Page MenuHome GnuPG

libgcryptProject
ActivePublic

Recent Activity

Today

ametzler1 added a comment to T7114: AM_PATH_LIBGCRYPT does not use gpgrt-config without AM_PATH_GPG_ERROR.

Just to clarify: I personally think it would be perfectly fine to say that AM_PATH_* is only supported when AM_PATH_GPG_ERROR is also used. Adding an invocation AM_PATH_GPG_ERROR is not a great hassle and alternatively pkg-config/pkgconf exists and works perfectly fine (and is a lot faster).

Sun, May 12, 3:57 PM · gpgrt, libgcrypt, Bug Report
werner added a project to T7114: AM_PATH_LIBGCRYPT does not use gpgrt-config without AM_PATH_GPG_ERROR: gpgrt.

I noticed this recently too on some boxes. Thanks for the good decription. This support for pkg-config style .pc files for our config scripts seems to be a never ending story. The alternative name for libgpg-error-config does not make it easier.

Sun, May 12, 2:29 PM · gpgrt, libgcrypt, Bug Report
ametzler1 updated the task description for T7114: AM_PATH_LIBGCRYPT does not use gpgrt-config without AM_PATH_GPG_ERROR.
Sun, May 12, 11:24 AM · gpgrt, libgcrypt, Bug Report

Yesterday

ametzler1 added a project to T7114: AM_PATH_LIBGCRYPT does not use gpgrt-config without AM_PATH_GPG_ERROR: libgcrypt.
Sat, May 11, 1:20 PM · gpgrt, libgcrypt, Bug Report

Wed, May 8

jukivili closed T7111: aarch64 assembly code for chacha20 should use local symbols for internal data as Resolved.
Wed, May 8, 9:02 PM · asm, arm, libgcrypt, Bug Report
jukivili claimed T7111: aarch64 assembly code for chacha20 should use local symbols for internal data.
Wed, May 8, 9:01 PM · asm, arm, libgcrypt, Bug Report
jukivili added a comment to T7111: aarch64 assembly code for chacha20 should use local symbols for internal data.

Thanks for report. I've applied this change to master.

Wed, May 8, 9:01 PM · asm, arm, libgcrypt, Bug Report
werner closed T6511: EdDSA support in FIPS mode as Resolved.
Wed, May 8, 8:32 AM · FIPS, libgcrypt, Bug Report

Tue, May 7

Jakuje added a comment to T6511: EdDSA support in FIPS mode.

I think so. We did not submit a modules for recertification with these changes, but we do not plan this in close future so you can consider it completed.

Tue, May 7, 3:01 PM · FIPS, libgcrypt, Bug Report
werner added a comment to T6511: EdDSA support in FIPS mode.

Can we close this?

Tue, May 7, 2:44 PM · FIPS, libgcrypt, Bug Report
saurik created T7111: aarch64 assembly code for chacha20 should use local symbols for internal data.
Tue, May 7, 9:52 AM · asm, arm, libgcrypt, Bug Report

Mon, Apr 22

gniibe added a comment to T7085: libgcrypt: New functions to support waiting time.

Here is current version:

diff --git a/src/misc.c b/src/misc.c
index 4db2d9a4..bf50b00b 100644
--- a/src/misc.c
+++ b/src/misc.c
@@ -577,3 +577,61 @@ _gcry_divide_by_zero (void)
     gpg_err_set_errno (EDOM);
     _gcry_fatal_error (gpg_err_code_from_errno (errno), "divide by zero");
 }
+
+#ifdef HAVE_CLOCK_GETTIME
+#include <time.h>
+# if defined(CLOCK_THREAD_CPUTIME_ID) && defined(CLOCK_TAI)
+struct gcry_timedwait
+{
+  clockid_t id;
+  struct timespec ts;
+};
+
+typedef struct gcry_timedwait *gcry_timedwait_t;
+
+gcry_err_code_t
+_gcry_timedwait_init (gcry_timedwait_t tw, unsigned int flags)
+{
+  /* Possibly, it would be good to be able to select the wall clock.
+   * For now, it's CPU time by the thread.  */
+  if (flags != 0)
+    return GPG_ERR_INV_ARG;
+
+  tw->id = CLOCK_THREAD_CPUTIME_ID;
+  if (clock_gettime (tw->id, &tw->ts) < 0)
+    return gpg_err_code_from_syserror ();
+
+  return 0;
+}
+
+gcry_err_code_t
+_gcry_timedwait_finish (gcry_timedwait_t tw, struct timespec ts_r)
+{
+  struct timespec ts;
+  u32 negative;
+
+  if (clock_gettime (tw->id, &ts) < 0)
+    return gpg_err_code_from_syserror ();
+
+  ts.tv_sec -= tw->ts.tv_sec;
+  ts.tv_nsec -= tw->ts.tv_nsec;
+  negative = ((u32)ts.tv_nsec) >> 31;
+  ts.tv_sec -= negative;
+  ts.tv_nsec += (1000000000 * negative);
+
+  ts_r.tv_sec -= ts.tv_sec;
+  ts_r.tv_nsec -= ts.tv_nsec;
+  negative = ((u32)ts_r.tv_nsec) >> 31;
+  ts_r.tv_sec -= negative;
+  ts_r.tv_nsec += (1000000000 * negative);
+
+  if (ts_r.tv_sec < 0)
+    return GPG_ERR_TIME_CONFLICT;
+
+  if (clock_nanosleep (CLOCK_TAI, 0, &ts_r, &ts_r))
+    return gpg_err_code_from_syserror ();
+
+  return 0;
+}
+# endif
+#endif
Mon, Apr 22, 8:01 AM · libgcrypt

