Page MenuHome GnuPG
Feed Advanced Search

Apr 10 2023

gniibe claimed T6442: libgcrypt-1.10.2: getrandom() is not available everywhere.
Apr 10 2023, 7:18 AM · MacOS, libgcrypt, Bug Report
gniibe closed T6257: Without gpg-error-config installed (libgpg-error-1.46) libgcrypt-1.10.1 does not configure as Resolved.
Apr 10 2023, 7:17 AM · MacOS, libgcrypt, gpgrt
gniibe added a comment to T6257: Without gpg-error-config installed (libgpg-error-1.46) libgcrypt-1.10.1 does not configure.

Fixed in libgcrypt 1.10.2.

Apr 10 2023, 7:17 AM · MacOS, libgcrypt, gpgrt
gniibe claimed T6443: ntbtls-0.3.1 does not configure against libgpg-error-1.47.
Apr 10 2023, 7:16 AM · ntbtls
gniibe added a comment to T6443: ntbtls-0.3.1 does not configure against libgpg-error-1.47.

@debohman Thank you!

Apr 10 2023, 7:16 AM · ntbtls
gniibe committed rE9c17795ec25f: gpgrt-config: Simplify to set gpgrt_libdir. (authored by gniibe).
gpgrt-config: Simplify to set gpgrt_libdir.
Apr 10 2023, 7:16 AM
gniibe added a comment to T6444: pinentry-1.2.1 does not configure against libgpg-error-1.47.

@debohman Thank you for the log. Thank you also for your testing pinentry master.

Apr 10 2023, 6:42 AM · pinentry
gniibe closed T6288: Document gpgrt-config in detail or improve it to support simple invocation as Resolved.

Fixed in libgpg-error 1.47.

Apr 10 2023, 6:41 AM · gpgrt, Bug Report
gniibe added a comment to T6444: pinentry-1.2.1 does not configure against libgpg-error-1.47.

Possibly, your problem may be gpg-error.m4 in pinentry. If so, you can replace m4/gpg-error.m4 in pinentry by src/gpg-error.m4 in libgpg-error.
Then, regenerate configure of pinentry.
(In the repo of pinentry gpg-error.m4 is already updated.)

Apr 10 2023, 6:05 AM · pinentry
gniibe added a comment to T6444: pinentry-1.2.1 does not configure against libgpg-error-1.47.

@debohman Please describe your failure.

Apr 10 2023, 6:00 AM · pinentry
gniibe added a comment to T6444: pinentry-1.2.1 does not configure against libgpg-error-1.47.

The functionality of gpg-error-config is replaced by gpgrt-config. However, the script of gpg-error-config itself cannot be replaced by gpgrt-config.
(As the output of configure said,) in the configure script, gpgrt-config is invoked with --libdir somewhere (/usr/local/lib/x86_64-linux-gnu, in my case above) option to work as the gpg-error-config script replacement.

Apr 10 2023, 5:00 AM · pinentry
gniibe added a comment to T6442: libgcrypt-1.10.2: getrandom() is not available everywhere.

Thank you for the report.

Apr 10 2023, 4:54 AM · MacOS, libgcrypt, Bug Report
gniibe added a comment to T6443: ntbtls-0.3.1 does not configure against libgpg-error-1.47.

Please see T6444.

Apr 10 2023, 4:25 AM · ntbtls
gniibe added a comment to T6444: pinentry-1.2.1 does not configure against libgpg-error-1.47.

Please describe your problem in a way other people can reproduce.

Apr 10 2023, 4:22 AM · pinentry

Apr 7 2023

gniibe committed rEf00892d2ca0d: po: Update Japanese Translation. (authored by gniibe).
po: Update Japanese Translation.
Apr 7 2023, 8:15 AM
gniibe closed T6388: libgcrypt: gpgrt-config not found in $PREFIX if there are no less-preferred options found via $CC as Resolved.

Fixed in 1.10.2.

