Page MenuHome GnuPG
Feed All Transactions
AuthorObjectTransactionDate
gniiberC299e2f934159: tests: Replace custom bit with more generic flagsFri, Jan 30, 10:43 AM
gniiberC9452640125d2: random: Not use secure memory for DRBG instance.Fri, Jan 30, 10:43 AM
gniiberCf436bf4451cb: random: Not use secure memory for DRBG instance.Fri, Jan 30, 10:43 AM
gniiberCf6a67c221531: cipher: Change the bounds for RSA key generation round.Fri, Jan 30, 10:43 AM
gniiberCcd30ed3c0d71: cipher: Change the bounds for RSA key generation round.Fri, Jan 30, 10:43 AM
gniiberCc7709f7b2384: Do not allow PKCS #1.5 padding for encryption in FIPSFri, Jan 30, 10:43 AM
gniiberC019a40c99011: random:drbg: Fix the behavior for child process.Fri, Jan 30, 10:43 AM
gniiberCdf7879a86b1d: random:drbg: Fix the behavior for child process.Fri, Jan 30, 10:43 AM
gniiberC1a270cda2ee5: tests: Expect the RSA PKCS #1.5 encryption to fail in FIPS modeFri, Jan 30, 10:43 AM
gniiberC03af3d5cc5d5: mpi: Fix for 64-bit for _gcry_mpih_cmp_ui.Fri, Jan 30, 10:43 AM
gniiberC1a270cda2ee5: tests: Expect the RSA PKCS #1.5 encryption to fail in FIPS modeFri, Jan 30, 10:43 AM
gniiberCf736f3c70182: tests: Expect the RSA PKCS #1.5 encryption to fail in FIPS modeFri, Jan 30, 10:43 AM
gniibeT5918: Disable RSA PKCS #1.5 encryption in FIPS modeFri, Jan 30, 10:43 AM
gniibeT5970: gcry_mpi_invm producing wrong resultFri, Jan 30, 10:43 AM
gniiberC03af3d5cc5d5: mpi: Fix for 64-bit for _gcry_mpih_cmp_ui.Fri, Jan 30, 10:43 AM
gniiberC6d3708942f84: Fix internal declaration of _gcry_kdf_compute.Fri, Jan 30, 10:43 AM
gniiberCa611e3a25d61: mpi: Fix for 64-bit for _gcry_mpih_cmp_ui.Fri, Jan 30, 10:43 AM
gniibeT5980: compilation error libgcrypt 1.10.1Fri, Jan 30, 10:43 AM
gniiberC468ffa8f9c47: cipher: Allow verification of small RSA signatures in FIPS modeFri, Jan 30, 10:43 AM
gniibeT5975: Allow signature verification using specific RSA keys <2k in FIPS modeFri, Jan 30, 10:43 AM
gniiberC4019f1a66b15: Fix internal declaration of _gcry_kdf_compute.Fri, Jan 30, 10:43 AM
gniiberC6d3708942f84: Fix internal declaration of _gcry_kdf_compute.Fri, Jan 30, 10:43 AM
gniiberC468ffa8f9c47: cipher: Allow verification of small RSA signatures in FIPS modeFri, Jan 30, 10:43 AM
gniiberC735601494adb: Fix memory leaks in testsFri, Jan 30, 10:43 AM
gniiberCca2afc9fb64d: cipher: Allow verification of small RSA signatures in FIPS modeFri, Jan 30, 10:43 AM
gniibeT5973: libgcrypt: Minor test issues reported by coverityFri, Jan 30, 10:43 AM
gniiberC735601494adb: Fix memory leaks in testsFri, Jan 30, 10:43 AM
gniiberCef2e1523c33c: Fix memory leaks in testsFri, Jan 30, 10:43 AM
gniiberCa15cb31bf733: tests: Fix copy paste errorFri, Jan 30, 10:43 AM
gniiberCd1cb2599e9d7: mpi: Allow building with --disable-asm for HPPA.Fri, Jan 30, 10:43 AM
gniiberCbc01c770c757: random: Fix rndjent for Windows.Fri, Jan 30, 10:43 AM
gniiberC4b85bf33cce7: tests: Fix copy paste errorFri, Jan 30, 10:43 AM
gniibeT5976: libgcrypt build failure on HPPA 1.1 (./.libs/libgcrypt.so: undefined reference to `__udiv_qrnnd')Fri, Jan 30, 10:43 AM
