Register DCO for Mario Haustein
That was my fault in commit rG8fc9de8d6bf663f7c8419b42dab01f590a694d59 obviously I assumed that the macros were always used.
Use more specific text for "More details" button for PGP keys
GIT_SILENT: prepare 6.0.0 rc1
l10n daemon script <scripty@kde.org> committed
rLIBKLEOc0f8714a8972: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
l10n daemon script <scripty@kde.org> committed
rKLEOPATRA217f8b5f8469: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
tools: Remove the dotlock tool.
l10n daemon script <scripty@kde.org> committed
rMTP9437d09b5bd8: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
l10n daemon script <scripty@kde.org> committed
rLIBKLEO25c7ce1e9f98: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
l10n daemon script <scripty@kde.org> committed
rKLEOPATRA60f7208f8c3a: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
l10n daemon script <scripty@kde.org> committed
rKLEOPATRA5c9d738e2d05: SVN_SILENT made messages (.desktop file) - always resolve ours (authored by l10n daemon script <scripty@kde.org>).
SVN_SILENT made messages (.desktop file) - always resolve ours
l10n daemon script <scripty@kde.org> committed
rMTP28fb110b548d: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
l10n daemon script <scripty@kde.org> committed
rLIBKLEOcaf34cc7d92b: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
l10n daemon script <scripty@kde.org> committed
rKLEOPATRAc7a32f35e39d: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
GIT_SILENT: prepare 24.01 rc1
GIT_SILENT: prepare 24.01 rc1
Uploaded draft-koch-openpgp-webkey-service-17
web: Fix link to Italian guide.
Replaced draft.org my draft.md
scd:p15: Add a diagnostic for unsupported DTRUST4 features.
Undo changes to KeySelectionCombo
• werner committed
rG0b85a9ac09d1: scd:p15: Add support for D-Trust Card 4.1/4.4 (authored by Mario Haustein via Gnupg-devel <gnupg-devel@gnupg.org>).
scd:p15: Add support for D-Trust Card 4.1/4.4
• werner committed
rG812f9880591e: scd:p15: Add support for CardOS 5.4 (authored by Mario Haustein via Gnupg-devel <gnupg-devel@gnupg.org>).
scd:p15: Add support for CardOS 5.4
Limit filtering to SMIME keys
Additionally show subkeys actions in a toolbar
Expose toolbar of messageviewerdialog
Additionally show subkeys actions in a toolbar
Adapt Validity and Summary Role to individual user ids
doc: Explain what to put into mailcap for gpg-wks-client.
Add model containing the user ids of all keys
Additionally show subkeys actions in a toolbar
@aheinecke as promised, attached some test vectors:
Address more review comments
Apply 1 suggestion(s) to 1 file(s)
Refactor, cleanup, and address review comments
Use algorithm display name definitions from libkleo
Add Formatting::prettyAlgorithmName
Apply 1 suggestion(s) to 1 file(s)
Add Formatting::prettyAlgorithmName
Use more specific text for "More details" button for PGP keys
Apply 1 suggestion(s) to 1 file(s)
Apply 1 suggestion(s) to 1 file(s)
Use algorithm display name definitions from libkleo
Add Formatting::prettyAlgorithmName
Add Formatting::prettyAlgorithmName
agent: Fix homedir check wrt --disable-check-own-socket option.
tools: Integrate the dotlock tool into gpgconf.
common: Clean up the temporary file at dotlock_destroy.
common: Add dotlock util under libexec.
common: Fix a possible resource leak for dotlock.
common: Support not-removing the lockfile by dotlock_destroy.
l10n daemon script <scripty@kde.org> committed
rKLEOPATRAf58fdfacb557: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
FWIW: These days a thread on Linux is not that costly but nevertheless takes up resources. On other Unices (and WindowsCE) threads have quite some overhead and that was the reason I implemented it the way it was.
Refactor, cleanup, and address review comments
I made a clean install of the system and installed gnupg from sources. Now it works strangely.
This has always worked on the client site since we implemented keyserver access.
