Do not abort if updating HTML Body fails
Improve ReadAsPlain detection
Fix fallback logic in set_body
Avoid using bultin gettext function name
Use explicit extern declaration for opt struct
Ignore deprecated copy warnings
A first version has landed.
Add user interface markers to some UI elements
Fix defaulting to last used directory when importing certificates
Don't try to finish if we have to wait for more jobs
Allow the export of certificate groups
Show information about new and updated groups after the import
Import certificate groups when importing certificates from files
Rewrite the post-processing of external X.509 certificate imports
Add protocol and type of import to the import results
Update the key cache after the import
Store jobs and ids resp. results and ids together
Remove finished jobs from idsByJob map
Set group config to use by KeyCache
Allow retrieving a group with a certain id from the cache
Add helper for checking if a container contains a certain key
Allow suspending the auto-refresh of the key cache
Add helper to get the fingerprints of a bunch of keys
Set group config to use by KeyCache instead of group config filename
Get multiple keys by their fingerprints
Add helper for converting a QStringList to a vector of std::strings
Factor code reading/writing the group configuration out of KeyCache
Tested both with the policies key and with the normal key and with HKLM fallback. Works as expected. There was also an issue where the error handling in case setting the HTML body failed did no longer work, probably since the verification preview changes. This was fixed with 76b43345cdd3e932dae7b677e5c021ca52191f8e
I just wanted to add one more note that i just found out that the tests or gcry_control have no effect in case the is called from constructor.
web: Removed franken.de mirror, which is not longer available.
tests:pkcs1v2: Skip tests with small keys in FIPS mode.
tests:pubkey: Replace RSA key to one of 2k.
tests: Use GPG_ERROR_MT_LIBS for a test with threads.
Laurent Montel <montel@kde.org> committed
rLIBKLEOdb985745c3d6: GIT_SILENT: master is open (authored by Laurent Montel <montel@kde.org>).
GIT_SILENT: master is open
I compiled the Appimage with the scripts in Gpg4win and it runs Kleopatra and works :-)
Make compendium compile with latex from bullseye
Also add PCRE checksum in master
Update glib and add PCRE package
Update glib to 2.50 to fix build with gcc 10
libtool: Link without -flat_namespace for macOS.
Fix internal API of functions to match declaration.
libtool: Link without -flat_namespace for macOS.
libtool: Link without -flat_namespace for macOS.
scd: More conservative selection of a card reader.
doc: Fix NEWS entry to refer CVE-2021-40528.
doc: Fix NEWS entry to refer CVE-2021-40528.
libtool: Link without -flat_namespace for macOS.
libtool: Link without -flat_namespace for macOS.
Since there is no problem with libgpg-error 1.43, I applied it to other libraries: npth, libassuan, libksba, and ntbtls.
I'll fix regressions: failures of and .
Yes, keep the internal SHA-3.
drafts,openpgp-webkey-service: Clarify when to use the direct method.
wks: Do not mark key files as executable
wks: Allow access to newly created dirs
wks: Do not mark key files as executable
wks: Allow access to newly created dirs
doc: Minor fix for --http-proxy.
Blowfish is not part of OpenPGP and according to its creator not the best cipher. Sorry to say no. You may nevertheless be interested in the recent discussion threads on PQC on the cryptography ML.
Applied and pushed symmetric algo for .
tests: Explicit FIPS checking for symmetric algorithms.
tests: Benchmark also larger RSA keys in FIPS mode
Let me clean up for current use case, at first.
I decided to use 3.3.0 disabling pthread feature.
Heiko Becker <heiko.becker@kde.org> committed
rLIBKLEO49e32463f364: GIT SILENT Change BRANCH_GROUP to stable-kf5-qt5 (authored by Heiko Becker <heiko.becker@kde.org>).
GIT SILENT Change BRANCH_GROUP to stable-kf5-qt5
Heiko Becker <heiko.becker@kde.org> committed
rKLEOPATRAa7abeea92d99: GIT SILENT Change BRANCH_GROUP to stable-kf5-qt5 (authored by Heiko Becker <heiko.becker@kde.org>).
GIT SILENT Change BRANCH_GROUP to stable-kf5-qt5
Heiko Becker <heiko.becker@kde.org> committed
rKLEOPATRA42c9be0d72a5: GIT_SILENT Upgrade release service version to 22.03.70. (authored by Heiko Becker <heiko.becker@kde.org>).
GIT_SILENT Upgrade release service version to 22.03.70.
Heiko Becker <heiko.becker@kde.org> committed
rKLEOPATRA4c38902471a4: GIT_SILENT Upgrade release service version to 21.11.80. (authored by Heiko Becker <heiko.becker@kde.org>).
GIT_SILENT Upgrade release service version to 21.11.80.
Any news here? Is this issue going to be fixed or not? It's really annoying.
• ikloecker renamed
T5677: Kleopatra: Do not offer deprecated gpg/keyserver option in GnuPG System configuration dialog from
Kleopatra: Do not offer "invisible" options in GnuPG System configuration dialog to
Kleopatra: Do not offer deprecated gpg/keyserver option in GnuPG System configuration dialog.
Thank you for merging the important parts of the patches and implementing similar stuff for DSA. You are right that DSA is supported in the 140-3 specs so it is fine to keep it enabled with the keylength constraints.
Applied parts except part 2.
The part 3 are modified version, so that memory can be released correctly.
dsa: Add checks in FIPS mode.
tests: Add 2k RSA key working in FIPS mode.
tests: Fix basic.c:check_pubkey.
tests: Expect errors from algorithms not supported in FIPS mode.
rsa: Check keylen constraints for key operations.
cipher: Respect the disabled flag of pubkey algorithms
Laurent Montel <montel@kde.org> committed
rLIBKLEOcf27ab5f08d8: GIT_SILENT: prepare 5.19.0beta1 (authored by Laurent Montel <montel@kde.org>).
GIT_SILENT: prepare 5.19.0beta1
Laurent Montel <montel@kde.org> committed
rKLEOPATRA297ccea15127: GIT_SILENT: prepare 5.19.0beta1 (authored by Laurent Montel <montel@kde.org>).
GIT_SILENT: prepare 5.19.0beta1
Closing. In case the audit will request more, we can re-open this task.
I think we can close this. In January we will have an external audit (BITV) which hopefully will confirm our tests. They auditor will also provide a list of things to improve (if any).
Implicit indicators mean that we need to go through the all algorithms and verify that they work if they have approved key sizes/parameters and do not work when they do not.
GIT_SILENT: Minor code cleanup
Import certificates from files containing OpenPGP and X.509 certificates