Page MenuHome GnuPG
Feed Advanced Search

Sep 21 2021

gniibe added a comment to T5610: macOS 11 or newer support: Update libtool.

Our libtool was 2.4.2 + Debian patches + our local changes.
Debian patches are:
https://salsa.debian.org/mckinstry/libtool/-/blob/debian/master/debian/patches/link_all_deplibs.patch
https://salsa.debian.org/mckinstry/libtool/-/blob/debian/master/debian/patches/netbsdelf.patch

Sep 21 2021, 6:57 AM · gpgme, MacOS, ntbtls, npth, libksba, libassuan, libgcrypt, gpgrt
gniibe created T5610: macOS 11 or newer support: Update libtool.
Sep 21 2021, 6:33 AM · gpgme, MacOS, ntbtls, npth, libksba, libassuan, libgcrypt, gpgrt

Sep 20 2021

werner changed the status of T5600: Provide module name/version API for FIPS 140-3 from Open to Testing.

Thanks. Applied with a minor change: The string is now in a new third field.

Sep 20 2021, 8:51 AM · libgcrypt, FIPS, Bug Report

Sep 19 2021

werner claimed T5600: Provide module name/version API for FIPS 140-3.
Sep 19 2021, 1:05 PM · libgcrypt, FIPS, Bug Report

Sep 17 2021

Jakuje added a comment to T5600: Provide module name/version API for FIPS 140-3.

I have a draft, which results in the following "API" of the name-version:

Sep 17 2021, 6:13 PM · libgcrypt, FIPS, Bug Report
Jakuje added a comment to T5244: libgcrypt: Restrict MD5 use.

I had in my mind something like this:

Sep 17 2021, 3:36 PM · Bug Report, FIPS, libgcrypt
gniibe added a comment to T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation.

While data template preparation for RSA-PSS is a bit tricky, it's simple with ECDSA.

Sep 17 2021, 10:43 AM · FIPS, libgcrypt, Feature Request
werner added a comment to T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation.

Having hash-algo in the s-exp is useful because a hash handle may carry several hashes. This is sometimes useful if you do not know the hash algorithm in advance and you need to make a guess (various PGP compatibility things in gpg). But of course we can simplify this and use the default algo from the hash handle if hash-algo is missing.

Sep 17 2021, 7:59 AM · FIPS, libgcrypt, Feature Request
gniibe added a comment to T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation.

Thanks for your comment.

Sep 17 2021, 7:26 AM · FIPS, libgcrypt, Feature Request

Sep 16 2021

Jakuje added a comment to T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation.

Thank you. On the first sight, it looks reasonable, but I would like to experiment with it a bit to see all use cases are covered.

Sep 16 2021, 11:52 AM · FIPS, libgcrypt, Feature Request
Jakuje added a comment to T5520: Fix tests in FIPS mode.

Thanks. I think we are good here. If we will decide to pursuate the brainpool switch, I will open a new issue.

Sep 16 2021, 11:07 AM · FIPS, libgcrypt, Bug Report
gniibe added a comment to T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation.

Pushed my initial implementation: rC117f5c3f8028: experiment-pk_hash_sign/verify: Implement pk_hash_sign/verify.

Sep 16 2021, 8:09 AM · FIPS, libgcrypt, Feature Request
gniibe added a comment to T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation.

I am doing an experiment to implement gcry_pk_hash_sign.

Sep 16 2021, 7:15 AM · FIPS, libgcrypt, Feature Request
gniibe added a comment to T5520: Fix tests in FIPS mode.

Two third patches are applied to master. (@werner those parts are typo fix and tests improvement, which we agreed to push.)

Sep 16 2021, 3:01 AM · FIPS, libgcrypt, Bug Report

Sep 15 2021

werner triaged T5600: Provide module name/version API for FIPS 140-3 as Normal priority.

We can easily extend the gcry_get_config API. You can give a key or have it to return all infos. For examle
"gpgconf --show-versions" prints this about libgcrypt:

Sep 15 2021, 5:24 PM · libgcrypt, FIPS, Bug Report
Jakuje created T5600: Provide module name/version API for FIPS 140-3.
Sep 15 2021, 4:34 PM · libgcrypt, FIPS, Bug Report
werner added a comment to T5520: Fix tests in FIPS mode.

If a configure switch to disable Brainpool curves will be added, we also need to add a switch to disable NIST curves.

