Page MenuHome GnuPG
Feed All Stories

Jan 31 2020

aheinecke committed rO15ba0e600979: Fix cryptcontroller handling of resolved mails (authored by aheinecke).
Fix cryptcontroller handling of resolved mails
Jan 31 2020, 12:37 PM
aheinecke committed rO1dc0fea716c7: Add opts splitBCCMails and combinedOpsEnabled (authored by aheinecke).
Add opts splitBCCMails and combinedOpsEnabled
Jan 31 2020, 12:37 PM
aheinecke committed rO45f5d7c18db3: Add new oom helper functions for recipients (authored by aheinecke).
Add new oom helper functions for recipients
Jan 31 2020, 12:37 PM
aheinecke committed rObe5638e45769: Add little oom method helper for single int (authored by aheinecke).
Add little oom method helper for single int
Jan 31 2020, 12:37 PM
aheinecke committed rO8e7c292843f8: Collect index info when resolving recipients (authored by aheinecke).
Collect index info when resolving recipients
Jan 31 2020, 12:37 PM
aheinecke committed rOa65aec97e9dd: Add new debug macros (authored by aheinecke).
Add new debug macros
Jan 31 2020, 12:37 PM
aheinecke committed rO0d296740c5af: Extend recipient data with index and dbg helper (authored by aheinecke).
Extend recipient data with index and dbg helper
Jan 31 2020, 12:37 PM
werner triaged T4833: libgcrypt: bug in _gcry_poly1305_armv7_neon_init_ext as High priority.
Jan 31 2020, 11:39 AM · libgcrypt, Bug Report
werner added a comment to T4831: gnupg-2.2.19 fails to build on latest Fedora Rawhide.

You mean that common blocks can't be used anymore? The RISC-OS had this problem but it was the only architecture I was aware of that required "extern" trickery.

Jan 31 2020, 11:38 AM · gnupg (gpg22), toolchain, Bug Report
werner edited projects for T4832: card: when KDF is enabled, use of pinpad input should be disabled, added: gnupg (gpg22); removed gnupg.
Jan 31 2020, 11:30 AM · Restricted Project, gnupg (gpg22), scd, Bug Report

Jan 30 2020

t8m added a comment to T4833: libgcrypt: bug in _gcry_poly1305_armv7_neon_init_ext.

This is a patch to fix the issue. I am no ARMv7 assembly expert, but all the tests pass with this applied.

Jan 30 2020, 5:40 PM · libgcrypt, Bug Report
t8m created T4833: libgcrypt: bug in _gcry_poly1305_armv7_neon_init_ext.
Jan 30 2020, 5:31 PM · libgcrypt, Bug Report
gniibe claimed T4832: card: when KDF is enabled, use of pinpad input should be disabled.
Jan 30 2020, 5:19 PM · Restricted Project, gnupg (gpg22), scd, Bug Report
gniibe created T4832: card: when KDF is enabled, use of pinpad input should be disabled.
Jan 30 2020, 5:19 PM · Restricted Project, gnupg (gpg22), scd, Bug Report
t8m added a comment to T4831: gnupg-2.2.19 fails to build on latest Fedora Rawhide.

this file contains a patch to avoid this global data duplication.

Jan 30 2020, 5:15 PM · gnupg (gpg22), toolchain, Bug Report
t8m created T4831: gnupg-2.2.19 fails to build on latest Fedora Rawhide.
Jan 30 2020, 5:13 PM · gnupg (gpg22), toolchain, Bug Report
freez3 created T4830: GpgOL: Sometimes not displaying correctly in office 2019.
Jan 30 2020, 1:21 PM · Info Needed, gpgol, Bug Report, gpg4win
aheinecke closed T4828: gpgOL Outlook PlugIn error code: 1 as Invalid.

That means that the GnuPG Backend does not work. I do not think that the office update is the reason, me and others use GpgOL with the most recent versions of Office Pro Plus without issue.
Have you possibly modified you gnupg config files? If there is a bad value in there it would result in such an error.

Jan 30 2020, 12:53 PM · OpenPGP, gpgol, Bug Report
aheinecke created T4829: Wish: A gpgconf command to remove all config files.
Jan 30 2020, 12:50 PM · gnupg
grafalbert created T4828: gpgOL Outlook PlugIn error code: 1.
Jan 30 2020, 10:01 AM · OpenPGP, gpgol, Bug Report
Laurent Montel <montel@kde.org> committed rKLEOPATRAbaff950d23f4: Port endl to \n as it's namespaced in qt5.15 and it's not necesary to (authored by Laurent Montel <montel@kde.org>).
Port endl to \n as it's namespaced in qt5.15 and it's not necesary to
Jan 30 2020, 8:50 AM
werner added a comment to T4826: Expiration dates after 2107 are reported as wraparound expiration dates.

We briefly talked in the OpenPGP WG about the u32 problem and agreed that this is not an issue for 2440bis. The mismatch between creation date and expiration period is one of those minor PGP flaws. PGP-2 even used days to specify the expiration period.

Jan 30 2020, 8:26 AM · gnupg (gpg22), Bug Report

Jan 29 2020

dkg added a comment to rMcff600f1f65a: Do not test for a bug in older GnuPG versions.

Avoiding a failure for older versions means that the test suite won't catch this particular bug if it is reintroduced in future versions. That seems suboptimal for me, but given the complexity of the dependency chain, i don't know how to solve it. I prefer just raising an error with older versions of GnuPG as with rMf2aeb2563ba2 , as this is a test of the json interface, which isn't in widespread use yet.

Jan 29 2020, 7:24 PM
dkg closed T4766: gpgme_signature_t relies on `unsigned long` for signature creation and expiration times as Wontfix.

Changing back to wontfix given the wontfix resolution of T4826

Jan 29 2020, 3:44 PM · gpgme, Bug Report
dkg added a comment to T4826: Expiration dates after 2107 are reported as wraparound expiration dates.

This is not a problem for 2107 (when you and i are 6 feet under). it's a problem well before then for anything that has an expiration date of 2107 or later (as demonstrated by the legitimate example certificate here today).

Jan 29 2020, 3:44 PM · gnupg (gpg22), Bug Report
werner added a comment to T4820: gpgme's json test fails with gpg 2.2.19.

I would like to understand why this changed. T4061 might be relevant here. This has been fixed after the 2.2.19 release.

Jan 29 2020, 11:09 AM · gpgme (gpgme 1.23.x), Bug Report
aheinecke assigned T4820: gpgme's json test fails with gpg 2.2.19 to werner.

Well thanks for reporting it ;-)

Jan 29 2020, 11:06 AM · gpgme (gpgme 1.23.x), Bug Report
aheinecke committed rMcff600f1f65a: Do not test for a bug in older GnuPG versions (authored by aheinecke).
Do not test for a bug in older GnuPG versions
Jan 29 2020, 11:06 AM
werner closed T4826: Expiration dates after 2107 are reported as wraparound expiration dates as Wontfix.

I don't care; encryption won't work for us 6ft under. (This is a protocol problem which someone should address in a couple of decades)

Jan 29 2020, 10:34 AM · gnupg (gpg22), Bug Report
werner edited projects for T4827: libgpg-error 1.36 and gawk: fatal: cannot use gawk builtin `namespace' as variable name, added: toolchain, gpgrt; removed gnupg.
Jan 29 2020, 10:29 AM · Duplicate, gpgrt, toolchain, Bug Report
werner added a comment to T4827: libgpg-error 1.36 and gawk: fatal: cannot use gawk builtin `namespace' as variable name.

That looks pretty much like another gawk regression. The easiest fix is to install another AWK version (e.g. mawk).

Jan 29 2020, 10:29 AM · Duplicate, gpgrt, toolchain, Bug Report
JW updated the task description for T4827: libgpg-error 1.36 and gawk: fatal: cannot use gawk builtin `namespace' as variable name.
Jan 29 2020, 8:34 AM · Duplicate, gpgrt, toolchain, Bug Report
JW updated the task description for T4827: libgpg-error 1.36 and gawk: fatal: cannot use gawk builtin `namespace' as variable name.
Jan 29 2020, 8:34 AM · Duplicate, gpgrt, toolchain, Bug Report
JW updated the task description for T4827: libgpg-error 1.36 and gawk: fatal: cannot use gawk builtin `namespace' as variable name.
Jan 29 2020, 8:31 AM · Duplicate, gpgrt, toolchain, Bug Report
JW updated the task description for T4827: libgpg-error 1.36 and gawk: fatal: cannot use gawk builtin `namespace' as variable name.
Jan 29 2020, 8:31 AM · Duplicate, gpgrt, toolchain, Bug Report
JW created T4827: libgpg-error 1.36 and gawk: fatal: cannot use gawk builtin `namespace' as variable name.
Jan 29 2020, 8:28 AM · Duplicate, gpgrt, toolchain, Bug Report
dkg added a comment to T4826: Expiration dates after 2107 are reported as wraparound expiration dates.

This is a problem for gpgv and gpg as well. gpg reports:

Jan 29 2020, 1:02 AM · gnupg (gpg22), Bug Report
dkg added a comment to T4766: gpgme_signature_t relies on `unsigned long` for signature creation and expiration times.

It looks like at least for OpenPGP, the layer below GPGME is also broken for expiration dates in this time window (see T4826)

Jan 29 2020, 1:01 AM · gpgme, Bug Report
dkg created T4826: Expiration dates after 2107 are reported as wraparound expiration dates.
Jan 29 2020, 1:00 AM · gnupg (gpg22), Bug Report
dkg added a comment to T4766: gpgme_signature_t relies on `unsigned long` for signature creation and expiration times.
-----BEGIN PGP PRIVATE KEY BLOCK-----
Jan 29 2020, 12:38 AM · gpgme, Bug Report
dkg added a comment to T4766: gpgme_signature_t relies on `unsigned long` for signature creation and expiration times.
-----BEGIN PGP PUBLIC KEY BLOCK-----
Jan 29 2020, 12:35 AM · gpgme, Bug Report

Jan 28 2020

dkg added a comment to T4766: gpgme_signature_t relies on `unsigned long` for signature creation and expiration times.

I don't mind a workaround that avoids an ABI/API fix as long as it defers actual failures until 2038.

Jan 28 2020, 11:45 PM · gpgme, Bug Report
dkg reopened T4766: gpgme_signature_t relies on `unsigned long` for signature creation and expiration times as "Open".

I'm reopening this because i think users of these 32-bit platforms are going to run into issues before 2038 happens. Certs could appear expired before they are actually expired, for example, because of the wraparound time.

Jan 28 2020, 11:44 PM · gpgme, Bug Report
werner committed rGc1d716cd65b0: card: Add new OpenPGP card vendor. (authored by werner).
card: Add new OpenPGP card vendor.
Jan 28 2020, 4:15 PM
werner committed rG8bbc4f0d2ce4: card: Add new OpenPGP card vendor. (authored by werner).
card: Add new OpenPGP card vendor.
Jan 28 2020, 4:15 PM
werner triaged T4825: gpg --weak-digest SHA1 incurs a serious performance cost for `--check-trustdb` as Normal priority.
Jan 28 2020, 3:17 PM · gnupg (gpg22), Bug Report
aheinecke committed rOf70faebca1cb: Use recipient objects in kleo based lookup, too (authored by aheinecke).
Use recipient objects in kleo based lookup, too
Jan 28 2020, 2:32 PM
aheinecke committed rO7118d1b65076: Change cryptcontroller to track recipients (authored by aheinecke).
Change cryptcontroller to track recipients
Jan 28 2020, 2:32 PM
aheinecke committed rOe4a8c1ac89a6: Add small help wrapper to get single addr key (authored by aheinecke).
Add small help wrapper to get single addr key
Jan 28 2020, 2:32 PM
Arnaud added a comment to T3891: kdf-setup does not set admin and user PIN codes.

I would prefer to have a procedure that do not reset PINs to their default values, but as long as all PINs are set to known and valid values when KDF is setup it will not make the token unusable after that, so it seems reasonable to me.

Jan 28 2020, 10:09 AM · Restricted Project, scd, Bug Report
gniibe added a comment to T3891: kdf-setup does not set admin and user PIN codes.

