- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Advanced Search
Mar 1 2024
Feb 29 2024
The logs of the failed run contain the following:
2024-02-29 15:12:09 scdaemon[20881] DBG: enter: apdu_get_status: slot=0 hang=0 2024-02-29 15:12:09 scdaemon[20881] DBG: leave: apdu_get_status => sw=0x1000c status=0 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_7 -> S DEVINFO_STATUS removal 2024-02-29 15:12:09 scdaemon[20881] DBG: Removal of a card: 0 2024-02-29 15:12:09 scdaemon[20881] DBG: enter: apdu_close_reader: slot=0 2024-02-29 15:12:09 scdaemon[20881] DBG: enter: apdu_disconnect: slot=0 2024-02-29 15:12:09 scdaemon[20881] DBG: leave: apdu_disconnect => sw=0x0
For comparison, the logs when it doesn't fail:
2024-02-29 15:08:33 scdaemon[20536] handler for fd 13 started 2024-02-29 15:08:33 scdaemon[20536] DBG: chan_13 -> OK GNU Privacy Guard's Smartcard server ready 2024-02-29 15:08:33 scdaemon[20536] DBG: chan_13 <- SERIALNO --all 2024-02-29 15:08:33 scdaemon[20536] DBG: apdu_open_reader: BAI=60900 2024-02-29 15:08:33 scdaemon[20536] DBG: apdu_open_reader: new device=60900 2024-02-29 15:08:33 scdaemon[20536] ccid open error: skip 2024-02-29 15:08:33 scdaemon[20536] DBG: apdu_open_reader: BAI=60a00 2024-02-29 15:08:33 scdaemon[20536] DBG: apdu_open_reader: new device=60a00 2024-02-29 15:08:34 scdaemon[20536] reader slot 0: using ccid driver 2024-02-29 15:08:34 scdaemon[20536] slot 0: ATR=3bbf96008131fe5d00640411030131c073f701d00090007d 2024-02-29 15:08:34 scdaemon[20536] DBG: enter: apdu_connect: slot=0 2024-02-29 15:08:34 scdaemon[20536] DBG: leave: apdu_connect => sw=0x0 2024-02-29 15:08:36 scdaemon[20536] Detected NKS version: 3 2024-02-29 15:08:36 scdaemon[20536] DBG: apdu_open_reader: BAI=40200 2024-02-29 15:08:36 scdaemon[20536] DBG: apdu_open_reader: new device=40200 2024-02-29 15:08:36 scdaemon[20536] ccid open error: skip 2024-02-29 15:08:36 scdaemon[20536] DBG: enter: apdu_get_status: slot=0 hang=0 2024-02-29 15:08:36 scdaemon[20536] DBG: leave: apdu_get_status => sw=0x0 status=7 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_7 -> S DEVINFO_STATUS new 2024-02-29 15:08:36 scdaemon[20536] DBG: enter: apdu_get_status: slot=0 hang=0 2024-02-29 15:08:36 scdaemon[20536] DBG: leave: apdu_get_status => sw=0x0 status=7 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_7 -> S DEVINFO_START 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_7 -> S DEVICE generic 89490173300026616520 nks 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_7 -> S DEVINFO_END 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 -> S SERIALNO 89490173300026616520 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 -> OK 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 <- GETINFO all_active_apps 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 -> S SERIALNO 89490173300026616520 nks 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 -> OK 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 <- SWITCHCARD 89490173300026616520 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 -> S SERIALNO 89490173300026616520 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 -> OK 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 <- SWITCHAPP nks 2024-02-29 15:08:36 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=[none] 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 -> S SERIALNO 89490173300026616520 nks 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 -> OK 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 <- GETATTR $SIGNKEYID 2024-02-29 15:08:36 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=[none] 2024-02-29 15:08:36 scdaemon[20536] DBG: slot 0 app nks: calling