Page MenuHome GnuPG
Feed Advanced Search

Oct 26 2018

werner added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

The next step is to release libgcrypt 1.8.4 :-)

Oct 26 2018, 1:51 PM · libgcrypt, gnupg
werner added a comment to T3223: gcry_mpi_ec_mul with Montgomery curves produces segfault.

Actually we plan to provide a more convenient way to perform the DH operation. See for example P7 for the non-elegant way which is required today.

Oct 26 2018, 1:30 PM · libgcrypt, Bug Report
werner closed T3491: FIPS-enabled libgcrypt traps gnome-keyring daemon in an infinite loop as Resolved.

Fixed in master and 1.8 by detecting a fork and re-opening the devices

Oct 26 2018, 1:26 PM · libgcrypt
werner closed T3904: Clarify suggestion for diskperf as Wontfix.
Oct 26 2018, 12:45 PM · Windows, libgcrypt
werner added a subtask for T4217: {libksba,libgcrypt,ntbtls,libassuan,npth}.m4, {libksba,libgcrypt,ntbtls,libassuan}-config script and gpg-error-config: T3982: libgcrypt.m4 is not multilib friendly.
Oct 26 2018, 12:44 PM · npth, libassuan, ntbtls, libgcrypt, libksba
werner added a parent task for T3982: libgcrypt.m4 is not multilib friendly: T4217: {libksba,libgcrypt,ntbtls,libassuan,npth}.m4, {libksba,libgcrypt,ntbtls,libassuan}-config script and gpg-error-config.
Oct 26 2018, 12:44 PM · libgcrypt, Bug Report

Oct 25 2018

gniibe added a comment to T4217: {libksba,libgcrypt,ntbtls,libassuan,npth}.m4, {libksba,libgcrypt,ntbtls,libassuan}-config script and gpg-error-config.

A bit tricky, but this would be good to use gpgrt-config by gpg-error.m4.
I say "tricky", because its name is gpg-error.m4 but it configure GPGRT_CONFIG to access to GPG_ERROR_CONFIG.

Oct 25 2018, 8:33 AM · npth, libassuan, ntbtls, libgcrypt, libksba
gniibe added a comment to T4217: {libksba,libgcrypt,ntbtls,libassuan,npth}.m4, {libksba,libgcrypt,ntbtls,libassuan}-config script and gpg-error-config.

It might be good idea to provide libgcrypt.pc in libgcrypt 1.8.x for forward compatibility with libgpg-error 1.33.

Oct 25 2018, 3:49 AM · npth, libassuan, ntbtls, libgcrypt, libksba
gniibe added a comment to T4217: {libksba,libgcrypt,ntbtls,libassuan,npth}.m4, {libksba,libgcrypt,ntbtls,libassuan}-config script and gpg-error-config.

Well, I changed my mind. Use of new gpgrt-config requires software update to introduce gpgrt.m4 and update of configure.ac to switch gpgrt from gpg-error, in standard way.
That's too much this time. It's good to defer this change.

Oct 25 2018, 3:06 AM · npth, libassuan, ntbtls, libgcrypt, libksba
gniibe added a comment to T4217: {libksba,libgcrypt,ntbtls,libassuan,npth}.m4, {libksba,libgcrypt,ntbtls,libassuan}-config script and gpg-error-config.

OK, I'll change to use gpgrt-config, along with requiring newer version of libgpg-error.

Oct 25 2018, 1:14 AM · npth, libassuan, ntbtls, libgcrypt, libksba

Oct 24 2018

werner closed T4208: Copy & paste error in libgcrypt ecc-curves.c as Resolved.

Fixed in 1.8

Oct 24 2018, 12:34 PM · Bug Report, libgcrypt
werner closed T4212: Uninitialized use of l1 variable in _gcry_sexp_vextract_param as Resolved.

Fixed in 1.8

Oct 24 2018, 12:33 PM · Bug Report, libgcrypt
werner closed T4102: libgcrypt: yat2m does not respect SOURCE_DATE_EPOCH, patch included as Resolved.

yat2m updated. Thanks.

