Page MenuHome GnuPG
Feed Advanced Search

Mar 24 2024

werner edited projects for T7056: GPGme 1.23.2 has Undefined symbols: "strcasecmp(char const*, char const*)" on Mac OS X 10.4.11, PPC Tiger, added: gpgme; removed gpgme (gpgme 1.23.x).
Mar 24 2024, 7:10 PM · gpgme, MacOS, Bug Report
ballapete added projects to T7056: GPGme 1.23.2 has Undefined symbols: "strcasecmp(char const*, char const*)" on Mac OS X 10.4.11, PPC Tiger: gpgme (gpgme 1.23.x), MacOS.
Mar 24 2024, 8:38 AM · gpgme, MacOS, Bug Report

Mar 23 2024

ballapete created T7056: GPGme 1.23.2 has Undefined symbols: "strcasecmp(char const*, char const*)" on Mac OS X 10.4.11, PPC Tiger.
Mar 23 2024, 7:03 PM · gpgme, MacOS, Bug Report
werner edited projects for T7053: If there are more than one S/MIME Keys you can select the key for encription, but not the key used for signing, added: vsd, kleopatra, Restricted Project; removed gpg4win.
Mar 23 2024, 1:30 PM · Support
werner closed T7003: 2.2 gpg-agent doesn't allow KEYINFO when restricted (was: gpgme-1.23.2 test failure (t-json)) as Resolved.
Mar 23 2024, 1:29 PM · gnupg22 (gnupg-2.2.43), gpgagent, gpgme, Gentoo, Bug Report
thesamesam added a comment to T7003: 2.2 gpg-agent doesn't allow KEYINFO when restricted (was: gpgme-1.23.2 test failure (t-json)).

Thanks, that patch works for me.

Mar 23 2024, 12:24 PM · gnupg22 (gnupg-2.2.43), gpgagent, gpgme, Gentoo, Bug Report

Mar 22 2024

tps800 created T7053: If there are more than one S/MIME Keys you can select the key for encription, but not the key used for signing.
Mar 22 2024, 1:52 PM · Support
tps800 created T7052: Kleopatra does not show key length in GnuPG-VS-Desktop.
Mar 22 2024, 1:46 PM · Bug Report, gpg4win

Mar 21 2024

werner added a comment to T7047: GnuPG release target authenticode signs files double.

And we should also use timestamps for each signed file so that we don't need to re-sign all of them over and over during build process tweaking.

Mar 21 2024, 5:52 PM · Bug Report, gnupg
TobiasFella claimed T7039: Kleopatra: Configuration dialog doesn't work.
Mar 21 2024, 10:57 AM · KF6, kleopatra, Restricted Project, Bug Report
TobiasFella moved T7039: Kleopatra: Configuration dialog doesn't work from Restricted Project Column to Restricted Project Column on the Restricted Project board.
Mar 21 2024, 10:57 AM · KF6, kleopatra, Restricted Project, Bug Report
TobiasFella changed the status of T7039: Kleopatra: Configuration dialog doesn't work from Open to Testing.
Mar 21 2024, 10:56 AM · KF6, kleopatra, Restricted Project, Bug Report
ikloecker changed the status of T7048: Kleopatra: Config dialog doesn't load "Treat .p7m files without extensions as mails" option from Open to Testing.

Fixed in master.

Mar 21 2024, 8:54 AM · vsd33 (vsd-3.3.0), Restricted Project, kleopatra, Bug Report

Mar 20 2024

ikloecker claimed T7048: Kleopatra: Config dialog doesn't load "Treat .p7m files without extensions as mails" option.
Mar 20 2024, 2:14 PM · vsd33 (vsd-3.3.0), Restricted Project, kleopatra, Bug Report
ikloecker created T7048: Kleopatra: Config dialog doesn't load "Treat .p7m files without extensions as mails" option.
Mar 20 2024, 2:14 PM · vsd33 (vsd-3.3.0), Restricted Project, kleopatra, Bug Report

Mar 19 2024

werner added a comment to T7044: Deadlock on Windows in sdaemon.

The reset was due to running gpg-connect-agent reset /bye. I am currently testing something elese will get back as soon as I can turn back to 2.4

Mar 19 2024, 10:22 AM · scd, Bug Report, Windows, gnupg24
werner closed T7042: AEAD mode does not properly handle modified cipher text as Resolved.

Note that this has also been ported to 2.4 and 2.2 and tested by looking at the status lines.

Mar 19 2024, 10:14 AM · gnupg26, Bug Report
gniibe added a comment to T7044: Deadlock on Windows in sdaemon.

There are two locks here; (1) rw_lock for card_top (list of cards) access and (2) individual card lock.
It looks for me that:

  • don't know how/what the thread 7208.2 does
  • the thread 7208.3: KEYINFO, then PKSIGN (gets read lock for card_top, then, individual card lock)
  • the thread 7208.4: SERIALNO --all (and wait for write lock for card_top)
Mar 19 2024, 7:33 AM · scd, Bug Report, Windows, gnupg24

Mar 18 2024

werner moved T7003: 2.2 gpg-agent doesn't allow KEYINFO when restricted (was: gpgme-1.23.2 test failure (t-json)) from Backlog to QA on the gnupg22 board.
Mar 18 2024, 4:24 PM · gnupg22 (gnupg-2.2.43), gpgagent, gpgme, Gentoo, Bug Report
werner moved T6997: gnupg-2.4.4 breaks dirmngr fetching keys via hkps:// from behind a proxy from WiP to QA on the gnupg22 board.
Mar 18 2024, 4:22 PM · gnupg22 (gnupg-2.2.43), gnupg24 (gnupg-2.4.5), Bug Report
werner moved T6811: gpgv: Read-only trustedkeys.kbx should not be compressed from WiP to QA on the gnupg22 board.
Mar 18 2024, 4:22 PM · gnupg24 (gnupg-2.4.5), gpgv, Bug Report
werner moved T7025: --trusted-key and --no-options mismatch from WiP to QA on the gnupg22 board.
Mar 18 2024, 4:22 PM · gnupg22 (gnupg-2.2.45), gnupg24 (gnupg-2.4.5), Bug Report
werner created T7047: GnuPG release target authenticode signs files double.
Mar 18 2024, 3:20 PM · Bug Report, gnupg
werner triaged T7044: Deadlock on Windows in sdaemon as High priority.
Mar 18 2024, 8:48 AM · scd, Bug Report, Windows, gnupg24

Mar 14 2024

werner changed the status of T7042: AEAD mode does not properly handle modified cipher text from Open to Testing.
Mar 14 2024, 9:55 PM · gnupg26, Bug Report
werner triaged T7042: AEAD mode does not properly handle modified cipher text as High priority.
Mar 14 2024, 9:48 PM · gnupg26, Bug Report
werner added a project to T7042: AEAD mode does not properly handle modified cipher text: gnupg26.