Sep 15 2021, 11:05 AM · FIPS, libgcrypt, Bug Report
Jakuje added a comment to T5520: Fix tests in FIPS mode.

Oh, my bad. I probably used wrong git command. Uploaded now the patches themselves:

Sep 15 2021, 9:51 AM · FIPS, libgcrypt, Bug Report
gniibe added a comment to T5520: Fix tests in FIPS mode.

disable-brainpool.patch is a text of list of patches.
I think the first two could be applied.
@Jakuje Could you please upload them?

Sep 15 2021, 9:10 AM · FIPS, libgcrypt, Bug Report
gniibe moved T5520: Fix tests in FIPS mode from Ready for release to Next on the FIPS board.
Sep 15 2021, 8:36 AM · FIPS, libgcrypt, Bug Report

Sep 14 2021

mdeslaur added a comment to T5328: On the (in)security of Elgamal in OpenPGP.

Thanks for the clarification!

Sep 14 2021, 12:41 PM · side-channel, CVE, libgcrypt
gniibe added a comment to T5328: On the (in)security of Elgamal in OpenPGP.

The problem of (2), is local side-channel attacks to ElGamal encryption.
We evaluated the impact, mainly for the use case of GnuPG; ElGamal keys are not that popular any more. When such an attack is possible, easier attacks would be possible.

Sep 14 2021, 7:52 AM · side-channel, CVE, libgcrypt
gniibe added a comment to T5328: On the (in)security of Elgamal in OpenPGP.

The paper addresses two issues.
(1) https://ibm.github.io/system-security-research-updates/2021/07/20/insecurity-elgamal-pt1
(2) https://ibm.github.io/system-security-research-updates/2021/09/06/insecurity-elgamal-pt2

Sep 14 2021, 7:46 AM · side-channel, CVE, libgcrypt

Sep 13 2021

werner changed the status of T5597: First 8 bytes of cache item left in clear in memory after decryption. from Open to Testing.
Sep 13 2021, 4:51 PM · libgcrypt, symmetric, Bug Report
werner added a comment to T5597: First 8 bytes of cache item left in clear in memory after decryption..

And well, the context area of the handle is also wiped at gcry_cipher_close time. Thus any standard use of aeswrap (open,encrypt/decrypt,close) is not affected.

Sep 13 2021, 4:42 PM · libgcrypt, symmetric, Bug Report
werner claimed T5597: First 8 bytes of cache item left in clear in memory after decryption..

Good catch. Thanks. This patch should fix the leak:

Sep 13 2021, 4:39 PM · libgcrypt, symmetric, Bug Report
mdeslaur added a comment to T5328: On the (in)security of Elgamal in OpenPGP.

I looks like the "cipher: Hardening ElGamal by introducing exponent blinding too." commit [1] was never applied to 1.8.x. Is that intentional? If so, is there a specific reasoning that it's not needed in 1.8.x? Thanks!

Sep 13 2021, 2:55 PM · side-channel, CVE, libgcrypt
spelissier added a project to T5597: First 8 bytes of cache item left in clear in memory after decryption.: libgcrypt.
Sep 13 2021, 11:47 AM · libgcrypt, symmetric, Bug Report
werner moved T5520: Fix tests in FIPS mode from Next to Ready for release on the FIPS board.
Sep 13 2021, 11:17 AM · FIPS, libgcrypt, Bug Report
werner moved T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation from Backlog to Next on the FIPS board.
Sep 13 2021, 11:16 AM · FIPS, libgcrypt, Feature Request
werner moved T5520: Fix tests in FIPS mode from Backlog to Next on the FIPS board.
Sep 13 2021, 11:11 AM · FIPS, libgcrypt, Bug Report
werner added a comment to T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation.

My suggestion for a combined function is a simple:

Sep 13 2021, 9:53 AM · FIPS, libgcrypt, Feature Request
gniibe added a comment to T5576: New set of API for public key cryptography.

2021-09-13 Update:

  • Signature operation tested: RSA-PSS, RSA-PKCS#1-v1.5, RSA-X9.31, ECDSA by NIST Curves, DSA (against CAVS test vectors in FIPS 186-4)
    • Newly added features (also useful for standard API of sexp):
      • Support of X9.31 signature scheme with RSA
      • Support of supplying random "k" for DSA/ECDSA
      • Digest mode ASN for SHA512-224 and SHA512-256 (required for RSA PKCS#1-v1.5)
Sep 13 2021, 9:17 AM · libgcrypt, Feature Request
Jakuje added a comment to T5520: Fix tests in FIPS mode.