Apr 7 2023, 2:16 AM · gpgrt, patch, libgcrypt, Bug Report

Apr 6 2023

gniibe committed rGcb055ecb9109: gpg: Fix handling of importing cv25519 secret key. (authored by gniibe).
gpg: Fix handling of importing cv25519 secret key.
Apr 6 2023, 4:35 AM
gniibe changed the status of T6322: The warning "lower 3 bits of the secret key are not cleared" keeps showing even cv25519 key was generated by GnuPG from Open to Testing.
Apr 6 2023, 4:35 AM · gnupg24, Bug Report
gniibe claimed T6322: The warning "lower 3 bits of the secret key are not cleared" keeps showing even cv25519 key was generated by GnuPG.

Sorry, it took time (for me) to understand the issue, as this is not 100%-reproducible bug. And it was not clear (for me) that how passphrase were offered in the interaction, so, I was not possible to see if it's encrypted or not.

Apr 6 2023, 4:32 AM · gnupg24, Bug Report
gniibe committed rM806a5d18b988: build: Update gpg-error.m4. (authored by gniibe).
build: Update gpg-error.m4.
Apr 6 2023, 1:44 AM

Apr 5 2023

gniibe committed rK53b9fa1d58ba: build: Update gpg-error.m4. (authored by gniibe).
build: Update gpg-error.m4.
Apr 5 2023, 12:47 PM
gniibe committed rT79f76d68dac6: Fix to silence a warning. (authored by gniibe).
Fix to silence a warning.
Apr 5 2023, 10:58 AM
gniibe committed rTfe949f349286: build: Update gpg-error.m4. (authored by gniibe).
build: Update gpg-error.m4.
Apr 5 2023, 10:58 AM
gniibe committed rA3d8195ebc5e3: build: Update gpg-error.m4. (authored by gniibe).
build: Update gpg-error.m4.
Apr 5 2023, 10:36 AM
gniibe committed rSa5d8355a0f00: build: Update gpg-error.m4. (authored by gniibe).
build: Update gpg-error.m4.
Apr 5 2023, 9:34 AM
gniibe committed rP21e85333f966: build: Update gpg-error.m4. (authored by gniibe).
build: Update gpg-error.m4.
Apr 5 2023, 9:05 AM
gniibe committed rP3870ecc99340: Fix for modern compiler. (authored by gniibe).
Fix for modern compiler.
Apr 5 2023, 9:05 AM
gniibe committed rG946a851d17b0: build: Update gpg-error.m4. (authored by gniibe).
build: Update gpg-error.m4.
Apr 5 2023, 8:57 AM

Apr 4 2023

gniibe changed the status of T6384: libgcrypt link error if cipher chacha20 is not included from Open to Testing.

Fixed in master and 1.10 branch.

Apr 4 2023, 9:08 AM · patch, libgcrypt, Bug Report
gniibe committed rC137f1fd82bc9: cipher: Enable the fast path to ChaCha20 only when supported. (authored by gniibe).
cipher: Enable the fast path to ChaCha20 only when supported.
Apr 4 2023, 9:08 AM
gniibe committed rE1a382660855f: core: Add GPG_ERR_SOURCE_TKD. (authored by gniibe).
core: Add GPG_ERR_SOURCE_TKD.
Apr 4 2023, 8:26 AM
gniibe triaged T6434: Kleopatra - A translation error in Chinese language as Normal priority.

Probably, this change should work:

diff --git a/po/zh_CN/kleopatra.po b/po/zh_CN/kleopatra.po
index 56b06e04..f34112a9 100644
--- a/po/zh_CN/kleopatra.po
+++ b/po/zh_CN/kleopatra.po
@@ -4680,7 +4680,7 @@ msgstr "发件人"
 #: src/crypto/gui/resultitemwidget.cpp:132
 #, kde-format
 msgid "Force decryption"
-msgstr "强制加密"
+msgstr "强制解密"
Apr 4 2023, 8:23 AM · kleopatra, Bug Report
gniibe changed the status of T6432: libgcrypt - flag munging does not account for -Oz from Open to Testing.

After testing the builds of master for several distributions/gcc/clang, applied to 1.10 branch too.

Apr 4 2023, 6:29 AM · Bug Report

Apr 3 2023

gniibe claimed T6432: libgcrypt - flag munging does not account for -Oz.

