Bad signature when generating key in OpenPGP Java Card Applet

Erik Nellessen erik.nellessen at informatik.hu-berlin.de
Thu Apr 7 09:28:33 CEST 2016


I just used gpg (GnuPG) 2.1.11 libgcrypt 1.6.5. The error is still the same, but the debug messages are different (actually, you do not see the data in the rsa_verify function anymore, although it still might be different). You can find a log of the whole procedure in the attachment. On the smart card side, the APDUs seem to have stayed the same.

Kind regards,
Erik

Werner Koch:
> On Wed,  6 Apr 2016 17:29, erik.nellessen at informatik.hu-berlin.de said:
> 
>> Today's system is openSUSE 13.2 (Harlequin) (x86_64) with gpg (GnuPG)
>> 2.0.26 libgcrypt 1.6.1. The debian system was i386, by the way.
> 
> Please try to use gnupg 2.1.11 - we have changed a lot of things and it
> is easier for us to comment on this version.
> 
> 
> Salam-Shalom,
> 
>    Werner
> 

-------------- next part --------------
:~$ LANG=en_US.utf8 gpg2 --card-edit --debug-level guru --debug-all
gpg: Note: no default option file '/home/erik/.gnupg/gpg.conf'
gpg: enabled debug flags: packet mpi crypto filter iobuf memory cache memstat trust hashing cardio ipc clock lookup extprog

gpg: DBG: [not enabled in the source] start
gpg: DBG: chan_4 <- OK Pleased to meet you, process 1641 
gpg: DBG: connection to agent established
gpg: DBG: chan_4 -> RESET
gpg: DBG: chan_4 <- OK
gpg: DBG: chan_4 -> OPTION ttyname=/dev/pts/1
gpg: DBG: chan_4 <- OK
gpg: DBG: chan_4 -> OPTION ttytype=xterm
gpg: DBG: chan_4 <- OK
gpg: DBG: chan_4 -> OPTION display=:0.0
gpg: DBG: chan_4 <- OK
gpg: DBG: chan_4 -> OPTION xauthority=/home/erik/.Xauthority
gpg: DBG: chan_4 <- OK
gpg: DBG: chan_4 -> OPTION putenv=DBUS_SESSION_BUS_ADDRESS=unix:abstract=/tmp/dbus-7FO1qPiGso,guid=aa46306c499eb658f19fcd31570608df
gpg: DBG: chan_4 <- OK
gpg: DBG: chan_4 -> GETINFO version
gpg: DBG: chan_4 <- D 2.1.11
gpg: DBG: chan_4 <- OK
gpg: DBG: chan_4 -> OPTION allow-pinentry-notify
gpg: DBG: chan_4 <- OK
gpg: DBG: chan_4 -> OPTION agent-awareness=2.1.0
gpg: DBG: chan_4 <- OK
gpg: DBG: chan_4 -> AGENT_ID
gpg: DBG: chan_4 <- ERR 67109139 Unbekanntes IPC Kommando <GPG Agent>
gpg: DBG: chan_4 -> SCD GETINFO version
gpg: DBG: chan_4 <- D 2.1.11
gpg: DBG: chan_4 <- OK
gpg: DBG: chan_4 -> SCD SERIALNO openpgp
gpg: DBG: chan_4 <- S SERIALNO D2760001240102000000000000010000 0
gpg: DBG: chan_4 <- OK
gpg: DBG: chan_4 -> SCD SERIALNO openpgp
gpg: DBG: chan_4 <- S SERIALNO D2760001240102000000000000010000 0
gpg: DBG: chan_4 <- OK
gpg: DBG: chan_4 -> LEARN --sendinfo
gpg: DBG: chan_4 <- S SIG-COUNTER 0
gpg: DBG: chan_4 <- S CHV-STATUS +0+127+127+127+3+3+3
gpg: DBG: chan_4 <- S DISP-SEX 9
gpg: DBG: chan_4 <- S EXTCAP gc=1+ki=1+fc=1+pd=0+mcl3=1216+aac=0+sm=2+si=0+dec=0+bt=0
gpg: DBG: chan_4 <- S APPTYPE OPENPGP
gpg: DBG: chan_4 <- S SERIALNO D2760001240102000000000000010000 0
gpg: DBG: chan_4 <- S READER REINER SCT cyberJack RFID basis 00 00
gpg: DBG: chan_4 <- OK
gpg: DBG: chan_4 -> SCD GETATTR KEY-ATTR
gpg: DBG: chan_4 <- S KEY-ATTR 1 1 rsa2048 17 4
gpg: DBG: chan_4 <- S KEY-ATTR 2 1 rsa2048 17 4
gpg: DBG: chan_4 <- S KEY-ATTR 3 1 rsa2048 17 4
gpg: DBG: chan_4 <- OK
Reader ...........: REINER SCT cyberJack RFID basis 00 00
Application ID ...: D2760001240102000000000000010000
Version ..........: 2.0
Manufacturer .....: test card
Serial number ....: 00000001
Name of cardholder: [not set]
Language prefs ...: [not set]
Sex ..............: unspecified
URL of public key : [not set]
Login data .......: [not set]
Signature PIN ....: forced
Key attributes ...: rsa2048 rsa2048 rsa2048
Max. PIN lengths .: 127 127 127
PIN retry counter : 3 3 3
Signature counter : 0
Signature key ....: [none]
Encryption key....: [none]
Authentication key: [none]
General key info..: [none]

