NIST P-256 key generation looks good.
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Advanced Search
Mar 27 2020
Mar 26 2020
Mar 24 2020
There are two code paths to generate key: gpgsm_genkey and gpgsm_gencertreq_tty. Latter is partially supported with card key.
Firstly, I'm going to work for T4888.
I think that what you want is adding --batch option. In the gpg manual, we have:
--passphrase-file file Read the passphrase from file file. Only the first line will be read from file file. This can only be used if only one passphrase is supplied. Obviously, a passphrase stored in a file is of questionable security if other users can read this file. Don't use this option if you can avoid it.
This should work well with libksba master and gnupg/sm master.
The commits in 2019 (for libksba and gnupg/sm) handles the problem (of key generation using card).
For operations which require private key, it is needed to unlock private key.
Mar 19 2020
You forwarded me an email, which said it went well.
Mar 18 2020
Mar 17 2020
Related the changes, before we did the changes, we received two independent reports.
It is my confusion. The API is available. I only looked for symbols in the library.
It is #define-d macro to pthread_cond_*.
For Windows, it is available. I don't know the reason why it has not been available for POSIX.
Mar 16 2020
Mar 12 2020
Mar 11 2020
Fixed in master.
A program like tests/t-mpi-point assumes gcry_mpi_print can do that.
We have a sort of regression with --debug option with t-mpi-point, the point q is not printed out correctly.
Mar 10 2020
Mar 9 2020
Mar 3 2020
Feb 28 2020
I pushed the change to master.