Page MenuHome GnuPG
Feed Advanced Search

Jul 30 2023

aheinecke renamed T6618: Check that code signing chain is properly included in our signatures from Installer Exe Certificate Self-Signed to Check that code signing chain is properly included in our signatures.
Jul 30 2023, 6:39 PM · Bug Report, gpg4win
aheinecke reopened T6618: Check that code signing chain is properly included in our signatures as "Open".

Oh wait. That shows a Problem in our side. We should include the full chain in our signature. I am renaming your task and will at least investigate if we do or if that maybe changed the last time we updated the certificate. Which might have been after 4.0.3

Jul 30 2023, 6:38 PM · Bug Report, gpg4win
mrt22 added a comment to T6618: Check that code signing chain is properly included in our signatures.

OK, had to install the intermediary CA certificate from https://support.globalsign.com/ca-certificates/intermediate-certificates/code-signing-standard-ev-intermediate-certificates . For some reason it was missing from my system.
After installing things look good.

Jul 30 2023, 8:25 AM · Bug Report, gpg4win

Jul 28 2023

ikloecker changed the status of T6622: Kleopatra: Misleading result when decrypting clear signed message followed by public key block in notepad from Open to Testing.

Should be fixed.

Jul 28 2023, 4:56 PM · gpgme (gpgme 1.23.x), Bug Report, Restricted Project, kleopatra
werner raised the priority of T6622: Kleopatra: Misleading result when decrypting clear signed message followed by public key block in notepad from Normal to High.
Jul 28 2023, 4:47 PM · gpgme (gpgme 1.23.x), Bug Report, Restricted Project, kleopatra
ebo closed T6013: Kleopatra: Email address of CA is not set as recipient when sending new CSR by email as Resolved.

This works on Linux with KMail and with Claws (although with Claws the attachment is added twice).

Jul 28 2023, 2:22 PM · Restricted Project, kleopatra, Bug Report
gniibe changed the status of T6619: How to maintain our local libtool patch from Open to Testing.

Pushed the change to libgpg-error.

Jul 28 2023, 6:36 AM · gpgrt, Bug Report

Jul 27 2023

werner added a comment to T6619: How to maintain our local libtool patch.

That assumes that libtool won't change substantially as it did several times in the past and broke our cross compiling stuff. But as long as we keep the ltmain.sh in our repo and tarball the patch is okay because it better documents the chnages.

Jul 27 2023, 12:07 PM · gpgrt, Bug Report
gniibe added a comment to T6619: How to maintain our local libtool patch.

I learned that AC_CONFIG_COMMANDS macro can be used to improve the case of config.status.

Jul 27 2023, 9:53 AM · gpgrt, Bug Report
gniibe claimed T6619: How to maintain our local libtool patch.

How about the change like:

Jul 27 2023, 9:52 AM · gpgrt, Bug Report
gniibe created T6619: How to maintain our local libtool patch.
Jul 27 2023, 9:51 AM · gpgrt, Bug Report
aheinecke closed T6618: Check that code signing chain is properly included in our signatures as Invalid.

this is not true. Our installers are always signed, even the included binaries are mostly signed.

Jul 27 2023, 8:33 AM · Bug Report, gpg4win
mrt22 created T6618: Check that code signing chain is properly included in our signatures.
Jul 27 2023, 3:29 AM · Bug Report, gpg4win
Happyman0815 added a comment to T5709: Embedded images are seen as attachments after encrypting and decrypting.

Other options would be

  • to display a warning if there are inline images in the email.
  • an option not to automatically sign emails if they contain an inline image.
Jul 27 2023, 12:01 AM · Bug Report, gpg4win

Jul 26 2023

ebo closed T6492: Kleopatra: Entries in certificate drop-down are not sorted as Resolved.

works. Certificates are shown in alphabetical order to the user and expired subkeys are ignored for encryption even if they are newer.

Jul 26 2023, 11:45 AM · Restricted Project, kleopatra, Bug Report

Jul 25 2023

onickolay created T6615: v5 document signatures verification..
Jul 25 2023, 3:36 PM · Documentation, OpenPGP, Bug Report
gniibe changed the status of T5252: bad expiration value when using --batch Creation-Date/Expire-Date from Open to Testing.

Applied to 2.4.