getattr($SIGNKEYID) 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 -> S $SIGNKEYID NKS-NKS3.4531 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 -> OK 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 <- GETATTR $ENCRKEYID 2024-02-29 15:08:36 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=[none] 2024-02-29 15:08:36 scdaemon[20536] DBG: slot 0 app nks: calling getattr($ENCRKEYID) 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 -> S $ENCRKEYID NKS-NKS3.45B1 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 -> OK 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 <- GETATTR NKS-VERSION 2024-02-29 15:08:36 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=[none] 2024-02-29 15:08:36 scdaemon[20536] DBG: slot 0 app nks: calling getattr(NKS-VERSION) 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 -> S NKS-VERSION 3 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 -> OK 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 <- GETATTR $DISPSERIALNO 2024-02-29 15:08:36 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=[none] 2024-02-29 15:08:36 scdaemon[20536] DBG: slot 0 app nks: calling getattr($DISPSERIALNO) 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 -> S $DISPSERIALNO 8949017330002661652 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 -> OK 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 <- GETATTR CHV-STATUS 2024-02-29 15:08:36 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=[none] 2024-02-29 15:08:36 scdaemon[20536] DBG: slot 0 app nks: calling getattr(CHV-STATUS) 2024-02-29 15:08:36 scdaemon[20536] nks: switching to SigG 2024-02-29 15:08:37 scdaemon[20536] DBG: chan_13 -> S CHV-STATUS 3+0+3+0 2024-02-29 15:08:37 scdaemon[20536] DBG: chan_13 -> OK 2024-02-29 15:08:37 scdaemon[20536] DBG: chan_13 <- LEARN --force 2024-02-29 15:08:37 scdaemon[20536] DBG: chan_13 -> S READER 04E6:E003:51271834208013:0 2024-02-29 15:08:37 scdaemon[20536] DBG: chan_13 -> S SERIALNO 89490173300026616520 2024-02-29 15:08:37 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=[none] 2024-02-29 15:08:37 scdaemon[20536] DBG: chan_13 -> S APPTYPE nks 2024-02-29 15:08:37 scdaemon[20536] DBG: chan_13 -> S APPVERSION 3 2024-02-29 15:08:37 scdaemon[20536] nks: switching to NKS 2024-02-29 15:08:38 scdaemon[20536] nks: switching to SigG 2024-02-29 15:08:39 scdaemon[20536] DBG: chan_13 -> S CHV-STATUS 3+0+3+0 2024-02-29 15:08:39 scdaemon[20536] nks: switching to NKS 2024-02-29 15:08:40 scdaemon[20536] DBG: chan_13 -> S KEYPAIRINFO 39400430E38BB96F105B740A7119FE113578B59D NKS-NKS3.4531 sa - rsa2048 2024-02-29 15:08:40 scdaemon[20536] DBG: chan_13 -> S CERTINFO 101 NKS-NKS3.C000 2024-02-29 15:08:40 scdaemon[20536] error selecting FID 0x4331: No such file or directory 2024-02-29 15:08:40 scdaemon[20536] error selecting FID 0x4332: No such file or directory 2024-02-29 15:08:40 scdaemon[20536] DBG: chan_13 -> S CERTINFO 110 NKS-NKS3.B000 2024-02-29 15:08:41 scdaemon[20536] DBG: chan_13 -> S KEYPAIRINFO 42C3CA6F9D7A725A59DDE06B16B61E88C62777C4 NKS-NKS3.45B1 e - rsa2048 2024-02-29 15:08:41 scdaemon[20536] DBG: chan_13 -> S CERTINFO 101 NKS-NKS3.C200 2024-02-29 15:08:41 scdaemon[20536] error selecting FID 0x43B1: No such file or directory 2024-02-29 15:08:41 scdaemon[20536] error selecting FID 0x43B2: No such file or directory 2024-02-29 15:08:41 scdaemon[20536] DBG: chan_13 -> S KEYPAIRINFO 20E7CB1D5299669CABF29B103C692AB34CB03528 NKS-NKS3.45B2 e - rsa1024 2024-02-29 15:08:41 scdaemon[20536] DBG: chan_13 -> S CERTINFO 101 NKS-NKS3.C201 2024-02-29 15:08:41 scdaemon[20536] nks: switching to SigG 2024-02-29 15:08:42 scdaemon[20536] DBG: chan_13 -> S KEYPAIRINFO