User Details
- User Since
- Mar 27 2017, 4:47 PM (471 w, 3 d)
- Roles
- Administrator
- Availability
- Busy Busy until Jun 29 2031.
Yesterday
Minimum fix is:
Wed, Apr 8
Wed, Apr 1
@jpalus You are right.
computed by ssh_signature_encoder_rsa, including additional 0, reach:
Thu, Mar 26
I applied the keyboxd part for SETEPHEMERAL command, as it doesn't break anything.
Wed, Mar 25
Here is an attempt to fix the client side:
Tue, Mar 24
Pushed the change: rG533bcc265e9c: common:dotlock: Clean up for error/info/warning message.
While I pushed the change of libgcrypt, I'd like to apply following change to GnuPG.
This is more kind than GPG_ERR_BAD_PASSPHRASE by gcry_pk_testkey failure.
Mon, Mar 23
I retract my patch in T8171#215603
@m.eik gave us this link: https://github.com/ProtonMail/go-crypto/issues/184
It had already fixed in: rG55b5928099ba: dirmngr: Change the default keyserver.
And then in: rGa2f2523b99ff: Remove the default keyserver.
With same reason for T3852, I close this ticket.
GPGME has been divided into new GpgME, QGpgme, GpgMEpp, and GpgME-python.
And new QGpgme uses CMake now.
Fri, Mar 20
Pushed the change of gpgme: rM8b89678aed6d: Fix passphrase cancel handling.
Pushed the last change: rG2239f687bb14: scd:openpgp: UI improvement for use of PIN-entry.
Thu, Mar 19
It seems that pinentry-curses defaults to "OK".
(my branch for GTK-4, same.)
This is a bit larger change (of UI improvement):
Wed, Mar 18
I sent a patch to gcrypt-devel mailing list for the preparation of the change of RSA secret key checking.
If enabled, wrong RSA secret key (wrong means: under the Libre/OpenPGP specification) is rejected at import when gpg-agent calls gcry_pk_test_key.
I consider again about Ben's change. It could be simply support of the detection of the cancel situation where gpgme should return GPG_ERR_CANCELED (not related to single cancellation vs. whole cancellation).
Tue, Mar 17
I investigated the introduction of STATUS_CANCELED_BY_USER and GPGME_STATUS_CANCELED_BY_USER:
rG31e47dfad0f4: gpg: Add canceled status message.
rM35ca460019ea: Parse STATUS_CANCELED_BY_USER.
For OpenSSH, ssh-agent spec. defines p, q, and qInv.
FIPS has: FIPS 186-5 and SP 800-56Br2.
existing standards
Mon, Mar 16
CRT is used with GnuPG. In libgcrypt, pk_sign and pk_decrypt don't require P, Q, and U in a key (it's optional), but pk_test_key does.
Fri, Mar 13
Wed, Mar 11
@bernhard Thank you for the link.
Mar 10 2026
I was wrong. gpg (scdaemon) needed to be fixed with more changes for the interaction with pinentry.
I pushed my patch for gpg, since it does not break anything, just allow empty passphrase input (to skip).
I also pushed my patch for gpgme. I believe that it's correct.
@ebo, I try to answer your question. As I wrote, the behavior of gpg implementations are different (for a reason). I'm not sure if you suggest the change of behavior of gpg 2.4.
Mar 9 2026
I was too optimistic. GPGME is required the following change, too:
diff --git a/src/passphrase.c b/src/passphrase.c index 140cd03a..d07afa91 100644 --- a/src/passphrase.c +++ b/src/passphrase.c @@ -114,6 +114,11 @@ _gpgme_passphrase_status_handler (void *priv, gpgme_status_code_t code, case GPGME_STATUS_CANCELED_BY_USER: return gpg_error (GPG_ERR_CANCELED);
I'd propose applying the patch of mine above to gpg, and letting us suggest users to input empty pass phrase to skip (instead of cancelling).
This could be a minimum change (only gpg). Or else, gpgme needs to be changed to ignore CANCEL status and to handle complex cases; I think that it's not easy change.
Mar 4 2026
Possibly, it was the same cause as T8052 (the bug in libgpg-error spawning a process).
I looked at sm/keydb.c:keydb_set_ephemeral function. It says:
How did you configure? If possible, please show us the configure options when you built.
Did it work in older version(s) of libgpg-error?
Mar 3 2026
It seemed that the reporter (also) claimed that a git repo could be weak/vulnerable when X.509 signature (with a relevant curve key) is used to validate the commit.
For the record (to show we don't hide a problem), I add some information.
It should be solved by the upstream (libtool, gnulib, and possibly autoconf/automake). The solution would be refactoring AC_PROG_LD and AC_LIB_PROG_LD factoring out common things like handling of use of GNU LD.
Mar 2 2026
The reporter informed us that the possible DoS has CVE number assigned:
CVE-2025-69913
Feb 27 2026
I found that it's not that simple to accept the case of no newline at the end.
Because we need to handle the edge case where no newline occurs at the maximum buffer length, too.
It's something like the following.