In T6039#164435, @gniibe wrote:I read the document (SP 800-131Ar2) again. I think that it would be irrelevant for PKDF2, because it's password KDF, not deriving additional keys from a Cryptographic Key.
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Feed Advanced Search
Advanced Search
Advanced Search
Oct 20 2022
Oct 20 2022
I read the document (SP 800-131Ar2) again. I think that it would be irrelevant for PKDF2, because it's password KDF, not deriving additional keys from a Cryptographic Key.
Oct 19 2022
Oct 19 2022
Please note that: libgcrypt offers ECDH functionality by gcry_pk_encrypt/gcry_pk_decrypt to construct OpenPGP public-key encryption/decryption.
So, this is only for OAEP but not for ECDH? FWIW, GnUPG uses OAEP only for S/MIME.
• gniibe added a comment to T6242: libgcrypt: optimize ECB? (as it may be used to estimate library crypto performance).
It's not that needed, in my opinion, as nobody actually uses ECB itself (in real use case). But I understand the point of (possibly, students') benchmarking.
Oct 18 2022
Oct 18 2022
Oct 16 2022
Oct 16 2022
Oct 14 2022
Oct 14 2022
Pushed the change, although it is not enabled yet (since the feature will be only available by newer libgcrypt, 1.11).
Oct 7 2022
Oct 7 2022
One more nit regarding to the test is the format string for size_t which was using %d instead of %zu. This is fixed by the attached patch:
Oct 4 2022
Oct 4 2022
• werner moved T6219: Ensure minimum key length for KDF in FIPS mode from Backlog to Ready for release on the FIPS board.
Also applied to 1.10 branch.
Oct 2 2022
Oct 2 2022
Patch applied to master, thanks.
Sep 30 2022
Sep 30 2022
One nit that I overlooked initially is the memory leak, which is fixed with the following patch:
libgcrypt-leak.patch732 BDownload
Sep 27 2022
Sep 27 2022
The specs https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-132.pdf page 10 says specifically:
I've tested the different hw implementations (amd64, arm64, s390x) and they are all ok.
• gniibe changed the status of T6219: Ensure minimum key length for KDF in FIPS mode from Open to Testing.
Thank you for your report.
Sep 26 2022
Sep 26 2022
My poor old laptop - its RAM will now have a hard time to run the huge tests ;-)
The test looks good. I hope I changed the API in all the hw optimized implementations.
Sep 25 2022
Sep 25 2022
Fix looks good to me. This could be tested with new long running test (tests/hashtest) that would allocate 4GiB+ pattern block for inputting to gcry_md_write.
Sep 23 2022
Sep 23 2022
Sep 22 2022
Sep 22 2022
• werner changed the status of T5933: libgcrypt: Simply use BSS (not secure heap) for DRBG instance from Open to Testing.
• werner changed the status of T5919: libgcrypt tests/basic.c and tests/keygen.c occasionally fail with "error generating RSA key: Number is not prime" from Open to Testing.
• werner changed the status of T5891: EOPNOTSUPP is not defined in mingw.org's MinGW, fails compilation of libgcrypt-1.10.0 from Open to Testing.
• werner changed the status of T5811: libgcrypt: Remove random-daemon (server side) from Open to Testing.
• werner changed the status of T5822: libgcrypt: Remove GCRYCTL_ENABLE_M_GUARD support (was: _gcry_private_malloc returns 4-byte alignment memory when use_m_guard==1) from Open to Testing.
• werner changed the status of T5918: Disable RSA PKCS #1.5 encryption in FIPS mode from Open to Testing.
• werner changed the status of T5973: libgcrypt: Minor test issues reported by coverity from Open to Testing.
• werner changed the status of T5976: libgcrypt build failure on HPPA 1.1 (./.libs/libgcrypt.so: undefined reference to `__udiv_qrnnd') from Open to Testing.
• werner changed the status of T4873: Enable AES GCM in FIPS mode, a subtask of T5870: libgcrypt: AEAD API for FIPS 140 (in future), from Open to Testing.
• werner changed the status of T5975: Allow signature verification using specific RSA keys <2k in FIPS mode from Open to Testing.
• werner changed the status of T6039: FIPS: Allow salt=NULL (or shorter salt) for HKDF from Open to Testing.
• werner changed the status of T6048: Test suite fixes with --enable-pubkey-ciphers=ecc from Open to Testing.
