Manually specify shortcuts for all checkboxes
Make it possible to use FileNameRequester as buddy of a label
Set tooltip of push button and line edit
We have the same patch (including the hmac key and we use the switch. The reasoning on our side was to be compatible with fipscheck, but it is no longer used since last year and we use just the hmac256 tool:
Just for the records, the whole HMAC thing including the special dlopen trick used to work fine when we did the original FIPS support.
hmac: Don't have the second implementation of hmac256.
fips: Don't use gcry_check_version for integrity check any more.
fips: Use a .rodata1 section integrity check with hmac256.
build: Generate hash for integrity check with hmac256 (2).
Right. The clarification is that SHA1 itself (for non-security and non-signature use) is still allowed in FIPS mode. But it is not allowed to be used as part of signature schemes of the new API in FIPS mode. The old API, which allows raw signatures without digests, should just fail in FIPS mode too. And the FIPS-compatible gnupg should use the new API too (it would be good to think about this when putting it together).
For Linux and FIPS, we should be actually fine with using /dev/random or getrandom().
agent: Ignore passphrase constraints for a generated passphrase.
agent: Use the sysconfdir for a pattern file.
• ikloecker moved
T5535: Kleopatra: Check that accessibility is also supported for VS-NfD from
Restricted Project Column to
Restricted Project Column on the
Restricted Project board.
Avoid warnings about NULL ptr deref in ASN.1 helpers.
I added some asserts. However I doubt that it can be hit by LibKSBA. I also fixed a real bug related to VALTYPE_BOOL - but that is also not used in Libksba.
The CAVS driver can be safely removed. The certification goes through the ACVP these days so it does not make sense to keep this.
agent: Improve the GENPIN callback.
agent: Fix for zero length help string in pinentry hints.
agent: Improve the GENPIN callback.
common,w32: Replace log_debug by log_info for InProcessJobs
doc: Add sample texts for Pinentry hints
Accept percent escaped formatted-passphrase-hint option.
agent: Fix for zero length help string in pinentry hints.
common,w32: Replace log_debug by log_info for InProcessJobs
doc: Change group size for passphrase formatting to five
qt: Change group size for passphrase formatting to 5
build: Generate hash for integrity check with hmac256.
cipher: Fix the order of fields of gcry_md_context.
hmac: Fix hmac256 command option handling.
I have done tests with 2.2 and no problems showed up.
w32: Move socketdir to LOCAL_APPDATA
agent: Make QT_QPA_PLATFORMTHEME=qt5ct work for the pient
agent: New option --check-sym-passphrase-pattern.
gpgconf,w32: Print more registry diagnostics with --list-dirs.
agent: Add checkpin inquiry for pinentry
common: Pass XDG_SESSION_TYPE and QT_QPA_PLATFORM envvars to pinentry
agent: New option --pinentry-formatted-passphrase
tools: Extend gpg-check-pattern.
(can't access that bug with my account)
For tests with FIPS mode enabled, I manually create the file under src/.libs.
• gniibe added a project to
T5520: Fix tests in FIPS mode:
Restricted Project.
I pushed my further change.
Also, applied and pushed your changes.
tests: Generating large-enough DSA keys works in FIPS mode
rsa: Do not allow 1024 RSA keys in FIPS mode
tests: Avoid confusing 'success' on error message
fips: Fix tests in fips mode and non-fips mode.
Sorry, I didn't test for non-FIPS mode when I committed rC347817438990: fips: Fix tests in fips mode..
Tweaking the value for memory allocation is needed for FIPS mode, because it uses some secure memory by DRBG.
Laurent Montel <montel@kde.org> committed
rLIBKLEOb3bb0ce3e49e: GIT_SILENT: add qch support (authored by Laurent Montel <montel@kde.org>).
GIT_SILENT: add qch support
I went a bit back to the history to figure out what is the enforced and soft fips mode as it was initially not completely clear to me. For the record, I used the following bug from 9 years ago:
Tested the master on (faked) FIPS and non-FIPS Fedora and I created couple of more changes for master to work in FIPS mode:
• ikloecker moved
T5544: Kleopatra: Ensure that file encryption dialogs has shortcuts on all actions from
Restricted Project Column to
Restricted Project Column on the
Restricted Project board.
Fix wrong button text when opening wizard
Simplify code displaying compliance label next to buttons
Remove superfluous call of setEncryptionPreset()
Enable "Encrypt with password" if keyring is empty
• ikloecker moved
T5545: Kleopatra: Select symmetric encryption by default if keyring is empty from
Restricted Project Column to
Restricted Project Column on the
Restricted Project board.
qt: Make sure the message box is centered on top of the pinentry
• ikloecker moved
T5545: Kleopatra: Select symmetric encryption by default if keyring is empty from
Restricted Project Column to
Restricted Project Column on the
Restricted Project board.
• ikloecker moved
T5543: pinentry-qt: Accessibility switch to repeat on enter from
Restricted Project Column to
Restricted Project Column on the
Restricted Project board.
• gniibe changed the status of
T5244: libgcrypt: Restrict MD5 use from
Open to
Testing.
Since I think there is no reason why checking here, I remove the check.
Did you restart dirmngr? ("gpgconf --kill dirmngr" so it will be started on demand).
cipher: Raise an error for non-approved digests correctly.
tests: Skip tests when FIPS for keygrip computations.
I wrote this in my dirmngr.conf. But i haven't found this .log file.
fips: Fix tests in fips mode.
There are two things here.
(1) Use of [] (FLEXIBLE_ARRAY_MEMBER)
(2) Use of offsetof (instead of sizeof) for computation of size of allocation.
GIT_SILENT: future kf5 will depend against qt5.15.2, we will depend against it…
GIT_SILENT: future kf5 will depend against qt5.15.2, we will depend against it…
l10n daemon script <scripty@kde.org> committed
rKLEOPATRAd859bcf3dac9: SVN_SILENT made messages (.desktop file) - always resolve ours (authored by l10n daemon script <scripty@kde.org>).
SVN_SILENT made messages (.desktop file) - always resolve ours
l10n daemon script <scripty@kde.org> committed
rKLEOPATRA7096168abc68: GIT_SILENT made messages (after extraction) (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT made messages (after extraction)
Based on the info about this being caused by the added support of PIV, I poked around on the docs at and noticed the disable-application stuff. I added "disable-application piv" to ~/.gnupg/scdaemon.conf and the behavior went back to pin caching working as before. Since I don't use PIV, this is an acceptable workaround for me.
GIT_SILENT: clang-tidy: one declaration per line; braces around statements
GIT_SILENT: switch to KDECompilerSettings + CMAKE_CXX_STANDARD already setted
GIT_SILENT: switch to KDECompilerSettings + CMAKE_CXX_STANDARD already setted
GIT_SILENT: switch to KDECompilerSettings + CMAKE_CXX_STANDARD already setted
Laurent Montel <montel@kde.org> committed
rLIBKLEO27c9b83fb452: GIT_SILENT: time to increase version (authored by Laurent Montel <montel@kde.org>).
GIT_SILENT: time to increase version
Laurent Montel <montel@kde.org> committed
rKLEOPATRAfccc046cf9cb: GIT_SILENT: time to increase version (authored by Laurent Montel <montel@kde.org>).
GIT_SILENT: time to increase version
smlx renamed
T5555: Cannot add existing ECDSA key as a signing subkey from
Cannot use existing key to add ECDSA signing subkey to
Cannot add existing ECDSA key as a signing subkey.
At first I've had simply tried to give multiple --symmetric options (which of course didn't work).