jvoisin | 20 Apr 01:10 2015

Using secure memory

Hello,
I am a libotr[1] contributor, and I'd like to make use of libotr's
secure memory; unfortunately, I can't find in the documentation the
correct way to initialize it: Libotr is not a program, it's a library,
and this situation is not described in the documentation[2].

Also, I'm wondering how I can estimate how much memory I should
allocate; for now I tried with 32k and the testsuite is running great,
but I'm worried about some possible breakages.

Cheers,

1. https://otr.im and https://otr.cypherpunks.ca/
2.
https://www.gnupg.org/documentation/manuals/gcrypt/Initializing-the-library.html

--

-- 
GPG: 9768FD3CC48815F2
dustri.org
by Werner Koch | 15 Apr 12:36 2015
Picon

[git] GCRYPT - branch, master, updated. libgcrypt-1.6.0-185-gfe38d38

This is an automated email from the git hooks/post-receive script. It was
generated because a ref change was pushed to the repository containing
the project "The GNU crypto library".

The branch, master has been updated
       via  fe38d3815b4cd203cd529949e244aca80d32897f (commit)
       via  3b03a3b493233a472da531d8d9582d1be6d376b0 (commit)
      from  9fca46864e1b5a9c788072113589454adb89fa97 (commit)

Those revisions listed above that are new to this repository have
not appeared on any other notification email; so we list those
revisions in full, below.

- Log -----------------------------------------------------------------
commit fe38d3815b4cd203cd529949e244aca80d32897f
Author: Werner Koch <wk <at> gnupg.org>
Date:   Wed Apr 15 12:34:38 2015 +0200

    tests: Add option to time the S2K function.

    * tests/t-kdf.c: Include stopwatch.h.
    (dummy_consumer): new.
    (bench_s2k): New.
    (main): Add option parser and option --s2k.
    --

    For example:

      $ ./t-kdf --s2k 17659904
     88.0ms
(Continue reading)

Toomas Soome | 13 Apr 19:31 2015

signed/unsigned compare in cipher/rijndael.c


hi!

do_setkey() in cipher/rijndael.c has argument unsigned keylen which is compared in for loop with int i -
and making compilers to spit warning about comparing signed with unsigned. since i is only used in this
loop (line #350) and using positive values, its safe to declare i as unsigned as well (line #217). could you
please fix it?:)

rgds,
toomas
by Werner Koch | 13 Apr 17:19 2015
Picon

[git] GCRYPT - branch, master, updated. libgcrypt-1.6.0-183-g9fca468

This is an automated email from the git hooks/post-receive script. It was
generated because a ref change was pushed to the repository containing
the project "The GNU crypto library".

The branch, master has been updated
       via  9fca46864e1b5a9c788072113589454adb89fa97 (commit)
      from  6e31a2805c5e808fe50a0c2529823f6501db2d38 (commit)

Those revisions listed above that are new to this repository have
not appeared on any other notification email; so we list those
revisions in full, below.

- Log -----------------------------------------------------------------
commit 9fca46864e1b5a9c788072113589454adb89fa97
Author: Werner Koch <wk <at> gnupg.org>
Date:   Mon Apr 13 11:48:33 2015 +0200

    mpi: Fix gcry_mpi_copy for NULL opaque data.

    * mpi/mpiutil.c (_gcry_mpi_copy): Copy opaque only if needed.
    --

    gcry_mpi_set_opaque allows to store NULL as opaque data.  Thus we also
    need to take care when copying such data.

    Signed-off-by: Werner Koch <wk <at> gnupg.org>

diff --git a/mpi/mpiutil.c b/mpi/mpiutil.c
index fbbd3b4..71b3f1c 100644
--- a/mpi/mpiutil.c
(Continue reading)

by Werner Koch | 12 Apr 19:52 2015
Picon

[git] GCRYPT - branch, master, updated. libgcrypt-1.6.0-182-g6e31a28

This is an automated email from the git hooks/post-receive script. It was
generated because a ref change was pushed to the repository containing
the project "The GNU crypto library".

The branch, master has been updated
       via  6e31a2805c5e808fe50a0c2529823f6501db2d38 (commit)
      from  a06fbc0d1e98eb1218eff55ad2f37d471e4f33b2 (commit)

Those revisions listed above that are new to this repository have
not appeared on any other notification email; so we list those
revisions in full, below.