Use algorithm display name definitions from libkleo
Add Formatting::prettyAlgorithmName
Omnikey readers only work properly on Windows because the Windows driver uses proprietary extension to make it work. Better don't use them. In case you want to look at details, add
I see no problem to return only revocation packets. Clients must verify them anyway against their public keys and the fingerprint makes this easy. Verification against a primary key delivered along the revocation is more or less useless because that primary key must anyway been looked up in the client's keyring and th local existance of a primary key is anyway required to ask a keyserver for a revocation.
The trick here is that during import gpg tracks those invalid signatures and then tries to apply them to other keys.
Appended. Yes, it is considered an invalid signature and ignored. Anyone can insert an invalid signature. The trick here is that during import gpg tracks those invalid signatures and then tries to apply them to other keys. The use case here is this:
If you need the fingerprint, why don't you take it from the revocation certificate - for many years it is in subpacket 33.
Thanks for the explanation. To me this sounds very reasonable and I think that I am starting to better understand your use case in Hockeypuck.
Having a test example key + the intended revocation update would help at least me to dig into it a bit and see how this might conflict with RFC4880.
I'm curious about the parsing implications of this bit:
Well, the quoted paragraph ended with a
Individual UID revocation sigs are not particularly useful, because they cannot be validated without the original UID. Such things are out of scope.
Hi,
so I talked to werner about this, and of course GnuPG accepts minimal revocations.
A revocation certificate. So that was my point. As he understood you, you wanted to revoke not the whole key but only a single user id but without the user id packet? Sorry I am not really the protocol expert. But for me a revoked key without any user ids sounds to me just like a "standard" revocation certificate revoking the whole key. And as said, that is well within the the Standard and accepted, and even used by GnuPG. E.g. in case of a keyrollover we attach such a minimal revocation certificate to WKD keys when we deliver key updates.
Simplify d-pointer handling
Implement adding subkeys to an existing key
Yes they can, the workaround, which GpgOL even suggests in the error message is that the mail may not be visible as plain text while changing flags or categories. This usually means that you have to select a different mail and then use right click on the mail you wish to mark for followup or add a category to. The whole problem is that while the plaintext is visible in Outlook we have to prevent changes to the mail from beeing synced to the server or otherwise it will also sync the plaintext.
A user also report this problem with Microsoft365 and Outlook Versions 2302 and 2208. (Exchange is the latest online-Version.
Assuming current Gpg4win v4.2.0)
A user also report this problem with Microsoft365 and Outlook Versions 2302 and 2208. (Exchange is the latest online-Version.)
Would it be a workaround idea to double the attachments, so that the original ones would be used as reference for embedded viewing? And the other to be shown?
common: Improve the parsing of gpgconf.ctl variables.
From a technical standpoint I think the most minimal revocations which are technically possible should be accepted and thus I endorse the feature request.
In any case this is technically required
Actually the public key is personalized data as much as a mail address. In any case this is technically required and users take an informed decisions when they distribute their public key to a site not controlled by them.
• TobiasFella moved
T6874: Kleopatra subkey management improvements from
Restricted Project Column to
Restricted Project Column on the
Restricted Project board.
• TobiasFella moved
T6877: Kleopatra: Add support for adding a subkey from
Restricted Project Column to
Restricted Project Column on the
Restricted Project board.
• TobiasFella moved
T6878: Kleopatra: Subkey expiry date improvements from
Restricted Project Column to
Restricted Project Column on the
Restricted Project board.
• TobiasFella moved
T6890: Libkleo/Kleopatra: Add UserID keylist model from
Restricted Project Column to
Restricted Project Column on the
Restricted Project board.
common: Enhance dotlock, so that we can have a CLI util.
kbx: Create public-keys.d, after creating the homedir.
GIT_SILENT: time to increase version
GIT_SILENT: time to increase version
GIT_SILENT: time to increase version
It looks that this is a bit more problematic case than I thought. Now building i386 with "-O2 -fsanitize=undefined" flags fails. I need to think little bit more how to handle this.
l10n daemon script <scripty@kde.org> committed
rLIBKLEO770807e667dc: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
l10n daemon script <scripty@kde.org> committed
rKLEOPATRA2ef0b73fb4ea: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
l10n daemon script <scripty@kde.org> committed
rKLEOPATRA88c6c9609c2a: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn