Page MenuHome GnuPG
Feed Advanced Search

May 6 2022

gniibe moved T5918: Disable RSA PKCS #1.5 encryption in FIPS mode from Next to Ready for release on the FIPS board.
May 6 2022, 2:31 AM · backport, libgcrypt, FIPS, Bug Report

May 5 2022

werner triaged T5964: gnupg should use the KDFs implemented in libgcrypt as Normal priority.

When we implemented this first, Libgcrypt had no appropriate KDF support. I recall that I considered to change this but it turned out the for 2.2 the changes are too large. For 2.3 we will consider such a change.

May 5 2022, 8:40 AM · gnupg26, FIPS, libgcrypt, Feature Request

May 4 2022

Jakuje created T5964: gnupg should use the KDFs implemented in libgcrypt.
May 4 2022, 3:16 PM · gnupg26, FIPS, libgcrypt, Feature Request

May 3 2022

gniibe added a project to T5933: libgcrypt: Simply use BSS (not secure heap) for DRBG instance: backport.
May 3 2022, 11:22 AM · backport, FIPS, libgcrypt
werner added a project to T5919: libgcrypt tests/basic.c and tests/keygen.c occasionally fail with "error generating RSA key: Number is not prime": backport.
May 3 2022, 11:21 AM · backport, FIPS, libgcrypt, Bug Report
werner added a project to T5918: Disable RSA PKCS #1.5 encryption in FIPS mode: backport.
May 3 2022, 11:17 AM · backport, libgcrypt, FIPS, Bug Report
gniibe moved T5933: libgcrypt: Simply use BSS (not secure heap) for DRBG instance from Backlog to Next on the FIPS board.
May 3 2022, 10:58 AM · backport, FIPS, libgcrypt
gniibe added a project to T5918: Disable RSA PKCS #1.5 encryption in FIPS mode: Restricted Project.
May 3 2022, 10:49 AM · backport, libgcrypt, FIPS, Bug Report
gniibe added a project to T5919: libgcrypt tests/basic.c and tests/keygen.c occasionally fail with "error generating RSA key: Number is not prime": Restricted Project.
May 3 2022, 10:48 AM · backport, FIPS, libgcrypt, Bug Report
gniibe added a project to T5933: libgcrypt: Simply use BSS (not secure heap) for DRBG instance: Restricted Project.
May 3 2022, 10:46 AM · backport, FIPS, libgcrypt

Apr 25 2022

werner triaged T5946: Make gcry_mpi_cmp more robust for opaque mpis as Normal priority.
Apr 25 2022, 3:10 PM · libgcrypt, Bug Report

Apr 20 2022

neverpanic added a comment to T5919: libgcrypt tests/basic.c and tests/keygen.c occasionally fail with "error generating RSA key: Number is not prime".

Feedback from the lab is that they'd recommend returning a specific error code that indicates that the prime search failed and then relying on the caller to decide whether to loop or bubble up the error. I'm not sure who we would consider to be the "caller" of the relevant generation function in this case, though.

Apr 20 2022, 12:06 PM · backport, FIPS, libgcrypt, Bug Report
werner triaged T5918: Disable RSA PKCS #1.5 encryption in FIPS mode as High priority.
Apr 20 2022, 8:45 AM · backport, libgcrypt, FIPS, Bug Report
werner triaged T5933: libgcrypt: Simply use BSS (not secure heap) for DRBG instance as Normal priority.

Full ack.

Apr 20 2022, 8:45 AM · backport, FIPS, libgcrypt
gniibe added a comment to T5933: libgcrypt: Simply use BSS (not secure heap) for DRBG instance.

Here is my proposal patch:

diff --git a/random/random-drbg.c b/random/random-drbg.c
index 5a46fd92..f1cfe286 100644
--- a/random/random-drbg.c
+++ b/random/random-drbg.c
@@ -341,6 +341,9 @@ enum drbg_prefixes
  * Global variables
  ***************************************************************/
Apr 20 2022, 2:39 AM · backport, FIPS, libgcrypt
gniibe created T5933: libgcrypt: Simply use BSS (not secure heap) for DRBG instance.
Apr 20 2022, 2:37 AM · backport, FIPS, libgcrypt

Apr 19 2022

jukivili closed T5913: libgcrypt: bug fix for PPC bulk AES-GCM acceleratieration, missing HWF_PPC_ARCH_3_10 in HW feature as Resolved.
Apr 19 2022, 5:59 PM · ppc, libgcrypt
gniibe moved T5918: Disable RSA PKCS #1.5 encryption in FIPS mode from Backlog to Next on the FIPS board.
Apr 19 2022, 11:27 AM · backport, libgcrypt, FIPS, Bug Report
gniibe claimed T5918: Disable RSA PKCS #1.5 encryption in FIPS mode.
Apr 19 2022, 11:27 AM · backport, libgcrypt, FIPS, Bug Report
gniibe moved T5919: libgcrypt tests/basic.c and tests/keygen.c occasionally fail with "error generating RSA key: Number is not prime" from Backlog to Next on the FIPS board.
Apr 19 2022, 11:07 AM · backport, FIPS, libgcrypt, Bug Report
gniibe claimed T5919: libgcrypt tests/basic.c and tests/keygen.c occasionally fail with "error generating RSA key: Number is not prime".
Apr 19 2022, 11:01 AM · backport, FIPS, libgcrypt, Bug Report
neverpanic added a comment to T5919: libgcrypt tests/basic.c and tests/keygen.c occasionally fail with "error generating RSA key: Number is not prime".

That sounds reasonable. The FIPS 186-5 draft (https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-5-draft.pdf) covers this in section A.1.3, although I'm not quite sure why a lower bound for p was chosen compared to q. The comment that seems to have triggered this change is published on page 68 of https://csrc.nist.gov/CSRC/media/Publications/fips/186/4/final/documents/comments-received-fips186-4-december-2015.pdf by Allen Roginsky. It only contains a suggestion of 20, presumably for both numbers.

Apr 19 2022, 9:53 AM · backport, FIPS, libgcrypt, Bug Report

Apr 18 2022

gniibe added a comment to T5919: libgcrypt tests/basic.c and tests/keygen.c occasionally fail with "error generating RSA key: Number is not prime".

I checked FIPS 186-4 (and FIPS 186-5-draft). It is Appendix A 1.3.

Apr 18 2022, 3:35 AM · backport, FIPS, libgcrypt, Bug Report

Apr 11 2022

Jakuje added a comment to T5835: libgcrypt: More robust/portable integrity check.

I was pointed by Daiki to the following patch in Fedora binutils, which allows listing the fdo packaging metadata, but it does not list any other unknown objects and unfortunately fails hard:

Apr 11 2022, 2:00 PM · Bug Report, libgcrypt, FIPS

Apr 9 2022

gniibe added a comment to T5835: libgcrypt: More robust/portable integrity check.

I just copied the value of 0xcafe2a8e and the name .note.fdo.integrity from Daiki's implementation. No other reason.

Apr 9 2022, 9:16 AM · Bug Report, libgcrypt, FIPS

Apr 8 2022

Jakuje added a comment to T5835: libgcrypt: More robust/portable integrity check.

I have one follow-up is that the readelf chokes on the integrity note for some reason:

$ readelf -n /usr/lib64/libgcrypt.so.20.4.1
Displaying notes found in: .note.fdo.integrity
  Owner                Data size 	Description
  FDO                  0x00000020	Unknown note type: (0x8e2afeca)

I assume this is just because the readelf does not know this type. I see this type was initially proposed by Daiki, but I did not find any other sources for this magic number so before filling bugs for readelf, do we have some doc why the 0xcafe2a8e is used?

Apr 8 2022, 9:33 PM · Bug Report, libgcrypt, FIPS

Apr 7 2022

werner triaged T5919: libgcrypt tests/basic.c and tests/keygen.c occasionally fail with "error generating RSA key: Number is not prime" as Normal priority.

The set_bit is obvious but we should cross check with the specs. In the non-fips mode we also try w/o a limit.

Apr 7 2022, 10:04 AM · backport, FIPS, libgcrypt, Bug Report
gniibe added projects to T5919: libgcrypt tests/basic.c and tests/keygen.c occasionally fail with "error generating RSA key: Number is not prime": libgcrypt, FIPS.

I think that it is OK to loop forever until we find a prime.

Apr 7 2022, 9:19 AM · backport, FIPS, libgcrypt, Bug Report

Apr 5 2022

Jakuje created T5918: Disable RSA PKCS #1.5 encryption in FIPS mode.
Apr 5 2022, 10:31 AM · backport, libgcrypt, FIPS, Bug Report

Apr 1 2022

dannytsen added a comment to T5913: libgcrypt: bug fix for PPC bulk AES-GCM acceleratieration, missing HWF_PPC_ARCH_3_10 in HW feature.

Hi Jussi, yes for some reason, it went missing, I was checking performance numbers and found out the line went missing. Thanks.

Apr 1 2022, 2:08 PM · ppc, libgcrypt
jukivili added a comment to T5913: libgcrypt: bug fix for PPC bulk AES-GCM acceleratieration, missing HWF_PPC_ARCH_3_10 in HW feature.

Fixed in master. I rechecked that bulk implementation passes tests with qemu-ppc64le.

Apr 1 2022, 8:55 AM · ppc, libgcrypt
jukivili added a comment to T5913: libgcrypt: bug fix for PPC bulk AES-GCM acceleratieration, missing HWF_PPC_ARCH_3_10 in HW feature.

Looks like that line went missing in third/final version of AES-GCM patch at https://dev.gnupg.org/T5700

Apr 1 2022, 8:51 AM · ppc, libgcrypt

Mar 31 2022

werner assigned T5913: libgcrypt: bug fix for PPC bulk AES-GCM acceleratieration, missing HWF_PPC_ARCH_3_10 in HW feature to jukivili.
Mar 31 2022, 10:46 PM · ppc, libgcrypt
gniibe added a comment to T5891: EOPNOTSUPP is not defined in mingw.org's MinGW, fails compilation of libgcrypt-1.10.0.

you also use the CPU cache size on GNU/Linux. Is it important to have that information on MS-Windows?

Mar 31 2022, 9:36 AM · backport, libgcrypt, Bug Report
eliz added a comment to T5891: EOPNOTSUPP is not defined in mingw.org's MinGW, fails compilation of libgcrypt-1.10.0.

The attached patch implements getting the number of processors on MS-Windows.

Mar 31 2022, 8:18 AM · backport, libgcrypt, Bug Report

Mar 30 2022

werner closed T5907: bench-slope missing brainpool curves in master branch as Resolved.

see rC67b36154f88e for master.

Mar 30 2022, 9:07 AM · libgcrypt, Bug Report
werner added a comment to T5907: bench-slope missing brainpool curves in master branch.

Will add it. The reason I added Brainpool was due to a question on the performacne between Brainpool and other NIST.

Mar 30 2022, 9:03 AM · libgcrypt, Bug Report

Mar 29 2022

Jakuje created T5907: bench-slope missing brainpool curves in master branch.
Mar 29 2022, 10:56 AM · libgcrypt, Bug Report
gniibe merged T5396: Remove USE_RANDOM_DAEMON support from libgcrypt into T5706: libgcrypt: random: Remove the feature getting randomness from random daemon.
Mar 29 2022, 1:41 AM · libgcrypt
gniibe merged task T5396: Remove USE_RANDOM_DAEMON support from libgcrypt into T5706: libgcrypt: random: Remove the feature getting randomness from random daemon.
Mar 29 2022, 1:41 AM · libgcrypt
gniibe closed T5396: Remove USE_RANDOM_DAEMON support from libgcrypt as Resolved.

Done in master to be 1.11 for server side rC754ad5815b5b: random: Remove use of experimental random daemon.

Mar 29 2022, 1:37 AM · libgcrypt
gniibe closed T5835: libgcrypt: More robust/portable integrity check as Resolved.

Done in 1.10.1.

Mar 29 2022, 1:32 AM · Bug Report, libgcrypt, FIPS

Mar 28 2022

werner closed T5810: Release Libgcrypt 1.10.1 as Resolved.
Mar 28 2022, 4:43 PM · libgcrypt, Release Info
werner triaged T5905: Release Libgcrypt 1.10.2 as Low priority.
Mar 28 2022, 3:44 PM · Release Info, libgcrypt

Mar 24 2022

gniibe added a comment to T5891: EOPNOTSUPP is not defined in mingw.org's MinGW, fails compilation of libgcrypt-1.10.0.

