME
werner added a comment to T4098: GpgSM: Add ECC support.

See rG6dc3846d78192e393be73c16c72750734a9174d1 for examples on how to create a cert

May 19 2020, 2:41 PM · gnupg (gpg23), Feature Request, S/MIME

May 14 2020

werner removed a subtask for T4098: GpgSM: Add ECC support: T4092: Certificate requests generated from card-based ECDSA keys are incorrectly marked as RSA-signed.
May 14 2020, 10:50 AM · gnupg (gpg23), Feature Request, S/MIME
werner removed a parent task for T4092: Certificate requests generated from card-based ECDSA keys are incorrectly marked as RSA-signed: T4098: GpgSM: Add ECC support.
May 14 2020, 10:50 AM · Restricted Project, Feature Request, S/MIME
werner added a parent task for T4092: Certificate requests generated from card-based ECDSA keys are incorrectly marked as RSA-signed: T4888: GpgSM: Support ECC key generation by gpgsm_genkey.
May 14 2020, 10:50 AM · Restricted Project, Feature Request, S/MIME
werner added a subtask for T4888: GpgSM: Support ECC key generation by gpgsm_genkey: T4092: Certificate requests generated from card-based ECDSA keys are incorrectly marked as RSA-signed.
May 14 2020, 10:50 AM · Restricted Project, Feature Request, S/MIME
werner added a subtask for T4098: GpgSM: Add ECC support: T4092: Certificate requests generated from card-based ECDSA keys are incorrectly marked as RSA-signed.
May 14 2020, 10:47 AM · gnupg (gpg23), Feature Request, S/MIME
werner added a parent task for T4092: Certificate requests generated from card-based ECDSA keys are incorrectly marked as RSA-signed: T4098: GpgSM: Add ECC support.
May 14 2020, 10:47 AM · Restricted Project, Feature Request, S/MIME

May 11 2020

werner claimed T4896: ksba: Ed25519 support.
May 11 2020, 7:50 PM · Info Needed, libksba, Feature Request, S/MIME
werner changed the status of T4098: GpgSM: Add ECC support from Open to Testing.

Signing using ECDSA does now also work. Tested with 3 in disk keys: nistp256, nistp384 and RSA and verified using gpgsm and Governikus Signer.

May 11 2020, 6:46 PM · gnupg (gpg23), Feature Request, S/MIME

May 8 2020

werner added a project to T4098: GpgSM: Add ECC support: gnupg (gpg23).
May 8 2020, 6:16 PM · gnupg (gpg23), Feature Request, S/MIME
werner renamed T4098: GpgSM: Add ECC support from GpgSM: Add ECC support (Option to create an X.509/ECDSA key) to GpgSM: Add ECC support.
May 8 2020, 6:15 PM · gnupg (gpg23), Feature Request, S/MIME
werner added a comment to T4098: GpgSM: Add ECC support.

Basic en- and decryption test against Governikus_Signer has now been done. Beware: I had to add a debug option to gpgsm to workaround non-compliance in algorithm support of Governikus; see the rG68b857df13c8a4e6cae5e3a29fd065bf90764547 for details.

May 8 2020, 6:14 PM · gnupg (gpg23), Feature Request, S/MIME

May 7 2020

werner created T4938: Support Signature Card V2.0 (NKS15).
May 7 2020, 8:18 AM · eIDAS, scd, Feature Request, S/MIME

May 4 2020

werner changed the status of T4920: Support ECDH in Libksba, a subtask of T4098: GpgSM: Add ECC support, from Open to Testing.
May 4 2020, 3:05 PM · gnupg (gpg23), Feature Request, S/MIME
werner changed the status of T4920: Support ECDH in Libksba from Open to Testing.

It works for me(tm).

May 4 2020, 3:05 PM · libksba, Feature Request, S/MIME

Apr 27 2020

werner changed the status of T4921: Support import of PKCS#12 encoded ECC private keys. from Open to Testing.
Apr 27 2020, 8:09 PM · gnupg22 (gnupg-2.2.42), backport, Feature Request, S/MIME
werner changed the status of T4921: Support import of PKCS#12 encoded ECC private keys., a subtask of T4098: GpgSM: Add ECC support, from Open to Testing.
Apr 27 2020, 8:09 PM · gnupg (gpg23), Feature Request, S/MIME
werner added a comment to T4921: Support import of PKCS#12 encoded ECC private keys..