Thank you for the report.
Fixed in master. Let us consider if it will be backported to 1.10 (or not).

Apr 3 2023, 7:02 AM · Bug Report
gniibe committed rC7edf1abb9a0d: build: Allow build with -Oz. (authored by gniibe).
build: Allow build with -Oz.
Apr 3 2023, 7:01 AM

Apr 1 2023

gniibe committed rCbcf5922eaac2: m4: Update gpg-error.m4. (authored by gniibe).
m4: Update gpg-error.m4.
Apr 1 2023, 5:09 AM
gniibe committed rEc61e831b6f0c: m4: Fix behavior with older gpg-error-config and gpgrt-config. (authored by gniibe).
m4: Fix behavior with older gpg-error-config and gpgrt-config.
Apr 1 2023, 4:30 AM

Mar 25 2023

gniibe added a comment to T6388: libgcrypt: gpgrt-config not found in $PREFIX if there are no less-preferred options found via $CC .

@tlaurion Thank you for the report, but your particular problem is irrelevant to this ticket.
I lightly looked the log and noticed that the cross build would have some confusions for pkg-config, however, that's not our problem but yours.
For the particular failures in your build, the issues look like a problem of musl linker. It seems that it requires all dependency of libraries to be used, even if an executable doesn't use a library directly.
If it is the case, we need a patch... something like:

Mar 25 2023, 2:59 AM · gpgrt, patch, libgcrypt, Bug Report

Mar 24 2023

gniibe changed the status of T6417: FIPS service indicator regarding the public key algorithm flags and objects from Open to Testing.

Pushed the change.

Mar 24 2023, 5:17 AM · libgcrypt, FIPS
gniibe committed rC1c916b8c99ea: fips: More elaborate way of getting FIPS pk flags indicators. (authored by gniibe).
fips: More elaborate way of getting FIPS pk flags indicators.
Mar 24 2023, 5:15 AM
gniibe added a project to T6421: Improve error message if no reset code (PUK) is set: gpgrt.

Having GPG_ERR_BAD_PUK makes sense. So, I added a tag for gpg-error.

Mar 24 2023, 5:10 AM · Feature Request, gnupg22, gnupg24, gpgrt

Mar 23 2023

gniibe committed rC0af15f1fa0ca: build: Update gpg-error.m4. (authored by gniibe).
build: Update gpg-error.m4.
Mar 23 2023, 6:57 AM
gniibe changed the status of T6388: libgcrypt: gpgrt-config not found in $PREFIX if there are no less-preferred options found via $CC from Open to Testing.

Fixed in master (of libgpg-error).
Pushed the change to libgcrypt (master and 1.10 branch).

Mar 23 2023, 6:51 AM · gpgrt, patch, libgcrypt, Bug Report
gniibe committed rEed36ba06f907: m4: Fallback to $possible_libdir1, when not found with $CC. (authored by gniibe).
m4: Fallback to $possible_libdir1, when not found with $CC.
Mar 23 2023, 6:45 AM

Mar 22 2023

gniibe added a comment to T6388: libgcrypt: gpgrt-config not found in $PREFIX if there are no less-preferred options found via $CC .

Thank you for the bug report.

Mar 22 2023, 4:20 AM · gpgrt, patch, libgcrypt, Bug Report

Mar 21 2023

gniibe claimed T6417: FIPS service indicator regarding the public key algorithm flags and objects.
Mar 21 2023, 11:25 AM · libgcrypt, FIPS

Mar 20 2023

gniibe closed T1734: [SUGGESTION] Implement a function to re-generate public keys and(!) "stubs" from private keys stored on smartcard only as Resolved.

gpg-agent now supports READKEY --card command which creates stub file when it's not yet available on host computer.
It was implemented by rG82cbab906a3e: agent: Add --card option for READKEY.

Mar 20 2023, 3:38 AM · gnupg, Feature Request

Mar 14 2023

gniibe committed rCfae63f517906: tests: Improve test coverage for FIPS service indicators. (authored by Jakuje).
tests: Improve test coverage for FIPS service indicators.
Mar 14 2023, 4:33 AM
gniibe committed rCe0a5a9eb8301: fips: Explicitly disable overriding random in FIPS mode. (authored by Jakuje).
fips: Explicitly disable overriding random in FIPS mode.
Mar 14 2023, 4:33 AM
gniibe committed rC4c1c8a707f96: fips: Explicitly allow only some PK flags. (authored by Jakuje).
fips: Explicitly allow only some PK flags.
Mar 14 2023, 4:33 AM
gniibe committed rC0b7ad923978f: doc: Document the new FIPS indicators. (authored by tobhe).
doc: Document the new FIPS indicators.
Mar 14 2023, 4:33 AM

Mar 8 2023

gniibe committed rG4e391d95e071: scd: Fix checking memory allocation. (authored by gniibe).
scd: Fix checking memory allocation.
Mar 8 2023, 3:38 AM
gniibe moved T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt from Backlog to Next on the FIPS board.
Mar 8 2023, 2:39 AM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS
gniibe changed the status of T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt from Open to Testing.

Thank you.
Applied to both (master and 1.10).

Mar 8 2023, 2:39 AM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS
gniibe committed rCdc4a60e2d70b: fips: Unblock MD5 in fips mode but mark non-approved in indicator. (authored by tobhe).
fips: Unblock MD5 in fips mode but mark non-approved in indicator.
Mar 8 2023, 2:39 AM
gniibe committed rCc88672a327f6: fips: Add explicit indicators for md and mac algorithms. (authored by tobhe).
fips: Add explicit indicators for md and mac algorithms.
Mar 8 2023, 2:39 AM
gniibe changed the status of T6397: PCT failures inconsistency in regards to the FIPS error state from Open to Testing.
Mar 8 2023, 1:49 AM · libgcrypt, FIPS, Bug Report
gniibe changed the status of T6396: the gcry_pk_hash_sign/verify operates in FIPS non-operational mode from Open to Testing.
Mar 8 2023, 1:48 AM · libgcrypt, FIPS, Bug Report
gniibe changed the status of T6394: FIPS requires running PCT tests unconditionally from Open to Testing.
Mar 8 2023, 1:48 AM · FIPS, libgcrypt, Bug Report
gniibe changed the status of T6393: DRBG with SHA384 is no longer allowed in FIPS mode (and looks like impossible to enable anyway) from Open to Testing.
Mar 8 2023, 1:48 AM · FIPS, libgcrypt, Bug Report
gniibe moved T6397: PCT failures inconsistency in regards to the FIPS error state from Next to Ready for release on the FIPS board.
Mar 8 2023, 1:47 AM · libgcrypt, FIPS, Bug Report
gniibe moved T6396: the gcry_pk_hash_sign/verify operates in FIPS non-operational mode from Next to Ready for release on the FIPS board.
Mar 8 2023, 1:47 AM · libgcrypt, FIPS, Bug Report
gniibe moved T6394: FIPS requires running PCT tests unconditionally from Next to Ready for release on the FIPS board.
Mar 8 2023, 1:47 AM · FIPS, libgcrypt, Bug Report
gniibe moved T6393: DRBG with SHA384 is no longer allowed in FIPS mode (and looks like impossible to enable anyway) from Next to Ready for release on the FIPS board.
Mar 8 2023, 1:47 AM · FIPS, libgcrypt, Bug Report

Mar 7 2023

gniibe committed rCf5fe94810f30: kdf: Update tests in regards to the allowed parameters in FIPS mode. (authored by Jakuje).
kdf: Update tests in regards to the allowed parameters in FIPS mode.
Mar 7 2023, 7:46 AM
gniibe committed rC3fd3bb31597f: fips: Check return value from ftell (authored by Jakuje).
fips: Check return value from ftell
Mar 7 2023, 7:46 AM
gniibe moved T6393: DRBG with SHA384 is no longer allowed in FIPS mode (and looks like impossible to enable anyway) from Backlog to Next on the FIPS board.
Mar 7 2023, 7:34 AM · FIPS, libgcrypt, Bug Report
gniibe claimed T6393: DRBG with SHA384 is no longer allowed in FIPS mode (and looks like impossible to enable anyway).