A69B0D3796EE33E4426E5CE4B6BEEE5F1209FBA4 NKS-SIGG.4531 se - rsa2048 2024-02-29 15:08:42 scdaemon[20536] DBG: chan_13 -> S CERTINFO 101 NKS-SIGG.C000 2024-02-29 15:08:42 scdaemon[20536] data at FID 0xC008 does not look like a certificate 2024-02-29 15:08:42 scdaemon[20536] data at FID 0xC00E does not look like a certificate 2024-02-29 15:08:42 scdaemon[20536] DBG: chan_13 -> OK 2024-02-29 15:08:42 scdaemon[20536] DBG: chan_13 <- GETATTR SERIALNO 2024-02-29 15:08:42 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=[none] 2024-02-29 15:08:42 scdaemon[20536] DBG: chan_13 -> S SERIALNO 89490173300026616520 2024-02-29 15:08:42 scdaemon[20536] DBG: chan_13 -> OK 2024-02-29 15:08:42 scdaemon[20536] DBG: chan_13 <- READKEY -- NKS-NKS3.4531 2024-02-29 15:08:42 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=NKS-NKS3.4531 2024-02-29 15:08:42 scdaemon[20536] DBG: slot 0 app nks: calling readkey(NKS-NKS3.4531) 2024-02-29 15:08:42 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=NKS-NKS3.4531 2024-02-29 15:08:42 scdaemon[20536] DBG: slot 0 app nks: calling readcert(NKS-NKS3.4531) 2024-02-29 15:08:42 scdaemon[20536] nks: switching to NKS 2024-02-29 15:08:44 scdaemon[20536] DBG: chan_13 -> [ 44 20 28 31 30 3a 70 75 62 6c 69 63 2d 6b 65 79 ...(291 byte(s) skipped) ] 2024-02-29 15:08:44 scdaemon[20536] DBG: chan_13 -> OK 2024-02-29 15:08:44 scdaemon[20536] DBG: chan_13 <- GETATTR $DISPSERIALNO 39400430E38BB96F105B740A7119FE113578B59D 2024-02-29 15:08:44 scdaemon[20536] DBG: slot 0, app nks: calling with_keygrip(lookup) 2024-02-29 15:08:44 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=[none] 2024-02-29 15:08:44 scdaemon[20536] DBG: slot 0 app nks: calling getattr($DISPSERIALNO) 2024-02-29 15:08:44 scdaemon[20536] DBG: chan_13 -> S $DISPSERIALNO 8949017330002661652 2024-02-29 15:08:44 scdaemon[20536] DBG: chan_13 -> OK 2024-02-29 15:08:44 scdaemon[20536] DBG: chan_13 <- GETATTR SERIALNO 2024-02-29 15:08:44 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=[none] 2024-02-29 15:08:44 scdaemon[20536] DBG: chan_13 -> S SERIALNO 89490173300026616520 2024-02-29 15:08:44 scdaemon[20536] DBG: chan_13 -> OK 2024-02-29 15:08:44 scdaemon[20536] DBG: chan_13 <- READKEY -- NKS-NKS3.45B1 2024-02-29 15:08:44 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=NKS-NKS3.45B1 2024-02-29 15:08:44 scdaemon[20536] DBG: slot 0 app nks: calling readkey(NKS-NKS3.45B1) 2024-02-29 15:08:44 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=NKS-NKS3.45B1 2024-02-29 15:08:44 scdaemon[20536] DBG: slot 0 app nks: calling readcert(NKS-NKS3.45B1) 2024-02-29 15:08:44 scdaemon[20536] DBG: chan_13 -> [ 44 20 28 31 30 3a 70 75 62 6c 69 63 2d 6b 65 79 ...(293 byte(s) skipped) ] 2024-02-29 15:08:44 scdaemon[20536] DBG: chan_13 -> OK 2024-02-29 15:08:44 scdaemon[20536] DBG: chan_13 <- GETATTR $DISPSERIALNO 42C3CA6F9D7A725A59DDE06B16B61E88C62777C4 2024-02-29 15:08:44 scdaemon[20536] DBG: slot 0, app nks: calling with_keygrip(lookup) 2024-02-29 15:08:44 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=[none] 2024-02-29 15:08:44 scdaemon[20536] DBG: slot 0 app nks: calling getattr($DISPSERIALNO) 2024-02-29 15:08:44 scdaemon[20536] DBG: chan_13 -> S $DISPSERIALNO 8949017330002661652 2024-02-29 15:08:44 scdaemon[20536] DBG: chan_13 -> OK 2024-02-29 15:08:44 scdaemon[20536] DBG: chan_13 <- GETATTR SERIALNO 2024-02-29 15:08:44 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=[none] 2024-02-29 15:08:44 scdaemon[20536] DBG: chan_13 -> S SERIALNO 89490173300026616520 2024-02-29 15:08:44 scdaemon[20536] DBG: chan_13 -> OK 2024-02-29 15:08:44 scdaemon[20536] DBG: chan_13 <- READKEY -- NKS-NKS3.45B2 2024-02-29 15:08:44 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=NKS-NKS3.45B2 2024-02-29 15:08:44 scdaemon[20536] DBG: slot 0 app nks: calling readkey(NKS-NKS3.45B2) 2024-02-29 15:08:44 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=NKS-NKS3.45B2 2024-02-29 15:08:44 scdaemon[20536] DBG: slot 0 app nks: calling readcert(NKS-NKS3.45B2) 2024-02-29 15:08:45 scdaemon[20536] DBG: chan_13 -> [ 44 20 28 31 30 3a 70 75 62 6c 69 63 2d 6b 65 79 ...