Bug#749335: Oldstable GnuPG no longer capable of using large keys

2014-06-24 Thread Werner Koch
On Sun, 1 Jun 2014 12:51, intrig...@debian.org said: oldstable than in testing/sid: it's one thing to accept upstream's newly set limits in testing/sid; it's an entirely different thing to For the records, GnuPG never supported keys larger than keys you can create with GnuPG, which is for RSA

Bug#749335: Oldstable GnuPG no longer capable of using large keys

2014-06-24 Thread Lance Hathaway
On Tuesday, June 24, 2014 11:26:07 AM, Werner Koch w...@gnupg.org wrote: For the records, GnuPG never supported keys larger than keys you can create with GnuPG, which is for RSA 4096 bit.  Largers keys may or may not work. I would like to state, for the record, that I -did- use GnuPG to

Bug#749335: Oldstable GnuPG no longer capable of using large keys

2014-06-01 Thread intrigeri
Hi, Lance Hathaway wrote (26 May 2014 14:00:10 GMT) : Attempting to sign other keys with the larger key causes GnuPG to immediately die with an out of secure memory message, as also reported in bug #739424. (Though that bug is filed against a different version.) Indeed, that's a duplicate of

Bug#749335: Oldstable GnuPG no longer capable of using large keys

2014-05-26 Thread Lance Hathaway
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Package: gnupg Version: 1.4.10-4+squeeze4 X-Debbugs-CC: intrig...@debian.org First-time bug reporter here, so my apologies in advance if I've left something out or committed any faux pas. I use TAILS to help safeguard my master GPG keypairs, of