Done for master

Apr 27 2020, 8:09 PM · gnupg22 (gnupg-2.2.42), backport, Feature Request, S/MIME

Apr 21 2020

werner created T4921: Support import of PKCS#12 encoded ECC private keys..
Apr 21 2020, 5:01 PM · gnupg22 (gnupg-2.2.42), backport, Feature Request, S/MIME
werner created T4920: Support ECDH in Libksba.
Apr 21 2020, 2:33 PM · libksba, Feature Request, S/MIME

Apr 17 2020

werner added a comment to T4098: GpgSM: Add ECC support.

I am working on the Telesec Signature Card v2. I will add encryption support to gpgsm.

Apr 17 2020, 6:03 PM · gnupg (gpg23), Feature Request, S/MIME

Apr 16 2020

werner closed T4898: auto import CA certs with authInfo.caIssuers as Resolved.

We do this now always if --auto-issuer-key-retrieve is set. Also backported to 2.2

Apr 16 2020, 6:02 PM · dirmngr, S/MIME, gnupg (gpg23)

Apr 14 2020

werner closed T4538: Support PSS signed CRLs as Resolved.

Data (ie.e CMS) signatures do now also work.

Apr 14 2020, 4:26 PM · dirmngr, S/MIME, libksba

Apr 9 2020

werner added a comment to T4538: Support PSS signed CRLs.

Okay certificate and CRL checking does now work with rsaPSS. Need to work on data signatures and check the compliance modes.

Apr 9 2020, 1:09 PM · dirmngr, S/MIME, libksba

Apr 8 2020

werner claimed T4538: Support PSS signed CRLs.

I started to work on it so that I can actually use the certificates on my new D-Trust card. This will be a verify-only implementation.

Apr 8 2020, 8:37 PM · dirmngr, S/MIME, libksba

Apr 6 2020

gniibe changed the status of T4888: GpgSM: Support ECC key generation by gpgsm_genkey, a subtask of T4098: GpgSM: Add ECC support, from Open to Testing.
Apr 6 2020, 6:49 AM · gnupg (gpg23), Feature Request, S/MIME
gniibe changed the status of T4888: GpgSM: Support ECC key generation by gpgsm_genkey from Open to Testing.
Apr 6 2020, 6:49 AM · Restricted Project, Feature Request, S/MIME

Mar 31 2020

werner triaged T4898: auto import CA certs with authInfo.caIssuers as Normal priority.
Mar 31 2020, 12:04 PM · dirmngr, S/MIME, gnupg (gpg23)
werner created T4898: auto import CA certs with authInfo.caIssuers.
Mar 31 2020, 12:04 PM · dirmngr, S/MIME, gnupg (gpg23)
gniibe added a comment to T4888: GpgSM: Support ECC key generation by gpgsm_genkey.

genkey for Ed25519 works now with libksba in master.

Mar 31 2020, 8:59 AM · Restricted Project, Feature Request, S/MIME
gniibe added a comment to T4896: ksba: Ed25519 support.

For public key, it's done.

Mar 31 2020, 8:59 AM · Info Needed, libksba, Feature Request, S/MIME

Mar 30 2020

dkg closed T4892: gpgsm --gen-key with existing key from "ssh-add" fails as Resolved.
Mar 30 2020, 9:59 PM · gnupg24, Bug Report, S/MIME
dkg reopened T4892: gpgsm --gen-key with existing key from "ssh-add" fails as "Open".
Mar 30 2020, 9:59 PM · gnupg24, Bug Report, S/MIME
werner closed T4895: segfaults in certreqen.c from logging NULL return from get_parameter as Resolved.

Thanks.

Mar 30 2020, 5:35 PM · gnupg (gpg22), S/MIME, Bug Report
werner added a comment to T4892: gpgsm --gen-key with existing key from "ssh-add" fails.

The problem was the comment field which was not expected in an rsa key. However ist makes sense to allow additional fields and thus I pushed a change to Libksba.

Mar 30 2020, 5:00 PM · gnupg24, Bug Report, S/MIME
gniibe added a project to T4896: ksba: Ed25519 support: libksba.
Mar 30 2020, 7:55 AM · Info Needed, libksba, Feature Request, S/MIME
gniibe created T4896: ksba: Ed25519 support.
Mar 30 2020, 7:55 AM · Info Needed, libksba, Feature Request, S/MIME
dkg created T4895: segfaults in certreqen.c from logging NULL return from get_parameter.
Mar 30 2020, 12:37 AM · gnupg (gpg22), S/MIME, Bug Report

Mar 27 2020

gniibe added a comment to T4888: GpgSM: Support ECC key generation by gpgsm_genkey.

