commit
e8231135ad
@ -0,0 +1 @@
|
|||||||
|
SOURCES/libgcrypt-1.8.4-hobbled.tar.xz
|
@ -0,0 +1 @@
|
|||||||
|
8684d84e13f2020b40a7d62dd5f4301568939cc2 SOURCES/libgcrypt-1.8.4-hobbled.tar.xz
|
@ -0,0 +1,144 @@
|
|||||||
|
/* curves.c - ECC curves regression tests
|
||||||
|
* Copyright (C) 2011 Free Software Foundation, Inc.
|
||||||
|
*
|
||||||
|
* This file is part of Libgcrypt.
|
||||||
|
*
|
||||||
|
* Libgcrypt is free software; you can redistribute it and/or modify
|
||||||
|
* it under the terms of the GNU Lesser General Public License as
|
||||||
|
* published by the Free Software Foundation; either version 2.1 of
|
||||||
|
* the License, or (at your option) any later version.
|
||||||
|
*
|
||||||
|
* Libgcrypt is distributed in the hope that it will be useful,
|
||||||
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
* GNU Lesser General Public License for more details.
|
||||||
|
*
|
||||||
|
* You should have received a copy of the GNU Lesser General Public
|
||||||
|
* License along with this program; if not, write to the Free Software
|
||||||
|
* Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA
|
||||||
|
*/
|
||||||
|
|
||||||
|
#ifdef HAVE_CONFIG_H
|
||||||
|
#include <config.h>
|
||||||
|
#endif
|
||||||
|
#include <stdio.h>
|
||||||
|
#include <stdlib.h>
|
||||||
|
#include <string.h>
|
||||||
|
#include <stdarg.h>
|
||||||
|
|
||||||
|
#include "../src/gcrypt-int.h"
|
||||||
|
|
||||||
|
|
||||||
|
#define PGM "curves"
|
||||||
|
#include "t-common.h"
|
||||||
|
|
||||||
|
/* Number of curves defined in ../cipger/ecc.c */
|
||||||
|
#define N_CURVES 14
|
||||||
|
|
||||||
|
/* A real world sample public key. */
|
||||||
|
static char const sample_key_1[] =
|
||||||
|
"(public-key\n"
|
||||||
|
" (ecdsa\n"
|
||||||
|
" (p #00FFFFFFFF00000001000000000000000000000000FFFFFFFFFFFFFFFFFFFFFFFF#)\n"
|
||||||
|
" (a #00FFFFFFFF00000001000000000000000000000000FFFFFFFFFFFFFFFFFFFFFFFC#)\n"
|
||||||
|
" (b #5AC635D8AA3A93E7B3EBBD55769886BC651D06B0CC53B0F63BCE3C3E27D2604B#)\n"
|
||||||
|
" (g #046B17D1F2E12C4247F8BCE6E563A440F277037D812DEB33A0F4A13945D898C296"
|
||||||
|
"4FE342E2FE1A7F9B8EE7EB4A7C0F9E162BCE33576B315ECECBB6406837BF51F5#)\n"
|
||||||
|
" (n #00FFFFFFFF00000000FFFFFFFFFFFFFFFFBCE6FAADA7179E84F3B9CAC2FC632551#)\n"
|
||||||
|
" (h #000000000000000000000000000000000000000000000000000000000000000001#)\n"
|
||||||
|
" (q #0442B927242237639A36CE9221B340DB1A9AB76DF2FE3E171277F6A4023DED146EE"
|
||||||
|
"86525E38CCECFF3FB8D152CC6334F70D23A525175C1BCBDDE6E023B2228770E#)\n"
|
||||||
|
" ))";
|
||||||
|
static char const sample_key_1_curve[] = "NIST P-256";
|
||||||
|
static unsigned int sample_key_1_nbits = 256;
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
static void
|
||||||
|
list_curves (void)
|
||||||
|
{
|
||||||
|
int idx;
|
||||||
|
const char *name;
|
||||||
|
unsigned int nbits;
|
||||||
|
|
||||||
|
for (idx=0; (name = gcry_pk_get_curve (NULL, idx, &nbits)); idx++)
|
||||||
|
{
|
||||||
|
if (verbose)
|
||||||
|
printf ("%s - %u bits\n", name, nbits);
|
||||||
|
}
|
||||||
|
if (idx != N_CURVES)
|
||||||
|
fail ("expected %d curves but got %d\n", N_CURVES, idx);
|
||||||
|
if (gcry_pk_get_curve (NULL, -1, NULL))
|
||||||
|
fail ("curve iteration failed\n");
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
static void
|
||||||
|
check_matching (void)
|
||||||
|
{
|
||||||
|
gpg_error_t err;
|
||||||
|
gcry_sexp_t key;
|
||||||
|
const char *name;
|
||||||
|
unsigned int nbits;
|
||||||
|
|
||||||
|
err = gcry_sexp_new (&key, sample_key_1, 0, 1);
|
||||||
|
if (err)
|
||||||
|
die ("parsing s-expression string failed: %s\n", gpg_strerror (err));
|
||||||
|
name = gcry_pk_get_curve (key, 0, &nbits);
|
||||||
|
if (!name)
|
||||||
|
fail ("curve name not found for sample_key_1\n");
|
||||||
|
else if (strcmp (name, sample_key_1_curve))
|
||||||
|
fail ("expected curve name %s but got %s for sample_key_1\n",
|
||||||
|
sample_key_1_curve, name);
|
||||||
|
else if (nbits != sample_key_1_nbits)
|
||||||
|
fail ("expected curve size %u but got %u for sample_key_1\n",
|
||||||
|
sample_key_1_nbits, nbits);
|
||||||
|
|
||||||
|
gcry_sexp_release (key);
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
static void
|
||||||
|
check_get_params (void)
|
||||||
|
{
|
||||||
|
gcry_sexp_t param;
|
||||||
|
const char *name;
|
||||||
|
|
||||||
|
param = gcry_pk_get_param (GCRY_PK_ECDSA, sample_key_1_curve);
|
||||||
|
if (!param)
|
||||||
|
fail ("error gerring parameters for `%s'\n", sample_key_1_curve);
|
||||||
|
|
||||||
|
name = gcry_pk_get_curve (param, 0, NULL);
|
||||||
|
if (!name)
|
||||||
|
fail ("get_param: curve name not found for sample_key_1\n");
|
||||||
|
else if (strcmp (name, sample_key_1_curve))
|
||||||
|
fail ("get_param: expected curve name %s but got %s for sample_key_1\n",
|
||||||
|
sample_key_1_curve, name);
|
||||||
|
|
||||||
|
gcry_sexp_release (param);
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
int
|
||||||
|
main (int argc, char **argv)
|
||||||
|
{
|
||||||
|
if (argc > 1 && !strcmp (argv[1], "--verbose"))
|
||||||
|
verbose = 1;
|
||||||
|
else if (argc > 1 && !strcmp (argv[1], "--debug"))
|
||||||
|
verbose = debug = 1;
|
||||||
|
|
||||||
|
if (!gcry_check_version (GCRYPT_VERSION))
|
||||||
|
die ("version mismatch\n");
|
||||||
|
|
||||||
|
xgcry_control (GCRYCTL_DISABLE_SECMEM, 0);
|
||||||
|
xgcry_control (GCRYCTL_INITIALIZATION_FINISHED, 0);
|
||||||
|
if (debug)
|
||||||
|
xgcry_control (GCRYCTL_SET_DEBUG_FLAGS, 1u, 0);
|
||||||
|
list_curves ();
|
||||||
|
check_matching ();
|
||||||
|
check_get_params ();
|
||||||
|
|
||||||
|
return error_count ? 1 : 0;
|
||||||
|
}
|
File diff suppressed because it is too large
Load Diff
@ -0,0 +1,11 @@
|
|||||||
|
#!/bin/sh
|
||||||
|
|
||||||
|
# Quit out if anything fails.
|
||||||
|
set -e -x
|
||||||
|
|
||||||
|
# Clean out patent-or-otherwise-encumbered code.
|
||||||
|
# EC: ????????? ??/??/2015
|
||||||
|
|
||||||
|
rm -f cipher/ecc-curves.c
|
||||||
|
rm -f tests/curves.c
|
||||||
|
rm -f tests/t-mpi-point.c
|
@ -0,0 +1,104 @@
|
|||||||
|
diff -up libgcrypt-1.6.1/mpi/mpicoder.c.gccopt libgcrypt-1.6.1/mpi/mpicoder.c
|
||||||
|
--- libgcrypt-1.6.1/mpi/mpicoder.c.gccopt 2014-02-28 15:37:53.983139821 +0100
|
||||||
|
+++ libgcrypt-1.6.1/mpi/mpicoder.c 2014-02-28 15:47:35.312576387 +0100
|
||||||
|
@@ -627,16 +627,16 @@ _gcry_mpi_print (enum gcry_mpi_format fo
|
||||||
|
extra = 1;
|
||||||
|
}
|
||||||
|
|
||||||
|
- if (buffer && n > len)
|
||||||
|
- {
|
||||||
|
- /* The provided buffer is too short. */
|
||||||
|
- xfree (tmp);
|
||||||
|
- return GPG_ERR_TOO_SHORT;
|
||||||
|
- }
|
||||||
|
if (buffer)
|
||||||
|
{
|
||||||
|
unsigned char *s = buffer;
|
||||||
|
|
||||||
|
+ if (n > len)
|
||||||
|
+ {
|
||||||
|
+ /* The provided buffer is too short. */
|
||||||
|
+ xfree (tmp);
|
||||||
|
+ return GPG_ERR_TOO_SHORT;
|
||||||
|
+ }
|
||||||
|
if (extra == 1)
|
||||||
|
*s++ = 0;
|
||||||
|
else if (extra)
|
||||||
|
@@ -654,13 +654,12 @@ _gcry_mpi_print (enum gcry_mpi_format fo
|
||||||
|
/* Note: We ignore the sign for this format. */
|
||||||
|
/* FIXME: for performance reasons we should put this into
|
||||||
|
mpi_aprint because we can then use the buffer directly. */
|
||||||
|
-
|
||||||
|
- if (buffer && n > len)
|
||||||
|
- return GPG_ERR_TOO_SHORT;
|
||||||
|
if (buffer)
|
||||||
|
{
|
||||||
|
unsigned char *tmp;
|
||||||
|
|
||||||
|
+ if (n > len)
|
||||||
|
+ return GPG_ERR_TOO_SHORT;
|
||||||
|
tmp = _gcry_mpi_get_buffer (a, 0, &n, NULL);
|
||||||
|
if (!tmp)
|
||||||
|
return gpg_err_code_from_syserror ();
|
||||||
|
@@ -678,14 +677,14 @@ _gcry_mpi_print (enum gcry_mpi_format fo
|
||||||
|
if (negative)
|
||||||
|
return GPG_ERR_INV_ARG;
|
||||||
|
|
||||||
|
- if (buffer && n+2 > len)
|
||||||
|
- return GPG_ERR_TOO_SHORT;
|
||||||
|
-
|
||||||
|
if (buffer)
|
||||||
|
{
|
||||||
|
unsigned char *tmp;
|
||||||
|
unsigned char *s = buffer;
|
||||||
|
|
||||||
|
+ if (n+2 > len)
|
||||||
|
+ return GPG_ERR_TOO_SHORT;
|
||||||
|
+
|
||||||
|
s[0] = nbits >> 8;
|
||||||
|
s[1] = nbits;
|
||||||
|
|
||||||
|
@@ -724,16 +723,16 @@ _gcry_mpi_print (enum gcry_mpi_format fo
|
||||||
|
extra=1;
|
||||||
|
}
|
||||||
|
|
||||||
|
- if (buffer && n+4 > len)
|
||||||
|
- {
|
||||||
|
- xfree(tmp);
|
||||||
|
- return GPG_ERR_TOO_SHORT;
|
||||||
|
- }
|
||||||
|
-
|
||||||
|
if (buffer)
|
||||||
|
{
|
||||||
|
unsigned char *s = buffer;
|
||||||
|
|
||||||
|
+ if (n+4 > len)
|
||||||
|
+ {
|
||||||
|
+ xfree(tmp);
|
||||||
|
+ return GPG_ERR_TOO_SHORT;
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
*s++ = n >> 24;
|
||||||
|
*s++ = n >> 16;
|
||||||
|
*s++ = n >> 8;
|
||||||
|
@@ -761,15 +760,15 @@ _gcry_mpi_print (enum gcry_mpi_format fo
|
||||||
|
if (!n || (*tmp & 0x80))
|
||||||
|
extra = 2;
|
||||||
|
|
||||||
|
- if (buffer && 2*n + extra + negative + 1 > len)
|
||||||
|
- {
|
||||||
|
- xfree(tmp);
|
||||||
|
- return GPG_ERR_TOO_SHORT;
|
||||||
|
- }
|
||||||
|
if (buffer)
|
||||||
|
{
|
||||||
|
unsigned char *s = buffer;
|
||||||
|
|
||||||
|
+ if (2*n + extra + negative + 1 > len)
|
||||||
|
+ {
|
||||||
|
+ xfree(tmp);
|
||||||
|
+ return GPG_ERR_TOO_SHORT;
|
||||||
|
+ }
|
||||||
|
if (negative)
|
||||||
|
*s++ = '-';
|
||||||
|
if (extra)
|
@ -0,0 +1,89 @@
|
|||||||
|
diff -up libgcrypt-1.6.2/src/fips.c.use-fipscheck libgcrypt-1.6.2/src/fips.c
|
||||||
|
--- libgcrypt-1.6.2/src/fips.c.use-fipscheck 2014-08-21 14:50:39.000000000 +0200
|
||||||
|
+++ libgcrypt-1.6.2/src/fips.c 2014-09-26 11:42:20.999588282 +0200
|
||||||
|
@@ -578,23 +578,50 @@ run_random_selftests (void)
|
||||||
|
return !!err;
|
||||||
|
}
|
||||||
|
|
||||||
|
+#ifdef ENABLE_HMAC_BINARY_CHECK
|
||||||
|
+static int
|
||||||
|
+get_library_path(const char *libname, const char *symbolname, char *path, size_t pathlen)
|
||||||
|
+{
|
||||||
|
+ Dl_info info;
|
||||||
|
+ void *dl, *sym;
|
||||||
|
+ int rv = -1;
|
||||||
|
+
|
||||||
|
+ dl = dlopen(libname, RTLD_LAZY);
|
||||||
|
+ if (dl == NULL) {
|
||||||
|
+ return -1;
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ sym = dlsym(dl, symbolname);
|
||||||
|
+
|
||||||
|
+ if (sym != NULL && dladdr(sym, &info)) {
|
||||||
|
+ strncpy(path, info.dli_fname, pathlen-1);
|
||||||
|
+ path[pathlen-1] = '\0';
|
||||||
|
+ rv = 0;
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ dlclose(dl);
|
||||||
|
+
|
||||||
|
+ return rv;
|
||||||
|
+}
|
||||||
|
+#endif
|
||||||
|
+
|
||||||
|
/* Run an integrity check on the binary. Returns 0 on success. */
|
||||||
|
static int
|
||||||
|
check_binary_integrity (void)
|
||||||
|
{
|
||||||
|
#ifdef ENABLE_HMAC_BINARY_CHECK
|
||||||
|
gpg_error_t err;
|
||||||
|
- Dl_info info;
|
||||||
|
+ char libpath[4096];
|
||||||
|
unsigned char digest[32];
|
||||||
|
int dlen;
|
||||||
|
char *fname = NULL;
|
||||||
|
- const char key[] = "What am I, a doctor or a moonshuttle conductor?";
|
||||||
|
-
|
||||||
|
- if (!dladdr ("gcry_check_version", &info))
|
||||||
|
+ const char key[] = "orboDeJITITejsirpADONivirpUkvarP";
|
||||||
|
+
|
||||||
|
+ if (get_library_path ("libgcrypt.so.20", "gcry_check_version", libpath, sizeof(libpath)))
|
||||||
|
err = gpg_error_from_syserror ();
|
||||||
|
else
|
||||||
|
{
|
||||||
|
- dlen = _gcry_hmac256_file (digest, sizeof digest, info.dli_fname,
|
||||||
|
+ dlen = _gcry_hmac256_file (digest, sizeof digest, libpath,
|
||||||
|
key, strlen (key));
|
||||||
|
if (dlen < 0)
|
||||||
|
err = gpg_error_from_syserror ();
|
||||||
|
@@ -602,7 +629,7 @@ check_binary_integrity (void)
|
||||||
|
err = gpg_error (GPG_ERR_INTERNAL);
|
||||||
|
else
|
||||||
|
{
|
||||||
|
- fname = xtrymalloc (strlen (info.dli_fname) + 1 + 5 + 1 );
|
||||||
|
+ fname = xtrymalloc (strlen (libpath) + 1 + 5 + 1 );
|
||||||
|
if (!fname)
|
||||||
|
err = gpg_error_from_syserror ();
|
||||||
|
else
|
||||||
|
@@ -611,7 +638,7 @@ check_binary_integrity (void)
|
||||||
|
char *p;
|
||||||
|
|
||||||
|
/* Prefix the basename with a dot. */
|
||||||
|
- strcpy (fname, info.dli_fname);
|
||||||
|
+ strcpy (fname, libpath);
|
||||||
|
p = strrchr (fname, '/');
|
||||||
|
if (p)
|
||||||
|
p++;
|
||||||
|
diff -up libgcrypt-1.6.2/src/Makefile.in.use-fipscheck libgcrypt-1.6.2/src/Makefile.in
|
||||||
|
--- libgcrypt-1.6.2/src/Makefile.in.use-fipscheck 2014-08-21 15:14:08.000000000 +0200
|
||||||
|
+++ libgcrypt-1.6.2/src/Makefile.in 2014-09-26 11:41:13.271059281 +0200
|
||||||
|
@@ -449,7 +449,7 @@ libgcrypt_la_LIBADD = $(gcrypt_res) \
|
||||||
|
../cipher/libcipher.la \
|
||||||
|
../random/librandom.la \
|
||||||
|
../mpi/libmpi.la \
|
||||||
|
- ../compat/libcompat.la $(GPG_ERROR_LIBS)
|
||||||
|
+ ../compat/libcompat.la $(GPG_ERROR_LIBS) -ldl
|
||||||
|
|
||||||
|
dumpsexp_SOURCES = dumpsexp.c
|
||||||
|
dumpsexp_CFLAGS = $(arch_gpg_error_cflags)
|
@ -0,0 +1,122 @@
|
|||||||
|
diff -up libgcrypt-1.7.3/tests/benchmark.c.eccfix libgcrypt-1.7.3/tests/benchmark.c
|
||||||
|
--- libgcrypt-1.7.3/tests/benchmark.c.eccfix 2016-07-14 11:19:17.000000000 +0200
|
||||||
|
+++ libgcrypt-1.7.3/tests/benchmark.c 2016-11-22 16:21:00.109004197 +0100
|
||||||
|
@@ -1412,7 +1412,7 @@ ecc_bench (int iterations, int print_hea
|
||||||
|
{
|
||||||
|
#if USE_ECC
|
||||||
|
gpg_error_t err;
|
||||||
|
- const char *p_sizes[] = { "192", "224", "256", "384", "521", "Ed25519",
|
||||||
|
+ const char *p_sizes[] = { "224", "256", "384", "521", "Ed25519",
|
||||||
|
"gost256", "gost512" };
|
||||||
|
int testno;
|
||||||
|
|
||||||
|
diff -up libgcrypt-1.7.3/tests/dsa-rfc6979.c.eccfix libgcrypt-1.7.3/tests/dsa-rfc6979.c
|
||||||
|
--- libgcrypt-1.7.3/tests/dsa-rfc6979.c.eccfix 2016-02-18 09:38:03.000000000 +0100
|
||||||
|
+++ libgcrypt-1.7.3/tests/dsa-rfc6979.c 2016-11-22 16:22:11.804674008 +0100
|
||||||
|
@@ -210,16 +210,6 @@ check_dsa_rfc6979 (void)
|
||||||
|
" ))"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
- "ECDSA, 192 bits (prime field)",
|
||||||
|
- "(private-key"
|
||||||
|
- " (ecdsa"
|
||||||
|
- " (curve \"NIST P-192\")"
|
||||||
|
- " (q #04AC2C77F529F91689FEA0EA5EFEC7F210D8EEA0B9E047ED56"
|
||||||
|
- " 3BC723E57670BD4887EBC732C523063D0A7C957BC97C1C43#)"
|
||||||
|
- " (d #6FAB034934E4C0FC9AE67F5B5659A9D7D1FEFD187EE09FD4#)"
|
||||||
|
- " ))"
|
||||||
|
- },
|
||||||
|
- {
|
||||||
|
"ECDSA, 224 bits (prime field)",
|
||||||
|
"(private-key"
|
||||||
|
" (ecdsa"
|
||||||
|
@@ -443,89 +433,6 @@ check_dsa_rfc6979 (void)
|
||||||
|
"C9F0BDABCC0D880BB137A994CC7F3980CE91CC10FAF529FC46565B15CEA854E1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
- "ECDSA, 192 bits (prime field)",
|
||||||
|
- "With SHA-1, message = \"sample\"",
|
||||||
|
- "sha1", "sample",
|
||||||
|
- "37D7CA00D2C7B0E5E412AC03BD44BA837FDD5B28CD3B0021",
|
||||||
|
- "98C6BD12B23EAF5E2A2045132086BE3EB8EBD62ABF6698FF",
|
||||||
|
- "57A22B07DEA9530F8DE9471B1DC6624472E8E2844BC25B64"
|
||||||
|
- },
|
||||||
|
- {
|
||||||
|
- "ECDSA, 192 bits (prime field)",
|
||||||
|
- "With SHA-224, message = \"sample\"",
|
||||||
|
- "sha224", "sample",
|
||||||
|
- "4381526B3FC1E7128F202E194505592F01D5FF4C5AF015D8",
|
||||||
|
- "A1F00DAD97AEEC91C95585F36200C65F3C01812AA60378F5",
|
||||||
|
- "E07EC1304C7C6C9DEBBE980B9692668F81D4DE7922A0F97A"
|
||||||
|
- },
|
||||||
|
- {
|
||||||
|
- "ECDSA, 192 bits (prime field)",
|
||||||
|
- "With SHA-256, message = \"sample\"",
|
||||||
|
- "sha256", "sample",
|
||||||
|
- "32B1B6D7D42A05CB449065727A84804FB1A3E34D8F261496",
|
||||||
|
- "4B0B8CE98A92866A2820E20AA6B75B56382E0F9BFD5ECB55",
|
||||||
|
- "CCDB006926EA9565CBADC840829D8C384E06DE1F1E381B85"
|
||||||
|
- },
|
||||||
|
- {
|
||||||
|
- "ECDSA, 192 bits (prime field)",
|
||||||
|
- "With SHA-384, message = \"sample\"",
|
||||||
|
- "sha384", "sample",
|
||||||
|
- "4730005C4FCB01834C063A7B6760096DBE284B8252EF4311",
|
||||||
|
- "DA63BF0B9ABCF948FBB1E9167F136145F7A20426DCC287D5",
|
||||||
|
- "C3AA2C960972BD7A2003A57E1C4C77F0578F8AE95E31EC5E"
|
||||||
|
- },
|
||||||
|
- {
|
||||||
|
- "ECDSA, 192 bits (prime field)",
|
||||||
|
- "With SHA-512, message = \"sample\"",
|
||||||
|
- "sha512", "sample",
|
||||||
|
- "A2AC7AB055E4F20692D49209544C203A7D1F2C0BFBC75DB1",
|
||||||
|
- "4D60C5AB1996BD848343B31C00850205E2EA6922DAC2E4B8",
|
||||||
|
- "3F6E837448F027A1BF4B34E796E32A811CBB4050908D8F67"
|
||||||
|
- },
|
||||||
|
- {
|
||||||
|
- "ECDSA, 192 bits (prime field)",
|
||||||
|
- "With SHA-1, message = \"test\"",
|
||||||
|
- "sha1", "test",
|
||||||
|
- "D9CF9C3D3297D3260773A1DA7418DB5537AB8DD93DE7FA25",
|
||||||
|
- "0F2141A0EBBC44D2E1AF90A50EBCFCE5E197B3B7D4DE036D",
|
||||||
|
- "EB18BC9E1F3D7387500CB99CF5F7C157070A8961E38700B7"
|
||||||
|
- },
|
||||||
|
- {
|
||||||
|
- "ECDSA, 192 bits (prime field)",
|
||||||
|
- "With SHA-224, message = \"test\"",
|
||||||
|
- "sha224", "test",
|
||||||
|
- "F5DC805F76EF851800700CCE82E7B98D8911B7D510059FBE",
|
||||||
|
- "6945A1C1D1B2206B8145548F633BB61CEF04891BAF26ED34",
|
||||||
|
- "B7FB7FDFC339C0B9BD61A9F5A8EAF9BE58FC5CBA2CB15293"
|
||||||
|
- },
|
||||||
|
- {
|
||||||
|
- "ECDSA, 192 bits (prime field)",
|
||||||
|
- "With SHA-256, message = \"test\"",
|
||||||
|
- "sha256", "test",
|
||||||
|
- "5C4CE89CF56D9E7C77C8585339B006B97B5F0680B4306C6C",
|
||||||
|
- "3A718BD8B4926C3B52EE6BBE67EF79B18CB6EB62B1AD97AE",
|
||||||
|
- "5662E6848A4A19B1F1AE2F72ACD4B8BBE50F1EAC65D9124F"
|
||||||
|
- },
|
||||||
|
- {
|
||||||
|
- "ECDSA, 192 bits (prime field)",
|
||||||
|
- "With SHA-384, message = \"test\"",
|
||||||
|
- "sha384", "test",
|
||||||
|
- "5AFEFB5D3393261B828DB6C91FBC68C230727B030C975693",
|
||||||
|
- "B234B60B4DB75A733E19280A7A6034BD6B1EE88AF5332367",
|
||||||
|
- "7994090B2D59BB782BE57E74A44C9A1C700413F8ABEFE77A"
|
||||||
|
- },
|
||||||
|
- {
|
||||||
|
- "ECDSA, 192 bits (prime field)",
|
||||||
|
- "With SHA-512, message = \"test\"",
|
||||||
|
- "sha512", "test",
|
||||||
|
- "0758753A5254759C7CFBAD2E2D9B0792EEE44136C9480527",
|
||||||
|
- "FE4F4AE86A58B6507946715934FE2D8FF9D95B6B098FE739",
|
||||||
|
- "74CF5605C98FBA0E1EF34D4B5A1577A7DCF59457CAE52290"
|
||||||
|
- },
|
||||||
|
-
|
||||||
|
-
|
||||||
|
-
|
||||||
|
- {
|
||||||
|
"ECDSA, 224 bits (prime field)",
|
||||||
|
"With SHA-1, message = \"sample\"",
|
||||||
|
"sha1", "sample",
|
File diff suppressed because it is too large
Load Diff
@ -0,0 +1,35 @@
|
|||||||
|
diff -up libgcrypt-1.7.3/src/visibility.c.fips-reqs libgcrypt-1.7.3/src/visibility.c
|
||||||
|
--- libgcrypt-1.7.3/src/visibility.c.fips-reqs 2016-03-23 12:59:34.000000000 +0100
|
||||||
|
+++ libgcrypt-1.7.3/src/visibility.c 2016-11-22 16:29:36.992042480 +0100
|
||||||
|
@@ -1288,6 +1288,8 @@ gcry_kdf_derive (const void *passphrase,
|
||||||
|
unsigned long iterations,
|
||||||
|
size_t keysize, void *keybuffer)
|
||||||
|
{
|
||||||
|
+ if (!fips_is_operational ())
|
||||||
|
+ return gpg_error (fips_not_operational ());
|
||||||
|
return gpg_error (_gcry_kdf_derive (passphrase, passphraselen, algo, hashalgo,
|
||||||
|
salt, saltlen, iterations,
|
||||||
|
keysize, keybuffer));
|
||||||
|
@@ -1343,6 +1345,13 @@ void
|
||||||
|
gcry_mpi_randomize (gcry_mpi_t w,
|
||||||
|
unsigned int nbits, enum gcry_random_level level)
|
||||||
|
{
|
||||||
|
+ if (!fips_is_operational ())
|
||||||
|
+ {
|
||||||
|
+ (void)fips_not_operational ();
|
||||||
|
+ fips_signal_fatal_error ("called in non-operational state");
|
||||||
|
+ fips_noreturn ();
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
_gcry_mpi_randomize (w, nbits, level);
|
||||||
|
}
|
||||||
|
|
||||||
|
@@ -1368,6 +1377,8 @@ gcry_prime_generate (gcry_mpi_t *prime,
|
||||||
|
gcry_random_level_t random_level,
|
||||||
|
unsigned int flags)
|
||||||
|
{
|
||||||
|
+ if (!fips_is_operational ())
|
||||||
|
+ return gpg_error (fips_not_operational ());
|
||||||
|
return gpg_error (_gcry_prime_generate (prime, prime_bits, factor_bits,
|
||||||
|
factors, cb_func, cb_arg,
|
||||||
|
random_level, flags));
|
@ -0,0 +1,65 @@
|
|||||||
|
diff -up libgcrypt-1.8.4/cipher/dsa.c.fips-keygen libgcrypt-1.8.4/cipher/dsa.c
|
||||||
|
--- libgcrypt-1.8.4/cipher/dsa.c.fips-keygen 2017-11-23 19:16:58.000000000 +0100
|
||||||
|
+++ libgcrypt-1.8.4/cipher/dsa.c 2019-02-12 14:29:25.629513989 +0100
|
||||||
|
@@ -457,11 +457,22 @@ generate_fips186 (DSA_secret_key *sk, un
|
||||||
|
&prime_q, &prime_p,
|
||||||
|
r_counter,
|
||||||
|
r_seed, r_seedlen);
|
||||||
|
- else
|
||||||
|
- ec = _gcry_generate_fips186_3_prime (nbits, qbits, NULL, 0,
|
||||||
|
+ else if (!domain->p || !domain->q)
|
||||||
|
+ ec = _gcry_generate_fips186_3_prime (nbits, qbits,
|
||||||
|
+ initial_seed.seed,
|
||||||
|
+ initial_seed.seedlen,
|
||||||
|
&prime_q, &prime_p,
|
||||||
|
r_counter,
|
||||||
|
r_seed, r_seedlen, NULL);
|
||||||
|
+ else
|
||||||
|
+ {
|
||||||
|
+ /* Domain parameters p and q are given; use them. */
|
||||||
|
+ prime_p = mpi_copy (domain->p);
|
||||||
|
+ prime_q = mpi_copy (domain->q);
|
||||||
|
+ gcry_assert (mpi_get_nbits (prime_p) == nbits);
|
||||||
|
+ gcry_assert (mpi_get_nbits (prime_q) == qbits);
|
||||||
|
+ ec = 0;
|
||||||
|
+ }
|
||||||
|
sexp_release (initial_seed.sexp);
|
||||||
|
if (ec)
|
||||||
|
goto leave;
|
||||||
|
@@ -855,13 +866,12 @@ dsa_generate (const gcry_sexp_t genparms
|
||||||
|
sexp_release (l1);
|
||||||
|
sexp_release (domainsexp);
|
||||||
|
|
||||||
|
- /* Check that all domain parameters are available. */
|
||||||
|
- if (!domain.p || !domain.q || !domain.g)
|
||||||
|
+ /* Check that p and q domain parameters are available. */
|
||||||
|
+ if (!domain.p || !domain.q || (!domain.g && !(flags & PUBKEY_FLAG_USE_FIPS186)))
|
||||||
|
{
|
||||||
|
_gcry_mpi_release (domain.p);
|
||||||
|
_gcry_mpi_release (domain.q);
|
||||||
|
_gcry_mpi_release (domain.g);
|
||||||
|
- sexp_release (deriveparms);
|
||||||
|
return GPG_ERR_MISSING_VALUE;
|
||||||
|
}
|
||||||
|
|
||||||
|
diff -up libgcrypt-1.8.4/cipher/rsa.c.fips-keygen libgcrypt-1.8.4/cipher/rsa.c
|
||||||
|
--- libgcrypt-1.8.4/cipher/rsa.c.fips-keygen 2017-11-23 19:16:58.000000000 +0100
|
||||||
|
+++ libgcrypt-1.8.4/cipher/rsa.c 2019-02-12 14:29:25.630513971 +0100
|
||||||
|
@@ -389,7 +389,7 @@ generate_fips (RSA_secret_key *sk, unsig
|
||||||
|
|
||||||
|
if (nbits < 1024 || (nbits & 0x1FF))
|
||||||
|
return GPG_ERR_INV_VALUE;
|
||||||
|
- if (_gcry_enforced_fips_mode() && nbits != 2048 && nbits != 3072)
|
||||||
|
+ if (fips_mode() && nbits < 2048)
|
||||||
|
return GPG_ERR_INV_VALUE;
|
||||||
|
|
||||||
|
/* The random quality depends on the transient_key flag. */
|
||||||
|
@@ -696,7 +696,7 @@ generate_x931 (RSA_secret_key *sk, unsig
|
||||||
|
|
||||||
|
*swapped = 0;
|
||||||
|
|
||||||
|
- if (e_value == 1) /* Alias for a secure value. */
|
||||||
|
+ if (e_value == 1 || e_value == 0) /* Alias for a secure value. */
|
||||||
|
e_value = 65537;
|
||||||
|
|
||||||
|
/* Point 1 of section 4.1: k = 1024 + 256s with S >= 0 */
|
@ -0,0 +1,134 @@
|
|||||||
|
diff -up libgcrypt-1.8.4/random/random.c.getrandom libgcrypt-1.8.4/random/random.c
|
||||||
|
--- libgcrypt-1.8.4/random/random.c.getrandom 2017-11-23 19:16:58.000000000 +0100
|
||||||
|
+++ libgcrypt-1.8.4/random/random.c 2018-11-20 15:52:41.738708554 +0100
|
||||||
|
@@ -110,8 +110,8 @@ _gcry_random_read_conf (void)
|
||||||
|
unsigned int result = 0;
|
||||||
|
|
||||||
|
fp = fopen (fname, "r");
|
||||||
|
- if (!fp)
|
||||||
|
- return result;
|
||||||
|
+ if (!fp) /* We make only_urandom the default. */
|
||||||
|
+ return RANDOM_CONF_ONLY_URANDOM;
|
||||||
|
|
||||||
|
for (;;)
|
||||||
|
{
|
||||||
|
diff -up libgcrypt-1.8.4/random/random-csprng.c.getrandom libgcrypt-1.8.4/random/random-csprng.c
|
||||||
|
--- libgcrypt-1.8.4/random/random-csprng.c.getrandom 2017-11-23 19:16:58.000000000 +0100
|
||||||
|
+++ libgcrypt-1.8.4/random/random-csprng.c 2018-11-20 15:52:41.738708554 +0100
|
||||||
|
@@ -55,6 +55,10 @@
|
||||||
|
#ifdef __MINGW32__
|
||||||
|
#include <process.h>
|
||||||
|
#endif
|
||||||
|
+#if defined(__linux__) && defined(HAVE_SYSCALL)
|
||||||
|
+# include <sys/syscall.h>
|
||||||
|
+# include <linux/random.h>
|
||||||
|
+#endif
|
||||||
|
#include "g10lib.h"
|
||||||
|
#include "random.h"
|
||||||
|
#include "rand-internal.h"
|
||||||
|
@@ -1116,6 +1120,22 @@ getfnc_gather_random (void))(void (*)(co
|
||||||
|
enum random_origins, size_t, int);
|
||||||
|
|
||||||
|
#if USE_RNDLINUX
|
||||||
|
+#if defined(__linux__) && defined(HAVE_SYSCALL) && defined(__NR_getrandom)
|
||||||
|
+ long ret;
|
||||||
|
+ char buffer[1];
|
||||||
|
+
|
||||||
|
+ _gcry_pre_syscall ();
|
||||||
|
+ ret = syscall (__NR_getrandom,
|
||||||
|
+ (void*)buffer, (size_t)1, (unsigned int)GRND_NONBLOCK);
|
||||||
|
+ _gcry_post_syscall ();
|
||||||
|
+ if (ret != -1 || errno != ENOSYS)
|
||||||
|
+ {
|
||||||
|
+ fnc = _gcry_rndlinux_gather_random;
|
||||||
|
+ return fnc;
|
||||||
|
+ }
|
||||||
|
+ else
|
||||||
|
+ /* The syscall is not supported - fallback to /dev/urandom. */
|
||||||
|
+#endif
|
||||||
|
if ( !access (NAME_OF_DEV_RANDOM, R_OK)
|
||||||
|
&& !access (NAME_OF_DEV_URANDOM, R_OK))
|
||||||
|
{
|
||||||
|
diff -up libgcrypt-1.8.4/random/rndlinux.c.getrandom libgcrypt-1.8.4/random/rndlinux.c
|
||||||
|
--- libgcrypt-1.8.4/random/rndlinux.c.getrandom 2018-11-20 15:52:41.731708393 +0100
|
||||||
|
+++ libgcrypt-1.8.4/random/rndlinux.c 2018-11-20 16:06:45.431207374 +0100
|
||||||
|
@@ -35,6 +35,7 @@
|
||||||
|
#include <poll.h>
|
||||||
|
#if defined(__linux__) && defined(HAVE_SYSCALL)
|
||||||
|
# include <sys/syscall.h>
|
||||||
|
+# include <linux/random.h>
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#include "types.h"
|
||||||
|
@@ -147,12 +148,12 @@ _gcry_rndlinux_gather_random (void (*add
|
||||||
|
if (!add)
|
||||||
|
{
|
||||||
|
/* Special mode to close the descriptors. */
|
||||||
|
- if (fd_random != -1)
|
||||||
|
+ if (fd_random >= 0)
|
||||||
|
{
|
||||||
|
close (fd_random);
|
||||||
|
fd_random = -1;
|
||||||
|
}
|
||||||
|
- if (fd_urandom != -1)
|
||||||
|
+ if (fd_urandom >= 0)
|
||||||
|
{
|
||||||
|
close (fd_urandom);
|
||||||
|
fd_urandom = -1;
|
||||||
|
@@ -166,12 +167,12 @@ _gcry_rndlinux_gather_random (void (*add
|
||||||
|
apid = getpid ();
|
||||||
|
if (my_pid != apid)
|
||||||
|
{
|
||||||
|
- if (fd_random != -1)
|
||||||
|
+ if (fd_random >= 0)
|
||||||
|
{
|
||||||
|
close (fd_random);
|
||||||
|
fd_random = -1;
|
||||||
|
}
|
||||||
|
- if (fd_urandom != -1)
|
||||||
|
+ if (fd_urandom >= 0)
|
||||||
|
{
|
||||||
|
close (fd_urandom);
|
||||||
|
fd_urandom = -1;
|
||||||
|
@@ -216,6 +217,22 @@ _gcry_rndlinux_gather_random (void (*add
|
||||||
|
that we always require the device to be existent but want a more
|
||||||
|
graceful behaviour if the rarely needed close operation has been
|
||||||
|
used and the device needs to be re-opened later. */
|
||||||
|
+#if defined(__linux__) && defined(HAVE_SYSCALL) && defined(__NR_getrandom)
|
||||||
|
+ if (fd_urandom != -2)
|
||||||
|
+ {
|
||||||
|
+ long ret;
|
||||||
|
+
|
||||||
|
+ _gcry_pre_syscall ();
|
||||||
|
+ ret = syscall (__NR_getrandom,
|
||||||
|
+ (void*)buffer, (size_t)1, (unsigned int)GRND_NONBLOCK);
|
||||||
|
+ _gcry_post_syscall ();
|
||||||
|
+ if (ret > -1 || errno == EAGAIN || errno == EINTR)
|
||||||
|
+ {
|
||||||
|