- Log -----------------------------------------------------------------
commit 6e31a2805c5e808fe50a0c2529823f6501db2d38
Author: Werner Koch <wk <at> gnupg.org>
Date:   Sun Apr 12 19:50:49 2015 +0200

    Add git url to AUTHORS

    --

diff --git a/AUTHORS b/AUTHORS
index e186a48..1e34aed 100644
--- a/AUTHORS
+++ b/AUTHORS
 <at>  <at>  -1,7 +1,9  <at>  <at> 
 Library: Libgcrypt
 Homepage: http://www.gnu.org/software/libgcrypt/
+Download: ftp://ftp.gnupg.org/gcrypt/libgcrypt/
+Repository: git://git.gnupg.org/libgcrypt.git
(Continue reading)

Paul Menzel | 11 Apr 10:14 2015
Picon
Picon

Warnings from Clang 3.7

Dear Libgrypt developers,


with Debian Sid/unstable I installed the package `clang-3.7` and build
Libgrypt 1.6.3 with it.

Clang 3.7 reports some warnings. Are these expected? If not, could you
address those please?

Please find the log pasted at the end of the message.


Thanks,

Paul


PS: Please CC me on replies as I am not subscribed to the list.


$ CC=clang-3.7 ./configure
[…]
        Libgcrypt v1.6.3 has been configured as follows:
         
        Platform:                  GNU/Linux (i686-pc-linux-gnu)
        Hardware detection module: hwf-x86
        Enabled cipher algorithms: arcfour blowfish cast5 des aes twofish
                                   serpent rfc2268 seed camellia idea salsa20
                                   gost28147
        Enabled digest algorithms: crc gostr3411-94 md4 md5 rmd160 sha1
(Continue reading)

Jan Svensson | 8 Apr 23:07 2015

Blind signatures with libgcrypt

Hello,

I'm working on a project where I'm thinking of creating three small programs in e.g. the C language that all
would use Libgcrypt if possible:
* a program "generate_blinding_factor" that generates a blinding factor "b".
* a program "blind" that takes a short text message in clear text and a blinding factor "b" as input
parameters and gives as output the message in blinded format.
* a program "unblind" that takes a signed blinded message and a blinding factor "b" as input parameters and
unblinds the message to get the output of the signed message in clear text.

Course of events:
1. the user would use "generate_blinding_factor" to generate a blinding factor "b"
2. the user would use "blind" with parameters "message" and "b" to blind the clear text message.
3. the user would send the blinded message to the signer.
4. the signer would sign the blinded message with e.g. "gpg --output blinded_message.sig --sign
blinded_message" while not being able to see the clear text of the message he/she signs.
5. the signer would send the signed blinded message back to the user.
6. the user would use "unblind" with parameters "signed blinded message" and "b" to unblind the message and
getting the clear text message signed by the signer.
7. the user would later (at the same time as other users) anonymously send the signed message to the signer.

We can assume that the signer keeps the blinded message he/she received in step 3 above so when the signer in
step 7 gets to see the unblinded message in clear text, now also with the signers signature, then the signer
cannot link those two messages to each other, i.e. sign(blind(message,b),d) and sign(message,d)
cannot be linked.

Would it be possible to do the above with Libgcrypt and RSA? I've read in
http://www.gnupg.org/documentation/manuals/gcrypt/gcrypt.pdf that Libgcrypt uses blinding for
RSA decryption. It would be really nice if it was possible to use Libgcrypt in this project since I suppose
it would be much more complicated for me to try to fetch the relevant code from Libgcrypt and then try to
(Continue reading)

Lew Palm | 8 Apr 16:31 2015
Picon

Bug report: _gcry_fast_random_poll() sets local variable to NULL (maybe we shouldn't)

Hi gcrypt folks,

I observed our libgcrypt-based 64-bit application crashing on Windows 7
with segfaults. We use a current libgcrypt version from the git repo
(40a7bdf50e19faaf106470897fed72af623adc50).

I hunted down the problem to md_open() in md.c, line 369:
*h = hd;

h is a NULL pointer in that situation. But why?

_gcry_fast_random_poll() (md.c, line 358) is the evildoer! Before the
_gcry_fast_random_poll() call, h points to something reasonable, but
after this call it points to NULL.

_gcry_fast_random_poll() seems to do something nasty with the stack.

