Re: [patches] add support for arc4random_buf()

2018-02-06 Thread edgar
On Feb 6, 2018 6:35 AM, Werner Koch wrote: > > On Tue,  6 Feb 2018 06:25, ed...@pettijohn-web.com said: > > Please see attached patches to add support for arc4random_buf() as an > > alternate to /dev/{u}random. I tried to be as unobtrusive as possible > > and maintain style. It

Re: draft-ietf-openpgp-rfc4880bis-04

2018-02-06 Thread Werner Koch
On Sat, 3 Feb 2018 06:25, gnupg-users@gnupg.org said: > I don't know if this is an error in the documentation, but I cannot obtain > the sha256 result here: Using the gpg option --debug hashing will create files with the hashed material. This is often very helful. Shalom-Salam,

Re: gpg: do_plaintext(): wrote 1210414045 bytes but expected 822504068 bytes

2018-02-06 Thread Werner Koch
On Mon, 5 Feb 2018 16:41, jlight...@dsservices.com said: > Basic questions: > 1) Is the above message in fact an "error"? Yes. It may either indicate an internal error in gpg or a wrong usage (see next). > 2) What exactly does it mean? When starting the encryption and if possible gpg records

Re: [patches] add support for arc4random_buf()

2018-02-06 Thread Werner Koch
On Tue, 6 Feb 2018 06:25, ed...@pettijohn-web.com said: > Please see attached patches to add support for arc4random_buf() as an > alternate to /dev/{u}random. I tried to be as unobtrusive as possible > and maintain style. It should also allow the user to still define > RANDOM_CONF_ONLY_URANDOM if

Re: OpenPGP card && exporting secret keys

2018-02-06 Thread NdK
Il 06/02/2018 06:47, Matthias Apitz ha scritto: > Is there any way to export the secret keys from the OpenPGP card to use > them directly (with a passphrase) and without the OpenPGP card? Not possible by design. What you can do is generate the key on the machine, then copy (not move) it to the

Re: OpenPGP card && exporting secret keys

2018-02-06 Thread Andrew Gallagher
On 06/02/18 10:03, Peter Lebbing wrote: > So I always just create an > on-disk key, back that up, and subsequently move the keys to the card. > Obviously you need to think about data left on disk after removal of > files; I'm just giving a quick outline. Hint: I don't have a hard disk > plugged

Re: OpenPGP card && exporting secret keys

2018-02-06 Thread Peter Lebbing
On 06/02/18 06:47, Matthias Apitz wrote: > Is there any way to export the secret keys from the OpenPGP card to use > them directly (with a passphrase) and without the OpenPGP card? You need to do it the other way around: you need to create on-disk keys and export them to a card. It is explicitly

Re: gpg: do_plaintext(): wrote 1210414045 bytes but expected 822504068 bytes

2018-02-06 Thread Peter Lebbing
On 05/02/18 16:41, Lightner, Jeffrey wrote: > 3) The command line we used to do the encryption without the new flag was: > /usr/bin/gpg --always-trust --armor --recipient -o > --encrypt > Where is the encrypted file and > is the original unencrypted file. > > 4) The command line with the

Re: OpenPGP card && exporting secret keys

2018-02-06 Thread Pete Stephenson
On 2/6/2018 6:47 AM, Matthias Apitz wrote: > Is there any way to export the secret keys from the OpenPGP card to use > them directly (with a passphrase) and without the OpenPGP card? Short answer: No. Longer answer: The OpenPGP card does not permit the export of keys it stores. That's the whole

PGP-compatible USB-crypto-token with biometry support

2018-02-06 Thread Fiedler Roman
Hello List, Is there anyone having experience with crypto-tokens to be unlocked by biometry using a match-on-chip scheme? If so, which matchers are supported by hardware or is it possible to install them by yourself, e.g. for iris-scan if native hw-matcher does not support it or should be