Looks good to me. __CLOBBER_CC is needed as PA-RISC has carry/borrow bits in status register for add/sub instructions.
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Advanced Search
Mar 1 2024
In 2.4 we have rG1383aa475 which does
Pushed the change in: rGf50c543326c2: agent: Allow simple KEYINFO command when restricted.
Apply the change in: rPTH417abd56fd7b: Fix INSERT_EXPOSE_RWLOCK_API for musl C library.
It looks like hardware problem or card reader problem.
Please test with debug-ccid-driver line in scdaemon.conf to see lower-lever (driver debug) message.
Since I don't like to introduce hppa specific workaround in a way like pragma (and I have no time to fix compiler itself), I tried to improve the ec-nist.c for hppa so that register pressure can be lower.
Here is my solution.
Feb 29 2024
Hi, I agree with Andrea's idea
The logs of the failed run contain the following:
2024-02-29 15:12:09 scdaemon[20881] DBG: enter: apdu_get_status: slot=0 hang=0 2024-02-29 15:12:09 scdaemon[20881] DBG: leave: apdu_get_status => sw=0x1000c status=0 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_7 -> S DEVINFO_STATUS removal 2024-02-29 15:12:09 scdaemon[20881] DBG: Removal of a card: 0 2024-02-29 15:12:09 scdaemon[20881] DBG: enter: apdu_close_reader: slot=0 2024-02-29 15:12:09 scdaemon[20881] DBG: enter: apdu_disconnect: slot=0 2024-02-29 15:12:09 scdaemon[20881] DBG: leave: apdu_disconnect => sw=0x0
For comparison, the logs when it doesn't fail:
2024-02-29 15:08:33 scdaemon[20536] handler for fd 13 started 2024-02-29 15:08:33 scdaemon[20536] DBG: chan_13 -> OK GNU Privacy Guard's Smartcard server ready 2024-02-29 15:08:33 scdaemon[20536] DBG: chan_13 <- SERIALNO --all 2024-02-29 15:08:33 scdaemon[20536] DBG: apdu_open_reader: BAI=60900 2024-02-29 15:08:33 scdaemon[20536] DBG: apdu_open_reader: new device=60900 2024-02-29 15:08:33 scdaemon[20536] ccid open error: skip 2024-02-29 15:08:33 scdaemon[20536] DBG: apdu_open_reader: BAI=60a00 2024-02-29 15:08:33 scdaemon[20536] DBG: apdu_open_reader: new device=60a00 2024-02-29 15:08:34 scdaemon[20536] reader slot 0: using ccid driver 2024-02-29 15:08:34 scdaemon[20536] slot 0: ATR=3bbf96008131fe5d00640411030131c073f701d00090007d 2024-02-29 15:08:34 scdaemon[20536] DBG: enter: apdu_connect: slot=0 2024-02-29 15:08:34 scdaemon[20536] DBG: leave: apdu_connect => sw=0x0 2024-02-29 15:08:36 scdaemon[20536] Detected NKS version: 3 2024-02-29 15:08:36 scdaemon[20536] DBG: apdu_open_reader: BAI=40200 2024-02-29 15:08:36 scdaemon[20536] DBG: apdu_open_reader: new device=40200 2024-02-29 15:08:36 scdaemon[20536] ccid open error: skip 2024-02-29 15:08:36 scdaemon[20536] DBG: enter: apdu_get_status: slot=0 hang=0 2024-02-29 15:08:36 scdaemon[20536] DBG: leave: apdu_get_status => sw=0x0 status=7 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_7 -> S DEVINFO_STATUS new 2024-02-29 15:08:36 scdaemon[20536] DBG: enter: apdu_get_status: slot=0 hang=0 2024-02-29 15:08:36 scdaemon[20536] DBG: leave: apdu_get_status => sw=0x0 status=7 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_7 -> S DEVINFO_START 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_7 -> S DEVICE generic 89490173300026616520 nks 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_7 -> S DEVINFO_END 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 -> S SERIALNO 89490173300026616520 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 -> OK 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 <- GETINFO all_active_apps 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 -> S SERIALNO 89490173300026616520 nks 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 -> OK 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 <- SWITCHCARD 89490173300026616520 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 -> S SERIALNO 89490173300026616520 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 -> OK 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 <- SWITCHAPP nks 2024-02-29 15:08:36 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=[none] 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 -> S SERIALNO 89490173300026616520 nks 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 -> OK 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 <- GETATTR $SIGNKEYID 2024-02-29 15:08:36 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=[none] 2024-02-29 15:08:36 scdaemon[20536] DBG: slot 0 app nks: calling getattr($SIGNKEYID) 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 -> S $SIGNKEYID NKS-NKS3.4531 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 -> OK 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 <- GETATTR $ENCRKEYID 2024-02-29 15:08:36 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=[none] 2024-02-29 15:08:36 scdaemon[20536] DBG: slot 0 app nks: calling getattr($ENCRKEYID) 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 -> S $ENCRKEYID NKS-NKS3.45B1 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 -> OK 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 <- GETATTR NKS-VERSION 2024-02-29 15:08:36 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=[none] 2024-02-29 15:08:36 scdaemon[20536] DBG: slot 0 app nks: calling getattr(NKS-VERSION) 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 -> S NKS-VERSION 3 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 -> OK 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 <- GETATTR $DISPSERIALNO 2024-02-29 15:08:36 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=[none] 2024-02-29 15:08:36 scdaemon[20536] DBG: slot 0 app nks: calling getattr($DISPSERIALNO) 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 -> S $DISPSERIALNO 8949017330002661652 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 -> OK 2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 <- GETATTR CHV-STATUS 2024-02-29 15:08:36 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=[none] 2024-02-29 15:08:36 scdaemon[20536] DBG: slot 0 app nks: calling getattr(CHV-STATUS) 2024-02-29 15:08:36 scdaemon[20536] nks: switching to SigG 2024-02-29 15:08:37 scdaemon[20536] DBG: chan_13 -> S CHV-STATUS 3+0+3+0 2024-02-29 15:08:37 scdaemon[20536] DBG: chan_13 -> OK 2024-02-29 15:08:37 scdaemon[20536] DBG: chan_13 <- LEARN --force 2024-02-29 15:08:37 scdaemon[20536] DBG: chan_13 -> S READER 04E6:E003:51271834208013:0 2024-02-29 15:08:37 scdaemon[20536] DBG: chan_13 -> S SERIALNO 89490173300026616520 2024-02-29 15:08:37 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=[none] 2024-02-29 15:08:37 scdaemon[20536] DBG: chan_13 -> S APPTYPE nks 2024-02-29 15:08:37 scdaemon[20536] DBG: chan_13 -> S APPVERSION 3 2024-02-29 15:08:37 scdaemon[20536] nks: switching to NKS 2024-02-29 15:08:38 scdaemon[20536] nks: switching to SigG 2024-02-29 15:08:39 scdaemon[20536] DBG: chan_13 -> S CHV-STATUS 3+0+3+0 2024-02-29 15:08:39 scdaemon[20536] nks: switching to NKS 2024-02-29 15:08:40 scdaemon[20536] DBG: chan_13 -> S KEYPAIRINFO 39400430E38BB96F105B740A7119FE113578B59D NKS-NKS3.4531 sa - rsa2048 2024-02-29 15:08:40 scdaemon[20536] DBG: chan_13 -> S CERTINFO 101 NKS-NKS3.C000 2024-02-29 15:08:40 scdaemon[20536] error selecting FID 0x4331: No such file or directory 2024-02-29 15:08:40 scdaemon[20536] error selecting FID 0x4332: No such file or directory 2024-02-29 15:08:40 