Problem with gpg smartcard / 4096bits keys

Emmanuel JOORIS emmanuel.jooris at gmail.com
Thu Nov 17 16:09:31 CET 2011


Here a full log, before i stop system pcscd but i seams that it is
reload by gpg2.
Also, i success to create or load and use 3072 bits keys.

mahoru at debian:~/.gnupg$ gpg2 --card-edit

scdaemon[3299]: enabled debug flags: cardio
scdaemon[3299]: listening on socket `/tmp/gpg-9QyA9z/S.scdaemon'
scdaemon[3299]: handler for fd -1 started
scdaemon[3299]: reader slot 0: not connected
scdaemon[3299]: slot 0: ATR=3B DA 18 FF 81 B1 FE 75 1F 03 00 31 C5 73
C0 01 40 00 90 00 0C
scdaemon[3299]: DBG: send apdu: c=00 i=A4 p1=00 p2=0C lc=2 le=-1 em=0
scdaemon[3299]: DBG:   PCSC_data: 00 A4 00 0C 02 3F 00
scdaemon[3299]: DBG:  response: sw=6B00  datalen=0
scdaemon[3299]: DBG: send apdu: c=00 i=A4 p1=04 p2=00 lc=6 le=-1 em=0
scdaemon[3299]: DBG:   PCSC_data: 00 A4 04 00 06 D2 76 00 01 24 01
scdaemon[3299]: DBG:  response: sw=9000  datalen=0
scdaemon[3299]: DBG:     dump:
scdaemon[3299]: DBG: send apdu: c=00 i=CA p1=00 p2=4F lc=-1 le=256 em=0
scdaemon[3299]: DBG:   PCSC_data: 00 CA 00 4F 00
scdaemon[3299]: DBG:  response: sw=9000  datalen=16
scdaemon[3299]: DBG:       dump:  D2 76 00 01 24 01 02 00 00 05 00 00
10 E5 00 00
scdaemon[3299]: AID: D2 76 00 01 24 01 02 00 00 05 00 00 10 E5 00 00
scdaemon[3299]: DBG: send apdu: c=00 i=CA p1=5F p2=52 lc=-1 le=256 em=0
scdaemon[3299]: DBG:   PCSC_data: 00 CA 5F 52 00
scdaemon[3299]: DBG:  response: sw=9000  datalen=10
scdaemon[3299]: DBG:       dump:  00 31 C5 73 C0 01 40 05 90 00
scdaemon[3299]: Historical Bytes: 00 31 C5 73 C0 01 40 05 90 00
scdaemon[3299]: DBG: send apdu: c=00 i=CA p1=00 p2=C4 lc=-1 le=256 em=0
scdaemon[3299]: DBG:   PCSC_data: 00 CA 00 C4 00
scdaemon[3299]: DBG:  response: sw=9000  datalen=7
scdaemon[3299]: DBG:       dump:  01 20 20 20 03 00 03
scdaemon[3299]: DBG: send apdu: c=00 i=CA p1=00 p2=6E lc=-1 le=256 em=0
scdaemon[3299]: DBG:   PCSC_data: 00 CA 00 6E 00
scdaemon[3299]: DBG:  response: sw=9000  datalen=217
scdaemon[3299]: DBG:       dump:  4F 10 D2 76 00 01 24 01 02 00 00 05
00 00 10 E5 00 00 5F 52 0A 00 31 C5 73 C0 01 40 05 90 00 73 81 B7 C0
0A 7C 00 08 00 08 00 08 00 08 00 C1 06 01 10 00 00 20 00 C2 06 01 10
00 00 20 00 C3 06 01 10 00 00 20 00 C4 07 01 20 20 20 03 00 03 C5 3C
64 89 1D 7C 09 CC 65 8A 31 B2 D1 A4 90 2E 9E 03 D6 1B A0 38 87 A7 40
2C 8B 32 E3 80 8A 41 95 32 6D BC 54 33 FF A4 6E BA 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 C6 3C 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 CD 0C 4E C3 D4 75 4E C3 D4 75 00 00 00 00
scdaemon[3299]: DBG: send apdu: c=00 i=CA p1=00 p2=5E lc=-1 le=256 em=0
scdaemon[3299]: DBG:   PCSC_data: 00 CA 00 5E 00
scdaemon[3299]: DBG:  response: sw=9000  datalen=0
scdaemon[3299]: DBG:       dump:
scdaemon[3299]: Version-2 ......: yes
scdaemon[3299]: Get-Challenge ..: yes (2048 bytes max)
scdaemon[3299]: Key-Import .....: yes
scdaemon[3299]: Change-Force-PW1: yes
scdaemon[3299]: Private-DOs ....: yes
scdaemon[3299]: Algo-Attr-Change: yes
scdaemon[3299]: SM-Support .....: no
scdaemon[3299]: Max-Cert3-Len ..: 2048
scdaemon[3299]: Max-Cmd-Data ...: 2048
scdaemon[3299]: Max-Rsp-Data ...: 2048
scdaemon[3299]: Cmd-Chaining ...: no
scdaemon[3299]: Ext-Lc-Le ......: yes
scdaemon[3299]: Status Indicator: 05
scdaemon[3299]: GnuPG-No-Sync ..: no
scdaemon[3299]: GnuPG-Def-PW2 ..: no
scdaemon[3299]: DBG: send apdu: c=00 i=CA p1=00 p2=6E lc=-1 le=256 em=0
scdaemon[3299]: DBG:   PCSC_data: 00 CA 00 6E 00
scdaemon[3299]: DBG:  response: sw=9000  datalen=217
scdaemon[3299]: DBG:       dump:  4F 10 D2 76 00 01 24 01 02 00 00 05
00 00 10 E5 00 00 5F 52 0A 00 31 C5 73 C0 01 40 05 90 00 73 81 B7 C0
0A 7C 00 08 00 08 00 08 00 08 00 C1 06 01 10 00 00 20 00 C2 06 01 10
00 00 20 00 C3 06 01 10 00 00 20 00 C4 07 01 20 20 20 03 00 03 C5 3C
64 89 1D 7C 09 CC 65 8A 31 B2 D1 A4 90 2E 9E 03 D6 1B A0 38 87 A7 40
2C 8B 32 E3 80 8A 41 95 32 6D BC 54 33 FF A4 6E BA 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 C6 3C 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 CD 0C 4E C3 D4 75 4E C3 D4 75 00 00 00 00
scdaemon[3299]: Key-Attr-sign ..: RSA, n=4096, e=32, fmt=std
scdaemon[3299]: DBG: send apdu: c=00 i=CA p1=00 p2=6E lc=-1 le=256 em=0
scdaemon[3299]: DBG:   PCSC_data: 00 CA 00 6E 00
scdaemon[3299]: DBG:  response: sw=9000  datalen=217
scdaemon[3299]: DBG:       dump:  4F 10 D2 76 00 01 24 01 02 00 00 05
00 00 10 E5 00 00 5F 52 0A 00 31 C5 73 C0 01 40 05 90 00 73 81 B7 C0
0A 7C 00 08 00 08 00 08 00 08 00 C1 06 01 10 00 00 20 00 C2 06 01 10
00 00 20 00 C3 06 01 10 00 00 20 00 C4 07 01 20 20 20 03 00 03 C5 3C
64 89 1D 7C 09 CC 65 8A 31 B2 D1 A4 90 2E 9E 03 D6 1B A0 38 87 A7 40
2C 8B 32 E3 80 8A 41 95 32 6D BC 54 33 FF A4 6E BA 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 C6 3C 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 CD 0C 4E C3 D4 75 4E C3 D4 75 00 00 00 00
scdaemon[3299]: Key-Attr-encr ..: RSA, n=4096, e=32, fmt=std
scdaemon[3299]: DBG: send apdu: c=00 i=CA p1=00 p2=6E lc=-1 le=256 em=0
scdaemon[3299]: DBG:   PCSC_data: 00 CA 00 6E 00
scdaemon[3299]: DBG:  response: sw=9000  datalen=217
scdaemon[3299]: DBG:       dump:  4F 10 D2 76 00 01 24 01 02 00 00 05
00 00 10 E5 00 00 5F 52 0A 00 31 C5 73 C0 01 40 05 90 00 73 81 B7 C0
0A 7C 00 08 00 08 00 08 00 08 00 C1 06 01 10 00 00 20 00 C2 06 01 10
00 00 20 00 C3 06 01 10 00 00 20 00 C4 07 01 20 20 20 03 00 03 C5 3C
64 89 1D 7C 09 CC 65 8A 31 B2 D1 A4 90 2E 9E 03 D6 1B A0 38 87 A7 40
2C 8B 32 E3 80 8A 41 95 32 6D BC 54 33 FF A4 6E BA 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 C6 3C 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 CD 0C 4E C3 D4 75 4E C3 D4 75 00 00 00 00
scdaemon[3299]: Key-Attr-auth ..: RSA, n=4096, e=32, fmt=std
scdaemon[3299]: DBG: send apdu: c=00 i=CA p1=00 p2=65 lc=-1 le=256 em=0
scdaemon[3299]: DBG:   PCSC_data: 00 CA 00 65 00
scdaemon[3299]: DBG:  response: sw=9000  datalen=27
scdaemon[3299]: DBG:       dump:  5B 10 4A 4F 4F 52 49 53 3C 3C 45 6D
6D 61 6E 75 65 6C 5F 2D 02 66 72 5F 35 01 31
scdaemon[3299]: DBG: send apdu: c=00 i=CA p1=5F p2=50 lc=-1 le=256 em=0
scdaemon[3299]: DBG:   PCSC_data: 00 CA 5F 50 00
scdaemon[3299]: DBG:  response: sw=9000  datalen=68
scdaemon[3299]: DBG:       dump:  68 74 74 70 3A 2F 2F 70 67 70 2E 6D
69 74 2E 65 64 75 3A 31 31 33 37 31 2F 70 6B 73 2F 6C 6F 6F 6B 75 70
3F 6F 70 3D 67 65 74 26 73 65 61 72 63 68 3D 30 78 45 46 38 31 46 37
32 43 32 39 41 39 44 36 45 46
scdaemon[3299]: DBG: send apdu: c=00 i=CA p1=00 p2=6E lc=-1 le=256 em=0
scdaemon[3299]: DBG:   PCSC_data: 00 CA 00 6E 00
scdaemon[3299]: DBG:  response: sw=9000  datalen=217
scdaemon[3299]: DBG:       dump:  4F 10 D2 76 00 01 24 01 02 00 00 05
00 00 10 E5 00 00 5F 52 0A 00 31 C5 73 C0 01 40 05 90 00 73 81 B7 C0
0A 7C 00 08 00 08 00 08 00 08 00 C1 06 01 10 00 00 20 00 C2 06 01 10
00 00 20 00 C3 06 01 10 00 00 20 00 C4 07 01 20 20 20 03 00 03 C5 3C
64 89 1D 7C 09 CC 65 8A 31 B2 D1 A4 90 2E 9E 03 D6 1B A0 38 87 A7 40
2C 8B 32 E3 80 8A 41 95 32 6D BC 54 33 FF A4 6E BA 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 C6 3C 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 CD 0C 4E C3 D4 75 4E C3 D4 75 00 00 00 00
scdaemon[3299]: DBG: send apdu: c=00 i=CA p1=00 p2=C4 lc=-1 le=256 em=0
scdaemon[3299]: DBG:   PCSC_data: 00 CA 00 C4 00
scdaemon[3299]: DBG:  response: sw=9000  datalen=7
scdaemon[3299]: DBG:       dump:  01 20 20 20 03 00 03
scdaemon[3299]: DBG: send apdu: c=00 i=CA p1=00 p2=7A lc=-1 le=256 em=0
scdaemon[3299]: DBG:   PCSC_data: 00 CA 00 7A 00
scdaemon[3299]: DBG:  response: sw=9000  datalen=5
scdaemon[3299]: DBG:       dump:  93 03 00 00 01
scdaemon[3299]: DBG: send apdu: c=00 i=CA p1=01 p2=01 lc=-1 le=256 em=0
scdaemon[3299]: DBG:   PCSC_data: 00 CA 01 01 00
scdaemon[3299]: DBG:  response: sw=9000  datalen=0
scdaemon[3299]: DBG:       dump:
scdaemon[3299]: DBG: send apdu: c=00 i=CA p1=01 p2=02 lc=-1 le=256 em=0
scdaemon[3299]: DBG:   PCSC_data: 00 CA 01 02 00
scdaemon[3299]: DBG:  response: sw=9000  datalen=0
scdaemon[3299]: DBG:       dump:
scdaemon[3299]: DBG: send apdu: c=00 i=47 p1=81 p2=00 lc=2 le=2048 em=1
scdaemon[3299]: DBG:   PCSC_data: 00 47 81 00 00 00 02 B6 00 08 00
scdaemon[3299]: DBG:  response: sw=9000  datalen=527
scdaemon[3299]: DBG:       dump:  7F 49 82 02 0A 81 82 02 00 BF 41 94
00 D8 8C DF AA 8F AB 59 52 8D AF 3C 67 E1 76 0D 70 55 81 8A E0 1E 0E
E4 A4 BC FC C9 3D 9B 25 A5 E0 8E 0C FB 14 00 C3 8F AE 16 AE C4 62 2A
84 41 B0 3D 2E 3A 19 F8 85 23 E8 96 69 67 CF 86 3A DF BB B6 F2 4F 0D