Thanks for reporting this. Returning error codes to upper layers is not always easy because the original logic is that we have a global error counter to decide whether an operation succeeded. My fix to check the error code before emitting the DECRYPTION_OKAY status,

Mar 14 2024, 9:48 PM · gnupg26, Bug Report

Mar 13 2024

marcus added a comment to T7042: AEAD mode does not properly handle modified cipher text.

handle_plaintext gets data returned by iobuf_read, and does not check the error status of the iobuf object.

Mar 13 2024, 5:07 PM · gnupg26, Bug Report
TobiasFella claimed T7006: Problems in ToolBar.
Mar 13 2024, 4:21 PM · kleopatra, Bug Report, gpg4win
marcus created T7042: AEAD mode does not properly handle modified cipher text.
Mar 13 2024, 3:47 PM · gnupg26, Bug Report
werner added a project to T7039: Kleopatra: Configuration dialog doesn't work: KF6.
Mar 13 2024, 9:35 AM · KF6, kleopatra, Restricted Project, Bug Report
werner added a comment to T7041: Yubikey (PGP + PIV) --pcsc-shared: PIN requires every time.

But only if you can figure out in a transaction or locked sytate whether the card needs a verify. Otherwise we have a race between changing the PIN and verifying a PIN.

Mar 13 2024, 9:25 AM · gnupg26, yubikey, scd, Bug Report
gniibe claimed T7041: Yubikey (PGP + PIV) --pcsc-shared: PIN requires every time.

This rejection could be relaxed.

Mar 13 2024, 8:00 AM · gnupg26, yubikey, scd, Bug Report
gniibe created T7041: Yubikey (PGP + PIV) --pcsc-shared: PIN requires every time.
Mar 13 2024, 7:59 AM · gnupg26, yubikey, scd, Bug Report

Mar 12 2024

TobiasFella changed the status of T6447: Kleopatra: "imported certificates" tab inconsistencies from Open to Testing.
Mar 12 2024, 5:20 PM · vsd33 (vsd-3.3.0), Restricted Project, Bug Report, kleopatra
TobiasFella claimed T6447: Kleopatra: "imported certificates" tab inconsistencies.
Mar 12 2024, 1:09 PM · vsd33 (vsd-3.3.0), Restricted Project, Bug Report, kleopatra
aheinecke triaged T7039: Kleopatra: Configuration dialog doesn't work as High priority.

needs to be fixed soon. But we don't have a tag for Gpg4win 5 or whatever we call a kf6 based gpg4win.

Mar 12 2024, 9:14 AM · KF6, kleopatra, Restricted Project, Bug Report

Mar 11 2024

ikloecker created T7039: Kleopatra: Configuration dialog doesn't work.
Mar 11 2024, 5:03 PM · KF6, kleopatra, Restricted Project, Bug Report
TobiasFella changed the status of T7002: Tab text not changing when using filters from Open to Testing.
Mar 11 2024, 2:28 PM · vsd33 (vsd-3.3.0), Restricted Project, kleopatra, Bug Report, gpg4win
werner closed T7038: gpg --recv-key return code is 0 as Wontfix.

It could have been discussed whether this makes sense. However, we can't change it anymore because it would change the behaviour. Consider a cron job which looks into a directory with keyids and imports them from a keyserver. It is totally fine if the script returns success if no keys are available.

Mar 11 2024, 1:03 PM · Not A Bug, gnupg, Bug Report
larkvirtual created T7038: gpg --recv-key return code is 0.
Mar 11 2024, 11:59 AM · Not A Bug, gnupg, Bug Report
gniibe claimed T7035: libgcrypt: New function gcry_md_hash_buffers_ext (for extendable-output function).
Mar 11 2024, 3:28 AM · libgcrypt, Feature Request, Bug Report
gniibe created T7035: libgcrypt: New function gcry_md_hash_buffers_ext (for extendable-output function).
Mar 11 2024, 3:28 AM · libgcrypt, Feature Request, Bug Report

Mar 10 2024

leoarod added a comment to T7034: I can't recover my password..

There is no way to recover it?

Mar 10 2024, 3:06 PM · Support, Bug Report, gpg4win
werner closed T7033: I can't recover my password. as Invalid.

See T7034

Mar 10 2024, 1:02 PM · kleopatra, Bug Report
werner closed T7034: I can't recover my password. as Invalid.

Sorry, this is not a help line but a bug tracker. If you lost or forgot your password you are screwed up.

Mar 10 2024, 1:02 PM · Support, Bug Report, gpg4win

Mar 9 2024

leoarod created T7034: I can't recover my password..
Mar 9 2024, 4:48 PM · Support, Bug Report, gpg4win
leoarod created T7033: I can't recover my password..
Mar 9 2024, 4:38 PM · kleopatra, Bug Report

Mar 8 2024

dkg added a comment to T5110: Primary Key Binding Signature not updated when updating Subkey Binding Signature.

I have also not found a straightforward way to correct a cross-signature that was made with a weak digest algorithm using GnuPG.

Mar 8 2024, 8:29 PM · gnupg, Bug Report

Mar 7 2024

werner moved T6997: gnupg-2.4.4 breaks dirmngr fetching keys via hkps:// from behind a proxy from QA to gnupg-2.4.5 on the gnupg24 board.
Mar 7 2024, 3:26 PM · gnupg22 (gnupg-2.2.43), gnupg24 (gnupg-2.4.5), Bug Report
werner moved T6811: gpgv: Read-only trustedkeys.kbx should not be compressed from QA to gnupg-2.4.5 on the gnupg24 board.
Mar 7 2024, 3:26 PM · gnupg24 (gnupg-2.4.5), gpgv, Bug Report
werner moved T6425: improve pinentry behavior and texts in smart card context from WiP to gnupg-2.4.5 on the gnupg24 board.
Mar 7 2024, 3:25 PM · gnupg24 (gnupg-2.4.5), scd, Bug Report, Restricted Project
werner moved T7000: Take derive usage into account for pkcs#15 cards. from WiP to gnupg-2.4.5 on the gnupg24 board.
Mar 7 2024, 3:24 PM · gnupg24 (gnupg-2.4.5), Bug Report, scd
werner moved T7025: --trusted-key and --no-options mismatch from WiP to gnupg-2.4.5 on the gnupg24 board.
Mar 7 2024, 3:24 PM · gnupg22 (gnupg-2.2.45), gnupg24 (gnupg-2.4.5), Bug Report

Mar 6 2024

lecris added a comment to T6757: gpgsm 2.4 Fails to import P12 certificate/key.

