Page MenuHome GnuPG
Feed Advanced Search

Jun 1 2021

Vvyibaba closed T5457: libgcrypt unable to be compiled with clang as Resolved.

Thank you, indeed it was my fault. After -enable-O-flag-munging it compiled (btw before that it spitted the same error in jitterentropy as the one referenced in the apple case, so maybe it's that?)

Jun 1 2021, 11:08 AM · libgcrypt, Bug Report
ikloecker claimed T5461: Kleopatra: Does not change OpenPGP keyserver configured in gpg.conf.
Jun 1 2021, 10:01 AM · Restricted Project, kleopatra, Bug Report
ikloecker created T5461: Kleopatra: Does not change OpenPGP keyserver configured in gpg.conf.
Jun 1 2021, 10:00 AM · Restricted Project, kleopatra, Bug Report
werner reopened T5369: GnuPG build on Apple with Clang as "Open".

I don't think that it is a good idea to silence this warning. The pragma is esssential for proper random numbers and if clang hijacks a GCC's name space but implements something different it is better to have a warning than to fall into the pit full of dragons.

Jun 1 2021, 8:40 AM · libgcrypt, MacOS, Bug Report
Alan added a comment to T5415: YubiKey no longer recognized in GnuPG 2.3.1 on macOS 10.15.7.

So, has this issue been solved?

Jun 1 2021, 8:40 AM · MacOS, yubikey, Bug Report
gniibe closed T5369: GnuPG build on Apple with Clang as Resolved.

That warning could be silenced by surrounding pragma with #ifdef __OPTIMIZE__ (with should be supported by GCC and Clang).

Jun 1 2021, 4:09 AM · libgcrypt, MacOS, Bug Report
gniibe added a comment to T5457: libgcrypt unable to be compiled with clang.

Thanks for your report.

Jun 1 2021, 4:03 AM · libgcrypt, Bug Report

May 31 2021

Vvyibaba added a project to T5457: libgcrypt unable to be compiled with clang: libgcrypt.
May 31 2021, 3:07 PM · libgcrypt, Bug Report
Vvyibaba created T5457: libgcrypt unable to be compiled with clang.
May 31 2021, 3:07 PM · libgcrypt, Bug Report

May 28 2021

werner added a project to T5454: Failed to sign with subkey with a signature function using gpgme_op_keysign: gpgme.
May 28 2021, 4:36 PM · FAQ, Support, gpgme
Saturneric added a comment to T5454: Failed to sign with subkey with a signature function using gpgme_op_keysign.

A popular way is to export the subkey, delete the existing key pair, and then import the subkey back, so that the actual value of the master key will not appear in the key pair to protect the master key(The value of the master key will be backed up and stored in another safe place).
At this time, gpg -K will display the following for this key pair:

May 28 2021, 9:26 AM · FAQ, Support, gpgme
werner added a comment to T5454: Failed to sign with subkey with a signature function using gpgme_op_keysign.

By " without a master key" do you mean a keypair where the private key for the primary key is missing?

May 28 2021, 8:59 AM · FAQ, Support, gpgme
gniibe edited projects for T5436: gpg-agent 2.3.1: PIN caching not working for decrypt operations, added: yubikey; removed MacOS.
May 28 2021, 7:19 AM · gnupg24, yubikey, Bug Report
gniibe triaged T5436: gpg-agent 2.3.1: PIN caching not working for decrypt operations as High priority.
May 28 2021, 7:18 AM · gnupg24, yubikey, Bug Report
gniibe claimed T5436: gpg-agent 2.3.1: PIN caching not working for decrypt operations.

Thanks. I push the fix of yours.

May 28 2021, 7:17 AM · gnupg24, yubikey, Bug Report
gniibe merged T5451: disable-ccid breaks gpg-agent caching on MacOS (gpg 2.3.1) into T5436: gpg-agent 2.3.1: PIN caching not working for decrypt operations.
May 28 2021, 3:23 AM · gnupg24, yubikey, Bug Report
gniibe merged task T5451: disable-ccid breaks gpg-agent caching on MacOS (gpg 2.3.1) into T5436: gpg-agent 2.3.1: PIN caching not working for decrypt operations.
May 28 2021, 3:23 AM · scd, gnupg (gpg23), MacOS, Bug Report

May 27 2021

Saturneric created T5454: Failed to sign with subkey with a signature function using gpgme_op_keysign.
May 27 2021, 10:09 PM · FAQ, Support, gpgme
werner triaged T5453: gpgme docs unclear about gpgme_user_id_t.email and gpgme_user_id_t.address as Wishlist priority.
May 27 2021, 7:53 AM · Documentation, gpgme, Bug Report
gniibe changed the status of T5440: _DARWIN_C_SOURCE kind of "must" be 1, not "900000L" from Open to Testing.
May 27 2021, 6:41 AM · MacOS, libgcrypt, Bug Report
gniibe added a comment to T5440: _DARWIN_C_SOURCE kind of "must" be 1, not "900000L".

