User Details
- User Since
- Mar 27 2017, 4:47 PM (413 w, 1 d)
- Roles
- Administrator
- Availability
- Busy Busy until Feb 16 2031.
Yesterday
One more change for _gcry_dsa_gen_k in rC54caef02afa9: cipher:(EC)DSA: Simply use mpi_clear_highbit in _gcry_dsa_gen_k.
One more change for mpi_invm in rCc1da86e45a6e: mpi: Avoid normalizing MPI in _gcry_mpi_invm.
Thu, Feb 20
Wed, Feb 19
All changes are pushed to master.
Pushed the changes by the commit rC2039d93289db: mpi: Add MPI helper modular exponentiation, Least Leak Intended.
Tue, Feb 18
Mon, Feb 17
Fri, Feb 14
Use of mpi_cmp is now being fixed, by providing _gcry_mpih_cmp_lli function.
Along with that, we need to fix use of mpi_cmp_ui, since it's skips earlier depending its limbs.
diff --git a/cipher/dsa-common.c b/cipher/dsa-common.c index 170dce12..e010e182 100644 --- a/cipher/dsa-common.c +++ b/cipher/dsa-common.c @@ -25,6 +25,7 @@
Mon, Feb 10
And then, we need to use less leaky version of mpi_cmp (because mpi_cmp calls mpi_normalize, it's not good).
And this is for less leak for _gcry_dsa_modify_k:
This is needed before we remove leaks by mpi_add in _gcry_dsa_modify_k :
Commit rC35a6a6feb9dc: Fix _gcry_dsa_modify_k. is related, but it doesn't matter for usual compilers (it's an issue for MSVC).
Fri, Feb 7
This is needed for RFC6979 flag support.
Thu, Feb 6
Mon, Feb 3
Fri, Jan 31
The commit rC58c11aa8 is the improved version by k-ary exponentiation (while rC6dffd105e2e2 is 1-bit at a time) and using heap.
Jan 27 2025
Jan 25 2025
I created https://dev.gnupg.org/source/libgcrypt/history/gniibe%252Ft7490/
The commit rC6dffd105e2e2 works for me.
It is a bit of exponent at time Montgomery exponentiation.
I don't put an optimization for the reduction as I don't know if it's OK for patent-wise (looks like expired, though).
Jan 22 2025
Jan 21 2025
For command line, reported issues have been fixed; Confusions for wrong errors are gone, it correctly reports appropriate errors of:
- GPG_ERR_PIN_BLOCKED
- GPG_ERR_NO_RESET_CODE
- GPG_ERR_BAD_PIN
Do you think it's too difficult for a beginner to write a pinentry-gtk4?
Jan 20 2025
Reported gnupg channel on IRC.
An ascii armored file in question was: https://github.com/syncthing/syncthing/releases/download/v1.29.2/sha256sum.txt.asc
When CHECKCRC == 0 (no CRC), ->any_data was not set, resulted
no valid OpenPGP data found.
wrongly.
Jan 17 2025
Re-open, so that I can pursue constant-time modular exponentiation.
Jan 15 2025
Jan 14 2025
@werner I read the code of gpgme/src/posix-io.c. I understand the two points:
- For the correctness sake, the possible interrupted closefrom should be handled.
- we can share the code with closefrom case and non-closefrom case.
Jan 10 2025
One year later, I also did translation work for kleo and libkleo, which are pushed by Andre.
So, closing this task.
Fixed in 2.5.2.
Fixed in 2.5.3.
Fixed in 2.5.2.
Jan 9 2025
Jan 8 2025
Thank you for your report.
Jan 6 2025
Dec 30 2024
Thank you. Fixed in: rPb415f3108921: build: Fix warning about obsolete pinentry-emacs.
Dec 27 2024
Dec 23 2024
Dec 20 2024
This problem has gone in libgpg-error 1.51, since the implementation doesn't use environ any more.