(?) Problems building and running gpg on Tru64 v5.1

Renato Martini rmartini@cipsga.org.br
Tue Jun 11 20:07:02 2002


--=.5ON(D9YN?Jowmo
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

On Tue, 11 Jun 2002 14:31:00 GMT
Jay Leafey <jleafey@utmem.edu> wrote:


Hi Jay!

If you wish, you'll can download a *precompiled* package of GnuPG for Tru64 Unix.
Visit: http://gnupg.unixsecurity.com.br

best regards

> I've attempted to build gnupg v1.0.7 on several Compaq Tru64 v5.1 boxes and run into some problems.  Specifically, I keep getting the message "gpg: out of  memory while allocating 0 bytes" during the 'make check' phase of the build.  Since Tru64 doesn't have /dev/random or /dev/urandom I have installed and tried both egc and prng and get the same results with both.  Here's the commands I use to build gnupg:
> 
> CC=cc \
> CPPFLAGS="-I/usr/local/include" \
> ./configure \
>         --enable-static-rnd=egd \
>         --disable-dev-random \
>         --disable-ldap
> 
> make
> 
> It always ends up this way:
> 
> make  all-am
> Making all in checks
> ../g10/gpg --homedir . --quiet --yes --import ./pubdemo.asc      
> gpg: out of  memory while allocating 0 bytes
> *** Exit 2
> Stop.
> *** Exit 1
> Stop.
> *** Exit 1
> Stop.
> 
> I have tried linking checks/entropy to the 'real' entropy pool, using both egd and prng, and still get the same error.  If I run gpg from the installed directories to generate a key, here's what I get:
> 
> $ ./gpg --gen-key
> gpg (GnuPG) 1.0.7; Copyright (C) 2002 Free Software Foundation, Inc.
> This program comes with ABSOLUTELY NO WARRANTY.
> This is free software, and you are welcome to redistribute it
> under certain conditions. See the file COPYING for details.
> 
> Please select what kind of key you want:
>    (1) DSA and ElGamal (default)
>    (2) DSA (sign only)
>    (4) ElGamal (sign and encrypt)
>    (5) RSA (sign only)
> Your selection? 1
> DSA keypair will have 1024 bits.
> About to generate a new ELG-E keypair.
>               minimum keysize is  768 bits
>               default keysize is 1024 bits
>     highest suggested keysize is 2048 bits
> What keysize do you want? (1024) 
> Requested keysize is 1024 bits   
> Please specify how long the key should be valid.
>          0 = key does not expire
>       <n>  = key expires in n days
>       <n>w = key expires in n weeks
>       <n>m = key expires in n months
>       <n>y = key expires in n years
> Key is valid for? (0) 1
> Key expires at Wed Jun 12 09:26:47 2002 CDT
> Is this correct (y/n)? y
>                         
> You need a User-ID to identify your key; the software constructs the user id
> from Real Name, Comment and Email Address in this form:
>     "Heinrich Heine (Der Dichter) <heinrichh@duesseldorf.de>"
> 
> Real name: Test Key
> Email address: root@foo.bar
> Comment: Test Key, expires in 1 day 
> You selected this USER-ID:         
>     "Test Key (Test Key, expires in 1 day) <root@foo.bar>"
> 
> Change (N)ame, (C)omment, (E)mail or (O)kay/(Q)uit? o
> You need a Passphrase to protect your secret key.    
> 
> We need to generate a lot of random bytes. It is a good idea to perform
> some other action (type on the keyboard, move the mouse, utilize the
> disks) during the prime generation; this gives the random number
> generator a better chance to gain enough entropy.
> ++++++++++++++++++++..++++++++++++++++++++++++++++++....++++++++++++++++++++++++++++++++++++++++++++++++++..+++++.+++++++++++++++++++++++++>.++++++++++...>+++++........+++++
> Please wait, entropy is being gathered. Do some work if it would
> keep you from getting bored, because it will improve the quality
> of the entropy.
> gpg: out of  memory while allocating 0 bytes
> $
> 
> egc.pl indicates there is still plenty of entropy available in the pool, so I don't think that's the problem, and also indicates that the program did indeed drain some bits from the entropy pool.  The make and cc used to build were the standard utilities shipped with Tru64.  Anybody have any thoughts?
> 
> Thanks!
> Jay
> ---
> Jay Leafey - University of Tennessee Health Science Center
> E-Mail:  jleafey@utmem.edu  Phone:  901-448-5848  FAX:  901-448-8199
> 
> 
> _______________________________________________
> Gnupg-users mailing list
> Gnupg-users@gnupg.org
> http://lists.gnupg.org/mailman/listinfo/gnupg-users
> 


----------

  __|_ _| _ \  __|  __|   \    | Renato Martini ::: Diretor Administrativo
 (     |  __/\__ \ (_ |  _ \   | http://www.cipsga.org.br
\___|___|_|  ____/\___|_/  _\  | http://gnupg.unixsecurity.com.br
-----------------------------------------------------------------------
          **Please sign or encrypt for Internet privacy**
-----------------------------------------------------------------------
"O Fantasia, che dei tempi e delle distanze fai il tuo giuoco audace!"
                         (Gabriele d'Annunzio)


--=.5ON(D9YN?Jowmo
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQE9Bj2OYogE2yD8bPYRAgSoAJ45OzgCS1WBitD5pFIHNtiSX8KM5ACg0w0M
qqatzBWCqVcnqK76LRGZDPU=
=ycG5
-----END PGP SIGNATURE-----

--=.5ON(D9YN?Jowmo--