I have one more patch set to improve FIPS testing in test/curves.c. In the past, it was basically skipped altogether in FIPS mode. This implements more fine-grained selection of what is being tested. This is the first part.

Sep 13 2021, 8:53 AM · FIPS, libgcrypt, Bug Report
werner claimed T5596: Libgcrypt documentation: corrections to obvious misprints.
Sep 13 2021, 6:28 AM · libgcrypt, patch, Documentation, Bug Report

Sep 12 2021

MikhailRyazanov renamed T5596: Libgcrypt documentation: corrections to obvious misprints from Corrections to obvious Libgcrypt documentation misprints to Libgcrypt documentation: corrections to obvious misprints.
Sep 12 2021, 11:51 PM · libgcrypt, patch, Documentation, Bug Report
MikhailRyazanov renamed T5596: Libgcrypt documentation: corrections to obvious misprints from Corrections to obvious documentation misprints to Corrections to obvious Libgcrypt documentation misprints.
Sep 12 2021, 11:50 PM · libgcrypt, patch, Documentation, Bug Report
MikhailRyazanov added a project to T5596: Libgcrypt documentation: corrections to obvious misprints: libgcrypt.
Sep 12 2021, 11:49 PM · libgcrypt, patch, Documentation, Bug Report

Sep 7 2021

werner added a comment to T5576: New set of API for public key cryptography.

I see.

Sep 7 2021, 10:37 AM · libgcrypt, Feature Request
gniibe added a comment to T5576: New set of API for public key cryptography.

BTW, the reason of the name "pkey" is that because gcry_pk_ctl is already occupied.
It will be changed, if needed.

Sep 7 2021, 9:52 AM · libgcrypt, Feature Request
gniibe added a comment to T5576: New set of API for public key cryptography.

Today, I pushed an example for RSA-PSS.

Sep 7 2021, 9:50 AM · libgcrypt, Feature Request

Sep 6 2021

Jakuje added a comment to T5576: New set of API for public key cryptography.

I added couple of minor comments. I hope they went into somewhere.

Sep 6 2021, 2:58 PM · libgcrypt, Feature Request
Jakuje added a comment to T5520: Fix tests in FIPS mode.

looks good to me. Tested now with master 47e425e07995454573e28c13c08229d2f8a75642 and all tests pass for me in and out of FIPS mode as well as in the "soft" one.

Sep 6 2021, 1:08 PM · FIPS, libgcrypt, Bug Report
werner claimed T5540: Update fipsdrv and cavs_driver.pl.
Sep 6 2021, 11:25 AM · FIPS, libgcrypt
werner moved T5540: Update fipsdrv and cavs_driver.pl from Backlog to Next on the FIPS board.
Sep 6 2021, 11:25 AM · FIPS, libgcrypt
werner changed the status of T5541: Envvar LIBGCRYPT_FORCE_FIPS_MODE from Open to Testing.
Sep 6 2021, 11:22 AM · Feature Request, FIPS, libgcrypt
gniibe moved T5508: Allow hardware optimizations in FIPS from Backlog to Ready for release on the FIPS board.
Sep 6 2021, 11:21 AM · FIPS, libgcrypt, Bug Report
werner moved T5523: jitter entropy RNG update from Backlog to Next on the FIPS board.
Sep 6 2021, 11:19 AM · FIPS, libgcrypt
werner claimed T5523: jitter entropy RNG update.
Sep 6 2021, 11:19 AM · FIPS, libgcrypt
werner moved T5576: New set of API for public key cryptography from Backlog to Next on the FIPS board.
Sep 6 2021, 11:18 AM · libgcrypt, Feature Request
werner moved T5541: Envvar LIBGCRYPT_FORCE_FIPS_MODE from Backlog to Ready for release on the FIPS board.
Sep 6 2021, 11:17 AM · Feature Request, FIPS, libgcrypt
gniibe added a comment to T5576: New set of API for public key cryptography.

I created an experimental branch:
https://dev.gnupg.org/source/libgcrypt/history/gniibe%252Fnew-pk-api/

Sep 6 2021, 9:38 AM · libgcrypt, Feature Request

Sep 1 2021

jukivili added a comment to T5581: buf_eq_const() function in cipher/bufhelp.h may get wrong result.

