Re: understanding GnuPG "--clearsign" option

2013-08-12 Thread David Shaw
On Aug 12, 2013, at 4:40 AM, Martin T wrote: > Hi, > > one can sign the message with "--clearsign" option which adds ASCII > armored(Radix-64 encoding) "PGP signature" at the end of the text. > This "PGP signature" contains the UID of the signer, timestamp and key > ID. However, two questions: >

Re: understanding GnuPG "--clearsign" option

2013-08-12 Thread Max R.D Parmer
On Mon, Aug 12, 2013 at 11:40:35AM +0300, Martin T wrote: > Hi, > > one can sign the message with "--clearsign" option which adds ASCII > armored(Radix-64 encoding) "PGP signature" at the end of the text. > This "PGP signature" contains the UID of the signer, timestamp and key > ID. However, two q

[OT] Re: How to create new keyring from an existing key in an existing keyring?

2013-08-12 Thread Peter Lebbing
On 12/08/13 14:04, Henry Hertz Hobbit wrote: >> gpg --export 0xDEADBEEF | gpg --no-default-keyring --keyring \ >> /etc/apt/trusted.gpg.d/meat.gpg --import > Assumes /etc/apt/trusted.gpg.d exists and is a folder (good assumption for > Debian based, not so good for RPM based) I simply took his own

Re: How to create new keyring from an existing key in an existing keyring?

2013-08-12 Thread adrelanos
Peter Lebbing: > On 11/08/13 23:11, adrelanos wrote: >> I could think of a way to export the key, change --homedir, create a new >> keyring, and import a the key. But is there a more elegant way? > > gpg --export 0xDEADBEEF | gpg --no-default-keyring --keyring \ > /etc/apt/trusted.gpg.d/meat.gpg -

Re: Question about notations and domains

2013-08-12 Thread Werner Koch
On Sun, 11 Aug 2013 16:44, eye.of.the.8ehol...@gmail.com said: > Also is there a list or "registry" containing the defined notations ? > The only ones i am aware of are preferred-email-encoding and issuer-fpr. The notations GnuPG knows about are found in g10/parse-packet.c:can_handle_critical_

Re: understanding GnuPG "--clearsign" option

2013-08-12 Thread Henry Hertz Hobbit
On 08/12/2013 08:40 AM, Martin T wrote: > Hi, > > one can sign the message with "--clearsign" option which adds ASCII > armored(Radix-64 encoding) "PGP signature" at the end of the text. > This "PGP signature" contains the UID of the signer, timestamp and key > ID. However, two questions: GnuPG d

Re: understanding GnuPG "--clearsign" option

2013-08-12 Thread Leo Gaspard
On Mon, Aug 12, 2013 at 11:40:35AM +0300, Martin T wrote: > Hi, > > one can sign the message with "--clearsign" option which adds ASCII > armored(Radix-64 encoding) "PGP signature" at the end of the text. > This "PGP signature" contains the UID of the signer, timestamp and key > ID. However, two q

[Announce] GPGME 1.4.3 released

2013-08-12 Thread Werner Koch
Hello! I am pleased to announce version 1.4.3 of GPGME. GnuPG Made Easy (GPGME) is a C language library that allows to add support for cryptography to a program. It is designed to make access to public key crypto engines as included in GnuPG easier for applications. GPGME provides a hig

Re: How to create new keyring from an existing key in an existing keyring?

2013-08-12 Thread Henry Hertz Hobbit
On 08/12/2013 09:18 AM, Peter Lebbing wrote: > On 11/08/13 23:11, adrelanos wrote: >> I could think of a way to export the key, change --homedir, create a new >> keyring, and import a the key. But is there a more elegant way? > > gpg --export 0xDEADBEEF | gpg --no-default-keyring --keyring \ > /et

Re: How to create new keyring from an existing key in an existing keyring?

2013-08-12 Thread Peter Lebbing
On 11/08/13 23:11, adrelanos wrote: > I could think of a way to export the key, change --homedir, create a new > keyring, and import a the key. But is there a more elegant way? gpg --export 0xDEADBEEF | gpg --no-default-keyring --keyring \ /etc/apt/trusted.gpg.d/meat.gpg --import (one long comman

understanding GnuPG "--clearsign" option

2013-08-12 Thread Martin T
Hi, one can sign the message with "--clearsign" option which adds ASCII armored(Radix-64 encoding) "PGP signature" at the end of the text. This "PGP signature" contains the UID of the signer, timestamp and key ID. However, two questions: 1) Where is the UID of the signer, timestamp of the signatu