Page MenuHome GnuPG
Feed All Transactions
AuthorObjectTransactionDate
gniibeT6394: FIPS requires running PCT tests unconditionallyFri, Jan 30, 10:42 AM
gniiberC2ddeec574bc1: ecc: Do not allow skipping tests in FIPS Mode.Fri, Jan 30, 10:42 AM
gniiberC44a3f26539f7: ecc: Do not allow skipping tests in FIPS Mode.Fri, Jan 30, 10:42 AM
gniiberCc41d4f502f1b: ecc: Make the PCT recoverable in FIPS mode and consistent with RSA.Fri, Jan 30, 10:42 AM
gniiberCfc19b27b5439: visibility: Check FIPS operational status for MD+Sign operation.Fri, Jan 30, 10:42 AM
gniibeT6397: PCT failures inconsistency in regards to the FIPS error stateFri, Jan 30, 10:42 AM
gniibeT6396: the gcry_pk_hash_sign/verify operates in FIPS non-operational modeFri, Jan 30, 10:42 AM
gniiberCc41d4f502f1b: ecc: Make the PCT recoverable in FIPS mode and consistent with RSA.Fri, Jan 30, 10:42 AM
gniiberC23a2d1285e35: ecc: Make the PCT recoverable in FIPS mode and consistent with RSA.Fri, Jan 30, 10:42 AM
gniiberCfc19b27b5439: visibility: Check FIPS operational status for MD+Sign operation.Fri, Jan 30, 10:42 AM
gniiberC654d0dfa0499: visibility: Check FIPS operational status for MD+Sign operation.Fri, Jan 30, 10:42 AM
gniiberC397ff085749e: kdf: Update tests in regards to the allowed parameters in FIPS mode.Fri, Jan 30, 10:42 AM
gniiberCa51f0e66842a: fips: Add explicit indicators for md and mac algorithms.Fri, Jan 30, 10:42 AM
gniiberC4cff7e739829: random: Remove unused SHA384 DRBGs.Fri, Jan 30, 10:42 AM
gniibeT6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in aptFri, Jan 30, 10:42 AM
gniibeT6393: DRBG with SHA384 is no longer allowed in FIPS mode (and looks like impossible to enable anyway)Fri, Jan 30, 10:42 AM
gniibeT5512: Implement service indicatorsFri, Jan 30, 10:42 AM
gniiberC45b80678109e: random: Remove unused SHA384 DRBGs.Fri, Jan 30, 10:42 AM
gniiberC4cff7e739829: random: Remove unused SHA384 DRBGs.Fri, Jan 30, 10:42 AM
gniiberCa51f0e66842a: fips: Add explicit indicators for md and mac algorithms.Fri, Jan 30, 10:42 AM
gniiberC397ff085749e: kdf: Update tests in regards to the allowed parameters in FIPS mode.Fri, Jan 30, 10:42 AM
gniiberC076dd2ffcd95: fips: Check return value from ftellFri, Jan 30, 10:42 AM
gniiberCc88672a327f6: fips: Add explicit indicators for md and mac algorithms.Fri, Jan 30, 10:42 AM
gniiberC3fd3bb31597f: fips: Check return value from ftellFri, Jan 30, 10:42 AM
gniiberC535a4d345872: fips: Recover test cases for selftest, add skipping in FIPS mode.Fri, Jan 30, 10:42 AM
gniiberCf5fe94810f30: kdf: Update tests in regards to the allowed parameters in FIPS mode.Fri, Jan 30, 10:42 AM
gniiberC0024db5afee8: fips: Unblock MD5 in fips mode but mark non-approved in indicator.Fri, Jan 30, 10:42 AM
gniibeT6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in aptFri, Jan 30, 10:42 AM
gniiberCdc4a60e2d70b: fips: Unblock MD5 in fips mode but mark non-approved in indicator.Fri, Jan 30, 10:42 AM
gniiberC0024db5afee8: fips: Unblock MD5 in fips mode but mark non-approved in indicator.Fri, Jan 30, 10:42 AM
gniiberC6805d76b7ed4: fips: Fix fips indicator function.Fri, Jan 30, 10:42 AM
gniiberCc5de9e77fb33: fips: Fix fips indicator function.Fri, Jan 30, 10:42 AM
gniiberC0b7ad923978f: doc: Document the new FIPS indicators.Fri, Jan 30, 10:42 AM