GetNativeSystemInfo. Would you like me to submit a patch that used that in jent_ncpu?

Mar 24 2022, 12:57 AM · backport, libgcrypt, Bug Report

Mar 23 2022

eliz added a comment to T5891: EOPNOTSUPP is not defined in mingw.org's MinGW, fails compilation of libgcrypt-1.10.0.

Yes, I see the problem:

Mar 23 2022, 2:55 PM · backport, libgcrypt, Bug Report
gniibe added a comment to T5891: EOPNOTSUPP is not defined in mingw.org's MinGW, fails compilation of libgcrypt-1.10.0.

In libgcrypt (1.10), we have a copy of the jitterentropy 3.3.0 from:
http://www.chronox.de/jent.html
or https://github.com/smuellerDD/jitterentropy-library

Mar 23 2022, 1:02 AM · backport, libgcrypt, Bug Report

Mar 22 2022

eliz added a comment to T5891: EOPNOTSUPP is not defined in mingw.org's MinGW, fails compilation of libgcrypt-1.10.0.

Let me ask a more specific question, since you mentioned "support of detecting numbers of CPU and having more than 1 CPUs": can you point me to the code which detects the number of CPUs on MS-Windows systems, where I could learn how that code is affected by having EOPNOTSUPP defined? I will then hopefully understand better what you are saying, and either agree with you that this is unworkable on Windows, or propose a better solution.

Mar 22 2022, 1:55 PM · backport, libgcrypt, Bug Report
eliz added a comment to T5891: EOPNOTSUPP is not defined in mingw.org's MinGW, fails compilation of libgcrypt-1.10.0.

Can you please tell more about how this causes non-working code? MinGW64 defines EOPNOTSUPP to an arbitrary constant which (AFAICT) is never actually returned or used in the MS-Windows runtime. Their documentation, in https://docs.microsoft.com/en-us/cpp/c-runtime-library/errno-constants?view=msvc-170, says:

Mar 22 2022, 1:45 PM · backport, libgcrypt, Bug Report
gniibe added a comment to T5870: libgcrypt: AEAD API for FIPS 140 (in future).

I had thought that we need to combine hkdf so that key and iv can generate within libgcrypt internally.
Probably, this assumption of mine may be wrong.

Mar 22 2022, 10:53 AM · Feature Request, FIPS, libgcrypt
gniibe claimed T5891: EOPNOTSUPP is not defined in mingw.org's MinGW, fails compilation of libgcrypt-1.10.0.

Thank you for your report.

Mar 22 2022, 3:11 AM · backport, libgcrypt, Bug Report

Mar 16 2022

gniibe closed T5157: libgcrypt: ARM64 Builds on macOS fail as Resolved.
Mar 16 2022, 3:09 PM · toolchain, MacOS, libgcrypt, Bug Report
gniibe closed T5157: libgcrypt: ARM64 Builds on macOS fail, a subtask of T5159: make check fails for libgcrypt on Apple Silicon / ARM Mac, as Resolved.
Mar 16 2022, 3:09 PM · Restricted Project, MacOS, libgcrypt, Bug Report
gniibe closed T4900: OS X 10.12 and dyld: Library not loaded: /usr/local/lib/libgcrypt.20.dylib as Resolved.
Mar 16 2022, 2:55 PM · MacOS, libgcrypt, Bug Report
gniibe moved T5835: libgcrypt: More robust/portable integrity check from Next to Ready for release on the FIPS board.
Mar 16 2022, 6:16 AM · Bug Report, libgcrypt, FIPS

Mar 14 2022

werner triaged T5596: Libgcrypt documentation: corrections to obvious misprints as Normal priority.

Thanks for you patches. Most of them applied cleanly despite that I delayed processing them for half a year.

