-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package: gnupg2
Version: 2.0.4-1
Severity: important

Hello,

Gnupg2 gives out the following error as it tries to create dsa2 keys,
that is keys with size larger than 1024 bits, even though the
enable-dsa2 was already put in $HOME/.gnupg/gpg.conf.

I know that while it is generally not advised to have dsa keys larger
than 1024 bits since they are not universally acceptable, however, it
is an option that can be enabled, and therefore should work as expected.

gpg (GnuPG) 2.0.4; Copyright (C) 2007 Free Software Foundation, Inc.
This program comes with ABSOLUTELY NO WARRANTY.
This is free software, and you are welcome to redistribute it
under certain conditions. See the file COPYING for details.

Please select what kind of key you want:
   (1) DSA and Elgamal (default)
   (2) DSA (sign only)
   (5) RSA (sign only)
Your selection? 1
DSA keys may be between 1024 and 3072 bits long.
What keysize do you want? (1024) 3072
Requested keysize is 3072 bits
ELG keys may be between 1024 and 4096 bits long.
What keysize do you want? (2048) 4096
Requested keysize is 4096 bits
Please specify how long the key should be valid.
         0 = key does not expire
      <n>  = key expires in n days
      <n>w = key expires in n weeks
      <n>m = key expires in n months
      <n>y = key expires in n years
Key is valid for? (0) 0
Key does not expire at all
Is this correct? (y/N) y

You need a user ID to identify your key; the software constructs the
user ID
from the Real Name, Comment and Email Address in this form:
    "Heinrich Heine (Der Dichter) <[EMAIL PROTECTED]>"

Real name: woaosoaoososas
Email address: [EMAIL PROTECTED]
Comment:
You selected this USER-ID:
    "woaosoaoososas <[EMAIL PROTECTED]>"

Change (N)ame, (C)omment, (E)mail or (O)kay/(Q)uit? O
You need a Passphrase to protect your secret key.

We need to generate a lot of random bytes. It is a good idea to perform
some other action (type on the keyboard, move the mouse, utilize the
disks) during the prime generation; this gives the random number
generator a better chance to gain enough entropy.
gpg: WARNING: some OpenPGP programs can't handle a DSA key with this
digest size
gpg2: dsa.c:187: generate: Assertion `nbits >= 512 && nbits <= 1024'
failed.

Aborted


Thanks,
Huy


- --- System information. ---
Architecture: i386
Kernel: Linux 2.6.20

Debian Release: lenny/sid
990 unstable ftp.de.debian.org
500 testing security.debian.org
500 testing ftp.de.debian.org
500 stable security.debian.org
1 experimental ftp.de.debian.org

- --- Package information. ---
Depends (Version) | Installed
===============================-+-==============
libbz2-1.0 | 1.0.3-7
libc6 (>= 2.5-5) | 2.5-10
libgcrypt11 (>= 1.2.2) | 1.2.4-2
libgpg-error0 (>= 1.4) | 1.4-2
libksba8 (>= 1.0.0) | 1.0.1-2
libldap2 (>= 2.1.17-1) | 2.1.30-13.4
libreadline5 (>= 5.2) | 5.2-3
zlib1g (>= 1:1.2.1) | 1:1.2.3-15


- --
Key ID = 0xE024A6F3
Key fingerprint = C9A1 2E1E 1E10 6514 2E7D  8934 08C6 B43F E024 A6F3


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.4 (GNU/Linux)
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=MZof
-----END PGP SIGNATURE-----



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to