Oct 24 2018, 12:32 PM · gpgrt, libgcrypt, Bug Report
werner closed T4210: Potential memory leak in ecc_encrypt_raw as Resolved.
Oct 24 2018, 11:56 AM · libgcrypt
werner closed T4211: Potential memory leak in _gcry_secmem_malloc_internal as Resolved.

Thanks.

Oct 24 2018, 11:55 AM · libgcrypt
werner added a comment to T4210: Potential memory leak in ecc_encrypt_raw.

Thanks again.

Oct 24 2018, 11:51 AM · libgcrypt
werner closed T4209: Potential memory leak in _gcry_ecc_eddsa_verify as Resolved.

Thanks. Not a real world problem now but needs to be fixed.

Oct 24 2018, 10:03 AM · libgcrypt
werner added a comment to T4217: {libksba,libgcrypt,ntbtls,libassuan,npth}.m4, {libksba,libgcrypt,ntbtls,libassuan}-config script and gpg-error-config.

May I suggest to use a (new) gpgrt-config instead of the current name libgpg-error-config. The long term plan is to change the name of the library.

Oct 24 2018, 9:06 AM · npth, libassuan, ntbtls, libgcrypt, libksba
gniibe updated the task description for T4217: {libksba,libgcrypt,ntbtls,libassuan,npth}.m4, {libksba,libgcrypt,ntbtls,libassuan}-config script and gpg-error-config.
Oct 24 2018, 2:37 AM · npth, libassuan, ntbtls, libgcrypt, libksba
gniibe updated the task description for T4217: {libksba,libgcrypt,ntbtls,libassuan,npth}.m4, {libksba,libgcrypt,ntbtls,libassuan}-config script and gpg-error-config.
Oct 24 2018, 2:33 AM · npth, libassuan, ntbtls, libgcrypt, libksba
gniibe added a comment to T4217: {libksba,libgcrypt,ntbtls,libassuan,npth}.m4, {libksba,libgcrypt,ntbtls,libassuan}-config script and gpg-error-config.

This is the dependency graph:

Oct 24 2018, 2:32 AM · npth, libassuan, ntbtls, libgcrypt, libksba
gniibe created T4217: {libksba,libgcrypt,ntbtls,libassuan,npth}.m4, {libksba,libgcrypt,ntbtls,libassuan}-config script and gpg-error-config.
Oct 24 2018, 2:15 AM · npth, libassuan, ntbtls, libgcrypt, libksba

Oct 23 2018

werner triaged T4208: Copy & paste error in libgcrypt ecc-curves.c as High priority.

Thanks. Fixed in master. Needs backport.

Oct 23 2018, 10:59 PM · Bug Report, libgcrypt
werner triaged T4212: Uninitialized use of l1 variable in _gcry_sexp_vextract_param as High priority.

Thanks. Fixed in master.

Oct 23 2018, 10:53 PM · Bug Report, libgcrypt
t8m created T4212: Uninitialized use of l1 variable in _gcry_sexp_vextract_param in the S1 Public space.
Oct 23 2018, 3:20 PM · Bug Report, libgcrypt
t8m created T4211: Potential memory leak in _gcry_secmem_malloc_internal in the S1 Public space.
Oct 23 2018, 3:13 PM · libgcrypt
t8m added a project to T4210: Potential memory leak in ecc_encrypt_raw: libgcrypt.
Oct 23 2018, 3:11 PM · libgcrypt
t8m added a project to T4209: Potential memory leak in _gcry_ecc_eddsa_verify: libgcrypt.
Oct 23 2018, 2:27 PM · libgcrypt
t8m created T4208: Copy & paste error in libgcrypt ecc-curves.c in the S1 Public space.
Oct 23 2018, 1:52 PM · Bug Report, libgcrypt

Oct 16 2018

gniibe changed the status of T3283: Set 'mym4_revision' to 0 if not a git repo from Open to Testing.

Done for libgcrypt, finally.

Oct 16 2018, 7:49 AM · libgcrypt, Bug Report
gniibe removed a project from T3283: Set 'mym4_revision' to 0 if not a git repo: ntbtls.

ntbtls adopts the way from the beginning.