Mar 14 2022, 8:59 AM · libgcrypt, patch, Documentation, Bug Report

Mar 12 2022

jukivili updated the task description for T4460: libgcrypt performance TODOs.
Mar 12 2022, 9:40 AM · libgcrypt
jukivili updated the task description for T4460: libgcrypt performance TODOs.
Mar 12 2022, 9:39 AM · libgcrypt

Mar 9 2022

jukivili closed T5875: libgcrypt: VAES/AVX2 AES-OCB encryption performance issue with Intel CPUs, sudden drop in throughput with larger input sizes as Resolved.
Mar 9 2022, 7:47 PM · libgcrypt
jukivili added a comment to T5875: libgcrypt: VAES/AVX2 AES-OCB encryption performance issue with Intel CPUs, sudden drop in throughput with larger input sizes.

Fix pushed to master. Updated graph:

Mar 9 2022, 7:47 PM · libgcrypt
jukivili triaged T5875: libgcrypt: VAES/AVX2 AES-OCB encryption performance issue with Intel CPUs, sudden drop in throughput with larger input sizes as Normal priority.
Mar 9 2022, 4:42 PM · libgcrypt
gniibe added a project to T4873: Enable AES GCM in FIPS mode: FIPS.
Mar 9 2022, 12:58 AM · FIPS, libgcrypt, Feature Request

Mar 8 2022

Jakuje added a comment to T5870: libgcrypt: AEAD API for FIPS 140 (in future).

You are combining two concepts here -- the KDF and the AEAD cipher itself (at least from the FIPS terminology). I would like to avoid mixing these two together in the new API. If you would like to implement the SSH/TLS KDF, I would suggest to use the kdf API you already have. Then we are here left only with a new geniv API to implement. In the T4873 I mentioned example how it is now used in libssh using libgcrypt, which implements the iv increment outside of the libgcrypt:

Mar 8 2022, 3:51 PM · Feature Request, FIPS, libgcrypt
werner closed T5691: Release libgcrypt 1.10.0 as Resolved.
Mar 8 2022, 11:02 AM · FIPS, Release Info, libgcrypt

Mar 7 2022

jukivili added a comment to T5870: libgcrypt: AEAD API for FIPS 140 (in future).

Is large change to cipher API really needed (new open/encrypt with less flexibility)? How that would affect performance? Would following new interfaces to gcry_cipher API work instead?

  • gcry_cipher_setup_geniv(hd, int ivlen, int method): for setting up IV generator with parameters such as IV length, method id (RFC5116, TLS 1.3, SSH, etc), (other parameters?)
  • gcry_cipher_geniv(hd, byte *outiv): for generating new iv: generate IV using select method, set IV internally and output generated IV to 'ivout'.
  • gcry_cipher_genkey(hd, byte *outkey, int keylen, int method): for generating keys, generate key internally with parameters (method id, other?), setup key internally and output generated key to 'outkey'. (how keys from key exchange protocol be handled? using existing setkey?)
Mar 7 2022, 9:04 PM · Feature Request, FIPS, libgcrypt

Mar 6 2022

jukivili updated the task description for T4460: libgcrypt performance TODOs.
Mar 6 2022, 6:35 PM · libgcrypt

Mar 5 2022

jukivili updated the task description for T4460: libgcrypt performance TODOs.
Mar 5 2022, 2:09 PM · libgcrypt
jukivili updated the task description for T4460: libgcrypt performance TODOs.
Mar 5 2022, 1:23 PM · libgcrypt
jukivili updated the task description for T4460: libgcrypt performance TODOs.
Mar 5 2022, 1:21 PM · libgcrypt

Mar 3 2022

Jakuje added a comment to T5870: libgcrypt: AEAD API for FIPS 140 (in future).

I think this is not urgent as we are able to FIPS certify libgcrypt without that, but the modern protocols and algorithm use this and if we want to use libgcrypt to implement these in FIPS compliant way, we certainly need something like that.

Mar 3 2022, 2:08 PM · Feature Request, FIPS, libgcrypt
werner lowered the priority of T5870: libgcrypt: AEAD API for FIPS 140 (in future) from Unbreak Now! to Normal.

I don't think it is justified to tag this as "unbreak now" - which we use for severe bugs inhibiting the use of a deployed version.