Or, #5 would be:

Jan 28 2020, 1:59 AM · Restricted Project, scd, Bug Report

Jan 27 2020

dkg created T4825: gpg --weak-digest SHA1 incurs a serious performance cost for `--check-trustdb`.
Jan 27 2020, 8:58 PM · gnupg (gpg22), Bug Report
grichardnewell added a comment to T4824: Encrypted file appears to not be encrypted by recipients public key.

Hi Andre,

  1. I am the sender, and can guarantee both correct keys were used. The same two keys do work in the Kleopatra clipboard tool (with recipient tool's email parser) , just not with standalone files (at least not with his file decryption be tool).
  1. It could be a user error on my part, but the Kleopatra GUI is showing both keys with check marks, so I have trouble imagining what I could do different.
  1. Recipient is not using Kleopatra, as noted in the original ticket. It is possible (and I suspect, likely) that the problem is an incompatibility between these two tools. If this is the case, then we need to find which tool is not following the standard, or perhaps the standard is ambiguous.
  1. Since filing the ticket I have discovered that if I (sender) use command line GPG (ugh!), the recipient can decrypt the file with his tool. This seems to point the finger towards Kleopatra as the more likely cause of the problem.
  1. There was a screenshot included in the original ticket showing very clearly the recipients tool doesn't recognize the presence of a second (i.e. recipient's) key.

I am attaching the screen shot from the recipient’s tool again, for your convenience.
I am also adding a screen shot of the my (i.e., sender’s) set-up in Kleopatra.
Rich

G. Richard Newell
Assoc. Technical Fellow, FPGA Business Unit, Microchip Technology
(408) 643-6146 (office), (408) 882-4785 (mobile), +1 (925) 478-7258 (Skype)
PGP: (2009 DSA-1024, ELG-4096) B751 FC13 8B4E 49DA 2270 35A2 20E4 E66A D0D0 2E34

     (2016 SSA-4096, RSA-4096) 65F5 CCD6 23B3 BD3D CEDE AB58 171F F4DE E7D0 3ECA

From: aheinecke (Andre Heinecke) [mailto:noreply@dev.gnupg.org]
Sent: Monday, January 27, 2020 12:37 AM
To: richard.newell@microsemi.com
Subject: [Task] [Closed] T4824: Encrypted file appears to not be encrypted by recipients public key

EXTERNAL EMAIL: Do not click links or open attachments unless you know the content is safe
aheinecke closed this task as "Invalid".
aheinecke added a comment.

Hi,

I have difficutlty to accept that as an issue in our tracker. Somehow the GUI for Kleopatra appears to be confusing for your "Sender" which apparently is not you, correct? This results in the wrong keys selected for encryption.
With this amount of information I cannot see any path of change for our software.
Could you maybe provide a screenshot how the recipient selection looks for your user in Kleopatra, so that we can discover why it might be confusing or why the recipients key is not selected correctly?

I'm setting this issue as "Invalid" in the meantime. Not out of disrespect or so, only because I don't see how the information from this issue can currently lead to a change in our software. I can change the status later again.

Thanks,
Andre

TASK DETAIL
https://dev.gnupg.org/T4824

EMAIL PREFERENCES
https://dev.gnupg.org/settings/panel/emailpreferences/

To: aheinecke

Cc: aheinecke, grichardnewell, Neurone, Rafixmod, ccharabaruk, gp_ast

This is an automated email from the GnuPG development hub. If you have registered in the past at https://bugs.gnupg.org/ your account was migrated automatically. You can visit https://dev.gnupg.org/ to set a new password and update your email preferences.

Jan 27 2020, 7:19 PM · Bug Report, gpg4win
dkg updated subscribers of T4820: gpgme's json test fails with gpg 2.2.19.

thanks for looking at this, @aheinecke ! if you or @werner know of any internal side effects where this does matter, it would be great to add a test that documents them.

Jan 27 2020, 6:08 PM · gpgme (gpgme 1.23.x), Bug Report
aheinecke committed rO31f9a4c0ed5e: Add recipient class to carry key and type (authored by aheinecke).
Add recipient class to carry key and type
Jan 27 2020, 2:13 PM
aheinecke committed rGTO0ff8b6fe1470: Add option to allow mixed encryption (authored by aheinecke).
Add option to allow mixed encryption
Jan 27 2020, 11:47 AM
aheinecke committed rGTO03d9bf40cf38: Pass along mbox for which key was resolved (authored by aheinecke).
Pass along mbox for which key was resolved
Jan 27 2020, 11:46 AM
aheinecke updated subscribers of T4823: Test Yubikey's support for ed25519.

