Feature RequestExperimental
ActivePublic

Members

  • This project does not have any members.

Watchers (1)

Recent Activity

Today

werner created T4910: Allow to add a no-mail notation to user-ids.
Tue, Apr 7, 8:38 AM · gnupg (gpg23), Feature Request

Yesterday

gniibe changed the status of T4888: GpgSM: Support ECC key generation by gpgsm_genkey, a subtask of T4098: GpgSM: Add ECC support (Option to create an X.509/ECDSA key), from Open to Testing.
Mon, Apr 6, 6:49 AM · Feature Request, S/MIME
gniibe changed the status of T4888: GpgSM: Support ECC key generation by gpgsm_genkey from Open to Testing.
Mon, Apr 6, 6:49 AM · Testing, Feature Request, S/MIME

Thu, Apr 2

gniibe added a comment to T4864: New scdaemon command to watch device removal.

It runs like:

$ gpg-connect-agent "scd devinfo --watch" /bye
S DEVINFO_START
S DEVINFO_END
S DEVINFO_STATUS new
S DEVINFO_START
S DEVICE generic D276000124010200F517000000010000 openpgp
S DEVINFO_END
S DEVINFO_STATUS removal
S DEVINFO_START
S DEVINFO_END
OK
$ 
Thu, Apr 2, 8:49 AM · Testing, Feature Request, scd, Bug Report
gniibe changed the status of T4864: New scdaemon command to watch device removal from Open to Testing.

Push the change to master.

Thu, Apr 2, 8:46 AM · Testing, Feature Request, scd, Bug Report
gniibe added a commit to T4864: New scdaemon command to watch device removal: rG2ccbcfec121f: scd: New command DEVINFO..
Thu, Apr 2, 8:45 AM · Testing, Feature Request, scd, Bug Report

Tue, Mar 31

gniibe added a commit to T4896: ksba: Ed25519 support: rK2625e13bc9d5: ecc: Add Ed25519 and Ed448 public key support..
Tue, Mar 31, 9:00 AM · libksba, Feature Request, S/MIME
gniibe added a comment to T4888: GpgSM: Support ECC key generation by gpgsm_genkey.

genkey for Ed25519 works now with libksba in master.

Tue, Mar 31, 8:59 AM · Testing, Feature Request, S/MIME
gniibe added a comment to T4896: ksba: Ed25519 support.

For public key, it's done.

Tue, Mar 31, 8:59 AM · libksba, Feature Request, S/MIME

Mon, Mar 30

gniibe added a project to T4896: ksba: Ed25519 support: libksba.
Mon, Mar 30, 7:55 AM · libksba, Feature Request, S/MIME
gniibe created T4896: ksba: Ed25519 support.
Mon, Mar 30, 7:55 AM · libksba, Feature Request, S/MIME

Sun, Mar 29

dkg added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

Thanks for following up!

Sun, Mar 29, 6:46 PM · gnupg (gpg23), Feature Request
werner added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

No, we always stated that the user id is a mandatory part of OpenPGP keyblocks and that non-compliant keyblocks are rejected. The only exception we made are for revocation signatures where we allow a standalone packet. That exception is done to allow typing in a printed out revocation signature.

Sun, Mar 29, 6:30 PM · gnupg (gpg23), Feature Request
dkg updated subscribers of T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

To be clear: marking this ticket wontfix means (among other things) that it is the GnuPG project's upstream position that:

Sun, Mar 29, 5:38 PM · gnupg (gpg23), Feature Request
werner closed T4393: GnuPG should always accept key updates even if the update does not contain UIDs as Wontfix.

With OpenPGP we made user ids mandatory to avoid problems we had with PGP2. I see no reason to revert this.

Sun, Mar 29, 11:25 AM · gnupg (gpg23), Feature Request

Sat, Mar 28

ilf added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

Nine months have passed since the patches for this problem have been available.

Sat, Mar 28, 5:43 PM · gnupg (gpg23), Feature Request

Fri, Mar 27

werner triaged T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation as Normal priority.

I recall that I talked with Stephan about it but things got lost.

