| Author | Object | Transaction | Date |
|---|
| • gniibe | rC299e2f934159: tests: Replace custom bit with more generic flags | | Fri, Jan 30, 10:43 AM |
| • gniibe | rC9452640125d2: random: Not use secure memory for DRBG instance. | | Fri, Jan 30, 10:43 AM |
| • gniibe | rCf436bf4451cb: random: Not use secure memory for DRBG instance. | | Fri, Jan 30, 10:43 AM |
| • gniibe | rCf6a67c221531: cipher: Change the bounds for RSA key generation round. | | Fri, Jan 30, 10:43 AM |
| • gniibe | rCcd30ed3c0d71: cipher: Change the bounds for RSA key generation round. | | Fri, Jan 30, 10:43 AM |
| • gniibe | rCc7709f7b2384: Do not allow PKCS #1.5 padding for encryption in FIPS | | Fri, Jan 30, 10:43 AM |
| • gniibe | rC019a40c99011: random:drbg: Fix the behavior for child process. | | Fri, Jan 30, 10:43 AM |
| • gniibe | rCdf7879a86b1d: random:drbg: Fix the behavior for child process. | | Fri, Jan 30, 10:43 AM |
| • gniibe | rC1a270cda2ee5: tests: Expect the RSA PKCS #1.5 encryption to fail in FIPS mode | | Fri, Jan 30, 10:43 AM |
| • gniibe | rC03af3d5cc5d5: mpi: Fix for 64-bit for _gcry_mpih_cmp_ui. | | Fri, Jan 30, 10:43 AM |
| • gniibe | rC1a270cda2ee5: tests: Expect the RSA PKCS #1.5 encryption to fail in FIPS mode | | Fri, Jan 30, 10:43 AM |
| • gniibe | rCf736f3c70182: tests: Expect the RSA PKCS #1.5 encryption to fail in FIPS mode | | Fri, Jan 30, 10:43 AM |
| • gniibe | T5918: Disable RSA PKCS #1.5 encryption in FIPS mode | | Fri, Jan 30, 10:43 AM |
| • gniibe | T5970: gcry_mpi_invm producing wrong result | | Fri, Jan 30, 10:43 AM |
| • gniibe | rC03af3d5cc5d5: mpi: Fix for 64-bit for _gcry_mpih_cmp_ui. | | Fri, Jan 30, 10:43 AM |
| • gniibe | rC6d3708942f84: Fix internal declaration of _gcry_kdf_compute. | | Fri, Jan 30, 10:43 AM |
| • gniibe | rCa611e3a25d61: mpi: Fix for 64-bit for _gcry_mpih_cmp_ui. | | Fri, Jan 30, 10:43 AM |
| • gniibe | T5980: compilation error libgcrypt 1.10.1 | | Fri, Jan 30, 10:43 AM |
| • gniibe | rC468ffa8f9c47: cipher: Allow verification of small RSA signatures in FIPS mode | | Fri, Jan 30, 10:43 AM |
| • gniibe | T5975: Allow signature verification using specific RSA keys <2k in FIPS mode | | Fri, Jan 30, 10:43 AM |
| • gniibe | rC4019f1a66b15: Fix internal declaration of _gcry_kdf_compute. | | Fri, Jan 30, 10:43 AM |
| • gniibe | rC6d3708942f84: Fix internal declaration of _gcry_kdf_compute. | | Fri, Jan 30, 10:43 AM |
| • gniibe | rC468ffa8f9c47: cipher: Allow verification of small RSA signatures in FIPS mode | | Fri, Jan 30, 10:43 AM |
| • gniibe | rC735601494adb: Fix memory leaks in tests | | Fri, Jan 30, 10:43 AM |
| • gniibe | rCca2afc9fb64d: cipher: Allow verification of small RSA signatures in FIPS mode | | Fri, Jan 30, 10:43 AM |
| • gniibe | T5973: libgcrypt: Minor test issues reported by coverity | | Fri, Jan 30, 10:43 AM |
| • gniibe | rC735601494adb: Fix memory leaks in tests | | Fri, Jan 30, 10:43 AM |
| • gniibe | rCef2e1523c33c: Fix memory leaks in tests | | Fri, Jan 30, 10:43 AM |
| • gniibe | rCa15cb31bf733: tests: Fix copy paste error | | Fri, Jan 30, 10:43 AM |
| • gniibe | rCd1cb2599e9d7: mpi: Allow building with --disable-asm for HPPA. | | Fri, Jan 30, 10:43 AM |
| • gniibe | rCbc01c770c757: random: Fix rndjent for Windows. | | Fri, Jan 30, 10:43 AM |
| • gniibe | rC4b85bf33cce7: tests: Fix copy paste error | | Fri, Jan 30, 10:43 AM |
| • gniibe | T5976: libgcrypt build failure on HPPA 1.1 (./.libs/libgcrypt.so: undefined reference to `__udiv_qrnnd') | | Fri, Jan 30, 10:43 AM |
