Page MenuHome GnuPG
Feed All Transactions
AuthorObjectTransactionDate
gniibeT6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in aptFri, Jan 30, 10:42 AM
gniibeT6393: DRBG with SHA384 is no longer allowed in FIPS mode (and looks like impossible to enable anyway)Fri, Jan 30, 10:42 AM
gniibeT5512: Implement service indicatorsFri, Jan 30, 10:42 AM
gniiberC45b80678109e: random: Remove unused SHA384 DRBGs.Fri, Jan 30, 10:42 AM
gniiberC4cff7e739829: random: Remove unused SHA384 DRBGs.Fri, Jan 30, 10:42 AM
gniiberCa51f0e66842a: fips: Add explicit indicators for md and mac algorithms.Fri, Jan 30, 10:42 AM
gniiberC397ff085749e: kdf: Update tests in regards to the allowed parameters in FIPS mode.Fri, Jan 30, 10:42 AM
gniiberC076dd2ffcd95: fips: Check return value from ftellFri, Jan 30, 10:42 AM
gniiberCc88672a327f6: fips: Add explicit indicators for md and mac algorithms.Fri, Jan 30, 10:42 AM
gniiberC3fd3bb31597f: fips: Check return value from ftellFri, Jan 30, 10:42 AM
gniiberC535a4d345872: fips: Recover test cases for selftest, add skipping in FIPS mode.Fri, Jan 30, 10:42 AM
gniiberCf5fe94810f30: kdf: Update tests in regards to the allowed parameters in FIPS mode.Fri, Jan 30, 10:42 AM
gniiberC0024db5afee8: fips: Unblock MD5 in fips mode but mark non-approved in indicator.Fri, Jan 30, 10:42 AM
gniibeT6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in aptFri, Jan 30, 10:42 AM
gniiberCdc4a60e2d70b: fips: Unblock MD5 in fips mode but mark non-approved in indicator.Fri, Jan 30, 10:42 AM
gniiberC0024db5afee8: fips: Unblock MD5 in fips mode but mark non-approved in indicator.Fri, Jan 30, 10:42 AM
gniiberC6805d76b7ed4: fips: Fix fips indicator function.Fri, Jan 30, 10:42 AM
gniiberCc5de9e77fb33: fips: Fix fips indicator function.Fri, Jan 30, 10:42 AM
gniiberC0b7ad923978f: doc: Document the new FIPS indicators.Fri, Jan 30, 10:42 AM
gniiberCfcb9ec67a117: doc: Document the new FIPS indicators.Fri, Jan 30, 10:42 AM
gniiberC05a9c9d1ba1d: fips: Add function-name based FIPS indicator.Fri, Jan 30, 10:42 AM
gniiberC0b2b30c0c42f: fips: Explicitly allow only some PK flags.Fri, Jan 30, 10:42 AM
gniiberC4c1c8a707f96: fips: Explicitly allow only some PK flags.Fri, Jan 30, 10:42 AM
gniiberC251f1749900e: fips: Explicitly disable overriding random in FIPS mode.Fri, Jan 30, 10:42 AM
gniiberC051bbe84d889: fips: Mark gcry_pk_encrypt/decrypt function non-approved.Fri, Jan 30, 10:42 AM
gniiberCe0a5a9eb8301: fips: Explicitly disable overriding random in FIPS mode.Fri, Jan 30, 10:42 AM
gniiberC05cb8355d3e6: fips: Mark gcry_pk_encrypt/decrypt function non-approved.Fri, Jan 30, 10:42 AM
gniiberCf6f345fe89b0: fips: More elaborate way of getting FIPS pk flags indicators.Fri, Jan 30, 10:42 AM
gniibeT6417: FIPS service indicator regarding the public key algorithm flags and objectsFri, Jan 30, 10:42 AM
wernerrC14835c5d7662: doc: Add remark that leading zeroes are stripped from printed MPIs.Fri, Jan 30, 10:42 AM
wernerT6435: libgcrypt | gcry_mpi_ec_mul return a truncated point coordinateFri, Jan 30, 10:42 AM
gniiberCf2ab06bc3ccc: build: Allow build with -Oz.Fri, Jan 30, 10:42 AM
gniibeT6432: libgcrypt - flag munging does not account for -OzFri, Jan 30, 10:42 AM