I am interested in that. I have a yubikey here that I wish to use productively for brainpool-256 signing, bp-512 (just for fun) encrypting and cv25519 authentication. I need to use brainpool signing and encryption subkeys for VS-NfD compliant communication and I want to be more modern then RSA ;-)

Jan 27 2020, 10:24 AM · gnupg24, gnupg (gpg23), yubikey
aheinecke closed T4821: gpgme's m4/python.m4 doesn't search for python 3.8 as Resolved.

Merged into master. Thanks!

Jan 27 2020, 9:51 AM · gpgme
aheinecke added a comment to T4820: gpgme's json test fails with gpg 2.2.19.

Thanks! I would merge your commits but I'll like to talk to werner tomorrow about the always adding "--with-keygrip" I also think its useful but it might have expensive internal side effects that I am not aware of.

Jan 27 2020, 9:48 AM · gpgme (gpgme 1.23.x), Bug Report
aheinecke closed T4824: Encrypted file appears to not be encrypted by recipients public key as Invalid.

I have difficutlty to accept that as an issue in our tracker. Somehow the GUI for Kleopatra appears to be confusing for your "Sender" which apparently is not you, correct? This results in the wrong keys selected for encryption.
With this amount of information I cannot see any path of change for our software.
Could you maybe provide a screenshot how the recipient selection looks for your user in Kleopatra, so that we can discover why it might be confusing or why the recipients key is not selected correctly?

Jan 27 2020, 9:36 AM · Bug Report, gpg4win
gniibe added a comment to T3891: kdf-setup does not set admin and user PIN codes.

@Amaud, I read your code in Python. IIUC, it asks users PW1, Reset Code, and PW3 to setup, just before registering KDF DO (as you describe in https://dev.gnupg.org/T3891#114950).

Jan 27 2020, 5:30 AM · Restricted Project, scd, Bug Report

Jan 25 2020

grichardnewell updated the task description for T4824: Encrypted file appears to not be encrypted by recipients public key.
Jan 25 2020, 4:11 AM · Bug Report, gpg4win
grichardnewell created T4824: Encrypted file appears to not be encrypted by recipients public key.
Jan 25 2020, 4:03 AM · Bug Report, gpg4win

Jan 24 2020

werner created T4823: Test Yubikey's support for ed25519.
Jan 24 2020, 5:38 PM · gnupg24, gnupg (gpg23), yubikey
dkg added a comment to T4817: dirmgr keys.openpgp.org:443 Address family not supported by protocol.

(if you don't want to publish the full strace output here because you're concerned it might leak some information about your machine or your network, but you're ok sharing it with me personally, you can send it to me privately by e-mail, encrypted to the OpenPGP certificate with fingerprint C4BC2DDB38CCE96485EBE9C2F20691179038E5C6, and sent to one of the e-mail addresses associated with that certificate. please make a note here if you do that)

Jan 24 2020, 3:20 PM · Bug Report
dkg added a comment to T4817: dirmgr keys.openpgp.org:443 Address family not supported by protocol.

ok, that's deeply weird. i'm assuming that this machine has IPv4 connectivity. I have no idea why dirmngr would be returning EAFNOSUPPORT in that case.

Jan 24 2020, 3:18 PM · Bug Report
mssm added a comment to T4817: dirmgr keys.openpgp.org:443 Address family not supported by protocol.

Right after the failed connection I see:

$ gpg-connect-agent --dirmngr 'keyserver --hosttable' /bye
S # hosttable (idx, ipv6, ipv4, dead, name, time):
S #   0   4 d keys.openpgp.org (37.218.245.50)  (5s)
OK
Jan 24 2020, 1:07 PM · Bug Report
bhaible added a comment to T4818: libgcrypt build failures on several platforms.