Jul 25 2023, 4:25 AM · gnupg, Bug Report

Jul 24 2023

ebo moved T5732: Backport option reading in gpgconf to 2.2 from Restricted Project Column to Restricted Project Column on the Restricted Project board.
Jul 24 2023, 2:13 PM · Restricted Project, Bug Report, kleopatra, backport, gnupg (gpg22)
ebo moved T5800: gpgconf: Ignores keyserver option in gpgsm.conf from Restricted Project Column to Restricted Project Column on the Restricted Project board.
Jul 24 2023, 2:13 PM · Restricted Project, Bug Report, gnupg (gpg22)
ebo moved T6041: pinentry-qt dialog window no longer floats under Sway (fixed after 1.2.0) from Restricted Project Column to Restricted Project Column on the Restricted Project board.
Jul 24 2023, 2:12 PM · Restricted Project, pinentry, Bug Report
ebo moved T6174: Option --require-comliance does not work in sign+encrypt mode from Restricted Project Column to Restricted Project Column on the Restricted Project board.
Jul 24 2023, 2:12 PM · Restricted Project, OpenPGP, Bug Report, gnupg
taichi added a comment to T6595: libgpg-error: build failure on Windows.

I have built it according to the method described here.
(https://wiki.documentfoundation.org/Development/BuildingOnWindows)

Jul 24 2023, 1:41 PM · Cygwin, gpgrt, Bug Report
taichi added a comment to T6595: libgpg-error: build failure on Windows.
Jul 24 2023, 10:17 AM · Cygwin, gpgrt, Bug Report
werner triaged T6595: libgpg-error: build failure on Windows as Low priority.

I wonder why you mention Visual Studio and Cygwin? Either it is Cygwin or a native Windows build.

Jul 24 2023, 9:56 AM · Cygwin, gpgrt, Bug Report
gniibe added a project to T5252: bad expiration value when using --batch Creation-Date/Expire-Date: backport.
Jul 24 2023, 8:21 AM · gnupg, Bug Report

Jul 20 2023

gniibe added a comment to T6271: The old FSF address in libgcrypt source code.

Fixed in: rP66abf7cb1e1b: Update GPL2 for new FSF address. Use URL for license.

Jul 20 2023, 6:56 AM · Documentation, libgcrypt, Bug Report

Jul 19 2023

ebo closed T5697: Kleopatra: Crashes or hangs on circular certificate chains as Resolved.

works, tested with the provided example certs

Jul 19 2023, 4:36 PM · Restricted Project, kleopatra, Bug Report
ebo closed T6140: Kleopatra: F5 does not always work in smartcard dialog as Resolved.

information shows now up immediately, when the public key data is imported

Jul 19 2023, 3:25 PM · Restricted Project, kleopatra, Bug Report

Jul 13 2023

taichi created T6595: libgpg-error: build failure on Windows.
Jul 13 2023, 6:31 PM · Cygwin, gpgrt, Bug Report

Jul 12 2023

gniibe claimed T5252: bad expiration value when using --batch Creation-Date/Expire-Date.

Fixed in master.
Will backport into 2.4, after testing.

Jul 12 2023, 6:39 AM · gnupg, Bug Report

Jul 6 2023

thesamesam added a comment to T6579: gnupg-2.4.3 build failure.

Thanks. Wouldn't that require OpenLDAP on every system with gnupg?

Jul 6 2023, 1:58 AM · gnupg24 (gnupg-2.4.4), Gentoo, Bug Report

Jul 5 2023

werner added a project to T3927: gpgsm certificate import fails because of hardcoded password length limitation: gnupg24.

Actually it has been fixed for the PBES2 case in 2.2 and 2.4. PBES2 is used with AES128 and AES256. I doubt that there is any value in adding such support for the legacy RC2 and 3DES methods.

Jul 5 2023, 2:44 PM · Feature Request, gnupg24, S/MIME
werner raised the priority of T3927: gpgsm certificate import fails because of hardcoded password length limitation from Low to Normal.
Jul 5 2023, 2:35 PM · Feature Request, gnupg24, S/MIME
werner edited projects for T6536: Extend P12 parser for ShroudedKeyBag inside a CertBag, added: gnupg22 (gnupg-2.2.42); removed gnupg22.

Same for the backport to 2.2 which uses the same test suite.

