| Author | Object | Transaction | Date |
|---|
| tfry | rOJb48138b4e8e2: Message corrections and wording | | Thu, Apr 2, 1:39 PM |
| tfry | rOJ2003b8df0b16: Message corrections and wording | | Thu, Apr 2, 1:24 PM |
| • werner | rG699b6d060317: gpgsm: Announce that we can handle GCM encrypted data. | | Thu, Apr 2, 11:33 AM |
| • werner | rG04fd775fce59: gpgsm: Make GCM fully compliant for de-vs | | Thu, Apr 2, 11:33 AM |
| • werner | rG699b6d060317: gpgsm: Announce that we can handle GCM encrypted data. | | Thu, Apr 2, 11:31 AM |
| • werner | T3979: GPGSM: Authenticated encryption | | Thu, Apr 2, 11:31 AM |
| tfry | rLIBKLEO55cb6d08b3ae: Add functions to evaluate signature for specific UserID, only | | Thu, Apr 2, 9:19 AM |
| tfry | rLIBKLEObd5b09347dd7: Add functions to evaluate signature for specific UserID, only | | Thu, Apr 2, 9:09 AM |
| tfry | rLIBKLEO16e04bf41c58: Add functions to evaluate signature for specific UserID, only | | Wed, Apr 1, 2:53 PM |
| pl13 | T8188: gpgsm: No error/warning on verification or decryption in case of trusted but not VS-compliant certificate | | Wed, Apr 1, 2:28 PM |
| tfry | T8199: Security level button - provide better message, if signature is good, but is not trusted to correspond to sender UID | | Wed, Apr 1, 1:50 PM |
| tfry | T8199: Security level button - provide better message, if signature is good, but is not trusted to correspond to sender UID | | Wed, Apr 1, 1:50 PM |
| Thomas Friedrichsmeier <thomas.friedrichsmeier@kdemail.net> | rMTP958448c3d51e: Only show signature as green, if it matches the sender | | Wed, Apr 1, 1:47 PM |
| tfry | rLIBKLEO4aef1cd60d61: Add functions to evaluate signature for specific UserID, only | | Wed, Apr 1, 1:34 PM |
| jpalus | T8202: Intermittent ssh publickey login failure after upgrade to gnupg 2.5.x | | Wed, Apr 1, 1:27 PM |
| thesamesam | T8202: Intermittent ssh publickey login failure after upgrade to gnupg 2.5.x | | Wed, Apr 1, 1:19 PM |
| • gniibe | T8204: libgcrypt: Add optimized implementation of Kyber/Dilithium using CPU specific vector extention | • gniibe triaged this task as Wishlist priority. | Wed, Apr 1, 7:30 AM |
| • gniibe | T8204: libgcrypt: Add optimized implementation of Kyber/Dilithium using CPU specific vector extention | • gniibe created this object with visibility "Public (No Login Required)". | Wed, Apr 1, 7:30 AM |
| • gniibe | T8204: libgcrypt: Add optimized implementation of Kyber/Dilithium using CPU specific vector extention | • gniibe created this object with edit policy "All Users". | Wed, Apr 1, 7:30 AM |
| • gniibe | T8204: libgcrypt: Add optimized implementation of Kyber/Dilithium using CPU specific vector extention | | Wed, Apr 1, 7:30 AM |
| • gniibe | T8204: libgcrypt: Add optimized implementation of Kyber/Dilithium using CPU specific vector extention | | Wed, Apr 1, 7:30 AM |
| • gniibe | T8204: libgcrypt: Add optimized implementation of Kyber/Dilithium using CPU specific vector extention | | Wed, Apr 1, 7:30 AM |
| • gniibe | T8204: libgcrypt: Add optimized implementation of Kyber/Dilithium using CPU specific vector extention | | Wed, Apr 1, 7:30 AM |
| • gniibe | T8204: libgcrypt: Add optimized implementation of Kyber/Dilithium using CPU specific vector extention | • gniibe set External Link to https://lists.gnupg.org/pipermail/gcrypt-devel/2026-February/006046.html. | Wed, Apr 1, 7:30 AM |