Based on GCC bugzilla, affected released GCC versions are 11.1 and 11.2.

Sep 1 2021, 3:44 PM · toolchain, libgcrypt, Bug Report
jukivili added a comment to T5581: buf_eq_const() function in cipher/bufhelp.h may get wrong result.

(ab | ba) >= 0 is used to make optimization analysis for compiler more difficult. I see that with (ab | ba) == 0, it would be much easier for compiler to conclude than loop could exit early as soon as first a[i] != b[i] is seen.

Sep 1 2021, 3:39 PM · toolchain, libgcrypt, Bug Report
gniibe closed T5440: _DARWIN_C_SOURCE kind of "must" be 1, not "900000L" as Resolved.
Sep 1 2021, 8:07 AM · MacOS, libgcrypt, Bug Report
gniibe set External Link to https://gcc.gnu.org/bugzilla/show_bug.cgi?id=102151 on T5556: Use of offsetof is better for allocation of flexible array.
Sep 1 2021, 3:44 AM · gnupg24, gpgme, libgcrypt
gniibe added a comment to T5556: Use of offsetof is better for allocation of flexible array.

I filed a bug report to GCC, with modified test case.
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=102151

Sep 1 2021, 3:43 AM · gnupg24, gpgme, libgcrypt
gniibe claimed T5556: Use of offsetof is better for allocation of flexible array.
Sep 1 2021, 2:54 AM · gnupg24, gpgme, libgcrypt

Aug 31 2021

changyp6 updated the task description for T5581: buf_eq_const() function in cipher/bufhelp.h may get wrong result.
Aug 31 2021, 9:57 AM · toolchain, libgcrypt, Bug Report
werner triaged T5581: buf_eq_const() function in cipher/bufhelp.h may get wrong result as High priority.
Aug 31 2021, 7:58 AM · toolchain, libgcrypt, Bug Report

Aug 30 2021

gniibe closed T5365: --with-libgpg-error-prefix doesn't affect gpgrt-config path detection as Resolved.
Aug 30 2021, 7:05 AM · MacOS, gpgrt, Cross-Compiler, libgcrypt
gniibe triaged T5576: New set of API for public key cryptography as High priority.
Aug 30 2021, 5:07 AM · libgcrypt, Feature Request

Aug 25 2021

werner triaged T5556: Use of offsetof is better for allocation of flexible array as Normal priority.
Aug 25 2021, 4:27 PM · gnupg24, gpgme, libgcrypt
gniibe closed T5251: Compile error on ARMv7 for libgcrypt as Resolved.
Aug 25 2021, 3:58 AM · asm, libgcrypt, Bug Report
gniibe closed T5268: macOS getentropy as Resolved.

Closing, as downstream ticket has been closed.

Aug 25 2021, 3:51 AM · libgcrypt, MacOS
gniibe set External Link to https://trac.macports.org/ticket/62431 on T5268: macOS getentropy.
Aug 25 2021, 3:49 AM · libgcrypt, MacOS
gniibe closed T5369: GnuPG build on Apple with Clang as Resolved.

Fixed in libgcrypt 1.9.4.

Aug 25 2021, 3:40 AM · libgcrypt, MacOS, Bug Report
gniibe closed T5530: Add "prehash" support to DSA and ECDSA signing, a subtask of T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation, as Resolved.
Aug 25 2021, 3:29 AM · FIPS, libgcrypt, Feature Request
gniibe closed T5530: Add "prehash" support to DSA and ECDSA signing as Resolved.
Aug 25 2021, 3:29 AM · Restricted Project, FIPS, libgcrypt, Feature Request
gniibe closed T5529: Support internal hashing for RSA-PSS, a subtask of T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation, as Resolved.
Aug 25 2021, 3:28 AM · FIPS, libgcrypt, Feature Request
gniibe closed T5529: Support internal hashing for RSA-PSS as Resolved.
Aug 25 2021, 3:28 AM · libgcrypt, Feature Request