NIST P-256 key generation looks good.

Mar 27 2020, 11:53 AM · Restricted Project, Feature Request, S/MIME

Mar 26 2020

dkg added a comment to T4892: gpgsm --gen-key with existing key from "ssh-add" fails.

OK, i've asked on gnupg-devel.

Mar 26 2020, 3:24 PM · gnupg24, Bug Report, S/MIME
werner closed T4892: gpgsm --gen-key with existing key from "ssh-add" fails as Wontfix.

Please use the mailing list for help on generating keys. I would also suggest to use GnuPG master for such experiments.

Mar 26 2020, 10:27 AM · gnupg24, Bug Report, S/MIME
dkg created T4892: gpgsm --gen-key with existing key from "ssh-add" fails.
Mar 26 2020, 2:05 AM · gnupg24, Bug Report, S/MIME

Mar 25 2020

werner created T4891: Support CBOR content in gpgsm.
Mar 25 2020, 12:54 PM · Feature Request, gnupg, S/MIME

Mar 24 2020

gniibe added a comment to T4098: GpgSM: Add ECC support.

There are two code paths to generate key: gpgsm_genkey and gpgsm_gencertreq_tty. Latter is partially supported with card key.
Firstly, I'm going to work for T4888.

Mar 24 2020, 6:32 AM · gnupg (gpg23), Feature Request, S/MIME
gniibe created T4888: GpgSM: Support ECC key generation by gpgsm_genkey.
Mar 24 2020, 6:30 AM · Restricted Project, Feature Request, S/MIME
gniibe changed the status of T4013: Certificate requests generated from Ed25519 keys are not compliant with draft-ietf-curdle-pkix from Open to Testing.

This should work well with libksba master and gnupg/sm master.

Mar 24 2020, 3:35 AM · S/MIME, Feature Request, libksba
gniibe changed the status of T4092: Certificate requests generated from card-based ECDSA keys are incorrectly marked as RSA-signed from Open to Testing.

The commits in 2019 (for libksba and gnupg/sm) handles the problem (of key generation using card).

Mar 24 2020, 3:32 AM · Restricted Project, Feature Request, S/MIME

Mar 20 2020

werner closed T4536: dirmngr fails to find OCSP signer certificate when responder is identified with key ID as Resolved.
Mar 20 2020, 5:59 PM · S/MIME, gnupg (gpg22), Bug Report
werner closed T4847: "gpgsm: invalid radix64 character 2d skipped" when trying to import a PEM file with DOS line endings (CR+LF) as Resolved.
Mar 20 2020, 5:59 PM · gnupg (gpg22), S/MIME, Bug Report
dkg added a comment to T4883: gpgme X.509 certificates have unknown validity in offline mode unless `disable-crl-checks` is set.

That option does the same as --disable-dirmngr which in trun has the same effect as disable-crl-checks

Mar 20 2020, 4:49 PM · Not A Bug, S/MIME, gpgme
dkg added a comment to T4883: gpgme X.509 certificates have unknown validity in offline mode unless `disable-crl-checks` is set.

@werner wrote:

Mar 20 2020, 4:45 PM · Not A Bug, S/MIME, gpgme
aheinecke added a comment to T4884: PKCS #15 support in gpgsm.

The return value that was mapped to invalid value was "SW_WRONG_LENGTH" so I tested using the codepath for the SW_EXACT_LENGTH sw return value, too and it worked for readcert.

Mar 20 2020, 3:52 PM · Feature Request, gnupg, scd, S/MIME
aheinecke created T4884: PKCS #15 support in gpgsm.
Mar 20 2020, 12:27 PM · Feature Request, gnupg, scd, S/MIME
aheinecke added a comment to T4883: gpgme X.509 certificates have unknown validity in offline mode unless `disable-crl-checks` is set.

Sample how GpgOL handles this: https://dev.gnupg.org/source/gpgol/browse/master/src/keycache.cpp;6f5f48c3d60e0af52f1a9f0e51f60ee653eeeb31$269

Mar 20 2020, 11:03 AM · Not A Bug, S/MIME, gpgme
aheinecke added a comment to T4883: gpgme X.509 certificates have unknown validity in offline mode unless `disable-crl-checks` is set.

I think what you're saying that there is *no way* to use GPGME in offline mode to validate x.509 certificates, and this is by design. Am I understanding that right?