gpg/card> admin
Admin commands are allowed

gpg/card> generate
gpg: DBG: chan_4 -> SCD GETATTR SERIALNO
gpg: DBG: chan_4 <- S SERIALNO D2760001240102000000000000010000
gpg: DBG: chan_4 <- OK
gpg: DBG: chan_4 -> SCD GETATTR KEY-FPR
gpg: DBG: chan_4 <- OK
gpg: DBG: chan_4 -> SCD GETATTR CHV-STATUS
gpg: DBG: chan_4 <- S CHV-STATUS +0+127+127+127+3+3+3
gpg: DBG: chan_4 <- OK
gpg: DBG: chan_4 -> SCD GETATTR DISP-NAME
gpg: DBG: chan_4 <- S DISP-NAME
gpg: DBG: chan_4 <- OK
gpg: DBG: chan_4 -> SCD GETATTR EXTCAP
gpg: DBG: chan_4 <- S EXTCAP gc=1+ki=1+fc=1+pd=0+mcl3=1216+aac=0+sm=2+si=0+dec=0+bt=0
gpg: DBG: chan_4 <- OK
gpg: DBG: chan_4 -> SCD GETATTR KEY-ATTR
gpg: DBG: chan_4 <- S KEY-ATTR 1 1 rsa2048 17 4
gpg: DBG: chan_4 <- S KEY-ATTR 2 1 rsa2048 17 4
gpg: DBG: chan_4 <- S KEY-ATTR 3 1 rsa2048 17 4
gpg: DBG: chan_4 <- OK
Make off-card backup of encryption key? (Y/n) 

Please note that the factory settings of the PINs are
   PIN = '123456'     Admin PIN = '12345678'
You should change them using the command --change-pin

gpg: DBG: chan_4 -> SCD SETATTR CHV-STATUS-1 %01
gpg: DBG: chan_4 <- INQUIRE PINENTRY_LAUNCHED 1643
gpg: DBG: chan_4 -> END
gpg: DBG: chan_4 <- OK
gpg: DBG: chan_4 -> SCD CHECKPIN D2760001240102000000000000010000
gpg: DBG: chan_4 <- INQUIRE PINENTRY_LAUNCHED 1646
gpg: DBG: chan_4 -> END
gpg: DBG: chan_4 <- OK
Please specify how long the key should be valid.
         0 = key does not expire
      <n>  = key expires in n days
      <n>w = key expires in n weeks
      <n>m = key expires in n months
      <n>y = key expires in n years
Key is valid for? (0) 
Key does not expire at all
Is this correct? (y/N) y

GnuPG needs to construct a user ID to identify your key.

Real name: Testi Testman
Email address: a at a.com
Comment: 
You selected this USER-ID:
    "Testi Testman <a at a.com>"