Oct 16 2018, 7:24 AM · libgcrypt, Bug Report
gniibe changed External Link from https://lists.gnupg.org/pipermail/gcrypt-devel/2017-July/004215.html to https://lists.gnupg.org/pipermail/gcrypt-devel/2017-January/004080.html on T3283: Set 'mym4_revision' to 0 if not a git repo.
Oct 16 2018, 7:19 AM · libgcrypt, Bug Report

Oct 11 2018

gniibe triaged T4068: libgcrypt 1.8.3 make check errors as Normal priority.
Oct 11 2018, 2:51 AM · Documentation, libgcrypt
gniibe added a comment to T4068: libgcrypt 1.8.3 make check errors.

Please check your ld.so (dynamic linker) setting (/etc/ld.so.conf and/or LD_LIBRARY_PATH).

Oct 11 2018, 2:07 AM · Documentation, libgcrypt

Oct 10 2018

gniibe removed a project from T3283: Set 'mym4_revision' to 0 if not a git repo: gpgme.

Done for gpgme.

Oct 10 2018, 6:49 AM · libgcrypt, Bug Report

Oct 9 2018

dkg added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

What are the next steps here? i confess i'm a little tired of doing regular checkins on this issue, and i'm sure other people are tired of me nagging. What can we do to move this along?

Oct 9 2018, 6:39 PM · libgcrypt, gnupg

Sep 12 2018

gniibe added a comment to T3189: secmem routines should be in libgpg-error as gpgrt_*.

secmem routines are installed into gniibe/secmem branch.
Please note that it's only secmem routines, not malloc_secure.

Sep 12 2018, 5:45 AM · gpgrt, libgcrypt

Sep 11 2018

gniibe closed T3877: not all malloc performed in libgcrypt covered by gcry_set_allocation_handler as Resolved.
Sep 11 2018, 1:34 PM · libgcrypt, Bug Report

Sep 8 2018

werner claimed T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

Thanks for your comments, Stephan.

Sep 8 2018, 11:13 AM · libgcrypt, gnupg

Sep 7 2018

dkg added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

@aheinecke -- @smueller_chronox.de (author of the comment above) is Stephan Müller from atsec. Glad to see he seems ok with the proposal :)

Sep 7 2018, 9:49 PM · libgcrypt, gnupg
smueller_chronox.de added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

Apologies for not having read all comments in this long thread. I was asked to comment on the patch, so here is my comment:

Sep 7 2018, 5:41 PM · libgcrypt, gnupg

Sep 6 2018

gniibe claimed T3189: secmem routines should be in libgpg-error as gpgrt_*.

I created gniibe/secmem branch for this.
https://dev.gnupg.org/source/libgpg-error/history/gniibe%252Fsecmem/

Sep 6 2018, 3:20 AM · gpgrt, libgcrypt

Sep 5 2018

dkg added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

well, i tried to push, anyway, but it looks like playfair is rejecting my pushes:

Sep 5 2018, 4:54 PM · libgcrypt, gnupg
dkg added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

@werner -- yes, i am asking for a change that is specific to the way that gcrypt interacts with the Linux kernel. The minor patch i've proposed only affects a codeblock within #if defined(__linux__), so i don't believe it would have an effect on other Unices. I hope that people working with other kernels will propose any necessary fixes for them.

Sep 5 2018, 4:46 PM · libgcrypt, gnupg

Aug 24 2018

werner added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

@kallisti5: For you server you can add only_urandom to random.conf when changing to a multiuser runlevel and remove it early at startup and termination.

Aug 24 2018, 5:46 PM · libgcrypt, gnupg
werner added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

/dev/random, RDRAND, etc involves a lot of political arguments and thus it is not easy to decide what to do. What you are calling for is a linux kernel specific code path (note that rndlinux is used by most Unices) and won't be helpful for other OSes. I am of course willing to do add specific for for a few widespread OSes (and in any case for Debian). It is a major change and thus does not belong into 1.8 - I am fine with master which Debian might want to backport.

Aug 24 2018, 5:40 PM · libgcrypt, gnupg

Aug 23 2018

aheinecke added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

Well, Werner is just back so he can say more.
An excellent reviewer was Stephan Müller from atsec. He is also involved a bit afaik in the kernel random development.

Aug 23 2018, 8:38 PM · libgcrypt, gnupg
dkg added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

@aheinecke thanks for the followup!

