I am pretty sure we have the same problem in 2.4 - due to different access patterns it might not exhibit itself.
agent: Make --disable-extended-key-format a dummy option.
• ikloecker moved
T6373: Kleopatra: Show progress dialog when moving decrypted archive to final destination from
Restricted Project Column to
Restricted Project Column on the
Restricted Project board.
gpgconf,w32: Also print a GnuPG Install Directory Registry entry
Smartcard PINs are different from passphrase for on-disk keys. Once a PIN is entered the smartcard is unlocked as long as it is powered up. In theory we could power down and power up the card to lock it. The question here is what is your threat model? If you have malware on your system it could simply brick your token or, more common, peek at your PIN.
l10n daemon script <scripty@kde.org> committed
rLIBKLEO148c82f9dddc: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
l10n daemon script <scripty@kde.org> committed
rKLEOPATRA743e9c995b9a: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
l10n daemon script <scripty@kde.org> committed
rLIBKLEOb65a99aab857: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
l10n daemon script <scripty@kde.org> committed
rKLEOPATRA83b8d2b49a17: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
Pushed to this site. Thanks for noting.
l10n daemon script <scripty@kde.org> committed
rLIBKLEO15b6685e38f3: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
l10n daemon script <scripty@kde.org> committed
rLIBKLEOa731d8d9084b: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
l10n daemon script <scripty@kde.org> committed
rKLEOPATRA1f8b8867ab1d: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
GIT_SILENT: master is open
GIT_SILENT: master is open
GIT_SILENT: prepare 23.04 beta
GIT_SILENT: prepare 23.04 beta
l10n daemon script <scripty@kde.org> committed
rLIBKLEO72f744fbc57d: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
l10n daemon script <scripty@kde.org> committed
rKLEOPATRAb62e0b97d6a3: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
l10n daemon script <scripty@kde.org> committed
rKLEOPATRAfa6c4acf42b7: SVN_SILENT made messages (.desktop file) - always resolve ours (authored by l10n daemon script <scripty@kde.org>).
SVN_SILENT made messages (.desktop file) - always resolve ours
l10n daemon script <scripty@kde.org> committed
rLIBKLEO51a36790ac6b: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
l10n daemon script <scripty@kde.org> committed
rKLEOPATRA505f6dbca9db: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
I think this is still missing a tag in git (I don't see it in )
GIT_SILENT: master is opened
GIT_SILENT: prepare 5.23.0 beta
l10n daemon script <scripty@kde.org> committed
rLIBKLEO8a35b23b60f1: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
l10n daemon script <scripty@kde.org> committed
rKLEOPATRA0b9800a69ca9: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
l10n daemon script <scripty@kde.org> committed
rKLEOPATRA2debdc4244d0: SVN_SILENT made messages (.desktop file) - always resolve ours (authored by l10n daemon script <scripty@kde.org>).
SVN_SILENT made messages (.desktop file) - always resolve ours
l10n daemon script <scripty@kde.org> committed
rLIBKLEO8ebdb98887b9: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
l10n daemon script <scripty@kde.org> committed
rKLEOPATRA3fb2b73c0ee5: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
Albert Astals Cid <aacid@kde.org> committed
rKLEOPATRAb1ec928003af: GIT_SILENT Upgrade release service version to 23.07.70. (authored by Albert Astals Cid <aacid@kde.org>).
GIT_SILENT Upgrade release service version to 23.07.70.
Albert Astals Cid <aacid@kde.org> committed
rKLEOPATRAb9dd9af8e0eb: GIT_SILENT Upgrade release service version to 23.03.80. (authored by Albert Astals Cid <aacid@kde.org>).
GIT_SILENT Upgrade release service version to 23.03.80.
I've run into a variant of this, too. If I generate they key just using , it is recognized as an encryption key. One needs to use .
@gniibe I have submitted D565 to change the error message on curses initialization to "Required environment variable not set"
Show indicator for compliance of selected keys
Show status of compliance in tooltip
Use neutral icon for non-compliant, valid keys
Set status string also for trusted keys
dirmngr: Add command "GETINFO stats".
Its not used, so it can't harm.
Also recall that Antivirus software needs to search for a competitive advantage over other vendors and in particular over Windows Defender. Thus they need to show some extra positives compared to the Windows Defender. Who care whether this is a false positive - ppl like to get some evidence that their new AV software has a (phoney) advantage.
It effects Yubikeys and ZeitControl cards (version 3.4)
Many thanks for the information. I suspected it also, but wanted your assessment.
We got a user report that the issue did not occur before their update from 3.1.25 to 3.1.26
Well, virus checkers aren't perfect. If 1 out of 65 checkers reports a finding, then the probability that this finding is a false positive is very high. You would better report this to the vendor of NANO-Antivirus, so that they can fix the false positive warning.
pinentry-curses: Handle SETREPEAT.
curses: Add password quality meter.
curses: Add SETREPEATOK and quality bar colors.
curses: Fix line graphics with error string present.
curses: Fix quality bar percentage logic.
agent: Try to SETREPEATOK if the pinentry supports it.
dirmngr: Distinguish between "no crl" and "crl not trusted".
keyboxd: Allow import of v0 certificates.
core: Also detect legacy X.509 v0 certificates.
gpg,gpgsm: New option --log-time
dirmngr: Minor code cleanup in the CRL cache.
tests: Add option --binary to run-verify
scd: Fix checking memory allocation.
agent: Add translatable text for Caps Lock hint
gpgsm: Strip trailing zeroes from detached signatures.
l10n daemon script <scripty@kde.org> committed
rKLEOPATRA7a3f33aeb1b8: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
scd: Fix checking memory allocation.
l10n daemon script <scripty@kde.org> committed
rKLEOPATRA71827cd52aa1: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
Thank you.
Applied to both (master and 1.10).
fips: Unblock MD5 in fips mode but mark non-approved in indicator.
fips: Add explicit indicators for md and mac algorithms.
This pretty much highlights a general problem of groups: If the distribution groups for the email client are managed independently from the certificate groups then there will inevitably be discrepancies. The obvious solution is the usage of groups managed by a central service for email addresses and certificates. (Or an encrypted mailing list service.)
kdf: Update tests in regards to the allowed parameters in FIPS mode.
fips: Check return value from ftell
Applied your patch (from gitlab) to both (master and 1.10).
random: Remove unused SHA384 DRBGs.
Applied to both (1.10 and master).
visibility: Check FIPS operational status for MD+Sign operation.
You are right, there is no way to use DRBG with SHA384 by libgcrypt.
Applied to both (1.10 and master).
Applied to both (of 1.10 and master).
ecc: Do not allow skipping tests in FIPS Mode.