8F 2D EB DF 5B FE 13 6C BC B9 A7 89 E6 07 C7 45 75 AA BD 99 2A 94 02
45 11 6B 63 64 6B 1D C6 EB 21 1D C2 2F 54 45 0A 3F 1E 4C CA F1 0D 38
BB 2D 1C 3F 02 76 9E 99 1B 2E 8D 63 20 8C 2B 41 71 3B D7 78 0D 0F 7D
3D 88 0C 65 01 D9 A1 57 D0 48 56 9D F1 02 D2 30 7D 67 2C 83 21 E1 AA
B3 A7 52 8D 3D E7 38 6A 40 16 C5 D2 4D 8C B1 6C A3 C3 3C 8A EA 94 50
1B 2C 51 3F 19 E8 DA 68 F4 7E AA 68 FE 44 2E 79 A1 09 23 09 25 44 88
63 0C 1B 6A D8 90 9B E4 40 86 62 03 D3 A6 B6 78 6A 07 8A 6E 16 FE 6B
10 10 AF EB 7A 8F 8C 65 63 E5 15 91 4C 0A 07 A5 3C 1E 99 9D FD 36 9F
05 18 D4 6A EB 81 36 C0 87 CD 7C 31 57 1F 04 38 75 9B CB 3D 87 30 1C
E3 49 8F B7 B4 48 E9 46 A2 2F CF CD F4 FB 49 7E 3C 6B 2B 92 20 C0 19
F9 32 A2 E0 EF D6 E3 ED 47 26 91 E9 D7 17 7B 63 76 53 31 FC 95 3E 53
14 B1 27 04 D7 AC 16 7F 85 F2 1A E9 BF D5 53 4C A1 87 40 0E B3 54 92
20 52 F5 CE 49 9E 07 84 CF 25 84 76 27 E6 B8 73 1D A4 D6 8E 98 7A 83
80 31 C9 3C 04 20 B9 9B 49 E5 70 61 85 D1 22 8D D1 F9 99 FA 3F 87 77
38 BC 85 BD 79 11 0A 07 01 CB E6 03 8D 90 FA 81 4E 2F AC 2D CE 5D 46
A5 8D C3 4B 0C 56 24 B5 B8 DB 3C A0 4E B1 BF D8 4B 82 29 8A EE DD E9
01 9B 06 F9 F7 6F E9 75 81 89 F2 70 88 6E D9 BA 48 28 31 10 DF 85 7E
5C 93 80 5C B1 9B CE 4A E7 07 C9 32 94 C7 E0 5A DA 5D E5 10 83 35 35
31 8D 6B 9C 4D CB 28 B4 9A 2D 22 63 D7 6F C1 9D 4A 58 24 BB 08 5E 44
E3 F5 5B 82 04 00 01 00 01
scdaemon[3299]: DBG: send apdu: c=00 i=47 p1=81 p2=00 lc=2 le=2048 em=1
scdaemon[3299]: DBG:   PCSC_data: 00 47 81 00 00 00 02 B8 00 08 00
scdaemon[3299]: DBG:  response: sw=9000  datalen=527
scdaemon[3299]: DBG:       dump:  7F 49 82 02 0A 81 82 02 00 D2 B8 FE
17 D2 42 D7 B1 39 20 BE B8 71 64 BA 95 0C AA A0 BD 48 2F 6D F1 B8 36
56 41 E3 E2 97 3B 96 76 60 A2 DA 73 1C AA 33 32 FD F6 8F CE 34 47 56
3D 8A 88 D3 30 40 02 77 4F F5 A1 D3 1A B8 CE 07 37 58 75 3E 05 1A F7
3C 51 C0 03 F7 B8 88 F3 C1 80 6C 0D 0B 6D 1B A0 D8 50 9A F7 06 B5 C5
CC 83 D6 9E 47 E3 B3 27 24 9C 4E 86 AE 0F A6 85 79 0D 0F 8F 90 29 BB
BC EC 4A D4 FD 57 47 B5 81 05 85 6C C7 36 27 C0 75 BA E3 3B DB 9E 0E
20 4D BA E2 81 04 C3 B8 90 7B 23 DE BA 0E 28 70 00 E0 8E 23 8F D2 0E
A4 D9 6B 25 50 D9 66 A0 3E EA 36 95 55 14 BA 24 F6 D7 94 C0 34 FE 6F
AB DF 4A E7 BE DF 50 F8 75 9D E1 CD 00 9A 1B 64 DB 95 BE 64 E0 E4 2E
CC D6 77 0F D5 30 5B C6 7A D9 30 E4 A0 F0 8E 3D 93 04 E0 12 8C 63 19
F4 04 63 38 17 45 46 F5 4B E0 B9 68 28 C8 FF 0F 3D DC 3E 48 7F 16 C4
CC B7 3D 29 AF 13 1E 8E EF 8B CB D5 7A 85 97 44 C6 76 CB 6A 09 EB B4
F0 A3 C8 36 35 B4 22 3F 9B 0F 48 BF 2D DC C8 2F 11 33 A1 50 E2 6E 91
2C 65 50 FC D2 C1 76 AB A0 27 8E 71 D0 A0 A5 9A 64 C7 4C A2 DC 58 64
93 3A 94 E7 CE AC EC 5B 99 01 23 E8 69 30 40 C0 80 86 CE 57 CD DB F7
6E E5 36 7F 34 65 93 C2 A2 BC 07 CB D6 CC A3 0D 1D C2 A2 F1 3C 04 4D
B8 EA B9 AF C0 1C C6 6B D4 92 DD C3 0D 13 B9 33 C8 CD 22 64 CF F7 F7
C7 C8 ED 4D 11 90 81 A0 6F CC 8D EA BE 4E 79 EA 3C 6B D8 82 4D B8 7D
C5 30 85 F8 75 BD 99 6A CA 1A 2E 5D 9D C4 0E 94 D7 E0 08 BE BC 39 74
76 A9 CF 44 8B 8F 18 78 3A 72 10 9A D4 8F ED 94 34 A2 CA 81 55 D9 34
1D 68 C0 F8 1B 04 55 9F 44 45 0F 80 F3 F9 36 5B 1E 30 00 8D 92 06 7A
E6 07 63 C1 EC 08 AE A1 A5 D8 A1 84 3C B2 8F 9B 5E C5 F3 B0 66 18 BF
FE 0D B5 82 04 00 01 00 01
scdaemon[3299]: DBG: send apdu: c=00 i=47 p1=81 p2=00 lc=2 le=2048 em=1
scdaemon[3299]: DBG:   PCSC_data: 00 47 81 00 00 00 02 A4 00 08 00
scdaemon[3299]: DBG:  response: sw=6A88  datalen=0
scdaemon[3299]: la lecture de la clé publique a échoué: Élément
manquant dans l'objet
Application ID ...: D2760001240102000005000010E50000
Version ..........: 2.0
Manufacturer .....: ZeitControl
Serial number ....: 000010E5
Name of cardholder: Emmanuel JOORIS
Language prefs ...: fr
Sex ..............: masculin
URL of public key :
http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xEF81F72C29A9D6EF
Login data .......: [non positionné]
Signature PIN ....: non forcé
Key attributes ...: 4096R 4096R 4096R
Max. PIN lengths .: 32 32 32
PIN retry counter : 3 0 3
Signature counter : 1
Signature key ....: 6489 1D7C 09CC 658A 31B2  D1A4 902E 9E03 D61B A038
      created ....: 2011-11-16 15:19:17
Encryption key....: 87A7 402C 8B32 E380 8A41  9532 6DBC 5433 FFA4 6EBA
      created ....: 2011-11-16 15:19:17
Authentication key: [none]
General key info..: [none]

