-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Package: gnupg2 Version: 2.0.4-1 Severity: important
Hello, Gnupg2 gives out the following error as it tries to create dsa2 keys, that is keys with size larger than 1024 bits, even though the enable-dsa2 was already put in $HOME/.gnupg/gpg.conf. I know that while it is generally not advised to have dsa keys larger than 1024 bits since they are not universally acceptable, however, it is an option that can be enabled, and therefore should work as expected. gpg (GnuPG) 2.0.4; Copyright (C) 2007 Free Software Foundation, Inc. This program comes with ABSOLUTELY NO WARRANTY. This is free software, and you are welcome to redistribute it under certain conditions. See the file COPYING for details. Please select what kind of key you want: (1) DSA and Elgamal (default) (2) DSA (sign only) (5) RSA (sign only) Your selection? 1 DSA keys may be between 1024 and 3072 bits long. What keysize do you want? (1024) 3072 Requested keysize is 3072 bits ELG keys may be between 1024 and 4096 bits long. What keysize do you want? (2048) 4096 Requested keysize is 4096 bits Please specify how long the key should be valid. 0 = key does not expire <n> = key expires in n days <n>w = key expires in n weeks <n>m = key expires in n months <n>y = key expires in n years Key is valid for? (0) 0 Key does not expire at all Is this correct? (y/N) y You need a user ID to identify your key; the software constructs the user ID from the Real Name, Comment and Email Address in this form: "Heinrich Heine (Der Dichter) <[EMAIL PROTECTED]>" Real name: woaosoaoososas Email address: [EMAIL PROTECTED] Comment: You selected this USER-ID: "woaosoaoososas <[EMAIL PROTECTED]>" Change (N)ame, (C)omment, (E)mail or (O)kay/(Q)uit? O You need a Passphrase to protect your secret key. We need to generate a lot of random bytes. It is a good idea to perform some other action (type on the keyboard, move the mouse, utilize the disks) during the prime generation; this gives the random number generator a better chance to gain enough entropy. gpg: WARNING: some OpenPGP programs can't handle a DSA key with this digest size gpg2: dsa.c:187: generate: Assertion `nbits >= 512 && nbits <= 1024' failed. Aborted Thanks, Huy - --- System information. --- Architecture: i386 Kernel: Linux 2.6.20 Debian Release: lenny/sid 990 unstable ftp.de.debian.org 500 testing security.debian.org 500 testing ftp.de.debian.org 500 stable security.debian.org 1 experimental ftp.de.debian.org - --- Package information. --- Depends (Version) | Installed ===============================-+-============== libbz2-1.0 | 1.0.3-7 libc6 (>= 2.5-5) | 2.5-10 libgcrypt11 (>= 1.2.2) | 1.2.4-2 libgpg-error0 (>= 1.4) | 1.4-2 libksba8 (>= 1.0.0) | 1.0.1-2 libldap2 (>= 2.1.17-1) | 2.1.30-13.4 libreadline5 (>= 5.2) | 5.2-3 zlib1g (>= 1:1.2.1) | 1:1.2.3-15 - -- Key ID = 0xE024A6F3 Key fingerprint = C9A1 2E1E 1E10 6514 2E7D 8934 08C6 B43F E024 A6F3 -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.4 (GNU/Linux) iQIVAwUBRm90uZfhWeS24kpvAQob/Q/9EphIFZY/lfPU9Tlldqo3KZC5ijF5r3QZ vET1yMpfY5bn7SVUNdH91KQ4uVWZ2mGVUvUic6yl/Tcx9oGMiiEg0dxe7bx1EzXl BZDZAwBAvtq0cP4JrqKcFM3Qqxn5RDhEHmh+G8EMFII4goJVxSlFAQT4WWSRepoc leEZoN/59p51J+u9ghJ9RTqepUFdLFrnkg4QbJEHDNdIlyhXqPaMAaHxStiBjLI+ pDEnfFE698jMAiwcx3/k1TqceWILeAGIfj7M3XXZAi4luTKYSrgnzs2Jykd7VezO j0WsvTruZhFB6SDfEh/BssWQQWfB3nWiCjl0qFY0yrOOfjJBAKMhiM3INT5VRRLN cg0vZwikqKN5nzM9nA4xW94OPV220ooPzdociyONmvO7yZtxsPPh3PTXtqwwBWQa /b3sRmsKPIzZd/f8M3nLd+jqGLxTIUrBCfXDhEBa+JXhxNFMOXBhWD4EfJ4Xl5JS qeMfYj1ae6+TXigkxd0BLzDzr5zl2+6nDQsQE0iW3QjcLgx76twV6MB5ud09xcAg pT0cyyXLX6q8U64i2lJtzVcZbB6/bh1Wn3D+06nYDFK+jJkB0xPYLnpMF++nEttD x1PVXlFUwNom9i7/FIZCYFyDH12CLvkVAkxrfwCeb90aSMq9MjbEMo9PcxlBDO/t IT4kMc8HuJk= =MZof -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]