Problems with ESTEID and gpgsm

Jaap van Wingerde mailinglists at vanwingerde.net
Wed Dec 23 00:00:29 CET 2015


How can I solve them?

jaap at jaap:~$ gpgsm --help
gpgsm (GnuPG) 2.0.26
libgcrypt 1.6.3
libksba 1.3.2-unknown
...
jaap at jaap:~$

jaap at jaap:~$ /usr/bin/gpgsm -vvvvs txt.txt
gpgsm: enabled debug flags: x509 assuan
gpgsm: no key usage specified - assuming all usages
gpgsm: DBG: get_keygrip for public key
gpgsm: DBG: keygrip= 39 C0 56 38 84 B2 C1 01 B2 0C 59 ED 40 27 B5 01 93
FF F7 72 gpgsm: no running gpg-agent - starting one
gpg-agent[22381]: enabled debug flags: assuan
gpgsm: DBG: connection to agent established
gpgsm: certificate is not usable for signing
gpgsm: certificate is not usable for signing
gpgsm: certificate is not usable for signing
gpgsm: certificate is not usable for signing
gpgsm: certificate is not usable for signing
gpgsm: certificate is not usable for signing
gpgsm: certificate is not usable for signing
gpgsm: certificate is not usable for signing
gpgsm: certificate is not usable for signing
gpgsm: certificate is not usable for signing
gpgsm: certificate is not usable for signing
gpgsm: certificate is not usable for signing
gpgsm: certificate is not usable for signing
gpgsm: certificate is not usable for signing
gpgsm: certificate is not usable for signing
gpgsm: DBG: get_keygrip for public key
gpgsm: DBG: keygrip= 31 F0 60 FB CE A5 21 00 E5 68 D2 6C 98 FD ED 9A 12
B1 60 15 gpgsm: certificate is not usable for signing
gpgsm: DBG: get_keygrip for public key
gpgsm: DBG: keygrip= 23 59 EB D7 45 0D 9A 7F F3 25 FD 94 27 7E CC 32 D2
DD 22 53 gpgsm: DBG: get_keygrip for public key
gpgsm: DBG: keygrip= C5 BD 3D 02 E5 E7 6D D2 75 40 C6 62 D0 B7 47 7C 16
92 67 39 gpgsm: no default signer found
gpgsm: error creating signature: General error <GpgSM>
secmem usage: 0/16384 bytes in 0 blocks
jaap at jaap:~$ 

jaap at jaap:~$ /usr/bin/gpgsm --learn-card
gpgsm: enabled debug flags: x509 assuan
gpgsm: no running gpg-agent - starting one
gpg-agent[22386]: enabled debug flags: assuan
gpgsm: DBG: connection to agent established
gnupg-pkcs11-scd[22387.3394275072]: version: 0.7.3
gnupg-pkcs11-scd[22387.3394275072]: config: debug=1, verbose=1
gnupg-pkcs11-scd[22387.3394275072]: config: pin_cache=-1
gnupg-pkcs11-scd[22387.3394275072]: config: provider: name=esteid,
library=/usr/lib/x86_64-linux-gnu/pkcs11/opensc-pkcs11.so,
allow_protected=1, cert_is_private=1, private_mask=00000001
gnupg-pkcs11-scd[22387.3394275072]: run_mode: 2
gnupg-pkcs11-scd[22387.3394275072]: crypto: openssl
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11: pkcs11h_addProvider entry
version='1.11', pid=22387, reference='esteid',
provider_location='/usr/lib/x86_64-linux-gnu/pkcs11/opensc-pkcs11.so',
allow_protected_auth=1, mask_private_mode=00000001, cert_is_private=1
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11: Adding provider
'esteid'-'/usr/lib/x86_64-linux-gnu/pkcs11/opensc-pkcs11.so'
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11: pkcs11h_addProvider
Provider 'esteid' manufacturerID 'OpenSC (www.opensc-project.org)'
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11: _pkcs11h_slotevent_notify
entry gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
_pkcs11h_slotevent_notify return gnupg-pkcs11-scd[22387.3394275072]:
PKCS#11: Provider 'esteid' added rv=0-'CKR_OK'
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11: pkcs11h_addProvider return
rv=0-'CKR_OK' gnupg-pkcs11-scd[22387.3394275072]: Listening to socket
'/tmp/gnupg-pkcs11-scd.xWcx6d/agent.S' gnupg-pkcs11-scd[22387]: chan_6
-> OK PKCS#11 smart-card server for GnuPG ready
gnupg-pkcs11-scd[22387]: chan_6 <- GETINFO socket_name
gnupg-pkcs11-scd[22387]: chan_6 ->
D /tmp/gnupg-pkcs11-scd.xWcx6d/agent.S gnupg-pkcs11-scd[22387]: chan_6
-> OK gnupg-pkcs11-scd[22387]: chan_6 <- SERIALNO
gnupg-pkcs11-scd[22387]: chan_6 -> S SERIALNO
D2760001240111111111111111111111 0 gnupg-pkcs11-scd[22387]: chan_6 ->
OK gnupg-pkcs11-scd[22387]: chan_6 <- LEARN --force
gnupg-pkcs11-scd[22387]: chan_6 -> S SERIALNO
D2760001240111111111111111111111 0 gnupg-pkcs11-scd[22387.3394275072]:
PKCS#11: pkcs11h_certificate_enumCertificateIds entry method=1,
mask_prompt=00000003, p_cert_id_issuers_list=0x7ffc1c633f48,
p_cert_id_end_list=0x7ffc1c633f40 gnupg-pkcs11-scd[22387.3394275072]:
PKCS#11: _pkcs11h_session_getSlotList entry provider=0xd1f5e0,
token_present=1, pSlotList=0x7ffc1c633e00, pulCount=0x7ffc1c633e08
