reassign 428635 libgcrypt11 severity 428635 normal thanks The assertion generated there is actually from libgcrypt, so your beef is with them :)
* Huy ([EMAIL PROTECTED]) wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA512 > > Package: gnupg2 > Version: 2.0.4-1 > Severity: important > > Hello, > > Gnupg2 gives out the following error as it tries to create dsa2 keys, > that is keys with size larger than 1024 bits, even though the > enable-dsa2 was already put in $HOME/.gnupg/gpg.conf. > > I know that while it is generally not advised to have dsa keys larger > than 1024 bits since they are not universally acceptable, however, it > is an option that can be enabled, and therefore should work as expected. > > gpg (GnuPG) 2.0.4; Copyright (C) 2007 Free Software Foundation, Inc. > This program comes with ABSOLUTELY NO WARRANTY. > This is free software, and you are welcome to redistribute it > under certain conditions. See the file COPYING for details. > > Please select what kind of key you want: > (1) DSA and Elgamal (default) > (2) DSA (sign only) > (5) RSA (sign only) > Your selection? 1 > DSA keys may be between 1024 and 3072 bits long. > What keysize do you want? (1024) 3072 > Requested keysize is 3072 bits > ELG keys may be between 1024 and 4096 bits long. > What keysize do you want? (2048) 4096 > Requested keysize is 4096 bits > Please specify how long the key should be valid. > 0 = key does not expire > <n> = key expires in n days > <n>w = key expires in n weeks > <n>m = key expires in n months > <n>y = key expires in n years > Key is valid for? (0) 0 > Key does not expire at all > Is this correct? (y/N) y > > You need a user ID to identify your key; the software constructs the > user ID > from the Real Name, Comment and Email Address in this form: > "Heinrich Heine (Der Dichter) <[EMAIL PROTECTED]>" > > Real name: woaosoaoososas > Email address: [EMAIL PROTECTED] > Comment: > You selected this USER-ID: > "woaosoaoososas <[EMAIL PROTECTED]>" > > Change (N)ame, (C)omment, (E)mail or (O)kay/(Q)uit? O > You need a Passphrase to protect your secret key. > > We need to generate a lot of random bytes. It is a good idea to perform > some other action (type on the keyboard, move the mouse, utilize the > disks) during the prime generation; this gives the random number > generator a better chance to gain enough entropy. > gpg: WARNING: some OpenPGP programs can't handle a DSA key with this > digest size > gpg2: dsa.c:187: generate: Assertion `nbits >= 512 && nbits <= 1024' > failed. > > Aborted -- Eric Dorland <[EMAIL PROTECTED]> ICQ: #61138586, Jabber: [EMAIL PROTECTED] 1024D/16D970C6 097C 4861 9934 27A0 8E1C 2B0A 61E9 8ECF 16D9 70C6
signature.asc
Description: Digital signature