- Original Message -
From: "Werner Koch"
To: "Pete Stephenson"
Cc: "GnuPG Users Mailing List"
Sent: Tuesday, September 10, 2013 12:07 PM
Subject: Re: Problems using 10kbit keys in GnuPG instead of 4kbit keys
- Some MUA decrypt messages on the fly while you are browsing through
al
On 2013.06.24. 21:18, Bob Henson wrote:
it just caused an error, saying "The module "c:\program" failed to
load. Make sure the binary is stored at the specified path or debug it
to check for problems with the binary or dependant .dll files. The
specified module could not be found." It looks to
There isn't enough entropy in a filename for an MD5 checksum to give
much in the way of secrecy.
It seems that MD5 checksum is computed from file contents, not name.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/
- Original Message -
From: "Michael Gauthier"
To:
Cc: "Michael Gauthier"
Sent: Wednesday, August 29, 2012 7:32 PM
Subject: Web-based pinentry
As of GnuPGv2, the --command-fd method of passing passphrases no longer
seems to work. Is there an alternative I can use so that the pin entry
On 2012.07.31. 12:35, Werner Koch wrote:
> On Tue, 31 Jul 2012 07:11, y...@yyy.id.lv said:
>
> Why do you think gpg2 won't work or does any network access without user
> consent?
>
gpg2 requires gpg agent..., i was referring to posibility
to making it a portable application (not requiring
installat
On 2012.07.30. 15:51, peter.segm...@wronghead.com wrote:
> I have been asked to help a small group of individuals
> (perhaps hundreds, not thousands) with secure data exchange
> (including, but not restricted to e-mail).
>
> Use of full gpg is way beyond their capabilities. I am
> wondering if anyb
On 2012.06.03. 23:07, Robert J. Hansen wrote:
> On 6/3/2012 10:46 AM, L G wrote:
>> During command line decryption, pinentry opens a popup window for the
>> passphrase. In the pinentry window, paste (Ctl+V) is not supported.
>> Deal breaker.
> Storing your passphrase in the clipboard is generally c
- Original Message -
From: "MFPA"
To: "da...@gbenet.com on GnuPG-Users"
Sent: Wednesday, May 16, 2012 12:43 AM
Subject: Re: Website link broken
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi
On Tuesday 15 May 2012 at 9:21:13 PM, in
, da...@gbenet.com wrote:
It works now :
problem (it was reproducible in winxp and
windows vista). See:
http://lists.wald.intevation.org/pipermail/gpg4win-users-en/2011-April/000598.html
and the rest of thread. (Kleopatra works only in english windows
(maybe german too)).
--
Best regards,
yyymailto
- Original Message -
From: "Werner Koch"
To: "Jerome Baum"
Cc:
Sent: Tuesday, October 18, 2011 7:00 PM
Subject: Re: STEED - Usable end-to-end encryption
On Tue, 18 Oct 2011 16:35, jer...@jeromebaum.com said:
operations will be the most important part to making that work, and the
On 2011.08.23. 10:07, Werner Koch wrote:
> On Mon, 22 Aug 2011 18:05, y...@yyy.id.lv said:
>
>> So, order of certificate hashes, relative of certificate order in
>> keyring, is critically important?
> No. You need to make sure to not use lines of more than ~255
> characters. Check that your edito
On 2011.08.22. 17:31, Werner Koch wrote:
> On Mon, 22 Aug 2011 15:27, y...@yyy.id.lv said:
>
>> This certificate does not have BasicConstraints, maybe this is a cause
>> of error?
> Quite likely. That is required for CA certifciates.
>
>> Is it possible to override check for BasicConstraints? Is
On 2011.08.22. 15:18, yyy wrote:
> On 2011.08.22. 15:03, Werner Koch wrote:
>> On Mon, 22 Aug 2011 11:07, y...@yyy.id.lv said:
>>
>>> How to verify if a certificate (in keyring) is valid?
>> gpgsm -k --with-validation USERID
>>
>> without USERID all cer
On 2011.08.22. 15:03, Werner Koch wrote:
> On Mon, 22 Aug 2011 11:07, y...@yyy.id.lv said:
>
>> How to verify if a certificate (in keyring) is valid?
> gpgsm -k --with-validation USERID
>
> without USERID all certifciates are validated. In case you want to skip
> CRL checks, add the option --dis
Hello!
How to verify if a certificate (in keyring) is valid?
I tried to encrypt file using gpgsm and no key specifiying methods worked
(http://lists.gnupg.org/pipermail/gnupg-users/2011-August/042580.html)
Could that be caused by invalid certificate?
___
Hello!
When using gpgsm to encrypt a file, what is the primarily
intended recipient format?
gpgsm -e -r file_to_be_encrypted.ext
What to put in place of ?
Certificate were imported using gpgsm --import cert.pem,
it shows in gpgsm --list-keys. Certificate is self signed and
the only fil
16 matches
Mail list logo