Page MenuHome GnuPG
Feed Advanced Search

Oct 23 2018

t8m created T4212: Uninitialized use of l1 variable in _gcry_sexp_vextract_param in the S1 Public space.
Oct 23 2018, 3:20 PM · Bug Report, libgcrypt
t8m created T4211: Potential memory leak in _gcry_secmem_malloc_internal in the S1 Public space.
Oct 23 2018, 3:13 PM · libgcrypt
t8m added a project to T4210: Potential memory leak in ecc_encrypt_raw: libgcrypt.
Oct 23 2018, 3:11 PM · libgcrypt
t8m added a project to T4209: Potential memory leak in _gcry_ecc_eddsa_verify: libgcrypt.
Oct 23 2018, 2:27 PM · libgcrypt
t8m created T4208: Copy & paste error in libgcrypt ecc-curves.c in the S1 Public space.
Oct 23 2018, 1:52 PM · Bug Report, libgcrypt

Oct 16 2018

gniibe changed the status of T3283: Set 'mym4_revision' to 0 if not a git repo from Open to Testing.

Done for libgcrypt, finally.

Oct 16 2018, 7:49 AM · libgcrypt, Bug Report
gniibe removed a project from T3283: Set 'mym4_revision' to 0 if not a git repo: ntbtls.

ntbtls adopts the way from the beginning.

Oct 16 2018, 7:24 AM · libgcrypt, Bug Report
gniibe changed External Link from https://lists.gnupg.org/pipermail/gcrypt-devel/2017-July/004215.html to https://lists.gnupg.org/pipermail/gcrypt-devel/2017-January/004080.html on T3283: Set 'mym4_revision' to 0 if not a git repo.
Oct 16 2018, 7:19 AM · libgcrypt, Bug Report

Oct 11 2018

gniibe triaged T4068: libgcrypt 1.8.3 make check errors as Normal priority.
Oct 11 2018, 2:51 AM · Documentation, libgcrypt
gniibe added a comment to T4068: libgcrypt 1.8.3 make check errors.

Please check your ld.so (dynamic linker) setting (/etc/ld.so.conf and/or LD_LIBRARY_PATH).

Oct 11 2018, 2:07 AM · Documentation, libgcrypt

Oct 10 2018

gniibe removed a project from T3283: Set 'mym4_revision' to 0 if not a git repo: gpgme.

Done for gpgme.

Oct 10 2018, 6:49 AM · libgcrypt, Bug Report

Oct 9 2018

dkg added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

What are the next steps here? i confess i'm a little tired of doing regular checkins on this issue, and i'm sure other people are tired of me nagging. What can we do to move this along?

Oct 9 2018, 6:39 PM · libgcrypt, gnupg

Sep 12 2018

gniibe added a comment to T3189: secmem routines should be in libgpg-error as gpgrt_*.

secmem routines are installed into gniibe/secmem branch.
Please note that it's only secmem routines, not malloc_secure.

Sep 12 2018, 5:45 AM · gpgrt, libgcrypt

Sep 11 2018

gniibe closed T3877: not all malloc performed in libgcrypt covered by gcry_set_allocation_handler as Resolved.
Sep 11 2018, 1:34 PM · libgcrypt, Bug Report

Sep 8 2018

werner claimed T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

Thanks for your comments, Stephan.

Sep 8 2018, 11:13 AM · libgcrypt, gnupg

Sep 7 2018

dkg added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

@aheinecke -- @smueller_chronox.de (author of the comment above) is Stephan Müller from atsec. Glad to see he seems ok with the proposal :)

Sep 7 2018, 9:49 PM · libgcrypt, gnupg
smueller_chronox.de added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

Apologies for not having read all comments in this long thread. I was asked to comment on the patch, so here is my comment:

Sep 7 2018, 5:41 PM · libgcrypt, gnupg

Sep 6 2018

gniibe claimed T3189: secmem routines should be in libgpg-error as gpgrt_*.