scdaemon[20536] DBG: chan_13 -> S CERTINFO 110 NKS-NKS3.B000 2024-02-29 15:08:41 scdaemon[20536] DBG: chan_13 -> S KEYPAIRINFO 42C3CA6F9D7A725A59DDE06B16B61E88C62777C4 NKS-NKS3.45B1 e - rsa2048 2024-02-29 15:08:41 scdaemon[20536] DBG: chan_13 -> S CERTINFO 101 NKS-NKS3.C200 2024-02-29 15:08:41 scdaemon[20536] error selecting FID 0x43B1: No such file or directory 2024-02-29 15:08:41 scdaemon[20536] error selecting FID 0x43B2: No such file or directory 2024-02-29 15:08:41 scdaemon[20536] DBG: chan_13 -> S KEYPAIRINFO 20E7CB1D5299669CABF29B103C692AB34CB03528 NKS-NKS3.45B2 e - rsa1024 2024-02-29 15:08:41 scdaemon[20536] DBG: chan_13 -> S CERTINFO 101 NKS-NKS3.C201 2024-02-29 15:08:41 scdaemon[20536] nks: switching to SigG 2024-02-29 15:08:42 scdaemon[20536] DBG: chan_13 -> S KEYPAIRINFO A69B0D3796EE33E4426E5CE4B6BEEE5F1209FBA4 NKS-SIGG.4531 se - rsa2048 2024-02-29 15:08:42 scdaemon[20536] DBG: chan_13 -> S CERTINFO 101 NKS-SIGG.C000 2024-02-29 15:08:42 scdaemon[20536] data at FID 0xC008 does not look like a certificate 2024-02-29 15:08:42 scdaemon[20536] data at FID 0xC00E does not look like a certificate 2024-02-29 15:08:42 scdaemon[20536] DBG: chan_13 -> OK 2024-02-29 15:08:42 scdaemon[20536] DBG: chan_13 <- GETATTR SERIALNO 2024-02-29 15:08:42 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=[none] 2024-02-29 15:08:42 scdaemon[20536] DBG: chan_13 -> S SERIALNO 89490173300026616520 2024-02-29 15:08:42 scdaemon[20536] DBG: chan_13 -> OK 2024-02-29 15:08:42 scdaemon[20536] DBG: chan_13 <- READKEY -- NKS-NKS3.4531 2024-02-29 15:08:42 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=NKS-NKS3.4531 2024-02-29 15:08:42 scdaemon[20536] DBG: slot 0 app nks: calling readkey(NKS-NKS3.4531) 2024-02-29 15:08:42 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=NKS-NKS3.4531 2024-02-29 15:08:42 scdaemon[20536] DBG: slot 0 app nks: calling readcert(NKS-NKS3.4531) 2024-02-29 15:08:42 scdaemon[20536] nks: switching to NKS 2024-02-29 15:08:44 scdaemon[20536] DBG: chan_13 -> [ 44 20 28 31 30 3a 70 75 62 6c 69 63 2d 6b 65 79 ...(291 byte(s) skipped) ] 2024-02-29 15:08:44 scdaemon[20536] DBG: chan_13 -> OK 2024-02-29 15:08:44 scdaemon[20536] DBG: chan_13 <- GETATTR $DISPSERIALNO 39400430E38BB96F105B740A7119FE113578B59D 2024-02-29 15:08:44 scdaemon[20536] DBG: slot 0, app nks: calling with_keygrip(lookup) 2024-02-29 15:08:44 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=[none] 2024-02-29 15:08:44 scdaemon[20536] DBG: slot 0 app nks: calling getattr($DISPSERIALNO) 2024-02-29 15:08:44 scdaemon[20536] DBG: chan_13 -> S $DISPSERIALNO 8949017330002661652 2024-02-29 15:08:44 scdaemon[20536] DBG: chan_13 -> OK 2024-02-29 15:08:44 scdaemon[20536] DBG: chan_13 <- GETATTR SERIALNO 2024-02-29 15:08:44 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=[none] 2024-02-29 15:08:44 scdaemon[20536] DBG: chan_13 -> S SERIALNO 89490173300026616520 2024-02-29 15:08:44 scdaemon[20536] DBG: chan_13 -> OK 2024-02-29 15:08:44 scdaemon[20536] DBG: chan_13 <- READKEY -- NKS-NKS3.45B1 2024-02-29 15:08:44 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=NKS-NKS3.45B1 2024-02-29 15:08:44 scdaemon[20536] DBG: slot 0 app nks: calling readkey(NKS-NKS3.45B1) 2024-02-29 15:08:44 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=NKS-NKS3.45B1 2024-02-29 15:08:44 scdaemon[20536] DBG: slot 0 app nks: calling readcert(NKS-NKS3.45B1) 2024-02-29 15:08:44 scdaemon[20536] DBG: chan_13 -> [ 44 20 28 31 30 3a 70 75 62 6c 69 63 2d 6b 65 79 ...