This is the current development version of GnuPG.
Details
Wed, May 28
Tue, May 27
Another possible change will be use of KEM interface for gpgsm.
Not high priority, but for long term code maintenance.
Mon, May 26
Sat, May 24
Fri, May 23
Clean up finished by rG681d75404300: gpg,agent: Clean up around using ECC KEM.
Tested by make check and decrypting tests/openpgp/samplemsgs/pqc-sample-*.enc.asc.
Thu, May 22
FYI: I'd like to get a new release out after these changes.
Pushed all changes needed. Actually, agent side too.
Clean up will be done.
Mon, May 19
Wed, May 14
Tue, May 13
Meanwhile we have some support for an empty subject but gpgsm still prints an error notice. See the T7171 for more.
Fri, May 9
(2) Update the documentation of default-cache-ttl zero value disabling caching.
I think we have another report on this in the tracker. The problem is indeed the ugly Windows time functions to print a string. Let me only remeber that untile a few years, Windows had the opinion that Germany is the the Westeuropäische Zeit, i.e. Portugal or the UK.
I am going to do:
(1) Recover old behavior with max-cache-ttl = 0
(2) Update the documentation of default-cache-ttl zero value disabling caching.
Thu, May 8
I can't see any documentation that a value of 0 disables the cache. The user might have used some undefined behaviour. For example in the old code we did a housecleaning when we were idle but the new code uses a timer and another thread for flushing the cache. We could open a feature request to entire disable the cache but I bet that we will get a lot of new bug reports because users will then need to enter their passphrase too often for one operation.
It's not my intention. I didn't know the feature of disabling caching by max-cache-ttl to 0.
Well, it's a regression if a user intends so.
Wed, May 7
Lucas Mülling commented yesterday on gnupg-devel:
Fri, May 2
A brief update: This feature has not made it onto the roadmap of specific things to implement so far.
Apr 22 2025
BTW, fingerprints for X.509 are not well defined because you get a different one when changing the *unsigned" attributes. Not a common case but one should be aware of it.
Apr 9 2025
Apr 2 2025
Mar 14 2025
Done
Re-opening because I think rGaa36f6ae8bae needs to be backported to GnuPG 2.4 (see T7568). The fix for T7309 which introduced the regression has been backported to GnuPG 2.4.
I've offered https://github.com/bestpractical/gnupg-interface/pull/16 to GnuPG::Interface, and am testing it out in debian unstable.
Mar 13 2025
I'll work on making a patch to offer a flexible test suite.
Alternately, i suppose we could ask GnuPG::Interface to drop the variant parts of that test entirely. @werner, If you have a preference for what they test, it would be good to know. I suspect your opinion would carry weight with the maintainer there.
Well, we also have the gpgme test suite which tests a couple of other things and for obvious reasons we need to keep this stable. Granted, sometimes we had to change the gpgme test suite as well. My personal preference would be your second choice.
Thanks for the fix for the double-free on --no-sig-cache, that appears to be an issue on all released gpg versions, as i can crash them directly when i --no-sig-cache.
Mar 12 2025
Interestingly, from this i'm learning that the patch actually *normalizes* the output so that we see the same thing regardless of ordering. the different output based on certificate order happens only in the unpatched version.
Please test without the --import keys.pgp -- just import filtered.pgp or filtered2.pgp.
I can't replicate your findings here . In a test directory w/o a gpg.conf:
Uihhh
with --no-sig-cache --check-sigs i get the following error with the patch applied:
Did you also tried with --no-sig-cache ? That could help to get a better insight into the reason for that difference.
Mar 11 2025
OK, now i really don't know what the issue is on the 2.4 branch. trying to replicate it with and without this patch, the --with-colons output of --check-sigs appears to depend on the order in which the certificates were ingested.
hm, digging a bit further, i think the above changes have to do with third-party signatures using SHA1, *not* with expired certifiers. in 2.4.7, i see a change from % to ! for these certifications. (2.2.x, which i know is EOL) shows the difference between ? and !. I'm trying to make a simpler replicator now.
With the patch "gpg: Fix regression for the recent malicious subkey DoS fix", there is a change in how gpg --check-sigs reports certifications from expired keys.
Mar 7 2025
it would be great to include a test in the test suite that ensures that the --status output behaves as expected in the face of expired or revoked keys.