gniibeT5891: EOPNOTSUPP is not defined in mingw.org's MinGW, fails compilation of libgcrypt-1.10.0Fri, Jan 30, 10:43 AM
gniiberC45a139b166a3: tests: Test gcry_pk_hash_sign w/explicit hash algoFri, Jan 30, 10:43 AM
gniiberC37b812f5e2a3: tests/t-kdf: Test KDF FIPS indicatorFri, Jan 30, 10:43 AM
gniiberCc0692324fe8b: mpi: Allow building with --disable-asm for HPPA.Fri, Jan 30, 10:43 AM
gniiberC3bbcf16e0b8b: tests/t-kdf: Test KDF FIPS indicatorFri, Jan 30, 10:43 AM
gniiberCd1cb2599e9d7: mpi: Allow building with --disable-asm for HPPA.Fri, Jan 30, 10:43 AM
gniiberC04960f5179cd: tests: Test gcry_pk_hash_sign w/explicit hash algoFri, Jan 30, 10:43 AM
gniiberC5dc97e855bb2: random: Fix rndjent for Windows.Fri, Jan 30, 10:43 AM
gniiberCbc01c770c757: random: Fix rndjent for Windows.Fri, Jan 30, 10:43 AM
gniibeT6066: gcry_pk_hash_verify() does not work with explicitly specified hash algorithmFri, Jan 30, 10:43 AM
gniiberCab5aef9b7b6e: hmac: Allow use of shorter salt.Fri, Jan 30, 10:43 AM
gniiberC1d3a90a4d118: cipher: Fix gcry_pk_hash_verify for explicit hash.Fri, Jan 30, 10:43 AM
gniibeT6066: gcry_pk_hash_verify() does not work with explicitly specified hash algorithmFri, Jan 30, 10:43 AM
gniibeT6039: FIPS: Allow salt=NULL (or shorter salt) for HKDFFri, Jan 30, 10:43 AM
gniiberCb2a64ed4f34a: cipher: Fix gcry_pk_hash_verify for explicit hash.Fri, Jan 30, 10:43 AM
gniiberC1fc7bfc351ba: fips: Run digest&sign self tests for RSA and ECC in FIPS mode.Fri, Jan 30, 10:43 AM
gniiberC58c92098d053: hmac,hkdf: Allow use of shorter salt for HKDF.Fri, Jan 30, 10:43 AM
gniiberC76aad97dd312: fips: Reject shorter key for HMAC in FIPS mode.Fri, Jan 30, 10:43 AM
gniiberCab5aef9b7b6e: hmac: Allow use of shorter salt.Fri, Jan 30, 10:43 AM
gniiberC1d3a90a4d118: cipher: Fix gcry_pk_hash_verify for explicit hash.Fri, Jan 30, 10:43 AM
gniiberC06c9350165d7: fips: Run digest&sign self tests for RSA and ECC in FIPS mode.Fri, Jan 30, 10:43 AM
gniiberC822ee57f07ca: fips: Add function-name based FIPS indicator.Fri, Jan 30, 10:43 AM
gniiberC505f048cac8e: rsa: Run PCT in FIPS mode also with digest step.Fri, Jan 30, 10:43 AM
gniiberC076a8adaf314: ecc: Run PCT also with the digest stepFri, Jan 30, 10:43 AM
gniiberC78151e6d6bbb: rsa: Run PCT in FIPS mode also with digest step.Fri, Jan 30, 10:43 AM
gniiberC505f048cac8e: rsa: Run PCT in FIPS mode also with digest step.Fri, Jan 30, 10:43 AM
gniiberC05a9c9d1ba1d: fips: Add function-name based FIPS indicator.Fri, Jan 30, 10:43 AM
gniiberCcf10c74bd9d5: random: Use getrandom (GRND_RANDOM) in FIPS mode.Fri, Jan 30, 10:43 AM
gniiberCaab1d63e4def: random: Use getrandom (GRND_RANDOM) in FIPS mode.Fri, Jan 30, 10:43 AM
gniiberC15fb6257e827: gcrypt.h: Fix function name in comment.Fri, Jan 30, 10:43 AM
gniiberCa527d252b899: Simplify the PCT for RSA and ECDSAFri, Jan 30, 10:43 AM
gniiberC0d69847e41e1: gcrypt.h: Fix function name in comment.Fri, Jan 30, 10:43 AM
gniiberC285bf54b1ac7: Simplify the PCT for RSA and ECDSAFri, Jan 30, 10:43 AM
