Page MenuHome GnuPG

Release Libgcrypt 1.10.2
Closed, ResolvedPublic

Description

Noteworthy changes in version 1.10.2 (2023-04-06)

  • Bug fixes:
    • Fix Argon2 for the case output > 64. [rC13b5454d26]
    • Fix missing HWF_PPC_ARCH_3_10 in HW feature. [rCe073f0ed44]
    • Fix RSA key generation failure in forced FIPS mode. [T5919]
    • Fix gcry_pk_hash_verify for explicit hash. [T6066]
    • Fix a wrong result of gcry_mpi_invm. [T5970]
    • Allow building with --disable-asm for HPPA. [T5976]
    • Fix Jitter RNG for building native on Windows. [T5891]
    • Allow building with -Oz. [T6432]
    • Enable the fast path to ChaCha20 only when supported. [T6384]
    • Use size_t to avoid counter overflow in Keccak when directly feeding more than 4GiB. [T6217]
  • Other:
    • Do not use secure memory for a DRBG instance. [T5933]
    • Do not allow PKCS#1.5 padding for encryption in FIPS mode. [T5918]
    • Fix the behaviour for child process re-seeding in the DRBG. [rC019a40c990]
    • Allow verification of small RSA signatures in FIPS mode. [T5975]
    • Allow the use of a shorter salt for KDFs in FIPS mode. [T6039]
    • Run digest+sign self tests for RSA and ECC in FIPS mode. [rC06c9350165]
    • Add function-name based FIPS indicator function. GCRYCTL_FIPS_SERVICE_INDICATOR_FUNCTION. This is not considered an ABI changes because the new FIPS features were not yet approved. [rC822ee57f07]
    • Improve PCT in FIPS mode. [rC285bf54b1a, rC4963c127ae, T6397]
    • Use getrandom (GRND_RANDOM) in FIPS mode. [rCcf10c74bd9]
    • Disable RSA-OAEP padding in FIPS mode. [rCe5bfda492a]
    • Check minimum allowed key size in PBKDF in FIPS mode. [T6039,T6219]
    • Get maximum 32B of entropy at once in FIPS mode. [rCce0df08bba]
    • Prefer gpgrt-config when available. [T5034]
    • Mark AESWRAP as approved FIPS algorithm. [T5512]
    • Prevent usage of long salt for PSS in FIPS mode. [rCfdd2a8b332]
    • Prevent usage of X9.31 keygen in FIPS mode. [rC392e0ccd25]
    • Remove GCM mode from the allowed FIPS indicators. [rC1540698389]
    • Add explicit FIPS indicators for hash and MAC algorithms. [T6376]

(prev: T5810 next: T6817)

Related Objects

Mentioned In
T6817: Release Libgcrypt 1.10.3
T5810: Release Libgcrypt 1.10.1
Mentioned Here
rC13b5454d2620: kdf:argon2: Fix for the case output > 64.
rCe073f0ed4466: hwf-ppc: fix missing HWF_PPC_ARCH_3_10 in HW feature
rC019a40c99011: random:drbg: Fix the behavior for child process.
rC06c9350165d7: fips: Run digest&sign self tests for RSA and ECC in FIPS mode.
rC822ee57f07ca: fips: Add function-name based FIPS indicator.
rC285bf54b1ac7: Simplify the PCT for RSA and ECDSA
rCcf10c74bd9d5: random: Use getrandom (GRND_RANDOM) in FIPS mode.
rCe5bfda492ab9: fips: Disable RSA-OAEP padding in FIPS mode.
rC4963c127ae69: fips: Skip PCT if RSA keygen test-parms specified
rCce0df08bbab7: random: Get maximum 32B of entropy at once in FIPS Mode
rCfdd2a8b3329e: rsa: Prevent usage of long salt in FIPS mode
rC392e0ccd25f3: fips,rsa: Prevent usage of X9.31 keygen in FIPS mode.
rC1540698389ba: fips: Remove GCM mode from the allowed FIPS indicators.
T5034: dev: Deprecate libassuan-config, libgcrypt-config, ksba-config, ntbtls-config, npth-config, and gpg-error-config
T5512: Implement service indicators
T5810: Release Libgcrypt 1.10.1
T5891: EOPNOTSUPP is not defined in mingw.org's MinGW, fails compilation of libgcrypt-1.10.0
T5918: Disable RSA PKCS #1.5 encryption in FIPS mode
T5919: libgcrypt tests/basic.c and tests/keygen.c occasionally fail with "error generating RSA key: Number is not prime"
T5933: libgcrypt: Simply use BSS (not secure heap) for DRBG instance
T5970: gcry_mpi_invm producing wrong result
T5975: Allow signature verification using specific RSA keys <2k in FIPS mode
T5976: libgcrypt build failure on HPPA 1.1 (./.libs/libgcrypt.so: undefined reference to `__udiv_qrnnd')
T6039: FIPS: Allow salt=NULL (or shorter salt) for HKDF
T6066: gcry_pk_hash_verify() does not work with explicitly specified hash algorithm
T6217: sha3: wrong results for large inputs
T6219: Ensure minimum key length for KDF in FIPS mode
T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt
T6384: libgcrypt link error if cipher chacha20 is not included
T6397: PCT failures inconsistency in regards to the FIPS error state
T6432: libgcrypt - flag munging does not account for -Oz
T6817: Release Libgcrypt 1.10.3