Am Sonntag, den 05.10.2008, 19:49 -0400 schrieb David Shaw:
A revocation certificate, on the other hand, doesn't
have all that much that can be removed. Luckily revocation
certificates are pretty short to begin with. The only real advantage
that paperkey could bring to revocation
Werner Koch wrote:
The latest stable one is 1.1.6,from January. However you should better
use the SVN version or this snapshot:
ftp://ftp.g10code.com/g10code/scratch/gpgme-1.1.7-svn1327.tar.bz2
(that one my be removed at any time)
How do I know which one is stable? And why isn't the
On Thu, Oct 02, 2008 at 05:01:39PM -0500, Duwaine Robinson wrote:
Hi All,
Is there a way to get GnuPG to complete encryption, if there is at least
one valid public key specified? I am trying automate my encryption
process, and I am hoping to be able to get away with not having to
specify
Thank you. I actually decided last week to verify whether the each key
is valid before I perform the encryption. I used the --list-keys command
along with a loop to accomplish this with ease.
Duwaine Robinson
-Original Message-
From: Peter Pentchev [mailto:[EMAIL PROTECTED]
Sent:
When using gpg with the --symmetric flag (as when symmetrically
encrypting a file with a passphrase), is the passphrase salted and
hashed? Is so, how many times is it hashed, and what hashing
algorithm is used for this process? Is this controlled by some
parameter in the gpg.conf file or command
Its often been mentioned on this mailing list, that 3DES is
notoriously slow. On the flipside, what cipher is considered the
fastest -- or the most computationally efficient (if this term even
applies)? Are there similar relative results among the GnuPG hashes?
Thanks
--
Kevin Hilton
On Oct 6, 2008, at 10:54 AM, Kevin Hilton wrote:
When using gpg with the --symmetric flag (as when symmetrically
encrypting a file with a passphrase), is the passphrase salted and
hashed?
Yes. Unless you change that safe default with --s2k-mode.
Is so, how many times is it hashed, and
Is there a maximum file size that gpg 1..4.5 can encrypt?
Tom Chitwood
MCP, MCSE, CNA
Wellpoint Account
Information Technology Services Americas
Global Services, IBM
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
On Mon, Oct 6, 2008 at 10:17 AM, David Shaw [EMAIL PROTECTED] wrote:
On Oct 6, 2008, at 10:54 AM, Kevin Hilton wrote:
When using gpg with the --symmetric flag (as when symmetrically
encrypting a file with a passphrase), is the passphrase salted and
hashed?
Yes. Unless you change that safe
On Mon, Oct 06, 2008 at 08:03:10AM -0700, Thomas Chitwood wrote:
Is there a maximum file size that gpg 1..4.5 can encrypt?
There are quite a few bits and details around this, but in general, it
is whatever the maximum file size your OS supports.
How big are the files you're talking about?
On Mon, Oct 06, 2008 at 10:28:21AM -0500, Kevin Hilton wrote:
Thanks -- very clear explanations. How long can the passphrase be? I
assume it would be truncated at a particular length. For example if I
passes a Whirlpool Hash as the passphrase, would the entire 128-digit
hexadecimal hash be
On Mon, Oct 06, 2008 at 08:03:12AM +0200, Sven Radde wrote:
Am Sonntag, den 05.10.2008, 19:49 -0400 schrieb David Shaw:
A revocation certificate, on the other hand, doesn't
have all that much that can be removed. Luckily revocation
certificates are pretty short to begin with. The only
Kevin Hilton wrote:
Its often been mentioned on this mailing list, that 3DES is
notoriously slow. On the flipside, what cipher is considered the
fastest -- or the most computationally efficient (if this term even
applies)? Are there similar relative results among the GnuPG hashes?
AES is
On Mon, Oct 06, 2008 at 10:14:44AM -0500, Kevin Hilton wrote:
Its often been mentioned on this mailing list, that 3DES is
notoriously slow. On the flipside, what cipher is considered the
fastest -- or the most computationally efficient (if this term even
applies)? Are there similar relative
David Shaw wrote:
On Mon, Oct 06, 2008 at 08:03:12AM +0200, Sven Radde wrote:
Am Sonntag, den 05.10.2008, 19:49 -0400 schrieb David Shaw:
A revocation certificate, on the other hand, doesn't
have all that much that can be removed. Luckily revocation
certificates are pretty short to begin
David Shaw dshaw at jabberwocky.com wrote on
Mon Oct 6 19:44:40 CEST 2008 :
There is no limit in OpenPGP for a passphrase length,
beyond that of the inherent limit
imposed by the hash used for string-to-key conversion
interesting,
am way out of my depth here,
in that i don't understand the
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
How would one go about making sure everything works? I built GPG for
Windows following the instructions at
http://clbianco.altervista.org/gnupg/eng/gnupg.html (a link at
gnupg.org/download.html). Unfortunately, I cannot find the libcurl
package
On Oct 6, 2008, at 6:17 PM, [EMAIL PROTECTED] wrote:
[1] a 64 character passphrase should be more than enough for even
the most paranoid user, if it could even be remembered reliably
accurately ;-)
or
[2] a passphrase for a block cipher that has a 64 character session
key
*somehow* wouldn't
On Oct 6, 2008, at 3:25 PM, Morton D. Trace wrote:
David Shaw wrote:
On Mon, Oct 06, 2008 at 08:03:12AM +0200, Sven Radde wrote:
Am Sonntag, den 05.10.2008, 19:49 -0400 schrieb David Shaw:
A revocation certificate, on the other hand, doesn't
have all that much that can be removed. Luckily
19 matches
Mail list logo