could not create a keypair / sign a single file

Vasiliy testtest_2005 at ukr.net
Sat Jun 29 09:37:04 CEST 2013


Dear GNUPG Team,

I couldn't get a detachable signature with the existing/imported key
which doesn't make a use of CRL's, neither could I create a new
keypair with the latest gpgsm and libraries built on my 64-bit
machine. What am I doing wrong?

Best regards,
Vasiliy

$ gpgsm --detach-sign --disable-crl-checks --verbose
libgcrypt-1.6.0.tar.bz2 > libgcrypt-1.6.0.tar.bz2.sig
gpgsm: NOTE: THIS IS A DEVELOPMENT VERSION!
gpgsm: It is only intended for test purposes and should NOT be
gpgsm: used in a production environment or with production keys!
gpgsm: enabled debug flags: assuan
gpgsm: certificate is good
gpgsm: root certificate is good
gpgsm: no running gpg-agent - starting '/usr/bin/gpg-agent'
gpgsm: waiting for the agent to come up ... (5s)
gpgsm: waiting for the agent to come up ... (4s)
gpgsm: DBG: chan_4 <- OK Pleased to meet you, process 9724
gpgsm: connection to agent established
gpgsm: DBG: chan_4 -> RESET
gpgsm: DBG: chan_4 <- OK
gpgsm: DBG: chan_4 -> OPTION ttyname=/dev/pty5
gpgsm: DBG: chan_4 <- OK
gpgsm: DBG: chan_4 -> OPTION ttytype=xterm
gpgsm: DBG: chan_4 <- OK
gpgsm: DBG: chan_4 -> OPTION display=:0.0
gpgsm: DBG: chan_4 <- OK
gpgsm: DBG: chan_4 -> OPTION xauthority=~/.Xauthority
gpgsm: DBG: chan_4 <- OK
gpgsm: DBG: chan_4 -> OPTION lc-ctype=en_US.UTF-8
gpgsm: DBG: chan_4 <- OK
gpgsm: DBG: chan_4 -> OPTION lc-messages=en_US.UTF-8
gpgsm: DBG: chan_4 <- OK
gpgsm: DBG: chan_4 -> OPTION allow-pinentry-notify
gpgsm: DBG: chan_4 <- OK
gpgsm: DBG: chan_4 -> ISTRUSTED FB7EAD4851BE76AF04486BA4738A744BFB50DE86
gpgsm: DBG: chan_4 <- ERR 67108961 Line too long <GPG Agent>
gpgsm: checking the trust list failed: Line too long
gpgsm: validation model used: shell
gpgsm: error creating signature: Line too long <GPG Agent>
secmem usage: 0/65536 bytes in 0 blocks
...
configure: checking for libraries
checking for gpg-error-config... (cached) /usr/bin/gpg-error-config
checking for GPG Error - version >= 1.11... yes (1.12-beta6)
checking for libgcrypt-config... (cached) /usr/bin/libgcrypt-config
checking for LIBGCRYPT - version >= 1.5.0... yes (1.6.0-beta145)
checking LIBGCRYPT API version... okay
checking for libassuan-config... (cached) /usr/bin/libassuan-config
checking for LIBASSUAN - version >= 2.1.0... yes (2.1.0)
checking LIBASSUAN API version... okay
checking for ksba-config... (cached) /usr/bin/ksba-config
checking for KSBA - version >= 1.2.0... yes (1.3.1-beta3)
checking KSBA API version... okay
checking for usb_bulk_write in -lusb... (cached) no
checking for usb_create_match... (cached) no
checking for library containing dlopen... (cached) none required
checking for encfs... (cached) /usr/bin/encfs
checking for fusermount... (cached) /usr/bin/fusermount
checking for openpty in -lutil... (cached) yes
checking for shred... (cached) /usr/bin/shred
checking for npth-config... (cached) /usr/bin/npth-config
checking for NPTH - version >= 0.91... yes (0.91)
checking NPTH API version... okay
...
checking for iconv declaration... (cached)
         extern size_t iconv (iconv_t cd, char * *inbuf, size_t
*inbytesleft, char * *outbuf, size_t *outbytesleft);
...
        GnuPG v2.1.0-beta220 has been configured as follows:

        Revision:  82c25e6  (33474)
        Platform:  Cygwin (x86_64-unknown-cygwin)

        OpenPGP:   yes
        S/MIME:    yes
        Agent:     yes
        Smartcard: yes (without internal CCID driver)
        G13:       yes
        Dirmngr:   yes
        Gpgtar:    yes

