I don't see any problems in your PC/SC log, at all. If it is the failure of vendor's driver, we actually have no way to fix.
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Advanced Search
Nov 16 2020
Nov 14 2020
I have been able to resolve the problem by writing:
Nov 13 2020
Nov 12 2020
Sorry, I do not understand what kind of bug you are trying to report. it seems that you have a question about some software and you assume this is gpg4win. "invalid pocket" is however not an error any of our software emits.
Note that Kleopatra verifies the currently active card before starting the generation of new keys. This prevents the destruction of keys on the wrong card.
I am trying to solve this problem since one month
Thanks for your report, but your excerpt is irrelevant.
Push the change.
Thank you.
Nov 11 2020
This is a regression of the multi-card, multi-app support in Kleopatra, i.e. T5066. Generating OpenPGP keys fails because the PIV app is active on the card and the code does not switch to the OpenPGP app. (It also does not switch to the correct card if multiple cards are inserted which could result in the destruction of keys on the wrong card.)
Nov 10 2020
Works for me. Also with a gpg.conf-2 file. Do you use a /etc/gnupg/gpg.conf ?
For 2.2, rG61aea64b3c17: scd: Fix the use case of verify_chv2 by CHECKPIN. fixed this problem.
Fixed in master.
(confirmation interaction is also fixed.)
Need another patch to export it:
diff --git a/g10/export.c b/g10/export.c index 8dd0b07d7..339424e19 100644 --- a/g10/export.c +++ b/g10/export.c @@ -627,6 +627,57 @@ canon_pk_algo (enum gcry_pk_algos algo) }
It's fixed in master by T3465: --pinentry-mode loopback with --delete-secret-keys, with new confirmation interaction.
For 2.2, you can use --batch and --yes, see T4667: "gpg: deleting secret key failed: No pinentry" when in --batch mode with --pinentry=loopback.
Did you remove .gnupg entirely? Secret keys are stored in .gnupg/private-keys-v1.d. If it remained, you didn't import your secret keys.
If it was the case, I'd like to merge this report to T3391: cannot import subkey that was once marked to be on a card.
Nov 9 2020
I reconsidered this. Suppressing such messages with --quiet is oka and will be in 2.2.24.
The "Reliability History" says (in Chinese):
异常代码: c0000005 异常偏移: 0002b6c0
The error code c0000005 is something like SEGV on POSIX, I guess.
It occurred at the address 0002b6c0.
Nov 5 2020
Nov 4 2020
I'm pretty sure what happens, but apparently I haven't been able to explain it clear enough. To reproduce you can do like this:
- On an old machine having GnuPG version 1, e.g. Red Hat Enterprise 5:
- gpg --homedir $PWD/homedir --gen-key
- tar cf homedir.tar homedir/pubring.gpg homedir/secring.gpg
- On a more modern machine having GnuPG version 2, e.g. Red Hat Enterprise 8:
- tar xf homedir.tar
- touch apa bepa
- gpg --homedir $PWD/homedir --sign apa # Does the migration, and signs "apa"
- mv homedir homedir.moved # Don't remove, just move
- tar xf homedir.tar
- gpg --homedir $PWD/homedir --sign bepa # This will fail as explaine in point 5 of the initial description
The inotify thing is only used to detect a deleted homedir and stop the agent. AFAIU your problem is that a migration is triggered again. The migration status is a file ~/.gnupg/.gpg-v21-migrated - are you sure that you have extracted it again?
Applying following SOS-handling, the key can be handled.
diff --git a/g10/parse-packet.c b/g10/parse-packet.c index 9cb254e24..be7fc6d67 100644 --- a/g10/parse-packet.c +++ b/g10/parse-packet.c @@ -188,6 +188,76 @@ mpi_read (iobuf_t inp, unsigned int *ret_nread, int secure) }
Note that there is no problem for encrypted key, because it is handled by opaque MPI.