+ fd_urandom = -2;
|
||||||
|
+ fd_random = -2;
|
||||||
|
+ }
|
||||||
|
+ }
|
||||||
|
+#endif
|
||||||
|
if (level >= GCRY_VERY_STRONG_RANDOM && !only_urandom)
|
||||||
|
{
|
||||||
|
if (fd_random == -1)
|
||||||
|
@@ -255,6 +272,7 @@ _gcry_rndlinux_gather_random (void (*add
|
||||||
|
* syscall and not a new device and thus we are not able to use
|
||||||
|
* select(2) to have a timeout. */
|
||||||
|
#if defined(__linux__) && defined(HAVE_SYSCALL) && defined(__NR_getrandom)
|
||||||
|
+ if (fd == -2)
|
||||||
|
{
|
||||||
|
long ret;
|
||||||
|
size_t nbytes;
|
||||||
|
@@ -270,9 +288,7 @@ _gcry_rndlinux_gather_random (void (*add
|
||||||
|
_gcry_post_syscall ();
|
||||||
|
}
|
||||||
|
while (ret == -1 && errno == EINTR);
|
||||||
|
- if (ret == -1 && errno == ENOSYS)
|
||||||
|
- ; /* The syscall is not supported - fallback to pulling from fd. */
|
||||||
|
- else
|
||||||
|
+ if (1)
|
||||||
|
{ /* The syscall is supported. Some sanity checks. */
|
||||||
|
if (ret == -1)
|
||||||
|
log_fatal ("unexpected error from getrandom: %s\n",
|
@ -0,0 +1,184 @@
|
|||||||
|
diff -up libgcrypt-1.8.4/tests/basic.c.tests-fipsmode libgcrypt-1.8.4/tests/basic.c
|
||||||
|
--- libgcrypt-1.8.4/tests/basic.c.tests-fipsmode 2018-04-17 17:29:40.000000000 +0200
|
||||||
|
+++ libgcrypt-1.8.4/tests/basic.c 2019-02-12 13:30:48.935791024 +0100
|
||||||
|
@@ -6964,7 +6964,7 @@ check_ciphers (void)
|
||||||
|
check_one_cipher (algos[i], GCRY_CIPHER_MODE_CTR, 0);
|
||||||
|
if (gcry_cipher_get_algo_blklen (algos[i]) == GCRY_CCM_BLOCK_LEN)
|
||||||
|
check_one_cipher (algos[i], GCRY_CIPHER_MODE_CCM, 0);
|
||||||
|
- if (gcry_cipher_get_algo_blklen (algos[i]) == GCRY_GCM_BLOCK_LEN)
|
||||||
|
+ if (!in_fips_mode && gcry_cipher_get_algo_blklen (algos[i]) == GCRY_GCM_BLOCK_LEN)
|
||||||
|
check_one_cipher (algos[i], GCRY_CIPHER_MODE_GCM, 0);
|
||||||
|
if (gcry_cipher_get_algo_blklen (algos[i]) == GCRY_OCB_BLOCK_LEN)
|
||||||
|
check_one_cipher (algos[i], GCRY_CIPHER_MODE_OCB, 0);
|
||||||
|
@@ -7010,11 +7010,17 @@ check_cipher_modes(void)
|
||||||
|
check_cfb_cipher ();
|
||||||
|
check_ofb_cipher ();
|
||||||
|
check_ccm_cipher ();
|
||||||
|
- check_gcm_cipher ();
|
||||||
|
- check_poly1305_cipher ();
|
||||||
|
- check_ocb_cipher ();
|
||||||
|
+ if (!in_fips_mode)
|
||||||
|
+ {
|
||||||
|
+ check_gcm_cipher ();
|
||||||
|
+ check_poly1305_cipher ();
|
||||||
|
+ check_ocb_cipher ();
|
||||||
|
+ }
|
||||||
|
check_xts_cipher ();
|
||||||
|
- check_gost28147_cipher ();
|
||||||
|
+ if (!in_fips_mode)
|
||||||
|
+ {
|
||||||
|
+ check_gost28147_cipher ();
|
||||||
|
+ }
|
||||||
|
check_stream_cipher ();
|
||||||
|
check_stream_cipher_large_block ();
|
||||||
|
|
||||||
|
@@ -10001,7 +10007,7 @@ check_mac (void)
|
||||||
|
show_mac_not_available (algos[i].algo);
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
- if (gcry_mac_test_algo (algos[i].algo) && in_fips_mode)
|
||||||
|
+ if ((algos[i].algo == GCRY_MAC_GMAC_AES || gcry_mac_test_algo (algos[i].algo)) && in_fips_mode)
|
||||||
|
{
|
||||||
|
if (verbose)
|
||||||
|
fprintf (stderr, " algorithm %d not available in fips mode\n",
|
||||||
|
@@ -11095,8 +11101,6 @@ main (int argc, char **argv)
|
||||||
|
/* If we are in fips mode do some more tests. */
|
||||||
|
gcry_md_hd_t md;
|
||||||
|
|
||||||
|
- /* First trigger a self-test. */
|
||||||
|
- xgcry_control (GCRYCTL_FORCE_FIPS_MODE, 0);
|
||||||
|
if (!gcry_control (GCRYCTL_OPERATIONAL_P, 0))
|
||||||
|
fail ("not in operational state after self-test\n");
|
||||||
|
|
||||||
|
@@ -11121,15 +11125,6 @@ main (int argc, char **argv)
|
||||||
|
gcry_md_close (md);
|
||||||
|
if (gcry_control (GCRYCTL_OPERATIONAL_P, 0))
|
||||||
|
fail ("expected error state but still in operational state\n");
|
||||||
|
- else
|
||||||
|
- {
|
||||||
|
- /* Now run a self-test and to get back into
|
||||||
|
- operational state. */
|
||||||
|
- xgcry_control (GCRYCTL_FORCE_FIPS_MODE, 0);
|
||||||
|
- if (!gcry_control (GCRYCTL_OPERATIONAL_P, 0))
|
||||||
|
- fail ("did not reach operational after error "
|
||||||
|
- "and self-test\n");
|
||||||
|
- }
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
diff -up libgcrypt-1.8.4/tests/benchmark.c.tests-fipsmode libgcrypt-1.8.4/tests/benchmark.c
|
||||||
|
--- libgcrypt-1.8.4/tests/benchmark.c.tests-fipsmode 2019-02-12 11:31:44.859603883 +0100
|
||||||
|
+++ libgcrypt-1.8.4/tests/benchmark.c 2019-02-12 14:10:40.271999352 +0100
|
||||||
|
@@ -872,8 +872,10 @@ cipher_bench ( const char *algoname )
|
||||||
|
|| (blklen == 1 && modes[modeidx].mode != GCRY_CIPHER_MODE_STREAM))
|
||||||
|
continue;
|
||||||
|
|
||||||
|
- if (modes[modeidx].req_blocksize > 0
|
||||||
|
- && blklen != modes[modeidx].req_blocksize)
|
||||||
|
+ if ((modes[modeidx].req_blocksize > 0
|
||||||
|
+ && blklen != modes[modeidx].req_blocksize)
|
||||||
|
+ || (in_fips_mode
|
||||||
|
+ && modes[modeidx].mode == GCRY_CIPHER_MODE_GCM))
|
||||||
|
{
|
||||||
|
printf (" %7s %7s", "-", "-" );
|
||||||
|
continue;
|
||||||
|
diff -up libgcrypt-1.8.4/tests/bench-slope.c.tests-fipsmode libgcrypt-1.8.4/tests/bench-slope.c
|
||||||
|
--- libgcrypt-1.8.4/tests/bench-slope.c.tests-fipsmode 2017-11-23 19:16:58.000000000 +0100
|
||||||
|
+++ libgcrypt-1.8.4/tests/bench-slope.c 2019-02-12 14:14:33.618763325 +0100
|
||||||
|
@@ -1338,7 +1338,7 @@ cipher_bench_one (int algo, struct bench
|
||||||
|
return;
|
||||||
|
|
||||||
|
/* GCM has restrictions for block-size */
|
||||||
|
- if (mode.mode == GCRY_CIPHER_MODE_GCM && blklen != GCRY_GCM_BLOCK_LEN)
|
||||||
|
+ if (mode.mode == GCRY_CIPHER_MODE_GCM && (gcry_fips_mode_active () || blklen != GCRY_GCM_BLOCK_LEN))
|
||||||
|
return;
|
||||||
|
|
||||||
|
/* XTS has restrictions for block-size */
|
||||||
|
diff -up libgcrypt-1.8.4/tests/pubkey.c.tests-fipsmode libgcrypt-1.8.4/tests/pubkey.c
|
||||||
|
--- libgcrypt-1.8.4/tests/pubkey.c.tests-fipsmode 2017-11-23 19:16:58.000000000 +0100
|
||||||
|
+++ libgcrypt-1.8.4/tests/pubkey.c 2019-02-12 13:52:25.658746415 +0100
|
||||||
|
@@ -504,15 +504,30 @@ get_dsa_key_with_domain_new (gcry_sexp_t
|
||||||
|
rc = gcry_sexp_new
|
||||||
|
(&key_spec,
|
||||||
|
"(genkey (dsa (transient-key)(domain"
|
||||||
|
- "(p #d3aed1876054db831d0c1348fbb1ada72507e5fbf9a62cbd47a63aeb7859d6921"
|
||||||
|
- "4adeb9146a6ec3f43520f0fd8e3125dd8bbc5d87405d1ac5f82073cd762a3f8d7"
|
||||||
|
- "74322657c9da88a7d2f0e1a9ceb84a39cb40876179e6a76e400498de4bb9379b0"
|
||||||
|
- "5f5feb7b91eb8fea97ee17a955a0a8a37587a272c4719d6feb6b54ba4ab69#)"
|
||||||
|
- "(q #9c916d121de9a03f71fb21bc2e1c0d116f065a4f#)"
|
||||||
|
- "(g #8157c5f68ca40b3ded11c353327ab9b8af3e186dd2e8dade98761a0996dda99ab"
|
||||||
|
- "0250d3409063ad99efae48b10c6ab2bba3ea9a67b12b911a372a2bba260176fad"
|
||||||
|
- "b4b93247d9712aad13aa70216c55da9858f7a298deb670a403eb1e7c91b847f1e"
|
||||||
|
- "ccfbd14bd806fd42cf45dbb69cd6d6b43add2a78f7d16928eaa04458dea44#)"
|
||||||
|
+ " (p #a85378d8fd3f8d72ec7418080da21317e43ec4b62ba8c862"
|
||||||
|
+ " 3b7e4d04441dd1a0658662596493ca8e9e8fbb7e34aaddb6"
|
||||||
|
+ " 2e5d67b6d09a6e61b769e7c352aa2b10e20ca0636963b552"
|
||||||
|
+ " 3e86470decbbeda027e797e7b67635d4d49c30700e74af8a"
|
||||||
|
