Hello List,
when I create a signature with gpg --sign, I'm able to use gpg
--decrypt to get the plaintext from the signature.
When I'm try to to this using gpgme resp.
gpgme_op_decrypt (gpgme_ctx_t ctx, gpgme_data_t cipher, gpgme_data_t plain)
I'm getting a GPG_ERR_NO_DATA error if cipher
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi
On Thursday 25 February 2010 at 3:53:23 AM, in
mid:4b85f433.1040...@mozilla-enigmail.org, John Clizbe wrote:
MFPA wrote:
Hi John
On Thursday 25 February 2010 at 12:17:36 AM, you
wrote:
It is also a good idea to send your key to the
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi
- --
Best regards
MFPAmailto:expires2...@ymail.com
Ultimate consistency lies in being consistently inconsistent
-BEGIN PGP SIGNATURE-
iQCVAwUBS4aK6aipC46tDG5pAQoWfgP+Kaflz5+32QsDfOJBV+tm33kXb8oDQzMo
On Wed, 24 Feb 2010 20:33:14 -0800, Smith, Cathy cathy.sm...@pnl.gov wrote:
We are migrating from OpenPGP which is a freeware version of PGP. Sorry for
the confusion.
I'm not familiar with OpenPGP, the software. I'm familiar with the PGP
Corporation's implementation (which I think is just
On Wed, Feb 24, 2010 at 2:26 PM, Robert J. Hansen r...@sixdemonbag.orgwrote:
On 2/24/10 11:18 AM, Jerry wrote:
Outlook Express is depreciated.
Outlook Express is deprecated, and many people here throw deprecations
against it -- but Outlook Express is still one of the most common MUAs
in
On 02/25/2010 11:59 AM, Carlos Chavez wrote:
I have to write the whole email manually in PHP because the PEAR libraries for
Mime do not quite get the headers right
Please file bugs against the PEAR libraries in question so that they can
be fixed. Thanks!
Regards,
--dkg
On Thu, 25 Feb 2010 12:35, f.schw...@chili-radiology.com said:
when I create a signature with gpg --sign, I'm able to use gpg
--decrypt to get the plaintext from the signature.
You might want to use:
gpg --verify --output PAINTEXT.TXT SIGNED.GPG
So is there a way to get the plaintext from
MFPA wrote:
On Thursday 25 February 2010 at 3:53:23 AM, in
mid:4b85f433.1040...@mozilla-enigmail.org, John Clizbe wrote:
MFPA wrote:
Hi John
On Thursday 25 February 2010 at 12:17:36 AM, you wrote:
It is also a good idea to send your key to the keyservers.
But is, of course, a matter
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Florian Weimer escribió:
* Stefan Xenon:
I don't know any integration in GnuPG but instead the following open
source implementatio may worth a try: http://point-at-infinity.org//
IIRC, this particular software does not implement Shamir's
On 2/25/10 9:24 AM, MFPA wrote:
Some people hate the idea and get *very* upset if their key does end
up on the servers.
What you're advocating here is DRM on the honor system. Don't copy
the key, don't distribute the key, don't upload the key, don't do
anything with the key, without the
Folks
Another question about this migration. Is it possible to do a mass import of a
single user's keyring or do I have to do it for each individual key. I've not
been able to find anything so far about anything that addresses this.
Thanks.
Cathy
---
Cathy L. Smith
IT Engineer
Pacific
On Feb 25, 2010, at 5:17 PM, Smith, Cathy wrote:
Folks
Another question about this migration. Is it possible to do a mass import of
a single user's keyring or do I have to do it for each individual key. I've
not been able to find anything so far about anything that addresses this.
Yes,
On Thu, 2010-02-25 at 14:24 +, MFPA wrote:
My point was that not everybody wishes/chooses to send their keys to
the keyservers.
Some people hate the idea and get *very* upset if their key does end
up on the servers.
In my case, the reason that I uploaded my keys to public keyservers was
On Thu, 2010-02-25 at 15:23 -0500, Robert J. Hansen wrote:
On 2/25/10 9:24 AM, MFPA wrote:
Some people hate the idea and get *very* upset if their key does end
up on the servers.
What you're advocating here is DRM on the honor system. Don't copy
the key, don't distribute the key, don't
Hello Smith, !
Smith, Cathy cathy.sm...@pnl.gov wrote:
Another question about this migration. Is it possible to do a mass import
of a single user's keyring or do I have to do it for each individual key.
I've not been able to find anything so far about anything that addresses
this.
I
On Thu, 2010-02-25 at 15:23 -0500, Robert J. Hansen wrote:
On 2/25/10 9:24 AM, MFPA wrote:
Some people hate the idea and get *very* upset if their key does end
up on the servers.
What you're advocating here is DRM on the honor system. Don't copy
the key, don't distribute the key, don't
My error. I didn't CC the following message to the mailing list.
On Thu, 2010-02-25 at 02:38 -0800, Paul Richard Ramer wrote:
I won't add to the other good replies, except for this. Concerning
the
revocation certificate that you would be behooved to create, you
should
take care to protect
On 2/25/10 1:04 PM, John Clizbe said:
MFPA wrote:
On Thursday 25 February 2010 at 3:53:23 AM, in
mid:4b85f433.1040...@mozilla-enigmail.org, John Clizbe wrote:
MFPA wrote:
Hi John
On Thursday 25 February 2010 at 12:17:36 AM, you wrote:
It is also a good
On 2/25/10 8:29 PM, Yawar Amin wrote:
I interpret that word, public, differently. To me just because a key
_can_ be made public doesn't mean it automatically _should_.
What in life is automatic, besides death and taxes?
We are not talking about automatic here. We are talking instead about
19 matches
Mail list logo