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
_pkcs11h_session_getSlotList return rv=0-'CKR_OK' *pulCount=2
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11: _pkcs11h_token_getTokenId
entry p_token_id=0x7ffc1c633e18 gnupg-pkcs11-scd[22387.3394275072]:
PKCS#11: _pkcs11h_token_newTokenId entry p_token_id=0x7ffc1c633d70
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11: _pkcs11h_token_newTokenId
return rv=0-'CKR_OK', *p_token_id=0xd3f600
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11: _pkcs11h_token_getTokenId
return rv=0-'CKR_OK', *p_token_id=0xd3f600
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
_pkcs11h_session_getSessionByTokenId entry token_id=0xd3f600,
p_session=0x7ffc1c633e10 gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
Creating a new session gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
pkcs11h_token_duplicateTokenId entry to=0xd3ff28 form=0xd3f600
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
pkcs11h_token_duplicateTokenId return rv=0-'CKR_OK', *to=0xd402f0
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
_pkcs11h_session_getSessionByTokenId return rv=0-'CKR_OK',
*p_session=0xd3ff10 gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
_pkcs11h_certificate_enumSessionCertificates entry session=0xd3ff10,
user_data=0xd34880, mask_prompt=00000003
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11: _pkcs11h_session_validate
entry session=0xd3ff10 gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
_pkcs11h_session_validate return rv=179-'CKR_SESSION_HANDLE_INVALID'
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11: Get certificate attributes
failed: 179:'CKR_SESSION_HANDLE_INVALID'
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11: _pkcs11h_session_login
entry session=0xd3ff10, is_publicOnly=1, readonly=1,
user_data=0xd34880, mask_prompt=00000001
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11: _pkcs11h_session_logout
entry session=0xd3ff10 gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
_pkcs11h_session_logout return gnupg-pkcs11-scd[22387.3394275072]:
PKCS#11: _pkcs11h_session_reset entry session=0xd3ff10,
user_data=0xd34880, mask_prompt=00000001, p_slot=0x7ffc1c633858
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11: _pkcs11h_session_reset
Expected token manufacturerID='AS Sertifitseerimiskeskus'
model='PKCS#15 emulated', serialNumber='N0108352', label='VAN
WINGERDE,JACOB,35402120120 (' gnupg-pkcs11-scd[22387.3394275072]:
PKCS#11: _pkcs11h_session_getSlotList entry provider=0xd1f5e0,
token_present=1, pSlotList=0x7ffc1c6336f8, pulCount=0x7ffc1c633700
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
_pkcs11h_session_getSlotList return rv=0-'CKR_OK' *pulCount=2
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11: _pkcs11h_token_getTokenId
entry p_token_id=0x7ffc1c633708 gnupg-pkcs11-scd[22387.3394275072]:
PKCS#11: _pkcs11h_token_newTokenId entry p_token_id=0x7ffc1c633660
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11: _pkcs11h_token_newTokenId
return rv=0-'CKR_OK', *p_token_id=0xd40760
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11: _pkcs11h_token_getTokenId
return rv=0-'CKR_OK', *p_token_id=0xd40760
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11: _pkcs11h_session_reset
Found token manufacturerID='AS Sertifitseerimiskeskus' model='PKCS#15
emulated', serialNumber='N0108352', label='VAN
WINGERDE,JACOB,35402120120 (' gnupg-pkcs11-scd[22387.3394275072]:
PKCS#11: pkcs11h_token_freeTokenId entry certificate_id=0xd40760
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11: pkcs11h_token_freeTokenId
return gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
_pkcs11h_session_reset return rv=0-'CKR_OK', *p_slot=1
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11: Calling pin_prompt hook
for 'VAN WINGERDE,JACOB,35402120120 (' gnupg-pkcs11-scd[22387]: chan_6
-> INQUIRE NEEDPIN PIN required for token 'VAN
WINGERDE,JACOB,35402120120 (' (try 0) gnupg-pkcs11-scd[22387]: chan_6
<- END gnupg-pkcs11-scd[22387.3394275072]: PKCS#11: pin_prompt hook
return rv=1 gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
_pkcs11h_session_login C_Login rv=1-'CKR_CANCEL'
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11: _pkcs11h_session_login
return rv=1-'CKR_CANCEL' gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
_pkcs11h_certificate_enumSessionCertificates return rv=1-'CKR_CANCEL'