gpg/card> scdaemon[3299]: updating slot 0 status: 0x0000->0x0007 (0->1)
admin
Les commandes d'administration sont permises

gpg/card> generate
scdaemon[3299]: DBG: send apdu: c=00 i=CA p1=00 p2=C4 lc=-1 le=256 em=0
scdaemon[3299]: DBG:   PCSC_data: 00 CA 00 C4 00
scdaemon[3299]: DBG:  response: sw=9000  datalen=7
scdaemon[3299]: DBG:       dump:  01 20 20 20 03 00 03
Faire une sauvegarde hors carte de la clé de chiffrement ? (O/n) n
gpg: signal Interrupt caught ... exiting
scdaemon[3299]: SIGINT received - immediate shutdown
scdaemon[3299]: scdaemon (GnuPG) 2.0.18 stopped
scdaemon[3299]: error sending PC/SC CLOSE request: Relais brisé (pipe)

mahoru at debian:~/.gnupg$ killall pcscd
mahoru at debian:~/.gnupg$ killall pcscd
pcscd: aucun processus trouvé
mahoru at debian:~/.gnupg$ LANG=C gpg2 --card-edit

scdaemon[3313]: enabled debug flags: cardio
scdaemon[3313]: listening on socket `/tmp/gpg-ielsWY/S.scdaemon'
scdaemon[3313]: handler for fd -1 started
scdaemon[3313]: reader slot 0: not connected
scdaemon[3313]: slot 0: ATR=3B DA 18 FF 81 B1 FE 75 1F 03 00 31 C5 73
C0 01 40 00 90 00 0C
scdaemon[3313]: DBG: send apdu: c=00 i=A4 p1=00 p2=0C lc=2 le=-1 em=0
scdaemon[3313]: DBG:   PCSC_data: 00 A4 00 0C 02 3F 00
scdaemon[3313]: DBG:  response: sw=6B00  datalen=0
scdaemon[3313]: DBG: send apdu: c=00 i=A4 p1=04 p2=00 lc=6 le=-1 em=0
scdaemon[3313]: DBG:   PCSC_data: 00 A4 04 00 06 D2 76 00 01 24 01
scdaemon[3313]: DBG:  response: sw=9000  datalen=0
scdaemon[3313]: DBG:     dump:
scdaemon[3313]: DBG: send apdu: c=00 i=CA p1=00 p2=4F lc=-1 le=256 em=0
scdaemon[3313]: DBG:   PCSC_data: 00 CA 00 4F 00
scdaemon[3313]: DBG:  response: sw=9000  datalen=16
scdaemon[3313]: DBG:       dump:  D2 76 00 01 24 01 02 00 00 05 00 00
10 E5 00 00
scdaemon[3313]: AID: D2 76 00 01 24 01 02 00 00 05 00 00 10 E5 00 00
scdaemon[3313]: DBG: send apdu: c=00 i=CA p1=5F p2=52 lc=-1 le=256 em=0
scdaemon[3313]: DBG:   PCSC_data: 00 CA 5F 52 00
scdaemon[3313]: DBG:  response: sw=9000  datalen=10
scdaemon[3313]: DBG:       dump:  00 31 C5 73 C0 01 40 05 90 00
scdaemon[3313]: Historical Bytes: 00 31 C5 73 C0 01 40 05 90 00
scdaemon[3313]: DBG: send apdu: c=00 i=CA p1=00 p2=C4 lc=-1 le=256 em=0
scdaemon[3313]: DBG:   PCSC_data: 00 CA 00 C4 00
scdaemon[3313]: DBG:  response: sw=9000  datalen=7
scdaemon[3313]: DBG:       dump:  01 20 20 20 03 00 03
scdaemon[3313]: DBG: send apdu: c=00 i=CA p1=00 p2=6E lc=-1 le=256 em=0
scdaemon[3313]: DBG:   PCSC_data: 00 CA 00 6E 00
scdaemon[3313]: DBG:  response: sw=9000  datalen=217
scdaemon[3313]: DBG:       dump:  4F 10 D2 76 00 01 24 01 02 00 00 05
00 00 10 E5 00 00 5F 52 0A 00 31 C5 73 C0 01 40 05 90 00 73 81 B7 C0
0A 7C 00 08 00 08 00 08 00 08 00 C1 06 01 10 00 00 20 00 C2 06 01 10
00 00 20 00 C3 06 01 10 00 00 20 00 C4 07 01 20 20 20 03 00 03 C5 3C
64 89 1D 7C 09 CC 65 8A 31 B2 D1 A4 90 2E 9E 03 D6 1B A0 38 87 A7 40
2C 8B 32 E3 80 8A 41 95 32 6D BC 54 33 FF A4 6E BA 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 C6 3C 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 CD 0C 4E C3 D4 75 4E C3 D4 75 00 00 00 00
scdaemon[3313]: DBG: send apdu: c=00 i=CA p1=00 p2=5E lc=-1 le=256 em=0
scdaemon[3313]: DBG:   PCSC_data: 00 CA 00 5E 00
scdaemon[3313]: DBG:  response: sw=9000  datalen=0
scdaemon[3313]: DBG:       dump:
scdaemon[3313]: Version-2 ......: yes
scdaemon[3313]: Get-Challenge ..: yes (2048 bytes max)
scdaemon[3313]: Key-Import .....: yes
scdaemon[3313]: Change-Force-PW1: yes
scdaemon[3313]: Private-DOs ....: yes
scdaemon[3313]: Algo-Attr-Change: yes
scdaemon[3313]: SM-Support .....: no
scdaemon[3313]: Max-Cert3-Len ..: 2048
scdaemon[3313]: Max-Cmd-Data ...: 2048
scdaemon[3313]: Max-Rsp-Data ...: 2048
scdaemon[3313]: Cmd-Chaining ...: no
scdaemon[3313]: Ext-Lc-Le ......: yes
scdaemon[3313]: Status Indicator: 05
scdaemon[3313]: GnuPG-No-Sync ..: no
scdaemon[3313]: GnuPG-Def-PW2 ..: no
scdaemon[3313]: DBG: send apdu: c=00 i=CA p1=00 p2=6E lc=-1 le=256 em=0
scdaemon[3313]: DBG:   PCSC_data: 00 CA 00 6E 00
scdaemon[3313]: DBG:  response: sw=9000  datalen=217
scdaemon[3313]: DBG:       dump:  4F 10 D2 76 00 01 24 01 02 00 00 05
00 00 10 E5 00 00 5F 52 0A 00 31 C5 73 C0 01 40 05 90 00 73 81 B7 C0
0A 7C 00 08 00 08 00 08 00 08 00 C1 06 01 10 00 00 20 00 C2 06 01 10
00 00 20 00 C3 06 01 10 00 00 20 00 C4 07 01 20 20 20 03 00 03 C5 3C
64 89 1D 7C 09 CC 65 8A 31 B2 D1 A4 90 2E 9E 03 D6 1B A0 38 87 A7 40
2C 8B 32 E3 80 8A 41 95 32 6D BC 54 33 FF A4 6E BA 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 C6 3C 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 CD 0C 4E C3 D4 75 4E C3 D4 75 00 00 00 00
scdaemon[3313]: Key-Attr-sign ..: RSA, n=4096, e=32, fmt=std
scdaemon[3313]: DBG: send apdu: c=00 i=CA p1=00 p2=6E lc=-1 le=256 em=0
scdaemon[3313]: DBG:   PCSC_data: 00 CA 00 6E 00
scdaemon[3313]: DBG:  response: sw=9000  datalen=217
scdaemon[3313]: DBG:       dump:  4F 10 D2 76 00 01 24 01 02 00 00 05
00 00 10 E5 00 00 5F 52 0A 00 31 C5 73 C0 01 40 05 90 00 73 81 B7 C0
0A 7C 00 08 00 08 00 08 00 08 00 C1 06 01 10 00 00 20 00 C2 06 01 10
00 00 20 00 C3 06 01 10 00 00 20 00 C4 07 01 20 20 20 03 00 03 C5 3C
64 89 1D 7C 09 CC 65 8A 31 B2 D1 A4 90 2E 9E 03 D6 1B A0 38 87 A7 40
2C 8B 32 E3 80 8A 41 95 32 6D BC 54 33 FF A4 6E BA 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 C6 3C 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 CD 0C 4E C3 D4 75 4E C3 D4 75 00 00 00 00
scdaemon[3313]: Key-Attr-encr ..: RSA, n=4096, e=32, fmt=std
scdaemon[3313]: DBG: send apdu: c=00 i=CA p1=00 p2=6E lc=-1 le=256 em=0
scdaemon[3313]: DBG:   PCSC_data: 00 CA 00 6E 00
scdaemon[3313]: DBG:  response: sw=9000  datalen=217
scdaemon[3313]: DBG:       dump:  4F 10 D2 76 00 01 24 01 02 00 00 05
00 00 10 E5 00 00 5F 52 0A 00 31 C5 73 C0 01 40 05 90 00 73 81 B7 C0
0A 7C 00 08 00 08 00 08 00 08 00 C1 06 01 10 00 00 20 00 C2 06 01 10
00 00 20 00 C3 06 01 10 00 00 20 00 C4 07 01 20 20 20 03 00 03 C5 3C
64 89 1D 7C 09 CC 65 8A 31 B2 D1 A4 90 2E 9E 03 D6 1B A0 38 87 A7 40
2C 8B 32 E3 80 8A 41 95 32 6D BC 54 33 FF A4 6E BA 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 C6 3C 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 CD 0C 4E C3 D4 75 4E C3 D4 75 00 00 00 00
scdaemon[3313]: Key-Attr-auth ..: RSA, n=4096, e=32, fmt=std
scdaemon[3313]: DBG: send apdu: c=00 i=CA p1=00 p2=65 lc=-1 le=256 em=0
scdaemon[3313]: DBG:   PCSC_data: 00 CA 00 65 00
scdaemon[3313]: DBG:  response: sw=9000  datalen=27
scdaemon[3313]: DBG:       dump:  5B 10 4A 4F 4F 52 49 53 3C 3C 45 6D
6D 61 6E 75 65 6C 5F 2D 02 66 72 5F 35 01 31
scdaemon[3313]: DBG: send apdu: c=00 i=CA p1=5F p2=50 lc=-1 le=256 em=0