Aug 23 2018, 5:59 PM · libgcrypt, gnupg

Aug 21 2018

werner triaged T4102: libgcrypt: yat2m does not respect SOURCE_DATE_EPOCH, patch included as Normal priority.

We are moving to use the yat2m from gpgrt (libgpg-error); thus the additional tag.

Aug 21 2018, 5:23 PM · gpgrt, libgcrypt, Bug Report

Aug 15 2018

hoebjo created T4102: libgcrypt: yat2m does not respect SOURCE_DATE_EPOCH, patch included.
Aug 15 2018, 11:15 PM · gpgrt, libgcrypt, Bug Report

Aug 6 2018

aheinecke added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

I think that the ultimate decision here lies with Werner. Additional review.
I think the biggest obstacle is that we don't want to change the random gathering code if it can be avoided and that the random code has been thoroughly reviewed / tested and is currently considered secure.

Aug 6 2018, 10:02 AM · libgcrypt, gnupg

Aug 2 2018

dkg added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

This bug report has been around for several months now. it has a simple patch, a clear explanation, a report of running code, and examples of problems it solves.

Aug 2 2018, 7:34 PM · libgcrypt, gnupg

Jul 26 2018

droidmonkey added a comment to T4084: Transition Windows RNG to use BCryptGenRandom .

Good to know, no problem, just wanted to document it just in case they do remove the API entirely in the future.

Jul 26 2018, 5:26 AM · libgcrypt, Feature Request

Jul 23 2018

werner triaged T4084: Transition Windows RNG to use BCryptGenRandom as Wishlist priority.

CryptGenRandom is only used as an additional source of entropy and doesn't count towards our entropy estimation. Thus whether it is used of not does not make any difference. Our main entropy source is meanwhile the jitter based RNG. Thus your request will receive a low priority.

Jul 23 2018, 2:30 PM · libgcrypt, Feature Request

Jul 22 2018

dkg added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

I've now run the proposed patch on a GNU/Linux system where the kernel's RNG is initialized but /proc/sys/kernel/random/entropy_avail shows numbers below 100, and i can confirm that 3072-bit RSA key generation takes roughly 0.8 seconds: 20 sequential default --quick-keygen operations (each creating two secret keys) took ~32s.

Jul 22 2018, 7:54 AM · libgcrypt, gnupg
dkg added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

Here is another example of users doing sketchy things to try to "fix" this process:

Jul 22 2018, 5:28 AM · libgcrypt, gnupg
dkg added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

Here is an example of the kinds of UI/UX mystery that users face while this decision is unresolved:

Jul 22 2018, 5:22 AM · libgcrypt, gnupg

Jul 21 2018

droidmonkey created T4084: Transition Windows RNG to use BCryptGenRandom .
Jul 21 2018, 12:36 AM · libgcrypt, Feature Request

Jul 17 2018

gniibe updated the task description for T3982: libgcrypt.m4 is not multilib friendly.
Jul 17 2018, 9:56 AM · libgcrypt, Bug Report

Jul 16 2018

werner closed T4027: npth 1.6, a subtask of T3283: Set 'mym4_revision' to 0 if not a git repo, as Resolved.
Jul 16 2018, 9:49 AM · libgcrypt, Bug Report

Jul 12 2018

gniibe removed a project from T3283: Set 'mym4_revision' to 0 if not a git repo: npth.

Done for npth.

Jul 12 2018, 12:20 AM · libgcrypt, Bug Report

Jul 10 2018

werner added a project to T4068: libgcrypt 1.8.3 make check errors: libgcrypt.
Jul 10 2018, 6:45 PM · Documentation, libgcrypt

Jul 9 2018

gniibe closed T3915: Allow building with Clang on MIPS64 as Resolved.
Jul 9 2018, 9:22 AM · libgcrypt, Bug Report

Jul 2 2018

kallisti5 added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

User input, anything to solve the lack of entropy on servers would be *great*. We have a bunch of buildbot workers we would *love* to have sign their artifacts... however we end up (unsuccessfully) doing stupid things like this to try and drive up entropy as a non-root user:

Jul 2 2018, 8:46 PM · libgcrypt, gnupg
anarcat added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

Looking at the table in random(7) it seems clear to me that what we want to just invoke getrandom() with no arguments. This blocks until the kernel's PRNG has been adequately seeded, but once seeded it doesn't block, while still pulling from an unbreakably-strong PRNG. this is the best-of-both-worlds situation that we want.