Change (N)ame, (C)omment, (E)mail or (O)kay/(Q)uit? O
gpg: DBG: chan_4 -> SCD GENKEY --timestamp=20160407T071659 --force 1
gpg: DBG: chan_4 <- S KEY-DATA n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
gpg: DBG: chan_4 <- S KEY-DATA e 010001
gpg: DBG: chan_4 <- S KEY-CREATED-AT 1460013419
gpg: DBG: chan_4 <- S KEY-FPR D897716E922C7C29834F1817D98CCAAB0465A457
gpg: DBG: chan_4 <- OK
gpg: DBG: chan_4 -> SCD SERIALNO openpgp
gpg: DBG: chan_4 <- S SERIALNO D2760001240102000000000000010000 0
gpg: DBG: chan_4 <- OK
gpg: DBG: chan_4 -> LEARN --sendinfo
gpg: DBG: chan_4 <- S PROGRESS learncard k 0 0
gpg: DBG: chan_4 <- S SIG-COUNTER 0
gpg: DBG: chan_4 <- S CHV-STATUS +1+127+127+127+3+3+3
gpg: DBG: chan_4 <- S KEY-TIME 1 1460013419
gpg: DBG: chan_4 <- S KEY-FPR 1 D897716E922C7C29834F1817D98CCAAB0465A457
gpg: DBG: chan_4 <- S DISP-SEX 9
gpg: DBG: chan_4 <- S EXTCAP gc=1+ki=1+fc=1+pd=0+mcl3=1216+aac=0+sm=2+si=0+dec=0+bt=0
gpg: DBG: chan_4 <- S APPTYPE OPENPGP
gpg: DBG: chan_4 <- S SERIALNO D2760001240102000000000000010000 0
gpg: DBG: chan_4 <- S READER REINER SCT cyberJack RFID basis 00 00
gpg: DBG: chan_4 <- S KEYPAIRINFO 21679AB1B97650047BAC34B163AA064E63B4DEAF OPENPGP.1
gpg: DBG: chan_4 <- OK
gpg: DBG: chan_4 -> SCD GETATTR KEY-ATTR
gpg: DBG: chan_4 <- S KEY-ATTR 1 1 rsa2048 17 4
gpg: DBG: chan_4 <- S KEY-ATTR 2 1 rsa2048 17 4
gpg: DBG: chan_4 <- S KEY-ATTR 3 1 rsa2048 17 4
gpg: DBG: chan_4 <- OK
gpg: DBG: get_keygrip for public key
gpg: DBG: keygrip= 21 67 9A B1 B9 76 50 04 7B AC 34 B1 63 AA 06 4E 63 B4 DE AF
gpg: DBG: [not enabled in the source] keydb_new
gpg: DBG: [not enabled in the source] keydb_search enter
gpg: DBG: keydb_search: 1 search descriptions:
gpg: DBG: keydb_search   0: LONG_KID: 'D98CCAAB0465A457'
gpg: DBG: keydb: kid_not_found_p (d98ccaab0465a457) => indeterminate
gpg: DBG: keydb_search: searching keyring (resource 0 of 1)
gpg: DBG: keyring_search: need_uid = 0; need_words = 0; need_keyid = 1; need_fpr = 0; any_skip = 0
gpg: DBG: fd_cache_open (/home/erik/.gnupg/pubring.gpg) not cached
gpg: DBG: iobuf-1.0: open '/home/erik/.gnupg/pubring.gpg' desc=file_filter(fd) fd=5
gpg: DBG: keyring_search: initializing offset table. (need_keyid: 1 => 1)
gpg: DBG: keyring_search: searching from start of resource.
gpg: DBG: iobuf-1.0: underflow: buffer size: 8192; still buffered: 0 => space for 8192 bytes
gpg: DBG: iobuf-1.0: underflow: A->FILTER (8192 bytes)
gpg: DBG: iobuf-1.0: A->FILTER() returned rc=0 (ok), read 8192 bytes
gpg: DBG: parse_packet(iob=1): type=6 length=525 (search.keyring.c.1115)
gpg: DBG: free_packet() type=6
gpg: DBG: parse_packet(iob=1): type=14 length=525 (search.keyring.c.1115)
gpg: DBG: free_packet() type=14
gpg: DBG: parse_packet(iob=1): type=6 length=525 (search.keyring.c.1115)
gpg: DBG: free_packet() type=6
gpg: DBG: parse_packet(iob=1): type=14 length=525 (search.keyring.c.1115)
gpg: DBG: free_packet() type=14
gpg: DBG: parse_packet(iob=1): type=6 length=525 (search.keyring.c.1115)
gpg: DBG: free_packet() type=6
gpg: DBG: iobuf-1.0: underflow: buffer size: 8192; still buffered: 0 => space for 8192 bytes