I've sent you an email about it. It might have html elements due to markdown-here.

Mar 6 2024, 5:02 PM · gnupg24 (gnupg-2.4.4), S/MIME, Bug Report
werner moved T6961: On Windows the gpgtar --status-fd 2 does not show the gpg status lines from done to gnupg-2.4.5 on the gnupg24 board.
Mar 6 2024, 12:24 PM · gnupg24 (gnupg-2.4.5), Bug Report
werner added a comment to T6757: gpgsm 2.4 Fails to import P12 certificate/key.

Sorry, for not following up earlier. Can you please do me a favor and run the last tests again, this time adding -v and --debug 1 to the invocation? Feel free to forward the output to my private address is that is easier (wk at gnupg.org).

Mar 6 2024, 12:19 PM · gnupg24 (gnupg-2.4.4), S/MIME, Bug Report
werner changed the status of T7000: Take derive usage into account for pkcs#15 cards. from Open to Testing.
Mar 6 2024, 11:47 AM · gnupg24 (gnupg-2.4.5), Bug Report, scd

Mar 4 2024

werner added a comment to T6944: The default card key generation keeps an unprotected backup of the encryption key on disk.

See also: https://gnupg.org/blog/20240125-smartcard-backup-key.html

Mar 4 2024, 3:38 PM · gnupg22 (gnupg-2.2.43), gnupg24 (gnupg-2.4.4), OpenPGP, scd, Bug Report
werner moved T7025: --trusted-key and --no-options mismatch from Backlog to WiP on the gnupg22 board.
Mar 4 2024, 3:24 PM · gnupg22 (gnupg-2.2.45), gnupg24 (gnupg-2.4.5), Bug Report
werner changed the status of T7025: --trusted-key and --no-options mismatch from Open to Testing.
Mar 4 2024, 3:24 PM · gnupg22 (gnupg-2.2.45), gnupg24 (gnupg-2.4.5), Bug Report
werner moved T7025: --trusted-key and --no-options mismatch from Backlog to WiP on the gnupg24 board.

How to test:

Mar 4 2024, 3:11 PM · gnupg22 (gnupg-2.2.45), gnupg24 (gnupg-2.4.5), Bug Report
werner triaged T7025: --trusted-key and --no-options mismatch as Normal priority.
Mar 4 2024, 1:45 PM · gnupg22 (gnupg-2.2.45), gnupg24 (gnupg-2.4.5), Bug Report
thesamesam added a comment to T7022: libgcrypt-1.10.3 regression on hppa.

Thank you!

Mar 4 2024, 3:46 AM · libgcrypt, Gentoo, hppa, Bug Report
gniibe added a comment to T7022: libgcrypt-1.10.3 regression on hppa.

Applied to both (master and 1.10 branch).

Mar 4 2024, 1:11 AM · libgcrypt, Gentoo, hppa, Bug Report

Mar 1 2024

jukivili added a comment to T7022: libgcrypt-1.10.3 regression on hppa.

Looks good to me. __CLOBBER_CC is needed as PA-RISC has carry/borrow bits in status register for add/sub instructions.

Mar 1 2024, 8:02 PM · libgcrypt, Gentoo, hppa, Bug Report
werner added a comment to T7003: 2.2 gpg-agent doesn't allow KEYINFO when restricted (was: gpgme-1.23.2 test failure (t-json)).

In 2.4 we have rG1383aa475 which does

Mar 1 2024, 11:32 AM · gnupg22 (gnupg-2.2.43), gpgagent, gpgme, Gentoo, Bug Report
gniibe changed the status of T7003: 2.2 gpg-agent doesn't allow KEYINFO when restricted (was: gpgme-1.23.2 test failure (t-json)) from Open to Testing.
Mar 1 2024, 6:09 AM · gnupg22 (gnupg-2.2.43), gpgagent, gpgme, Gentoo, Bug Report
gniibe added a comment to T7003: 2.2 gpg-agent doesn't allow KEYINFO when restricted (was: gpgme-1.23.2 test failure (t-json)).

Pushed the change in: rGf50c543326c2: agent: Allow simple KEYINFO command when restricted.

Mar 1 2024, 6:08 AM · gnupg22 (gnupg-2.2.43), gpgagent, gpgme, Gentoo, Bug Report
gniibe changed the status of T5664: npth-1.6: error: unknown type name ‘pthread_rwlock_t’ from Open to Testing.

Apply the change in: rPTH417abd56fd7b: Fix INSERT_EXPOSE_RWLOCK_API for musl C library.

Mar 1 2024, 5:58 AM · npth, Bug Report
gniibe claimed T7016: scdaemon: Sometimes a newly detected card is immediately considered removed.

It looks like hardware problem or card reader problem.
Please test with debug-ccid-driver line in scdaemon.conf to see lower-lever (driver debug) message.

Mar 1 2024, 5:10 AM · scd, Restricted Project, Bug Report
gniibe changed the status of T7022: libgcrypt-1.10.3 regression on hppa from Open to Testing.

Since I don't like to introduce hppa specific workaround in a way like pragma (and I have no time to fix compiler itself), I tried to improve the ec-nist.c for hppa so that register pressure can be lower.
Here is my solution.

Mar 1 2024, 2:34 AM · libgcrypt, Gentoo, hppa, Bug Report

Feb 29 2024

Denisov23 added a comment to T7013: More documentation, Nothing appears.

Hi, I agree with Andrea's idea

Feb 29 2024, 6:39 PM · Restricted Project, Bug Report
ikloecker added a comment to T7016: scdaemon: Sometimes a newly detected card is immediately considered removed.

