For the first issue, I pushed the change in rGc3a20c88fb30: scd: Fix an error return for READKEY..
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Advanced Search
Nov 25 2020
Great. Please apply the patch.
More specifically, in the situation of multiple calls, ->getPassphrase is called multiple times, and it should return newly allocated "char *" object each time, because it is released each time (in lower layer).
My excuse: Please note that the support of exporting secret keys by GPGME are relatively new feature (see {T5046) and the fix rM3382ecb17eb5: core: Support exporting secret keys.). The fix of rM53ac732bae46: core: Call _gpgme_passphrase_status_handler when exporting keys. is a part of the support.
I think that we need more fixes for gpg/gpgme to be fully working well.
Nov 24 2020
Please use shorter password.
For gpgsm, maximum is 31 chars.
Currently, gpg doesn't report any errors to status line for exporting secret keys. If needed, a patch like this is needed:
Chasing this bug, I pushed a change: rM53ac732bae46: core: Call _gpgme_passphrase_status_handler when exporting keys.
Nov 20 2020
Thanks, I was wrong.
How about distinguishing CARDNO and application specific SERIALNO?
Yes, it is due to a backport from master: rG1049f06c6d2e: scd:openpgp: Allow keygrip to be used to reference a key
Fixed in rG84020385be19: scd:openpgp: Public keys should be available for check_keyidstr..
Nov 19 2020
I looked the gpg-agent.log, it indeed suggested the problem fixed in rG61aea64b3c17: scd: Fix the use case of verify_chv2 by CHECKPIN., which is included in 2.2.24.
You have multiple readers and using PC/SC by specifying reader-port.
We fixed in master by T4998: scdaemon: PC/SC "No such device" without reader-port, and I didn't know similar fixes should be backported.
I will soon.
Thanks again for your report.
Thanks. I understand the situation. Basically, gpg-agent's computation is done by a single thread (in current implementation), although it accepts many requests simultaneously.
Nov 18 2020
Nov 17 2020
I think that it is not gpg-agent but pinentry which causes millions of futex syscall errors.
For interactive use case, pinentry may be the point of contention.
I might be wrong if your key is not protected by passphrase.
Nov 16 2020
I don't see any problems in your PC/SC log, at all. If it is the failure of vendor's driver, we actually have no way to fix.
Nov 13 2020
Nov 12 2020
Thanks for your report, but your excerpt is irrelevant.
Push the change.
Thank you.
Let me describe current situation.
Nov 11 2020
Thanks.
I didn't consider well about the test environment which uses special pinentry program.
I'll fix the line 155.
Nov 10 2020
The feature (better cross compiling) was done in master.
We close this bug report as "Won't fix" since it will never been applied to 2.2.
In newer releases of libgpg-error, libksba, libassuan, libgcrypt, npth and ntbtls, we updated corresponding *.m4, so that we can use new gpgrt-config program only. And gpgrt-config command supports cross compiling and multiarch libraries.
For 2.2, rG61aea64b3c17: scd: Fix the use case of verify_chv2 by CHECKPIN. fixed this problem.
Fixed in master.
(confirmation interaction is also fixed.)
Need another patch to export it:
diff --git a/g10/export.c b/g10/export.c index 8dd0b07d7..339424e19 100644 --- a/g10/export.c +++ b/g10/export.c @@ -627,6 +627,57 @@ canon_pk_algo (enum gcry_pk_algos algo) }
It's fixed in master by T3465: --pinentry-mode loopback with --delete-secret-keys, with new confirmation interaction.
For 2.2, you can use --batch and --yes, see T4667: "gpg: deleting secret key failed: No pinentry" when in --batch mode with --pinentry=loopback.
Did you remove .gnupg entirely? Secret keys are stored in .gnupg/private-keys-v1.d. If it remained, you didn't import your secret keys.
If it was the case, I'd like to merge this report to T3391: cannot import subkey that was once marked to be on a card.
Nov 9 2020
The "Reliability History" says (in Chinese):
异常代码: c0000005 异常偏移: 0002b6c0
The error code c0000005 is something like SEGV on POSIX, I guess.
It occurred at the address 0002b6c0.
Nov 5 2020
For SPR532, we need following.