On Sun, 1 Jun 2014 12:51, intrig...@debian.org said:
oldstable than in testing/sid: it's one thing to accept upstream's
newly set limits in testing/sid; it's an entirely different thing to
For the records, GnuPG never supported keys larger than keys you can
create with GnuPG, which is for RSA
On Tuesday, June 24, 2014 11:26:07 AM, Werner Koch w...@gnupg.org wrote:
For the records, GnuPG never supported keys larger than keys you can
create with GnuPG, which is for RSA 4096 bit. Largers keys may or may
not work.
I would like to state, for the record, that I -did- use GnuPG to
Hi,
Lance Hathaway wrote (26 May 2014 14:00:10 GMT) :
Attempting to sign other keys with the larger key causes GnuPG to
immediately die with an out of secure memory message, as also
reported in bug #739424. (Though that bug is filed against a different
version.)
Indeed, that's a duplicate of
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Package: gnupg
Version: 1.4.10-4+squeeze4
X-Debbugs-CC: intrig...@debian.org
First-time bug reporter here, so my apologies in advance if I've left
something out or committed any faux pas.
I use TAILS to help safeguard my master GPG keypairs, of
4 matches
Mail list logo