(293 byte(s) skipped) ] 2024-02-29 15:08:44 scdaemon[20536] DBG: chan_13 -> OK 2024-02-29 15:08:44 scdaemon[20536] DBG: chan_13 <- GETATTR $DISPSERIALNO 42C3CA6F9D7A725A59DDE06B16B61E88C62777C4 2024-02-29 15:08:44 scdaemon[20536] DBG: slot 0, app nks: calling with_keygrip(lookup) 2024-02-29 15:08:44 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=[none] 2024-02-29 15:08:44 scdaemon[20536] DBG: slot 0 app nks: calling getattr($DISPSERIALNO) 2024-02-29 15:08:44 scdaemon[20536] DBG: chan_13 -> S $DISPSERIALNO 8949017330002661652 2024-02-29 15:08:44 scdaemon[20536] DBG: chan_13 -> OK 2024-02-29 15:08:44 scdaemon[20536] DBG: chan_13 <- GETATTR SERIALNO 2024-02-29 15:08:44 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=[none] 2024-02-29 15:08:44 scdaemon[20536] DBG: chan_13 -> S SERIALNO 89490173300026616520 2024-02-29 15:08:44 scdaemon[20536] DBG: chan_13 -> OK 2024-02-29 15:08:44 scdaemon[20536] DBG: chan_13 <- READKEY -- NKS-NKS3.45B2 2024-02-29 15:08:44 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=NKS-NKS3.45B2 2024-02-29 15:08:44 scdaemon[20536] DBG: slot 0 app nks: calling readkey(NKS-NKS3.45B2) 2024-02-29 15:08:44 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=NKS-NKS3.45B2 2024-02-29 15:08:44 scdaemon[20536] DBG: slot 0 app nks: calling readcert(NKS-NKS3.45B2) 2024-02-29 15:08:45 scdaemon[20536] DBG: chan_13 -> [ 44 20 28 31 30 3a 70 75 62 6c 69 63 2d 6b 65 79 ...(157 byte(s) skipped) ] 2024-02-29 15:08:45 scdaemon[20536] DBG: chan_13 -> OK 2024-02-29 15:08:45 scdaemon[20536] DBG: chan_13 <- GETATTR $DISPSERIALNO 20E7CB1D5299669CABF29B103C692AB34CB03528 2024-02-29 15:08:45 scdaemon[20536] DBG: slot 0, app nks: calling with_keygrip(lookup) 2024-02-29 15:08:45 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=[none] 2024-02-29 15:08:45 scdaemon[20536] DBG: slot 0 app nks: calling getattr($DISPSERIALNO) 2024-02-29 15:08:45 scdaemon[20536] DBG: chan_13 -> S $DISPSERIALNO 8949017330002661652 2024-02-29 15:08:45 scdaemon[20536] DBG: chan_13 -> OK 2024-02-29 15:08:45 scdaemon[20536] DBG: chan_13 <- GETATTR SERIALNO 2024-02-29 15:08:45 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=[none] 2024-02-29 15:08:45 scdaemon[20536] DBG: chan_13 -> S SERIALNO 89490173300026616520 2024-02-29 15:08:45 scdaemon[20536] DBG: chan_13 -> OK 2024-02-29 15:08:45 scdaemon[20536] DBG: chan_13 <- READKEY -- NKS-SIGG.4531 2024-02-29 15:08:45 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=NKS-SIGG.4531 2024-02-29 15:08:45 scdaemon[20536] DBG: slot 0 app nks: calling readkey(NKS-SIGG.4531) 2024-02-29 15:08:45 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=NKS-SIGG.4531 2024-02-29 15:08:45 scdaemon[20536] DBG: slot 0 app nks: calling readcert(NKS-SIGG.4531) 2024-02-29 15:08:45 scdaemon[20536] nks: switching to SigG 2024-02-29 15:08:47 scdaemon[20536] DBG: chan_13 -> [ 44 20 28 31 30 3a 70 75 62 6c 69 63 2d 6b 65 79 ...(293 byte(s) skipped) ] 2024-02-29 15:08:47 scdaemon[20536] DBG: chan_13 -> OK 2024-02-29 15:08:47 scdaemon[20536] DBG: chan_13 <- GETATTR $DISPSERIALNO A69B0D3796EE33E4426E5CE4B6BEEE5F1209FBA4 2024-02-29 15:08:47 scdaemon[20536] DBG: slot 0, app nks: calling with_keygrip(lookup) 2024-02-29 15:08:47 scdaemon[20536] nks: switching to NKS 2024-02-29 15:08:48 scdaemon[20536] nks: switching to SigG 2024-02-29 15:08:49 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=[none] 2024-02-29 15:08:49 scdaemon[20536] DBG: slot 0 app nks: calling getattr($DISPSERIALNO) 2024-02-29 15:08:49 scdaemon[20536] nks: switching to NKS 2024-02-29 15:08:50 scdaemon[20536] DBG: chan_13 -> S $DISPSERIALNO 8949017330002661652 2024-02-29 15:08:50 scdaemon[20536] DBG: chan_13 -> OK 2024-02-29 15:08:50 scdaemon[20536] DBG: chan_13 <- GETINFO all_active_apps 2024-02-29 15:08:50 scdaemon[20536] DBG: chan_13 -> S SERIALNO 89490173300026616520 nks 2024-02-29 15:08:50 scdaemon[20536] DBG: chan_13 -> OK 2024-02-29 15:08:50 scdaemon[20536] DBG: chan_13 <- BYE 2024-02-29 15:08:50 scdaemon[20536] DBG: chan_13 -> OK closing connection 2024-02-29 15:08:50 scdaemon[20536] handler for fd 13 terminated
