About 50 results
Open links in new tab
  1. javier:~$ gpg -gen-key gpg (GnuPG) 0.9.8; Copyright (C) 1999 Free Software Foundation, Inc. This program comes with ABSOLUTELY NO WARRANTY. This is free software, and you are welcome to …

  2. A gpg running on the remote machine may then connect to the local gpg-agent and use its private keys. This enables decrypting or signing data on a remote machine without exposing the private keys to …

  3. For GCRY applications, the default error source is GPG_ERR_SOURCE_USER_1. You can define GCRY_ERR_SOURCE_DEFAULT before including ‘gcrypt.h’ to change this default.

  4. The function returns the error code GPG_ERR_NO_ERROR if the data object was suc-cessfully created, GPG_ERR_INV_VALUE if dh and exactly one of filename and fp is not a valid pointer, and …

  5. Sekunden, je nach gpg: key 3F567FB6 marked as ultimately trusted public and secret key created and signed.

  6. alice% gpg -gen-key gpg (GnuPG) 0.9.4; Copyright (C) 1999 Free Software Foundation, Inc. This program comes with ABSOLUTELY NO WARRANTY. This is free software, and you are welcome to …

  7. How it works Insecure PC Secure PC É Create a new user, gpg É On secure pc, add the following to .gnupg/gpg-agent.conf: extra-socket /home/gpg/.gnupg/S.gpg-agent-remote É On insecure pc, run …

  8. Because libassuan makes use of the GPG Error library, using libassuan will also use the GPG_ERR_* namespace directly, and the gpg_err* and gpg_str* namespaces indirectly.

  9. Jason Reich, the director of security for BuzzFeed, describes the importance of GnuPG to journalists this way: "GPG is part of a balanced breakfast of any reporter, especially one who wants to protect …

  10. Tools connecting to gpg-agent should first try to connect to the socket given in environment variable GPG AGENT INFO and then fall back to this socket. This option may not be used if the home …