Fri, Mar 27, 7:12 PM · FIPS, libgcrypt, Feature Request
pmgdeb created T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation.
Fri, Mar 27, 6:04 PM · FIPS, libgcrypt, Feature Request
gniibe added a comment to T4888: GpgSM: Support ECC key generation by gpgsm_genkey.

NIST P-256 key generation looks good.

Fri, Mar 27, 11:53 AM · Testing, Feature Request, S/MIME

Thu, Mar 26

gniibe added a commit to T4888: GpgSM: Support ECC key generation by gpgsm_genkey: rG49ea53b755f0: gpgsm: Support key generation with ECC..
Thu, Mar 26, 7:56 AM · Testing, Feature Request, S/MIME
gniibe added a commit to T4888: GpgSM: Support ECC key generation by gpgsm_genkey: rG238707db8b05: gpgsm: Remove restriction of key generation (only RSA)..
Thu, Mar 26, 3:44 AM · Testing, Feature Request, S/MIME

Wed, Mar 25

werner created T4891: Support CBOR content in gpgsm.
Wed, Mar 25, 12:54 PM · Feature Request, gnupg, S/MIME

Tue, Mar 24

gniibe added a comment to T4098: GpgSM: Add ECC support (Option to create an X.509/ECDSA key).

There are two code paths to generate key: gpgsm_genkey and gpgsm_gencertreq_tty. Latter is partially supported with card key.
Firstly, I'm going to work for T4888.

Tue, Mar 24, 6:32 AM · Feature Request, S/MIME
gniibe created T4888: GpgSM: Support ECC key generation by gpgsm_genkey.
Tue, Mar 24, 6:30 AM · Testing, Feature Request, S/MIME
gniibe changed the status of T4013: Certificate requests generated from Ed25519 keys are not compliant with draft-ietf-curdle-pkix from Open to Testing.

This should work well with libksba master and gnupg/sm master.

Tue, Mar 24, 3:35 AM · Testing, S/MIME, Feature Request, libksba
gniibe changed the status of T4092: Certificate requests generated from card-based ECDSA keys are incorrectly marked as RSA-signed from Open to Testing.

The commits in 2019 (for libksba and gnupg/sm) handles the problem (of key generation using card).

Tue, Mar 24, 3:32 AM · Testing, Feature Request, S/MIME

Thu, Mar 19

gniibe added a comment to T4864: New scdaemon command to watch device removal.

Created https://dev.gnupg.org/source/gnupg/history/gniibe%252Fscd-watch/

Thu, Mar 19, 6:28 AM · Testing, Feature Request, scd, Bug Report
gniibe added a subtask for T1303: Please support GCRYSEXP_FMT_BASE64: T4294: Release Libgcrypt 1.9.0.
Thu, Mar 19, 5:19 AM · Feature Request, libgcrypt
gniibe removed a parent task for T1303: Please support GCRYSEXP_FMT_BASE64: T4294: Release Libgcrypt 1.9.0.
Thu, Mar 19, 5:19 AM · Feature Request, libgcrypt

Wed, Mar 18

werner edited projects for T4605: automatically upgrade from `pubring.gpg` to `pubring.kbx`, added: gnupg (gpg23); removed gnupg (gpg22).

Given that we may move to yet another format in 2.3 I now doubt that we should add such a feature to 2.2.

Wed, Mar 18, 2:22 PM · gnupg (gpg23), Feature Request
werner closed T4855: The trusted-key option requires a long key ID and won't take a fingerprint as Resolved.

Thanks. I applied your patch to 2.2 and master. I had to do a minor fix because the function does not return anything. Also extended on master with another patch for v5 keys.

Wed, Mar 18, 2:04 PM · gnupg (gpg22), Feature Request
werner added a commit to T4855: The trusted-key option requires a long key ID and won't take a fingerprint: rGb6d89d1944c5: gpg: Update --trusted-key to accept fingerprint as well as long key id..
Wed, Mar 18, 2:02 PM · gnupg (gpg22), Feature Request
werner added a commit to T4855: The trusted-key option requires a long key ID and won't take a fingerprint: rG810ea2cc6844: gpg: Update --trusted-key to accept fingerprint as well as long key id..
Wed, Mar 18, 1:58 PM · gnupg (gpg22), Feature Request
werner added a commit to T4855: The trusted-key option requires a long key ID and won't take a fingerprint: rG4287f89557b3: gpg: Also allow a v5 fingerprint for --trusted-key..
Wed, Mar 18, 1:58 PM · gnupg (gpg22), Feature Request