| • gniibe | T8204: libgcrypt: Add optimized implementation of Kyber/Dilithium using CPU specific vector extention | | Wed, Apr 1, 7:30 AM |
| • gniibe | T8204: libgcrypt: Add optimized implementation of Kyber/Dilithium using CPU specific vector extention | | Wed, Apr 1, 7:30 AM |
| • gniibe | rGc67e0b0a86b4: agent:ssh: Fix RSA padding in signature handling. | | Wed, Apr 1, 4:35 AM |
| • gniibe | rGc67e0b0a86b4: agent:ssh: Fix RSA padding in signature handling. | | Wed, Apr 1, 4:35 AM |
| • gniibe | rGc7e0ec12609b: agent:ssh: Fix RSA signature handling for newer spec. | | Wed, Apr 1, 4:35 AM |
| • gniibe | T8202: Intermittent ssh publickey login failure after upgrade to gnupg 2.5.x | | Wed, Apr 1, 4:35 AM |
| • gniibe | T7882: `rsa-sha2` signature values are improperly truncated | | Wed, Apr 1, 4:35 AM |
| • gniibe | rGc67e0b0a86b4: agent:ssh: Fix RSA padding in signature handling. | | Wed, Apr 1, 4:35 AM |
| • gniibe | rGc67e0b0a86b4: agent:ssh: Fix RSA padding in signature handling. | | Wed, Apr 1, 4:32 AM |
| • gniibe | T8202: Intermittent ssh publickey login failure after upgrade to gnupg 2.5.x | | Wed, Apr 1, 4:29 AM |
| • gniibe | T8202: Intermittent ssh publickey login failure after upgrade to gnupg 2.5.x | • gniibe triaged this task as Normal priority. | Wed, Apr 1, 4:29 AM |
| • gniibe | T8202: Intermittent ssh publickey login failure after upgrade to gnupg 2.5.x | | Wed, Apr 1, 4:16 AM |
| jpalus | T8202: Intermittent ssh publickey login failure after upgrade to gnupg 2.5.x | | Tue, Mar 31, 6:38 PM |
| • ebo | T7333: Allow gpg to auto-upload a new own key to LDAP servers | | Tue, Mar 31, 4:56 PM |
| • ebo | T7333: Allow gpg to auto-upload a new own key to LDAP servers | | Tue, Mar 31, 4:56 PM |
| • ebo | T7333: Allow gpg to auto-upload a new own key to LDAP servers | | Tue, Mar 31, 4:54 PM |
| • ebo | T7333: Allow gpg to auto-upload a new own key to LDAP servers | | Tue, Mar 31, 4:54 PM |
| • ebo | T7333: Allow gpg to auto-upload a new own key to LDAP servers | | Tue, Mar 31, 4:53 PM |
| • werner | T8202: Intermittent ssh publickey login failure after upgrade to gnupg 2.5.x | | Tue, Mar 31, 3:23 PM |
| • werner | T8202: Intermittent ssh publickey login failure after upgrade to gnupg 2.5.x | | Tue, Mar 31, 3:23 PM |
| • werner | T8197: "gpg --refresh-keys" aborts with "gpg: keyserver refresh failed: No data" if too many keys are missing on keyserver | | Tue, Mar 31, 3:18 PM |
| • werner | T8197: "gpg --refresh-keys" aborts with "gpg: keyserver refresh failed: No data" if too many keys are missing on keyserver | | Tue, Mar 31, 3:18 PM |
| • werner | rG66fdafab3c6d: gpgsm: Fix bug so that a cert can be signed by a different algo. | | Tue, Mar 31, 2:43 PM |
| jpalus | T8202: Intermittent ssh publickey login failure after upgrade to gnupg 2.5.x | | Tue, Mar 31, 1:50 PM |
| jpalus | rGc7e0ec12609b: agent:ssh: Fix RSA signature handling for newer spec. | | Tue, Mar 31, 1:21 PM |
| jpalus | T8202: Intermittent ssh publickey login failure after upgrade to gnupg 2.5.x | | Tue, Mar 31, 1:21 PM |
| jpalus | T8202: Intermittent ssh publickey login failure after upgrade to gnupg 2.5.x | | Tue, Mar 31, 1:21 PM |