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11: Cannot get token
information for provider 'OpenSC (www.opensc-project.org)' slot 1
rv=1-'CKR_CANCEL' gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
_pkcs11h_session_release entry session=0xd3ff10
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11: _pkcs11h_session_release
return rv=0-'CKR_OK' gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
pkcs11h_token_freeTokenId entry certificate_id=0xd3f600
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11: pkcs11h_token_freeTokenId
return gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
_pkcs11h_token_getTokenId entry p_token_id=0x7ffc1c633e18
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11: _pkcs11h_token_newTokenId
entry p_token_id=0x7ffc1c633d70 gnupg-pkcs11-scd[22387.3394275072]:
PKCS#11: _pkcs11h_token_newTokenId return rv=0-'CKR_OK',
*p_token_id=0xd3f600 gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
_pkcs11h_token_getTokenId return rv=0-'CKR_OK', *p_token_id=0xd3f600
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
_pkcs11h_session_getSessionByTokenId entry token_id=0xd3f600,
p_session=0x7ffc1c633e10 gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
Using cached session gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
_pkcs11h_session_getSessionByTokenId return rv=0-'CKR_OK',
*p_session=0xd3ff10 gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
_pkcs11h_certificate_enumSessionCertificates entry session=0xd3ff10,
user_data=0xd34880, mask_prompt=00000003
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11: _pkcs11h_session_validate
entry session=0xd3ff10 gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
_pkcs11h_session_validate session->pin_expire_time=0, time=1450824309
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11: _pkcs11h_session_validate
return rv=0-'CKR_OK' gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
_pkcs11h_session_findObjects entry session=0xd3ff10,
filter=0x7ffc1c633d10, filter_attrs=1, p_objects=0x7ffc1c633cf0,
p_objects_found=0x7ffc1c633cf8 gnupg-pkcs11-scd[22387.3394275072]:
PKCS#11: _pkcs11h_session_findObjects return rv=0-'CKR_OK',
*p_objects_found=1 gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
_pkcs11h_session_getObjectAttributes entry session=0xd3ff10,
object=13889536, attrs=0x7ffc1c633d30, count=2
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
_pkcs11h_session_getObjectAttributes return rv=0-'CKR_OK'
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
_pkcs11h_certificate_newCertificateId entry
p_certificate_id=0x7ffc1c633d00 gnupg-pkcs11-scd[22387.3394275072]:
PKCS#11: _pkcs11h_certificate_newCertificateId return rv=0-'CKR_OK',
*p_certificate_id=0xd40c70 gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
pkcs11h_token_duplicateTokenId entry to=0xd40c70 form=0xd402f0
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
pkcs11h_token_duplicateTokenId return rv=0-'CKR_OK', *to=0xd410a0
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
__pkcs11h_certificate_updateCertificateIdDescription entry
certificate_id=0xd40c70 gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
__pkcs11h_certificate_updateCertificateIdDescription return
displayName='/C=EE/O=ESTEID (DIGI-ID
E-RESIDENT)/OU=authentication/CN=VAN WINGERDE,JACOB,35402120120/SN=VAN
WINGERDE/GN=JACOB/serialNumber=35402120120 on VAN
WINGERDE,JACOB,35402120120 (' gnupg-pkcs11-scd[22387.3394275072]:
PKCS#11: _pkcs11h_session_freeObjectAttributes entry
attrs=0x7ffc1c633d30, count=2 gnupg-pkcs11-scd[22387.3394275072]:
PKCS#11: _pkcs11h_session_freeObjectAttributes return
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
_pkcs11h_certificate_enumSessionCertificates return rv=0-'CKR_OK'
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11: _pkcs11h_session_release
entry session=0xd3ff10 gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
_pkcs11h_session_release return rv=0-'CKR_OK'
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11: pkcs11h_token_freeTokenId
entry certificate_id=0xd3f600 gnupg-pkcs11-scd[22387.3394275072]:
PKCS#11: pkcs11h_token_freeTokenId return
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
pkcs11h_certificate_duplicateCertificateId entry to=0xd3fef8
form=0xd40c70 gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
pkcs11h_certificate_duplicateCertificateId return rv=0-'CKR_OK',
*to=0xd40760 gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