Mar 20 2020, 11:00 AM · Not A Bug, S/MIME, gpgme
werner added a comment to T4883: gpgme X.509 certificates have unknown validity in offline mode unless `disable-crl-checks` is set.

After disabling the CRL check again in gpgsm.conf

Mar 20 2020, 8:56 AM · Not A Bug, S/MIME, gpgme

Mar 19 2020

dkg added a comment to T4883: gpgme X.509 certificates have unknown validity in offline mode unless `disable-crl-checks` is set.

I see no difference between the last two example stanzas that show you running ../run-verify. Are they supposed to have different output?

Mar 19 2020, 10:58 PM · Not A Bug, S/MIME, gpgme
dkg added a comment to T4881: "User ID" (Subject, subjectAltName) validity is inaccurate in gpgsm with sample certs..

I'm aware of the metadata leakage risks of OCSP, and i share your concerns about them.

Mar 19 2020, 10:14 PM · Not A Bug, gnupg (gpg22), S/MIME
werner added a comment to T4881: "User ID" (Subject, subjectAltName) validity is inaccurate in gpgsm with sample certs..

OCSP can't be the default because it enables a web bug. The responder immediately sees when a signature is verified or a data is encrypted to a certificate.

Mar 19 2020, 7:00 PM · Not A Bug, gnupg (gpg22), S/MIME
dkg added a comment to T4881: "User ID" (Subject, subjectAltName) validity is inaccurate in gpgsm with sample certs..

If CRLs or OCSP are a MUST in a given profile, and the cert chain has OCSP but no CRL, it seems like that profile should then try OCSP, rather than failing.

Mar 19 2020, 6:53 PM · Not A Bug, gnupg (gpg22), S/MIME
werner added a comment to T4883: gpgme X.509 certificates have unknown validity in offline mode unless `disable-crl-checks` is set.

That option does the same as --disable-dirmngr which in trun has the same effect as disable-crl-checks; see gnupg/sm/server.c#option_handler. If you want to check the validity of the cert you check the TRUST status lines. This is what gpgme does for you. An example is gpgme.tests/gpgsm/t-verify. You can run the tests also manually, I do this as follows:

Mar 19 2020, 6:25 PM · Not A Bug, S/MIME, gpgme
dkg added a comment to T4883: gpgme X.509 certificates have unknown validity in offline mode unless `disable-crl-checks` is set.

I think what you're saying that there is *no way* to use GPGME in offline mode to validate x.509 certificates, and this is by design. Am I understanding that right?

Mar 19 2020, 5:25 PM · Not A Bug, S/MIME, gpgme
werner edited projects for T4881: "User ID" (Subject, subjectAltName) validity is inaccurate in gpgsm with sample certs., added: Not A Bug; removed Bug Report.
Mar 19 2020, 1:07 PM · Not A Bug, gnupg (gpg22), S/MIME
werner edited projects for T4883: gpgme X.509 certificates have unknown validity in offline mode unless `disable-crl-checks` is set, added: Not A Bug; removed Bug Report.

I can see no bug here. See my comment over at T4881.

Mar 19 2020, 1:06 PM · Not A Bug, S/MIME, gpgme
werner added a comment to T4881: "User ID" (Subject, subjectAltName) validity is inaccurate in gpgsm with sample certs..

If you want OCSP you need to enable it. CRLs or OCSP are a MUST under the profile we developed gpgsm. This is why --disable-crl-checks by default is not possible. There are lot of interesting things you will come across if you start to use S/MIME. For example you also need to care about the algorithms used for intermediate certificates used to sign CRLs - they need to comply to the policy as well. Or the rarely used PSS padding we encounter sometimes and which is not supported and will probably not be supported

Mar 19 2020, 11:56 AM · Not A Bug, gnupg (gpg22), S/MIME
dkg created T4883: gpgme X.509 certificates have unknown validity in offline mode unless `disable-crl-checks` is set.
Mar 19 2020, 2:25 AM · Not A Bug, S/MIME, gpgme

Mar 18 2020

dkg added a comment to T4881: "User ID" (Subject, subjectAltName) validity is inaccurate in gpgsm with sample certs..

I thought i'd try with other certificates. I started with the one from this website. It also fails to validate unless i supply --disable-crl-checks, apparently because the immediate issuer (the Let's Encrypt CA) doesn't offer CRLs, only OCSP responders. Perhaps --disable-crl-checks should be the default, or at least if there is no CRL available there shouldn't be a failure by default:

Mar 18 2020, 10:38 PM · Not A Bug, gnupg (gpg22), S/MIME
dkg added a comment to T4881: "User ID" (Subject, subjectAltName) validity is inaccurate in gpgsm with sample certs..