Done for all (libgcrypt (master, 1.9, and 1.8), libassuan, ntbtls, libksba, gpgme, gnupg (2.2 and 2.3).

May 27 2021, 6:40 AM · MacOS, libgcrypt, Bug Report
dkg created T5453: gpgme docs unclear about gpgme_user_id_t.email and gpgme_user_id_t.address.
May 27 2021, 4:17 AM · Documentation, gpgme, Bug Report

May 26 2021

dkg added a comment to T5450: gpgsm --with-colons --list-keys misreports uid: lines where cert subject DN contains an emailAddress component.

Another solution to make life easier for gpgme users encountering this stuff would be if gpgme itself knows which uid is a DN and which is not, it could populate the gpgme_user_id_t.address field with content of the 1.2.840.113549.1.9.1 DN component. (or maybe gpgme_user_id_t.email, or both? as a user of gpgme, i don't really understand the difference between these fields)

May 26 2021, 9:34 PM · libksba, S/MIME, Bug Report
dkg added a comment to T5450: gpgsm --with-colons --list-keys misreports uid: lines where cert subject DN contains an emailAddress component.

fwiw, RFC 2253 is obsoleted by rfc 4514 -- which also doesn't have 1.2.840.113549.1.9.1 associated with "EMAIL", but does provide more detailed guidance for implementers of DN-to-string (and string-to-DN, to the extent that this is possible) conversions. Maybe the code should be updated to refer to the non-obsolete specification at least.

May 26 2021, 9:03 PM · libksba, S/MIME, Bug Report
werner closed T5450: gpgsm --with-colons --list-keys misreports uid: lines where cert subject DN contains an emailAddress component as Resolved.

We translate only those OIDs from RFC-2253 to have a stable set of names in the libksba interface. If you need anything else, you need to do this yourself. For example gpgsm does this in in parse_dn_part, gpa has the code in format-dn.

May 26 2021, 6:00 PM · libksba, S/MIME, Bug Report
werner added projects to T5451: disable-ccid breaks gpg-agent caching on MacOS (gpg 2.3.1): MacOS, gnupg (gpg23), scd.
May 26 2021, 5:48 PM · scd, gnupg (gpg23), MacOS, Bug Report
sithlord2 created T5451: disable-ccid breaks gpg-agent caching on MacOS (gpg 2.3.1).
May 26 2021, 10:50 AM · scd, gnupg (gpg23), MacOS, Bug Report
dkg added a comment to T5450: gpgsm --with-colons --list-keys misreports uid: lines where cert subject DN contains an emailAddress component.

I'm reporting this because the above message renders poorly in notmuch -- notmuch gets the user ID from gmime's g_mime_certificate_get_user_id, and gmime populates that field from the uids field of a gpgme_key_t object, and gpgme pulls uid information from gpgsm --with-colons.

May 26 2021, 3:39 AM · libksba, S/MIME, Bug Report
dkg added a comment to T5450: gpgsm --with-colons --list-keys misreports uid: lines where cert subject DN contains an emailAddress component.

Attached is a proposed patch.

May 26 2021, 3:32 AM · libksba, S/MIME, Bug Report
dkg created T5450: gpgsm --with-colons --list-keys misreports uid: lines where cert subject DN contains an emailAddress component.
May 26 2021, 3:25 AM · libksba, S/MIME, Bug Report
dkg added a comment to T5445: gpgsm fails to find path to valid X.509 root when cross-signed intermediate certificate is present.

Attached is an even worse PKCS7 blob, that should be validatable given reliance on ca.rsa.crt, but it will be rejected by gpgsm because the PKCS#7 bundle includes ca.rsa.cross2.crt in it.