• werner changed the status of T6066: gcry_pk_hash_verify() does not work with explicitly specified hash algorithm from Open to Testing.
Sep 7 2022
Sep 7 2022
Sep 5 2022
Sep 5 2022
Aug 30 2022
Aug 30 2022
TLS 1.3 requires much changes for NTBTLS.
• gniibe added a parent task for T4873: Enable AES GCM in FIPS mode: T5870: libgcrypt: AEAD API for FIPS 140 (in future).
• gniibe added a subtask for T5870: libgcrypt: AEAD API for FIPS 140 (in future): T4873: Enable AES GCM in FIPS mode.
• gniibe moved T6048: Test suite fixes with --enable-pubkey-ciphers=ecc from Next to Ready for release on the FIPS board.
• gniibe moved T6039: FIPS: Allow salt=NULL (or shorter salt) for HKDF from Next to Ready for release on the FIPS board.
Applied to master and 1.10 branch.
Aug 26 2022
Aug 26 2022
I realized that some AEAD cipher (including GCM) allows arbitrary length for IV.
But it's not good for the API of setup_geniv and geniv.
Aug 25 2022
Aug 25 2022
I pushed the change with documentation.
Aug 24 2022
Aug 24 2022
Aug 23 2022
Aug 23 2022
Thank you for your work on the proposal. I have two comments:
- Do we have some test vector, which can be used in the testsute to test the new API?
- We need to mention the new API in the documentation.
• werner renamed T6146: Add gcry_kdf_open et al. documentation from Add fcry_kdf_open et al. documentation to Add gcry_kdf_open et al. documentation.
Aug 18 2022
Aug 18 2022
For the record, the changeset in the attached merge request is final and waiting for reviews.
Aug 11 2022
Aug 11 2022
Aug 9 2022
Aug 9 2022
Should go into 1.10 too
Jul 28 2022
Jul 28 2022
Jul 25 2022
Jul 25 2022
Jul 22 2022
Jul 22 2022
@gniibe Thanks!
In the repo, for all related software, it's done.
Note that versions since 2020-11-07 to 2021-07-03 have major problem with non-POSIX shell, which doesn't support $(..) construct.
Jul 21 2022
Jul 21 2022
Jul 18 2022
Jul 18 2022
Thank you.
Jul 13 2022
Jul 13 2022
Reading through the report, the spec., and current implementation, I concluded that this is not a bug, thus, I'm closing this.
• gniibe added a project to T6039: FIPS: Allow salt=NULL (or shorter salt) for HKDF: Restricted Project.
It will be in 1.10.2.
• gniibe added a comment to T5919: libgcrypt tests/basic.c and tests/keygen.c occasionally fail with "error generating RSA key: Number is not prime".
It will be in 1.10.2.
It will be in 1.10.2.
• gniibe added a comment to T5891: EOPNOTSUPP is not defined in mingw.org's MinGW, fails compilation of libgcrypt-1.10.0.
Applied to 1.10.
Jul 12 2022
Jul 12 2022
• gniibe moved T6048: Test suite fixes with --enable-pubkey-ciphers=ecc from Backlog to Next on the FIPS board.
• gniibe added a project to T5975: Allow signature verification using specific RSA keys <2k in FIPS mode: backport.
• gniibe added a project to T6066: gcry_pk_hash_verify() does not work with explicitly specified hash algorithm: Restricted Project.
Jul 7 2022
Jul 7 2022
• gniibe claimed T6066: gcry_pk_hash_verify() does not work with explicitly specified hash algorithm.
Thank you for your report. That's my badness (forgetting to implement in pk_verify_md function).
Jul 6 2022
Jul 6 2022
neverpanic added a comment to T6066: gcry_pk_hash_verify() does not work with explicitly specified hash algorithm.
For the record, the valgrind trace for the crash is:
Thanks. Applied. Also, fixed about a warning for ChaCha20.
Jul 5 2022
Jul 5 2022
Here's another one related to this: https://lists.gnupg.org/pipermail/gcrypt-devel/2022-July/005344.html
Jul 1 2022
Jul 1 2022
• gniibe added a project to T6048: Test suite fixes with --enable-pubkey-ciphers=ecc: Restricted Project.
Applied and pushed.
The last patch is related to FIPS, so, I add the FIPS tag.