Aha, i can get it to say f if i use --disable-crl-checks:

Mar 18 2020, 10:30 PM · Not A Bug, gnupg (gpg22), S/MIME
dkg added a comment to T4881: "User ID" (Subject, subjectAltName) validity is inaccurate in gpgsm with sample certs..

i didn't know that, thanks. i'm now seeing i (which i think means "invalid") in the same configuration:

Mar 18 2020, 9:36 PM · Not A Bug, gnupg (gpg22), S/MIME
werner added a comment to T4881: "User ID" (Subject, subjectAltName) validity is inaccurate in gpgsm with sample certs..

Add --with-validation to check the validity of a certificate in a listing.

Mar 18 2020, 9:07 PM · Not A Bug, gnupg (gpg22), S/MIME
dkg created T4881: "User ID" (Subject, subjectAltName) validity is inaccurate in gpgsm with sample certs..
Mar 18 2020, 8:55 PM · Not A Bug, gnupg (gpg22), S/MIME
werner moved T4847: "gpgsm: invalid radix64 character 2d skipped" when trying to import a PEM file with DOS line endings (CR+LF) from Backlog to For next release on the gnupg (gpg22) board.
Mar 18 2020, 3:50 PM · gnupg (gpg22), S/MIME, Bug Report
werner moved T4536: dirmngr fails to find OCSP signer certificate when responder is identified with key ID from Backlog to For next release on the gnupg (gpg22) board.
Mar 18 2020, 3:49 PM · S/MIME, gnupg (gpg22), Bug Report
werner changed the status of T4536: dirmngr fails to find OCSP signer certificate when responder is identified with key ID from Open to Testing.

Sorry, I have not yet followed you test plan but given that we have the patch in master for a long time now I think it is okay to port it to 2.2.

Mar 18 2020, 2:15 PM · S/MIME, gnupg (gpg22), Bug Report

Mar 12 2020

dkg added a comment to T4878: gpgsm's default for include-certs should include the signing cert if it is self-signed.

For reference, here's an error message from openssl smime when it is trying to verify an e-mail message with no embedded certificate at all (despite it knowing about the relevant certificate):

Mar 12 2020, 2:01 PM · gnupg24, gnupg (gpg23), S/MIME, Feature Request
werner triaged T4878: gpgsm's default for include-certs should include the signing cert if it is self-signed as Low priority.
Mar 12 2020, 9:59 AM · gnupg24, gnupg (gpg23), S/MIME, Feature Request
dkg created T4878: gpgsm's default for include-certs should include the signing cert if it is self-signed.
Mar 12 2020, 7:51 AM · gnupg24, gnupg (gpg23), S/MIME, Feature Request

Mar 9 2020

dkg added a comment to T4857: GPGSM: Put encryption key also into signature.

This is an important fix for a sensible S/MIME use case. Thanks for working on it!

Mar 9 2020, 8:40 PM · gnupg, S/MIME

Mar 5 2020

werner lowered the priority of T4538: Support PSS signed CRLs from Normal to Low.

It is actually questionable whether PSS is a better padding scheme than PKCS#1, see
https://www.metzdowd.com/pipermail/cryptography/2019-November/035449.html . PSS seems indeed be rarely used; quoting Peter from a followup on his writeup: “If I get time over the weekend, and I can find a CMS message signed with RSA-PSS, I'll create a forgery using xor256.”

Mar 5 2020, 10:27 AM · dirmngr, S/MIME, libksba

Mar 4 2020

aheinecke added a comment to T4538: Support PSS signed CRLs.

To summarize: The DGN CRL uses a the RSA-PSS Padding / Signature Scheme. ( https://de.wikipedia.org/wiki/Probabilistic_Signature_Scheme )

Mar 4 2020, 3:17 PM · dirmngr, S/MIME, libksba

Feb 26 2020

aheinecke created T4857: GPGSM: Put encryption key also into signature.
Feb 26 2020, 12:52 PM · gnupg, S/MIME

Feb 15 2020

werner changed the status of T4847: "gpgsm: invalid radix64 character 2d skipped" when trying to import a PEM file with DOS line endings (CR+LF) from Open to Testing.