| • ebo | T7722: GpgOL: Temp filename creation fails to choose proper extension | • ebo mentioned this in Unknown Object (Maniphest Task). | Tue, Mar 31, 1:10 PM |
| jpalus | T8202: Intermittent ssh publickey login failure after upgrade to gnupg 2.5.x | | Tue, Mar 31, 12:55 PM |
| • werner | T8202: Intermittent ssh publickey login failure after upgrade to gnupg 2.5.x | | Tue, Mar 31, 12:11 PM |
| • werner | T7882: `rsa-sha2` signature values are improperly truncated | | Tue, Mar 31, 12:11 PM |
| • werner | T8202: Intermittent ssh publickey login failure after upgrade to gnupg 2.5.x | | Tue, Mar 31, 12:06 PM |
| • werner | T8202: Intermittent ssh publickey login failure after upgrade to gnupg 2.5.x | | Tue, Mar 31, 12:06 PM |
| • werner | T8202: Intermittent ssh publickey login failure after upgrade to gnupg 2.5.x | | Tue, Mar 31, 12:06 PM |
| l10n daemon script <scripty@kde.org> | rMTP4d9fc4fcd13d: GIT_SILENT Sync po/docbooks with svn | | Tue, Mar 31, 5:24 AM |
| l10n daemon script <scripty@kde.org> | rKLEOPATRAe185b2634606: GIT_SILENT Sync po/docbooks with svn | | Tue, Mar 31, 5:24 AM |
| l10n daemon script <scripty@kde.org> | rMTPd3be336551c9: GIT_SILENT Sync po/docbooks with svn | | Tue, Mar 31, 3:48 AM |
| l10n daemon script <scripty@kde.org> | rKLEOPATRAad79b8369044: GIT_SILENT Sync po/docbooks with svn | | Tue, Mar 31, 3:48 AM |
| jpalus | T8202: Intermittent ssh publickey login failure after upgrade to gnupg 2.5.x | | Mon, Mar 30, 6:56 PM |
| jpalus | T8202: Intermittent ssh publickey login failure after upgrade to gnupg 2.5.x | | Mon, Mar 30, 6:56 PM |
| jpalus | T8202: Intermittent ssh publickey login failure after upgrade to gnupg 2.5.x | | Mon, Mar 30, 6:56 PM |
| jpalus | T8202: Intermittent ssh publickey login failure after upgrade to gnupg 2.5.x | | Mon, Mar 30, 6:56 PM |
| jpalus | T8202: Intermittent ssh publickey login failure after upgrade to gnupg 2.5.x | | Mon, Mar 30, 6:56 PM |
| jpalus | T8202: Intermittent ssh publickey login failure after upgrade to gnupg 2.5.x | jpalus created this object with visibility "Public (No Login Required)". | Mon, Mar 30, 6:56 PM |
| jpalus | T8202: Intermittent ssh publickey login failure after upgrade to gnupg 2.5.x | jpalus updated the task description. | Mon, Mar 30, 6:56 PM |
| jpalus | T8202: Intermittent ssh publickey login failure after upgrade to gnupg 2.5.x | | Mon, Mar 30, 6:56 PM |
| jpalus | T8202: Intermittent ssh publickey login failure after upgrade to gnupg 2.5.x | jpalus created this object with edit policy "All Users". | Mon, Mar 30, 6:56 PM |
| tfry | rOJ98812ecf3493: Security level info | | Mon, Mar 30, 3:08 PM |
| timegrid | T8161: Invalid MimeType Related instead of Mixed | | Mon, Mar 30, 2:31 PM |
| timegrid | T8193: Add a workflow to force encryption/signature with invalid or expired certificates | | Mon, Mar 30, 1:16 PM |
| timegrid | T8193: Add a workflow to force encryption/signature with invalid or expired certificates | timegrid renamed this task from Draft: Add a workflow to force encryption/signature with invalid or expired certificates to Add a workflow to force encryption/signature with invalid or expired certificates. | Mon, Mar 30, 1:16 PM |
| tfry | rOJ718b7ef3bf1a: Explicitly share certain paths between client and server | | Mon, Mar 30, 12:06 PM |
