I am sure I did not forget my passphrase

2009-11-08 Thread Marko Randjelovic
What I know is simple. I created a key today and tried it signing one file and it worked. Now, few hours later, I cannot do anything, and a message is wrong passphrase. I checked mod.time of secret keyring and it looks like was not modified in meanwhile. I am really confused, sure not have

Finding key ID of a keypair

2009-11-08 Thread Dion Moult
Hello, I've got myself a DSA keypair, just two files - one being the public key and the other being the private. I'm trying to find out the ID of that keypair. However this keypair doesn't show up when I do gpg --list-keys. It's passphraseless, it's DSA, and that's pretty much all I know. I

Re: I am sure I did not forget my passphrase

2009-11-08 Thread Ingo Klöcker
On Sunday 08 November 2009, Marko Randjelovic wrote: What I know is simple. I created a key today and tried it signing one file and it worked. Now, few hours later, I cannot do anything, and a message is wrong passphrase. I checked mod.time of secret keyring and it looks like was not modified

Algorithm used to encrypt

2009-11-08 Thread Heinz Diehl
Hi, seems I'm just too stupid today to find what's maybe obvious: given an ascii armored gpg encrypted file, how can I find out what algorithm has been used to encrypt the file? Thanks, Heinz. ___ Gnupg-users mailing list Gnupg-users@gnupg.org

Re: I am sure I did not forget my passphrase

2009-11-08 Thread Marko Randjelovic
I made sure, both when creating keys and trying to use it, to be US keyboard and CAPS LOCK off. After failures, I tried to turn on CAPS and change layout with no success. But I found errors in /var/log/messages regarding sda/hda. sda is HDD and hda is DVD. Nov 8 14:12:18 main kernel: [

Re: gpg rejects SHA224 with DSA-2048

2009-11-08 Thread David Shaw
On Nov 7, 2009, at 10:24 PM, Kevin Kammer wrote: On Sat, Nov 07, 2009 at 09:44:23PM -0500 Also sprach Robert J. Hansen: Kevin Kammer wrote: If I attempt to create a data signature using a 2048-bit DSA signing key, and the SHA224 hash algorithm, GnuPG complains as follows: ~ $ gpg -u A39CE7E5

Re: gpg rejects SHA224 with DSA-2048

2009-11-08 Thread Robert J. Hansen
David Shaw wrote: However, if you managed to generate a 2048-bit key with a 224-bit q (as earlier versions of GPG did), all versions of GPG would (correctly) allow the use of SHA-224 with this key. When did this changeover take place, and is there any way to get the old behavior back?

Re: gpg rejects SHA224 with DSA-2048

2009-11-08 Thread Kevin Kammer
On Sun, Nov 08, 2009 at 09:46:08PM -0500 David Shaw wrote: That's not quite how it works. What matters here is how the key was generated in the first place. One of the numbers used to generate a DSA key is known as q. In DSA, the size of q is what controls the size of the hash that will

Re: I am sure I did not forget my passphrase

2009-11-08 Thread Kevin Kammer
On Sun, Nov 08, 2009 at 04:24:01PM +0100 Marko Randjelovic wrote: Is there a way to check if secret key info was modified? Check the time/date of the latest self-signature on the key. However, if the key data was unintentionally modified outside of gpg, such as through data corruption, then

Re: gpg rejects SHA224 with DSA-2048

2009-11-08 Thread Kevin Kammer
On Sun, Nov 08, 2009 at 10:17:52PM -0500 Robert J. Hansen wrote: David Shaw wrote: However, if you managed to generate a 2048-bit key with a 224-bit q (as earlier versions of GPG did), all versions of GPG would (correctly) allow the use of SHA-224 with this key. When did this changeover

Re: Algorithm used to encrypt

2009-11-08 Thread Kevin Kammer
On Sun, Nov 08, 2009 at 05:52:37PM +0100 Heinz Diehl wrote: Hi, seems I'm just too stupid today to find what's maybe obvious: given an ascii armored gpg encrypted file, how can I find out what algorithm has been used to encrypt the file? Thanks, Heinz. I should preface what I say by

Re: gpg rejects SHA224 with DSA-2048

2009-11-08 Thread Robert J. Hansen
Kevin Kammer wrote: Unless there is some inescapable constraint on the size of one's signature, I am hard pressed to think of a reason for using SHA224 when SHA256 is available. Conformance with corporate IT policies. Many corporate IT policies are drafted by people who don't really

Re: gpg rejects SHA224 with DSA-2048

2009-11-08 Thread Kevin Kammer
On Sun, Nov 08, 2009 at 11:11:01PM -0500 Also sprach Robert J. Hansen: Kevin Kammer wrote: Unless there is some inescapable constraint on the size of one's signature, I am hard pressed to think of a reason for using SHA224 when SHA256 is available. Conformance with corporate IT policies.

Re: gpg rejects SHA224 with DSA-2048

2009-11-08 Thread David Shaw
On Nov 8, 2009, at 11:11 PM, Robert J. Hansen wrote: Kevin Kammer wrote: Unless there is some inescapable constraint on the size of one's signature, I am hard pressed to think of a reason for using SHA224 when SHA256 is available. Conformance with corporate IT policies. Many corporate IT

Re: gpg-error.h possible(?) syntax error: #define GPG_ERR_SYSTEM_ERROR (1 15)

2009-11-08 Thread Hedge Hog
On Fri, Nov 6, 2009 at 7:04 AM, Werner Koch w...@gnupg.org wrote: On Sun,  1 Nov 2009 11:04, hedgehogshia...@gmail.com said: It is not clear to me if this is an problem with gpg-error.h or swig. The same code with some context:  typedef enum    {      GPG_ERR_NO_ERROR = 0,