Regarding Cygwin: The sources are a bit hard to find.
https://cygwin.com/packages.html
-> https://cygwin.com/packaging/repos.html
-> https://cygwin.com/git-cygwin-packages/
-> https://cygwin.com/git-cygwin-packages/?p=git/cygwin-packages/libgcrypt.git;a=summary

Jan 24 2020, 11:33 AM · Solaris, libgcrypt, Bug Report
bhaible added a comment to T4818: libgcrypt build failures on several platforms.

Regarding GNU/kFreeBSD, my machine is using the FreeBSD 9.0 kernel, which does not yet have the security.bsd.unprivileged_mlock oid. Like what was mentioned here: https://lists.debian.org/debian-bsd/2014/08/msg00092.html

Jan 24 2020, 11:15 AM · Solaris, libgcrypt, Bug Report
gniibe added a comment to T4818: libgcrypt build failures on several platforms.

For Cygwin, I can't find how its libgcrypt package is built.
I found this for MSYS2: https://github.com/msys2/MSYS2-packages/tree/master/libgcrypt
This for Mingw-w64: https://github.com/msys2/MINGW-packages/tree/master/mingw-w64-libgcrypt

Jan 24 2020, 2:53 AM · Solaris, libgcrypt, Bug Report
gniibe created T4822: mlock requires privilege.
Jan 24 2020, 2:21 AM · FAQ, Solaris, libgcrypt
gniibe added a comment to T4818: libgcrypt build failures on several platforms.

I tested on FreeBSD. Same errors (t-secmen and t-sexp) are reproducible when we set:

Jan 24 2020, 2:05 AM · Solaris, libgcrypt, Bug Report
dkg added a comment to T4821: gpgme's m4/python.m4 doesn't search for python 3.8.

branch dkg/fix-4821 contains a fix for this, in commit 414938cfedbdb97b83d00e8619dec9502096be22

Jan 24 2020, 12:31 AM · gpgme
dkg committed rM414938cfedbd: m4/python: Scan for python 3.8 as well (authored by dkg).
m4/python: Scan for python 3.8 as well
Jan 24 2020, 12:30 AM
dkg created T4821: gpgme's m4/python.m4 doesn't search for python 3.8.
Jan 24 2020, 12:30 AM · gpgme
dkg committed rMc4cf527ea227: gpg: Send --with-keygrip when listing keys (authored by dkg).
gpg: Send --with-keygrip when listing keys
Jan 24 2020, 12:26 AM
dkg committed rMf2aeb2563ba2: tests/json: Bravo key does not have secret key material (authored by dkg).
tests/json: Bravo key does not have secret key material
Jan 24 2020, 12:26 AM
dkg added a comment to T4820: gpgme's json test fails with gpg 2.2.19.

in particular, c4cf527ea227edb468a84bf9b8ce996807bd6992 and f2aeb2563ba2f55eea7f52041e52062fdc839a64

Jan 24 2020, 12:25 AM · gpgme (gpgme 1.23.x), Bug Report
dkg added a comment to T4820: gpgme's json test fails with gpg 2.2.19.

The dkg/fix-4820 branch now has these two fixes.

Jan 24 2020, 12:23 AM · gpgme (gpgme 1.23.x), Bug Report
gniibe added a comment to T3891: kdf-setup does not set admin and user PIN codes.

Thanks for concrete cases. Sorry, not responding earlier. It was an experimental feature, firstly only available in Gnuk Token.

Jan 24 2020, 12:19 AM · Restricted Project, scd, Bug Report

Jan 23 2020

dkg added a comment to T4820: gpgme's json test fails with gpg 2.2.19.

For easier reference or searchability, the test error looks like this:

Jan 23 2020, 11:57 PM · gpgme (gpgme 1.23.x), Bug Report
dkg created T4820: gpgme's json test fails with gpg 2.2.19.
Jan 23 2020, 11:40 PM · gpgme (gpgme 1.23.x), Bug Report
Arnaud added a comment to T3891: kdf-setup does not set admin and user PIN codes.

I implemented the script described previsouly (https://dev.gnupg.org/T3891#114950) in the smartpgp-cli utility provided in the SmartPGP repository (see commit https://github.com/ANSSI-FR/SmartPGP/commit/4be0fa442b43c2bafd5f0171417ff68fd88cbe2d).

Jan 23 2020, 7:53 PM · Restricted Project, scd, Bug Report
dkg added a comment to T4817: dirmgr keys.openpgp.org:443 Address family not supported by protocol.

This appears to be a different error than above. here we see:

Jan 23 2020, 5:50 PM · Bug Report
mssm added a comment to T4817: dirmgr keys.openpgp.org:443 Address family not supported by protocol.

With tls-debug 16:

dirmngr[9162.6] DBG: chan_6 <- END
dirmngr[9162.6] DBG: dns: libdns initialized
dirmngr[9162.6] DBG: dns: getsrv(_pgpkey-https._tcp.keys.openpgp.org) -> 0 records
dirmngr[9162.6] DBG: dns: resolve_dns_name(keys.openpgp.org): Success
dirmngr[9162.6] resolve_dns_addr for 'keys.openpgp.org': 'keys.openpgp.org' [already known]
dirmngr[9162.6] resolve_dns_addr for 'keys.openpgp.org': 'keys.openpgp.org' [already known]
dirmngr[9162.6] DBG: gnutls:L3: ASSERT: /var/tmp/portage/net-libs/gnutls-3.6.11.1-r1/work/gnutls-3.6.11.1/lib/x509/common.c[_gnutls_x509_get_raw_field2]:1575
dirmngr[9162.6] DBG: gnutls:L3: ASSERT: /var/tmp/portage/net-libs/gnutls-3.6.11.1-r1/work/gnutls-3.6.11.1/lib/x509/x509.c[gnutls_x509_crt_get_subject_unique_id]:3902
dirmngr[9162.6] DBG: gnutls:L3: ASSERT: /var/tmp/portage/net-libs/gnutls-3.6.11.1-r1/work/gnutls-3.6.11.1/lib/x509/x509.c[gnutls_x509_crt_get_issuer_unique_id]:3952
dirmngr[9162.6] DBG: gnutls:L3: ASSERT: /var/tmp/portage/net-libs/gnutls-3.6.11.1-r1/work/gnutls-3.6.11.1/lib/x509/dn.c[_gnutls_x509_compare_raw_dn]:990
dirmngr[9162.6] DBG: gnutls:L3: ASSERT: /var/tmp/portage/net-libs/gnutls-3.6.11.1-r1/work/gnutls-3.6.11.1/lib/x509/dn.c[_gnutls_x509_compare_raw_dn]:990
dirmngr[9162.6] DBG: gnutls:L3: ASSERT: /var/tmp/portage/net-libs/gnutls-3.6.11.1-r1/work/gnutls-3.6.11.1/lib/x509/dn.c[_gnutls_x509_compare_raw_dn]:990
dirmngr[9162.6] DBG: gnutls:L3: ASSERT: /var/tmp/portage/net-libs/gnutls-3.6.11.1-r1/work/gnutls-3.6.11.1/lib/x509/dn.c[_gnutls_x509_compare_raw_dn]:990
dirmngr[9162.6] number of system provided CAs: 142
dirmngr[9162.6] DBG: gnutls:L5: REC[0x7fd5a400c360]: Allocating epoch #0
dirmngr[9162.6] DBG: gnutls:L2: added 6 protocols, 29 ciphersuites, 18 sig algos and 9 groups into priority list
dirmngr[9162.6] DBG: Using TLS library: GNUTLS 3.6.11
dirmngr[9162.6] DBG: http.c:connect_server: trying name='keys.openpgp.org' port=443
dirmngr[9162.6] DBG: dns: resolve_dns_name(keys.openpgp.org): Success
dirmngr[9162.6] error creating socket: Address family not supported by protocol
dirmngr[9162.6] error connecting to 'https://keys.openpgp.org:443': Address family not supported by protocol
dirmngr[9162.6] DBG: gnutls:L13: BUF[HSK]: Emptied buffer
dirmngr[9162.6] DBG: gnutls:L5: REC[0x7fd5a400c360]: Start of epoch cleanup
dirmngr[9162.6] DBG: gnutls:L5: REC[0x7fd5a400c360]: End of epoch cleanup
dirmngr[9162.6] DBG: gnutls:L5: REC[0x7fd5a400c360]: Epoch #0 freed
dirmngr[9162.6] marking host 'keys.openpgp.org' as dead
dirmngr[9162.6] host 'keys.openpgp.org' marked as dead
dirmngr[9162.6] command 'KS_PUT' failed: No keyserver available
dirmngr[9162.6] DBG: chan_6 -> ERR 167772346 No keyserver available <Dirmngr>
dirmngr[9162.6] DBG: chan_6 <- BYE
dirmngr[9162.6] DBG: chan_6 -> OK closing connection
dirmngr[9162.6] handler for fd 6 terminated
Jan 23 2020, 9:35 AM · Bug Report
mssm added a comment to T4817: dirmgr keys.openpgp.org:443 Address family not supported by protocol.