(157 byte(s) skipped) ] 2024-02-29 15:08:45 scdaemon[20536] DBG: chan_13 -> OK 2024-02-29 15:08:45 scdaemon[20536] DBG: chan_13 <- GETATTR $DISPSERIALNO 20E7CB1D5299669CABF29B103C692AB34CB03528 2024-02-29 15:08:45 scdaemon[20536] DBG: slot 0, app nks: calling with_keygrip(lookup) 2024-02-29 15:08:45 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=[none] 2024-02-29 15:08:45 scdaemon[20536] DBG: slot 0 app nks: calling getattr($DISPSERIALNO) 2024-02-29 15:08:45 scdaemon[20536] DBG: chan_13 -> S $DISPSERIALNO 8949017330002661652 2024-02-29 15:08:45 scdaemon[20536] DBG: chan_13 -> OK 2024-02-29 15:08:45 scdaemon[20536] DBG: chan_13 <- GETATTR SERIALNO 2024-02-29 15:08:45 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=[none] 2024-02-29 15:08:45 scdaemon[20536] DBG: chan_13 -> S SERIALNO 89490173300026616520 2024-02-29 15:08:45 scdaemon[20536] DBG: chan_13 -> OK 2024-02-29 15:08:45 scdaemon[20536] DBG: chan_13 <- READKEY -- NKS-SIGG.4531 2024-02-29 15:08:45 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=NKS-SIGG.4531 2024-02-29 15:08:45 scdaemon[20536] DBG: slot 0 app nks: calling readkey(NKS-SIGG.4531) 2024-02-29 15:08:45 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=NKS-SIGG.4531 2024-02-29 15:08:45 scdaemon[20536] DBG: slot 0 app nks: calling readcert(NKS-SIGG.4531) 2024-02-29 15:08:45 scdaemon[20536] nks: switching to SigG 2024-02-29 15:08:47 scdaemon[20536] DBG: chan_13 -> [ 44 20 28 31 30 3a 70 75 62 6c 69 63 2d 6b 65 79 ...(293 byte(s) skipped) ] 2024-02-29 15:08:47 scdaemon[20536] DBG: chan_13 -> OK 2024-02-29 15:08:47 scdaemon[20536] DBG: chan_13 <- GETATTR $DISPSERIALNO A69B0D3796EE33E4426E5CE4B6BEEE5F1209FBA4 2024-02-29 15:08:47 scdaemon[20536] DBG: slot 0, app nks: calling with_keygrip(lookup) 2024-02-29 15:08:47 scdaemon[20536] nks: switching to NKS 2024-02-29 15:08:48 scdaemon[20536] nks: switching to SigG 2024-02-29 15:08:49 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=[none] 2024-02-29 15:08:49 scdaemon[20536] DBG: slot 0 app nks: calling getattr($DISPSERIALNO) 2024-02-29 15:08:49 scdaemon[20536] nks: switching to NKS 2024-02-29 15:08:50 scdaemon[20536] DBG: chan_13 -> S $DISPSERIALNO 8949017330002661652 2024-02-29 15:08:50 scdaemon[20536] DBG: chan_13 -> OK 2024-02-29 15:08:50 scdaemon[20536] DBG: chan_13 <- GETINFO all_active_apps 2024-02-29 15:08:50 scdaemon[20536] DBG: chan_13 -> S SERIALNO 89490173300026616520 nks 2024-02-29 15:08:50 scdaemon[20536] DBG: chan_13 -> OK 2024-02-29 15:08:50 scdaemon[20536] DBG: chan_13 <- BYE 2024-02-29 15:08:50 scdaemon[20536] DBG: chan_13 -> OK closing connection 2024-02-29 15:08:50 scdaemon[20536] handler for fd 13 terminated
Here are logs with debug ipc,app,reader:
2024-02-29 15:12:07 scdaemon[20881] handler for fd 13 started 2024-02-29 15:12:07 scdaemon[20881] DBG: chan_13 -> OK GNU Privacy Guard's Smartcard server ready 2024-02-29 15:12:07 scdaemon[20881] DBG: chan_13 <- SERIALNO --all 2024-02-29 15:12:07 scdaemon[20881] DBG: apdu_open_reader: BAI=60900 2024-02-29 15:12:07 scdaemon[20881] DBG: apdu_open_reader: new device=60900 2024-02-29 15:12:07 scdaemon[20881] ccid open error: skip 2024-02-29 15:12:07 scdaemon[20881] DBG: apdu_open_reader: BAI=60a00 2024-02-29 15:12:07 scdaemon[20881] DBG: apdu_open_reader: new device=60a00 