On Tuesday, June 24, 2014 11:26:07 AM, Werner Koch wrote:
> For the records, GnuPG never supported keys larger than keys you can
> create with GnuPG, which is for RSA 4096 bit. Largers keys may or may
> not work.
I would like to state, for the record, that I -did- use GnuPG to create these
key
On Sun, 1 Jun 2014 12:51, intrig...@debian.org said:
> oldstable than in testing/sid: it's one thing to accept upstream's
> newly set limits in testing/sid; it's an entirely different thing to
For the records, GnuPG never supported keys larger than keys you can
create with GnuPG, which is for RS
Hi,
Lance Hathaway wrote (26 May 2014 14:00:10 GMT) :
> Attempting to sign other keys with the larger key causes GnuPG to
> immediately die with an "out of secure memory" message, as also
> reported in bug #739424. (Though that bug is filed against a different
> version.)
Indeed, that's a duplica
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Package: gnupg
Version: 1.4.10-4+squeeze4
X-Debbugs-CC: intrig...@debian.org
First-time bug reporter here, so my apologies in advance if I've left
something out or committed any faux pas.
I use TAILS to help safeguard my master GPG keypairs, of whi
4 matches
Mail list logo