Hi Everyone,
This is a stupid question I'm sure but I can't seem to find an answer
to it in the source code so I thought I'd ask here. When GnuPG is
selecting primes for RSA key generation, what parameters are set for
the primes? Is there a floor and a ceiling set for the numbers
generated? Please
On Sat, Apr 28, 2012 at 10:21:52PM +0100, michael crane wrote:
> what is the reasoning for attaching the key ID to the end of the
> fingerprint string ?
That's the way the key ID is derived for v4 keys. v4 keys use the low
64 bits (or 32 bits for short key IDs) as the key ID. v3 keys used the
lo
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 28.04.2012 23:21, michael crane wrote:
> what is the reasoning for attaching the key ID to the end of the
> fingerprint string ?
>
Hi Mick
If I understand your question correctly it is actually the other way
around, with the KeyID being based
> Original Message
> Subject: Re: Question about key fingerprint uses
> From: Peter Lebbing
> Date: Fri, April 27, 2012 5:40 am
> To: Anthony Papillion
>
> You're turning it around :). Rather than verify you are speaking to John using
> his fingerprint, you are verifying the f
Am Sa 28.04.2012, 22:21:52 schrieb michael crane:
> what is the reasoning for attaching the key ID to the end of the
> fingerprint string ?
The "reason" is that the short and long key ID are defined as the last 4/8
bytes of the fingerprint. In other words: They are not attached to the
fingerprin
what is the reasoning for attaching the key ID to the end of the
fingerprint string ?
regards
mick
--
keyID: 0x4BFEBB31
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
Hello, I am facing problems decrypting data with my OpenPGP v2 card.
Signing however is working just fine. I have collected the following
output. The PIN retry counter looks a bit weird, could that be the problem?
$ echo Test >foo.txt
$ gpg2 --default-key 0xF3D84563 --armor -e