Gnupg

2019-01-20 Thread amir 2090
hi i am master student at university of tehran My field is Cryptography how can add a other cipher or Post-Quantum cryptography to GPG ?i change all code like rsa or dsa but i didnt see any change in GPG. thx ___ Gnupg-users mailing list Gnupg-users@gnupg

Re: Discrepancies in extracted photo-id images from dumps

2019-01-20 Thread Stefan Claas
On Sun, 20 Jan 2019 19:22:10 +0100, Peter Lebbing wrote: > On 20/01/2019 17:07, Peter Lebbing wrote: > > I had a quick scan through the source code, but couldn't find it. > > Oops! I was looking at ancient code instead of the current code. That's > why I didn't find it. It's a RIPEMD-160 hash of

Re: Discrepancies in extracted photo-id images from dumps

2019-01-20 Thread Peter Lebbing
On 20/01/2019 17:07, Peter Lebbing wrote: > I had a quick scan through the source code, but couldn't find it. Oops! I was looking at ancient code instead of the current code. That's why I didn't find it. It's a RIPEMD-160 hash of the attribute that contains the JPEG image, but I'm not 100% clear o

Re: Discrepancies in extracted photo-id images from dumps

2019-01-20 Thread Stefan Claas
On Sun, 20 Jan 2019 17:07:23 +0100, Peter Lebbing wrote: > On 20/01/2019 16:05, Stefan Claas wrote: > > Thanks, but it is still unclear to me what content of the user id > > is taken. Here for example an old key from me: > > I had a quick scan through the source code, but couldn't find it. But i

Re: decryption failed: Bad session key

2019-01-20 Thread Peter Lebbing
Hi Frank, On 03/01/2019 15:25, Frank Hrebabetzky wrote: > gpg: AES256 encrypted data > gpg: encrypted with 1 passphrase > gpg: decryption failed: Bad session key This is also the error message you get when you specify the wrong passphrase. Perhaps you mistyped the passphrase when encrypting it? T

Re: Discrepancies in extracted photo-id images from dumps

2019-01-20 Thread Peter Lebbing
On 20/01/2019 16:05, Stefan Claas wrote: > Thanks, but it is still unclear to me what content of the user id > is taken. Here for example an old key from me: I had a quick scan through the source code, but couldn't find it. But it seems to me it's likely to be a hash of the User Attribute Packet (

Re: Discrepancies in extracted photo-id images from dumps

2019-01-20 Thread Stefan Claas
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Sun, 20 Jan 2019 15:22:08 +0100, Peter Lebbing wrote: > On 20/01/2019 13:38, Stefan Claas wrote: > > So taking the smallest image and looking at the %U part i am > > wondering what key data is encoded in this base32 string? > > From the gpg man

Re: Discrepancies in extracted photo-id images from dumps

2019-01-20 Thread Peter Lebbing
On 20/01/2019 13:38, Stefan Claas wrote: > So taking the smallest image and looking at the %U part i am > wondering what key data is encoded in this base32 string? From the gpg man page: | --photo-viewer string |This is the command line that should be run to view a photo ID. |"%i

Re: Discrepancies in extracted photo-id images from dumps

2019-01-20 Thread Stefan Claas
On Sat, 19 Jan 2019 21:37:33 +0100, Stefan Claas wrote: > On Sat, 19 Jan 2019 19:56:00 +0100, Ingo Klöcker wrote: > > This will result in at most 1 image per key because your fake photo-viewer > > overwrites photos for keys containing multiple photo-ids (%K.%t is > > identical > > for all phot