May 26 2021, 12:07 AM · S/MIME, Bug Report

May 25 2021

dkg updated the task description for T5445: gpgsm fails to find path to valid X.509 root when cross-signed intermediate certificate is present.
May 25 2021, 11:22 PM · S/MIME, Bug Report
dkg updated the task description for T5445: gpgsm fails to find path to valid X.509 root when cross-signed intermediate certificate is present.
May 25 2021, 11:21 PM · S/MIME, Bug Report
dkg added a comment to T5445: gpgsm fails to find path to valid X.509 root when cross-signed intermediate certificate is present.

OK, i have replicated this successfully with no ed25519 involved. here's the new intermediate cert:

May 25 2021, 11:18 PM · S/MIME, Bug Report
dkg added a comment to T5445: gpgsm fails to find path to valid X.509 root when cross-signed intermediate certificate is present.

Which NIST test suite are you referring to? It might not cover certificate pathfinding in the face of multiple cross-signed authorities.

May 25 2021, 5:37 PM · S/MIME, Bug Report
werner edited projects for T5449: gnupg: Do not use SHA1 by default, added: gnupg (gpg23); removed gnupg.
May 25 2021, 12:49 PM · gnupg24, gnupg (gpg23), Bug Report
lbogdan added a comment to T5436: gpg-agent 2.3.1: PIN caching not working for decrypt operations.

@werner @ikloecker Any more thoughts / updates on this?

May 25 2021, 11:40 AM · gnupg24, yubikey, Bug Report
werner triaged T5445: gpgsm fails to find path to valid X.509 root when cross-signed intermediate certificate is present as Normal priority.

I do not have the time to analyse this in the context of our approved versions and to compare it to the NIST test suite. We also do not yet have support for ed25519 certificates.

May 25 2021, 9:45 AM · S/MIME, Bug Report

May 24 2021

Jakuje created T5449: gnupg: Do not use SHA1 by default.
May 24 2021, 4:46 PM · gnupg24, gnupg (gpg23), Bug Report
Jakuje renamed T5433: libgcrypt: Do not use SHA1 by default from Do not use SHA1 by default to libgcrypt: Do not use SHA1 by default.
May 24 2021, 4:38 PM · FIPS, libgcrypt, Bug Report
Jakuje added a comment to T5393: gnupg coverity static analysis reports.

Thank you. I checked what was missing and all looks good. But do not understand why the last gpgsplit xfree was not applied. We are leaving a block where this variable is dynamically allocated so even without error we need to free it.

May 24 2021, 4:36 PM · gnupg (gpg23), Bug Report

May 23 2021

Saturneric added a comment to T5448: GPG_ERR_EOF didn't return by gpgme_op_keylist_next after the last key in the list had already been returned.

thanks!

May 23 2021, 4:11 PM · Support, gpgme
werner added a comment to T5448: GPG_ERR_EOF didn't return by gpgme_op_keylist_next after the last key in the list had already been returned.

The error codes we use are a combination of code and location.

May 23 2021, 10:54 AM · Support, gpgme

May 22 2021

Saturneric created T5448: GPG_ERR_EOF didn't return by gpgme_op_keylist_next after the last key in the list had already been returned.
May 22 2021, 5:53 PM · Support, gpgme

May 21 2021

gniibe claimed T5440: _DARWIN_C_SOURCE kind of "must" be 1, not "900000L".

Thank you for your report.

May 21 2021, 7:04 AM · MacOS, libgcrypt, Bug Report
dkg updated the task description for T5445: gpgsm fails to find path to valid X.509 root when cross-signed intermediate certificate is present.
May 21 2021, 3:17 AM · S/MIME, Bug Report
dkg updated the task description for T5445: gpgsm fails to find path to valid X.509 root when cross-signed intermediate certificate is present.
May 21 2021, 3:17 AM · S/MIME, Bug Report
dkg updated the task description for T5445: gpgsm fails to find path to valid X.509 root when cross-signed intermediate certificate is present.
May 21 2021, 3:16 AM · S/MIME, Bug Report
dkg updated the task description for T5445: gpgsm fails to find path to valid X.509 root when cross-signed intermediate certificate is present.
May 21 2021, 3:15 AM · S/MIME, Bug Report
dkg updated the task description for T5445: gpgsm fails to find path to valid X.509 root when cross-signed intermediate certificate is present.
May 21 2021, 3:14 AM · S/MIME, Bug Report
dkg updated the task description for T5445: gpgsm fails to find path to valid X.509 root when cross-signed intermediate certificate is present.
May 21 2021, 3:09 AM · S/MIME, Bug Report
dkg renamed T5445: gpgsm fails to find path to valid X.509 root when cross-signed intermediate certificate is present from gpgsm fails to find shortest certificate path to valid X.509 root to gpgsm fails to find path to valid X.509 root when cross-signed intermediate certificate is present.
May 21 2021, 3:08 AM · S/MIME, Bug Report
dkg created T5445: gpgsm fails to find path to valid X.509 root when cross-signed intermediate certificate is present.
May 21 2021, 1:45 AM · S/MIME, Bug Report

May 20 2021

werner added a comment to T5393: gnupg coverity static analysis reports.