gpg: DBG: iobuf-1.0: underflow: A->FILTER (8192 bytes)
gpg: DBG: iobuf-1.0: A->FILTER() returned rc=0 (ok), read 8192 bytes
gpg: DBG: parse_packet(iob=1): type=14 length=525 (search.keyring.c.1115)
gpg: DBG: free_packet() type=14
gpg: DBG: parse_packet(iob=1): type=6 length=269 (search.keyring.c.1115)
gpg: DBG: free_packet() type=6
gpg: DBG: parse_packet(iob=1): type=14 length=269 (search.keyring.c.1115)
gpg: DBG: free_packet() type=14
gpg: DBG: parse_packet(iob=1): type=6 length=525 (search.keyring.c.1115)
gpg: DBG: free_packet() type=6
gpg: DBG: parse_packet(iob=1): type=14 length=525 (search.keyring.c.1115)
gpg: DBG: free_packet() type=14
gpg: DBG: parse_packet(iob=1): type=6 length=418 (search.keyring.c.1115)
gpg: DBG: free_packet() type=6
gpg: DBG: iobuf-1.0: underflow: buffer size: 8192; still buffered: 0 => space for 8192 bytes
gpg: DBG: iobuf-1.0: underflow: A->FILTER (8192 bytes)
gpg: DBG: iobuf-1.0: A->FILTER() returned rc=0 (ok), read 8192 bytes
gpg: DBG: parse_packet(iob=1): type=14 length=269 (search.keyring.c.1115)
gpg: DBG: free_packet() type=14
gpg: DBG: parse_packet(iob=1): type=6 length=525 (search.keyring.c.1115)
gpg: DBG: free_packet() type=6
gpg: DBG: parse_packet(iob=1): type=14 length=525 (search.keyring.c.1115)
gpg: DBG: free_packet() type=14
gpg: DBG: parse_packet(iob=1): type=6 length=525 (search.keyring.c.1115)
gpg: DBG: iobuf-1.0: underflow: buffer size: 8192; still buffered: 0 => space for 8192 bytes
gpg: DBG: iobuf-1.0: underflow: A->FILTER (8192 bytes)
gpg: DBG: iobuf-1.0: A->FILTER() returned rc=0 (ok), read 8192 bytes
gpg: DBG: free_packet() type=6
gpg: DBG: iobuf-1.0: underflow: buffer size: 8192; still buffered: 0 => space for 8192 bytes
gpg: DBG: iobuf-1.0: underflow: A->FILTER (8192 bytes)
gpg: DBG: iobuf-1.0: A->FILTER() returned rc=0 (ok), read 8192 bytes
gpg: DBG: parse_packet(iob=1): type=14 length=525 (search.keyring.c.1115)
gpg: DBG: free_packet() type=14
gpg: DBG: parse_packet(iob=1): type=6 length=525 (search.keyring.c.1115)
gpg: DBG: free_packet() type=6
gpg: DBG: iobuf-1.0: underflow: buffer size: 8192; still buffered: 0 => space for 8192 bytes
gpg: DBG: iobuf-1.0: underflow: A->FILTER (8192 bytes)
gpg: DBG: iobuf-1.0: A->FILTER() returned rc=0 (ok), read 8192 bytes
gpg: DBG: parse_packet(iob=1): type=14 length=525 (search.keyring.c.1115)
gpg: DBG: free_packet() type=14
gpg: DBG: parse_packet(iob=1): type=6 length=525 (search.keyring.c.1115)
gpg: DBG: free_packet() type=6
gpg: DBG: iobuf-1.0: underflow: buffer size: 8192; still buffered: 0 => space for 8192 bytes
gpg: DBG: iobuf-1.0: underflow: A->FILTER (8192 bytes)
gpg: DBG: iobuf-1.0: A->FILTER() returned rc=0 (ok), read 8192 bytes
gpg: DBG: parse_packet(iob=1): type=14 length=525 (search.keyring.c.1115)
gpg: DBG: free_packet() type=14
gpg: DBG: parse_packet(iob=1): type=6 length=525 (search.keyring.c.1115)
gpg: DBG: free_packet() type=6
gpg: DBG: parse_packet(iob=1): type=14 length=525 (search.keyring.c.1115)
gpg: DBG: free_packet() type=14
gpg: DBG: parse_packet(iob=1): type=6 length=525 (search.keyring.c.1115)
gpg: DBG: free_packet() type=6