+ " 0ff156a801af57a26e7078f1d82f74908ecb6d07e70b3503"
|
||||||
|
+ " eed94fa32cf17a7fc3d6cf40dc7b00830e6a2566dc073e34"
|
||||||
|
+ " 3312517c6aa5152b4bfecd2e551fee346318a153423c996b"
|
||||||
|
+ " 0d5dcb9102aedd38798616f1f1e0d6c403525b1f9b3d4dc7"
|
||||||
|
+ " 66de2dfc4a56d7b8ba5963d60f3e16318870ad436952e557"
|
||||||
|
+ " 65374eab85e8ec17d6b9a4547b9b5f2752f3105be809b23a"
|
||||||
|
+ " 2c8d7469db02e24d592394a7dba069e9#)"
|
||||||
|
+ " (q #d277044e50f5a4e3f510a50a0b84fdffbca047ed27602056"
|
||||||
|
+ " 7441a0a5#)"
|
||||||
|
+ " (g #13d754e21fd241655da891c522a65a72a89bdc64ec9b54a8"
|
||||||
|
+ " 21ed4a898b490e0c4fcb72192a4a20f541f3f2925399f0ba"
|
||||||
|
+ " ecf929aafbf79dfe4332393b32cd2e2fcf272f32a627434a"
|
||||||
|
+ " 0df242b75b414df372121e53a553f222f836b000f016485b"
|
||||||
|
+ " 6bd0898451801dcd8de64cd5365696ffc532d528c506620a"
|
||||||
|
+ " 942a0305046d8f1876341f1e570bc3974ba6b9a438e97023"
|
||||||
|
+ " 02a2e6e67bfd06d32bc679962271d7b40cd72f386e64e0d7"
|
||||||
|
+ " ef86ca8ca5d14228dc2a4f16e3189886b5990674f4200f3a"
|
||||||
|
+ " 4cf65a3f0ddba1fa672dff2f5e143d10e4e97ae84f6da095"
|
||||||
|
+ " 35d5b9df259181a79b63b069e949972b02ba36b3586aab7e"
|
||||||
|
+ " 45f322f82e4e85ca3ab85591b3c2a966#)"
|
||||||
|
")))", 0, 1);
|
||||||
|
if (rc)
|
||||||
|
die ("error creating S-expression: %s\n", gcry_strerror (rc));
|
||||||
|
@@ -595,7 +610,7 @@ get_dsa_key_fips186_with_seed_new (gcry_
|
||||||
|
" (use-fips186)"
|
||||||
|
" (transient-key)"
|
||||||
|
" (derive-parms"
|
||||||
|
- " (seed #0cb1990c1fd3626055d7a0096f8fa99807399871#))))",
|
||||||
|
+ " (seed #8b4c4d671fff82e8ed932260206d0571e3a1c2cee8cd94cb73fe58f9b67488fa#))))",
|
||||||
|
0, 1);
|
||||||
|
if (rc)
|
||||||
|
die ("error creating S-expression: %s\n", gcry_strerror (rc));
|
||||||
|
diff -up libgcrypt-1.8.4/tests/t-cv25519.c.tests-fipsmode libgcrypt-1.8.4/tests/t-cv25519.c
|
||||||
|
--- libgcrypt-1.8.4/tests/t-cv25519.c.tests-fipsmode 2017-11-23 19:16:58.000000000 +0100
|
||||||
|
+++ libgcrypt-1.8.4/tests/t-cv25519.c 2019-02-12 14:02:35.935705390 +0100
|
||||||
|
@@ -560,6 +560,9 @@ main (int argc, char **argv)
|
||||||
|
xgcry_control (GCRYCTL_SET_DEBUG_FLAGS, 1u , 0);
|
||||||
|
xgcry_control (GCRYCTL_ENABLE_QUICK_RANDOM, 0);
|
||||||
|
xgcry_control (GCRYCTL_INITIALIZATION_FINISHED, 0);
|
||||||
|
+ /* Curve25519 isn't supported in fips mode */
|
||||||
|
+ if (gcry_fips_mode_active())
|
||||||
|
+ return 77;
|
||||||
|
|
||||||
|
start_timer ();
|
||||||
|
check_cv25519 ();
|
||||||
|
diff -up libgcrypt-1.8.4/tests/t-secmem.c.tests-fipsmode libgcrypt-1.8.4/tests/t-secmem.c
|
||||||
|
--- libgcrypt-1.8.4/tests/t-secmem.c.tests-fipsmode 2017-11-23 19:19:54.000000000 +0100
|
||||||
|
+++ libgcrypt-1.8.4/tests/t-secmem.c 2019-02-12 11:51:02.462190538 +0100
|
||||||
|
@@ -174,7 +174,8 @@ main (int argc, char **argv)
|
||||||
|
xgcry_control (GCRYCTL_SET_DEBUG_FLAGS, 1u , 0);
|
||||||
|
xgcry_control (GCRYCTL_ENABLE_QUICK_RANDOM, 0);
|
||||||
|
xgcry_control (GCRYCTL_INIT_SECMEM, pool_size, 0);
|
||||||
|
- gcry_set_outofcore_handler (outofcore_handler, NULL);
|
||||||
|
+ if (!gcry_fips_mode_active ())
|
||||||
|
+ gcry_set_outofcore_handler (outofcore_handler, NULL);
|
||||||
|
xgcry_control (GCRYCTL_INITIALIZATION_FINISHED, 0);
|
||||||
|
|
||||||
|
/* Libgcrypt prints a warning when the first overflow is allocated;
|
||||||
|
@@ -184,7 +185,8 @@ main (int argc, char **argv)
|
||||||
|
|
||||||
|
|
||||||
|
test_secmem ();
|
||||||
|
- test_secmem_overflow ();
|
||||||
|
+ if (!gcry_fips_mode_active ())
|
||||||
|
+ test_secmem_overflow ();
|
||||||
|
/* FIXME: We need to improve the tests, for example by registering
|
||||||
|
* our own log handler and comparing the output of
|
||||||
|
* PRIV_CTL_DUMP_SECMEM_STATS to expected pattern. */
|
@ -0,0 +1,77 @@
|
|||||||
|
diff -up libgcrypt-1.8.4/random/rndlinux.c.use-poll libgcrypt-1.8.4/random/rndlinux.c
|
||||||
|
--- libgcrypt-1.8.4/random/rndlinux.c.use-poll 2018-10-26 13:50:20.000000000 +0200
|
||||||
|
+++ libgcrypt-1.8.4/random/rndlinux.c 2018-11-20 15:51:56.760669058 +0100
|
||||||
|
@@ -32,6 +32,7 @@
|
||||||
|
#include <string.h>
|
||||||
|
#include <unistd.h>
|
||||||
|
#include <fcntl.h>
|
||||||
|
+#include <poll.h>
|
||||||
|
#if defined(__linux__) && defined(HAVE_SYSCALL)
|
||||||
|
# include <sys/syscall.h>
|
||||||
|
#endif
|
||||||
|
@@ -241,9 +242,8 @@ _gcry_rndlinux_gather_random (void (*add
|
||||||
|
return with something we will actually use 100ms. */
|
||||||
|
while (length)
|
||||||
|
{
|
||||||
|
- fd_set rfds;
|
||||||
|
- struct timeval tv;
|
||||||
|
int rc;
|
||||||
|
+ struct pollfd pfd;
|
||||||
|
|
||||||
|
/* If we have a modern Linux kernel, we first try to use the new
|
||||||
|
* getrandom syscall. That call guarantees that the kernel's
|
||||||
|
@@ -300,36 +300,25 @@ _gcry_rndlinux_gather_random (void (*add
|
||||||
|
any_need_entropy = 1;
|
||||||
|
}
|
||||||
|
|
||||||
|
- /* If the system has no limit on the number of file descriptors
|
||||||
|
- and we encounter an fd which is larger than the fd_set size,
|
||||||
|
- we don't use the select at all. The select code is only used
|
||||||
|
- to emit progress messages. A better solution would be to
|
||||||
|
- fall back to poll() if available. */
|
||||||
|
-#ifdef FD_SETSIZE
|
||||||
|
- if (fd < FD_SETSIZE)
|
||||||
|
-#endif
|
||||||
|
+ pfd.fd = fd;
|
||||||
|
+ pfd.events = POLLIN;
|
||||||
|
+
|
||||||
|
+ _gcry_pre_syscall ();
|
||||||
|
+ rc = poll(&pfd, 1, delay);
|
||||||
|
+ _gcry_post_syscall ();
|
||||||
|
+ if (!rc)
|
||||||
|
{
|
||||||
|
- FD_ZERO(&rfds);
|
||||||
|
- FD_SET(fd, &rfds);
|
||||||
|
- tv.tv_sec = delay;
|
||||||
|
- tv.tv_usec = delay? 0 : 100000;
|
||||||
|
- _gcry_pre_syscall ();
|
||||||
|
- rc = select (fd+1, &rfds, NULL, NULL, &tv);
|
||||||
|
- _gcry_post_syscall ();
|
||||||
|
- if (!rc)
|
||||||
|
- {
|
||||||
|
- any_need_entropy = 1;
|
||||||
|
- delay = 3; /* Use 3 seconds henceforth. */
|
||||||
|
- continue;
|
||||||
|
- }
|
||||||
|
- else if( rc == -1 )
|
||||||
|
- {
|
||||||
|
- log_error ("select() error: %s\n", strerror(errno));
|
||||||
|
- if (!delay)
|
||||||
|
- delay = 1; /* Use 1 second if we encounter an error before
|
||||||
|
- we have ever blocked. */
|
||||||
|
- continue;
|
||||||
|
- }
|
||||||
|
+ any_need_entropy = 1;
|
||||||
|
+ delay = 3000; /* Use 3 seconds henceforth. */
|
||||||
|
+ continue;
|
||||||
|
+ }
|
||||||
|
+ else if( rc == -1 )
|
||||||
|
+ {
|
||||||
|
+ log_error ("poll() error: %s\n", strerror(errno));
|
||||||
|
+ if (!delay)
|
||||||
|
+ delay = 1000; /* Use 1 second if we encounter an error before
|
||||||
|
+ we have ever blocked. */
|
||||||
|
+ continue;
|
||||||
|
}
|
||||||
|
|
||||||
|
do
|
@ -0,0 +1,15 @@
|
|||||||
|
--- src/libgcrypt.def.orig 2012-02-28 00:16:33.422552508 +0100
|
||||||
|
+++ src/libgcrypt.def 2012-02-28 00:16:59.188018940 +0100
|
||||||
|
@@ -1,3 +1,4 @@
|
||||||
|
+EXPORTS
|
||||||
|
;; libgcrypt.defs - Exported symbols for W32
|
||||||
|
;; Copyright (C) 2003, 2007 Free Software Foundation, Inc.
|
||||||
|
;;
|
||||||
|
@@ -22,7 +23,6 @@
|
||||||
|
;; never be changed. Also check libgcrypt.vers and visibility.h.