        Protect tool:      (default)
        LDAP wrapper:      (default)
        Default agent:     (default)
        Default pinentry:  /usr/bin/pinentry-gtk-2
        Default scdaemon:  (default)
        Default dirmngr:   (default)

        Use standard socket: yes
        Dirmngr auto start:  yes
...
$ gpgsm --gen-key --verbose
gpgsm (GnuPG) 2.1.0-beta220; Copyright (C) 2012 Free Software Foundation, Inc.
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.

gpgsm: NOTE: THIS IS A DEVELOPMENT VERSION!
gpgsm: It is only intended for test purposes and should NOT be
gpgsm: used in a production environment or with production keys!
gpgsm: enabled debug flags: assuan
Please select what kind of key you want:
   (1) RSA
   (2) Existing key
   (3) Existing key from card
Your selection? 1
What keysize do you want? (2048) 1024
Requested keysize is 1024 bits
Possible actions for a RSA key:
   (1) sign, encrypt
   (2) sign
   (3) encrypt
Your selection? 1
Enter the X.509 subject name: 'NAME'
Enter email addresses (end with an empty line):
>
Enter DNS names (optional; end with an empty line):
>
Enter URIs (optional; end with an empty line):
>
Create self-signed certificate? (y/N) Y
These parameters are used:
    Key-Type: RSA
    Key-Length: 1024
    Key-Usage: sign, encrypt
    Serial: random
    Name-DN: 'NAME'

Proceed with creation? (y/N) Y
Now creating self-signed certificate.  This may take a while ...
gpgsm: no running gpg-agent - starting '/usr/bin/gpg-agent'
gpgsm: waiting for the agent to come up ... (5s)
gpgsm: waiting for the agent to come up ... (4s)
gpgsm: DBG: chan_4 <- OK Pleased to meet you, process 29624
gpgsm: connection to agent established
gpgsm: DBG: chan_4 -> RESET
gpgsm: DBG: chan_4 <- OK
gpgsm: DBG: chan_4 -> OPTION ttyname=/dev/pty5
gpgsm: DBG: chan_4 <- OK
gpgsm: DBG: chan_4 -> OPTION ttytype=xterm
gpgsm: DBG: chan_4 <- OK
gpgsm: DBG: chan_4 -> OPTION display=:0.0
gpgsm: DBG: chan_4 <- OK
gpgsm: DBG: chan_4 -> OPTION xauthority=~/.Xauthority
gpgsm: DBG: chan_4 <- OK
gpgsm: DBG: chan_4 -> OPTION lc-ctype=en_US.UTF-8
gpgsm: DBG: chan_4 <- OK
gpgsm: DBG: chan_4 -> OPTION lc-messages=en_US.UTF-8
gpgsm: DBG: chan_4 <- OK
gpgsm: DBG: chan_4 -> OPTION allow-pinentry-notify
gpgsm: DBG: chan_4 <- OK
gpgsm: DBG: chan_4 -> RESET
gpgsm: DBG: chan_4 <- OK
gpgsm: DBG: chan_4 -> GENKEY
gpgsm: DBG: chan_4 <- S INQUIRE_MAXLEN 1024
gpgsm: DBG: chan_4 <- INQUIRE KEYPARAM
gpgsm: DBG: chan_4 -> D (6:genkey(3:rsa(5:nbits4:1024)))
gpgsm: DBG: chan_4 -> END
gpgsm: DBG: chan_4 <- INQUIRE PINENTRY_LAUNCHED 14648
gpgsm: DBG: chan_4 -> END
gpgsm: DBG: chan_4 <- INQUIRE PINENTRY_LAUNCHED 8752
gpgsm: DBG: chan_4 -> END
gpgsm: DBG: chan_4 <- INQUIRE PINENTRY_LAUNCHED 33476
gpgsm: DBG: chan_4 -> END
gpgsm: DBG: chan_4 <- INQUIRE PINENTRY_LAUNCHED 9628
gpgsm: DBG: chan_4 -> END
gpgsm: DBG: chan_4 <- S CACHE_NONCE C2E4CD8509DED213BFC75CC4
gpgsm: DBG: chan_4 <- [ 44 20 28 31 30 3a 70 75 62 6c 69 63 2d 6b 65
79 ...(168 byte(s) skipped) ]
gpgsm: DBG: chan_4 <- OK
gpgsm: error setting the subject's name: Not implemented
gpgsm: error creating certificate request: Not implemented <KSBA>
secmem usage: 0/65536 bytes in 0 blocks



More information about the Gcrypt-devel mailing list