gpg: DBG: iobuf-1.0: underflow: buffer size: 8192; still buffered: 0 => space for 8192 bytes
gpg: DBG: iobuf-1.0: underflow: A->FILTER (8192 bytes)
gpg: DBG: iobuf-1.0: A->FILTER() returned rc=0 (ok), read 8192 bytes
gpg: DBG: iobuf-1.0: underflow: buffer size: 8192; still buffered: 0 => space for 8192 bytes
gpg: DBG: iobuf-1.0: underflow: A->FILTER (8192 bytes)
gpg: DBG: iobuf-1.0: A->FILTER() returned rc=0 (ok), read 8192 bytes
gpg: DBG: parse_packet(iob=1): type=14 length=525 (search.keyring.c.1115)
gpg: DBG: free_packet() type=14
gpg: DBG: parse_packet(iob=1): type=14 length=525 (search.keyring.c.1115)
gpg: DBG: free_packet() type=14
gpg: DBG: parse_packet(iob=1): type=6 length=525 (search.keyring.c.1115)
gpg: DBG: free_packet() type=6
gpg: DBG: parse_packet(iob=1): type=14 length=525 (search.keyring.c.1115)
gpg: DBG: free_packet() type=14
gpg: DBG: parse_packet(iob=1): type=6 length=525 (search.keyring.c.1115)
gpg: DBG: free_packet() type=6
gpg: DBG: iobuf-1.0: underflow: buffer size: 8192; still buffered: 0 => space for 8192 bytes
gpg: DBG: iobuf-1.0: underflow: A->FILTER (8192 bytes)
gpg: DBG: iobuf-1.0: A->FILTER() returned rc=0 (ok), read 8192 bytes
gpg: DBG: parse_packet(iob=1): type=14 length=525 (search.keyring.c.1115)
gpg: DBG: iobuf-1.0: underflow: buffer size: 8192; still buffered: 0 => space for 8192 bytes
gpg: DBG: iobuf-1.0: underflow: A->FILTER (8192 bytes)
gpg: DBG: iobuf-1.0: A->FILTER() returned rc=0 (ok), read 8192 bytes
gpg: DBG: free_packet() type=14
gpg: DBG: parse_packet(iob=1): type=6 length=269 (search.keyring.c.1115)
gpg: DBG: free_packet() type=6
gpg: DBG: parse_packet(iob=1): type=14 length=269 (search.keyring.c.1115)
gpg: DBG: free_packet() type=14
gpg: DBG: parse_packet(iob=1): type=6 length=525 (search.keyring.c.1115)
gpg: DBG: free_packet() type=6
gpg: DBG: parse_packet(iob=1): type=14 length=525 (search.keyring.c.1115)
gpg: DBG: free_packet() type=14
gpg: DBG: parse_packet(iob=1): type=6 length=525 (search.keyring.c.1115)
gpg: DBG: free_packet() type=6
gpg: DBG: iobuf-1.0: underflow: buffer size: 8192; still buffered: 0 => space for 8192 bytes
gpg: DBG: iobuf-1.0: underflow: A->FILTER (8192 bytes)
gpg: DBG: iobuf-1.0: A->FILTER() returned rc=0 (ok), read 8192 bytes
gpg: DBG: iobuf-1.0: underflow: buffer size: 8192; still buffered: 0 => space for 8192 bytes
gpg: DBG: iobuf-1.0: underflow: A->FILTER (8192 bytes)
gpg: DBG: iobuf-1.0: A->FILTER() returned rc=0 (ok), read 8192 bytes
gpg: DBG: iobuf-1.0: underflow: buffer size: 8192; still buffered: 0 => space for 8192 bytes
gpg: DBG: iobuf-1.0: underflow: A->FILTER (8192 bytes)
gpg: DBG: iobuf-1.0: A->FILTER() returned rc=0 (ok), read 8192 bytes
gpg: DBG: iobuf-1.0: underflow: buffer size: 8192; still buffered: 0 => space for 8192 bytes
gpg: DBG: iobuf-1.0: underflow: A->FILTER (8192 bytes)
gpg: DBG: iobuf-1.0: A->FILTER() returned rc=0 (ok), read 8192 bytes
gpg: DBG: parse_packet(iob=1): type=14 length=525 (search.keyring.c.1115)
gpg: DBG: free_packet() type=14
gpg: DBG: parse_packet(iob=1): type=6 length=269 (search.keyring.c.1115)
gpg: DBG: free_packet() type=6