Aug 24 2021

gniibe added a comment to T5556: Use of offsetof is better for allocation of flexible array.
t-fam.c: In function 'main':
t-fam.c:34:14: warning: array subscript 'struct arg_and_data_s[0]' is partly outside array bounds of 'unsigned char[22]' [-Warray-bounds]
   34 |   aad0->next = NULL;
      |              ^
t-fam.c:30:10: note: referencing an object of size 22 allocated by 'malloc'
   30 |   aad0 = malloc (offsetof (struct arg_and_data_s, arg) + 2);
      |          ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
t-fam.c:35:13: warning: array subscript 'struct arg_and_data_s[0]' is partly outside array bounds of 'unsigned char[22]' [-Warray-bounds]
   35 |   aad0->len = 2;
      |   ~~~~~~~~~~^~~
t-fam.c:30:10: note: referencing an object of size 22 allocated by 'malloc'
   30 |   aad0 = malloc (offsetof (struct arg_and_data_s, arg) + 2);
      |          ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
t-fam.c:36:15: warning: array subscript 'struct arg_and_data_s[0]' is partly outside array bounds of 'unsigned char[22]' [-Warray-bounds]
   36 |   aad0->flags = 0;
      |   ~~~~~~~~~~~~^~~
t-fam.c:30:10: note: referencing an object of size 22 allocated by 'malloc'
   30 |   aad0 = malloc (offsetof (struct arg_and_data_s, arg) + 2);
      |          ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
t-fam.c:37:18: warning: array subscript 'struct arg_and_data_s[0]' is partly outside array bounds of 'unsigned char[22]' [-Warray-bounds]
   37 |   aad0->print_fd = fd;
      |   ~~~~~~~~~~~~~~~^~~~
t-fam.c:30:10: note: referencing an object of size 22 allocated by 'malloc'
   30 |   aad0 = malloc (offsetof (struct arg_and_data_s, arg) + 2);
      |          ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Aug 24 2021, 7:29 AM · gnupg24, gpgme, libgcrypt
gniibe added a comment to T5556: Use of offsetof is better for allocation of flexible array.

For GCC 11, modified version of struct arg_and_data_s has an issue for x86_64.

Aug 24 2021, 4:53 AM · gnupg24, gpgme, libgcrypt

Aug 23 2021

Jakuje added a comment to T5523: jitter entropy RNG update.

We should update jitterentropy to 3.0.2 or newer, which should be easier to get through certification, if we will go this way. From FIPS perspective, we should be fine with either going through getrandom only or with jitter entropy, but the bottom-line was that we should probably keep both as we do now.

Aug 23 2021, 12:46 PM · FIPS, libgcrypt
Jakuje added a comment to T5244: libgcrypt: Restrict MD5 use.

From Stephan I got the following response to the allocation handler use case

Aug 23 2021, 12:00 PM · Bug Report, FIPS, libgcrypt
werner added a comment to T5523: jitter entropy RNG update.

I think the last user of random-fips was removed with rCed57fed6de1465e02ec5e3bc0affeabdd35e2eb7

Aug 23 2021, 11:38 AM · FIPS, libgcrypt
werner added a comment to T5523: jitter entropy RNG update.

Yes, it makes sense to remove it.

Aug 23 2021, 11:34 AM · FIPS, libgcrypt
gniibe added a project to T5244: libgcrypt: Restrict MD5 use: FIPS.
Aug 23 2021, 11:21 AM · Bug Report, FIPS, libgcrypt
gniibe added a comment to T5556: Use of offsetof is better for allocation of flexible array.

For the use case of struct arg_and_data_s in gpgme, which may allocate zero-sized ARG[], it seems that GCC 11 interprets it as an invalid use.

Aug 23 2021, 6:25 AM · gnupg24, gpgme, libgcrypt
gniibe added projects to T5556: Use of offsetof is better for allocation of flexible array: libgcrypt, gpgme, gnupg (gpg23).
Aug 23 2021, 4:47 AM · gnupg24, gpgme, libgcrypt

Aug 22 2021

werner closed T5328: On the (in)security of Elgamal in OpenPGP as Resolved.
Aug 22 2021, 6:13 PM · side-channel, CVE, libgcrypt
werner closed T5402: Release Libgcrypt 1.9.4 as Resolved.
Aug 22 2021, 6:12 PM · Release Info, libgcrypt
werner updated the task description for T5402: Release Libgcrypt 1.9.4.
Aug 22 2021, 6:12 PM · Release Info, libgcrypt
werner triaged T5563: Release Libgcrypt 1.9.5 as Low priority.
Aug 22 2021, 6:07 PM · Release Info, libgcrypt
werner closed T5490: gcry_pk_get_param aborts program with error on "Curve25519" as Resolved.
Aug 22 2021, 4:52 PM · libgcrypt, Bug Report

Aug 20 2021

werner added a comment to T5550: Fix check_binary_integrity.

iirc Uli Drepper added a hack to dladdr which we made use of. Seems to be integrated into dladdr1 now.

Aug 20 2021, 8:26 AM · FIPS, libgcrypt
gniibe added a comment to T5550: Fix check_binary_integrity.

While I don't know if runtime integrity check is required or not by FIPS 140,
I checked OpenSSL, and it has such a check in openssl/providers/fips. The FIPS module configuration file which has the module checksum by HMAC is generated by openssl fipsinstall command.

Aug 20 2021, 3:23 AM · FIPS, libgcrypt
gniibe added a comment to T5550: Fix check_binary_integrity.

Ah... I realized that HMAC integrity check with dladdr (using address of constant string) might work (at some point) to determine the filename of libgcrypt.so, when/if glibc implementation allows searching with address of constant string. So, my claim "never worked" was wrong.

Aug 20 2021, 2:46 AM · FIPS, libgcrypt

Aug 19 2021

Jakuje added a comment to T5550: Fix check_binary_integrity.

We have the same patch (including the hmac key and we use the switch. The reasoning on our side was to be compatible with fipscheck, but it is no longer used since last year and we use just the hmac256 tool:

Aug 19 2021, 12:52 PM · FIPS, libgcrypt
werner added a comment to T5550: Fix check_binary_integrity.

Just for the records, the whole HMAC thing including the special dlopen trick used to work fine when we did the original FIPS support.

Aug 19 2021, 12:35 PM · FIPS, libgcrypt

Aug 18 2021

Jakuje added a comment to T5244: libgcrypt: Restrict MD5 use.

Right. The clarification is that SHA1 itself (for non-security and non-signature use) is still allowed in FIPS mode. But it is not allowed to be used as part of signature schemes of the new API in FIPS mode. The old API, which allows raw signatures without digests, should just fail in FIPS mode too. And the FIPS-compatible gnupg should use the new API too (it would be good to think about this when putting it together).

Aug 18 2021, 7:46 PM · Bug Report, FIPS, libgcrypt
Jakuje added a comment to T5523: jitter entropy RNG update.

For Linux and FIPS, we should be actually fine with using /dev/random or getrandom().

Aug 18 2021, 7:24 PM · FIPS, libgcrypt
Jakuje added a comment to T5540: Update fipsdrv and cavs_driver.pl.

The CAVS driver can be safely removed. The certification goes through the ACVP these days so it does not make sense to keep this.

Aug 18 2021, 12:46 PM · FIPS, libgcrypt
gniibe added a comment to T5244: libgcrypt: Restrict MD5 use.

For use of SHA-1:

Aug 18 2021, 1:59 AM · Bug Report, FIPS, libgcrypt

Aug 17 2021

werner added a comment to T5244: libgcrypt: Restrict MD5 use.

(can't access that bug with my account)

Aug 17 2021, 9:38 AM · Bug Report, FIPS, libgcrypt
gniibe added a comment to T5520: Fix tests in FIPS mode.

For tests with FIPS mode enabled, I manually create the file .libgcrypt.so.20.hmac under src/.libs.

Aug 17 2021, 6:04 AM · FIPS, libgcrypt, Bug Report
gniibe added a project to T5520: Fix tests in FIPS mode: Restricted Project.
Aug 17 2021, 4:22 AM · FIPS, libgcrypt, Bug Report
gniibe added a comment to T5520: Fix tests in FIPS mode.

I pushed my further change.
Also, applied and pushed your changes.

Aug 17 2021, 4:21 AM · FIPS, libgcrypt, Bug Report
gniibe added a comment to T5520: Fix tests in FIPS mode.

Sorry, I didn't test for non-FIPS mode when I committed rC347817438990: fips: Fix tests in fips mode..
Tweaking the value for memory allocation is needed for FIPS mode, because it uses some secure memory by DRBG.

Aug 17 2021, 4:06 AM · FIPS, libgcrypt, Bug Report

Aug 16 2021

Jakuje added a comment to T5244: libgcrypt: Restrict MD5 use.

I went a bit back to the history to figure out what is the enforced and soft fips mode as it was initially not completely clear to me. For the record, I used the following bug from 9 years ago:

Aug 16 2021, 7:11 PM · Bug Report, FIPS, libgcrypt