This is needed for RFC6979 flag support.
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Advanced Search
Feb 7 2025
Feb 6 2025
Feb 3 2025
Jan 31 2025
The commit rC58c11aa8 is the improved version by k-ary exponentiation (while rC6dffd105e2e2 is 1-bit at a time) and using heap.
Jan 27 2025
Jan 25 2025
I created https://dev.gnupg.org/source/libgcrypt/history/gniibe%252Ft7490/
The commit rC6dffd105e2e2 works for me.
It is a bit of exponent at time Montgomery exponentiation.
I don't put an optimization for the reduction as I don't know if it's OK for patent-wise (looks like expired, though).
Jan 22 2025
Jan 21 2025
For command line, reported issues have been fixed; Confusions for wrong errors are gone, it correctly reports appropriate errors of:
- GPG_ERR_PIN_BLOCKED
- GPG_ERR_NO_RESET_CODE
- GPG_ERR_BAD_PIN
Do you think it's too difficult for a beginner to write a pinentry-gtk4?
Jan 20 2025
Reported gnupg channel on IRC.
An ascii armored file in question was: https://github.com/syncthing/syncthing/releases/download/v1.29.2/sha256sum.txt.asc
When CHECKCRC == 0 (no CRC), ->any_data was not set, resulted
no valid OpenPGP data found.
wrongly.
Jan 17 2025
Re-open, so that I can pursue constant-time modular exponentiation.
Jan 15 2025
Jan 14 2025
@werner I read the code of gpgme/src/posix-io.c. I understand the two points:
- For the correctness sake, the possible interrupted closefrom should be handled.
- we can share the code with closefrom case and non-closefrom case.
Jan 10 2025
One year later, I also did translation work for kleo and libkleo, which are pushed by Andre.
So, closing this task.
Fixed in 2.5.2.
Fixed in 2.5.3.
Fixed in 2.5.2.
Jan 9 2025
Jan 8 2025
Thank you for your report.
Jan 6 2025
Dec 30 2024
Thank you. Fixed in: rPb415f3108921: build: Fix warning about obsolete pinentry-emacs.
Dec 27 2024
Dec 23 2024
Dec 20 2024
This problem has gone in libgpg-error 1.51, since the implementation doesn't use environ any more.
Dec 19 2024
Dec 17 2024
Dec 16 2024
Here is a patch to support "w32_error" for assuan_sock_get_flag function.
It's a bug I introduced when fixing T7309.
Fixed in rGaa36f6ae8bae: gpg: Fix key generation with existing key from card.
Dec 13 2024
Dec 12 2024
IIUC, simpler solution would be modifying m4/socklen.m4 adding Solaris variant specific code.
Tweaking _XOPEN_SOURCE requires the change of Autoconf (if done correctly), which would be larger surgery.
Here are changes for gcry_md_open and its friends.
My idea in https://dev.gnupg.org/T7338#195529 doesn't work well when a function call is done multiple times.
Assuming SUCCESS, and marking all non-compliant places in the code works, and it would be good because libgcrypt so far maintains non-compliant path with rejection.
Dec 11 2024
Dec 10 2024
Dec 9 2024
Pushed the change for adding hash tests in rC7faf542f1573: fips,tests: Add t-digest.
Dec 6 2024
It seems that the internal API (as of 2024-12-06) is not enough.
Now, we have _gcry_md_hash_buffer function with the new FIPS service indicator.
It's used for public key crypto, too.
The compliance for hash function is a part of public key crypto, but not all.