On Feb 6, 2018 6:35 AM, Werner Koch wrote:
>
> On Tue, 6 Feb 2018 06:25, ed...@pettijohn-web.com said:
> > Please see attached patches to add support for arc4random_buf() as an
> > alternate to /dev/{u}random. I tried to be as unobtrusive as possible
> > and maintain style. It
On Sat, 3 Feb 2018 06:25, gnupg-users@gnupg.org said:
> I don't know if this is an error in the documentation, but I cannot obtain
> the sha256 result here:
Using the gpg option
--debug hashing
will create files with the hashed material. This is often very helful.
Shalom-Salam,
On Mon, 5 Feb 2018 16:41, jlight...@dsservices.com said:
> Basic questions:
> 1) Is the above message in fact an "error"?
Yes. It may either indicate an internal error in gpg or a wrong usage
(see next).
> 2) What exactly does it mean?
When starting the encryption and if possible gpg records
On Tue, 6 Feb 2018 06:25, ed...@pettijohn-web.com said:
> Please see attached patches to add support for arc4random_buf() as an
> alternate to /dev/{u}random. I tried to be as unobtrusive as possible
> and maintain style. It should also allow the user to still define
> RANDOM_CONF_ONLY_URANDOM if
Il 06/02/2018 06:47, Matthias Apitz ha scritto:
> Is there any way to export the secret keys from the OpenPGP card to use
> them directly (with a passphrase) and without the OpenPGP card?
Not possible by design.
What you can do is generate the key on the machine, then copy (not move)
it to the
On 06/02/18 10:03, Peter Lebbing wrote:
> So I always just create an
> on-disk key, back that up, and subsequently move the keys to the card.
> Obviously you need to think about data left on disk after removal of
> files; I'm just giving a quick outline. Hint: I don't have a hard disk
> plugged
On 06/02/18 06:47, Matthias Apitz wrote:
> Is there any way to export the secret keys from the OpenPGP card to use
> them directly (with a passphrase) and without the OpenPGP card?
You need to do it the other way around: you need to create on-disk keys
and export them to a card. It is explicitly
On 05/02/18 16:41, Lightner, Jeffrey wrote:
> 3) The command line we used to do the encryption without the new flag was:
> /usr/bin/gpg --always-trust --armor --recipient -o
> --encrypt
> Where is the encrypted file and
> is the original unencrypted file.
>
> 4) The command line with the
On 2/6/2018 6:47 AM, Matthias Apitz wrote:
> Is there any way to export the secret keys from the OpenPGP card to use
> them directly (with a passphrase) and without the OpenPGP card?
Short answer: No.
Longer answer: The OpenPGP card does not permit the export of keys it
stores. That's the whole
Hello List,
Is there anyone having experience with crypto-tokens to be unlocked by biometry
using a match-on-chip scheme?
If so, which matchers are supported by hardware or is it possible to install
them by yourself, e.g. for iris-scan if native hw-matcher does not support it
or should be
10 matches
Mail list logo