Fixed in master and 2.2

Feb 15 2020, 7:25 PM · gnupg (gpg22), S/MIME, Bug Report
werner claimed T4847: "gpgsm: invalid radix64 character 2d skipped" when trying to import a PEM file with DOS line endings (CR+LF).
Feb 15 2020, 7:08 PM · gnupg (gpg22), S/MIME, Bug Report
werner edited projects for T4847: "gpgsm: invalid radix64 character 2d skipped" when trying to import a PEM file with DOS line endings (CR+LF), added: gnupg (gpg22); removed gnupg.

Really interesting: The code didn't changed since since 2003 and the bug must have been there all the time. It does happen only for 25% of the certificates with CR and LF; the others have padding characters at the end '=' which is also an indication of the end of the base64 block. I wonder why this has not been reported more often; maybe because most people import binary certificates.

Feb 15 2020, 7:01 PM · gnupg (gpg22), S/MIME, Bug Report
thomas added a comment to T4847: "gpgsm: invalid radix64 character 2d skipped" when trying to import a PEM file with DOS line endings (CR+LF).

Wald certificate will be fixed very soon. But as it is not fixed yet, I provided an http link, not https for you.

Feb 15 2020, 3:41 PM · gnupg (gpg22), S/MIME, Bug Report
werner added projects to T4847: "gpgsm: invalid radix64 character 2d skipped" when trying to import a PEM file with DOS line endings (CR+LF): S/MIME, gnupg.

Thomas, please provide a sample certificate. I can't access the intevation site to see whether one of the links has the cert. And pretty please fix the wald certificates!

Feb 15 2020, 12:43 PM · gnupg (gpg22), S/MIME, Bug Report

Feb 3 2020

Joey_D added a comment to T4699: X.509 certificate request more comfortable.

Hi Andre, did you already get anywhere with this task? Thanks a lot in advance, Joachim

Feb 3 2020, 9:22 PM · Restricted Project, kleopatra, S/MIME, gpg4win, Feature Request

Dec 17 2019

werner added a comment to T4777: Pinentry sometimes mixes languages.

The description comes from gpg/gpgsm while the prompts are from gpg-agent. Thus if the agent has been started with the German local but gpgsm without a local this would explain the behaviour.

Dec 17 2019, 11:39 AM · gnupg (gpg23), S/MIME, gpgagent
werner added a project to T4779: GpgSM: "Invalid Object" error when importing .p12 certs with wrong passphrase: gnupg (gpg23).
Dec 17 2019, 11:36 AM · gnupg24 (gnupg-2.4.3), Restricted Project, gnupg (gpg23), S/MIME
aheinecke reassigned T4779: GpgSM: "Invalid Object" error when importing .p12 certs with wrong passphrase from wk to werner.
Dec 17 2019, 10:57 AM · gnupg24 (gnupg-2.4.3), Restricted Project, gnupg (gpg23), S/MIME
aheinecke assigned T4783: GpgSM: Configuration Error for Certificates without CLR dps to werner.
Dec 17 2019, 10:57 AM · S/MIME
aheinecke created T4779: GpgSM: "Invalid Object" error when importing .p12 certs with wrong passphrase.
Dec 17 2019, 10:28 AM · gnupg24 (gnupg-2.4.3), Restricted Project, gnupg (gpg23), S/MIME
aheinecke created T4777: Pinentry sometimes mixes languages.
Dec 17 2019, 10:19 AM · gnupg (gpg23), S/MIME, gpgagent

Dec 7 2019

werner updated the task description for T4696: Fresh certificate get's pulled into certificate chain with expired root certificate.
Dec 7 2019, 4:28 PM · gnupg (gpg22), S/MIME, Bug Report
werner changed the visibility for T4696: Fresh certificate get's pulled into certificate chain with expired root certificate.
Dec 7 2019, 4:28 PM · gnupg (gpg22), S/MIME, Bug Report
werner updated the task description for T4696: Fresh certificate get's pulled into certificate chain with expired root certificate.
Dec 7 2019, 4:26 PM · gnupg (gpg22), S/MIME, Bug Report
werner closed T4696: Fresh certificate get's pulled into certificate chain with expired root certificate as Resolved.
Dec 7 2019, 1:15 PM · gnupg (gpg22), S/MIME, Bug Report

Dec 6 2019

werner moved T4696: Fresh certificate get's pulled into certificate chain with expired root certificate from For next release to Ready for release on the gnupg (gpg22) board.
Dec 6 2019, 8:30 PM · gnupg (gpg22), S/MIME, Bug Report