Applications type report error ? #210
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
The application types displayed in yubico authenticator as follows:
pico fido does not support OpenPGP and PIV.
additionally, will upgrading from version 6.6 cause data corruption? during previous testing, an upgrade resulted in data corruption on the key (before the release of 7.0).
I tested it again:
Reset the key using nuke
Flashed version 6.6, set up OATH and OTP

Flashed version 7.0, OATH and OTP data were normal, but the serial number was different from that in version 6.6.
Will different serial numbers cause the passkey to become invalid?
It shouldn’t.
passkey pin damaged
even after re-flashing version 6.6, the PIN code still fails verification.
Was the pin ser on 6.6 or 7.0?
the PIN was set during initialization in 6.6. after upgrading to 7.0, PIN verification failed, and flashing back to 6.6 did not resolve the issue.
Cannot reproduce.
i test again,use non daily use key, which one was tested earlier
1.Nuked the board.
2.Installed v6.6
3.Set a PIN 1234
4.Test PIN -> ok
5.Upgraded to v7.0
6.Test PIN -> ok
7.Nuked the board.
8.Installed v6.6
9.Set a PIN 123456
10.Test PIN -> ok
11.Upgraded to v7.0
12.Test PIN -> ok
then I used the daily-use test:
1.Upgraded to v7.0
2.Test PIN -> ok
but keeps spinning in circles
3.restar windows
4.Test PIN ->ok
but still spinning
5.Test Use Passkey Login Web -> Fail
5.re-flashing 6.6
i use self build eddsa firmware.
PICO_SDK_PATH=~/pico-sdk cmake .. -DPICO_BOARD=waveshare_rp2350_one -DENABLE_EDDSA=1 -DENABLE_POWER_ON_RESET=1 -DENABLE_OATH_APP=1 -DENABLE_OTP_APP=1 -DSECURE_BOOT_PKEY=../../ec_private_key.pem -DUSB_VID=0x1050 -DUSB_PID=0x0407
I've lost my data, I'll recreate everything from version 7.0. While the data loss issue won't affect me anymore during the upgrade, it might still impact others.
I am not getting the point. You said it worked but later you say it's not. I'm trying to reproduce it but I cannot find the way.
The last test showed that PIN verification passed on the test token, so I upgraded the token I was using normally. After the upgrade, PIN verification also passed, but the passkey data could not be read and it kept spinning.