Jul 5 2023, 2:31 PM · gnupg24 (gnupg-2.4.4), gnupg22 (gnupg-2.2.42), Bug Report, S/MIME, Restricted Project
werner changed the status of T6536: Extend P12 parser for ShroudedKeyBag inside a CertBag from Open to Testing.
Jul 5 2023, 2:30 PM · gnupg24 (gnupg-2.4.4), gnupg22 (gnupg-2.2.42), Bug Report, S/MIME, Restricted Project
werner moved T6536: Extend P12 parser for ShroudedKeyBag inside a CertBag from Backlog to WiP on the gnupg22 board.
Jul 5 2023, 2:23 PM · gnupg24 (gnupg-2.4.4), gnupg22 (gnupg-2.2.42), Bug Report, S/MIME, Restricted Project
werner added a comment to T6579: gnupg-2.4.3 build failure.

We should make building with LDAP mandatory.

Jul 5 2023, 10:14 AM · gnupg24 (gnupg-2.4.4), Gentoo, Bug Report
lyycheng created T6581: gpg encryption/decryption on Windows encounters occasional issues.
Jul 5 2023, 5:27 AM · kleopatra, Bug Report
gniibe changed the status of T6579: gnupg-2.4.3 build failure from Open to Testing.

Thank you for your report.

Jul 5 2023, 4:33 AM · gnupg24 (gnupg-2.4.4), Gentoo, Bug Report

Jul 4 2023

thesamesam created T6579: gnupg-2.4.3 build failure.
Jul 4 2023, 7:45 PM · gnupg24 (gnupg-2.4.4), Gentoo, Bug Report
werner edited projects for T6536: Extend P12 parser for ShroudedKeyBag inside a CertBag, added: gnupg24 (gnupg-2.4.3); removed gnupg24.

This was tested by me against the actual sample and the sample is now part of our internal regression test suite.

Jul 4 2023, 2:46 PM · gnupg24 (gnupg-2.4.4), gnupg22 (gnupg-2.2.42), Bug Report, S/MIME, Restricted Project
ebo added a comment to T6497: gpgtar does not return failure code to gpgme.

related to T6528

Jul 4 2023, 10:01 AM · gnupg22 (gnupg-2.2.42), gnupg24 (gnupg-2.4.2), Bug Report, Restricted Project

Jul 3 2023

ebo closed T6456: Kleopatra: Offers encryption-only OpenPGP keys as signing key as Resolved.

This works.

Jul 3 2023, 10:58 AM · gpgme (gpgme 1.23.x), Restricted Project, kleopatra, Bug Report
ebo merged T6569: unusable secret key selectable for crypto operations into T6456: Kleopatra: Offers encryption-only OpenPGP keys as signing key.
Jul 3 2023, 10:02 AM · gpgme (gpgme 1.23.x), Restricted Project, kleopatra, Bug Report

Jun 30 2023

ebo closed T5869: GpgOL: Sign requested without signing key shows error as Resolved.

This works, when sign is selected and no standard OpenPGP key for the mail address exists.

Jun 30 2023, 5:20 PM · Restricted Project, Bug Report, gpgol

Jun 29 2023

werner moved T6536: Extend P12 parser for ShroudedKeyBag inside a CertBag from WiP to QA on the gnupg24 board.
Jun 29 2023, 6:05 PM · gnupg24 (gnupg-2.4.4), gnupg22 (gnupg-2.2.42), Bug Report, S/MIME, Restricted Project

Jun 28 2023

werner added a comment to T6536: Extend P12 parser for ShroudedKeyBag inside a CertBag.

Partly done for 2.4. The cram-octet-string stuff is missing, though.

Jun 28 2023, 5:33 PM · gnupg24 (gnupg-2.4.4), gnupg22 (gnupg-2.2.42), Bug Report, S/MIME, Restricted Project
exoosh added a comment to T5760: Kleopatra hangs loading certificate cache on Windows 11.

Thanks for the suggested workaround, I am going to try that. And thanks for pointing out this could be related to something like a Yubikey attached. Having the same symptoms as those described in T4581 and here.

Jun 28 2023, 11:01 AM · Bug Report, gpg4win
exoosh added a comment to T4581: Kleopatra stuck in loading the certificate cache.