scdaemon[3313]: DBG:   PCSC_data: 00 CA 5F 50 00
scdaemon[3313]: DBG:  response: sw=9000  datalen=68
scdaemon[3313]: DBG:       dump:  68 74 74 70 3A 2F 2F 70 67 70 2E 6D
69 74 2E 65 64 75 3A 31 31 33 37 31 2F 70 6B 73 2F 6C 6F 6F 6B 75 70
3F 6F 70 3D 67 65 74 26 73 65 61 72 63 68 3D 30 78 45 46 38 31 46 37
32 43 32 39 41 39 44 36 45 46
scdaemon[3313]: DBG: send apdu: c=00 i=CA p1=00 p2=6E lc=-1 le=256 em=0
scdaemon[3313]: DBG:   PCSC_data: 00 CA 00 6E 00
scdaemon[3313]: DBG:  response: sw=9000  datalen=217
scdaemon[3313]: DBG:       dump:  4F 10 D2 76 00 01 24 01 02 00 00 05
00 00 10 E5 00 00 5F 52 0A 00 31 C5 73 C0 01 40 05 90 00 73 81 B7 C0
0A 7C 00 08 00 08 00 08 00 08 00 C1 06 01 10 00 00 20 00 C2 06 01 10
00 00 20 00 C3 06 01 10 00 00 20 00 C4 07 01 20 20 20 03 00 03 C5 3C
64 89 1D 7C 09 CC 65 8A 31 B2 D1 A4 90 2E 9E 03 D6 1B A0 38 87 A7 40
2C 8B 32 E3 80 8A 41 95 32 6D BC 54 33 FF A4 6E BA 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 C6 3C 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 CD 0C 4E C3 D4 75 4E C3 D4 75 00 00 00 00
scdaemon[3313]: DBG: send apdu: c=00 i=CA p1=00 p2=C4 lc=-1 le=256 em=0
scdaemon[3313]: DBG:   PCSC_data: 00 CA 00 C4 00
scdaemon[3313]: DBG:  response: sw=9000  datalen=7
scdaemon[3313]: DBG:       dump:  01 20 20 20 03 00 03
scdaemon[3313]: DBG: send apdu: c=00 i=CA p1=00 p2=7A lc=-1 le=256 em=0
scdaemon[3313]: DBG:   PCSC_data: 00 CA 00 7A 00
scdaemon[3313]: DBG:  response: sw=9000  datalen=5
scdaemon[3313]: DBG:       dump:  93 03 00 00 01
scdaemon[3313]: DBG: send apdu: c=00 i=CA p1=01 p2=01 lc=-1 le=256 em=0
scdaemon[3313]: DBG:   PCSC_data: 00 CA 01 01 00
scdaemon[3313]: DBG:  response: sw=9000  datalen=0
scdaemon[3313]: DBG:       dump:
scdaemon[3313]: DBG: send apdu: c=00 i=CA p1=01 p2=02 lc=-1 le=256 em=0
scdaemon[3313]: DBG:   PCSC_data: 00 CA 01 02 00
scdaemon[3313]: DBG:  response: sw=9000  datalen=0
scdaemon[3313]: DBG:       dump:
scdaemon[3313]: DBG: send apdu: c=00 i=47 p1=81 p2=00 lc=2 le=2048 em=1
scdaemon[3313]: DBG:   PCSC_data: 00 47 81 00 00 00 02 B6 00 08 00
scdaemon[3313]: DBG:  response: sw=9000  datalen=527
scdaemon[3313]: DBG:       dump:  7F 49 82 02 0A 81 82 02 00 BF 41 94
00 D8 8C DF AA 8F AB 59 52 8D AF 3C 67 E1 76 0D 70 55 81 8A E0 1E 0E
E4 A4 BC FC C9 3D 9B 25 A5 E0 8E 0C FB 14 00 C3 8F AE 16 AE C4 62 2A
84 41 B0 3D 2E 3A 19 F8 85 23 E8 96 69 67 CF 86 3A DF BB B6 F2 4F 0D
8F 2D EB DF 5B FE 13 6C BC B9 A7 89 E6 07 C7 45 75 AA BD 99 2A 94 02
45 11 6B 63 64 6B 1D C6 EB 21 1D C2 2F 54 45 0A 3F 1E 4C CA F1 0D 38
BB 2D 1C 3F 02 76 9E 99 1B 2E 8D 63 20 8C 2B 41 71 3B D7 78 0D 0F 7D
3D 88 0C 65 01 D9 A1 57 D0 48 56 9D F1 02 D2 30 7D 67 2C 83 21 E1 AA
B3 A7 52 8D 3D E7 38 6A 40 16 C5 D2 4D 8C B1 6C A3 C3 3C 8A EA 94 50
1B 2C 51 3F 19 E8 DA 68 F4 7E AA 68 FE 44 2E 79 A1 09 23 09 25 44 88
63 0C 1B 6A D8 90 9B E4 40 86 62 03 D3 A6 B6 78 6A 07 8A 6E 16 FE 6B
10 10 AF EB 7A 8F 8C 65 63 E5 15 91 4C 0A 07 A5 3C 1E 99 9D FD 36 9F
05 18 D4 6A EB 81 36 C0 87 CD 7C 31 57 1F 04 38 75 9B CB 3D 87 30 1C
E3 49 8F B7 B4 48 E9 46 A2 2F CF CD F4 FB 49 7E 3C 6B 2B 92 20 C0 19
F9 32 A2 E0 EF D6 E3 ED 47 26 91 E9 D7 17 7B 63 76 53 31 FC 95 3E 53
14 B1 27 04 D7 AC 16 7F 85 F2 1A E9 BF D5 53 4C A1 87 40 0E B3 54 92
20 52 F5 CE 49 9E 07 84 CF 25 84 76 27 E6 B8 73 1D A4 D6 8E 98 7A 83
