This bug was fixed in the package opensc - 0.22.0-1ubuntu2.1
---
opensc (0.22.0-1ubuntu2.1) jammy; urgency=medium
* Include the openssl legacy provider in pkcs11-tool to support
RIPEMD160 in openssl 3.0 in jammy. (LP: #2106434)
- d/p/lp2106434-pkcs11-tool-load-legacy-provide
I've also been able to verify with a physical PKI device - all seems to
be working!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2106434
Title:
pkcs11-tool 0.22.0 fails in C_DigestInit with CKR_GEN
** Tags removed: verification-needed
** Tags added: verification-done
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2106434
Title:
pkcs11-tool 0.22.0 fails in C_DigestInit with CKR_GENERAL_ERROR
To
I've been unable to work around the issue described above with the QEMU
ccid-card-emulated; I'm going to mark verification complete as the test
plan was completed using a Yubikey.
### Verification Done Jammy (ccid-card-emulated) ###
$ apt-cache policy opensc
opensc:
Installed: 0.22.0-1ubuntu2.1
** Description changed:
[ Impact ]
pkcs11-tool in Jammy (opensc=0.22.0-1ubuntu2) fails with `-t` while
testing digests:
```
$ sudo pkcs11-tool -l -t
Using slot 0 with a present token (0x0)
Logging in to "Users".
Please enter User PIN:
C_SeedRandom() and C_GenerateRandom():
** Description changed:
[ Impact ]
pkcs11-tool in Jammy (opensc=0.22.0-1ubuntu2) fails with `-t` while
testing digests:
```
$ sudo pkcs11-tool -l -t
Using slot 0 with a present token (0x0)
Logging in to "Users".
Please enter User PIN:
C_SeedRandom() and C_GenerateRandom():
The autopkgtests look like an infra issue rather than a test failure.
VM verification coming soon...
### Verification Done Jammy (Yubikey) ###
$ apt-cache policy opensc
opensc:
Installed: 0.22.0-1ubuntu2.1
Candidate: 0.22.0-1ubuntu2.1
Version table:
*** 0.22.0-1ubuntu2.1 500
500 ht
Hello Wesley, or anyone else affected,
Accepted opensc into jammy-proposed. The package will build now and be
available at
https://launchpad.net/ubuntu/+source/opensc/0.22.0-1ubuntu2.1 in a few
hours, and then in the -proposed repository.
Please help us by testing this new package. See
https://w
Thanks for the review; I'll get the branch right in future :)
I've added a section with a quick sign+verify; happy to add additional
workflows if that isn't sufficient.
** Description changed:
[ Impact ]
pkcs11-tool in Jammy (opensc=0.22.0-1ubuntu2) fails with `-t` while
testing digests
> Ah, also, we usually use debdiffs instead of merge requests to get
things into Ubuntu.
I don't think that's true as a general statement anymore. Lots of people
prefer the git-ubuntu workflow. The target of the MP should have been
ubuntu/jammy-devel though, as you point out.
Anyways, I have revi
** Changed in: opensc (Ubuntu)
Assignee: Wesley Hershberger (whershberger) => (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2106434
Title:
pkcs11-tool 0.22.0 fails in C_DigestInit
** Description changed:
[ Impact ]
pkcs11-tool in Jammy (opensc=0.22.0-1ubuntu2) fails with `-t` while
testing digests:
```
$ sudo pkcs11-tool -l -t
Using slot 0 with a present token (0x0)
Logging in to "Users".
Please enter User PIN:
C_SeedRandom() and C_GenerateRandom():
Hi Wesley,
This has been sponsored to jammy.
Some feedback:
This is all very good for your first SRU.
Attached is the final debdiff that I sponsored, so you can study it.
Notes:
- We want to try keep patch file names for what their original commit name was,
so I renamed the patch back to
lp21
Ah, also, we usually use debdiffs instead of merge requests to get
things into Ubuntu.
The branch you targeted, ubuntu/devel is currently targeting plucky /
questing, and not jammy.
Instead, you can make a debdiff with:
$ debdiff opensc_0.22.0-1ubuntu2.dsc opensc_0.22.0-1ubuntu2.1.dsc > my-
debd
** Description changed:
[ Impact ]
pkcs11-tool in Jammy (opensc=0.22.0-1ubuntu2) fails with `-t` while
testing digests:
```
$ sudo pkcs11-tool -l -t
Using slot 0 with a present token (0x0)
Logging in to "Users".
Please enter User PIN:
C_SeedRandom() and C_GenerateRandom():
** Description changed:
[ Impact ]
pkcs11-tool in Jammy (opensc=0.22.0-1ubuntu2) fails with `-t` while
testing digests:
```
$ sudo pkcs11-tool -l -t
Using slot 0 with a present token (0x0)
Logging in to "Users".
Please enter User PIN:
C_SeedRandom() and C_GenerateRandom():
** Description changed:
[ Impact ]
pkcs11-tool in Jammy (opensc=0.22.0-1ubuntu2) fails with `-t` while
testing digests:
```
$ sudo pkcs11-tool -l -t
Using slot 0 with a present token (0x0)
Logging in to "Users".
Please enter User PIN:
C_SeedRandom() and C_GenerateRandom():
** Changed in: opensc (Ubuntu Jammy)
Importance: Undecided => Medium
** Changed in: opensc (Ubuntu)
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2106434
** Merge proposal linked:
https://code.launchpad.net/~whershberger/ubuntu/+source/opensc/+git/opensc/+merge/484178
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2106434
Title:
pkcs11-tool 0.22.0
** Description changed:
[ Impact ]
pkcs11-tool in Jammy (opensc=0.22.0-1ubuntu2) fails with `-t` while
testing digests:
```
$ sudo pkcs11-tool -l -t
Using slot 0 with a present token (0x0)
Logging in to "Users".
Please enter User PIN:
C_SeedRandom() and C_GenerateRandom():
** Description changed:
[ Impact ]
pkcs11-tool in Jammy (opensc=0.22.0-1ubuntu2) fails with `-t` while
testing digests:
```
$ sudo pkcs11-tool -l -t
Using slot 0 with a present token (0x0)
Logging in to "Users".
Please enter User PIN:
C_SeedRandom() and C_GenerateRandom():
** Description changed:
[ Impact ]
pkcs11-tool in Jammy (opensc=0.22.0-1ubuntu2) fails with `-t` while
testing digests:
```
$ sudo pkcs11-tool -l -t
Using slot 0 with a present token (0x0)
Logging in to "Users".
Please enter User PIN:
C_SeedRandom() and C_GenerateRandom():
22 matches
Mail list logo