Could it be that the system installed CAs are not sufficient for the TSL handshake? But then also curl should fail on that host. But curl https://keys.openpgp.org is fine.

Jan 23 2020, 9:33 AM · Bug Report
gniibe committed rEd1e4b4b001b3: po: Update Japanese Translation. (authored by gniibe).
po: Update Japanese Translation.
Jan 23 2020, 6:13 AM
gniibe added a comment to T4818: libgcrypt build failures on several platforms.

On Solaris, the test errors are because of:

USAGE
       Because of the impact on system resources, the use of mlock() and
       munlock() is restricted to users with the {PRIV_PROC_LOCK_MEMORY}
       privilege.
Jan 23 2020, 3:45 AM · Solaris, libgcrypt, Bug Report
gniibe committed rC03e6d6597198: random: Fix include of config.h. (authored by gniibe).
random: Fix include of config.h.
Jan 23 2020, 2:31 AM
gniibe committed rCe0898d062878: random: Fix include of config.h. (authored by gniibe).
random: Fix include of config.h.
Jan 23 2020, 2:30 AM
gniibe added a comment to T4818: libgcrypt build failures on several platforms.

OK, I identified the problem on OpenIndiana. The inclusion of <unistd.h> causes inclusion of <sys/types.h> before config.h. I'm going to fix this.

Jan 23 2020, 2:24 AM · Solaris, libgcrypt, Bug Report

Jan 22 2020

jukivili added a comment to D497: Set vZZ.16b register to zero before use in armv8 gcm implementation.

Patch have been applied to master, https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=79ed620ec46adbb08f5cea6a4865a95a436e4109

Jan 22 2020, 10:55 PM · libgcrypt
jukivili committed rC8b31091da092: sexp: fix cast from 'int' pointer to 'size_t' pointer (authored by jukivili).
sexp: fix cast from 'int' pointer to 'size_t' pointer
Jan 22 2020, 9:51 PM
jukivili committed rC5f098f7e6ceb: mpi/i386: fix DWARF CFI for _gcry_mpih_sub_n and _gcry_mpih_add_n (authored by jukivili).
mpi/i386: fix DWARF CFI for _gcry_mpih_sub_n and _gcry_mpih_add_n
Jan 22 2020, 9:51 PM
jukivili committed rC24b4d5c10a97: mpi: Add .note.gnu.property section for Intel CET (authored by H.J. Lu <hjl.tools@gmail.com>).
mpi: Add .note.gnu.property section for Intel CET
Jan 22 2020, 9:51 PM
jukivili committed rC22e577071790: amd64: Always include <config.h> in cipher assembly codes (authored by H.J. Lu <hjl.tools@gmail.com>).
amd64: Always include <config.h> in cipher assembly codes
Jan 22 2020, 9:51 PM
jukivili committed rCcb9f0a2df822: i386: Add _CET_ENDBR to indirect jump targets (authored by H.J. Lu <hjl.tools@gmail.com>).
i386: Add _CET_ENDBR to indirect jump targets
Jan 22 2020, 9:51 PM
jukivili committed rC4c88c2bd2a41: x86: Add .note.gnu.property section for Intel CET (authored by H.J. Lu <hjl.tools@gmail.com>).
x86: Add .note.gnu.property section for Intel CET
Jan 22 2020, 9:51 PM
jukivili committed rC8ebbd8545a20: Register DCO for H.J. Lu (authored by jukivili).
Register DCO for H.J. Lu
Jan 22 2020, 9:51 PM