gniiberCfcb9ec67a117: doc: Document the new FIPS indicators.Fri, Jan 30, 10:42 AM
gniiberC05a9c9d1ba1d: fips: Add function-name based FIPS indicator.Fri, Jan 30, 10:42 AM
gniiberC0b2b30c0c42f: fips: Explicitly allow only some PK flags.Fri, Jan 30, 10:42 AM
gniiberC4c1c8a707f96: fips: Explicitly allow only some PK flags.Fri, Jan 30, 10:42 AM
gniiberC251f1749900e: fips: Explicitly disable overriding random in FIPS mode.Fri, Jan 30, 10:42 AM
gniiberC051bbe84d889: fips: Mark gcry_pk_encrypt/decrypt function non-approved.Fri, Jan 30, 10:42 AM
gniiberCe0a5a9eb8301: fips: Explicitly disable overriding random in FIPS mode.Fri, Jan 30, 10:42 AM
gniiberC05cb8355d3e6: fips: Mark gcry_pk_encrypt/decrypt function non-approved.Fri, Jan 30, 10:42 AM
gniiberCf6f345fe89b0: fips: More elaborate way of getting FIPS pk flags indicators.Fri, Jan 30, 10:42 AM
gniibeT6417: FIPS service indicator regarding the public key algorithm flags and objectsFri, Jan 30, 10:42 AM
wernerrC14835c5d7662: doc: Add remark that leading zeroes are stripped from printed MPIs.Fri, Jan 30, 10:42 AM
wernerT6435: libgcrypt | gcry_mpi_ec_mul return a truncated point coordinateFri, Jan 30, 10:42 AM
gniiberCf2ab06bc3ccc: build: Allow build with -Oz.Fri, Jan 30, 10:42 AM
gniibeT6432: libgcrypt - flag munging does not account for -OzFri, Jan 30, 10:42 AM
gniiberC7edf1abb9a0d: build: Allow build with -Oz.Fri, Jan 30, 10:42 AM
gniiberCf2ab06bc3ccc: build: Allow build with -Oz.Fri, Jan 30, 10:42 AM
gniiberC4128f73d3a83: cipher: Enable the fast path to ChaCha20 only when supported.Fri, Jan 30, 10:42 AM
gniibeT6384: libgcrypt link error if cipher chacha20 is not includedFri, Jan 30, 10:42 AM
gniiberC137f1fd82bc9: cipher: Enable the fast path to ChaCha20 only when supported.Fri, Jan 30, 10:42 AM
gniiberC4128f73d3a83: cipher: Enable the fast path to ChaCha20 only when supported.Fri, Jan 30, 10:42 AM
wernerrCb75a58df84a5: cipher: Fix edge case for SET_ALLOW_WEAK_KEY.Fri, Jan 30, 10:42 AM
gniiberCd41177937cea: random: Use getrandom only when it's appropriate.Fri, Jan 30, 10:42 AM
jukivilirC9b1ee0574ed9: Revert "cipher: Fix edge case for SET_ALLOW_WEAK_KEY."Fri, Jan 30, 10:42 AM
gniibeT6442: libgcrypt-1.10.2: getrandom() is not available everywhereFri, Jan 30, 10:42 AM
wernerT6451: libgcrypt | gcry_cipher_setkey: 3DES-CBC key returns GPG_ERR_WEAK even with GCRYCTL_SET_ALLOW_WEAK_KEYFri, Jan 30, 10:42 AM
jukiviliT6451: libgcrypt | gcry_cipher_setkey: 3DES-CBC key returns GPG_ERR_WEAK even with GCRYCTL_SET_ALLOW_WEAK_KEYFri, Jan 30, 10:42 AM
jukivilirCb75a58df84a5: cipher: Fix edge case for SET_ALLOW_WEAK_KEY.Fri, Jan 30, 10:42 AM
gniiberCfa21ddc158b5: random: Use getrandom only when it's appropriate.Fri, Jan 30, 10:42 AM
gniiberCd41177937cea: random: Use getrandom only when it's appropriate.Fri, Jan 30, 10:42 AM
gniiberCaab1d63e4def: random: Use getrandom (GRND_RANDOM) in FIPS mode.Fri, Jan 30, 10:42 AM
jukivilirC9b1ee0574ed9: Revert "cipher: Fix edge case for SET_ALLOW_WEAK_KEY."Fri, Jan 30, 10:42 AM
jukivilirC7cdfc869b7af: doc: add documentation for GCRYCTL_SET_ALLOW_WEAK_KEYFri, Jan 30, 10:42 AM
jukiviliT6451: libgcrypt | gcry_cipher_setkey: 3DES-CBC key returns GPG_ERR_WEAK even with GCRYCTL_SET_ALLOW_WEAK_KEYFri, Jan 30, 10:42 AM
