Then let's get it in there. It's pretty easy to traverse a directory.
reading your report again: You clicked on a folder and expected that all encrypted files in this folder will be decrypted? That is unfortunately not supported.
gpg: Improve speed of secret key listing.
I have the same message when i try to decrypt files larger than 1.5GB in size; i atached the report "gpgconf --show-version"
scd:p15: Fix logic for appending product name to MANUFACTURER.
gpg: Fix sending an OpenPGP key with umlaut to an LDAP keyserver.
gpg: Fix sending an OpenPGP key with umlaut to an LDAP keyserver.
Support password based decryption.
Do not use open as saveAs dialog for enc files
Remove unimplemented member functions
Remove now superfluous P15Card::appKeyFingerprint()
Move getter for key fingerprints from OpenPGPCard to base class Card
Deduplicate setCardInfo()
Take manufacturer from card info if available
Store card info map in base class
Parse OpenPGP key fingerprint information in Card
Update/fix copyright information
scd:p15: Fix logic for appending product name to MANUFACTURER.
Possibly, it keeps running at calibrate_s2k_count, for some reason.
Note: I believe this issue might affect multiple other GnuPG projects.
jukivili committed
rC14bb6d4ea0dc: cipher: Fix memory leaks for EdDSA. (authored by Tianjia Zhang <tianjia.zhang@linux.alibaba.com>).
cipher: Fix memory leaks for EdDSA.
Always include <config.h> in cipher assembly codes
gpg: Use a more descriptive prompt for symmetric decryption.
po: In German always use "Passwort" instead of "Passphrase".
sm: Support decryption of password based encryption (pwri)
sm: Ask for the password for password based decryption (pwri)
gpg: Use a more descriptive prompt for symmetric decryption.
I fully agree. That was actually my itention - not sure why the coded ended up as it is.
sm: Ask for the password for password based decryption (pwri)
dirmngr: LDAP search by a mailbox now ignores revoked keys.
dirmngr: LDAP search by a mailbox now ignores revoked keys.
Just got around to testing this on Linux, and I can confirm the same behavior: decryption PIN caching works on 2.2 and doesn't work on 2.3.
Laurent Montel <montel@kde.org> committed
rLIBKLEO03b1e46cf71d: GIT_SILENT: use Qt:: everywhere (authored by Laurent Montel <montel@kde.org>).
GIT_SILENT: use Qt:: everywhere
Due to tax issues, we can't accept a donation as return on service. However, we will fix bugs anyway if possible,
lbogdan renamed
T5436: gpg-agent 2.3.1: PIN caching not working for decrypt operations from
gpg-agent 2.3.1: PIN caching not working to
gpg-agent 2.3.1: PIN caching not working for decrypt operations.
@znull You can also fix the detection issue by building with , in which case you won't need the setting anymore.
@ikloecker Sorry for not being clear, I was not aware different operations have different behaviors in regard to entering / caching the PIN.
• ikloecker moved
T4876: Generic smartcard widget for PKCS# 15 and other apps from
Restricted Project Column to
Restricted Project Column on the
Restricted Project board.
It's not clear whether you are talking about PIN caching related to signing operations or decryption operations.
l10n daemon script <scripty@kde.org> committed
rLIBKLEO873d6a57b1ec: SVN_SILENT made messages (.desktop file) - always resolve ours (authored by l10n daemon script <scripty@kde.org>).
SVN_SILENT made messages (.desktop file) - always resolve ours
ids: draft-koch-openpgp-webkey-service-12.txt
l10n daemon script <scripty@kde.org> committed
rLIBKLEO21d594d71ea2: SVN_SILENT made messages (.desktop file) - always resolve ours (authored by l10n daemon script <scripty@kde.org>).
SVN_SILENT made messages (.desktop file) - always resolve ours
I just wanted to chime in that I've had exactly the same experience as @lbogdan: gnupg 2.3 stopped recognizing my yubikey entirely on MacOS until the T5415 workaround (). After that, pin caching was broken until I applied his patch to , which makes it work as before. Without these two changes the experience with gnupg 2.3 is degraded relative to 2.2.
Laurent Montel <montel@kde.org> committed
rLIBKLEOa37895dfaec3: GIT_SILENT: prepare 5.17.2 (authored by Laurent Montel <montel@kde.org>).
GIT_SILENT: prepare 5.17.2
Laurent Montel <montel@kde.org> committed
rKLEOPATRAa6e3d5d1c7f6: GIT_SILENT: prepare 5.17.2 (authored by Laurent Montel <montel@kde.org>).
GIT_SILENT: prepare 5.17.2
Laurent Montel <montel@kde.org> committed
rKLEOPATRAfd3f9437b5c0: Allow to install doc/po file (authored by Laurent Montel <montel@kde.org>).
Allow to install doc/po file
sm: Support decryption of password based encryption (pwri)
So I did a bit more reading on smartcard PIN caching, and took a better look at the debug logging of gnupg 2.2, and learned that, indeed, the PIN is cached by the card and not by any one gnupg component.
Always include the default key in the list of keys to chose from
scd: Remove wrong assertion and add protection to PCSC.COUNT.
build: Fix detecting pthread library.
Laurent Montel <montel@kde.org> committed
rLIBKLEO5a4930065beb: GIT_SILENT: prepare 5.17.2 (authored by Laurent Montel <montel@kde.org>).
GIT_SILENT: prepare 5.17.2
Laurent Montel <montel@kde.org> committed
rKLEOPATRA17d9a4b767f3: GIT_SILENT: prepare 5.17.2 (authored by Laurent Montel <montel@kde.org>).
GIT_SILENT: prepare 5.17.2
• gniibe renamed
T5437: PC/SC change: monitoring card status changes (possibly also for new reader) from
PC/SC change monitoring card status changes (possibly also for new reader) to
PC/SC change: monitoring card status changes (possibly also for new reader).
Yes, I already linked to T5415, but that breaks YubiKey completely, and I fixed it with .
The pincache is actually not what you think it is. It is only used to allow switching between different application on a Yubikey which reqieres a new VERIFY command after switching back to the first application the card. What you feel as caching is the state of the card, which usually keeps its verification state until the card is powered down.
• ikloecker moved
T5245: Kleopatra: Add support for trust signatures / trusted introducer from
Restricted Project Column to
Restricted Project Column on the
Restricted Project board.
• ikloecker moved
T5429: Kleopatra: Display information about trust signatures from
Restricted Project Column to
Restricted Project Column on the
Restricted Project board.
Fix warning: & has lower precedence than ==; == will be evaluated first
Show information about trusted introducers in certificate details
GIT_SILENT: Fix indentation
Remove separate certificatedetailswidget.ui
Use std::unique_ptr for pimpl
GIT_SILENT: Fix debug message
Hide Tags column if tag support is not enabled
Move CertificateDetailsDialog to *.h/*.cpp of its own
Modernize code and sort includes
Add information about trust signatures to UserIDListModel
GIT_SILENT: Reorder includes
Always add the Tags column to the model
Add enum for model columns
Use std::unique_ptr for mRootItem
Enforce QT_NO_CAST_FROM_ASCII
core: Make sure to stay ABI compatible.
core: Allow for older compilers.
agent: Use SHA-256 for SSH fingerprint by default
Frankly, I am pretty sure that the new base64 encoding of the fingerprint leads to less diligent comparison of the fingerprint by the user. I don't understand why they did not used a truncated hex output or zBase32 .
Laurent Montel <montel@kde.org> committed
rLIBKLEO234be2025ff1: Fix clazy warning (authored by Laurent Montel <montel@kde.org>).
Fix clazy warning