Mar 3 2022, 9:40 AM · Feature Request, FIPS, libgcrypt
gniibe triaged T5870: libgcrypt: AEAD API for FIPS 140 (in future) as Unbreak Now! priority.
Mar 3 2022, 1:13 AM · Feature Request, FIPS, libgcrypt

Mar 2 2022

jukivili updated the task description for T4460: libgcrypt performance TODOs.
Mar 2 2022, 8:39 PM · libgcrypt
jukivili updated the task description for T4460: libgcrypt performance TODOs.
Mar 2 2022, 8:37 PM · libgcrypt
jukivili closed T5700: libgcrypt: bulk AES-GCM acceleration for ppc64le as Resolved.
Mar 2 2022, 8:24 PM · patch, ppc, libgcrypt, Feature Request

Feb 24 2022

jukivili closed T4486: Add AEAD mode AES-SIV to libgcrypt (RFC 5297) as Resolved.
Feb 24 2022, 6:06 PM · Feature Request, libgcrypt
jukivili closed T5356: gnupg2 test failure on s390x as Resolved.
Feb 24 2022, 6:05 PM · libgcrypt, Bug Report
jukivili closed T5694: poly1305-s390x.S is compiled despite --disable-asm as Resolved.
Feb 24 2022, 6:05 PM · libgcrypt, Bug Report
jukivili closed T5796: libgcrypt-1.9.4 build failure on ARM without NEON as Resolved.
Feb 24 2022, 6:05 PM · arm, libgcrypt, Gentoo, Bug Report

Feb 23 2022

gniibe moved T5835: libgcrypt: More robust/portable integrity check from Backlog to Next on the FIPS board.
Feb 23 2022, 12:38 AM · Bug Report, libgcrypt, FIPS

Feb 18 2022

gniibe triaged T5822: libgcrypt: Remove GCRYCTL_ENABLE_M_GUARD support (was: _gcry_private_malloc returns 4-byte alignment memory when use_m_guard==1) as Normal priority.
Feb 18 2022, 1:01 AM · Bug Report, libgcrypt

Feb 17 2022

gniibe added a project to T5811: libgcrypt: Remove random-daemon (server side): Restricted Project.
Feb 17 2022, 5:48 AM · libgcrypt
gniibe added a comment to T5835: libgcrypt: More robust/portable integrity check.

I simplified the script not to use cmp: rC3c8b6c4a9cad: fips: Fix gen-note-integrity.sh script not to use cmp utility.
And I clarified the semantics of the integrity check.

Feb 17 2022, 3:48 AM · Bug Report, libgcrypt, FIPS
neverpanic added a comment to T5835: libgcrypt: More robust/portable integrity check.

Ah, right, I can get that added to the containers tomorrow.

Feb 17 2022, 1:39 AM · Bug Report, libgcrypt, FIPS
gniibe added a comment to T5835: libgcrypt: More robust/portable integrity check.

I located the cause:

../../src/gen-note-integrity.sh: line 78: cmp: command not found
Feb 17 2022, 1:36 AM · Bug Report, libgcrypt, FIPS

Feb 16 2022

neverpanic added a comment to T5835: libgcrypt: More robust/portable integrity check.

That only seems to work in some configurations: https://gitlab.com/redhat-crypto/libgcrypt/libgcrypt-mirror/-/pipelines/472626834

Feb 16 2022, 7:24 PM · Bug Report, libgcrypt, FIPS
gniibe added a comment to T5835: libgcrypt: More robust/portable integrity check.

I pushed the change: rCa340e9803882: fips: More portable integrity check.
It uses .note.fdo.integrity section, not loaded onto memory.
It simplifies the logic, and switches to dladdr (from dladdr1).

Feb 16 2022, 12:36 PM · Bug Report, libgcrypt, FIPS
gniibe added a comment to T5835: libgcrypt: More robust/portable integrity check.

Pushed the change which fixes the build with ld.gold.
rC9dcf9305962b: fips: Integrity check improvement, with only loadable segments.

Feb 16 2022, 6:29 AM · Bug Report, libgcrypt, FIPS
gniibe added a comment to T5835: libgcrypt: More robust/portable integrity check.