2024-02-29 15:12:08 scdaemon[20881] reader slot 0: using ccid driver 2024-02-29 15:12:08 scdaemon[20881] slot 0: ATR=3bbf96008131fe5d00640411030131c073f701d00090007d 2024-02-29 15:12:08 scdaemon[20881] DBG: enter: apdu_connect: slot=0 2024-02-29 15:12:08 scdaemon[20881] DBG: leave: apdu_connect => sw=0x0 2024-02-29 15:12:09 scdaemon[20881] Detected NKS version: 3 2024-02-29 15:12:09 scdaemon[20881] DBG: apdu_open_reader: BAI=40200 2024-02-29 15:12:09 scdaemon[20881] DBG: apdu_open_reader: new device=40200 2024-02-29 15:12:09 scdaemon[20881] ccid open error: skip 2024-02-29 15:12:09 scdaemon[20881] DBG: enter: apdu_get_status: slot=0 hang=0 2024-02-29 15:12:09 scdaemon[20881] DBG: leave: apdu_get_status => sw=0x0 status=7 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_7 -> S DEVINFO_STATUS new 2024-02-29 15:12:09 scdaemon[20881] DBG: enter: apdu_get_status: slot=0 hang=0 2024-02-29 15:12:09 scdaemon[20881] DBG: leave: apdu_get_status => sw=0x0 status=7 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_7 -> S DEVINFO_START 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_7 -> S DEVICE generic 89490173300026616520 nks 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_7 -> S DEVINFO_END 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> S SERIALNO 89490173300026616520 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> OK 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 <- GETINFO all_active_apps 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> S SERIALNO 89490173300026616520 nks 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> OK 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 <- SWITCHCARD 89490173300026616520 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> S SERIALNO 89490173300026616520 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> OK 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 <- SWITCHAPP nks 2024-02-29 15:12:09 scdaemon[20881] DBG: slot 0: have=nks want=nks keyref=[none] 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> S SERIALNO 89490173300026616520 nks 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> OK 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 <- GETATTR $SIGNKEYID 2024-02-29 15:12:09 scdaemon[20881] DBG: slot 0: have=nks want=nks keyref=[none] 2024-02-29 15:12:09 scdaemon[20881] DBG: slot 0 app nks: calling getattr($SIGNKEYID) 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> S $SIGNKEYID NKS-NKS3.4531 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> OK 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 <- GETATTR $ENCRKEYID 2024-02-29 15:12:09 scdaemon[20881] DBG: slot 0: have=nks want=nks keyref=[none] 2024-02-29 15:12:09 scdaemon[20881] DBG: slot 0 app nks: calling getattr($ENCRKEYID) 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> S $ENCRKEYID NKS-NKS3.45B1 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> OK 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 <- GETATTR NKS-VERSION 2024-02-29 15:12:09 scdaemon[20881] DBG: slot 0: have=nks want=nks keyref=[none] 2024-02-29 15:12:09 scdaemon[20881] DBG: slot 0 app nks: calling getattr(NKS-VERSION) 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> S NKS-VERSION 3 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> OK 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 <- GETATTR $DISPSERIALNO 2024-02-29 15:12:09 scdaemon[20881] DBG: slot 0: have=nks want=nks keyref=[none] 2024-02-29 15:12:09 scdaemon[20881] DBG: slot 0 app nks: calling getattr($DISPSERIALNO) 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> S $DISPSERIALNO 8949017330002661652 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> OK 2024-02-29 