The first two patch sets are now applied with the exception of
the gpgsplit fix; I did not applied that patch to add a free() in case of write errors.

May 20 2021, 5:37 PM · gnupg (gpg23), Bug Report
werner added a comment to T5393: gnupg coverity static analysis reports.

Please note that *_error-from_syserror accesses system's errno which may be cleared by xfree.

May 20 2021, 9:09 AM · gnupg (gpg23), Bug Report

May 19 2021

werner added a comment to T5415: YubiKey no longer recognized in GnuPG 2.3.1 on macOS 10.15.7.

Please read also the report T5442 which is basically the same.

May 19 2021, 9:25 PM · MacOS, yubikey, Bug Report
werner merged T5442: Serial number detection of Yubikey 5 (Yubikey 5 doesn't work after updating to GnuPG 2.3.1) into T5415: YubiKey no longer recognized in GnuPG 2.3.1 on macOS 10.15.7.
May 19 2021, 9:23 PM · MacOS, yubikey, Bug Report
werner added a comment to T5428: PC/SC detecting removal of card.

Funny thing is that I can't replicate it anymore with the current version (2.2.18-beta77). I tested it on two machines and things just worked. One machine had just one reader and the other had several virtual readers in addition to the scr3500. After adding --reader-port for the latter it worked as well. I don't think I had a Windows update in the meantime.

May 19 2021, 11:46 AM · Info Needed, Windows, scd, Bug Report
zorvek added a comment to T5324: Kleopatra: Add recursive folder decryption.

Then let's get it in there. It's pretty easy to traverse a directory.

May 19 2021, 4:47 AM · kleopatra, Feature Request, gpg4win
werner removed a project from T5324: Kleopatra: Add recursive folder decryption: Info Needed.

reading your report again: You clicked on a folder and expected that all encrypted files in this folder will be decrypted? That is unfortunately not supported.

May 19 2021, 2:49 AM · kleopatra, Feature Request, gpg4win

May 18 2021

cesar.portilla added a comment to T5324: Kleopatra: Add recursive folder decryption.

I have the same message when i try to decrypt files larger than 1.5GB in size; i atached the report "gpgconf --show-version"

May 18 2021, 11:13 PM · kleopatra, Feature Request, gpg4win
werner added a project to T5440: _DARWIN_C_SOURCE kind of "must" be 1, not "900000L": MacOS.
May 18 2021, 8:23 AM · MacOS, libgcrypt, Bug Report
saurik updated the task description for T5440: _DARWIN_C_SOURCE kind of "must" be 1, not "900000L".
May 18 2021, 4:27 AM · MacOS, libgcrypt, Bug Report
saurik added a comment to T5440: _DARWIN_C_SOURCE kind of "must" be 1, not "900000L".

Note: I believe this issue might affect multiple other GnuPG projects.

May 18 2021, 3:14 AM · MacOS, libgcrypt, Bug Report
saurik created T5440: _DARWIN_C_SOURCE kind of "must" be 1, not "900000L".
May 18 2021, 3:10 AM · MacOS, libgcrypt, Bug Report

May 17 2021

znull added a comment to T5436: gpg-agent 2.3.1: PIN caching not working for decrypt operations.

It's not clear whether you are talking about PIN caching related to signing operations or decryption operations.

May 17 2021, 10:27 PM · gnupg24, yubikey, Bug Report
lbogdan added a comment to T5436: gpg-agent 2.3.1: PIN caching not working for decrypt operations.

Just got around to testing this on Linux, and I can confirm the same behavior: decryption PIN caching works on 2.2 and doesn't work on 2.3.

May 17 2021, 1:51 PM · gnupg24, yubikey, Bug Report
werner triaged T5438: gpgme_op_keylist_from_data_start ignores GPGME_KEYLIST_MODE_SIGS as High priority.

