Hello,
I have created a self signed certificate(x.509) from the site
http://www.cert-depot.com/ and imported it to GnuPG. Then I tried to
encrypt a file using the imported x.509 certificate, I got an error
"Line too long". Couldn't get much details from
forums.
Please share your ideas/sugge
Howdy,
Likely something GPGME (http://www.gnupg.org/related_software/gpgme). Signs
point to gpgme-sharp, although it seems a bit inactive, someone more
knowledgeable correct me if there’s a better option.
https://github.com/danm-de/gpgme-sharp
http://stackoverflow.com/questions/4156819/using-th
On 25/04/14 00:19, Gabriel Niebler wrote:
> And "Authenticity" is an equally clear and additionally _intuitive_
> descriptive name for the same simple, mechanistic concept.
> "Validity" naturally lends itself to the combination of
> expiration/revokation status, and should be used for that (if at a
On Thu, 24 Apr 2014 19:55, ds...@jabberwocky.com said:
> I'm afraid I don't have immediate access to the GPG 2.x code base to check,
> but I wonder if your problem is simply that 2.x doesn't accept RSA_S and
> RSA_E keys?
There is indeed a bug related to the use of RSA_S and RSA_E if GnuPG 2.0
On 25/04/14 04:49, Hauke Laging wrote:
> Another point:
> Is it a good idea to use the same terms for both the key itself and user
> IDs?
What do you mean? Validity (and it's proposed new form, authenticity) refers to
the coupling of a key and a User ID. It doesn't refer to either thing by itself
On Thu, Apr 24, 2014 at 10:07:31PM +, Charles Spitzer wrote:
> Is there a GnuPGP project anywhere that does PGP encryption that is
> usable in a C# application? I know I can execute commands at a
> command line to do this, but that would require the plaintext to
> reside on disk somewhere and
Hi,
When using --list-keys, you can do this:
gpg --list-keys --with-colons "${GPG_RECIPIENTS[@]}" |
grep '^sub:' | cut -d ':' -f 5 | sort -u
Can you do the same with --list-only to get the (long versions of)
encryption keys in a colon-separated output?
Currently we're using this:
gpg -v --li
Hi,
When using --list-keys, you can do this:
gpg --list-keys --with-colons "${GPG_RECIPIENTS[@]}" |
grep '^sub:' | cut -d ':' -f 5 | sort -u
Can you do the same with --list-only to get the (long versions of)
encryption keys in a colon-separated output?
Currently we're using this:
gpg -v --li
German and English have been closely related for many centuries. But
I've been trying to make sense of the terms using the *other* half of
English, since so many of these words seem to have Latin roots.
Valid: having value; acceptable for certain transactions. A bank
draft is valid if it identif
What about abandoning terms of art and just saying things more simply:
"This message was signed by key . You have indicated that you
trust that key."
--
Mark H. Wood, Lead System Programmer mw...@iupui.edu
Machines should not be friendly. Machines should be obedient.
signature.asc
D
On 04/25/2014 12:38 AM, Hauke Laging wrote:
> Am Mi 23.04.2014, 20:32:27 schrieb MFPA:
>
>> Say a user has two keys, 0x0123456789abcdef and 0xfedcba9876543210. I
>> propose each key could sign the other with a signature notation
>> something like:-
>> siblings-0x0123456789abcdef-0xfedcba9876543...
On 04/24/2014 10:49 PM, Hauke Laging wrote:
> a) Many keys are certified without being verified. This is IMHO not so
> much a problem if this is transparent. Think of --ask-cert-level. BTW: I
> really don't like the --min-cert-level default to be 2 because this
> forces the users to either igno
On 04/25/2014 09:23 AM, Mark H. Wood wrote:
> What about abandoning terms of art and just saying things more simply:
> "This message was signed by key . You have indicated that you
> trust that key."
trust that key to do what? to belong to some mystery person? to make
valid OpenPGP sign
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 25/04/2014 18:02, Daniel Kahn Gillmor wrote:
> On 04/25/2014 09:23 AM, Mark H. Wood wrote:
>> What about abandoning terms of art and just saying things more
>> simply: "This message was signed by key . You have
>> indicated that you trust
On 04/22/2014 06:50 PM, Nicolai Josuttis wrote:
> me: you either can sign the key
> or trust somebody else who signed the key
> (such as pg...@ct.heise.de)
> he: Oh, I even registered my email/key there
>but what else is missing?
> me: load the key for pg...@ct.heise.de
> he
On 04/24/2014 06:19 PM, Gabriel Niebler wrote:
> """
> A key on my keyring is "valid" if it is not expired or revoked.
> It is "authentic" if it bears one signature from one of my keys, or
> several signatures from other keys to which I have granted marginal
> authority to authenticate keys.
> """
I can confirm that - I compiled GnuPG against the latest version of libgcrypt
in git, and it imported the second key fine.
gpg2 --version
gpg (GnuPG) 2.0.22
libgcrypt 1.7.0-beta61
Daniel
On 25/04/2014, at 7:57 PM, Werner Koch wrote:
> On Thu, 24 Apr 2014 19:55, ds...@jabberwocky.com said:
>
17 matches
Mail list logo