gpg: DBG: parse_packet(iob=1): type=14 length=261 (search.keyring.c.1115)
gpg: DBG: free_packet() type=14
gpg: DBG: parse_packet(iob=1): type=6 length=525 (search.keyring.c.1115)
gpg: DBG: free_packet() type=6
gpg: DBG: parse_packet(iob=1): type=14 length=525 (search.keyring.c.1115)
gpg: DBG: free_packet() type=14
gpg: DBG: parse_packet(iob=1): type=6 length=418 (search.keyring.c.1115)
gpg: DBG: free_packet() type=6
gpg: DBG: iobuf-1.0: underflow: buffer size: 8192; still buffered: 0 => space for 8192 bytes
gpg: DBG: iobuf-1.0: underflow: A->FILTER (8192 bytes)
gpg: DBG: iobuf-1.0: A->FILTER() returned rc=0 (ok), read 8192 bytes
gpg: DBG: iobuf-1.0: underflow: buffer size: 8192; still buffered: 0 => space for 8192 bytes
gpg: DBG: iobuf-1.0: underflow: A->FILTER (8192 bytes)
gpg: DBG: iobuf-1.0: A->FILTER() returned rc=0 (ok), read 8192 bytes
gpg: DBG: iobuf-1.0: underflow: buffer size: 8192; still buffered: 0 => space for 8192 bytes
gpg: DBG: iobuf-1.0: underflow: A->FILTER (8192 bytes)
gpg: DBG: iobuf-1.0: A->FILTER() returned rc=0 (ok), read 8192 bytes
gpg: DBG: parse_packet(iob=1): type=14 length=1037 (search.keyring.c.1115)
gpg: DBG: free_packet() type=14
gpg: DBG: iobuf-1.0: underflow: buffer size: 8192; still buffered: 0 => space for 8192 bytes
gpg: DBG: iobuf-1.0: underflow: A->FILTER (8192 bytes)
gpg: DBG: iobuf-1.0: A->FILTER() returned rc=0 (ok), read 2367 bytes
gpg: DBG: parse_packet(iob=1): type=6 length=525 (search.keyring.c.1115)
gpg: DBG: free_packet() type=6
gpg: DBG: parse_packet(iob=1): type=14 length=525 (search.keyring.c.1115)
gpg: DBG: free_packet() type=14
gpg: DBG: iobuf-1.0: underflow: buffer size: 8192; still buffered: 0 => space for 8192 bytes
gpg: DBG: iobuf-1.0: underflow: A->FILTER (8192 bytes)
gpg: DBG: iobuf-1.0: A->FILTER() returned rc=-1 (EOF), read 0 bytes
gpg: DBG: /home/erik/.gnupg/pubring.gpg: close fd/handle 5
gpg: DBG: fd_cache_close (/home/erik/.gnupg/pubring.gpg) new slot created
gpg: DBG: keyring_search: no matches (EOF)
gpg: DBG: keydb_search: searched keyring (resource 0 of 1) => EOF
gpg: DBG: keydb: kid_not_found_insert (d98ccaab0465a457)
gpg: DBG: [not enabled in the source] keydb_search leave (not found)
gpg: DBG: iobuf-1.0: close '?'
gpg: DBG: chan_4 -> RESET
gpg: DBG: chan_4 <- OK
gpg: DBG: chan_4 -> SIGKEY 21679AB1B97650047BAC34B163AA064E63B4DEAF
gpg: DBG: chan_4 <- OK
gpg: DBG: chan_4 -> SETKEYDESC Please+enter+the+passphrase+to+unlock+the+OpenPGP+secret+key:%0A%22[User+ID+not+found]%22%0A2048-bit+RSA+key,+ID+0465A457,%0Acreated+2016-04-07.%0A
gpg: DBG: chan_4 <- OK
gpg: DBG: chan_4 -> SETHASH 8 2E0579774217718B235D6DD367B66EF10E838E3F3B4DC9C3E9D103F0AC9F6146
gpg: DBG: chan_4 <- OK
gpg: DBG: chan_4 -> PKSIGN
gpg: DBG: chan_4 <- ERR 16777224 Falsche Unterschrift <gcrypt>
gpg: signing failed: Bad signature
gpg: make_keysig_packet failed: Bad signature
Key generation failed: Bad signature
gpg: DBG: free_packet() type=6
gpg: DBG: free_packet() type=13
gpg: DBG: chan_4 -> SCD SETATTR CHV-STATUS-1 %00
gpg: DBG: chan_4 <- OK 


More information about the Gnupg-devel mailing list