I created gniibe/secmem branch for this.
https://dev.gnupg.org/source/libgpg-error/history/gniibe%252Fsecmem/

Sep 6 2018, 3:20 AM · gpgrt, libgcrypt

Sep 5 2018

dkg added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

well, i tried to push, anyway, but it looks like playfair is rejecting my pushes:

Sep 5 2018, 4:54 PM · libgcrypt, gnupg
dkg added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

@werner -- yes, i am asking for a change that is specific to the way that gcrypt interacts with the Linux kernel. The minor patch i've proposed only affects a codeblock within #if defined(__linux__), so i don't believe it would have an effect on other Unices. I hope that people working with other kernels will propose any necessary fixes for them.

Sep 5 2018, 4:46 PM · libgcrypt, gnupg

Aug 24 2018

werner added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

@kallisti5: For you server you can add only_urandom to random.conf when changing to a multiuser runlevel and remove it early at startup and termination.

Aug 24 2018, 5:46 PM · libgcrypt, gnupg
werner added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

/dev/random, RDRAND, etc involves a lot of political arguments and thus it is not easy to decide what to do. What you are calling for is a linux kernel specific code path (note that rndlinux is used by most Unices) and won't be helpful for other OSes. I am of course willing to do add specific for for a few widespread OSes (and in any case for Debian). It is a major change and thus does not belong into 1.8 - I am fine with master which Debian might want to backport.

Aug 24 2018, 5:40 PM · libgcrypt, gnupg

Aug 23 2018

aheinecke added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

Well, Werner is just back so he can say more.
An excellent reviewer was Stephan Müller from atsec. He is also involved a bit afaik in the kernel random development.

Aug 23 2018, 8:38 PM · libgcrypt, gnupg
dkg added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

@aheinecke thanks for the followup!

Aug 23 2018, 5:59 PM · libgcrypt, gnupg

Aug 21 2018

werner triaged T4102: libgcrypt: yat2m does not respect SOURCE_DATE_EPOCH, patch included as Normal priority.

We are moving to use the yat2m from gpgrt (libgpg-error); thus the additional tag.

Aug 21 2018, 5:23 PM · gpgrt, libgcrypt, Bug Report

Aug 15 2018

hoebjo created T4102: libgcrypt: yat2m does not respect SOURCE_DATE_EPOCH, patch included.
Aug 15 2018, 11:15 PM · gpgrt, libgcrypt, Bug Report

Aug 6 2018

aheinecke added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

I think that the ultimate decision here lies with Werner. Additional review.
I think the biggest obstacle is that we don't want to change the random gathering code if it can be avoided and that the random code has been thoroughly reviewed / tested and is currently considered secure.

Aug 6 2018, 10:02 AM · libgcrypt, gnupg

Aug 2 2018

dkg added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

This bug report has been around for several months now. it has a simple patch, a clear explanation, a report of running code, and examples of problems it solves.

Aug 2 2018, 7:34 PM · libgcrypt, gnupg

Jul 26 2018

droidmonkey added a comment to T4084: Transition Windows RNG to use BCryptGenRandom .

Good to know, no problem, just wanted to document it just in case they do remove the API entirely in the future.

Jul 26 2018, 5:26 AM · libgcrypt, Feature Request

Jul 23 2018

werner triaged T4084: Transition Windows RNG to use BCryptGenRandom as Wishlist priority.

CryptGenRandom is only used as an additional source of entropy and doesn't count towards our entropy estimation. Thus whether it is used of not does not make any difference. Our main entropy source is meanwhile the jitter based RNG. Thus your request will receive a low priority.

Jul 23 2018, 2:30 PM · libgcrypt, Feature Request

Jul 22 2018

dkg added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

I've now run the proposed patch on a GNU/Linux system where the kernel's RNG is initialized but /proc/sys/kernel/random/entropy_avail shows numbers below 100, and i can confirm that 3072-bit RSA key generation takes roughly 0.8 seconds: 20 sequential default --quick-keygen operations (each creating two secret keys) took ~32s.