Here are logs with debug ipc,app,reader:
2024-02-29 15:12:07 scdaemon[20881] handler for fd 13 started 2024-02-29 15:12:07 scdaemon[20881] DBG: chan_13 -> OK GNU Privacy Guard's Smartcard server ready 2024-02-29 15:12:07 scdaemon[20881] DBG: chan_13 <- SERIALNO --all 2024-02-29 15:12:07 scdaemon[20881] DBG: apdu_open_reader: BAI=60900 2024-02-29 15:12:07 scdaemon[20881] DBG: apdu_open_reader: new device=60900 2024-02-29 15:12:07 scdaemon[20881] ccid open error: skip 2024-02-29 15:12:07 scdaemon[20881] DBG: apdu_open_reader: BAI=60a00 2024-02-29 15:12:07 scdaemon[20881] DBG: apdu_open_reader: new device=60a00 2024-02-29 15:12:08 scdaemon[20881] reader slot 0: using ccid driver 2024-02-29 15:12:08 scdaemon[20881] slot 0: ATR=3bbf96008131fe5d00640411030131c073f701d00090007d 2024-02-29 15:12:08 scdaemon[20881] DBG: enter: apdu_connect: slot=0 2024-02-29 15:12:08 scdaemon[20881] DBG: leave: apdu_connect => sw=0x0 2024-02-29 15:12:09 scdaemon[20881] Detected NKS version: 3 2024-02-29 15:12:09 scdaemon[20881] DBG: apdu_open_reader: BAI=40200 2024-02-29 15:12:09 scdaemon[20881] DBG: apdu_open_reader: new device=40200 2024-02-29 15:12:09 scdaemon[20881] ccid open error: skip 2024-02-29 15:12:09 scdaemon[20881] DBG: enter: apdu_get_status: slot=0 hang=0 2024-02-29 15:12:09 scdaemon[20881] DBG: leave: apdu_get_status => sw=0x0 status=7 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_7 -> S DEVINFO_STATUS new 2024-02-29 15:12:09 scdaemon[20881] DBG: enter: apdu_get_status: slot=0 hang=0 2024-02-29 15:12:09 scdaemon[20881] DBG: leave: apdu_get_status => sw=0x0 status=7 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_7 -> S DEVINFO_START 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_7 -> S DEVICE generic 89490173300026616520 nks 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_7 -> S DEVINFO_END 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> S SERIALNO 89490173300026616520 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> OK 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 <- GETINFO all_active_apps 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> S SERIALNO 89490173300026616520 nks 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> OK 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 <- SWITCHCARD 89490173300026616520 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> S SERIALNO 89490173300026616520 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> OK 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 <- SWITCHAPP nks 2024-02-29 15:12:09 scdaemon[20881] DBG: slot 0: have=nks want=nks keyref=[none] 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> S SERIALNO 89490173300026616520 nks 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> OK 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 <- GETATTR $SIGNKEYID 2024-02-29 15:12:09 scdaemon[20881] DBG: slot 0: have=nks want=nks keyref=[none] 2024-02-29 15:12:09 scdaemon[20881] DBG: slot 0 app nks: calling getattr($SIGNKEYID) 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> S $SIGNKEYID NKS-NKS3.4531 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> OK 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 <- GETATTR $ENCRKEYID 2024-02-29 15:12:09 scdaemon[20881] DBG: slot 0: have=nks want=nks keyref=[none] 2024-02-29 15:12:09 scdaemon[20881] DBG: slot 0 app nks: calling getattr($ENCRKEYID) 