[Announce] GnuPG 2.1.0 "modern" released

Murphy mac3iii at gmail.com
Mon Nov 10 03:39:01 CET 2014


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

ok - found the same issue with gpg2 --expert --edit myKey

gpg> addkey
Please select what kind of key you want:
   (3) DSA (sign only)
   (4) RSA (sign only)
   (5) Elgamal (encrypt only)
   (6) RSA (encrypt only)
   (7) DSA (set your own capabilities)
   (8) RSA (set your own capabilities)
  (10) ECC (sign only)
  (11) ECC (set your own capabilities)
  (12) ECC (encrypt only)
  (13) Existing key
Your selection? 12
Please select which elliptic curve you want:
   (1) Curve 25519
   (2) NIST P-256
   (3) NIST P-384
   (4) NIST P-521
   (5) Brainpool P-256
   (6) Brainpool P-384
   (7) Brainpool P-512
Your selection? 1
gpg: WARNING: Curve25519 is not yet part of the OpenPGP standard.
Use this curve anyway? (y/N) y
Please specify how long the key should be valid.
         0 = key does not expire
      <n>  = key expires in n days
      <n>w = key expires in n weeks
      <n>m = key expires in n months
      <n>y = key expires in n years
Key is valid for? (0) 0
Key does not expire at all
Is this correct? (y/N) y
Really create? (y/N) y
We need to generate a lot of random bytes. It is a good idea to perform
some other action (type on the keyboard, move the mouse, utilize the
disks) during the prime generation; this gives the random number
generator a better chance to gain enough entropy.
gpg: agent_genkey failed: Unknown elliptic curve
gpg: Key generation failed: Unknown elliptic curve

So Linux has the same bug.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iJwEAQECAAYFAlRgJUUACgkQUVKxkWZz2Q0/JAP+JoqE96OHIxvjq1bZWAcGn8Ce
ZRiw55CzVLHLIg+6XQSujdIdH6onxUhzuP79wcq1ibvfF9GYkfBQgpvDoTj+0T3z
n6Yd2Ua0ou1mLSHHNj4my4vJmV1gYD3Ef0ilZ1TJzdNuHG9k7+myI5Q6lfgul2lz
ZoTptmcNqjWqoQjT6BM=
=ADLB
-----END PGP SIGNATURE-----



More information about the Gnupg-users mailing list