I have this regularly. Sometimes waiting helps and it loads after several minutes, sometimes shutting down Kleopatra is the only remedy (because after an hour and more it feels like it ended up in an infinite loop).

Jun 28 2023, 10:55 AM · gpg4win, kleopatra, Bug Report
gniibe changed the status of T6539: The digest&sign/verify API with SHAKE-class digests does not work from Open to Testing.

Add the check of digest algorithm for EdDSA in: rCd15fe6aac10b: cipher:ecc:fips: Only allow defined digest algo for EdDSA.

Jun 28 2023, 7:23 AM · libgcrypt, FIPS, Bug Report
gniibe added a comment to T6539: The digest&sign/verify API with SHAKE-class digests does not work.

No, there are use cases in GnuPG, where we specify the hash algo for signing, and our own tests/benchmark.c.

Jun 28 2023, 3:54 AM · libgcrypt, FIPS, Bug Report
gniibe added a comment to T6539: The digest&sign/verify API with SHAKE-class digests does not work.

For the first issue, I added a check in: rCf65c30d470f5: cipher:ecc:fips: Reject use of SHAKE when it's ECDSA with RFC6979.

Jun 28 2023, 3:52 AM · libgcrypt, FIPS, Bug Report

Jun 27 2023

werner added a project to T3927: gpgsm certificate import fails because of hardcoded password length limitation: gnupg22.

This has long been fixed in 2.4. Given that Libgcrypt has support for PBKDF2 we can back port this.

Jun 27 2023, 6:00 PM · Feature Request, gnupg24, S/MIME
Jakuje added a comment to T6539: The digest&sign/verify API with SHAKE-class digests does not work.

From the FIPS 186-5 there are some limitations to use the SHAKE in FIPS Mode that we will have to reflect:

Jun 27 2023, 5:22 PM · libgcrypt, FIPS, Bug Report

Jun 26 2023

werner claimed T6500: Keyserver access via http-proxy isn't attempted when using standard-resolver.
Jun 26 2023, 4:37 PM · gnupg, dns, Bug Report
ikloecker closed T6558: gpgtar: Does not stop spawned gpg process when exiting as Invalid.

Closing since the problem doesn't seem to occur if the operation is canceled properly.

Jun 26 2023, 12:15 PM · gnupg24, Restricted Project, gpgtar, Bug Report
ikloecker added a comment to T6558: gpgtar: Does not stop spawned gpg process when exiting.

Sorry about that. I tested an old build which didn't call gpgme_cancel_async and therefore probably didn't properly close the channels. It seems to work if gpgme_cancel_async is called to cancel the operation.

Jun 26 2023, 12:03 PM · gnupg24, Restricted Project, gpgtar, Bug Report
ikloecker added a comment to T6558: gpgtar: Does not stop spawned gpg process when exiting.

This option is already used. Running pgrep -a gpg in a loop (and ignoring gpg-agent processes) I get:

Mo 26. Jun 11:29:11 CEST 2023
19111 gpgtar --batch --status-fd 60 --gpg-args --no-tty --gpg-args --charset=utf8 --gpg-args --enable-progress-filter --gpg-args --exit-on-status-write-error --gpg-args --display=:0 --gpg-args --ttyname=/dev/pts/37 --gpg-args --ttytype=xterm-256color --decrypt --directory /tmp/kleopatra-JqIiXu/src -- /home/ingo/dev/g10/src.tar.gpg
19112 gpg --batch --status-fd=60 --output - --decrypt --no-tty --charset=utf8 --enable-progress-filter --exit-on-status-write-error --display=:0 --ttyname=/dev/pts/37 --ttytype=xterm-256color -- /home/ingo/dev/g10/src.tar.gpg
Jun 26 2023, 11:34 AM · gnupg24, Restricted Project, gpgtar, Bug Report
werner triaged T6558: gpgtar: Does not stop spawned gpg process when exiting as Normal priority.

Can you please test by adding --exit-on-status-write-error to the gpg invocation by gpgtar?

Jun 26 2023, 9:50 AM · gnupg24, Restricted Project, gpgtar, Bug Report

Jun 23 2023

ikloecker created T6558: gpgtar: Does not stop spawned gpg process when exiting.
Jun 23 2023, 4:33 PM · gnupg24, Restricted Project, gpgtar, Bug Report
werner triaged T6556: gpgtar: Removes existing output file on error as Normal priority.
Jun 23 2023, 10:10 AM · gnupg24 (gnupg-2.4.2), gnupg22 (gnupg-2.2.42), Restricted Project, gpgtar, Bug Report
gniibe added a comment to T6557: Support of SHAKE in MGF function of RSA.

