This is the current development version of GnuPG.
Details
Yesterday
I would say this is done.
This seems not to work in Kleopatra/gpg in gpg4win-5.0.0-beta413 @ win11.
Thu, Nov 27
Tested on gpg4win-5.0.0-beta413 @ win11 with the following entries in dirmngr.conf:
Tue, Nov 25
Yubikeys allow that. See my mail to the mailing list.
The extension .part is used by Mozilla/Firefox. Curl uses .tmp. Is that OK for Windows machine to use .part?
Mon, Nov 24
Seems like the OpenPGP Card Specification does not allow the change of retry counters.
That is a feature not a bug. Make also sense if your threat model is store-trafic-no-decrypt-later. If you can get the key you will also be abale to get the cleartext. Any nobody can remember a passphrase on par with the claimed Kyber security level.
Yes, sorry, a typo, I corrected it.
Sat, Nov 22
Fri, Nov 21
As this looks good to me on gpg4win-5.0.0-beta413 @ win11, I move this to done on the gpd5x board.
Forgot to note: Setting S/MIME debug level in kleopatra via GnuPG System will write the right key to gpg.conf (if I understood it right, this was also a problem)
I think last time I didn't test the actual problem.
When --output option is used and the user uses temporary file and is ready for checking an error, that is, it's already prepared, it's redundant and useless, indeed.
Wed, Nov 19
With the next gpg release (2.5.14) the keyboxd has an extended fingerprint table which carries a flags column. A bit in this column can eventually be used to mark subkeys with the "R" key flag and the search funtion can be enhanced to ignore keys with that flag set. This way we can more easily lookup the actual ADSK key (with the "E" key flag) and check whether this subkey has been revoked.
Tue, Nov 18
Mon, Nov 17
@ikloecker says that Kleo already support this feature. (I didn't know that.)
So, compatibility flag to switch on/off the feature would be needed,
or this feature is not needed in GnuPG at all.
Here is my attempt to do that:
Sun, Nov 16
Fix applied. Thanks.
This is not a composite key specific thing despite that this is an extra challenge. The creation date is used to reconstruct a key if the public key has been lost and only the fingerprint is still available. A solution might be to test the all combinations of stored creation dates to match the fingerprint.
Fri, Nov 14
Thu, Nov 13
Werner is going to add the missing implementation so that the error will soon be gone.
Mon, Nov 10
Thu, Nov 6
Here is my idea to implement the feature:
(1) Extend struct iobuf_struct to have a field of temporary output (of int), just after real_fname.
- OUTPUTFILE: When it's 1, a file generated with real_fname original suffix removed and appended .tmp is used for the output
(2) Modify get_output_file in plaintext.c and make_outfile_name in openfile.c, so that OUTPUTFILE above is used and the field in iobuf_struct is marked.
(3) Modify proc_encrypted in mainproc.c so that rename .tmp file to the OUTPUTFILE or remove it when failure.
Let me explain the background.
Wed, Nov 5
@gniibe Thanks for the detailed reply. Looks like we were lucky to hit v2.5.12 when building our CI containers few weeks ago, rebuilding those now with 2.5.13 fixed the problem. Thanks again!