Applied your patch (from gitlab) to both (master and 1.10).

Mar 7 2023, 7:34 AM · FIPS, libgcrypt, Bug Report
gniibe committed rC45b80678109e: random: Remove unused SHA384 DRBGs. (authored by Jakuje).
random: Remove unused SHA384 DRBGs.
Mar 7 2023, 7:33 AM
gniibe moved T6396: the gcry_pk_hash_sign/verify operates in FIPS non-operational mode from Backlog to Next on the FIPS board.
Mar 7 2023, 7:12 AM · libgcrypt, FIPS, Bug Report
gniibe claimed T6396: the gcry_pk_hash_sign/verify operates in FIPS non-operational mode.

Applied to both (1.10 and master).

Mar 7 2023, 7:11 AM · libgcrypt, FIPS, Bug Report
gniibe committed rC654d0dfa0499: visibility: Check FIPS operational status for MD+Sign operation. (authored by Jakuje).
visibility: Check FIPS operational status for MD+Sign operation.
Mar 7 2023, 6:53 AM
gniibe added a comment to T6393: DRBG with SHA384 is no longer allowed in FIPS mode (and looks like impossible to enable anyway).

You are right, there is no way to use DRBG with SHA384 by libgcrypt.

Mar 7 2023, 3:53 AM · FIPS, libgcrypt, Bug Report
gniibe moved T6397: PCT failures inconsistency in regards to the FIPS error state from Backlog to Next on the FIPS board.
Mar 7 2023, 3:43 AM · libgcrypt, FIPS, Bug Report
gniibe moved T6394: FIPS requires running PCT tests unconditionally from Backlog to Next on the FIPS board.
Mar 7 2023, 3:43 AM · FIPS, libgcrypt, Bug Report
gniibe claimed T6397: PCT failures inconsistency in regards to the FIPS error state.

Applied to both (1.10 and master).

Mar 7 2023, 3:42 AM · libgcrypt, FIPS, Bug Report
gniibe claimed T6394: FIPS requires running PCT tests unconditionally.

Applied to both (of 1.10 and master).

Mar 7 2023, 3:42 AM · FIPS, libgcrypt, Bug Report
gniibe committed rC2ddeec574bc1: ecc: Do not allow skipping tests in FIPS Mode. (authored by Jakuje).
ecc: Do not allow skipping tests in FIPS Mode.
Mar 7 2023, 3:42 AM
gniibe committed rC23a2d1285e35: ecc: Make the PCT recoverable in FIPS mode and consistent with RSA. (authored by Jakuje).
ecc: Make the PCT recoverable in FIPS mode and consistent with RSA.
Mar 7 2023, 3:42 AM

Mar 6 2023

gniibe committed rS9577c8d5f3f8: Fix ECDSA. (authored by gniibe).
Fix ECDSA.
Mar 6 2023, 4:20 AM

Mar 3 2023

gniibe added a comment to T6390: ECC: Explain GnuPG's CV25519 key and its ECDH (comarison to X25519).

Note that for the OpenPGP implementations which use X25519 API, it is not possible to calculate [scalar]G with scalar having least significant three bits != 0.

Mar 3 2023, 3:54 AM · Support, Documentation, OpenPGP, gnupg

Feb 27 2023

gniibe added a comment to T6390: ECC: Explain GnuPG's CV25519 key and its ECDH (comarison to X25519).

CV25519 private key secret part:

  • Standard MPI (big-endian) of 255-bit
  • The value should have zeros for least significant three bits, its most significant bit (255th bit) should be set.
    • the value should be the one after decodeScalar25519 function in RFC7748

CV25519 public part from secret part:

  • Simply calculated by [secret-part]G
Feb 27 2023, 9:47 AM · Support, Documentation, OpenPGP, gnupg
gniibe triaged T6390: ECC: Explain GnuPG's CV25519 key and its ECDH (comarison to X25519) as Normal priority.
Feb 27 2023, 8:00 AM · Support, Documentation, OpenPGP, gnupg

Feb 22 2023

gniibe committed rSa1108b4f039c: Fix returning EC_POINT. (authored by gniibe).
Fix returning EC_POINT.
Feb 22 2023, 7:37 AM

Feb 16 2023

gniibe committed rS316a7bb9eb80: Add CKA_EC_POINT attribute to CKO_PRIVATE_KEY object. (authored by gniibe).
Add CKA_EC_POINT attribute to CKO_PRIVATE_KEY object.
Feb 16 2023, 8:08 AM

Feb 10 2023

gniibe added a comment to T6234: Implement access to smartcards via a generic pkcs#11 interface.

I try experiment using Python PKCS#11 (https://python-pkcs11.readthedocs.io/en/latest/index.html)

Feb 10 2023, 4:09 AM · Restricted Project, gnupg26, Feature Request, scd
gniibe added a comment to T6234: Implement access to smartcards via a generic pkcs#11 interface.

I concluded that (at first, for the initial try) it's not good to start this under scdaemon, because of two different abstractions for accessing the device (the way of scdaemon and the way of PKCS#11).
It's good to start with something like tpm2d. The goal would be integration into scdaemon or tpm2d.

Feb 10 2023, 3:59 AM · Restricted Project, gnupg26, Feature Request, scd

Feb 8 2023

gniibe reopened T5464: Failure to import Curve25519 ECDH secret subkey to the GnupG. as "Open".

Sorry, I mistakenly closed this task. I reopen it.

Feb 8 2023, 2:45 AM · Support, gnupg, OpenPGP

Feb 7 2023

gniibe closed T5464: Failure to import Curve25519 ECDH secret subkey to the GnupG. as Resolved.

Could it be the case that your implementation actually used those bits to calculate a public key?

Feb 7 2023, 11:39 AM · Support, gnupg, OpenPGP

Feb 6 2023

gniibe added a comment to T6364: More device (including virtual) support.

For a device which only provides PKCS#11 driver, I decide to test with SoftHSM.

Feb 6 2023, 5:12 AM

Feb 1 2023

gniibe added a comment to T6364: More device (including virtual) support.

Current status:

  • Gnuk Token, Yubikey, OpenPGPcard with some card readers (only w/ specific reliable card readers)
  • some cards some card readers (many are not supported well)
  • TPM
Feb 1 2023, 6:49 AM
gniibe triaged T6364: More device (including virtual) support as Wishlist priority.
Feb 1 2023, 6:45 AM
gniibe added a comment to T3883: Add Win32-OpenSSH support to gpg-agent's ssh-agent.

@MathiasMagnus This change is to support Win32-OpenSSH by gpg-agent emulation of ssh-agent; You can use gpg-agent emulation of ssh-agent when you use Win32-OpenSSH. That is, you can use GPG auth subkey for Win32-OpenSSH.

Feb 1 2023, 6:03 AM · Not A Bug, workaround, gnupg24, Windows, ssh

Jan 26 2023

gniibe committed rG3de5e00d04a5: po: Update Japanese Translation. (authored by gniibe).
po: Update Japanese Translation.
Jan 26 2023, 7:25 AM
gniibe committed rG92e4f856c509: po: Update Japanese Translation. (authored by gniibe).
po: Update Japanese Translation.
Jan 26 2023, 7:25 AM

Jan 24 2023

gniibe added a comment to T6356: Trapped at "Your decision?" in an infinite loop on providing unwanted input.

The interaction goes back to "Your decision?" after you didn't answer "y/N" to the question of "Do you really...?".
What you are asked is: 1, 2, 3, 4, 5 or m.

Jan 24 2023, 11:34 AM · Support

Jan 23 2023

gniibe updated the task description for T6352: Design USB Protocol for (possible) new device.
Jan 23 2023, 8:30 AM
gniibe updated the task description for T6352: Design USB Protocol for (possible) new device.
Jan 23 2023, 8:29 AM
gniibe added a comment to T6352: Design USB Protocol for (possible) new device.

Some technical points:

Jan 23 2023, 7:04 AM
gniibe triaged T6352: Design USB Protocol for (possible) new device as Wishlist priority.
Jan 23 2023, 6:45 AM