Apr 12 2024

gniibe added a comment to T7085: libgcrypt: New functions to support waiting time.

API which does not require allocation internally would be better. In this case, it is allocated on stack by the caller.

Apr 12 2024, 8:07 AM · libgcrypt
gniibe added a comment to T7085: libgcrypt: New functions to support waiting time.

I mean, something like this (for GNU/Linux):

diff --git a/src/misc.c b/src/misc.c
index 4db2d9a4..74864334 100644
--- a/src/misc.c
+++ b/src/misc.c
@@ -577,3 +577,80 @@ _gcry_divide_by_zero (void)
     gpg_err_set_errno (EDOM);
     _gcry_fatal_error (gpg_err_code_from_errno (errno), "divide by zero");
 }
+
+#ifdef HAVE_CLOCK_GETTIME
+#include <time.h>
+# if defined(CLOCK_THREAD_CPUTIME_ID) && defined(CLOCK_TAI)
+struct gcry_timedwait
+{
+  struct timespec ts;
+};
+
+typedef struct gcry_timedwait *gcry_timedwait_t;
+
+gcry_err_code_t
+_gcry_timedwait_new (gcry_timedwait_t *r_tw, unsigned int flags)
+{
+  gcry_err_code_t err;
+  gcry_timedwait_t tw;
+
+  *r_tw = NULL;
+
+  /* Possibly, it would be good to be able to select the wall clock.
+   * For now, it's CPU time by the thread.  */
+  if (flags != 0)
+    return GPG_ERR_INV_ARG;
+
+  tw = xtrymalloc (sizeof (gcry_timedwait_t));
+  if (!tw)
+    return gpg_err_code_from_syserror ();
+
+  if (clock_gettime (CLOCK_THREAD_CPUTIME_ID, &tw->ts) < 0)
+    {
+      err = gpg_err_code_from_syserror ();
+      xfree (tw);
+      return err;
+    }
+
+  *r_tw = tw;
+  return 0;
+}
+
+gcry_err_code_t
+_gcry_timedwait_release (gcry_timedwait_t tw, struct timespec ts_r)
+{
+  gcry_err_code_t err;
+  struct timespec ts;
+  u32 negative;
+
+  if (clock_gettime (CLOCK_THREAD_CPUTIME_ID, &ts) < 0)
+    {
+      err = gpg_err_code_from_syserror ();
+      xfree (tw);
+      return err;
+    }
+
+  ts.tv_sec -= tw->ts.tv_sec;
+  ts.tv_nsec -= tw->ts.tv_nsec;
+  negative = ((u32)ts.tv_nsec) >> 31;
+  ts.tv_sec -= negative;
+  ts.tv_nsec += (1000000000 * negative);
+
+  xfree (tw);
+
+  ts_r.tv_sec -= ts.tv_sec;
+  ts_r.tv_nsec -= ts.tv_nsec;
+  negative = ((u32)ts_r.tv_nsec) >> 31;
+  ts_r.tv_sec -= negative;
+  ts_r.tv_nsec += (1000000000 * negative);
+
+  if (ts_r.tv_sec < 0)
+    return GPG_ERR_TIME_CONFLICT;
+
+  if (clock_nanosleep (CLOCK_TAI, 0, &ts_r, &ts_r))
+    return gpg_err_code_from_syserror ();
+
+  return 0;
+}
+# endif
+#endif
Apr 12 2024, 5:07 AM · libgcrypt
gniibe triaged T7085: libgcrypt: New functions to support waiting time as Wishlist priority.
Apr 12 2024, 5:04 AM · libgcrypt

Mar 11 2024

gniibe claimed T7035: libgcrypt: New function gcry_md_hash_buffers_ext (for extendable-output function).
Mar 11 2024, 3:28 AM · libgcrypt, Feature Request, Bug Report
gniibe created T7035: libgcrypt: New function gcry_md_hash_buffers_ext (for extendable-output function).
Mar 11 2024, 3:28 AM · libgcrypt, Feature Request, Bug Report

Mar 4 2024

thesamesam added a comment to T7022: libgcrypt-1.10.3 regression on hppa.