The logs of the failed run contain the following:

2024-02-29 15:12:09 scdaemon[20881] DBG: enter: apdu_get_status: slot=0 hang=0
2024-02-29 15:12:09 scdaemon[20881] DBG: leave: apdu_get_status => sw=0x1000c status=0
2024-02-29 15:12:09 scdaemon[20881] DBG: chan_7 -> S DEVINFO_STATUS removal
2024-02-29 15:12:09 scdaemon[20881] DBG: Removal of a card: 0
2024-02-29 15:12:09 scdaemon[20881] DBG: enter: apdu_close_reader: slot=0
2024-02-29 15:12:09 scdaemon[20881] DBG: enter: apdu_disconnect: slot=0
2024-02-29 15:12:09 scdaemon[20881] DBG: leave: apdu_disconnect => sw=0x0
Feb 29 2024, 3:28 PM · scd, Restricted Project, Bug Report
ikloecker added a comment to T7016: scdaemon: Sometimes a newly detected card is immediately considered removed.

For comparison, the logs when it doesn't fail:

2024-02-29 15:08:33 scdaemon[20536] handler for fd 13 started
2024-02-29 15:08:33 scdaemon[20536] DBG: chan_13 -> OK GNU Privacy Guard's Smartcard server ready
2024-02-29 15:08:33 scdaemon[20536] DBG: chan_13 <- SERIALNO --all
2024-02-29 15:08:33 scdaemon[20536] DBG: apdu_open_reader: BAI=60900
2024-02-29 15:08:33 scdaemon[20536] DBG: apdu_open_reader: new device=60900
2024-02-29 15:08:33 scdaemon[20536] ccid open error: skip
2024-02-29 15:08:33 scdaemon[20536] DBG: apdu_open_reader: BAI=60a00
2024-02-29 15:08:33 scdaemon[20536] DBG: apdu_open_reader: new device=60a00
2024-02-29 15:08:34 scdaemon[20536] reader slot 0: using ccid driver
2024-02-29 15:08:34 scdaemon[20536] slot 0: ATR=3bbf96008131fe5d00640411030131c073f701d00090007d
2024-02-29 15:08:34 scdaemon[20536] DBG: enter: apdu_connect: slot=0
2024-02-29 15:08:34 scdaemon[20536] DBG: leave: apdu_connect => sw=0x0
2024-02-29 15:08:36 scdaemon[20536] Detected NKS version: 3
2024-02-29 15:08:36 scdaemon[20536] DBG: apdu_open_reader: BAI=40200
2024-02-29 15:08:36 scdaemon[20536] DBG: apdu_open_reader: new device=40200
2024-02-29 15:08:36 scdaemon[20536] ccid open error: skip
2024-02-29 15:08:36 scdaemon[20536] DBG: enter: apdu_get_status: slot=0 hang=0
2024-02-29 15:08:36 scdaemon[20536] DBG: leave: apdu_get_status => sw=0x0 status=7
2024-02-29 15:08:36 scdaemon[20536] DBG: chan_7 -> S DEVINFO_STATUS new
2024-02-29 15:08:36 scdaemon[20536] DBG: enter: apdu_get_status: slot=0 hang=0
2024-02-29 15:08:36 scdaemon[20536] DBG: leave: apdu_get_status => sw=0x0 status=7
2024-02-29 15:08:36 scdaemon[20536] DBG: chan_7 -> S DEVINFO_START
2024-02-29 15:08:36 scdaemon[20536] DBG: chan_7 -> S DEVICE generic 89490173300026616520 nks
2024-02-29 15:08:36 scdaemon[20536] DBG: chan_7 -> S DEVINFO_END
2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 -> S SERIALNO 89490173300026616520
2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 -> OK
2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 <- GETINFO all_active_apps
2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 -> S SERIALNO 89490173300026616520 nks
2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 -> OK
2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 <- SWITCHCARD 89490173300026616520
2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 -> S SERIALNO 89490173300026616520
2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 -> OK
2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 <- SWITCHAPP nks
2024-02-29 15:08:36 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=[none]
2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 -> S SERIALNO 89490173300026616520 nks
2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 -> OK
2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 <- GETATTR $SIGNKEYID
2024-02-29 15:08:36 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=[none]
2024-02-29 15:08:36 scdaemon[20536] DBG: slot 0 app nks: calling getattr($SIGNKEYID)
2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 -> S $SIGNKEYID NKS-NKS3.4531
2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 -> OK
2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 <- GETATTR $ENCRKEYID
2024-02-29 15:08:36 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=[none]
2024-02-29 15:08:36 scdaemon[20536] DBG: slot 0 app nks: calling getattr($ENCRKEYID)
2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 -> S $ENCRKEYID NKS-NKS3.45B1
2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 -> OK
2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 <- GETATTR NKS-VERSION
2024-02-29 15:08:36 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=[none]
2024-02-29 15:08:36 scdaemon[20536] DBG: slot 0 app nks: calling getattr(NKS-VERSION)
2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 -> S NKS-VERSION 3
2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 -> OK
2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 <- GETATTR $DISPSERIALNO
