On Thu 2018-02-01 09:22:15 +1300, Dan Horne wrote:
> I'd love to have gone to 2.2 but getting GnuPG to work on Solaris is
> extremely difficult. We tried compiling from source, but hit several
> roadblocks. Looking online, several others have reported the same issues,
> but have had no resolution.
I'd love to have gone to 2.2 but getting GnuPG to work on Solaris is
extremely difficult. We tried compiling from source, but hit several
roadblocks. Looking online, several others have reported the same issues,
but have had no resolution. I messaged this group, but unfortunately, none
of the sugge
Thanks for your reply..
How can we decrypt a file without passphrase prompt? Passphrase is entered via
code.
Thanks & Regards
Aneesh Varghese
From: Peter Lebbing
Sent: Wednesday, January 31, 2018 5:04 PM
To: Aneesh Varghese; gnupg-users@gnupg.org
Subjec
Hi Peter,
Currently I am able to decrypt the file using passphrase (passphrase entered
via windows popup), is it possible to avoid the windows popup for entering the
passphrase?
Thanks & Regards
Aneesh Varghese
From: Peter Lebbing
Sent: Wednesday, Jan
On Mon 2018-01-29 15:44:56 +1300, Dan Horne wrote:
> Has someone got a workaround? I need to be able to use "su" as we are not
> allowed to log into the user directly. I'm also stuck with Solaris and the
> specified version of GnuPG
the problem you're running into is that pinentry is unable to pro
On Wed 2018-01-31 09:37:54 +, Fiedler Roman wrote:
> Including it provides a fast way to generate keys without changing
> cryptographic material (slow),
I think you mean "to generate fingerprints", not "to generate keys" --
right? in particular, i think you're talking about the computational
On 31/01/18 13:19, Aneesh Varghese wrote:
> is it possible to avoid the windows popup for entering the passphrase?
The simplest way to avoid the popup is to remove the passphrase from the
private key.
The private key is stored on your hard disk. If there is no passphrase
on the private key, anybo
On 31/01/18 12:47, Aneesh Varghese wrote:
> Thanks for your reply..
> How can we decrypt a file without passphrase prompt?
I don't understand what you want me to explain.
A file is decrypted by using the private key. If the private key is
passphrase-protected, you will need to enter that passphra
On 31/01/18 07:12, Aneesh Varghese wrote:
> How to avoid the passphrase prompt while decrypting the file in the
> version gnupg-w32-2.2.3_20171120.
You can remove the passphrase from the private key by:
gpg --edit-key KEYID
passwd
Just enter the old password but keep the "new" fields blank. GnuP
> Von: Gnupg-users [mailto:gnupg-users-boun...@gnupg.org] Im Auftrag von
>
> On Tue 2018-01-30 21:35:57 -0500, FuzzyDrawrings via Gnupg-users wrote:
> > Wouldn't it make more sense to hash only the public-key's MPI
> > value(s)? That way if an implementation's code fails to generate a
> > unique ke
Hi,
How to avoid the passphrase prompt while decrypting the file in the version
gnupg-w32-2.2.3_20171120.
Thanks & Regards
Aneesh Varghese
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
Am Montag 29 Januar 2018 03:44:56 schrieb Dan Horne:
> I'm trying to generate keys from a user I have su'd to, but I get the
> following error:
>
> gpg-agent[23024]: command get_passphrase failed: Permission denied
Maybe you can work around the problem in a different way.
Ideas:
* Login as the us
Unfortunately safenet etoken pro doesn't seem to be compatible with gpg for
windows. Maybe i have to find something like a
http://gnupg-pkcs11.sourceforge.net/ smart-card daemon to enable the use of
PKCS#11 token with GnuPG for windows or use cygwin. Thank you for your support.
2018-01-30 09:1
13 matches
Mail list logo