server: Wipe out the memory used by assuan_inquire if CONFIDENTIAL.
Flush data before clearing the confidential flag.
I found this use case: RFC 8702
"Use of the SHAKE One-Way Hash Functions in the Cryptographic Message Syntax (CMS)":
Another possibility for digest&sign API: it is possible to determine the length of required hash function by the underlining field Fp of the curve in use. Then, use this length instead. It's better than to (try to) get the length by (for SHAKE, it's undefined).
Fixed in both of master and 1.10 branch.
tests: Allow KDF measurement in FIPS mode.
cipher:kdf: Move FIPS mode check to _gcry_kdf_derive.
For libgcrypt, initially when the code was put, it made some sense.
Now, it's useless, so, let's simply remove the message.
Remove out of core handler setting message in FIPS mode.
• gniibe changed the status of
T6511: EdDSA support in FIPS mode from
Open to
Testing.
cipher:ecc: Implement PCT for EdDSA.
build: Detect broken GCC for x86/AVX512 intrinsics.
cipher:ecc: Add selftests for EdDSA.
tests: EdDSA keys work in FIPS mode
ecc: Enable Ed25519 and Ed448 in FIPS mode
l10n daemon script <scripty@kde.org> committed
rKLEOPATRA349e93a64322: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
I have now disabled the rewriting in the 2.4 branch. Those who want to keep the old behaviour may add
dirmngr: Disable the HTTP redirect rewriting.
dirmngr: New option --compatibility-flags.
• werner set the icon for
dirmngr to
Tag.
• werner edited Description on
dirmngr.
gpgsm: New option --input-size-hint.
gpg: New option --no-compress as alias for -z0.
gpgtar: New option --no-compress.
Merge remote-tracking branch 'origin' into kf6
Add missing getter for output file name
could not trigger it with the described steps on windows
Check for existing files before starting any encryption tasks
Only ask the user for overwrite permission if file exists
Use custom label text only for progress label
Let OverwritePolicy take care of asking users whether to overwrite a file
Fix removing of temporary files with UNC paths
core: Send a input-size-hint for gpgsm.
works for 4,1 GB, too.
(Tested with Gpg4win-4.2.0-beta346)
• ebo moved
T6373: Kleopatra: Show progress dialog when moving decrypted archive to final destination from
Restricted Project Column to
Restricted Project Column on the
Restricted Project board.
Move back to the backlog and trigger re-evalutation of priority (which was high).
kbx,w32: Disable the fd-passing.
gpgtar: Emit FAILURE status line.
sm: Emit STATUS_FAILURE for non-implemented commands.
common,w32: Set a proper error code when creating an output file.
w32: Add missing supportedOS Ids for Windows-10
w32: Add missing manifests and set a requestedExecutionLevel.
gpg: Return ERROR status for --quick-sign-key.
po: Update Japanese Translation.
agent,w32: Fix resource leak for a process.
gpg: Skip keys found via ADSKs.
common: New function nve_set
gpg: Fix searching for the ADSK key when adding an ADSK.
agent: Create and use Token entries to track the display s/n.
agent: Update key files by first writing to a temp file.
agent: Do not overwrite a key file by a shadow key file.
Prepare the NEWS for the next release
po: Translated one new string to German.
po: Update Czech translation
build: Always build the wixlib with a release
doc: Replace remaining "gpg2" by "gpg".
gpg: Set default expiration date to 3 years.
gpg: Add --list-filter properties key_expires and key_expires_d.
common: New function substitute_vars.
dirmngr: Extend the AD_QUERY command.
gpg: Print status line and proper diagnostics for write errors.
w32: Map ERROR_FILE_INVALID to EIO.
speedo,w32: Call gpgconf --kill all
gpg: Make progress work for large files on Windows.
gpgsm: Print PROGRESS status lines.
tests: Add option --cancel to run-encrypt.
core: Use 64 bit instead of gpgme_off_t for some internal functions.
And of course we also need to adjust GPGME
We also need PROGRESS lines in gpgsm.
cipher:ecc: Fix EdDSA secret key check.
context: Make the context chain-able.
l10n daemon script <scripty@kde.org> committed
rKLEOPATRA131d4ddcfa01: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
I agree that the "future" won't come, ever. (for libgcrypt)
It does not work as described for subkeys with later expiry dates if the primary key has already expired:
Change validity on the 12th for that key results in:
I doubt that we will ever be able to use the flexible array thingy. The old pattern has been used for nearly 50 years and replacing it will just introduce bugs.
Do you use offsetof for that reason?
cipher:pubkey: Fix non-use of flexible array member.
cipher:ecc: Support gcry_pk_hash_sign/verify for EdDSA.
I found that for EdDSA other than pure Ed25519, it can supply context.
I changed the semantics and API for adding context and input data, as we need to support both simultaneously.