gniiberC7edf1abb9a0d: build: Allow build with -Oz.Fri, Jan 30, 10:42 AM
gniiberCf2ab06bc3ccc: build: Allow build with -Oz.Fri, Jan 30, 10:42 AM
gniiberC4128f73d3a83: cipher: Enable the fast path to ChaCha20 only when supported.Fri, Jan 30, 10:42 AM
gniibeT6384: libgcrypt link error if cipher chacha20 is not includedFri, Jan 30, 10:42 AM
gniiberC137f1fd82bc9: cipher: Enable the fast path to ChaCha20 only when supported.Fri, Jan 30, 10:42 AM
gniiberC4128f73d3a83: cipher: Enable the fast path to ChaCha20 only when supported.Fri, Jan 30, 10:42 AM
wernerrCb75a58df84a5: cipher: Fix edge case for SET_ALLOW_WEAK_KEY.Fri, Jan 30, 10:42 AM
gniiberCd41177937cea: random: Use getrandom only when it's appropriate.Fri, Jan 30, 10:42 AM
jukivilirC9b1ee0574ed9: Revert "cipher: Fix edge case for SET_ALLOW_WEAK_KEY."Fri, Jan 30, 10:42 AM
gniibeT6442: libgcrypt-1.10.2: getrandom() is not available everywhereFri, Jan 30, 10:42 AM
wernerT6451: libgcrypt | gcry_cipher_setkey: 3DES-CBC key returns GPG_ERR_WEAK even with GCRYCTL_SET_ALLOW_WEAK_KEYFri, Jan 30, 10:42 AM
jukiviliT6451: libgcrypt | gcry_cipher_setkey: 3DES-CBC key returns GPG_ERR_WEAK even with GCRYCTL_SET_ALLOW_WEAK_KEYFri, Jan 30, 10:42 AM
jukivilirCb75a58df84a5: cipher: Fix edge case for SET_ALLOW_WEAK_KEY.Fri, Jan 30, 10:42 AM
gniiberCfa21ddc158b5: random: Use getrandom only when it's appropriate.Fri, Jan 30, 10:42 AM
gniiberCd41177937cea: random: Use getrandom only when it's appropriate.Fri, Jan 30, 10:42 AM
gniiberCaab1d63e4def: random: Use getrandom (GRND_RANDOM) in FIPS mode.Fri, Jan 30, 10:42 AM
jukivilirC9b1ee0574ed9: Revert "cipher: Fix edge case for SET_ALLOW_WEAK_KEY."Fri, Jan 30, 10:42 AM
jukivilirC7cdfc869b7af: doc: add documentation for GCRYCTL_SET_ALLOW_WEAK_KEYFri, Jan 30, 10:42 AM
jukiviliT6451: libgcrypt | gcry_cipher_setkey: 3DES-CBC key returns GPG_ERR_WEAK even with GCRYCTL_SET_ALLOW_WEAK_KEYFri, Jan 30, 10:42 AM
gniiberC469919751d6e: cipher:ecc: Fix public key computation for EdDSA.Fri, Jan 30, 10:42 AM
gniiberCb863ec507dae: cipher:ecc: Fix public key computation for EdDSA.Fri, Jan 30, 10:42 AM
gniiberCc160e1a85f82: cipher:pubkey: Fix non-use of flexible array member.Fri, Jan 30, 10:42 AM
gniiberC31adc78fa503: cipher:ecc: Fix an error-path to release the KEY correctly.Fri, Jan 30, 10:42 AM
gniiberCc41d4f502f1b: ecc: Make the PCT recoverable in FIPS mode and consistent with RSA.Fri, Jan 30, 10:42 AM
gniiberC297c5a47837c: cipher:pubkey: Fix non-use of flexible array member.Fri, Jan 30, 10:42 AM
gniiberCd37ad2823f84: Remove out of core handler setting message in FIPS mode.Fri, Jan 30, 10:42 AM
gniiberC2c8562ca5a49: cipher:kdf: Move FIPS mode check to _gcry_kdf_derive.Fri, Jan 30, 10:42 AM
gniibeT6507: SCRYPT does not work in FIPS modeFri, Jan 30, 10:42 AM
gniibeT6515: GPG in FIPS mode spits out useless "out of core handler ignored in FIPS mode" message on every executionFri, Jan 30, 10:42 AM
gniiberC8cdd0d353e19: cipher:pubkey: Check digest size which should not be zero.Fri, Jan 30, 10:42 AM
gniibeT6539: The digest&sign/verify API with SHAKE-class digests does not workFri, Jan 30, 10:42 AM
gniiberC09ab61948845: build: Change the default for --with-libtool-modification.Fri, Jan 30, 10:42 AM