Due to tax issues, we can't accept a donation as return on service. However, we will fix bugs anyway if possible,

May 17 2021, 11:50 AM · gpgme (gpgme 1.23.x), OpenPGP, Bug Report
lbogdan renamed T5436: gpg-agent 2.3.1: PIN caching not working for decrypt operations from gpg-agent 2.3.1: PIN caching not working to gpg-agent 2.3.1: PIN caching not working for decrypt operations.
May 17 2021, 11:21 AM · gnupg24, yubikey, Bug Report
lbogdan added a comment to T5436: gpg-agent 2.3.1: PIN caching not working for decrypt operations.

@znull You can also fix the detection issue by building with ./configure --disable-ccid-driver, in which case you won't need the disable-ccid setting anymore.

May 17 2021, 10:10 AM · gnupg24, yubikey, Bug Report
lbogdan added a comment to T5436: gpg-agent 2.3.1: PIN caching not working for decrypt operations.

@ikloecker Sorry for not being clear, I was not aware different operations have different behaviors in regard to entering / caching the PIN.

May 17 2021, 9:59 AM · gnupg24, yubikey, Bug Report
ikloecker added a comment to T5436: gpg-agent 2.3.1: PIN caching not working for decrypt operations.

It's not clear whether you are talking about PIN caching related to signing operations or decryption operations.

May 17 2021, 9:22 AM · gnupg24, yubikey, Bug Report

May 15 2021

znull added a comment to T5436: gpg-agent 2.3.1: PIN caching not working for decrypt operations.

I just wanted to chime in that I've had exactly the same experience as @lbogdan: gnupg 2.3 stopped recognizing my yubikey entirely on MacOS until the T5415 workaround (disable-ccid). After that, pin caching was broken until I applied his patch to call-scd.c:548, which makes it work as before. Without these two changes the experience with gnupg 2.3 is degraded relative to 2.2.

May 15 2021, 8:17 PM · gnupg24, yubikey, Bug Report

May 14 2021

lbogdan added a comment to T5436: gpg-agent 2.3.1: PIN caching not working for decrypt operations.

So I did a bit more reading on smartcard PIN caching, and took a better look at the debug logging of gnupg 2.2, and learned that, indeed, the PIN is cached by the card and not by any one gnupg component.

May 14 2021, 6:44 PM · gnupg24, yubikey, Bug Report

May 12 2021

lbogdan added a comment to T5436: gpg-agent 2.3.1: PIN caching not working for decrypt operations.

Yes, I already linked to T5415, but that breaks YubiKey completely, and I fixed it with disable-ccid.

May 12 2021, 6:08 PM · gnupg24, yubikey, Bug Report
werner edited projects for T5436: gpg-agent 2.3.1: PIN caching not working for decrypt operations, added: gnupg (gpg23), MacOS; removed gpgagent.

The pincache is actually not what you think it is. It is only used to allow switching between different application on a Yubikey which reqieres a new VERIFY command after switching back to the first application the card. What you feel as caching is the state of the card, which usually keeps its verification state until the card is powered down.

May 12 2021, 5:52 PM · gnupg24, yubikey, Bug Report
lbogdan updated the task description for T5436: gpg-agent 2.3.1: PIN caching not working for decrypt operations.
May 12 2021, 12:53 PM · gnupg24, yubikey, Bug Report
lbogdan created T5436: gpg-agent 2.3.1: PIN caching not working for decrypt operations.
May 12 2021, 12:51 PM · gnupg24, yubikey, Bug Report
werner closed T5434: gpg-agent should not use MD5 fingerprint for ssh keys as Resolved.
May 12 2021, 9:05 AM · gnupg, Bug Report
werner added a comment to T5434: gpg-agent should not use MD5 fingerprint for ssh keys.

Frankly, I am pretty sure that the new base64 encoding of the fingerprint leads to less diligent comparison of the fingerprint by the user. I don't understand why they did not used a truncated hex output or zBase32 .

May 12 2021, 8:51 AM · gnupg, Bug Report

May 11 2021

lrod33 created T5435: GpgOL shows Insecure and won't decrypt instead there is an attachment.
May 11 2021, 4:10 PM · Info Needed, Bug Report, gpg4win
Jakuje created T5434: gpg-agent should not use MD5 fingerprint for ssh keys.
May 11 2021, 2:30 PM · gnupg, Bug Report
Jakuje created T5433: libgcrypt: Do not use SHA1 by default.
May 11 2021, 1:58 PM · FIPS, libgcrypt, Bug Report
werner triaged T5432: GPA - Crypto Backend Configurator ignores screen zoom factor and partially falls off screen as Low priority.