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> S $ENCRKEYID NKS-NKS3.45B1 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> OK 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 <- GETATTR NKS-VERSION 2024-02-29 15:12:09 scdaemon[20881] DBG: slot 0: have=nks want=nks keyref=[none] 2024-02-29 15:12:09 scdaemon[20881] DBG: slot 0 app nks: calling getattr(NKS-VERSION) 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> S NKS-VERSION 3 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> OK 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 <- GETATTR $DISPSERIALNO 2024-02-29 15:12:09 scdaemon[20881] DBG: slot 0: have=nks want=nks keyref=[none] 2024-02-29 15:12:09 scdaemon[20881] DBG: slot 0 app nks: calling getattr($DISPSERIALNO) 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> S $DISPSERIALNO 8949017330002661652 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> OK 2024-02-29 15:12:09 scdaemon[20881] DBG: enter: apdu_get_status: slot=0 hang=0 2024-02-29 15:12:09 scdaemon[20881] DBG: leave: apdu_get_status => sw=0x1000c status=0 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_7 -> S DEVINFO_STATUS removal 2024-02-29 15:12:09 scdaemon[20881] DBG: Removal of a card: 0 2024-02-29 15:12:09 scdaemon[20881] DBG: enter: apdu_close_reader: slot=0 2024-02-29 15:12:09 scdaemon[20881] DBG: enter: apdu_disconnect: slot=0 2024-02-29 15:12:09 scdaemon[20881] DBG: leave: apdu_disconnect => sw=0x0 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 <- GETATTR CHV-STATUS 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> ERR 100663406 Card removed <SCD> 2024-02-29 15:12:09 scdaemon[20881] DBG: leave: apdu_close_reader => 0x0 (close_reader) 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_7 -> S DEVINFO_START 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_7 -> S DEVINFO_END 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 <- GETINFO all_active_apps 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> ERR 100663408 Card not present <SCD> 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 <- BYE 2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> OK closing connection 2024-02-29 15:12:09 scdaemon[20881] handler for fd 13 terminated
Andre said instead of removing "more documentation" for Gpg4win, he'd like to put links to relevant documentation there, e.g. the gpg manual.
@gniibe Thank you very much! That works.
No, thank you both for the speedy responses :)
@thesamesam Thank you for the report.
Thanks a lot for your quick testing.
The commit rGff42ed0d69bb: gpg: Enhance agent_probe_secret_key to return bigger value. of GnuPG 2.2 introduced this bug.
Alternatively (more narrow workaround), when I add a line:
#pragma GCC optimize("O1")
before the function _gcry_mpi_ec_nist256_mod in mpi/ec-nist.c, it works for me on panama.debian.net (Debian porterbox for hppa).
Ah, thanks Werner, I'll keep that in mind.
This seems to have regressed musl support, per https://bugs.gentoo.org/925443.
Fixed in libksba 1.6.6.
Fixed in npth 1.7.
Feb 28 2024
No, hardware barrier is not needed here. Compiler barrier is used here to prevent optimization removing mask generation and usage in following constant-time code.
Clarification from Dave:
Thanks, I can confirm that this patch fixes the issue. I'll let Sam decide if this is how we want to handle it downstream or wait for confirmation from gcc.
Although I don't think this is the case here one should be aware that tests mail fail due to global configuration of GnuPG (/etc/gnupg/*.conf). There is no easy way so solve this except for running a per-test local installation of GnuPG using the gpgconf.ctl feature.
