random: Don't assume that _WIN64 implies x86_64
mpi: Fix for buidling for MIPS64 with Clang
AES-KW: fix in-place encryption
Make BMI2 inline assembly check more robust
build: Convince gcc not to delete NULL ptr checks.
prime: Avoid rare assertion failure in gcry_prime_check.
ecc: Improve gcry_mpi_ec_curve_point
random: Fix hang of _gcry_rndjent_get_version.
mpi: New internal function _gcry_mpi_cmpabs.
ecc: Add blinding for ECDSA.
ecc: Fix potential unintended freeing of an internal param.
sexp: Fix uninitialized use of a var in the error case.
ecc: Fix possible memory leakage in parameter check of eddsa.
doc: Fix example for gcry_sexp_extract_param
Fix memory leak in secmem in out of core conditions.
doc: Update yat2m.c from upstream (libgpg-error)
ecc: Fix memory leak in the error case of ecc_encrypt_raw
random: Make sure to re-open /dev/random after a fork
build: Add release make target
primes: Avoid leaking bits of the prime test to pageable memory.
libgrypt.pc: Provide pkg-config file.
random: use getrandom() on Linux where available
doc: Fix library initialization examples
libgcrypt.m4: Update from master.
random: Initialize variable as requested by valgrind
libgcrypt.m4: Update from master.
tests: t-mpi-point: Remove implementation dependent checks.
dsa,ecdsa: Allocate secure memory for RFC6979 generation.
ecdsa: Fix unblinding too early.
dsa,ecdsa: Fix use of nonce, use larger one.
ecc: Add mitigation against timing attack.
ecc: Add a keygrip testcase for cv25519.
Prepare NEWS for upcoming release
ecc: Fix wrong handling of shorten PK bytes.
Fix declaration of internal function _gcry_mpi_get_ui.
Set vZZ.16b register to zero before use in armv8 gcm implementation
random: Fix include of config.h.
Fix wrong code execution in Poly1305 ARM/NEON implementation
mpi: Abort on division by zero also in _gcry_mpi_tdiv_qr.
DSA,ECDSA: Fix use of mpi_invm.
• werner committed
rCda8623bd6dbf: doc: Fix description of hash algorithms (authored by Sébastien Helleu <flashcode@flashtux.org>).
doc: Fix description of hash algorithms
mpi: Constant time mpi_inv with some conditions.
mpi: Fix the return value of mpi_invm_generic.
mpi: Fix return value of mpi_invm_generic.
ecc: Add OIDs from RFC-4880 as aliases for Ed25519 and Curve25519.
mpi: Fix flags in mpi_copy for opaque MPI.
mpi: Consider +0 and -0 the same in mpi_cmp.
mpi: Support opaque MPI with gcry_mpi_print.
build: Allow customization of the signing key
random/jitterentropy: fix USE_JENT == JENT_USES_GETTIME code path
random: Allow for a Unicode random seed file on Windows.
tests: Put a work around to tests/random for macOS.
ecc: Add checking key for ECDSA.
Fix ubsan warnings for i386 build
Add handling for -Og with O-flag munging
Make sure the grcy_get_config string is always null-terminated.
cipher: Fix ElGamal encryption for other implementations.
ecc: Fix the previous commit.
ecc: Check the input length for the point.
cipher: Extend convenience OID mapping table for AES.
Silence compiler warning.
Minor tweak to gcry_free.
build: _DARWIN_C_SOURCE should be 1.
hwf-arm: fix incorrect HWCAP2 for SHA1 and SHA2 on AArch32
I've mentioned this interop issue (and tried to propose clarifying language for the revised standard) in .
Please excuse my late reply. I was busy with other things over the last few weeks.
gpg: Support KEYGRIP search with traditional keyring.
@dkg I mentioned it just because it was added as (part of the?) solution for Ed25519 issue, i.e. it is not something related to parsing of interoperable format but some further processing when secret key part is sent to the gpg-agent in some intermediate format.
I think rGba321b60bc3bfc29dfc6fa325dcabad4fac29f9c has nothing to do with interoperable formats -- how things are stored in is unrelated to the interoperable transferable secret key format specified in 4880 or its revisions.
It is a different trust model. The man page has some information but we meanwhile doubt that it will ever be of great use. It is over designed to be actually useful. Just don't care. For further questions, please use the mailing lists.
common: Allow for GCM decryption in de-vs mode.
sm: Support AES-GCM decryption.
If I did enable "tofu" that was not on purpose and I would not know how. What are tofu related questions? Is there a doc you can point me to? (Also is tofu.db an annoyance, and if so in which way?)
TOFU is not used by default and thus the tofu.db does only matter if you have enabled TOFU. Its purpose is to track the use of keys and it also stored information which you explictly gave in response to TOFU related questions.
Hello,
I just hit the same issue in Ubuntu 18.04.5 LTS with gpg version 2.2.4-1ubuntu1.4 and the command line provided on post https://dev.gnupg.org/T3972#127356 by dkg has helped me fix it.
The faulty key was from the Tor project.
Right. However, the SOS thing should then also be used for secret keys. (FWIW, I wrote my last comment while you were writing yours).
@werner isn't it used just for the public key? The secret x25519 key, exported by GnuPG, looks as following (in the way it is stored in file):