Pushed a change in master.

Jun 23 2023, 6:00 AM · libgcrypt, FIPS, Bug Report
gniibe changed the status of T6557: Support of SHAKE in MGF function of RSA, a subtask of T6539: The digest&sign/verify API with SHAKE-class digests does not work, from Open to Testing.
Jun 23 2023, 6:00 AM · libgcrypt, FIPS, Bug Report
gniibe changed the status of T6557: Support of SHAKE in MGF function of RSA from Open to Testing.
Jun 23 2023, 6:00 AM · libgcrypt, FIPS, Bug Report
gniibe updated the task description for T6557: Support of SHAKE in MGF function of RSA.
Jun 23 2023, 3:28 AM · libgcrypt, FIPS, Bug Report
gniibe renamed T6557: Support of SHAKE in MGF function of RSA from Support of SHAKE in MGF1 function of RSA to Support of SHAKE in MGF function of RSA.
Jun 23 2023, 3:27 AM · libgcrypt, FIPS, Bug Report
gniibe triaged T6557: Support of SHAKE in MGF function of RSA as Normal priority.
Jun 23 2023, 2:41 AM · libgcrypt, FIPS, Bug Report

Jun 22 2023

ikloecker created T6556: gpgtar: Removes existing output file on error.
Jun 22 2023, 5:44 PM · gnupg24 (gnupg-2.4.2), gnupg22 (gnupg-2.2.42), Restricted Project, gpgtar, Bug Report
werner triaged T6554: Kleopatra: Reports success when gpgtar is kill with SIGTERM or SIGKILL while folder is encrypted as Normal priority.

Due to the double fork in gpgme we won't get the exit code which gpgtar emits. Possible actions in a signal handler are also limited; in particular we can't use stdio or estream. The only option to print a status line would we by using write directly. However, this might mess with the libassuan buffering. Thus, it is not a good idea to pkill gpgtar. Same is true for gpg and gpgsm.

Jun 22 2023, 4:30 PM · vsd33 (vsd-3.3.0), gpgme, kleopatra, gpgtar, Restricted Project, Bug Report
ikloecker renamed T6554: Kleopatra: Reports success when gpgtar is kill with SIGTERM or SIGKILL while folder is encrypted from Kleopatra: Reports success when gpgtar is kill with SIGTERM while folder is encrypted to Kleopatra: Reports success when gpgtar is kill with SIGTERM or SIGKILL while folder is encrypted.
Jun 22 2023, 4:29 PM · vsd33 (vsd-3.3.0), gpgme, kleopatra, gpgtar, Restricted Project, Bug Report
ikloecker created T6554: Kleopatra: Reports success when gpgtar is kill with SIGTERM or SIGKILL while folder is encrypted.
Jun 22 2023, 4:17 PM · vsd33 (vsd-3.3.0), gpgme, kleopatra, gpgtar, Restricted Project, Bug Report
werner moved T6536: Extend P12 parser for ShroudedKeyBag inside a CertBag from Backlog to WiP on the gnupg24 board.
Jun 22 2023, 9:21 AM · gnupg24 (gnupg-2.4.4), gnupg22 (gnupg-2.2.42), Bug Report, S/MIME, Restricted Project
gniibe added a comment to T6539: The digest&sign/verify API with SHAKE-class digests does not work.

I found the case of X.509, which also uses fixed length output for RSA-PSS and ECDSA: https://www.rfc-editor.org/rfc/rfc8692.html

Jun 22 2023, 7:29 AM · libgcrypt, FIPS, Bug Report

Jun 20 2023

Jakuje added a comment to T6539: The digest&sign/verify API with SHAKE-class digests does not work.

Thank you for having a look into that! The proposed patch looks good. Should we have this change also in master?

Jun 20 2023, 1:58 PM · libgcrypt, FIPS, Bug Report

Jun 19 2023

gniibe added a comment to T6539: The digest&sign/verify API with SHAKE-class digests does not work.