Changing the GnuPG long-term (and short-term) key generation techniques to use this approach might require coordination with gcrypt. gcrypt's gcry_random_level currently has GCRY_WEAK_RANDOM and GCRY_STRONG_RANDOM and GCRY_VERY_STRONG_RANDOM, which doesn't represent the nuance described above.

One approach might be to just have gcrypt on Linux treat all values of gcry_random_level the same, and use getrandom() for all of them.

Jul 2 2018, 5:24 PM · libgcrypt, gnupg
dkg added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

ping again…

Jul 2 2018, 4:47 PM · libgcrypt, gnupg

Jun 20 2018

gniibe added a subtask for T3283: Set 'mym4_revision' to 0 if not a git repo: T4027: npth 1.6.
Jun 20 2018, 10:06 AM · libgcrypt, Bug Report

Jun 19 2018

dkg added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

could i get feedback on this ticket? a simple, clean patch is available, and i don't understand what is blocking it.

Jun 19 2018, 4:32 PM · libgcrypt, gnupg

Jun 14 2018

olf added a comment to T4016: Libgcrypt release 1.8.3.

Thanks.
So what I remembered was 1 year and 1 month off the real EOL date.

Jun 14 2018, 1:21 AM · Release Info, CVE, libgcrypt

Jun 13 2018

werner closed T4011: CVE-2018-0495 as Resolved.
Jun 13 2018, 6:33 PM · CVE, libgcrypt
werner added a comment to T4011: CVE-2018-0495.

Here is our announcement: https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000426.html

Jun 13 2018, 6:32 PM · CVE, libgcrypt
werner added a comment to T4011: CVE-2018-0495.

https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/

Jun 13 2018, 5:40 PM · CVE, libgcrypt
gniibe added a comment to T4011: CVE-2018-0495.

Informed Debian security team about our change of libgcrypt.

Jun 13 2018, 1:02 PM · CVE, libgcrypt
werner changed the visibility for T4011: CVE-2018-0495.
Jun 13 2018, 12:40 PM · CVE, libgcrypt
werner added a comment to T4011: CVE-2018-0495.

A new installer for GnuPG with Libgcrypt 1.8.3 is now available.

Jun 13 2018, 12:38 PM · CVE, libgcrypt
werner added a comment to T4011: CVE-2018-0495.

Releases are now available. Next task is to build a new GnuPG Windows installer.

Jun 13 2018, 10:40 AM · CVE, libgcrypt
werner closed T4016: Libgcrypt release 1.8.3 as Resolved.

1.8.3 and 1.7.10 are now released. Announcement will follow later the day.

Jun 13 2018, 10:39 AM · Release Info, CVE, libgcrypt
werner closed T4016: Libgcrypt release 1.8.3, a subtask of T4011: CVE-2018-0495, as Resolved.
Jun 13 2018, 10:39 AM · CVE, libgcrypt
gniibe added a comment to T4011: CVE-2018-0495.

Pushed fixes to the repository at 16:00+0900 (09:00+0200). It's 0700Z.

Jun 13 2018, 9:05 AM · CVE, libgcrypt
gniibe added a comment to T4011: CVE-2018-0495.

In master, it's

commit 9010d1576e278a4274ad3f4aa15776c28f6ba965
Author: NIIBE Yutaka <gniibe@fsij.org>
Date:   Wed Jun 13 15:28:58 2018 +0900
Jun 13 2018, 8:59 AM · CVE, libgcrypt
werner updated the task description for T4016: Libgcrypt release 1.8.3.
Jun 13 2018, 8:07 AM · Release Info, CVE, libgcrypt
werner added a comment to T4016: Libgcrypt release 1.8.3.

1.8.3 has not yet been released and thus there is no NEWS entries and there can't be a 1.8.3 tag. You are right that the README still says 1.7. I'll fix that for 1.8.3. Why do you think maintenance of 1.7 stopped; the AUTHORS file and the new EOL statements on the download page say that we are going to maintain it until 2019-06-30.