2024-02-29 15:08:36 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=[none]
2024-02-29 15:08:36 scdaemon[20536] DBG: slot 0 app nks: calling getattr($DISPSERIALNO)
2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 -> S $DISPSERIALNO 8949017330002661652
2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 -> OK
2024-02-29 15:08:36 scdaemon[20536] DBG: chan_13 <- GETATTR CHV-STATUS
2024-02-29 15:08:36 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=[none]
2024-02-29 15:08:36 scdaemon[20536] DBG: slot 0 app nks: calling getattr(CHV-STATUS)
2024-02-29 15:08:36 scdaemon[20536] nks: switching to SigG
2024-02-29 15:08:37 scdaemon[20536] DBG: chan_13 -> S CHV-STATUS 3+0+3+0
2024-02-29 15:08:37 scdaemon[20536] DBG: chan_13 -> OK
2024-02-29 15:08:37 scdaemon[20536] DBG: chan_13 <- LEARN --force
2024-02-29 15:08:37 scdaemon[20536] DBG: chan_13 -> S READER 04E6:E003:51271834208013:0
2024-02-29 15:08:37 scdaemon[20536] DBG: chan_13 -> S SERIALNO 89490173300026616520
2024-02-29 15:08:37 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=[none]
2024-02-29 15:08:37 scdaemon[20536] DBG: chan_13 -> S APPTYPE nks
2024-02-29 15:08:37 scdaemon[20536] DBG: chan_13 -> S APPVERSION 3
2024-02-29 15:08:37 scdaemon[20536] nks: switching to NKS
2024-02-29 15:08:38 scdaemon[20536] nks: switching to SigG
2024-02-29 15:08:39 scdaemon[20536] DBG: chan_13 -> S CHV-STATUS 3+0+3+0
2024-02-29 15:08:39 scdaemon[20536] nks: switching to NKS
2024-02-29 15:08:40 scdaemon[20536] DBG: chan_13 -> S KEYPAIRINFO 39400430E38BB96F105B740A7119FE113578B59D NKS-NKS3.4531 sa - rsa2048
2024-02-29 15:08:40 scdaemon[20536] DBG: chan_13 -> S CERTINFO 101 NKS-NKS3.C000
2024-02-29 15:08:40 scdaemon[20536] error selecting FID 0x4331: No such file or directory
2024-02-29 15:08:40 scdaemon[20536] error selecting FID 0x4332: No such file or directory
2024-02-29 15:08:40 scdaemon[20536] DBG: chan_13 -> S CERTINFO 110 NKS-NKS3.B000
2024-02-29 15:08:41 scdaemon[20536] DBG: chan_13 -> S KEYPAIRINFO 42C3CA6F9D7A725A59DDE06B16B61E88C62777C4 NKS-NKS3.45B1 e - rsa2048
2024-02-29 15:08:41 scdaemon[20536] DBG: chan_13 -> S CERTINFO 101 NKS-NKS3.C200
2024-02-29 15:08:41 scdaemon[20536] error selecting FID 0x43B1: No such file or directory
2024-02-29 15:08:41 scdaemon[20536] error selecting FID 0x43B2: No such file or directory
2024-02-29 15:08:41 scdaemon[20536] DBG: chan_13 -> S KEYPAIRINFO 20E7CB1D5299669CABF29B103C692AB34CB03528 NKS-NKS3.45B2 e - rsa1024
2024-02-29 15:08:41 scdaemon[20536] DBG: chan_13 -> S CERTINFO 101 NKS-NKS3.C201
2024-02-29 15:08:41 scdaemon[20536] nks: switching to SigG
2024-02-29 15:08:42 scdaemon[20536] DBG: chan_13 -> S KEYPAIRINFO A69B0D3796EE33E4426E5CE4B6BEEE5F1209FBA4 NKS-SIGG.4531 se - rsa2048
2024-02-29 15:08:42 scdaemon[20536] DBG: chan_13 -> S CERTINFO 101 NKS-SIGG.C000
2024-02-29 15:08:42 scdaemon[20536] data at FID 0xC008 does not look like a certificate
2024-02-29 15:08:42 scdaemon[20536] data at FID 0xC00E does not look like a certificate
2024-02-29 15:08:42 scdaemon[20536] DBG: chan_13 -> OK
2024-02-29 15:08:42 scdaemon[20536] DBG: chan_13 <- GETATTR SERIALNO
2024-02-29 15:08:42 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=[none]
2024-02-29 15:08:42 scdaemon[20536] DBG: chan_13 -> S SERIALNO 89490173300026616520
2024-02-29 15:08:42 scdaemon[20536] DBG: chan_13 -> OK
2024-02-29 15:08:42 scdaemon[20536] DBG: chan_13 <- READKEY -- NKS-NKS3.4531
2024-02-29 15:08:42 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=NKS-NKS3.4531
2024-02-29 15:08:42 scdaemon[20536] DBG: slot 0 app nks: calling readkey(NKS-NKS3.4531)
2024-02-29 15:08:42 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=NKS-NKS3.4531
2024-02-29 15:08:42 scdaemon[20536] DBG: slot 0 app nks: calling readcert(NKS-NKS3.4531)
2024-02-29 15:08:42 scdaemon[20536] nks: switching to NKS
2024-02-29 15:08:44 scdaemon[20536] DBG: chan_13 -> [ 44 20 28 31 30 3a 70 75 62 6c 69 63 2d 6b 65 79 ...(291 byte(s) skipped) ]
2024-02-29 15:08:44 scdaemon[20536] DBG: chan_13 -> OK
2024-02-29 15:08:44 scdaemon[20536] DBG: chan_13 <- GETATTR $DISPSERIALNO 39400430E38BB96F105B740A7119FE113578B59D
2024-02-29 15:08:44 scdaemon[20536] DBG: slot 0, app nks: calling with_keygrip(lookup)
2024-02-29 15:08:44 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=[none]
2024-02-29 15:08:44 scdaemon[20536] DBG: slot 0 app nks: calling getattr($DISPSERIALNO)
2024-02-29 15:08:44 scdaemon[20536] DBG: chan_13 -> S $DISPSERIALNO 8949017330002661652
2024-02-29 15:08:44 scdaemon[20536] DBG: chan_13 -> OK
2024-02-29 15:08:44 scdaemon[20536] DBG: chan_13 <- GETATTR SERIALNO
2024-02-29 15:08:44 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=[none]
2024-02-29 15:08:44 scdaemon[20536] DBG: chan_13 -> S SERIALNO 89490173300026616520
2024-02-29 15:08:44 scdaemon[20536] DBG: chan_13 -> OK