Tue, Mar 17

werner added a commit to T4856: GPG: Key Exchange Put public OpenPGP key into signature: rM3afa534645e3: core: New context flags "include-key-block" and "auto-key-import"..
Tue, Mar 17, 5:57 PM · Feature Request, gpgol, Keyserver, gnupg
gniibe closed T4880: npth: Add functions to wake up condition variable, a subtask of T4864: New scdaemon command to watch device removal, as Invalid.
Tue, Mar 17, 2:59 AM · Testing, Feature Request, scd, Bug Report
gniibe closed T4880: npth: Add functions to wake up condition variable as Invalid.

It is my confusion. The API is available. I only looked for symbols in the library.
It is #define-d macro to pthread_cond_*.

Tue, Mar 17, 2:59 AM · Feature Request, npth
gniibe added a comment to T4880: npth: Add functions to wake up condition variable.

For Windows, it is available. I don't know the reason why it has not been available for POSIX.

Tue, Mar 17, 1:51 AM · Feature Request, npth

Mon, Mar 16

gniibe added a subtask for T4864: New scdaemon command to watch device removal: T4880: npth: Add functions to wake up condition variable.
Mon, Mar 16, 6:03 AM · Testing, Feature Request, scd, Bug Report
gniibe added a parent task for T4880: npth: Add functions to wake up condition variable: T4864: New scdaemon command to watch device removal.
Mon, Mar 16, 6:03 AM · Feature Request, npth
gniibe created T4880: npth: Add functions to wake up condition variable.
Mon, Mar 16, 6:02 AM · Feature Request, npth

Sat, Mar 14

werner added a comment to T4856: GPG: Key Exchange Put public OpenPGP key into signature.

I think that this chnage is useful enough to be backported to 2.2. Done that.

Sat, Mar 14, 8:14 PM · Feature Request, gpgol, Keyserver, gnupg
werner added a commit to T4856: GPG: Key Exchange Put public OpenPGP key into signature: rG95b42278cafe: gpg: New option --auto-key-import.
Sat, Mar 14, 8:13 PM · Feature Request, gpgol, Keyserver, gnupg
werner added a commit to T4856: GPG: Key Exchange Put public OpenPGP key into signature: rG2baa00ea1863: gpg: Add property "fpr" for use by --export-filter..
Sat, Mar 14, 8:13 PM · Feature Request, gpgol, Keyserver, gnupg
werner added a commit to T4856: GPG: Key Exchange Put public OpenPGP key into signature: rGb42d9f540c74: gpg: Make use of the included key block in a signature..
Sat, Mar 14, 8:13 PM · Feature Request, gpgol, Keyserver, gnupg
werner added a commit to T4856: GPG: Key Exchange Put public OpenPGP key into signature: rGd79ebee64ea5: gpg: New option --include-key-block..
Sat, Mar 14, 8:13 PM · Feature Request, gpgol, Keyserver, gnupg
werner added a commit to T4788: System wide configuration of the GnuPG system: rG451cd1b39281: gpgconf: Further simplify the gpgconf option processing..
Sat, Mar 14, 7:13 PM · gnupg (gpg23), Feature Request, gpg4win, g10code
werner added a commit to T4856: GPG: Key Exchange Put public OpenPGP key into signature: rG6b306f45f4fb: gpg: New option --auto-key-import.
Sat, Mar 14, 6:07 PM · Feature Request, gpgol, Keyserver, gnupg

Fri, Mar 13

werner changed the status of T4856: GPG: Key Exchange Put public OpenPGP key into signature from Open to Testing.
Fri, Mar 13, 5:29 PM · Feature Request, gpgol, Keyserver, gnupg
werner added a comment to T4856: GPG: Key Exchange Put public OpenPGP key into signature.

You can test it now out using GnuPG master: Just add --include-key-block and you can then verify using an empty keyring. Currently --auto-key-retrieve is not needed but we need to think on how we can enable or disable this during verification.

Fri, Mar 13, 5:28 PM · Feature Request, gpgol, Keyserver, gnupg