gniiberC49e1e67f4e4e: sexp: String with \0 is considered "binary".Fri, Jan 30, 10:42 AM
gniiberC0ddc823e331c: build: New configure option --with-libtool-modification.Fri, Jan 30, 10:42 AM
gniibeT6747: sexp string including \0Fri, Jan 30, 10:42 AM
gniibeT6619: How to maintain our local libtool patchFri, Jan 30, 10:42 AM
gniibeT6619: How to maintain our local libtool patchFri, Jan 30, 10:42 AM
gniiberC0ddc823e331c: build: New configure option --with-libtool-modification.Fri, Jan 30, 10:42 AM
gniiberC49e1e67f4e4e: sexp: String with \0 is considered "binary".Fri, Jan 30, 10:42 AM
gniiberC5e5dff0551fc: sexp: Minor clean-up of sexp output handling.Fri, Jan 30, 10:42 AM
gniiberC2143503b8f56: build: New configure option --with-libtool-modification.Fri, Jan 30, 10:42 AM
gniiberCddd41eb6ace0: sexp: String with \0 is considered "binary".Fri, Jan 30, 10:42 AM
gniiberCc31b70b2660c: const-time: Use ct_not_memequal, instead. Tested with AVR.Fri, Jan 30, 10:42 AM
gniiberCc848459e5126: build: Check if arch is VAX or compiler is MSVC.Fri, Jan 30, 10:42 AM
gniiberC34c204279260: rsa: Fix decoding of PKCS#1 v1.5 and OAEP padding.Fri, Jan 30, 10:42 AM
gniiberC45c992020168: rsa: Fix decoding of PKCS#1 v1.5 and OAEP padding.Fri, Jan 30, 10:42 AM
gniiberCfee1e63c7286: build: Check if arch is VAX or compiler is MSVC.Fri, Jan 30, 10:42 AM
gniiberCe8072d8d3255: const-time: Use ct_not_memequal, instead. Tested with AVR.Fri, Jan 30, 10:42 AM
gniiberCbd08357436a9: const-time: Add ct_memmov_cond, fix _gcry_mpih_set_cond.Fri, Jan 30, 10:42 AM
gniiberCc98b5e4a1471: rsa: Use memmov_independently when unpadding.Fri, Jan 30, 10:42 AM
gniiberC58b62be84454: rsa: Use memmov_independently when unpadding.Fri, Jan 30, 10:42 AM
gniiberC45945be8f3c3: const-time: Add ct_memmov_cond, fix _gcry_mpih_set_cond.Fri, Jan 30, 10:42 AM
gniiberC2839aaee3e6e: cipher: Fix ElGamal decryption.Fri, Jan 30, 10:42 AM
gniiberC6d1d50ba3aad: cipher: Fix ElGamal decryption.Fri, Jan 30, 10:42 AM
gniiberC137e35ad47ee: const-time: always avoid comparison operator for byte comparisonFri, Jan 30, 10:42 AM
gniiberC892bc25ff74b: Use single constant-time memory comparison implementationFri, Jan 30, 10:42 AM
gniiberC5e9ba851948f: const-time: always avoid comparison operator for byte comparisonFri, Jan 30, 10:42 AM
gniiberC3583e2ebcad5: rsa, elgamal: avoid logical not operator in constant-time codeFri, Jan 30, 10:42 AM
gniiberC84f934c09afa: rsa, elgamal: avoid logical not operator in constant-time codeFri, Jan 30, 10:42 AM
gniiberC1e9ddbd65c46: Use single constant-time memory comparison implementationFri, Jan 30, 10:42 AM
gniiberC22dde5150ee2: const-time: prefix global symbols with _gcry_Fri, Jan 30, 10:42 AM
gniiberC0c6ec6bbe788: mpih_set_cond: restore EM leakage mitigationFri, Jan 30, 10:42 AM
gniiberC3fa1b81c92e5: const-time: prefix global symbols with _gcry_Fri, Jan 30, 10:42 AM
gniiberC7f0eb519897b: mpih_set_cond: restore EM leakage mitigationFri, Jan 30, 10:42 AM
gniiberC9c0984ed2c55: const-time: ct_memmov_cond: switch to use dual mask approachFri, Jan 30, 10:42 AM
gniiberCd4aee9ace9a9: mpiutil: use global vone and vzeroFri, Jan 30, 10:42 AM
gniiberC6377725ed01e: mpiutil: use global vone and vzeroFri, Jan 30, 10:42 AM