Thank you!

Mar 4 2024, 3:46 AM · libgcrypt, Gentoo, hppa, Bug Report
gniibe added a comment to T7022: libgcrypt-1.10.3 regression on hppa.

Applied to both (master and 1.10 branch).

Mar 4 2024, 1:11 AM · libgcrypt, Gentoo, hppa, Bug Report

Mar 1 2024

jukivili added a comment to T7022: libgcrypt-1.10.3 regression on hppa.

Looks good to me. __CLOBBER_CC is needed as PA-RISC has carry/borrow bits in status register for add/sub instructions.

Mar 1 2024, 8:02 PM · libgcrypt, Gentoo, hppa, Bug Report
gniibe changed the status of T7022: libgcrypt-1.10.3 regression on hppa from Open to Testing.

Since I don't like to introduce hppa specific workaround in a way like pragma (and I have no time to fix compiler itself), I tried to improve the ec-nist.c for hppa so that register pressure can be lower.
Here is my solution.

Mar 1 2024, 2:34 AM · libgcrypt, Gentoo, hppa, Bug Report

Feb 29 2024

gniibe added a comment to T7022: libgcrypt-1.10.3 regression on hppa.

Alternatively (more narrow workaround), when I add a line:

#pragma GCC optimize("O1")

before the function _gcry_mpi_ec_nist256_mod in mpi/ec-nist.c, it works for me on panama.debian.net (Debian porterbox for hppa).

Feb 29 2024, 5:27 AM · libgcrypt, Gentoo, hppa, Bug Report

Feb 28 2024

jukivili added a comment to T7022: libgcrypt-1.10.3 regression on hppa.

No, hardware barrier is not needed here. Compiler barrier is used here to prevent optimization removing mask generation and usage in following constant-time code.

Feb 28 2024, 9:34 PM · libgcrypt, Gentoo, hppa, Bug Report
matoro added a comment to T7022: libgcrypt-1.10.3 regression on hppa.

Clarification from Dave:

Feb 28 2024, 7:32 PM · libgcrypt, Gentoo, hppa, Bug Report
matoro added a comment to T7022: libgcrypt-1.10.3 regression on hppa.

Thanks, I can confirm that this patch fixes the issue. I'll let Sam decide if this is how we want to handle it downstream or wait for confirmation from gcc.

Feb 28 2024, 4:37 PM · libgcrypt, Gentoo, hppa, Bug Report
gniibe added a project to T7022: libgcrypt-1.10.3 regression on hppa: libgcrypt.
Feb 28 2024, 2:57 AM · libgcrypt, Gentoo, hppa, Bug Report

Feb 22 2024

werner added a comment to T6755: libgcrypt: KEM API.

A way to generated keys in the usual s-expression way has been added. This allows us to get the keygrip for the key.

Feb 22 2024, 4:33 PM · PQC, libgcrypt

Feb 21 2024

werner added a comment to T6637: PQC for Libgcrypt.

FWIW, I posted some ideas at https://lists.gnupg.org/pipermail/librepgp-discuss/2024/000043.html . For official use in Germany we will very likely also add Brainpool curves as a replacement for the IETF curves.

Feb 21 2024, 2:52 PM · PQC, libgcrypt

Feb 15 2024

werner added a comment to T6755: libgcrypt: KEM API.

Although, we don't use our usual s-expressions we need to add a way to derive a keygrip from Kyber et al and also to wrap the key into an s-expression to that it can be stored by gpg-agent in its usual files. An exported new API to get the keygrip of a KEM key would be good to avoid encapsulation but for other purposes an encapsulation is still required.

Feb 15 2024, 6:00 PM · PQC, libgcrypt

Feb 9 2024

gniibe changed the status of T6976: RSA PKCS#1v1.5 signatures with SHA3 use invalid encoding from Open to Testing.

Applied the change. I write the ChangeLog entry by commit message.

Feb 9 2024, 8:32 AM · FIPS, libgcrypt, Bug Report

Feb 7 2024

werner triaged T6976: RSA PKCS#1v1.5 signatures with SHA3 use invalid encoding as Normal priority.
Feb 7 2024, 9:20 AM · FIPS, libgcrypt, Bug Report
werner added projects to T6976: RSA PKCS#1v1.5 signatures with SHA3 use invalid encoding: libgcrypt, FIPS.
Feb 7 2024, 9:17 AM · FIPS, libgcrypt, Bug Report

Jan 30 2024

gniibe changed the status of T6858: libgcrypt fails to be cross-compiled. from Open to Testing.