__pkcs11h_certificate_splitCertificateIdList entry
cert_id_all=0xd3fef0, p_cert_id_issuers_list=0x7ffc1c633f48,
p_cert_id_end_list=0x7ffc1c633f40 gnupg-pkcs11-scd[22387.3394275072]:
PKCS#11: pkcs11h_certificate_duplicateCertificateId entry to=0xd3e258
form=0xd40760 gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
pkcs11h_certificate_duplicateCertificateId return rv=0-'CKR_OK',
*to=0xd41f30 gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
__pkcs11h_certificate_splitCertificateIdList return rv=0-'CKR_OK'
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
pkcs11h_certificate_freeCertificateIdList entry cert_id_list=0xd3fef0
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
pkcs11h_certificate_freeCertificateId entry certificate_id=0xd40760
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11: pkcs11h_token_freeTokenId
entry certificate_id=0xd3f600 gnupg-pkcs11-scd[22387.3394275072]:
PKCS#11: pkcs11h_token_freeTokenId return
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
pkcs11h_certificate_freeCertificateId return
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
pkcs11h_certificate_freeCertificateIdList return
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
pkcs11h_certificate_enumCertificateIds return rv=0-'CKR_OK'
gnupg-pkcs11-scd[22387]: chan_6 -> S APPTYPE PKCS11
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11: pkcs11h_certificate_create
entry certificate_id=0xd41f30, user_data=0xd34880,
mask_prompt=00000003, pin_cache_period=-1, p_certificate=0x7ffc1c633e40
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
pkcs11h_certificate_duplicateCertificateId entry to=0xd40140
form=0xd41f30 gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
pkcs11h_certificate_duplicateCertificateId return rv=0-'CKR_OK',
*to=0xd40760 gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
_pkcs11h_session_getSessionByTokenId entry token_id=0xd41a20,
p_session=0xd40150 gnupg-pkcs11-scd[22387.3394275072]: PKCS#11: Using
cached session gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
_pkcs11h_session_getSessionByTokenId return rv=0-'CKR_OK',
*p_session=0xd3ff10 gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
pkcs11h_certificate_create return rv=0-'CKR_OK' *p_certificate=0xd40140
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
pkcs11h_certificate_getCertificateBlob entry certificate=0xd40140,
certificate_blob=(nil), *p_certificate_blob_size=0000000000000000
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
pkcs11h_certificate_getCertificateBlob return rv=0-'CKR_OK'
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
pkcs11h_certificate_getCertificateBlob entry certificate=0xd40140,
certificate_blob=0xd42ce0, *p_certificate_blob_size=0000000000000507
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
pkcs11h_certificate_getCertificateBlob return rv=0-'CKR_OK'
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
pkcs11h_certificate_freeCertificate entry certificate=0xd40140
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11: _pkcs11h_session_release
entry session=0xd3ff10 gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
_pkcs11h_session_release return rv=0-'CKR_OK'
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
pkcs11h_certificate_freeCertificateId entry certificate_id=0xd40760
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11: pkcs11h_token_freeTokenId
entry certificate_id=0xd41a20 gnupg-pkcs11-scd[22387.3394275072]:
PKCS#11: pkcs11h_token_freeTokenId return
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
pkcs11h_certificate_freeCertificateId return
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
pkcs11h_certificate_freeCertificate return gpgsm: error learning card:
No inquire callback in IPC secmem usage: 0/16384 bytes in 0 blocks
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
__pkcs11h_openssl_ex_data_free entered - parent=0xd44240, ptr=(nil),
ad=0xd442a0, idx=0, argl=0, argp=0x7fb4c91f08e3
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
pkcs11h_certificate_serializeCertificateId entry sz=(nil),
*max=0000000000000000, certificate_id=0xd41f30
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
pkcs11h_token_serializeTokenId entry sz=(nil), *max=0000000000000000,
token_id=0xd42360 gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
pkcs11h_token_serializeTokenId return rv=0-'CKR_OK',
*max=000000000000006d, sz='(null)' gnupg-pkcs11-scd[22387.3394275072]:
PKCS#11: pkcs11h_certificate_serializeCertificateId return
rv=0-'CKR_OK', *max=0000000000000070, sz='(null)'
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
pkcs11h_certificate_serializeCertificateId entry sz=0xd41ba0,
*max=0000000000000070, certificate_id=0xd41f30
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
pkcs11h_token_serializeTokenId entry sz=0xd41ba0,
*max=0000000000000070, token_id=0xd42360
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
pkcs11h_token_serializeTokenId return rv=0-'CKR_OK',
*max=000000000000006d,
sz='AS\x20Sertifitseerimiskeskus/PKCS\x2315\x20emulated/N0108352/VAN\x20WINGERDE\x2CJACOB\x2C35402120120\x20\x28'
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
pkcs11h_certificate_serializeCertificateId return rv=0-'CKR_OK',
*max=0000000000000070,
sz='AS\x20Sertifitseerimiskeskus/PKCS\x2315\x20emulated/N0108352/VAN\x20WINGERDE\x2CJACOB\x2C35402120120\x20\x28/01'
gnupg-pkcs11-scd[22387]: chan_6 -> S KEY-FRIEDNLY
BEE4963CCC09D0CEE5DE3DEA543EBCBB702664E1 /C=EE/O=ESTEID (DIGI-ID
E-RESIDENT)/OU=authentication/CN=VAN WINGERDE,JACOB,35402120120/SN=VAN
WINGERDE/GN=JACOB/serialNumber=35402120120 on VAN
WINGERDE,JACOB,35402120120 ( gnupg-pkcs11-scd[22387]: chan_6 -> S
KEYPAIRINFO BEE4963CCC09D0CEE5DE3DEA543EBCBB702664E1
AS\x20Sertifitseerimiskeskus/PKCS\x2315\x20emulated/N0108352/VAN\x20WINGERDE\x2CJACOB\x2C35402120120\x20\x28/01
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
pkcs11h_certificate_freeCertificateIdList entry cert_id_list=0xd3e250
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
pkcs11h_certificate_freeCertificateId entry certificate_id=0xd41f30
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11: pkcs11h_token_freeTokenId
entry certificate_id=0xd42360 gnupg-pkcs11-scd[22387.3394275072]:
PKCS#11: pkcs11h_token_freeTokenId return
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
pkcs11h_certificate_freeCertificateId return
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
pkcs11h_certificate_freeCertificateIdList return
gnupg-pkcs11-scd[22387]: chan_6 -> OK jaap at jaap:~$
gnupg-pkcs11-scd[22387]: chan_6 <- RESTART gnupg-pkcs11-scd[22387]:
chan_6 -> OK gnupg-pkcs11-scd[22387.3394275072]: assuan_process failed:
Broken pipe gnupg-pkcs11-scd[22387.3357775616]: Cleaning up threads
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11: pkcs11h_terminate entry
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11: Terminating openssl
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11: _pkcs11h_openssl_terminate
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11: Removing providers
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11: pkcs11h_removeProvider
entry reference='esteid' gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
Removing provider 'esteid' gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
_pkcs11h_slotevent_notify entry gnupg-pkcs11-scd[22387.3394275072]:
PKCS#11: _pkcs11h_slotevent_notify return
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11: pkcs11h_removeProvider
return rv=0-'CKR_OK' gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
Releasing sessions gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
pkcs11h_token_freeTokenId entry certificate_id=0xd402f0
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11: pkcs11h_token_freeTokenId
return gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
pkcs11h_certificate_freeCertificateIdList entry cert_id_list=0xd3fcb0
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
pkcs11h_certificate_freeCertificateId entry certificate_id=0xd40c70
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11: pkcs11h_token_freeTokenId
entry certificate_id=0xd410a0 gnupg-pkcs11-scd[22387.3394275072]:
PKCS#11: pkcs11h_token_freeTokenId return
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
pkcs11h_certificate_freeCertificateId return
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
pkcs11h_certificate_freeCertificateIdList return
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11: Terminating slotevent
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11:
_pkcs11h_slotevent_terminate entry gnupg-pkcs11-scd[22387.3394275072]:
PKCS#11: _pkcs11h_slotevent_terminate return
gnupg-pkcs11-scd[22387.3394275072]: PKCS#11: Marking as uninitialized
^C
jaap at jaap:~$


-- 

Jaap van Wingerde
e-mail: 1234567890 at vanwingerde.nl




More information about the Gnupg-users mailing list