2024-02-29 15:08:44 scdaemon[20536] DBG: chan_13 <- READKEY -- NKS-NKS3.45B1
2024-02-29 15:08:44 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=NKS-NKS3.45B1
2024-02-29 15:08:44 scdaemon[20536] DBG: slot 0 app nks: calling readkey(NKS-NKS3.45B1)
2024-02-29 15:08:44 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=NKS-NKS3.45B1
2024-02-29 15:08:44 scdaemon[20536] DBG: slot 0 app nks: calling readcert(NKS-NKS3.45B1)
2024-02-29 15:08:44 scdaemon[20536] DBG: chan_13 -> [ 44 20 28 31 30 3a 70 75 62 6c 69 63 2d 6b 65 79 ...(293 byte(s) skipped) ]
2024-02-29 15:08:44 scdaemon[20536] DBG: chan_13 -> OK
2024-02-29 15:08:44 scdaemon[20536] DBG: chan_13 <- GETATTR $DISPSERIALNO 42C3CA6F9D7A725A59DDE06B16B61E88C62777C4
2024-02-29 15:08:44 scdaemon[20536] DBG: slot 0, app nks: calling with_keygrip(lookup)
2024-02-29 15:08:44 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=[none]
2024-02-29 15:08:44 scdaemon[20536] DBG: slot 0 app nks: calling getattr($DISPSERIALNO)
2024-02-29 15:08:44 scdaemon[20536] DBG: chan_13 -> S $DISPSERIALNO 8949017330002661652
2024-02-29 15:08:44 scdaemon[20536] DBG: chan_13 -> OK
2024-02-29 15:08:44 scdaemon[20536] DBG: chan_13 <- GETATTR SERIALNO
2024-02-29 15:08:44 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=[none]
2024-02-29 15:08:44 scdaemon[20536] DBG: chan_13 -> S SERIALNO 89490173300026616520
2024-02-29 15:08:44 scdaemon[20536] DBG: chan_13 -> OK
2024-02-29 15:08:44 scdaemon[20536] DBG: chan_13 <- READKEY -- NKS-NKS3.45B2
2024-02-29 15:08:44 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=NKS-NKS3.45B2
2024-02-29 15:08:44 scdaemon[20536] DBG: slot 0 app nks: calling readkey(NKS-NKS3.45B2)
2024-02-29 15:08:44 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=NKS-NKS3.45B2
2024-02-29 15:08:44 scdaemon[20536] DBG: slot 0 app nks: calling readcert(NKS-NKS3.45B2)
2024-02-29 15:08:45 scdaemon[20536] DBG: chan_13 -> [ 44 20 28 31 30 3a 70 75 62 6c 69 63 2d 6b 65 79 ...(157 byte(s) skipped) ]
2024-02-29 15:08:45 scdaemon[20536] DBG: chan_13 -> OK
2024-02-29 15:08:45 scdaemon[20536] DBG: chan_13 <- GETATTR $DISPSERIALNO 20E7CB1D5299669CABF29B103C692AB34CB03528
2024-02-29 15:08:45 scdaemon[20536] DBG: slot 0, app nks: calling with_keygrip(lookup)
2024-02-29 15:08:45 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=[none]
2024-02-29 15:08:45 scdaemon[20536] DBG: slot 0 app nks: calling getattr($DISPSERIALNO)
2024-02-29 15:08:45 scdaemon[20536] DBG: chan_13 -> S $DISPSERIALNO 8949017330002661652
2024-02-29 15:08:45 scdaemon[20536] DBG: chan_13 -> OK
2024-02-29 15:08:45 scdaemon[20536] DBG: chan_13 <- GETATTR SERIALNO
2024-02-29 15:08:45 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=[none]
2024-02-29 15:08:45 scdaemon[20536] DBG: chan_13 -> S SERIALNO 89490173300026616520
2024-02-29 15:08:45 scdaemon[20536] DBG: chan_13 -> OK
2024-02-29 15:08:45 scdaemon[20536] DBG: chan_13 <- READKEY -- NKS-SIGG.4531
2024-02-29 15:08:45 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=NKS-SIGG.4531
2024-02-29 15:08:45 scdaemon[20536] DBG: slot 0 app nks: calling readkey(NKS-SIGG.4531)
2024-02-29 15:08:45 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=NKS-SIGG.4531
2024-02-29 15:08:45 scdaemon[20536] DBG: slot 0 app nks: calling readcert(NKS-SIGG.4531)
2024-02-29 15:08:45 scdaemon[20536] nks: switching to SigG
2024-02-29 15:08:47 scdaemon[20536] DBG: chan_13 -> [ 44 20 28 31 30 3a 70 75 62 6c 69 63 2d 6b 65 79 ...(293 byte(s) skipped) ]
2024-02-29 15:08:47 scdaemon[20536] DBG: chan_13 -> OK
2024-02-29 15:08:47 scdaemon[20536] DBG: chan_13 <- GETATTR $DISPSERIALNO A69B0D3796EE33E4426E5CE4B6BEEE5F1209FBA4
2024-02-29 15:08:47 scdaemon[20536] DBG: slot 0, app nks: calling with_keygrip(lookup)
2024-02-29 15:08:47 scdaemon[20536] nks: switching to NKS
2024-02-29 15:08:48 scdaemon[20536] nks: switching to SigG
2024-02-29 15:08:49 scdaemon[20536] DBG: slot 0: have=nks want=nks keyref=[none]
2024-02-29 15:08:49 scdaemon[20536] DBG: slot 0 app nks: calling getattr($DISPSERIALNO)
2024-02-29 15:08:49 scdaemon[20536] nks: switching to NKS
2024-02-29 15:08:50 scdaemon[20536] DBG: chan_13 -> S $DISPSERIALNO 8949017330002661652
2024-02-29 15:08:50 scdaemon[20536] DBG: chan_13 -> OK
2024-02-29 15:08:50 scdaemon[20536] DBG: chan_13 <- GETINFO all_active_apps
2024-02-29 15:08:50 scdaemon[20536] DBG: chan_13 -> S SERIALNO 89490173300026616520 nks
2024-02-29 15:08:50 scdaemon[20536] DBG: chan_13 -> OK
2024-02-29 15:08:50 scdaemon[20536] DBG: chan_13 <- BYE
2024-02-29 15:08:50 scdaemon[20536] DBG: chan_13 -> OK closing connection
2024-02-29 15:08:50 scdaemon[20536] handler for fd 13 terminated
Feb 29 2024, 3:23 PM · scd, Restricted Project, Bug Report
ikloecker added a comment to T7016: scdaemon: Sometimes a newly detected card is immediately considered removed.

