po: Update German translation
speedo: Enable additional runtime protections on Windows.
notepad: Move notepad import action to a KMessageWidget
notepad: Move message widget to the top
Move encrypt button to the bottom of the recipients widget
Move recipients to the left of the notepad
I found one reason for the intermittently failing concurrent initial keylisting. gpgsm sometimes uses the wrong socket file to (try to) connect to gpg-agent.
notepad: Move notepad import action to a KMessageWidget
fixup! Move recipients to the left of the notepad
notepad: Move message widget to the top
Move encrypt button to the bottom of the recipients widget
I don't think gpg/gpgsm tell gpgme "the keyblock used for decryption". They simply log all public keys used for encryption via STATUS_ENC_TO in the order the packets appear in the encrypted file.
I'm still seeing the same problems both with current master and 2.2
There is no such concept of a primary keyblock for a subkey. Using the same subkey for several primary keys is non frequent but nevertheless seen use-case. Thus this behaviour is not ADSK specific. I would suggest to first search the keyblock used for decryption to get the name of another subkey - only if that is not found search the keyring for that subkey and thus the primary key and its user id.
FWIW, the cache has not been implemented in 2.4 (which will be used for the next gpg4win) and thus there is no need for a fix there.
gpgsm: Fix cached istrusted lookup.
Was fixed last Thursday with commit rG69a8aefa5bf77136b77383b94e34ba784c1cce89 for 2.2 and will soon make it to master.
Do not create RevokersWidget when gpgme is too old
Summarizing out-of-band discussion (please correct where i remember things wrong):
dirmngr: Print a brief list of URLs with LISTCRLS.
dirmngr: Print a brief list of URLs with LISTCRLS.
It is not of the recipient's business to know which certificate also uses a subkey. For all the user needs to know that it is a subkey which belongs to a primary key. In this regard this is not different from a shared encryption subkey as used by many sites for role addresses. For a subkey the user id of its primary should always been show.
In case of an unknown encryption subkey we could check if it's the ADSK of a known recipient and then display something like
Unknown ADSK for "Some key with ADSK <with-adsk@example.net>"
instead of
unknown recipient
Thinking about this some more, I don't think we can anything different from what's done in my patch:
• TobiasFella set External Link to https://invent.kde.org/pim/libkleo/-/merge_requests/150 on
T7334: Kleopatra: ADSK shown as "unknown recipient".
Both subkeys belong to Alice from gpg's point of view
What is wrong in your opinion?
Don't add ADSKs to keycache subkey indices
I can reproduce this with gnupg 2.2.45-beta27 (STABLE-BRANCH-2-2 69a8aefa) on openSUSE Tumbleweed.
We have this data already. The problem on kleopatra's side is that in the key cache, we add the ADSK subkey for each key that has it as an ADSK, causing a somewhat broken index and ultimately the problem seen here.
Don't add ADSKs to keycache subkey indices
Is this R-flag part of the status logging, i.e. do we need to add handling for this in gpgme?
PasswordEditorWidget: Clear note field when loading new password
Build gpgpass with released libkleo versions
GIT_SILENT: it compiles fine without deprecated methods
l10n daemon script <scripty@kde.org> committed
rKLEOPATRAbf133c25af7b: GIT_SILENT made messages (after extraction) (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT made messages (after extraction)
Revert "GIT_SILENT: it compiles fine without kf deprecated method"
Yes. I think that Kleo does not yet fully support the R-flag indicating an ADSK.
Make compile against last kf6
GIT_SILENT: it compiles fine without kf deprecated method
GIT_SILENT: it compiles fine without kf deprecated method
l10n daemon script <scripty@kde.org> committed
rKLEOPATRAa9c5d9c4eeee: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
l10n daemon script <scripty@kde.org> committed
rKLEOPATRA7f2478533ef7: GIT_SILENT made messages (after extraction) (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT made messages (after extraction)
l10n daemon script <scripty@kde.org> committed
rKLEOPATRA99eba5b13cf5: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
l10n daemon script <scripty@kde.org> committed
rKLEOPATRA711c597667cb: GIT_SILENT made messages (after extraction) (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT made messages (after extraction)
I suggest always updating modifications which are "exportable".
• werner renamed
T7333: Allow gpg to auto-upload a new own key to LDAP servers from
Allow gpg to auto-upload a new key to LDAP servers to
Allow gpg to auto-upload a new own key to LDAP servers.
Allow specifying the order that the commands appear in
Allow specifying the order that the commands appear in
Use empty() instead of comparing size() with 0
Don't merge already known keys with new keys if there are no new keys
Serialize listing of OpenPGP and S/MIME keys
spawn: Add new function to modify environment.
With the change, T7169 is fixed (by side-effect).
• werner removed a member for
g10code:
bad.
• werner removed a member for
g10code:
MuckiSG.
GIT_SILENT: prepare 6.2.3
GIT_SILENT: prepare 6.2.3
l10n daemon script <scripty@kde.org> committed
rMTP9351e78d6888: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
l10n daemon script <scripty@kde.org> committed
rKLEOPATRAa4935192fa6e: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
l10n daemon script <scripty@kde.org> committed
rMTP455ac5f62c45: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
l10n daemon script <scripty@kde.org> committed
rLIBKLEO88b675b45e95: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
l10n daemon script <scripty@kde.org> committed
rKLEOPATRAecbb5256fd2d: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
build: Use AC_C_BIGENDIAN for detecting endian.
l10n daemon script <scripty@kde.org> committed
rKLEOPATRA8b74dd91b55a: GIT_SILENT made messages (after extraction) (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT made messages (after extraction)
Use empty() instead of comparing size() with 0
Don't merge already known keys with new keys if there are no new keys
Serialize listing of OpenPGP and S/MIME keys
gpgsm: Fix cached istrusted lookup.
ErrorLabel: correct version check
Don't build openpgpcertificatecreationjob with older kleo versions
Update build instructions
ifdef certificate creation dialog depending on libkleo version
Don't assume const and non-const Content::headers() return the same type
I have reproduced this with libkleo from our gpg4win/24.05 branch and with gpg (GnuPG) 2.4.6-beta102 (HEAD of STABLE-BRANCH-2-4) and current master of gpgme and all GnuPG libraries. It took just 8 runs until a unittest failed.