80 31 C9 3C 04 20 B9 9B 49 E5 70 61 85 D1 22 8D D1 F9 99 FA 3F 87 77
38 BC 85 BD 79 11 0A 07 01 CB E6 03 8D 90 FA 81 4E 2F AC 2D CE 5D 46
A5 8D C3 4B 0C 56 24 B5 B8 DB 3C A0 4E B1 BF D8 4B 82 29 8A EE DD E9
01 9B 06 F9 F7 6F E9 75 81 89 F2 70 88 6E D9 BA 48 28 31 10 DF 85 7E
5C 93 80 5C B1 9B CE 4A E7 07 C9 32 94 C7 E0 5A DA 5D E5 10 83 35 35
31 8D 6B 9C 4D CB 28 B4 9A 2D 22 63 D7 6F C1 9D 4A 58 24 BB 08 5E 44
E3 F5 5B 82 04 00 01 00 01
scdaemon[3313]: DBG: send apdu: c=00 i=47 p1=81 p2=00 lc=2 le=2048 em=1
scdaemon[3313]: DBG:   PCSC_data: 00 47 81 00 00 00 02 B8 00 08 00
scdaemon[3313]: DBG:  response: sw=9000  datalen=527
scdaemon[3313]: DBG:       dump:  7F 49 82 02 0A 81 82 02 00 D2 B8 FE
17 D2 42 D7 B1 39 20 BE B8 71 64 BA 95 0C AA A0 BD 48 2F 6D F1 B8 36
56 41 E3 E2 97 3B 96 76 60 A2 DA 73 1C AA 33 32 FD F6 8F CE 34 47 56
3D 8A 88 D3 30 40 02 77 4F F5 A1 D3 1A B8 CE 07 37 58 75 3E 05 1A F7
3C 51 C0 03 F7 B8 88 F3 C1 80 6C 0D 0B 6D 1B A0 D8 50 9A F7 06 B5 C5
CC 83 D6 9E 47 E3 B3 27 24 9C 4E 86 AE 0F A6 85 79 0D 0F 8F 90 29 BB
BC EC 4A D4 FD 57 47 B5 81 05 85 6C C7 36 27 C0 75 BA E3 3B DB 9E 0E
20 4D BA E2 81 04 C3 B8 90 7B 23 DE BA 0E 28 70 00 E0 8E 23 8F D2 0E
A4 D9 6B 25 50 D9 66 A0 3E EA 36 95 55 14 BA 24 F6 D7 94 C0 34 FE 6F
AB DF 4A E7 BE DF 50 F8 75 9D E1 CD 00 9A 1B 64 DB 95 BE 64 E0 E4 2E
CC D6 77 0F D5 30 5B C6 7A D9 30 E4 A0 F0 8E 3D 93 04 E0 12 8C 63 19
F4 04 63 38 17 45 46 F5 4B E0 B9 68 28 C8 FF 0F 3D DC 3E 48 7F 16 C4
CC B7 3D 29 AF 13 1E 8E EF 8B CB D5 7A 85 97 44 C6 76 CB 6A 09 EB B4
F0 A3 C8 36 35 B4 22 3F 9B 0F 48 BF 2D DC C8 2F 11 33 A1 50 E2 6E 91
2C 65 50 FC D2 C1 76 AB A0 27 8E 71 D0 A0 A5 9A 64 C7 4C A2 DC 58 64
93 3A 94 E7 CE AC EC 5B 99 01 23 E8 69 30 40 C0 80 86 CE 57 CD DB F7
6E E5 36 7F 34 65 93 C2 A2 BC 07 CB D6 CC A3 0D 1D C2 A2 F1 3C 04 4D
B8 EA B9 AF C0 1C C6 6B D4 92 DD C3 0D 13 B9 33 C8 CD 22 64 CF F7 F7
C7 C8 ED 4D 11 90 81 A0 6F CC 8D EA BE 4E 79 EA 3C 6B D8 82 4D B8 7D
C5 30 85 F8 75 BD 99 6A CA 1A 2E 5D 9D C4 0E 94 D7 E0 08 BE BC 39 74
76 A9 CF 44 8B 8F 18 78 3A 72 10 9A D4 8F ED 94 34 A2 CA 81 55 D9 34
1D 68 C0 F8 1B 04 55 9F 44 45 0F 80 F3 F9 36 5B 1E 30 00 8D 92 06 7A
E6 07 63 C1 EC 08 AE A1 A5 D8 A1 84 3C B2 8F 9B 5E C5 F3 B0 66 18 BF
FE 0D B5 82 04 00 01 00 01
scdaemon[3313]: DBG: send apdu: c=00 i=47 p1=81 p2=00 lc=2 le=2048 em=1
scdaemon[3313]: DBG:   PCSC_data: 00 47 81 00 00 00 02 A4 00 08 00
scdaemon[3313]: DBG:  response: sw=6A88  datalen=0
scdaemon[3313]: reading public key failed: Missing item in object
Application ID ...: D2760001240102000005000010E50000
Version ..........: 2.0
Manufacturer .....: ZeitControl
Serial number ....: XXXXXXXX
Name of cardholder: Emmanuel JOORIS
Language prefs ...: fr
Sex ..............: male
URL of public key :
http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xEF81F72C29A9D6EF
Login data .......: [not set]
Signature PIN ....: not forced
Key attributes ...: 4096R 4096R 4096R
Max. PIN lengths .: 32 32 32
PIN retry counter : 3 0 3
Signature counter : 1
Signature key ....: 6489 1D7C 09CC 658A 31B2  D1A4 902E 9E03 D61B A038
      created ....: 2011-11-16 15:19:17
Encryption key....: 87A7 402C 8B32 E380 8A41  9532 6DBC 5433 FFA4 6EBA
      created ....: 2011-11-16 15:19:17
Authentication key: [none]
General key info..: [none]