Here are logs with debug ipc,app,reader:

2024-02-29 15:12:07 scdaemon[20881] handler for fd 13 started
2024-02-29 15:12:07 scdaemon[20881] DBG: chan_13 -> OK GNU Privacy Guard's Smartcard server ready
2024-02-29 15:12:07 scdaemon[20881] DBG: chan_13 <- SERIALNO --all
2024-02-29 15:12:07 scdaemon[20881] DBG: apdu_open_reader: BAI=60900
2024-02-29 15:12:07 scdaemon[20881] DBG: apdu_open_reader: new device=60900
2024-02-29 15:12:07 scdaemon[20881] ccid open error: skip
2024-02-29 15:12:07 scdaemon[20881] DBG: apdu_open_reader: BAI=60a00
2024-02-29 15:12:07 scdaemon[20881] DBG: apdu_open_reader: new device=60a00
2024-02-29 15:12:08 scdaemon[20881] reader slot 0: using ccid driver
2024-02-29 15:12:08 scdaemon[20881] slot 0: ATR=3bbf96008131fe5d00640411030131c073f701d00090007d
2024-02-29 15:12:08 scdaemon[20881] DBG: enter: apdu_connect: slot=0
2024-02-29 15:12:08 scdaemon[20881] DBG: leave: apdu_connect => sw=0x0
2024-02-29 15:12:09 scdaemon[20881] Detected NKS version: 3
2024-02-29 15:12:09 scdaemon[20881] DBG: apdu_open_reader: BAI=40200
2024-02-29 15:12:09 scdaemon[20881] DBG: apdu_open_reader: new device=40200
2024-02-29 15:12:09 scdaemon[20881] ccid open error: skip
2024-02-29 15:12:09 scdaemon[20881] DBG: enter: apdu_get_status: slot=0 hang=0
2024-02-29 15:12:09 scdaemon[20881] DBG: leave: apdu_get_status => sw=0x0 status=7
2024-02-29 15:12:09 scdaemon[20881] DBG: chan_7 -> S DEVINFO_STATUS new
2024-02-29 15:12:09 scdaemon[20881] DBG: enter: apdu_get_status: slot=0 hang=0
2024-02-29 15:12:09 scdaemon[20881] DBG: leave: apdu_get_status => sw=0x0 status=7
2024-02-29 15:12:09 scdaemon[20881] DBG: chan_7 -> S DEVINFO_START
2024-02-29 15:12:09 scdaemon[20881] DBG: chan_7 -> S DEVICE generic 89490173300026616520 nks
2024-02-29 15:12:09 scdaemon[20881] DBG: chan_7 -> S DEVINFO_END
2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> S SERIALNO 89490173300026616520
2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> OK
2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 <- GETINFO all_active_apps
2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> S SERIALNO 89490173300026616520 nks
2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> OK
2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 <- SWITCHCARD 89490173300026616520
2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> S SERIALNO 89490173300026616520
2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> OK
2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 <- SWITCHAPP nks
2024-02-29 15:12:09 scdaemon[20881] DBG: slot 0: have=nks want=nks keyref=[none]
2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> S SERIALNO 89490173300026616520 nks
2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> OK
2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 <- GETATTR $SIGNKEYID
2024-02-29 15:12:09 scdaemon[20881] DBG: slot 0: have=nks want=nks keyref=[none]
2024-02-29 15:12:09 scdaemon[20881] DBG: slot 0 app nks: calling getattr($SIGNKEYID)
2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> S $SIGNKEYID NKS-NKS3.4531
2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> OK
2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 <- GETATTR $ENCRKEYID
2024-02-29 15:12:09 scdaemon[20881] DBG: slot 0: have=nks want=nks keyref=[none]
2024-02-29 15:12:09 scdaemon[20881] DBG: slot 0 app nks: calling getattr($ENCRKEYID)
2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> S $ENCRKEYID NKS-NKS3.45B1
2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> OK
2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 <- GETATTR NKS-VERSION
2024-02-29 15:12:09 scdaemon[20881] DBG: slot 0: have=nks want=nks keyref=[none]
2024-02-29 15:12:09 scdaemon[20881] DBG: slot 0 app nks: calling getattr(NKS-VERSION)
2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> S NKS-VERSION 3
2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> OK
2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 <- GETATTR $DISPSERIALNO
2024-02-29 15:12:09 scdaemon[20881] DBG: slot 0: have=nks want=nks keyref=[none]
2024-02-29 15:12:09 scdaemon[20881] DBG: slot 0 app nks: calling getattr($DISPSERIALNO)
2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> S $DISPSERIALNO 8949017330002661652
2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> OK
2024-02-29 15:12:09 scdaemon[20881] DBG: enter: apdu_get_status: slot=0 hang=0
2024-02-29 15:12:09 scdaemon[20881] DBG: leave: apdu_get_status => sw=0x1000c status=0
2024-02-29 15:12:09 scdaemon[20881] DBG: chan_7 -> S DEVINFO_STATUS removal
2024-02-29 15:12:09 scdaemon[20881] DBG: Removal of a card: 0
2024-02-29 15:12:09 scdaemon[20881] DBG: enter: apdu_close_reader: slot=0
2024-02-29 15:12:09 scdaemon[20881] DBG: enter: apdu_disconnect: slot=0
2024-02-29 15:12:09 scdaemon[20881] DBG: leave: apdu_disconnect => sw=0x0
2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 <- GETATTR CHV-STATUS
2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> ERR 100663406 Card removed <SCD>
2024-02-29 15:12:09 scdaemon[20881] DBG: leave: apdu_close_reader => 0x0 (close_reader)
2024-02-29 15:12:09 scdaemon[20881] DBG: chan_7 -> S DEVINFO_START
2024-02-29 15:12:09 scdaemon[20881] DBG: chan_7 -> S DEVINFO_END
2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 <- GETINFO all_active_apps
2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> ERR 100663408 Card not present <SCD>
2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 <- BYE
2024-02-29 15:12:09 scdaemon[20881] DBG: chan_13 -> OK closing connection
2024-02-29 15:12:09 scdaemon[20881] handler for fd 13 terminated
Feb 29 2024, 3:22 PM · scd, Restricted Project, Bug Report
ebo added a comment to T7013: More documentation, Nothing appears.

Andre said instead of removing "more documentation" for Gpg4win, he'd like to put links to relevant documentation there, e.g. the gpg manual.

Feb 29 2024, 11:01 AM · Restricted Project, Bug Report
thesamesam added a comment to T5664: npth-1.6: error: unknown type name ‘pthread_rwlock_t’.

@gniibe Thank you very much! That works.

Feb 29 2024, 7:56 AM · npth, Bug Report
thesamesam added a comment to T7003: 2.2 gpg-agent doesn't allow KEYINFO when restricted (was: gpgme-1.23.2 test failure (t-json)).

No, thank you both for the speedy responses :)

Feb 29 2024, 7:40 AM · gnupg22 (gnupg-2.2.43), gpgagent, gpgme, Gentoo, Bug Report
gniibe renamed T7003: 2.2 gpg-agent doesn't allow KEYINFO when restricted (was: gpgme-1.23.2 test failure (t-json)) from gpgme-1.23.2 test failure (t-json) to 2.2 gpg-agent doesn't allow KEYINFO when restricted (was: gpgme-1.23.2 test failure (t-json)).
Feb 29 2024, 7:34 AM · gnupg22 (gnupg-2.2.43), gpgagent, gpgme, Gentoo, Bug Report
gniibe triaged T7003: 2.2 gpg-agent doesn't allow KEYINFO when restricted (was: gpgme-1.23.2 test failure (t-json)) as High priority.
Feb 29 2024, 7:33 AM · gnupg22 (gnupg-2.2.43), gpgagent, gpgme, Gentoo, Bug Report
gniibe added a comment to T5664: npth-1.6: error: unknown type name ‘pthread_rwlock_t’.