gniiberC469919751d6e: cipher:ecc: Fix public key computation for EdDSA.Fri, Jan 30, 10:42 AM
gniiberCb863ec507dae: cipher:ecc: Fix public key computation for EdDSA.Fri, Jan 30, 10:42 AM
gniiberCc160e1a85f82: cipher:pubkey: Fix non-use of flexible array member.Fri, Jan 30, 10:42 AM
gniiberC31adc78fa503: cipher:ecc: Fix an error-path to release the KEY correctly.Fri, Jan 30, 10:42 AM
gniiberCc41d4f502f1b: ecc: Make the PCT recoverable in FIPS mode and consistent with RSA.Fri, Jan 30, 10:42 AM
gniiberC297c5a47837c: cipher:pubkey: Fix non-use of flexible array member.Fri, Jan 30, 10:42 AM
gniiberCd37ad2823f84: Remove out of core handler setting message in FIPS mode.Fri, Jan 30, 10:42 AM
gniiberC2c8562ca5a49: cipher:kdf: Move FIPS mode check to _gcry_kdf_derive.Fri, Jan 30, 10:42 AM
gniibeT6507: SCRYPT does not work in FIPS modeFri, Jan 30, 10:42 AM
gniibeT6515: GPG in FIPS mode spits out useless "out of core handler ignored in FIPS mode" message on every executionFri, Jan 30, 10:42 AM
gniiberC8cdd0d353e19: cipher:pubkey: Check digest size which should not be zero.Fri, Jan 30, 10:42 AM
gniibeT6539: The digest&sign/verify API with SHAKE-class digests does not workFri, Jan 30, 10:42 AM
gniiberC09ab61948845: build: Change the default for --with-libtool-modification.Fri, Jan 30, 10:42 AM
gniiberC49e1e67f4e4e: sexp: String with \0 is considered "binary".Fri, Jan 30, 10:42 AM
gniiberC0ddc823e331c: build: New configure option --with-libtool-modification.Fri, Jan 30, 10:42 AM
gniibeT6747: sexp string including \0Fri, Jan 30, 10:42 AM
gniibeT6619: How to maintain our local libtool patchFri, Jan 30, 10:42 AM
gniibeT6619: How to maintain our local libtool patchFri, Jan 30, 10:42 AM
gniiberC0ddc823e331c: build: New configure option --with-libtool-modification.Fri, Jan 30, 10:42 AM
gniiberC49e1e67f4e4e: sexp: String with \0 is considered "binary".Fri, Jan 30, 10:42 AM
gniiberC5e5dff0551fc: sexp: Minor clean-up of sexp output handling.Fri, Jan 30, 10:42 AM
gniiberC2143503b8f56: build: New configure option --with-libtool-modification.Fri, Jan 30, 10:42 AM
gniiberCddd41eb6ace0: sexp: String with \0 is considered "binary".Fri, Jan 30, 10:42 AM
gniiberCc31b70b2660c: const-time: Use ct_not_memequal, instead. Tested with AVR.Fri, Jan 30, 10:42 AM
gniiberCc848459e5126: build: Check if arch is VAX or compiler is MSVC.Fri, Jan 30, 10:42 AM
gniiberC34c204279260: rsa: Fix decoding of PKCS#1 v1.5 and OAEP padding.Fri, Jan 30, 10:42 AM
gniiberC45c992020168: rsa: Fix decoding of PKCS#1 v1.5 and OAEP padding.Fri, Jan 30, 10:42 AM
gniiberCfee1e63c7286: build: Check if arch is VAX or compiler is MSVC.Fri, Jan 30, 10:42 AM
gniiberCe8072d8d3255: const-time: Use ct_not_memequal, instead. Tested with AVR.Fri, Jan 30, 10:42 AM
gniiberCbd08357436a9: const-time: Add ct_memmov_cond, fix _gcry_mpih_set_cond.Fri, Jan 30, 10:42 AM
gniiberCc98b5e4a1471: rsa: Use memmov_independently when unpadding.Fri, Jan 30, 10:42 AM
gniiberC58b62be84454: rsa: Use memmov_independently when unpadding.Fri, Jan 30, 10:42 AM
gniiberC45945be8f3c3: const-time: Add ct_memmov_cond, fix _gcry_mpih_set_cond.Fri, Jan 30, 10:42 AM
gniiberC2839aaee3e6e: cipher: Fix ElGamal decryption.Fri, Jan 30, 10:42 AM