Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Qt Project file. #1

Open
wants to merge 4 commits into
base: master
Choose a base branch
from
Open

Conversation

OneSecure
Copy link

Qt Project file. Compiled successfully with VS2015 and Qt Creator.

@Sibras Sibras force-pushed the master branch 2 times, most recently from 52e41af to b9b1ff6 Compare September 8, 2019 22:15
Sibras pushed a commit that referenced this pull request May 20, 2023
* cipher/pubkey-util.c (_gcry_pk_util_data_to_mpi): Block PKCS #1.5
  padding for encryption in FIPS mode
* cipher/rsa.c (rsa_decrypt): Block PKCS #1.5 decryption in FIPS mode
--

Applied the master commit of:
	c7709f7

GnuPG-bug-id: 5918
Signed-off-by: Jakub Jelen <jjelen@redhat.com>
Sibras pushed a commit that referenced this pull request May 20, 2023
* tests/basic.c (check_pubkey_crypt): Expect RSA PKCS #1.5 encryption to
  fail in FIPS mode. Expect failure when wrong padding is selected
* tests/pkcs1v2.c (check_v15crypt): Expect RSA PKCS #1.5 encryption to
  fail in FIPS mode
--

Applied the master commit of:
	f736f3c

GnuPG-bug-id: 5918
Signed-off-by: Jakub Jelen <jjelen@redhat.com>
Sibras pushed a commit that referenced this pull request Jun 29, 2024
* cipher/kdf.c (balloon_xor_block): Use 'buf_xor' helper function; Change
pointer parameters to 'void *' type.
(balloon_final): Don't cast last_block to 'u64 *' for balloon_xor_block
call.
--

Seen on s390x UBSAN:
/home/testbuild/libgcrypt/cipher/kdf.c:1130:12: runtime error: load of misaligned address 0x00400181370c for type 'u64', which requires 8 byte alignment
0x00400181370c: note: pointer points here
  01 01 01 01 00 00 00 00  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00
              ^
    #0 0x4001a3f3d3  (/run/user/1006/libgcrypt/build_s390x-linux-gnu_ubsan/src/.libs/libgcrypt.so.20+0x1f83d3)
    #1 0x40019cf049  (/run/user/1006/libgcrypt/build_s390x-linux-gnu_ubsan/src/.libs/libgcrypt.so.20+0x188049)
    #2 0x400000acbf  (/run/user/1006/libgcrypt/build_s390x-linux-gnu_ubsan/tests/t-kdf+0xacbf)
    #3 0x4000008931  (/run/user/1006/libgcrypt/build_s390x-linux-gnu_ubsan/tests/t-kdf+0x8931)
    #4 0x400271a031  (/lib/libc.so.6+0x2b031)
    #5 0x400271a10d  (/lib/libc.so.6+0x2b10d)
    #6 0x4000009bcf  (/run/user/1006/libgcrypt/build_s390x-linux-gnu_ubsan/tests/t-kdf+0x9bcf)

GnuPG-bug-id: 5817
Signed-off-by: Jussi Kivilinna <jussi.kivilinna@iki.fi>
Sibras pushed a commit that referenced this pull request Jun 29, 2024
* cipher/pubkey-util.c (_gcry_pk_util_data_to_mpi): Block PKCS #1.5
  padding for encryption in FIPS mode
* cipher/rsa.c (rsa_decrypt): Block PKCS #1.5 decryption in FIPS mode
--

GnuPG-bug-id: 5918
Signed-off-by: Jakub Jelen <jjelen@redhat.com>
Sibras pushed a commit that referenced this pull request Jun 29, 2024
* tests/basic.c (check_pubkey_crypt): Expect RSA PKCS #1.5 encryption to
  fail in FIPS mode. Expect failure when wrong padding is selected
* tests/pkcs1v2.c (check_v15crypt): Expect RSA PKCS #1.5 encryption to
  fail in FIPS mode
--

GnuPG-bug-id: 5918
Signed-off-by: Jakub Jelen <jjelen@redhat.com>
Sibras pushed a commit that referenced this pull request Jun 29, 2024
This reverts commit c7709f7. The pubkey
encryption has already separate explicit FIPS service indicator.
Sibras pushed a commit that referenced this pull request Jun 29, 2024
This reverts commit f736f3c. The pubkey
encryption has already separate explicit FIPS service indicator.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant