Today
Note: In vsd it must be restricted to the bp algorithms then
Yesterday
The blue Kleopatra icon is now used for the Windows builds of Gpg4win and GPD and for the corresponding AppImages.
Wed, Feb 4
Tue, Feb 3
Thanks. Will go int the next version.
Done and backported for VSD 3.4
I misunderstood this, the mail can be forwarded with attachment if you first deselect the mail and then select it again. So the workaround is OK.
We decided to still use the term "Valid" (with description/tooltip "Certificates that are neither expired nor revoked (except disabled ones)"). This matches the use of the term "invalid" for expired and revoked certificates as in "Certificates that are invalid because they have expired (except disabled ones)".
Mon, Feb 2
Backported for VSD 3.4
Done. Example (with default text in English and German translation):
[Welcome] welcome-text[$i]=<h2>Hello, World!</h2> welcome-text[$i][de]=<h2>Hallo, Welt!</h2>
Sun, Feb 1
Fri, Jan 30
TL;DR
This ticket was created because building static-linked gpgv shows warnings from glibc for getpwnam and getpwuid.
Basically, we can/should ignore the warnings from glibc at link time (for normal use cases), because it is irrelevant.
Thu, Jan 29
Current state in gpg4win-5.0.0:
Let us mark this as a feature requests. gepwnam(3) is a standard libc function and if glibc does not support it; this is more likely a glibc bug than a bug in an application.
We decided not to do this.
Wed, Jan 28
Tue, Jan 27
Option works in Gpg4win-5.0.1 with GnuPG 2.5.17
Mon, Jan 26
I think this is still open (and requires T6537: Make KIO::move work on Windows when moving between different partitions).
Sun, Jan 25
@werner I added an implementation https://dev.gnupg.org/D622
that matches Linux behavior and avoids the message about secure memory not being supported on Windows. The change is scoped to the pinentry tool and intentionally follows Linux behavior. Does this approach look reasonable to you?
Fri, Jan 23
I don't think that we will implement that any time soon. Today we too often require more mlock-able memory than available and in this case Libgcrypt resorts to allocating new memory arenas which are not locked. This is not as worse as one might think: the majro advantage with secmem is that a free() on secmem allocated memory will also wipe that memory. A better solution has always been to use an encrypted swap/paging file. 25 years ago, it was not easy to configure but today there should be no problem and hopefully already the default.
While key generation works now with an expiry date up to 2106-02-04, the representation on the command line is a bit ugly.
Current state needs to be tested

