Is it possible to use gpgsm to encrypt data for a self-signed X.509
certificate? Right now, the program bails out with "issuer
certificate is not marked as a CA", and I would like to work around
that, preferably without running a full CA.
--
Florian Weimer
BFK edv-
* Roscoe:
> On Mon, Feb 22, 2010 at 7:32 PM, Florian Weimer wrote:
>> * Stefan Xenon:
>>
>>> I don't know any integration in GnuPG but instead the following open
>>> source implementatio may worth a try: http://point-at-infinity.org//
>>
>>
* Stefan Xenon:
> I don't know any integration in GnuPG but instead the following open
> source implementatio may worth a try: http://point-at-infinity.org//
IIRC, this particular software does not implement Shamir's scheme.
--
Florian Weimer
BFK edv
He probably wants you to send your message in OpenPGP/MIME format.
This is the better choice for various reasons, but it's still less
supported in the field.
--
Florian Weimer<[EMAIL PROTECTED]>
BFK edv-consulting GmbH http://www.bfk.de/
Kriegsstraße 100
easy).
Okay. I guess I need some form for my employer. Would you send it to
me, please?
--
Florian Weimer<[EMAIL PROTECTED]>
BFK edv-consulting GmbH http://www.bfk.de/
Kriegsstraße 100 tel: +49-721-96201-1
D-76133 Karlsruhe fax: +49-721-962
is
a hard fact in X.509, and rather fuzzy in OpenPG.
Would you accept a patch, even if it's a kludge? (Expiration doesn't
seem to be signalled separately, so we'd have to change the code that
generates the expiration flag, and not the code that uses it.)
--
Florian Weimer
Is it possible to ignore the key expiration date during encryption?
Unfortunately, people tend to set expiration dates without thinking
about the consequences. It's not always possible to get a new
self-signature in a reasonable time frame.
--
Florian Weimer<[EMAIL P
* Eric Robinson:
> CoreLabs Detects Flaw In GnuPG
> By CXOtoday Staff
> Mumbai, Mar 9, 2007
Have you seen the publication date? This has already been addressed
by new software releases.
--
Florian Weimer<[EMAIL PROTECTED]>
BFK edv-consulting GmbH ht
* Sean C.:
> The I.B.M. software would convert data on a person into a string of seemingly
> random characters, using a technique known as a one-way hash function. No
> names, addresses or Social Security numbers, for example, would be embedded
> within the character string.
For most applications