| • gniibe | T5891: EOPNOTSUPP is not defined in mingw.org's MinGW, fails compilation of libgcrypt-1.10.0 | | Fri, Jan 30, 10:43 AM |
| • gniibe | rC45a139b166a3: tests: Test gcry_pk_hash_sign w/explicit hash algo | | Fri, Jan 30, 10:43 AM |
| • gniibe | rC37b812f5e2a3: tests/t-kdf: Test KDF FIPS indicator | | Fri, Jan 30, 10:43 AM |
| • gniibe | rCc0692324fe8b: mpi: Allow building with --disable-asm for HPPA. | | Fri, Jan 30, 10:43 AM |
| • gniibe | rC3bbcf16e0b8b: tests/t-kdf: Test KDF FIPS indicator | | Fri, Jan 30, 10:43 AM |
| • gniibe | rCd1cb2599e9d7: mpi: Allow building with --disable-asm for HPPA. | | Fri, Jan 30, 10:43 AM |
| • gniibe | rC04960f5179cd: tests: Test gcry_pk_hash_sign w/explicit hash algo | | Fri, Jan 30, 10:43 AM |
| • gniibe | rC5dc97e855bb2: random: Fix rndjent for Windows. | | Fri, Jan 30, 10:43 AM |
| • gniibe | rCbc01c770c757: random: Fix rndjent for Windows. | | Fri, Jan 30, 10:43 AM |
| • gniibe | T6066: gcry_pk_hash_verify() does not work with explicitly specified hash algorithm | | Fri, Jan 30, 10:43 AM |
| • gniibe | rCab5aef9b7b6e: hmac: Allow use of shorter salt. | | Fri, Jan 30, 10:43 AM |
| • gniibe | rC1d3a90a4d118: cipher: Fix gcry_pk_hash_verify for explicit hash. | | Fri, Jan 30, 10:43 AM |
| • gniibe | T6066: gcry_pk_hash_verify() does not work with explicitly specified hash algorithm | | Fri, Jan 30, 10:43 AM |
| • gniibe | T6039: FIPS: Allow salt=NULL (or shorter salt) for HKDF | | Fri, Jan 30, 10:43 AM |
| • gniibe | rCb2a64ed4f34a: cipher: Fix gcry_pk_hash_verify for explicit hash. | | Fri, Jan 30, 10:43 AM |
| • gniibe | rC1fc7bfc351ba: fips: Run digest&sign self tests for RSA and ECC in FIPS mode. | | Fri, Jan 30, 10:43 AM |
| • gniibe | rC58c92098d053: hmac,hkdf: Allow use of shorter salt for HKDF. | | Fri, Jan 30, 10:43 AM |
| • gniibe | rC76aad97dd312: fips: Reject shorter key for HMAC in FIPS mode. | | Fri, Jan 30, 10:43 AM |
| • gniibe | rCab5aef9b7b6e: hmac: Allow use of shorter salt. | | Fri, Jan 30, 10:43 AM |
| • gniibe | rC1d3a90a4d118: cipher: Fix gcry_pk_hash_verify for explicit hash. | | Fri, Jan 30, 10:43 AM |
| • gniibe | rC06c9350165d7: fips: Run digest&sign self tests for RSA and ECC in FIPS mode. | | Fri, Jan 30, 10:43 AM |
| • gniibe | rC822ee57f07ca: fips: Add function-name based FIPS indicator. | | Fri, Jan 30, 10:43 AM |
| • gniibe | rC505f048cac8e: rsa: Run PCT in FIPS mode also with digest step. | | Fri, Jan 30, 10:43 AM |
| • gniibe | rC076a8adaf314: ecc: Run PCT also with the digest step | | Fri, Jan 30, 10:43 AM |
| • gniibe | rC78151e6d6bbb: rsa: Run PCT in FIPS mode also with digest step. | | Fri, Jan 30, 10:43 AM |
| • gniibe | rC505f048cac8e: rsa: Run PCT in FIPS mode also with digest step. | | Fri, Jan 30, 10:43 AM |
| • gniibe | rC05a9c9d1ba1d: fips: Add function-name based FIPS indicator. | | Fri, Jan 30, 10:43 AM |
| • gniibe | rCcf10c74bd9d5: random: Use getrandom (GRND_RANDOM) in FIPS mode. | | Fri, Jan 30, 10:43 AM |
| • gniibe | rCaab1d63e4def: random: Use getrandom (GRND_RANDOM) in FIPS mode. | | Fri, Jan 30, 10:43 AM |
| • gniibe | rC15fb6257e827: gcrypt.h: Fix function name in comment. | | Fri, Jan 30, 10:43 AM |
| • gniibe | rCa527d252b899: Simplify the PCT for RSA and ECDSA | | Fri, Jan 30, 10:43 AM |
| • gniibe | rC0d69847e41e1: gcrypt.h: Fix function name in comment. | | Fri, Jan 30, 10:43 AM |
| • gniibe | rC285bf54b1ac7: Simplify the PCT for RSA and ECDSA | | Fri, Jan 30, 10:43 AM |
