User Details
- User Since
- Aug 19 2018, 2:18 PM (330 w, 6 d)
- Availability
- Available
Sep 30 2024
scdaemon in this case was a broken experiment of mine (trying to see if I can get SoftHSM to work as the OpenPGP card). So this was not a normal, released scdaemon code.
Sep 28 2024
Mar 18 2023
Do you have some examples (hexdumps) of how the structure looks like? I think I have seen something similar in some other smartcards. Would that be possible to write some kind of unit test for this?
Mar 10 2023
I've run into a variant of this, too. If I generate they key just using (genkey (ecc (curve "Ed25519"))), it is recognized as an encryption key. One needs to use (genkey (ecc (curve "Ed25519")(flags eddsa))).
Mar 6 2023
Thank you!
I don't know what is going here really. I have installed alacritty and I can reproduce T4924 easily if I provide an empty passphrase on an narrow window. At least I get pinentry-curses popping up.
@ikloecker not sure we are there yet. I was able to set a weak password on a terminal that was 42 characters wide. I think the problem here is unrelated to FreeBSD but to the fact that @capitol uses alacritty https://github.com/alacritty/alacritty
Mar 5 2023
The agent.log says that the error comes from pinentry-curses:
I tried to reproduce on my FreeBSD 14 machine and didn't get an error....