Jul 22 2018, 7:54 AM · libgcrypt, gnupg
dkg added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

Here is another example of users doing sketchy things to try to "fix" this process:

Jul 22 2018, 5:28 AM · libgcrypt, gnupg
dkg added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

Here is an example of the kinds of UI/UX mystery that users face while this decision is unresolved:

Jul 22 2018, 5:22 AM · libgcrypt, gnupg

Jul 21 2018

droidmonkey created T4084: Transition Windows RNG to use BCryptGenRandom .
Jul 21 2018, 12:36 AM · libgcrypt, Feature Request

Jul 17 2018

gniibe updated the task description for T3982: libgcrypt.m4 is not multilib friendly.
Jul 17 2018, 9:56 AM · libgcrypt, Bug Report

Jul 16 2018

werner closed T4027: npth 1.6, a subtask of T3283: Set 'mym4_revision' to 0 if not a git repo, as Resolved.
Jul 16 2018, 9:49 AM · libgcrypt, Bug Report

Jul 12 2018

gniibe removed a project from T3283: Set 'mym4_revision' to 0 if not a git repo: npth.

Done for npth.

Jul 12 2018, 12:20 AM · libgcrypt, Bug Report

Jul 10 2018

werner added a project to T4068: libgcrypt 1.8.3 make check errors: libgcrypt.
Jul 10 2018, 6:45 PM · Documentation, libgcrypt

Jul 9 2018

gniibe closed T3915: Allow building with Clang on MIPS64 as Resolved.
Jul 9 2018, 9:22 AM · libgcrypt, Bug Report

Jul 2 2018

kallisti5 added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

User input, anything to solve the lack of entropy on servers would be *great*. We have a bunch of buildbot workers we would *love* to have sign their artifacts... however we end up (unsuccessfully) doing stupid things like this to try and drive up entropy as a non-root user:

Jul 2 2018, 8:46 PM · libgcrypt, gnupg
anarcat added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

Looking at the table in random(7) it seems clear to me that what we want to just invoke getrandom() with no arguments. This blocks until the kernel's PRNG has been adequately seeded, but once seeded it doesn't block, while still pulling from an unbreakably-strong PRNG. this is the best-of-both-worlds situation that we want.

Changing the GnuPG long-term (and short-term) key generation techniques to use this approach might require coordination with gcrypt. gcrypt's gcry_random_level currently has GCRY_WEAK_RANDOM and GCRY_STRONG_RANDOM and GCRY_VERY_STRONG_RANDOM, which doesn't represent the nuance described above.

One approach might be to just have gcrypt on Linux treat all values of gcry_random_level the same, and use getrandom() for all of them.

Jul 2 2018, 5:24 PM · libgcrypt, gnupg
dkg added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

ping again…

Jul 2 2018, 4:47 PM · libgcrypt, gnupg

Jun 20 2018

gniibe added a subtask for T3283: Set 'mym4_revision' to 0 if not a git repo: T4027: npth 1.6.
Jun 20 2018, 10:06 AM · libgcrypt, Bug Report

Jun 19 2018

dkg added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

could i get feedback on this ticket? a simple, clean patch is available, and i don't understand what is blocking it.

Jun 19 2018, 4:32 PM · libgcrypt, gnupg

Jun 14 2018

olf added a comment to T4016: Libgcrypt release 1.8.3.

Thanks.
So what I remembered was 1 year and 1 month off the real EOL date.

Jun 14 2018, 1:21 AM · Release Info, CVE, libgcrypt

Jun 13 2018

werner closed T4011: CVE-2018-0495 as Resolved.
Jun 13 2018, 6:33 PM · CVE, libgcrypt
werner added a comment to T4011: CVE-2018-0495.

Here is our announcement: https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000426.html

Jun 13 2018, 6:32 PM · CVE, libgcrypt
werner added a comment to T4011: CVE-2018-0495.

https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/

Jun 13 2018, 5:40 PM · CVE, libgcrypt
gniibe added a comment to T4011: CVE-2018-0495.