Here is a possible change (... to master, assuming it's good to support use case of RFC 8702):

diff --git a/cipher/keccak.c b/cipher/keccak.c
index 22c40302..76e08cb5 100644
--- a/cipher/keccak.c
+++ b/cipher/keccak.c
@@ -1630,8 +1630,8 @@ const gcry_md_spec_t _gcry_digest_spec_sha3_512 =
 const gcry_md_spec_t _gcry_digest_spec_shake128 =
   {
     GCRY_MD_SHAKE128, {0, 1},
-    "SHAKE128", shake128_asn, DIM (shake128_asn), oid_spec_shake128, 0,
-    shake128_init, keccak_write, keccak_final, NULL, keccak_extract,
+    "SHAKE128", shake128_asn, DIM (shake128_asn), oid_spec_shake128, 32,
+    shake128_init, keccak_write, keccak_final, keccak_read, keccak_extract,
     _gcry_shake128_hash_buffers,
     sizeof (KECCAK_CONTEXT),
     run_selftests
@@ -1639,8 +1639,8 @@ const gcry_md_spec_t _gcry_digest_spec_shake128 =
 const gcry_md_spec_t _gcry_digest_spec_shake256 =
   {
     GCRY_MD_SHAKE256, {0, 1},
-    "SHAKE256", shake256_asn, DIM (shake256_asn), oid_spec_shake256, 0,
-    shake256_init, keccak_write, keccak_final, NULL, keccak_extract,
+    "SHAKE256", shake256_asn, DIM (shake256_asn), oid_spec_shake256, 64,
+    shake256_init, keccak_write, keccak_final, keccak_read, keccak_extract,
     _gcry_shake256_hash_buffers,
     sizeof (KECCAK_CONTEXT),
     run_selftests
Jun 19 2023, 4:53 AM · libgcrypt, FIPS, Bug Report
gniibe added a comment to T6539: The digest&sign/verify API with SHAKE-class digests does not work.

Reading RFC 8702, I realized that it defines the hash size in the use of CMS as: SHAKE128 : 32-byte SHAKE256 : 64-byte.

Jun 19 2023, 4:47 AM · libgcrypt, FIPS, Bug Report
gniibe added a comment to T6539: The digest&sign/verify API with SHAKE-class digests does not work.

Applied rC8cdd0d353e19: cipher:pubkey: Check digest size which should not be zero. for 1.10.

Jun 19 2023, 4:36 AM · libgcrypt, FIPS, Bug Report

Jun 16 2023

werner added a subtask for T6540: gpgsm creates invalid CSR (invalid signature) when given invalid subject name: T6541: gpgsm incorrectly prompts "Possible actions for a RSA key:" and shows "Key-Length: 1024" when using nistp521r1 ECDSA key.
Jun 16 2023, 5:55 PM · gnupg24, S/MIME, Bug Report
werner added a parent task for T6541: gpgsm incorrectly prompts "Possible actions for a RSA key:" and shows "Key-Length: 1024" when using nistp521r1 ECDSA key: T6540: gpgsm creates invalid CSR (invalid signature) when given invalid subject name.
Jun 16 2023, 5:55 PM · gnupg24, S/MIME, Bug Report
werner triaged T6541: gpgsm incorrectly prompts "Possible actions for a RSA key:" and shows "Key-Length: 1024" when using nistp521r1 ECDSA key as Low priority.
Jun 16 2023, 5:55 PM · gnupg24, S/MIME, Bug Report
werner triaged T6540: gpgsm creates invalid CSR (invalid signature) when given invalid subject name as Normal priority.

Use Kleopatra which constructs the DN for you ;-).

Jun 16 2023, 5:52 PM · gnupg24, S/MIME, Bug Report
jjakob added a project to T6541: gpgsm incorrectly prompts "Possible actions for a RSA key:" and shows "Key-Length: 1024" when using nistp521r1 ECDSA key: Bug Report.
Jun 16 2023, 4:31 PM · gnupg24, S/MIME, Bug Report
jjakob created T6540: gpgsm creates invalid CSR (invalid signature) when given invalid subject name.
Jun 16 2023, 4:27 PM · gnupg24, S/MIME, Bug Report
gniibe claimed T6539: The digest&sign/verify API with SHAKE-class digests does not work.
Jun 16 2023, 9:36 AM · libgcrypt, FIPS, Bug Report
gniibe added a comment to T6539: The digest&sign/verify API with SHAKE-class digests does not work.