Thanks for using GPA. Unfortunately, I have to tell you that GPA development has been stopped and I can't say whether we will fix that bug any time soon. Please consider to switch to Kleopatra which is the standard key manager included in gpg4win.

May 11 2021, 1:49 PM · gpa, Bug Report
dutchgemini created T5432: GPA - Crypto Backend Configurator ignores screen zoom factor and partially falls off screen.
May 11 2021, 9:51 AM · gpa, Bug Report
gniibe added a comment to T5428: PC/SC detecting removal of card.

On Windows, smartcard is also used by logon/logout and certificates handling. Those may be related.

May 11 2021, 3:47 AM · Info Needed, Windows, scd, Bug Report

May 10 2021

werner assigned T5428: PC/SC detecting removal of card to gniibe.

(I disabled the account of this boor)

May 10 2021, 6:43 PM · Info Needed, Windows, scd, Bug Report
werner reopened T5415: YubiKey no longer recognized in GnuPG 2.3.1 on macOS 10.15.7 as "Open".

(I disabled this boor and restored the state)

May 10 2021, 6:41 PM · MacOS, yubikey, Bug Report
gillcovid19 placed T5428: PC/SC detecting removal of card up for grabs.
May 10 2021, 12:42 PM · Info Needed, Windows, scd, Bug Report
gillcovid19 closed T5415: YubiKey no longer recognized in GnuPG 2.3.1 on macOS 10.15.7 as Resolved.
May 10 2021, 12:41 PM · MacOS, yubikey, Bug Report
werner triaged T5428: PC/SC detecting removal of card as High priority.
May 10 2021, 8:51 AM · Info Needed, Windows, scd, Bug Report
werner added a comment to T5428: PC/SC detecting removal of card.

I don't think that it is --pcsc-shared related; Andre reported that he noticed such a behaviour before we introduced this.

May 10 2021, 8:49 AM · Info Needed, Windows, scd, Bug Report
gniibe claimed T5428: PC/SC detecting removal of card.

I wonder if PCSC_SHARE_SHARED is related or not.

May 10 2021, 6:32 AM · Info Needed, Windows, scd, Bug Report
gniibe created T5428: PC/SC detecting removal of card.
May 10 2021, 5:40 AM · Info Needed, Windows, scd, Bug Report

May 7 2021

dain added a comment to T5425: scdaemon.conf reader-port setting broken in 2.3.

Ah, great. Thanks!

May 7 2021, 1:16 PM · gnupg, Restricted Project, scd, Bug Report
ikloecker closed T5422: gnupg 2.3.1 breaks gpgme_op_createkey() as Resolved.

You are welcome.

May 7 2021, 12:43 PM · gpgme, Bug Report
pnirschl added a comment to T5422: gnupg 2.3.1 breaks gpgme_op_createkey().

run-genkey is working fine in my test environment as well.

May 7 2021, 9:41 AM · gpgme, Bug Report
colemickens added a comment to T5416: [windows] Smartcards are less reliable under 2.3.1 (requires restarting gpg-agent.exe).

Technical commentary on smartcard operation and/or Windows is going to be over my head, so I can't help (just in case you're looking for anything from me). But always happy to drive-test another build. (I've still had no issues, personally, with the build above.) I'll assume you don't need me unless you link another binary build to test or tag me. Thanks again, all.

May 7 2021, 7:22 AM · yubikey, scd, gnupg (gpg23), Bug Report
gniibe added a comment to T5416: [windows] Smartcards are less reliable under 2.3.1 (requires restarting gpg-agent.exe).

The problem is accesses to reader_table by
(1) scanning reader(s) to open new one
(2) closing reader

May 7 2021, 6:59 AM · yubikey, scd, gnupg (gpg23), Bug Report
gniibe added a comment to T5416: [windows] Smartcards are less reliable under 2.3.1 (requires restarting gpg-agent.exe).

I'm testing D531: Keep holding READER_LOCK_TABLE and make clear distinction among close/releasing_PCSC_context/nullify_rdrname, but I'm not sure about the impact on Windows.

May 7 2021, 6:54 AM · yubikey, scd, gnupg (gpg23), Bug Report