Informed Debian security team about our change of libgcrypt.

Jun 13 2018, 1:02 PM · CVE, libgcrypt
werner changed the visibility for T4011: CVE-2018-0495.
Jun 13 2018, 12:40 PM · CVE, libgcrypt
werner added a comment to T4011: CVE-2018-0495.

A new installer for GnuPG with Libgcrypt 1.8.3 is now available.

Jun 13 2018, 12:38 PM · CVE, libgcrypt
werner added a comment to T4011: CVE-2018-0495.

Releases are now available. Next task is to build a new GnuPG Windows installer.

Jun 13 2018, 10:40 AM · CVE, libgcrypt
werner closed T4016: Libgcrypt release 1.8.3 as Resolved.

1.8.3 and 1.7.10 are now released. Announcement will follow later the day.

Jun 13 2018, 10:39 AM · Release Info, CVE, libgcrypt
werner closed T4016: Libgcrypt release 1.8.3, a subtask of T4011: CVE-2018-0495, as Resolved.
Jun 13 2018, 10:39 AM · CVE, libgcrypt
gniibe added a comment to T4011: CVE-2018-0495.

Pushed fixes to the repository at 16:00+0900 (09:00+0200). It's 0700Z.

Jun 13 2018, 9:05 AM · CVE, libgcrypt
gniibe added a comment to T4011: CVE-2018-0495.

In master, it's

commit 9010d1576e278a4274ad3f4aa15776c28f6ba965
Author: NIIBE Yutaka <gniibe@fsij.org>
Date:   Wed Jun 13 15:28:58 2018 +0900
Jun 13 2018, 8:59 AM · CVE, libgcrypt
werner updated the task description for T4016: Libgcrypt release 1.8.3.
Jun 13 2018, 8:07 AM · Release Info, CVE, libgcrypt
werner added a comment to T4016: Libgcrypt release 1.8.3.

1.8.3 has not yet been released and thus there is no NEWS entries and there can't be a 1.8.3 tag. You are right that the README still says 1.7. I'll fix that for 1.8.3. Why do you think maintenance of 1.7 stopped; the AUTHORS file and the new EOL statements on the download page say that we are going to maintain it until 2019-06-30.

Jun 13 2018, 8:06 AM · Release Info, CVE, libgcrypt

Jun 12 2018

werner updated subscribers of T4011: CVE-2018-0495.

Publication is planned for the 13th, 1500Z

Jun 12 2018, 1:12 PM · CVE, libgcrypt

Jun 11 2018

olf added a comment to T4016: Libgcrypt release 1.8.3.

I just noticed, that a tag for Libgcrypt 1.8.3 seems to be missing: https://dev.gnupg.org/source/libgcrypt/tags/LIBGCRYPT-1.8-BRANCH/

Jun 11 2018, 11:36 PM · Release Info, CVE, libgcrypt
werner added a project to T4016: Libgcrypt release 1.8.3: Release Info.
Jun 11 2018, 9:58 AM · Release Info, CVE, libgcrypt
werner changed the edit policy for T4016: Libgcrypt release 1.8.3.
Jun 11 2018, 9:55 AM · Release Info, CVE, libgcrypt

Jun 9 2018

dkg added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

I've heard no critique of the logic above. could we get this fix landed? it is concretely useful for doing key generation on modern GNU/Linux systems.

Jun 9 2018, 12:03 AM · libgcrypt, gnupg

Jun 8 2018

werner added a project to T4011: CVE-2018-0495: CVE.
Jun 8 2018, 10:15 AM · CVE, libgcrypt
werner updated the task description for T4011: CVE-2018-0495.
Jun 8 2018, 10:12 AM · CVE, libgcrypt
werner changed the edit policy for T4011: CVE-2018-0495.
Jun 8 2018, 9:50 AM · CVE, libgcrypt

May 15 2018

werner triaged T3982: libgcrypt.m4 is not multilib friendly as Normal priority.
May 15 2018, 1:18 PM · libgcrypt, Bug Report

May 8 2018

gniibe lowered the priority of T3731: gcry_pk_genkey() segfaults for ecdsa 384 from High to Normal.