I found this use case: RFC 8702
"Use of the SHAKE One-Way Hash Functions in the Cryptographic Message Syntax (CMS)": https://www.rfc-editor.org/rfc/rfc8702.html

Jun 16 2023, 9:35 AM · libgcrypt, FIPS, Bug Report
gniibe added a comment to T6539: The digest&sign/verify API with SHAKE-class digests does not work.

Another possibility for digest&sign API: it is possible to determine the length of required hash function by the underlining field Fp of the curve in use. Then, use this length instead. It's better than to (try to) get the length by _gcry_md_get_algo_dlen (for SHAKE, it's undefined).

Jun 16 2023, 9:16 AM · libgcrypt, FIPS, Bug Report
gniibe changed the status of T6507: SCRYPT does not work in FIPS mode from Open to Testing.

Fixed in both of master and 1.10 branch.

Jun 16 2023, 8:11 AM · libgcrypt, FIPS, Bug Report
gniibe changed the status of T6515: GPG in FIPS mode spits out useless "out of core handler ignored in FIPS mode" message on every execution from Open to Testing.
Jun 16 2023, 7:28 AM · FIPS, Bug Report
gniibe claimed T6515: GPG in FIPS mode spits out useless "out of core handler ignored in FIPS mode" message on every execution.

For libgcrypt, initially when the code was put, it made some sense.
Now, it's useless, so, let's simply remove the message.

Jun 16 2023, 7:28 AM · FIPS, Bug Report
gniibe changed the status of T6511: EdDSA support in FIPS mode from Open to Testing.

Added: rC547dfb5aecc1: cipher:ecc: Add selftests for EdDSA.
Added: rC3ac2bba4a4b1: cipher:ecc: Implement PCT for EdDSA.

Jun 16 2023, 7:12 AM · FIPS, libgcrypt, Bug Report

Jun 15 2023

Jakuje created T6539: The digest&sign/verify API with SHAKE-class digests does not work.
Jun 15 2023, 5:34 PM · libgcrypt, FIPS, Bug Report

Jun 14 2023

werner added a project to T6536: Extend P12 parser for ShroudedKeyBag inside a CertBag: Bug Report.
Jun 14 2023, 12:39 PM · gnupg24 (gnupg-2.4.4), gnupg22 (gnupg-2.2.42), Bug Report, S/MIME, Restricted Project
gniibe added a comment to T6511: EdDSA support in FIPS mode.

I found that for EdDSA other than pure Ed25519, it can supply context.
I changed the semantics and API for adding context and input data, as we need to support both simultaneously.

Jun 14 2023, 7:49 AM · FIPS, libgcrypt, Bug Report
gniibe added a comment to T6511: EdDSA support in FIPS mode.

I changed the lg-input-data.diff patch not to break the ABI, reusing the published symbol of gcry_pk_random_override_new.
With this approach, if/when needed, backporting may be easier.
Drawback is debugging internal of libgcrypt will be a bit confusing.

Jun 14 2023, 4:50 AM · FIPS, libgcrypt, Bug Report

Jun 13 2023

werner triaged T6535: Failure to export plaintext v5 secret key. as Normal priority.
Jun 13 2023, 7:41 PM · gnupg24, Bug Report
werner added a project to T6535: Failure to export plaintext v5 secret key.: gnupg24.

Thanks, we will take care of this.

Jun 13 2023, 7:41 PM · gnupg24, Bug Report
onickolay updated the task description for T6535: Failure to export plaintext v5 secret key..
Jun 13 2023, 2:43 PM · gnupg24, Bug Report
onickolay created T6535: Failure to export plaintext v5 secret key..
Jun 13 2023, 2:42 PM · gnupg24, Bug Report
werner added a comment to T6515: GPG in FIPS mode spits out useless "out of core handler ignored in FIPS mode" message on every execution.

Let's fix this in Libgcrypt (ignore setting of the handler)

Jun 13 2023, 11:19 AM · FIPS, Bug Report
Jakuje added a comment to T6511: EdDSA support in FIPS mode.

Another approach would be having "non-hash" algo for gcry_md_open.

Jun 13 2023, 9:53 AM · FIPS, libgcrypt, Bug Report