15:12:09 scdaemon[20881] DBG: enter: apdu_get_status: slot=0 hang=0 2024-02-29 15:12:09 scdaemon[20881] DBG: leave: apdu_get_status => sw=0x1000c status=0 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_7 -> S DEVINFO_STATUS removal 2024-02-29 15:12:09 scdaemon[20881] DBG: Removal of a card: 0 2024-02-29 15:12:09 scdaemon[20881] DBG: enter: apdu_close_reader: slot=0 2024-02-29 15:12:09 scdaemon[20881] DBG: enter: apdu_disconnect: slot=0 2024-02-29 15:12:09 scdaemon[20881] DBG: leave: apdu_disconnect => sw=0x0 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 <- GETATTR CHV-STATUS 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> ERR 100663406 Card removed <SCD> 2024-02-29 15:12:09 scdaemon[20881] DBG: leave: apdu_close_reader => 0x0 (close_reader) 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_7 -> S DEVINFO_START 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_7 -> S DEVINFO_END 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 <- GETINFO all_active_apps 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> ERR 100663408 Card not present <SCD> 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 <- BYE 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> OK closing connection 2024-02-29 15:12:09 scdaemon[20881] handler for fd 13 terminated
Feb 28 2024
Feb 27 2024
Feb 26 2024
Feb 23 2024
Feb 22 2024
This is just another sympton with the same root cause. Therefore I have closed this as duplicate.
Interesting. I didn't even know that this feature exists.
Feb 21 2024
This doesn't work reliably for the key list in the smart card view for TCOS/NetKey cards. After a few starts the "Key ID" column is reset to the default width (which is too narrow). The layout does survive a restart directly after I changed the column size. I haven't noticed a pattern when it's lost. I know this isn't really helpful. I'll open a ticket when I find out how to reproduce the problem.
Feb 20 2024
In T6977#183049, @Karam wrote:Uploaded the corrupted file.
Feb 16 2024
Moving back to WiP and setting status to Testing. Moving to QA shall be done when an installer to test this is available. See https://dev.gnupg.org/w/gpgcom/
Can you make this corrupted file available to us?
Feb 15 2024
My suggestion is to define all filters in libkleopatrarc instead of defining some filters in the C++ code.
These actions/commands or, more precisely, the documents those commands show, are only available in the commercial GnuPG VS Desktop release.
Feb 13 2024
For accessibility the contrast between text and background must be high. Therefore, I don't think we should change the color. In any case, you get what you asked for: A dark (green) background color.
In the Certificate Selection Dialog where the user controls the filter it makes sense to apply them also to key groups. The only question is how, i.e. with all_of or with any_of? I'm leaning towards any_of, e.g. if "OpenPGP Certificates" is selected then all key groups are shown that contain at least one OpenPGP certificate. This would also address my concern that key groups could be hidden if they contain an unsuitable key because they would only be hidden if all keys are unsuitable.
Feb 8 2024
I'm wondering whether we didn't do this for a reason. Currently, groups are only used in the certificate line edit. Didn't we want to show all groups to give the user the chance to notice a group containing an unsuitable key? If we filter out the group then the user will have a much harder time to find out why the group isn't offered. Things may be different for the key selection combo box which is primarily (or exclusively?) used for the user's own keys without even offering groups.