I changed the priority to 'Normal'. The problem now is not the libssh usage, but how we can assume use of secure memory by random generator(s).

May 8 2018, 2:07 AM · libgcrypt, Bug Report
gniibe added a comment to T3731: gcry_pk_genkey() segfaults for ecdsa 384.

By libssh upstream, the problem has been fixed: commit-72f6b34

May 8 2018, 2:01 AM · libgcrypt, Bug Report

May 7 2018

gniibe added a comment to T3731: gcry_pk_genkey() segfaults for ecdsa 384.

Here is the function:
https://git.libssh.org/projects/libssh.git/tree/src/dh.c#n227

May 7 2018, 9:18 AM · libgcrypt, Bug Report
werner added a comment to T3731: gcry_pk_genkey() segfaults for ecdsa 384.

Am I right to assume that the test suite is terminating and restarting libgcrypt? Although we have features for this, I am still not convinced that this is a proper use of libgcrypt. There are just too many cases how this can fail. Unix is not designed to use shared libraries in so-called "plugins". I need to look closer at the libssh code.

May 7 2018, 8:27 AM · libgcrypt, Bug Report
gniibe added a comment to T3731: gcry_pk_genkey() segfaults for ecdsa 384.

It would be better not to require gcry_control(GCRYCTL_CLOSE_RANDOM_DEVICE). Automatic handling through gcry_control(GCRYCTL_TERM_SECMEM) would be better.

May 7 2018, 2:32 AM · libgcrypt, Bug Report
gniibe added a comment to T3731: gcry_pk_genkey() segfaults for ecdsa 384.

The patch D461 makes gcry_control(GCRYCTL_CLOSE_RANDOM_DEVICE) free the allocated secure memory.

May 7 2018, 1:53 AM · libgcrypt, Bug Report
gniibe added a comment to T3731: gcry_pk_genkey() segfaults for ecdsa 384.

It assumes a change of libssh like:

May 7 2018, 1:52 AM · libgcrypt, Bug Report
gniibe added a comment to T3731: gcry_pk_genkey() segfaults for ecdsa 384.

Here is my patch: D461: jent random requires finalizer to deallocate secure memory

May 7 2018, 1:51 AM · libgcrypt, Bug Report

Apr 17 2018

werner triaged T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms as Normal priority.
Apr 17 2018, 8:34 PM · libgcrypt, gnupg
werner closed T3764: AES-GCM bug for len(IV) != 96 as Resolved.

I backported the fix for 1.8.3.

Apr 17 2018, 8:23 PM · libgcrypt, Bug Report
werner closed T3408: keccak_permute_32.h : error: 'asm' operand requires impossible reload as Resolved.

Cherry-picked this for 1.8.3.

Apr 17 2018, 8:14 PM · libgcrypt, Bug Report
werner removed a project from T3491: FIPS-enabled libgcrypt traps gnome-keyring daemon in an infinite loop: Bug Report.
Apr 17 2018, 8:07 PM · libgcrypt
werner triaged T3491: FIPS-enabled libgcrypt traps gnome-keyring daemon in an infinite loop as Low priority.

FIPS rules changed anyway and thus more rework will be needed anyway. I keep this open at low priorirty.

Apr 17 2018, 8:06 PM · libgcrypt
loader added a comment to T3915: Allow building with Clang on MIPS64.

Thank you :)

Apr 17 2018, 5:27 PM · libgcrypt, Bug Report
werner added a comment to T3915: Allow building with Clang on MIPS64.

Thanks. I only now noticed that this is the same as we already use for 32 bit MIPS. I have no more questions. Will push to master and the 1.8 branch.