Regards,
  Lew

--

-- 
Dipl.-Inf. Lew Palm
Softwareentwicklung

m-privacy GmbH
Werner-Voß-Damm 62
12101 Berlin
Fon: +49 30 24632203
Fax: +49 30 99296856
http://www.m-privacy.de
(Continue reading)

by Jussi Kivilinna | 21 Mar 12:06 2015
Picon

[git] GCRYPT - branch, master, updated. libgcrypt-1.6.0-181-ga06fbc0

This is an automated email from the git hooks/post-receive script. It was
generated because a ref change was pushed to the repository containing
the project "The GNU crypto library".

The branch, master has been updated
       via  a06fbc0d1e98eb1218eff55ad2f37d471e4f33b2 (commit)
       via  92fa5f16d69707e302c0f85b2e5e80af8dc037f1 (commit)
       via  aa234561d00c3fb15fe501df4bf58f3db7c7c06b (commit)
      from  f5832285b0e420d77be1b8da10a1e1d86583b414 (commit)

Those revisions listed above that are new to this repository have
not appeared on any other notification email; so we list those
revisions in full, below.

- Log -----------------------------------------------------------------
commit a06fbc0d1e98eb1218eff55ad2f37d471e4f33b2
Author: Jussi Kivilinna <jussi.kivilinna <at> iki.fi>
Date:   Sat Mar 21 13:01:38 2015 +0200

    wipememory: use one-byte aligned type for unaligned memory accesses

    * src/g10lib.h (fast_wipememory2_unaligned_head): Enable unaligned
    access only when HAVE_GCC_ATTRIBUTE_PACKED and
    HAVE_GCC_ATTRIBUTE_ALIGNED defined.
    (fast_wipememory_t): New.
    (fast_wipememory2): Use 'fast_wipememory_t'.
    --

    Signed-off-by: Jussi Kivilinna <jussi.kivilinna <at> iki.fi>

(Continue reading)

by Werner Koch | 19 Mar 10:45 2015
Picon

[git] GCRYPT - branch, master, updated. libgcrypt-1.6.0-178-gf583228

This is an automated email from the git hooks/post-receive script. It was
generated because a ref change was pushed to the repository containing
the project "The GNU crypto library".

The branch, master has been updated
       via  f5832285b0e420d77be1b8da10a1e1d86583b414 (commit)
      from  db8ae3616987fa288173446398a107e31e2e28aa (commit)

Those revisions listed above that are new to this repository have
not appeared on any other notification email; so we list those
revisions in full, below.

- Log -----------------------------------------------------------------
commit f5832285b0e420d77be1b8da10a1e1d86583b414
Author: Werner Koch <wk <at> gnupg.org>
Date:   Thu Mar 19 10:43:55 2015 +0100

    Fix two pedantic warnings.

    * src/gcrypt.h.in (gcry_mpi_flag, gcry_mac_algos): Remove trailing
    comma.
    --

    Reported-by: Opal Raava <opalraava <at> hushmail.com>
    Signed-off-by: Werner Koch <wk <at> gnupg.org>

diff --git a/src/gcrypt.h.in b/src/gcrypt.h.in
index 10099e1..cac2b49 100644
--- a/src/gcrypt.h.in
+++ b/src/gcrypt.h.in
(Continue reading)

Opal Raava | 19 Mar 05:00 2015

Small diff to remove two commas from gcrypt.h.in which cause warnings with -pedantic

Hi all,

This is my first post to the mailing list, so I hope I'm doing things right. 

I pulled the latest libgcrypt from the git and compiled an example program with it. I used gcc -Wpedantic to
compile it, and I get two warnings. For a header so public as gcrypt.h it would sure be nice if people can
compile it with -Wall -pedantic without complaints from the compiler.

The warnings are about comma's at the end of enumerator lists. Here is the output:

---
In file included from pubkey_example.c:27:0:
/usr/include/gcrypt.h:514:32: warning: comma at end of enumerator list [-Wpedantic]
     GCRYMPI_FLAG_USER4 = 0x0800,/* User flag 4.  */
                                ^
/usr/include/gcrypt.h:1375:29: warning: comma at end of enumerator list [-Wpedantic]
     GCRY_MAC_FLAG_SECURE = 1,  /* Allocate all buffers in "secure" memory.  */
                             ^
---

To remove the commas I made a small git diff that removes them. I hope this humble change in 'gcrypt.h.in'
will make it through:)

Thanks,
--Opal

diff --git a/src/gcrypt.h.in b/src/gcrypt.h.in
index 10099e1..cac2b49 100644
--- a/src/gcrypt.h.in
+++ b/src/gcrypt.h.in
(Continue reading)


Gmane