| • ikloecker | T6702: Kleopatra: Offer retry of S/MIME encryption if encryption failed with "not trusted" | | Mon, Mar 30, 11:57 AM |
| • ikloecker | T6702: Kleopatra: Offer retry of S/MIME encryption if encryption failed with "not trusted" | | Mon, Mar 30, 11:57 AM |
| • ikloecker | T8201: Kleopatra: Optionally, allow encryption with invalid or expired certificates | | Mon, Mar 30, 11:54 AM |
| • ikloecker | T8201: Kleopatra: Optionally, allow encryption with invalid or expired certificates | | Mon, Mar 30, 11:54 AM |
| • ikloecker | T8201: Kleopatra: Optionally, allow encryption with invalid or expired certificates | • ikloecker created this object with visibility "Public (No Login Required)". | Mon, Mar 30, 11:54 AM |
| • ikloecker | T8201: Kleopatra: Optionally, allow encryption with invalid or expired certificates | | Mon, Mar 30, 11:54 AM |
| • ikloecker | T8201: Kleopatra: Optionally, allow encryption with invalid or expired certificates | | Mon, Mar 30, 11:54 AM |
| • ikloecker | T8201: Kleopatra: Optionally, allow encryption with invalid or expired certificates | | Mon, Mar 30, 11:54 AM |
| • ikloecker | T8201: Kleopatra: Optionally, allow encryption with invalid or expired certificates | | Mon, Mar 30, 11:54 AM |
| • ikloecker | T8195: Add option --ignore-expiration to gpg and gpgsm | | Mon, Mar 30, 11:54 AM |
| • ikloecker | T8201: Kleopatra: Optionally, allow encryption with invalid or expired certificates | | Mon, Mar 30, 11:54 AM |
| • ikloecker | T8201: Kleopatra: Optionally, allow encryption with invalid or expired certificates | | Mon, Mar 30, 11:54 AM |
| • ikloecker | T8201: Kleopatra: Optionally, allow encryption with invalid or expired certificates | | Mon, Mar 30, 11:54 AM |
| • ikloecker | T8201: Kleopatra: Optionally, allow encryption with invalid or expired certificates | | Mon, Mar 30, 11:54 AM |
| tfry | rOJ4d9770451d1a: Look up keys in cache, instead | | Mon, Mar 30, 11:46 AM |
| tfry | rOJ334d25dc8f90: Show distinct messages if secret keys were found, but are not usable | | Mon, Mar 30, 11:46 AM |
| tfry | rOJaacd549c702f: Bring dialogs to front on Windows | | Mon, Mar 30, 11:46 AM |
| tfry | rOJb2de026d6756: Make sure kleopatra windows open in foreground on Windows | | Mon, Mar 30, 11:46 AM |
| tfry | rOJce8a3988c8bc: Inform in native client, if no secret key is available for connected account | | Mon, Mar 30, 11:46 AM |
| • ikloecker | T8193: Add a workflow to force encryption/signature with invalid or expired certificates | | Mon, Mar 30, 11:39 AM |
| • ikloecker | T6702: Kleopatra: Offer retry of S/MIME encryption if encryption failed with "not trusted" | | Mon, Mar 30, 11:39 AM |
| • ikloecker | T8193: Add a workflow to force encryption/signature with invalid or expired certificates | | Mon, Mar 30, 11:39 AM |
| • ikloecker | T6702: Kleopatra: Offer retry of S/MIME encryption if encryption failed with "not trusted" | | Mon, Mar 30, 11:39 AM |
| • ikloecker | T6702: Kleopatra: Offer retry of S/MIME encryption if encryption failed with "not trusted" | • ikloecker renamed this task from Kleopatra: Use GPGME_ENCRYPT_ALWAYS_TRUST to Kleopatra: Offer retry of S/MIME encryption if encryption failed with "not trusted". | Mon, Mar 30, 11:38 AM |