Thank you for your suggestions, @werner.
I agree that we should not put much effort to develop our own methodology here; Too much effort may introduce possibility of unmaintainable code, which should be avoided for the particular purpose of "integrity".

Feb 16 2022, 3:07 AM · Bug Report, libgcrypt, FIPS

Feb 15 2022

werner added a comment to T5835: libgcrypt: More robust/portable integrity check.

Folks, you are opening a can of worms. The only secure why to sign a file is to have a detached signature. That is often non-practical and thus putting the signature/MAC at one certain position and exempt just this one position from hashing is the next best alternative. Any more complicated rules will inevitably introduce security flaws. If a binary is stripped, it is a different binary than a non-stripped one, if it is linked with another linker, it is a different one. And that binary will even be able to figure this out and change behavior. Please keep it simple.

Feb 15 2022, 1:51 PM · Bug Report, libgcrypt, FIPS
neverpanic added a comment to T5835: libgcrypt: More robust/portable integrity check.

Thanks! Maybe it would be simpler to use dl_iterate_phdr(3) for this. I wasn't aware of the function, but a colleague just implemented a proof-of-concept of what you're proposing in https://gitlab.com/dueno/integrity-notes.

Feb 15 2022, 11:58 AM · Bug Report, libgcrypt, FIPS
gniibe added a comment to T5835: libgcrypt: More robust/portable integrity check.

I am going to apply https://gitlab.com/redhat-crypto/libgcrypt/libgcrypt-mirror/-/commit/64ccc25c4b4a2c8c4e13e7e37ff1c8c60a3d8401
And consider adding the code to limit hashing content (from start of the file to end of data section).

Feb 15 2022, 7:40 AM · Bug Report, libgcrypt, FIPS
gniibe updated the task description for T5835: libgcrypt: More robust/portable integrity check.
Feb 15 2022, 3:39 AM · Bug Report, libgcrypt, FIPS
gniibe triaged T5835: libgcrypt: More robust/portable integrity check as High priority.
Feb 15 2022, 3:38 AM · Bug Report, libgcrypt, FIPS

Feb 10 2022

gniibe added a comment to T5822: libgcrypt: Remove GCRYCTL_ENABLE_M_GUARD support (was: _gcry_private_malloc returns 4-byte alignment memory when use_m_guard==1).

It was addressed in rC04f325d8917d: released 1.1.4 as "(obsolete)" feature, in Aug 2001.

Feb 10 2022, 1:32 AM · Bug Report, libgcrypt
gniibe renamed T5822: libgcrypt: Remove GCRYCTL_ENABLE_M_GUARD support (was: _gcry_private_malloc returns 4-byte alignment memory when use_m_guard==1) from libgcrypt: _gcry_private_malloc returns 4-byte alignment memory when use_m_guard==1 to libgcrypt: Remove GCRYCTL_ENABLE_M_GUARD support (was: _gcry_private_malloc returns 4-byte alignment memory when use_m_guard==1).
Feb 10 2022, 1:19 AM · Bug Report, libgcrypt

Feb 9 2022

gniibe added a comment to T5822: libgcrypt: Remove GCRYCTL_ENABLE_M_GUARD support (was: _gcry_private_malloc returns 4-byte alignment memory when use_m_guard==1).

Instead, let us remove the feature.

Feb 9 2022, 12:33 PM · Bug Report, libgcrypt
gniibe added a project to T5817: libgcrypt: Add Balloon KDF: Restricted Project.
Feb 9 2022, 2:58 AM · libgcrypt, Feature Request
gniibe claimed T5822: libgcrypt: Remove GCRYCTL_ENABLE_M_GUARD support (was: _gcry_private_malloc returns 4-byte alignment memory when use_m_guard==1).
Feb 9 2022, 2:58 AM · Bug Report, libgcrypt

Feb 8 2022

gniibe added a comment to T5817: libgcrypt: Add Balloon KDF.

Tested on a big endian machine.

$ uname -a
Linux perotto 5.15.0-2-powerpc64 #1 SMP Debian 5.15.5-2 (2021-12-18) ppc64 GNU/Linux
Feb 8 2022, 4:00 AM · libgcrypt, Feature Request