|
||||||
|
|
||||||
|
|
||||||
|
-EXPORTS
|
||||||
|
gcry_check_version @1
|
||||||
|
gcry_control @2
|
||||||
|
|
@ -0,0 +1,4 @@
|
|||||||
|
# use only /dev/urandom - see https://www.2uo.de/myths-about-urandom/
|
||||||
|
only-urandom
|
||||||
|
# Keep jitter entropy generator enabled (should do no harm)
|
||||||
|
#disable-jent
|
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
@ -0,0 +1,381 @@
|
|||||||
|
%?mingw_package_header
|
||||||
|
|
||||||
|
%global run_tests 0
|
||||||
|
|
||||||
|
Name: mingw-libgcrypt
|
||||||
|
Version: 1.8.4
|
||||||
|
Release: 6%{?dist}
|
||||||
|
Summary: MinGW Windows gcrypt encryption library
|
||||||
|
|
||||||
|
License: LGPLv2+ and GPLv2+
|
||||||
|
|
||||||
|
URL: ftp://ftp.gnupg.org/gcrypt/libgcrypt/
|
||||||
|
Source0: libgcrypt-%{version}-hobbled.tar.xz
|
||||||
|
# The original libgcrypt sources now contain potentially patented ECC
|
||||||
|
# cipher support. We have to remove it in the tarball we ship with
|
||||||
|
# the hobble-libgcrypt script.
|
||||||
|
# (We replace it with RH approved ECC in Source4-5)
|
||||||
|
#Source0: ftp://ftp.gnupg.org/gcrypt/libgcrypt/libgcrypt-%{version}.tar.bz2
|
||||||
|
#Source1: ftp://ftp.gnupg.org/gcrypt/libgcrypt/libgcrypt-%{version}.tar.bz2.sig
|
||||||
|
Source2: wk@g10code.com
|
||||||
|
Source3: hobble-libgcrypt
|
||||||
|
# Approved ECC support (from 1.6.1)
|
||||||
|
Source4: ecc-curves.c
|
||||||
|
Source5: curves.c
|
||||||
|
Source6: t-mpi-point.c
|
||||||
|
Source7: random.conf
|
||||||
|
|
||||||
|
# make FIPS hmac compatible with fipscheck - non upstreamable
|
||||||
|
# update on soname bump
|
||||||
|
Patch2: libgcrypt-1.6.2-use-fipscheck.patch
|
||||||
|
# modify FIPS RSA and DSA keygen to comply with requirements
|
||||||
|
Patch5: libgcrypt-1.8.4-fips-keygen.patch
|
||||||
|
# fix the tests to work correctly in the FIPS mode
|
||||||
|
Patch6: libgcrypt-1.8.4-tests-fipsmode.patch
|
||||||
|
# update the CAVS tests
|
||||||
|
Patch7: libgcrypt-1.7.3-fips-cavs.patch
|
||||||
|
# use poll instead of select when gathering randomness
|
||||||
|
Patch11: libgcrypt-1.8.4-use-poll.patch
|
||||||
|
# slight optimalization of mpicoder.c to silence Valgrind (#968288)
|
||||||
|
Patch13: libgcrypt-1.6.1-mpicoder-gccopt.patch
|
||||||
|
# fix tests to work with approved ECC
|
||||||
|
Patch14: libgcrypt-1.7.3-ecc-test-fix.patch
|
||||||
|
# Run the FIPS mode initialization in the shared library constructor
|
||||||
|
Patch18: libgcrypt-1.8.3-fips-ctor.patch
|
||||||
|
# Block some operations if in FIPS non-operational state
|
||||||
|
Patch22: libgcrypt-1.7.3-fips-reqs.patch
|
||||||
|
# Do not try to open /dev/urandom if getrandom() works
|
||||||
|
Patch24: libgcrypt-1.8.4-getrandom.patch
|
||||||
|
|
||||||
|
# MinGW-specific patches
|
||||||
|
|
||||||
|
# Workaround a bug in libtool:
|
||||||
|
# libgcrypt-use-correct-def-file.patch
|
||||||
|
Patch1000: libgcrypt-use-correct-def-file.patch
|
||||||
|
|
||||||
|
BuildArch: noarch
|
||||||
|
|
||||||
|
BuildRequires: make
|
||||||
|
BuildRequires: mingw32-filesystem >= 95
|
||||||
|
BuildRequires: mingw32-gcc
|
||||||
|
BuildRequires: mingw32-binutils
|
||||||
|
BuildRequires: mingw32-dlfcn
|
||||||
|
BuildRequires: mingw32-libgpg-error
|
||||||
|
|
||||||
|
BuildRequires: mingw64-filesystem >= 95
|
||||||
|
BuildRequires: mingw64-gcc
|
||||||
|
BuildRequires: mingw64-binutils
|
||||||
|
BuildRequires: mingw64-dlfcn
|
||||||
|
BuildRequires: mingw64-libgpg-error
|
||||||
|
|
||||||
|
BuildRequires: gcc
|
||||||
|
#BuildRequires: autoconf automake libtool
|
||||||
|
|
||||||
|
%if %run_tests
|
||||||
|
BuildRequires: wine
|
||||||
|
%endif
|
||||||
|
|
||||||
|
|
||||||
|
%description
|
||||||
|
Libgcrypt is a general purpose crypto library based on the code used
|
||||||
|
in GNU Privacy Guard.
|
||||||
|
|
||||||
|
This is a Windows cross-compiled version of the library.
|
||||||
|
|
||||||
|
|
||||||
|
# Win32
|
||||||
|
%package -n mingw32-libgcrypt
|
||||||
|
Summary: MinGW Windows gcrypt encryption library
|
||||||
|
|
||||||
|
%description -n mingw32-libgcrypt
|
||||||
|
Libgcrypt is a general purpose crypto library based on the code used
|
||||||
|
in GNU Privacy Guard.
|
||||||
|
|
||||||
|
This is a Windows cross-compiled version of the library.
|
||||||
|
|
||||||
|
%package -n mingw32-libgcrypt-static
|
||||||
|
Summary: Static library for mingw32-libgcrypt development
|
||||||
|
Requires: mingw32-libgcrypt = %{version}-%{release}
|
||||||
|
Requires: mingw32-libgpg-error-static
|
||||||
|
|
||||||
|
%description -n mingw32-libgcrypt-static
|
||||||
|
Static library for mingw32-libgcrypt development.
|
||||||
|
|
||||||
|
# Win64
|
||||||
|
%package -n mingw64-libgcrypt
|
||||||
|
Summary: MinGW Windows gcrypt encryption library
|
||||||
|
|
||||||
|
%description -n mingw64-libgcrypt
|
||||||
|
Libgcrypt is a general purpose crypto library based on the code used
|
||||||
|
in GNU Privacy Guard.
|
||||||
|
|
||||||
|
This is a Windows cross-compiled version of the library.
|
||||||
|
|
||||||
|
%package -n mingw64-libgcrypt-static
|
||||||
|
Summary: Static library for mingw64-libgcrypt development
|
||||||
|
Requires: mingw64-libgcrypt = %{version}-%{release}
|
||||||
|
Requires: mingw64-libgpg-error-static
|
||||||
|
|
||||||
|
%description -n mingw64-libgcrypt-static
|
||||||
|
Static library for mingw64-libgcrypt development.
|
||||||
|
|
||||||
|
|
||||||
|
%?mingw_debug_package
|
||||||
|
|
||||||
|
|
||||||
|
%prep
|
||||||
|
%setup -q -n libgcrypt-%{version}
|
||||||
|
%{SOURCE3}
|
||||||
|
%patch2 -p1 -b .use-fipscheck
|
||||||
|
%patch5 -p1 -b .fips-keygen
|
||||||
|
%patch6 -p1 -b .tests-fipsmode
|
||||||
|
%patch7 -p1 -b .cavs
|
||||||
|
%patch11 -p1 -b .use-poll
|
||||||
|
%patch13 -p1 -b .gccopt
|
||||||
|
%patch14 -p1 -b .eccfix
|
||||||
|
%patch18 -p1 -b .fips-ctor
|
||||||
|
%patch22 -p1 -b .fips-reqs
|
||||||
|
%patch24 -p1 -b .getrandom
|
||||||
|
|
||||||
|
%patch1000 -p0 -b .def
|
||||||
|
|
||||||
|
cp %{SOURCE4} cipher/
|
||||||
|
cp %{SOURCE5} %{SOURCE6} tests/
|
||||||
|
|
||||||
|
# Needed for the asm64 patch
|
||||||
|
#autoreconf -i --force
|
||||||
|
|
||||||
|
|
||||||
|
%build
|
||||||
|
MINGW64_CONFIGURE_ARGS="ac_cv_sys_symbol_underscore=no --disable-padlock-support"
|
||||||
|
%mingw_configure --enable-shared --enable-static --enable-pubkey-ciphers='dsa elgamal rsa ecc'
|
||||||
|
%mingw_make %{?_smp_mflags}
|
||||||
|
|
||||||
|
|
||||||
|
%check
|
||||||
|
%if %run_tests
|
||||||
|
# Stupid Wine doesn't load DLLs from the PATH any
|
||||||
|
# more, so libtool scripts don't work. As a result
|
||||||
|
# we need to use the following Big Hack.
|
||||||
|
make -C build_win32/tests check ||:
|
||||||
|
pushd build_win32/src/.libs
|
||||||
|
for t in $(pwd)/../../tests/*.exe; do
|
||||||
|
wine $t
|
||||||
|
done
|
||||||
|
popd
|
||||||
|
%endif
|
||||||
|
|
||||||
|
|
||||||
|
%install
|
||||||
|
%mingw_make install DESTDIR=$RPM_BUILD_ROOT
|
||||||
|
|
||||||
|
# Remove info pages which duplicate what is in Fedora natively.
|
||||||
|
rm -rf $RPM_BUILD_ROOT%{mingw32_infodir}
|
||||||
|
rm -rf $RPM_BUILD_ROOT%{mingw64_infodir}
|
||||||
|
|
||||||
|
rm -rf $RPM_BUILD_ROOT%{mingw32_mandir}
|
||||||
|
rm -rf $RPM_BUILD_ROOT%{mingw64_mandir}
|
||||||
|
|
||||||
|
rm $RPM_BUILD_ROOT%{mingw32_libdir}/libgcrypt.def
|
||||||
|
rm $RPM_BUILD_ROOT%{mingw64_libdir}/libgcrypt.def
|
||||||
|
|
||||||
|
rm $RPM_BUILD_ROOT%{mingw32_libdir}/libgcrypt.la
|
||||||
|
rm $RPM_BUILD_ROOT%{mingw64_libdir}/libgcrypt.la
|
||||||
|
|
||||||
|
|
||||||
|
%files -n mingw32-libgcrypt
|
||||||
|
%doc COPYING COPYING.LIB
|
||||||
|
%{mingw32_bindir}/dumpsexp.exe
|
||||||
|
%{mingw32_bindir}/hmac256.exe
|
||||||
|
%{mingw32_bindir}/mpicalc.exe
|
||||||
|
%{mingw32_bindir}/libgcrypt-20.dll
|
||||||
|
%{mingw32_bindir}/libgcrypt-config
|
||||||
|
%{mingw32_libdir}/libgcrypt.dll.a
|
||||||
|
%{mingw32_includedir}/gcrypt.h
|
||||||
|
%{mingw32_datadir}/aclocal/libgcrypt.m4
|
||||||
|
|
||||||
|
%files -n mingw32-libgcrypt-static
|
||||||
|
%{mingw32_libdir}/libgcrypt.a
|
||||||
|
|
||||||
|
%files -n mingw64-libgcrypt
|
||||||
|
%doc COPYING COPYING.LIB
|
||||||
|
%{mingw64_bindir}/dumpsexp.exe
|
||||||
|
%{mingw64_bindir}/hmac256.exe
|
||||||
|
%{mingw64_bindir}/mpicalc.exe
|
||||||
|
%{mingw64_bindir}/libgcrypt-20.dll
|
||||||
|
%{mingw64_bindir}/libgcrypt-config
|
||||||
|
%{mingw64_libdir}/libgcrypt.dll.a
|
||||||
|
%{mingw64_includedir}/gcrypt.h
|
||||||
|
%{mingw64_datadir}/aclocal/libgcrypt.m4
|
||||||
|
|
||||||
|
%files -n mingw64-libgcrypt-static
|
||||||
|
%{mingw64_libdir}/libgcrypt.a
|
||||||
|
|
||||||
|
|
||||||
|
%changelog
|
||||||
|
* Mon Jan 15 2024 Arkady L. Shane <tigro@msvsphere-os.ru> - 1.8.4-6
|
||||||
|
- Rebuilt for MSVSphere 9.3
|
||||||
|
|
||||||
|
* Thu Jan 20 2022 Fedora Release Engineering <releng@fedoraproject.org> - 1.8.4-6
|
||||||
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_36_Mass_Rebuild
|
||||||
|
|
||||||
|
* Thu Jul 22 2021 Fedora Release Engineering <releng@fedoraproject.org> - 1.8.4-5
|
||||||
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_35_Mass_Rebuild
|
||||||
|
|
||||||
|
* Tue Jan 26 2021 Fedora Release Engineering <releng@fedoraproject.org> - 1.8.4-4
|
||||||
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_34_Mass_Rebuild
|
||||||
|
|
||||||
|
* Tue Jul 28 2020 Fedora Release Engineering <releng@fedoraproject.org> - 1.8.4-3
|
||||||
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_33_Mass_Rebuild
|
||||||
|
|
||||||
|
* Wed Jan 29 2020 Fedora Release Engineering <releng@fedoraproject.org> - 1.8.4-2
|
||||||
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_32_Mass_Rebuild
|
||||||
|
|
||||||
|
* Tue Aug 13 2019 Fabiano Fidêncio <fidencio@redhat.com> - 1.8.4-1
|
||||||
|
- Update the sources accordingly to its native counter-panter, rhbz#1740734
|
||||||
|
|
||||||
|
* Thu Jul 25 2019 Fedora Release Engineering <releng@fedoraproject.org> - 1.8.3-3
|
||||||
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild
|
||||||
|
|
||||||
|
* Fri Feb 01 2019 Fedora Release Engineering <releng@fedoraproject.org> - 1.8.3-2
|
||||||
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_30_Mass_Rebuild
|
||||||
|
|
||||||
|
* Wed Aug 29 2018 Christophe Fergeau <cfergeau@redhat.com> - 1.8.3-1
|
||||||
|
- Update to 1.8.3, this syncs mingw-libgcrypt with the native libgcrypt package
|
||||||
|
|
||||||
|
* Fri Jul 13 2018 Fedora Release Engineering <releng@fedoraproject.org> - 1.6.3-8
|
||||||
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_29_Mass_Rebuild
|
||||||
|
|
||||||
|
* Thu Feb 08 2018 Fedora Release Engineering <releng@fedoraproject.org> - 1.6.3-7
|
||||||
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_28_Mass_Rebuild
|
||||||
|
|
||||||
|
* Wed Jul 26 2017 Fedora Release Engineering <releng@fedoraproject.org> - 1.6.3-6
|
||||||
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Mass_Rebuild
|
||||||
|
|
||||||
|
* Fri Feb 10 2017 Fedora Release Engineering <releng@fedoraproject.org> - 1.6.3-5
|
||||||
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_26_Mass_Rebuild
|
||||||
|
|
||||||
|
* Thu Feb 04 2016 Fedora Release Engineering <releng@fedoraproject.org> - 1.6.3-4
|
||||||
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_24_Mass_Rebuild
|
||||||
|
|
||||||
|
* Tue Jan 05 2016 Richard Jones <rjones@redhat.com> - 1.6.3-3
|
||||||
|
- Use global instead of define.
|
||||||
|
|
||||||
|
* Wed Jun 17 2015 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 1.6.3-2
|
||||||
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_23_Mass_Rebuild
|
||||||
|
|
||||||
|
* Fri Apr 24 2015 Erik van Pienbroek <epienbro@fedoraproject.org> - 1.6.3-1
|
||||||
|
- Update to 1.6.3
|
||||||
|
- Fixes CVE-2014-3591 CVE-2015-0837 (RHBZ #1198153 #1198156)
|
||||||
|
|
||||||
|
* Tue Dec 23 2014 Erik van Pienbroek <epienbro@fedoraproject.org> - 1.6.2-1
|
||||||
|
- Update to 1.6.2
|
||||||
|
|
||||||
|
* Sat Jun 07 2014 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 1.6.1-2
|
||||||
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild
|
||||||
|
|
||||||
|
* Thu May 29 2014 Erik van Pienbroek <epienbro@fedoraproject.org> - 1.6.1-1
|
||||||
|
- Update to 1.6.1
|
||||||
|
- Add cleared ECC support
|
||||||
|
- Disable padlock support in Win64 for now (breaks compilation)
|
||||||
|
|
||||||
|
* Wed Nov 20 2013 Erik van Pienbroek <epienbro@fedoraproject.org> - 1.5.3-1
|
||||||
|
- Update to 1.5.3
|
||||||
|
|
||||||
|
* Sat Aug 03 2013 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 1.5.2-2
|
||||||
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_20_Mass_Rebuild
|
||||||
|
|
||||||
|
* Sun May 5 2013 Erik van Pienbroek <epienbro@fedoraproject.org> - 1.5.2-1
|
||||||
|
- Update to 1.5.2
|
||||||
|
|
||||||
|
* Thu Feb 14 2013 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 1.5.0-7
|
||||||
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_19_Mass_Rebuild
|
||||||
|
|
||||||
|
* Wed Jan 2 2013 Erik van Pienbroek <epienbro@fedoraproject.org> - 1.5.0-6
|
||||||
|
- Made the win64 asm code work properly
|
||||||
|
|
||||||
|
* Sun Oct 21 2012 Yaakov Selkowitz <yselkowitz@users.sourceforge.net> - 1.5.0-5
|
||||||
|
- Add static libraries
|
||||||
|
- Fix compile of assembly code for mingw64
|
||||||
|
|
||||||
|
* Fri Jul 20 2012 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 1.5.0-4
|
||||||
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild
|
||||||
|
|
||||||
|
* Thu Apr 19 2012 Kalev Lember <kalevlember@gmail.com> - 1.5.0-3
|
||||||
|
- Rebuilt for %%mingw_configure arg parsing issue
|
||||||
|
|
||||||
|
* Sat Mar 31 2012 Erik van Pienbroek <epienbro@fedoraproject.org> - 1.5.0-2
|
||||||
|
- Simplify the use of mingw macros
|
||||||
|
- Improved the win64 patch a bit (shouldn't have any visible effects)
|
||||||
|
|
||||||
|
* Sun Mar 11 2012 Erik van Pienbroek <epienbro@fedoraproject.org> - 1.5.0-1
|
||||||
|
- Update to 1.5.0
|
||||||
|
- Added win64 support
|
||||||
|
|
||||||
|
* Fri Mar 09 2012 Kalev Lember <kalevlember@gmail.com> - 1.4.4-9
|
||||||
|
- Remove .la files
|
||||||
|
|
||||||
|
* Tue Mar 06 2012 Kalev Lember <kalevlember@gmail.com> - 1.4.4-8
|
||||||
|
- Renamed the source package to mingw-libgcrypt (#800428)
|
||||||
|
- Spec clean up
|
||||||
|
|
||||||
|
* Mon Feb 27 2012 Erik van Pienbroek <epienbro@fedoraproject.org> - 1.4.4-7
|
||||||
|
- Rebuild against the mingw-w64 toolchain
|
||||||
|
- Use correct .def file
|
||||||
|
|
||||||
|
* Fri Jan 13 2012 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 1.4.4-6
|
||||||
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_17_Mass_Rebuild
|
||||||
|
|
||||||
|
* Tue Feb 08 2011 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 1.4.4-5
|
||||||
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild
|
||||||
|
|
||||||
|
* Sat Jul 25 2009 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 1.4.4-4
|
||||||
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild
|
||||||
|
|
||||||
|
* Wed Feb 25 2009 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 1.4.4-3
|
||||||
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_11_Mass_Rebuild
|
||||||
|
|
||||||
|
* Fri Feb 20 2009 Richard W.M. Jones <rjones@redhat.com> - 1.4.4-2
|
||||||
|
- Rebuild for mingw32-gcc 4.4
|
||||||
|
|
||||||
|
* Fri Feb 6 2009 Richard W.M. Jones <rjones@redhat.com> - 1.4.4-1
|
||||||
|
- Update to Fedora native version 1.4.4:
|
||||||
|
. Remove potentially patented ECC support.
|
||||||
|
. Do not abort when the fips mode kernel flag is inaccessible
|
||||||
|
due to permissions (#470219).
|
||||||
|
- For review (Michel Alexandre Salim):
|
||||||
|
. Remove *.def file.
|
||||||
|
. Make description clearer.
|
||||||
|
. Distribute the license files.
|
||||||
|
- The license for binaries is GPLv2+, so update the license field.
|
||||||
|
- Add check section (disabled by default).
|
||||||
|
- Why did we set PATH before configure? Removed.
|
||||||
|
- Added BR mingw32-dlfcn suggested by auto-buildrequires.
|
||||||
|
|
||||||
|
* Fri Jan 23 2009 Richard W.M. Jones <rjones@redhat.com> - 1.4.3-3
|
||||||
|
- Use _smp_mflags.
|
||||||
|
- Disable static libraries.
|
||||||
|
|
||||||
|
* Wed Sep 24 2008 Richard W.M. Jones <rjones@redhat.com> - 1.4.3-2
|
||||||
|
- Rename mingw -> mingw32.
|
||||||
|
|
||||||
|
* Mon Sep 22 2008 Daniel P. Berrange <berrange@redhat.com> - 1.4.3-1
|
||||||
|
- Update to 1.4.3 release
|
||||||
|
|
||||||
|
* Sun Sep 21 2008 Richard W.M. Jones <rjones@redhat.com> - 1.4.1-6
|
||||||
|
- Remove info pages.
|
||||||
|
|
||||||
|
* Thu Sep 11 2008 Daniel P. Berrange <berrange@redhat.com> - 1.4.1-5
|
||||||
|
- Set PATH so it finds gpg-error-config
|
||||||
|
|
||||||
|
* Wed Sep 10 2008 Richard W.M. Jones <rjones@redhat.com> - 1.4.1-4
|
||||||
|
- Remove static library.
|
||||||
|
|
||||||
|
* Thu Sep 4 2008 Richard W.M. Jones <rjones@redhat.com> - 1.4.1-3
|
||||||
|
- Use RPM macros from mingw-filesystem.
|
||||||
|
|
||||||
|
* Tue Sep 2 2008 Daniel P. Berrange <berrange@redhat.com> - 1.4.1-2
|
||||||
|
- List files explicitly and use custom CFLAGS
|
||||||
|
|
||||||
|
* Mon Jul 7 2008 Richard W.M. Jones <rjones@redhat.com> - 1.4.1-1
|
||||||
|
- Initial RPM release, largely based on earlier work from several sources.
|
Loading…
Reference in new issue