Apr 17 2018, 5:24 PM · libgcrypt, Bug Report
loader added a comment to T3915: Allow building with Clang on MIPS64.

Clang doesn't support the "h" inline asm constraint and the C version of umul_ppmm() works on MIPS64.

Apr 17 2018, 5:11 PM · libgcrypt, Bug Report
werner triaged T3915: Allow building with Clang on MIPS64 as Normal priority.
Apr 17 2018, 3:55 PM · libgcrypt, Bug Report
werner added a comment to T3915: Allow building with Clang on MIPS64.

Your patch indicates that all clang versions for MIPS64 support this feature. Is my reading correct?

Apr 17 2018, 3:55 PM · libgcrypt, Bug Report
loader created T3915: Allow building with Clang on MIPS64.
Apr 17 2018, 2:53 PM · libgcrypt, Bug Report

Apr 16 2018

bernhard added a comment to T3904: Clarify suggestion for diskperf.

Got the question about this note from a user (in a internal email) and I see the problem that users do not have enough information to decide this. They do not know what the consequences of this note are (and suspect it to be the cause of error of they see it together with other problems). So to me it is more than a 'wish' as it will generate questions and leaves users in a situation where they cannot progress by their own in most of the situations.

Apr 16 2018, 12:00 PM · Windows, libgcrypt
werner triaged T3904: Clarify suggestion for diskperf as Wishlist priority.
Apr 16 2018, 11:41 AM · Windows, libgcrypt
werner added a comment to T3904: Clarify suggestion for diskperf.

It is not an error or even a warning but just a NOTE. Thus the user should decide. it is not even translated and most systems this is enabled anyway.

Apr 16 2018, 11:41 AM · Windows, libgcrypt
gniibe claimed T3731: gcry_pk_genkey() segfaults for ecdsa 384.
Apr 16 2018, 10:24 AM · libgcrypt, Bug Report

Apr 14 2018

dkg added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

See also Filippo Valsorda's 32c3 talk about CSPRNGs.

Apr 14 2018, 6:45 PM · libgcrypt, gnupg
dkg added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

@gouttegd : setting only-urandom at the distro level problematic due to two factors:

Apr 14 2018, 6:42 PM · libgcrypt, gnupg

Apr 13 2018

gouttegd added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

@dkg : Can’t this be solved at the distribution level? I assume the packager/maintainer for Libgcrypt on a given distribution should know whether the getrandom syscall is available on said distribution, so he could install a /etc/gcrypt/random.conf file with the only-urandom option.

Apr 13 2018, 11:38 PM · libgcrypt, gnupg
dkg added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

Werner wrote:

we already use the getrandom system call if it is available

Apr 13 2018, 9:05 PM · libgcrypt, gnupg
bernhard updated the task description for T3904: Clarify suggestion for diskperf.
Apr 13 2018, 3:27 PM · Windows, libgcrypt
bernhard created T3904: Clarify suggestion for diskperf in the S1 Public space.
Apr 13 2018, 3:26 PM · Windows, libgcrypt
gniibe added a comment to T3878: not all calloc performed in libgcrypt covered by gcry_set_allocation_handler.

I am currently considering improvement of finalizer of libgcrypt, so, this matters.
Looking code, it would be better not to allocate and free the constant,
but use compile time constant data in .text section; Something like: const unsigned char ctr_null[DBRG_CTR_NULL_LEN].

Apr 13 2018, 4:17 AM · libgcrypt, Bug Report

Apr 11 2018

werner added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

To clarify: We already use the getrandom system call if it is available. To map /dev/random to /dev/urandom you can create a file /etc/gcrypt/random.conf with this line:

Apr 11 2018, 8:55 PM · libgcrypt, gnupg
dkg created T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.
Apr 11 2018, 8:01 PM · libgcrypt, gnupg
gniibe changed the status of T3877: not all malloc performed in libgcrypt covered by gcry_set_allocation_handler from Open to Testing.
Apr 11 2018, 1:52 AM · libgcrypt, Bug Report