Nov 3 2020
The whole TOFU stuff hash not yet been fully translated because there are conceptional problems with the way the code works.
Nov 2 2020
The next version will fix the wrong warning and also allow for an empty value.
No, overlapped I/O is not used. OVL is just a zeroed out memory area and thus hHandle is NULL. Errors are of course checked.
Note: menu_backsign can be enhanced to detect such a case in the same way it detects missing backsigs.
Setting to resolved as discussed with Werner
Nov 1 2020
Oct 30 2020
One bug is fixed in rGdd4fb1c8f668: gpg: Fix first zero-byte case for SOS handling..
Fixed in 2.2 branch.
Also, I found another issue of libgcrypt master, which is fixed in rC361a0588489c: ecc: Handle removed zeros at the beginning for Ed25519..
Further, I found different issue, and created T5116: GnuPG master shows an error when importing Ed25519 keys generated.
I think that it may occur with eddsa secret keys generated with 2.2, too. (In the 50% probability)
Oct 29 2020
In short eddsa secret keys generated with current 2.3 can't be imported with 2.2, right? That will lead to a compatibility problem, so we need to fix that in 2.2.
IIUC, it is an issue of GnuPG 2.2.
The condition is where the secret 'd' starts by the first bit = 1 (that is, >= 0x80).
I located the bug in agent/cvt-openpgp.c. The function do_unprotect calls convert_secret_key with skey[1] as usual MPI (not opaque),
and gcry_sexp_build with "(d%m)" will put additional 0x00 at the beginning, which results 33-byte secret in R_KEY. Then, when gcry_pk_testkey is called with R_KEY, when it checks, because 32-byte is expected, it returns GPG_ERR_INV_OBJ. Then, do_unprotect returns GPG_ERR_BAD_PASSPHRASE.
With Debian's GnuPG 2.2.12, I got an error:
With bata1449, I cannot reproduce it.
I can import by gpg --import key-uids-sec.pgp
I tested with Debian's libgcrypt, as well as libgcrypt master (4a50c6b8).
Oct 28 2020
Thanks for the info and my apologies for the regression. Please see my comment on T5045.
Pushed the change.
Oct 27 2020
I am facing a really similar problem currently in version 3.1.13 (on windows 10)
Although the self-test shows all checks passed. I found out that there is an issue with the cache dir file not being created/loaded.
See:
IIUC, fix can be like this:
diff --git a/lang/python/src/core.py b/lang/python/src/core.py index 996c3b0f..646bbc60 100644 --- a/lang/python/src/core.py +++ b/lang/python/src/core.py @@ -147,7 +147,12 @@ class GpgmeWrapper(object): gpgme.gpg_raise_callback_exception(slf) return result
Oct 26 2020
The action to switch to the "Smartcard management" still lacks an icon. In the old KDE icon theme Oxygen there was an icon ("secure-card"), but the new Breeze icon theme lacks this icon. I have requested an icon for this for the Breeze theme. See https://bugs.kde.org/show_bug.cgi?id=428278.
Oct 23 2020
Oct 19 2020
My sks keyserver is in Linux Ubuntu 18.04 LTS. As a client I'm using windows 10 and gpg4win is 3.1.13.
Hmm, interesting. I'm using the Back button all of the time to get back to the certificate list from the smartcard manager. Might be a Windows-only bug.
Are you on Windows or Linux? What version of Kleopatra or Gpg4win are you using?
See also T5098 - I am sorry for this regression. We are working on a fix.
Which version of Gpg4win did you install, from where, and which OS version are you using? Why did you install gpg4win at a non-default location?
Oct 18 2020
Oct 16 2020
Oct 12 2020
Oct 11 2020
Oct 6 2020
Please ask your distribution . What I see here is a problem with the packaging of a dedicated build system. This is not the build system which comes with GnuPG. Feel free to reopen if you can show that this is a native gnupg build problem.