| • gniibe | rCe552e37983da: fips: Disable RSA-OAEP padding in FIPS mode. | | Fri, Jan 30, 10:43 AM |
| • gniibe | rCe5bfda492ab9: fips: Disable RSA-OAEP padding in FIPS mode. | | Fri, Jan 30, 10:43 AM |
| • gniibe | rC658679e0ec8b: tests: Expect the OEAP tests to fail in FIPS mode. | | Fri, Jan 30, 10:43 AM |
| • gniibe | rC249ca431ef88: tests: Expect the OEAP tests to fail in FIPS mode. | | Fri, Jan 30, 10:43 AM |
| • gniibe | rC1524b60a7ccc: build: Skip PK-specific tests if algo is disabled | | Fri, Jan 30, 10:43 AM |
| • gniibe | rC16ac1850b854: Fix _gcry_err_code_to_errno. | | Fri, Jan 30, 10:43 AM |
| • gniibe | rC3962623fe6de: Fix _gcry_err_code_to_errno. | | Fri, Jan 30, 10:43 AM |
| • gniibe | T6048: Test suite fixes with --enable-pubkey-ciphers=ecc | | Fri, Jan 30, 10:43 AM |
| • gniibe | rC2efb90104591: build: Fix configure script. | | Fri, Jan 30, 10:43 AM |
| • gniibe | rCc20022ffd4ad: fips: Skip PCT if RSA keygen test-parms specified | | Fri, Jan 30, 10:43 AM |
| • gniibe | rC1524b60a7ccc: build: Skip PK-specific tests if algo is disabled | | Fri, Jan 30, 10:43 AM |
| • gniibe | rC4963c127ae69: fips: Skip PCT if RSA keygen test-parms specified | | Fri, Jan 30, 10:43 AM |
| • gniibe | rC56000fb5c42f: build: Skip PK-specific tests if algo is disabled | | Fri, Jan 30, 10:43 AM |
| • gniibe | rC44812a1d96fc: build: Fix configure script. | | Fri, Jan 30, 10:43 AM |
| • gniibe | rC9ee2d56e806b: keccak: Use size_t to avoid integer overflow | | Fri, Jan 30, 10:43 AM |
| • gniibe | rCd09d3d33c79d: kdf:pkdf2: Require longer input when FIPS mode. | | Fri, Jan 30, 10:43 AM |
| • gniibe | rC52d48b710470: kdf:pkdf2: Check minimum allowed key size when running in FIPS mode. | | Fri, Jan 30, 10:43 AM |
| • gniibe | T6217: sha3: wrong results for large inputs | | Fri, Jan 30, 10:43 AM |
| • gniibe | T6219: Ensure minimum key length for KDF in FIPS mode | | Fri, Jan 30, 10:43 AM |
| • gniibe | T6039: FIPS: Allow salt=NULL (or shorter salt) for HKDF | | Fri, Jan 30, 10:43 AM |
| • gniibe | rCd09d3d33c79d: kdf:pkdf2: Require longer input when FIPS mode. | | Fri, Jan 30, 10:43 AM |
| • gniibe | rC857e6f467d0f: kdf:pkdf2: Require longer input when FIPS mode. | | Fri, Jan 30, 10:43 AM |
| • gniibe | rCab5aef9b7b6e: hmac: Allow use of shorter salt. | | Fri, Jan 30, 10:43 AM |
| • gniibe | rC52d48b710470: kdf:pkdf2: Check minimum allowed key size when running in FIPS mode. | | Fri, Jan 30, 10:43 AM |
| • gniibe | rC9ee2d56e806b: keccak: Use size_t to avoid integer overflow | | Fri, Jan 30, 10:43 AM |
| • gniibe | rC9c828129b205: keccak: Use size_t to avoid integer overflow | | Fri, Jan 30, 10:43 AM |
| • gniibe | rC3c04b692de1e: kdf:pkdf2: Check minimum allowed key size when running in FIPS mode. | | Fri, Jan 30, 10:43 AM |
| • gniibe | rCa6a6e94027ab: random: Get maximum 32B of entropy at once in FIPS Mode | | Fri, Jan 30, 10:43 AM |
| • gniibe | rCce0df08bbab7: random: Get maximum 32B of entropy at once in FIPS Mode | | Fri, Jan 30, 10:43 AM |
| • gniibe | rCe235f38f9b9f: tests: Reproducer for short dklen in FIPS mode | | Fri, Jan 30, 10:43 AM |
| • gniibe | rC96615490c7b1: random: Extend the comment about FIPS specifics | | Fri, Jan 30, 10:43 AM |
| • gniibe | rC6e832840a8b7: random: Extend the comment about FIPS specifics | | Fri, Jan 30, 10:43 AM |
| • gniibe | T6219: Ensure minimum key length for KDF in FIPS mode | | Fri, Jan 30, 10:43 AM |
| • gniibe | rCefdc87b305ff: tests: Reproducer for short dklen in FIPS mode | | Fri, Jan 30, 10:43 AM |