-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi all!
I would like to use my O.card to securely hold an encryption key to be used by
the Linux "crypto filesystem". This fs uses an utiulity "losetup" at startup
which asks for a passphrase/keyword to be used as encryption/decryption key.
losetup
When I created my keypair I dutifully created and safely stored a
revocation certificate for it.
I recently added a new subkey and revoked the old subkey (as discussed
on this list). I've also added and revoked a few UIDs since the key
was created.
Is there any reason to generate a new revocatio
On Mon, Apr 18, 2005 at 05:11:10PM +0100, Adam Funk wrote:
> When I created my keypair I dutifully created and safely stored a
> revocation certificate for it.
>
> I recently added a new subkey and revoked the old subkey (as discussed
> on this list). I've also added and revoked a few UIDs since
I have a message that was encrypted and signed in one step. When I
decrypt it, I can read the message and see that the signature is valid.
So far so good.
I would now like to relay this message to a third party so he can
verify the signature too. But as far as I know, GPG has no way to do
t
On Mon, 18 Apr 2005, Patrick Chkoreff wrote:
I have a message that was encrypted and signed in one step. When I
decrypt it, I can read the message and see that the signature is valid.
So far so good.
I would now like to relay this message to a third party so he can verify
the signature too. B
On Apr 18, 2005, at 8:10 PM, Atom Smasher wrote:
for now, the only way to do it is to extract the session key from the
message (--show-session-key) and send that along with the encrypted
message to your 3rd party. they can use "--override-session-key" to
decrypt the message and verify the signat