- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Advanced Search
May 14 2020
May 13 2020
May 11 2020
May 8 2020
May 4 2020
How does it show when you specify --full-time-strings (in UTC by ISO time format)?
I wonder if it is valid as data, but there is a problem of showing key(s).
Apr 28 2020
I tested with this patch (which changes use of constant-time routine when it's secure memory):
Apr 27 2020
Apr 24 2020
Apr 23 2020
Apr 22 2020
Apr 21 2020
Apr 17 2020
Apr 16 2020
Apr 15 2020
Thanks for testing. It's actually an error of generating _unicode_mapping.c, which utf8.c includes.
Apr 14 2020
In the function nist_generate_key (cipher/ecc.c), ec->nbits is number of bits of P.
... while mpi/ec.c sets 256.
It's a kind of "bug compatibility" but it's a regression anyway.
Apr 13 2020
I can't find any places where it is interpreted as signed integer.
Apr 10 2020
It was a problem of libgcrypt master.
As of today's libgcrypt rC60c179b59e53: sexp: Extend gcry_sexp_extract_param with new format specifiers., it works fine.
It seems it's a falure of ECDH.
I ran a server by s_server and saw following error:
$ openssl s_server -key key.pem -cert cert.pem -accept 44330 -www Using default temp DH parameters ACCEPT 140203176436992:error:10067064:elliptic curve routines:ec_GFp_simple_oct2point:buffer too small:../crypto/ec/ecp_oct.c:280: 140203176436992:error:1419C010:SSL routines:tls_process_cke_ecdhe:EC lib:../ssl/statem/statem_srvr.c:3245:
Because it also fails in 0.1.2 (with no GCM support), it seems that it's not GCM thing.
Apr 9 2020
Push the change to master.
Apr 8 2020
It seems that the reference to PKCS#5 is correct. It is an issue of how to describe the case of more than 8-byte padding in OpenPGP.
Your example data is malformed, I suppose.
Thanks for your report. The problem of GnuPG was that it mandated padding length < 16 bytes, which is wrong.
Apr 7 2020
Apr 6 2020
I'm testing this as an initial start:
ac_ext=c ac_objext=o
@jukivili : Thank you. Please apply & push it.
Apr 3 2020
Pushed the changes.
OK. I reopen this ticket to collect information.
I think that it is compiler issue for AltiVec (now, VSX) support.
The usage is not ambiguous. It _is_ ambiguous in the header file.
Thansk for your report.
Apr 2 2020
It runs like:
$ gpg-connect-agent "scd devinfo --watch" /bye S DEVINFO_START S DEVINFO_END S DEVINFO_STATUS new S DEVINFO_START S DEVICE generic D276000124010200F517000000010000 openpgp S DEVINFO_END S DEVINFO_STATUS removal S DEVINFO_START S DEVINFO_END OK $
Push the change to master.
Apr 1 2020
The problem itself is fixed (in T4495: UBsan finding "certdump.c:695:3: runtime error: null pointer passed as argument 2"). The variable buffer cannot be NULL at memcpy.
Mar 31 2020
genkey for Ed25519 works now with libksba in master.
For public key, it's done.