gpg/card> scdaemon[3313]: updating slot 0 status: 0x0000->0x0007 (0->1)
admin
Admin commands are allowed

gpg/card> generate
scdaemon[3313]: DBG: send apdu: c=00 i=CA p1=00 p2=C4 lc=-1 le=256 em=0
scdaemon[3313]: DBG:   PCSC_data: 00 CA 00 C4 00
scdaemon[3313]: DBG:  response: sw=9000  datalen=7
scdaemon[3313]: DBG:       dump:  01 20 20 20 03 00 03
Make off-card backup of encryption key? (Y/n) n

gpg: NOTE: keys are already stored on the card!

Replace existing keys? (y/N) y
scdaemon[3313]: DBG: asking for PIN '||Please enter the PIN'

(pinentry:3322): GLib-GObject-CRITICAL **: Object class GtkSecureEntry
doesn't implement property 'editing-canceled' from interface
'GtkCellEditable'
scdaemon[3313]: DBG: send apdu: c=00 i=20 p1=00 p2=82 lc=6 le=-1 em=0
scdaemon[3313]: DBG:   PCSC_data: 00 20 00 82 06 31 32 33 34 35 36
scdaemon[3313]: DBG:  response: sw=9000  datalen=0
scdaemon[3313]: DBG:     dump:
scdaemon[3313]: DBG: send apdu: c=00 i=20 p1=00 p2=81 lc=6 le=-1 em=0
scdaemon[3313]: DBG:   PCSC_data: 00 20 00 81 06 31 32 33 34 35 36
scdaemon[3313]: DBG:  response: sw=9000  datalen=0
scdaemon[3313]: DBG:     dump:
scdaemon[3313]: operation check_pin result: Success
What keysize do you want for the Signature key? (4096)
What keysize do you want for the Encryption key? (4096)
What keysize do you want for the Authentication key? (4096)
Please specify how long the key should be valid.
         0 = key does not expire
      <n>  = key expires in n days
      <n>w = key expires in n weeks
      <n>m = key expires in n months
      <n>y = key expires in n years
Key is valid for? (0) 7
Key expires at Thu Nov 24 16:06:15 2011 CET
Is this correct? (y/N) y

GnuPG needs to construct a user ID to identify your key.

Real name: TESTtest
Email address:
Comment:
You selected this USER-ID:
    "TESTtest"

Change (N)ame, (C)omment, (E)mail or (O)kay/(Q)uit? o
scdaemon[3313]: DBG: send apdu: c=00 i=CA p1=00 p2=6E lc=-1 le=256 em=0
scdaemon[3313]: DBG:   PCSC_data: 00 CA 00 6E 00
scdaemon[3313]: DBG:  response: sw=9000  datalen=217
scdaemon[3313]: DBG:       dump:  4F 10 D2 76 00 01 24 01 02 00 00 05
00 00 10 E5 00 00 5F 52 0A 00 31 C5 73 C0 01 40 05 90 00 73 81 B7 C0
0A 7C 00 08 00 08 00 08 00 08 00 C1 06 01 10 00 00 20 00 C2 06 01 10
00 00 20 00 C3 06 01 10 00 00 20 00 C4 07 01 20 20 20 03 00 03 C5 3C
64 89 1D 7C 09 CC 65 8A 31 B2 D1 A4 90 2E 9E 03 D6 1B A0 38 87 A7 40
2C 8B 32 E3 80 8A 41 95 32 6D BC 54 33 FF A4 6E BA 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 C6 3C 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 CD 0C 4E C3 D4 75 4E C3 D4 75 00 00 00 00
scdaemon[3313]: existing key will be replaced
scdaemon[3313]: DBG: send apdu: c=00 i=CA p1=00 p2=C4 lc=-1 le=256 em=0
scdaemon[3313]: DBG:   PCSC_data: 00 CA 00 C4 00
scdaemon[3313]: DBG:  response: sw=9000  datalen=7
scdaemon[3313]: DBG:       dump:  01 20 20 20 03 00 03
scdaemon[3313]: 3 Admin PIN attempts remaining before card is permanently locked
scdaemon[3313]: DBG: asking for PIN '|A|Please enter the Admin PIN'

(pinentry:3326): GLib-GObject-CRITICAL **: Object class GtkSecureEntry
doesn't implement property 'editing-canceled' from interface
'GtkCellEditable'
scdaemon[3313]: DBG: send apdu: c=00 i=20 p1=00 p2=83 lc=8 le=-1 em=0
scdaemon[3313]: DBG:   PCSC_data: 00 20 00 83 08 31 32 33 34 35 36 37 38
scdaemon[3313]: DBG:  response: sw=9000  datalen=0
scdaemon[3313]: DBG:     dump:
scdaemon[3313]: please wait while key is being generated ...
scdaemon[3313]: DBG: send apdu: c=00 i=47 p1=80 p2=00 lc=2 le=2048 em=1
scdaemon[3313]: DBG:   PCSC_data: 00 47 80 00 00 00 02 B6 00 08 00
scdaemon[3313]: pcsc_transmit failed: not transacted (0x80100016)
scdaemon[3313]: apdu_send_simple(0) failed: general error
scdaemon[3313]: generating key failed
scdaemon[3313]: operation genkey result: Card error
gpg: key generation failed: Card error
Key generation failed: Card error

2011/11/17, Werner Koch <wk at gnupg.org>:
> On Thu, 17 Nov 2011 11:58, emmanuel.jooris at gmail.com said:
>
>> I use Debian testing with gnupg2 2.0.18, i have a BCM5880 smart card
>
> I don't know thisreader. Is this from Broadcom?
>
>> scdaemon[2840]: pcsc_transmit failed: not transacted (0x80100016)
>
> This error message is kind of "general error". It usually has nothing to
> do with transactions. Adding "debug 2048" to scdaemon.conf will log all
> I/O with the reader.
>
> You may also try running without pcscd and thus use scdaemon's internal
> ccid reader.  Make sure that you have write permissions to the USB
> device.
>
>
>
> Salam-Shalom,
>
>    Werner
>
> --
> Die Gedanken sind frei.  Ausnahmen regelt ein Bundesgesetz.
>
>



More information about the Gnupg-users mailing list