Checking if the file already exists doesn't help. In fact, typically the file (containing the shadow key for the card key) will already exist. But one could check if there is already a private key with this keygrip. Then restoring could be refused, so that the worst that can happen is that the shadow key (which can be recovered from the smart card) is overwritten with a corrupt file.
We provide the examples for a reason. Actually, two reasons: To test our changes ourselves. And to provide working examples for others. If your code doesn't work then you'll have to figure out where the example and your code differ. If the example doesn't work then we'll have a look.
Looks like
https://bugs.kde.org/buglist.cgi?component=it&product=i18n&resolution=---
is the bug tracker for Italian translations.
Check https://community.kde.org/Get_Involved/translation for information how to contact the translators and/or become active in translation.
Feb 6 2024
And not using the native Windows dialog isn't an option because people are used to the Windows dialog. I absolutely hate it when some application on Linux doesn't use the KDE dialog but its own dialog because it behaves slightly differently and it doesn't have my bookmarked folders.
We cannot
Switch to gpgtar if folders are involved. In that case "Sign/Encrypt Folder" would no longer be needed.
because we don't know that folders are involved. And I don't think we can hide the folders, so that users cannot select folders and wonder why they are not encrypted, because Microsoft thought it would be a great idea to basically use the Windows Explorer as File Open/Select/Save dialog. And, of course, they won't change this because this would break all existing Windows applications if suddenly folders are returned.
Does the run-verify example (in gpgme/tests) hang when verifying a corrupted file?
Quite frankly, if a third party application calls gpg with anything other than fingerprints to specify keys it's asking for trouble. I have changed KMail from using user IDs to using fingerprints when calling gpg more than 20 years ago.
Jan 30 2024
Jan 29 2024
Jan 25 2024
Additionally I would find it sensible to display the keys always in the order of the keyslots.
Jan 24 2024
Possible fix for testing as patch: https://invent.kde.org/frameworks/kio/-/merge_requests/1540
Kleopatra behaves as intended (by me). Only subkeys meeting the following conditions are extended together with the primary key:
- skip revoked subkeys which would anyway be ignored by gpg;
- also skip subkeys without explicit expiration because they inherit the primary key's expiration;
- include all subkeys that are not yet expired or that expired around the same time as the primary key
For existing files it does now do the same as when encrypting. Folders were already renamed automatically to avoid overwriting. This hasn't been changed.
Move back to vsd33 Backlog because the changes may have to be merged to a (future) vsd33 branch.
And it isn't a second build system for all of gpgme, but only for the C++ binding and the Qt bindings.
@werner This has been discussed by you and Andre and you gave green light as far as I know. It's not needed for private things but for providing Windows builds with MSVC for various KDE projects. This will be maintained by KDE people. Yes, we will make clear that this is a non supported way to build things.
Jan 23 2024
In D581#6137, @TobiasFella wrote:Merged. For some reason i can't close it, so I'll abandon it instead...
Changes:
- Decouple creating a backup of the (secret) key from deleting the copy of the (secret) key stored on disk.
- Improve the button texts and the messages to make it clearer that the copy stored on the computer's disk can be deleted.
- Don't ask a second time for confirmation if a backup has been created.
- If the user has created a backup of the secret key and then chosen to delete the copy on disk then don't annoy them with another request for confirmation. Even if they accidentally chose to delete the copy on disk they can restore it with the backup.
- If the user hasn't created a backup (that we know of) then we keep requesting confirmation.
Shit it!
Indeed, openSUSE has applied the patch: https://build.opensuse.org/package/show/openSUSE%3AFactory/gpg2
Jan 22 2024
Works as expected on openSUSE Tumbleweed with gpg2-2.4.3-4.2.x86_64:
$ gpg2 --version gpg (GnuPG) 2.4.3 libgcrypt 1.10.3 [...]
For the C++ binding and the Qt 5 binding we require C++ 11. The deprecated attribute was added with C++ 14.
Ship it!
Jan 19 2024
Under "X.509 Directory Services" you can add "key servers" for X.509 certificates (aka CMS certificates, vulgo S/MIME certificates). For OpenPGP only a single OpenPGP server can be entered. The suggestion is the Ubuntu key server because it is/was one of very few reliable key servers.