I don't see any problems in your PC/SC log, at all. If it is the failure of vendor's driver, we actually have no way to fix.
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Advanced Search
Nov 16 2020
Nov 13 2020
Nov 12 2020
Thanks for your report, but your excerpt is irrelevant.
Push the change.
Thank you.
Let me describe current situation.
Nov 11 2020
Thanks.
I didn't consider well about the test environment which uses special pinentry program.
I'll fix the line 155.
Nov 10 2020
The feature (better cross compiling) was done in master.
We close this bug report as "Won't fix" since it will never been applied to 2.2.
In newer releases of libgpg-error, libksba, libassuan, libgcrypt, npth and ntbtls, we updated corresponding *.m4, so that we can use new gpgrt-config program only. And gpgrt-config command supports cross compiling and multiarch libraries.
For 2.2, rG61aea64b3c17: scd: Fix the use case of verify_chv2 by CHECKPIN. fixed this problem.
Fixed in master.
(confirmation interaction is also fixed.)
Need another patch to export it:
diff --git a/g10/export.c b/g10/export.c index 8dd0b07d7..339424e19 100644 --- a/g10/export.c +++ b/g10/export.c @@ -627,6 +627,57 @@ canon_pk_algo (enum gcry_pk_algos algo) }
It's fixed in master by T3465: --pinentry-mode loopback with --delete-secret-keys, with new confirmation interaction.
For 2.2, you can use --batch and --yes, see T4667: "gpg: deleting secret key failed: No pinentry" when in --batch mode with --pinentry=loopback.
Did you remove .gnupg entirely? Secret keys are stored in .gnupg/private-keys-v1.d. If it remained, you didn't import your secret keys.
If it was the case, I'd like to merge this report to T3391: cannot import subkey that was once marked to be on a card.
Nov 9 2020
The "Reliability History" says (in Chinese):
异常代码: c0000005 异常偏移: 0002b6c0
The error code c0000005 is something like SEGV on POSIX, I guess.
It occurred at the address 0002b6c0.
Nov 5 2020
For SPR532, we need following.
Nov 4 2020
Applying following SOS-handling, the key can be handled.
diff --git a/g10/parse-packet.c b/g10/parse-packet.c index 9cb254e24..be7fc6d67 100644 --- a/g10/parse-packet.c +++ b/g10/parse-packet.c @@ -188,6 +188,76 @@ mpi_read (iobuf_t inp, unsigned int *ret_nread, int secure) }
Note that there is no problem for encrypted key, because it is handled by opaque MPI.
Nov 2 2020
Oct 30 2020
One bug is fixed in rGdd4fb1c8f668: gpg: Fix first zero-byte case for SOS handling..
Fixed in 2.2 branch.
Also, I found another issue of libgcrypt master, which is fixed in rC361a0588489c: ecc: Handle removed zeros at the beginning for Ed25519..
Further, I found different issue, and created T5116: GnuPG master shows an error when importing Ed25519 keys generated.
I think that it may occur with eddsa secret keys generated with 2.2, too. (In the 50% probability)
Oct 29 2020
IIUC, it is an issue of GnuPG 2.2.
The condition is where the secret 'd' starts by the first bit = 1 (that is, >= 0x80).
I located the bug in agent/cvt-openpgp.c. The function do_unprotect calls convert_secret_key with skey[1] as usual MPI (not opaque),
and gcry_sexp_build with "(d%m)" will put additional 0x00 at the beginning, which results 33-byte secret in R_KEY. Then, when gcry_pk_testkey is called with R_KEY, when it checks, because 32-byte is expected, it returns GPG_ERR_INV_OBJ. Then, do_unprotect returns GPG_ERR_BAD_PASSPHRASE.
With Debian's GnuPG 2.2.12, I got an error:
With bata1449, I cannot reproduce it.
I can import by gpg --import key-uids-sec.pgp
I tested with Debian's libgcrypt, as well as libgcrypt master (4a50c6b8).
Oct 28 2020
Pushed the change.
Oct 27 2020
IIUC, fix can be like this:
diff --git a/lang/python/src/core.py b/lang/python/src/core.py index 996c3b0f..646bbc60 100644 --- a/lang/python/src/core.py +++ b/lang/python/src/core.py @@ -147,7 +147,12 @@ class GpgmeWrapper(object): gpgme.gpg_raise_callback_exception(slf) return result
SCD commands:
- DEVINFO
- returns app apecific serialno
- SERIALNO
- returns app specific serialno
- LEARN
- returns canonical serialno
Oct 26 2020
Pushed the change.
Oct 24 2020
Oct 23 2020
Only enabled for UNIX #ifdef/#else/#endif
I had overlooked this fix rG044379772fc5: common: Fix the previous commit., after the commit of rGb1c56cf9e2bb: common: Use gnupg_spawn_process_fd to invoke gpg-agent/dirmngr..
Oct 21 2020
I created this patch D509: Yubikey supports two (or more) apps, serial number problem.
Oct 19 2020
No, the above patch makes OpenPGP app stop working.
(I don't know well about Yubikey specific serial number.)