You can get more information by applying a patch below (and also tests/json/Makefile.in):
diff --git a/tests/json/Makefile.am b/tests/json/Makefile.am index 90fba79e..7523bb6b 100644 --- a/tests/json/Makefile.am +++ b/tests/json/Makefile.am @@ -106,6 +106,8 @@ gpg-agent.conf: # a key from a smartcard reader (error might be: Unusable secret key) echo pinentry-program $(abs_srcdir)/../gpg/pinentry > ./gpg-agent.conf echo disable-scdaemon >> ./gpg-agent.conf + echo debug-all >> ./gpg-agent.conf + echo log-file /tmp/gpg-agent-logfile.log >> ./gpg-agent.conf
T4820 is not related (it's a failure of t-keylist-secret in t-json), while this is failure of t-decrypt.
It looks like computation for NIST P-256 failed on hppa (32-bit big-endian, actually running on 64-bit machine, IIUC).
powerpc is similar (32-bit big-endian, actually running on 64-bit machine), but no failures.
Feb 27 2024
Feb 26 2024
At the failed attempt I notice a DEVINFO_STATUS removal soon after the SWITCHCARD. This is related to the reader status file and triggered by ccid_slot_status. --debug ipc.app,reader might be a better selection of debug flags here.
Feb 25 2024
Thanks for the rort
Feb 24 2024
Feb 23 2024
That could be fixed in src/argparse.c:set_opt_arg by adding and endptr to the strtol calls and check that only white space follows. However, there is some risk of regression with this approach. Maybe just display a warning?
Removing gpgrt because we meanwhile have full utf-8 support there.
With today's release of npth everything should be set.
Feb 22 2024
This is just another sympton with the same root cause. Therefore I have closed this as duplicate.
Interesting. I didn't even know that this feature exists.
Feb 21 2024
Closing due to age and because gpg4win 4 started to using the much improved GnuPG 2.4
Way to old. Does anyone still uses CAcert?
Okay, backported to 2.2.
Too similar to T7004 I have disabled this user.
Got this from my card vendor. Sonoma had a buggy CCID driver; compile one yourself and the bug's gone: https://forums.developer.apple.com/forums/thread/732091?answerId=768462022#768462022
Feb 20 2024
@jmrexach I think I undestand now @TobiasFella can you have a look please?
Hi,
please use English in this tracker. At least using an online translation service.
gpg --list-packets shows this:
Hi,
To reproduce this just change an item in the filter list: The contents of the window changes but NOT the name (title) of the window (only in the leftmost tab).
I cannot reproduce this. If I right click the tab I can rename it just like every other tab. The tabs do not change their names based on the current filter that is used that is only their default name. And the default for the first Tab is "All Certificates"
Yes, basically these actions check if the underlying document is there and if not they make themself invisible. But then they should not be in the menu in the first place. But I believe the impact of this is rather low.
This seems to depend on the Platform theme. Under Windows I get the same results as you on linux It works fine with me
since we are currently in the process of upgrading our UI Framework we will need to recheck this. To avoid too many duplicates in the tracker I will merge this ticket into our general "revisit dark mode" task T6076: Kleopatra: Many icons are hard to see if the dark high-contrast mode is activatedIn T6977#183049, @Karam wrote:Uploaded the corrupted file.
Uploaded the corrupted file.
It seems to pass for me with gnupg-2.2.41 but fails with gnupg-2.2.42?
Feb 19 2024
Feb 16 2024
Can you make this corrupted file available to us?
Hello,
So after testing on gpgme-1.17.1, with run-verify under tests as you mentioned, with corrupted file it hangs forever.
Now we can say it's a bug in gpgme_op_verify.
I was wrong for the semantics of proxy->outtoken. It is zero when run_proxy_connect is called and enabled during the negotiation.
@hlein Thanks a lot for quick testing.
Thank you @gniibe! Applied the rG848546b05ab0: dirmngr: Fix the regression of use of proxy for TLS connection. changes here, and 2.4.4 works here now.
IIUC, the code for keep_alive is for negotiation of proxy. If so, something like this is the fix:
Right. I was wrong assuming the code in 2.2 branch is stable (that is: well tested).
Feb 15 2024
Per https://dev.gnupg.org/rG04cbc3074aa98660b513a80f623a7e9f0702c7c9#83517, it looks like the fix might be incomplete?