@thesamesam Thank you for the report.

Feb 29 2024, 7:31 AM · npth, Bug Report
gniibe reopened T5664: npth-1.6: error: unknown type name ‘pthread_rwlock_t’ as "Open".
Feb 29 2024, 6:33 AM · npth, Bug Report
gniibe added projects to T7003: 2.2 gpg-agent doesn't allow KEYINFO when restricted (was: gpgme-1.23.2 test failure (t-json)): gnupg22, gpgagent.

Thanks a lot for your quick testing.
The commit rGff42ed0d69bb: gpg: Enhance agent_probe_secret_key to return bigger value. of GnuPG 2.2 introduced this bug.

Feb 29 2024, 5:48 AM · gnupg22 (gnupg-2.2.43), gpgagent, gpgme, Gentoo, Bug Report
gniibe added a comment to T7022: libgcrypt-1.10.3 regression on hppa.

Alternatively (more narrow workaround), when I add a line:

#pragma GCC optimize("O1")

before the function _gcry_mpi_ec_nist256_mod in mpi/ec-nist.c, it works for me on panama.debian.net (Debian porterbox for hppa).

Feb 29 2024, 5:27 AM · libgcrypt, Gentoo, hppa, Bug Report
thesamesam added a comment to T7003: 2.2 gpg-agent doesn't allow KEYINFO when restricted (was: gpgme-1.23.2 test failure (t-json)).

Ah, thanks Werner, I'll keep that in mind.

Feb 29 2024, 3:15 AM · gnupg22 (gnupg-2.2.43), gpgagent, gpgme, Gentoo, Bug Report
thesamesam added a comment to T5664: npth-1.6: error: unknown type name ‘pthread_rwlock_t’.

This seems to have regressed musl support, per https://bugs.gentoo.org/925443.

Feb 29 2024, 3:03 AM · npth, Bug Report
gniibe closed T6992: Fix possible uninitialized err variable in libskba der builder as Resolved.

Fixed in libksba 1.6.6.

Feb 29 2024, 2:08 AM · libksba, Bug Report
gniibe closed T5664: npth-1.6: error: unknown type name ‘pthread_rwlock_t’ as Resolved.

Fixed in npth 1.7.

Feb 29 2024, 2:01 AM · npth, Bug Report

Feb 28 2024

jukivili added a comment to T7022: libgcrypt-1.10.3 regression on hppa.

No, hardware barrier is not needed here. Compiler barrier is used here to prevent optimization removing mask generation and usage in following constant-time code.

Feb 28 2024, 9:34 PM · libgcrypt, Gentoo, hppa, Bug Report
matoro added a comment to T7022: libgcrypt-1.10.3 regression on hppa.

Clarification from Dave:

Feb 28 2024, 7:32 PM · libgcrypt, Gentoo, hppa, Bug Report
matoro added a comment to T7022: libgcrypt-1.10.3 regression on hppa.

Thanks, I can confirm that this patch fixes the issue. I'll let Sam decide if this is how we want to handle it downstream or wait for confirmation from gcc.

Feb 28 2024, 4:37 PM · libgcrypt, Gentoo, hppa, Bug Report
ebo triaged T7013: More documentation, Nothing appears as Normal priority.
Feb 28 2024, 2:35 PM · Restricted Project, Bug Report
werner added a comment to T7003: 2.2 gpg-agent doesn't allow KEYINFO when restricted (was: gpgme-1.23.2 test failure (t-json)).

Although I don't think this is the case here one should be aware that tests mail fail due to global configuration of GnuPG (/etc/gnupg/*.conf). There is no easy way so solve this except for running a per-test local installation of GnuPG using the gpgconf.ctl feature.

Feb 28 2024, 10:41 AM · gnupg22 (gnupg-2.2.43), gpgagent, gpgme, Gentoo, Bug Report
gniibe added a comment to T7003: 2.2 gpg-agent doesn't allow KEYINFO when restricted (was: gpgme-1.23.2 test failure (t-json)).

You can get more information by applying a patch below (and also tests/json/Makefile.in):

diff --git a/tests/json/Makefile.am b/tests/json/Makefile.am
index 90fba79e..7523bb6b 100644
--- a/tests/json/Makefile.am
+++ b/tests/json/Makefile.am
@@ -106,6 +106,8 @@ gpg-agent.conf:
 # a key from a smartcard reader (error might be: Unusable secret key)
 	echo pinentry-program $(abs_srcdir)/../gpg/pinentry > ./gpg-agent.conf
 	echo disable-scdaemon >> ./gpg-agent.conf
+	echo debug-all >> ./gpg-agent.conf
+	echo log-file /tmp/gpg-agent-logfile.log >> ./gpg-agent.conf
Feb 28 2024, 7:24 AM · gnupg22 (gnupg-2.2.43), gpgagent, gpgme, Gentoo, Bug Report
gniibe added a comment to T7003: 2.2 gpg-agent doesn't allow KEYINFO when restricted (was: gpgme-1.23.2 test failure (t-json)).

T4820 is not related (it's a failure of t-keylist-secret in t-json), while this is failure of t-decrypt.

Feb 28 2024, 7:18 AM · gnupg22 (gnupg-2.2.43), gpgagent, gpgme, Gentoo, Bug Report
thesamesam added a project to T7003: 2.2 gpg-agent doesn't allow KEYINFO when restricted (was: gpgme-1.23.2 test failure (t-json)): gpgme.
Feb 28 2024, 4:40 AM · gnupg22 (gnupg-2.2.43), gpgagent, gpgme, Gentoo, Bug Report
gniibe added a project to T7022: libgcrypt-1.10.3 regression on hppa: libgcrypt.
Feb 28 2024, 2:57 AM · libgcrypt, Gentoo, hppa, Bug Report
gniibe triaged T7022: libgcrypt-1.10.3 regression on hppa as Normal priority.

It looks like computation for NIST P-256 failed on hppa (32-bit big-endian, actually running on 64-bit machine, IIUC).
powerpc is similar (32-bit big-endian, actually running on 64-bit machine), but no failures.

Feb 28 2024, 2:47 AM · libgcrypt, Gentoo, hppa, Bug Report

Feb 27 2024

thesamesam added a project to T7022: libgcrypt-1.10.3 regression on hppa: Gentoo.
Feb 27 2024, 7:17 PM · libgcrypt, Gentoo, hppa, Bug Report