Fixed in master.

Jan 30 2024, 5:25 AM · libgcrypt
gniibe claimed T6858: libgcrypt fails to be cross-compiled..

Thanks for your report. It seems the linker for Android is more strict.

Jan 30 2024, 5:24 AM · libgcrypt

Jan 29 2024

gniibe changed the status of T6964: don't use deprecated grep aliases from Open to Testing.

Fixed in rC128121e74b66: build: Use @FGREP@ by configure for libgcrypt-config..

Jan 29 2024, 2:54 AM · libgcrypt
gniibe claimed T6964: don't use deprecated grep aliases.

Thank you. I recently fixed for use of egrep rC656ca459e3d8: m4: Update acinclude.m4 to use $GREP., but overlooked this one.

Jan 29 2024, 2:20 AM · libgcrypt

Jan 27 2024

dirkmueller added a project to T6964: don't use deprecated grep aliases: libgcrypt.
Jan 27 2024, 12:52 PM · libgcrypt

Jan 17 2024

werner added a comment to T6637: PQC for Libgcrypt.

Regading Kyber in GnuPG, there are a couple of open questions. For example whether the implicit lengths used for the key parameters match well with the overall protocol structure. Thus, as soon as we have finished the Libgcrypt part we will address this and implement it in some way. Before we do this we have to do a couple of changes to GnuPG required for FIPS compliance.

Jan 17 2024, 4:17 PM · PQC, libgcrypt
fse added a comment to T6637: PQC for Libgcrypt.

I just saw that Niibe is already working on the integration of the ML-KEM code into the master branch of libgcrypt. Apparently, this is an entirely new code base. Currently we are working on the integration of our ML-KEM implementation in libgcrypt into GnuPG. But based on what I see now it seems that apparently another approach is planned and already underway for libgcrypt and probably later also for GnuPG. It would be helpful if you could give us a pointer what your exact plans are, this makes it easier for us to direct our efforts in the optimal way.

Jan 17 2024, 2:24 PM · PQC, libgcrypt

Dec 21 2023

jukivili added a comment to T6892: libgcrypt-1.10.3 build failure on x86 with -Og.

Fix for i386 assembly pushed to master and 1.10 branch.

Dec 21 2023, 8:18 PM · libgcrypt, Bug Report

Dec 19 2023

jukivili added a comment to T6892: libgcrypt-1.10.3 build failure on x86 with -Og.

It looks that this is a bit more problematic case than I thought. Now building i386 with "-O2 -fsanitize=undefined" flags fails. I need to think little bit more how to handle this.

Dec 19 2023, 7:00 AM · libgcrypt, Bug Report
gniibe changed the status of T6892: libgcrypt-1.10.3 build failure on x86 with -Og from Open to Testing.
Dec 19 2023, 12:44 AM · libgcrypt, Bug Report

Dec 18 2023

werner triaged T6892: libgcrypt-1.10.3 build failure on x86 with -Og as Normal priority.
Dec 18 2023, 11:42 AM · libgcrypt, Bug Report
gniibe added a comment to T6892: libgcrypt-1.10.3 build failure on x86 with -Og.

@jukivili Thanks a lot. Please push the change to 1.10 branch and master.

Dec 18 2023, 7:51 AM · libgcrypt, Bug Report

Dec 16 2023

jukivili added a project to T6892: libgcrypt-1.10.3 build failure on x86 with -Og: libgcrypt.
Dec 16 2023, 6:57 PM · libgcrypt, Bug Report

Dec 13 2023

ametzler1 added a comment to T6863: [patch] libgcrypt copyright header cleanup.

Sorry for the fallout and thank you for taking care of it.

Dec 13 2023, 6:25 PM · patch, libgcrypt, Bug Report

Dec 12 2023

gniibe added a comment to T6863: [patch] libgcrypt copyright header cleanup.

Ah... it fails by make check because it does change the text in tests/basic.c which requires update of hash value.
I'm going to take care of this regressions.

Dec 12 2023, 7:42 AM · patch, libgcrypt, Bug Report
gniibe changed the status of T6863: [patch] libgcrypt copyright header cleanup from Open to Testing.

Thank you. All applied and pushed to master.

Dec 12 2023, 6:38 AM · patch, libgcrypt, Bug Report

Dec 4 2023

werner triaged T6858: libgcrypt fails to be cross-compiled. as Normal priority.

You may better ask on gcrypt-devel at gnupg.org for help.

Dec 4 2023, 4:57 PM · libgcrypt

Dec 1 2023

ametzler1 created T6863: [patch] libgcrypt copyright header cleanup.
Dec 1 2023, 6:21 PM · patch, libgcrypt, Bug Report