Jun 13 2018, 8:06 AM · Release Info, CVE, libgcrypt

Jun 12 2018

werner updated subscribers of T4011: CVE-2018-0495.

Publication is planned for the 13th, 1500Z

Jun 12 2018, 1:12 PM · CVE, libgcrypt

Jun 11 2018

olf added a comment to T4016: Libgcrypt release 1.8.3.

I just noticed, that a tag for Libgcrypt 1.8.3 seems to be missing: https://dev.gnupg.org/source/libgcrypt/tags/LIBGCRYPT-1.8-BRANCH/

Jun 11 2018, 11:36 PM · Release Info, CVE, libgcrypt
werner added a project to T4016: Libgcrypt release 1.8.3: Release Info.
Jun 11 2018, 9:58 AM · Release Info, CVE, libgcrypt
werner changed the edit policy for T4016: Libgcrypt release 1.8.3.
Jun 11 2018, 9:55 AM · Release Info, CVE, libgcrypt

Jun 9 2018

dkg added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

I've heard no critique of the logic above. could we get this fix landed? it is concretely useful for doing key generation on modern GNU/Linux systems.

Jun 9 2018, 12:03 AM · libgcrypt, gnupg

Jun 8 2018

werner added a project to T4011: CVE-2018-0495: CVE.
Jun 8 2018, 10:15 AM · CVE, libgcrypt
werner updated the task description for T4011: CVE-2018-0495.
Jun 8 2018, 10:12 AM · CVE, libgcrypt
werner changed the edit policy for T4011: CVE-2018-0495.
Jun 8 2018, 9:50 AM · CVE, libgcrypt

May 15 2018

werner triaged T3982: libgcrypt.m4 is not multilib friendly as Normal priority.
May 15 2018, 1:18 PM · libgcrypt, Bug Report

May 8 2018

gniibe lowered the priority of T3731: gcry_pk_genkey() segfaults for ecdsa 384 from High to Normal.

I changed the priority to 'Normal'. The problem now is not the libssh usage, but how we can assume use of secure memory by random generator(s).

May 8 2018, 2:07 AM · libgcrypt, Bug Report
gniibe added a comment to T3731: gcry_pk_genkey() segfaults for ecdsa 384.

By libssh upstream, the problem has been fixed: commit-72f6b34

May 8 2018, 2:01 AM · libgcrypt, Bug Report

May 7 2018

gniibe added a comment to T3731: gcry_pk_genkey() segfaults for ecdsa 384.

Here is the function:
https://git.libssh.org/projects/libssh.git/tree/src/dh.c#n227

May 7 2018, 9:18 AM · libgcrypt, Bug Report
werner added a comment to T3731: gcry_pk_genkey() segfaults for ecdsa 384.

Am I right to assume that the test suite is terminating and restarting libgcrypt? Although we have features for this, I am still not convinced that this is a proper use of libgcrypt. There are just too many cases how this can fail. Unix is not designed to use shared libraries in so-called "plugins". I need to look closer at the libssh code.

May 7 2018, 8:27 AM · libgcrypt, Bug Report
gniibe added a comment to T3731: gcry_pk_genkey() segfaults for ecdsa 384.

It would be better not to require gcry_control(GCRYCTL_CLOSE_RANDOM_DEVICE). Automatic handling through gcry_control(GCRYCTL_TERM_SECMEM) would be better.

May 7 2018, 2:32 AM · libgcrypt, Bug Report
gniibe added a comment to T3731: gcry_pk_genkey() segfaults for ecdsa 384.

The patch D461 makes gcry_control(GCRYCTL_CLOSE_RANDOM_DEVICE) free the allocated secure memory.

May 7 2018, 1:53 AM · libgcrypt, Bug Report
gniibe added a comment to T3731: gcry_pk_genkey() segfaults for ecdsa 384.

It assumes a change of libssh like:

May 7 2018, 1:52 AM · libgcrypt, Bug Report
gniibe added a comment to T3731: gcry_pk_genkey() segfaults for ecdsa 384.

Here is my patch: D461: jent random requires finalizer to deallocate secure memory

May 7 2018, 1:51 AM · libgcrypt, Bug Report

Apr 17 2018

werner triaged T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms as Normal priority.
Apr 17 2018, 8:34 PM · libgcrypt, gnupg