gniiberCe552e37983da: fips: Disable RSA-OAEP padding in FIPS mode.Fri, Jan 30, 10:43 AM
gniiberCe5bfda492ab9: fips: Disable RSA-OAEP padding in FIPS mode.Fri, Jan 30, 10:43 AM
gniiberC658679e0ec8b: tests: Expect the OEAP tests to fail in FIPS mode.Fri, Jan 30, 10:43 AM
gniiberC249ca431ef88: tests: Expect the OEAP tests to fail in FIPS mode.Fri, Jan 30, 10:43 AM
gniiberC1524b60a7ccc: build: Skip PK-specific tests if algo is disabledFri, Jan 30, 10:43 AM
gniiberC16ac1850b854: Fix _gcry_err_code_to_errno.Fri, Jan 30, 10:43 AM
gniiberC3962623fe6de: Fix _gcry_err_code_to_errno.Fri, Jan 30, 10:43 AM
gniibeT6048: Test suite fixes with --enable-pubkey-ciphers=eccFri, Jan 30, 10:43 AM
gniiberC2efb90104591: build: Fix configure script.Fri, Jan 30, 10:43 AM
gniiberCc20022ffd4ad: fips: Skip PCT if RSA keygen test-parms specifiedFri, Jan 30, 10:43 AM
gniiberC1524b60a7ccc: build: Skip PK-specific tests if algo is disabledFri, Jan 30, 10:43 AM
gniiberC4963c127ae69: fips: Skip PCT if RSA keygen test-parms specifiedFri, Jan 30, 10:43 AM
gniiberC56000fb5c42f: build: Skip PK-specific tests if algo is disabledFri, Jan 30, 10:43 AM
gniiberC44812a1d96fc: build: Fix configure script.Fri, Jan 30, 10:43 AM
gniiberC9ee2d56e806b: keccak: Use size_t to avoid integer overflowFri, Jan 30, 10:43 AM
gniiberCd09d3d33c79d: kdf:pkdf2: Require longer input when FIPS mode.Fri, Jan 30, 10:43 AM
gniiberC52d48b710470: kdf:pkdf2: Check minimum allowed key size when running in FIPS mode.Fri, Jan 30, 10:43 AM
gniibeT6217: sha3: wrong results for large inputsFri, Jan 30, 10:43 AM
gniibeT6219: Ensure minimum key length for KDF in FIPS modeFri, Jan 30, 10:43 AM
gniibeT6039: FIPS: Allow salt=NULL (or shorter salt) for HKDFFri, Jan 30, 10:43 AM
gniiberCd09d3d33c79d: kdf:pkdf2: Require longer input when FIPS mode.Fri, Jan 30, 10:43 AM
gniiberC857e6f467d0f: kdf:pkdf2: Require longer input when FIPS mode.Fri, Jan 30, 10:43 AM
gniiberCab5aef9b7b6e: hmac: Allow use of shorter salt.Fri, Jan 30, 10:43 AM
gniiberC52d48b710470: kdf:pkdf2: Check minimum allowed key size when running in FIPS mode.Fri, Jan 30, 10:43 AM
gniiberC9ee2d56e806b: keccak: Use size_t to avoid integer overflowFri, Jan 30, 10:43 AM
gniiberC9c828129b205: keccak: Use size_t to avoid integer overflowFri, Jan 30, 10:43 AM
gniiberC3c04b692de1e: kdf:pkdf2: Check minimum allowed key size when running in FIPS mode.Fri, Jan 30, 10:43 AM
gniiberCa6a6e94027ab: random: Get maximum 32B of entropy at once in FIPS ModeFri, Jan 30, 10:43 AM
gniiberCce0df08bbab7: random: Get maximum 32B of entropy at once in FIPS ModeFri, Jan 30, 10:43 AM
gniiberCe235f38f9b9f: tests: Reproducer for short dklen in FIPS modeFri, Jan 30, 10:43 AM
gniiberC96615490c7b1: random: Extend the comment about FIPS specificsFri, Jan 30, 10:43 AM
gniiberC6e832840a8b7: random: Extend the comment about FIPS specificsFri, Jan 30, 10:43 AM
gniibeT6219: Ensure minimum key length for KDF in FIPS modeFri, Jan 30, 10:43 AM
gniiberCefdc87b305ff: tests: Reproducer for short dklen in FIPS modeFri, Jan 30, 10:43 AM