Darxus on Mon, 16 Oct 2000 14:45:56 -0400 (EDT) |
FYI, based on my tests, I would not suggest upgrading to gpg v1.0.3. I suggest version 1.0.2 (which appears to be compatible with both 1.0.3 and 1.0.1). When I originally sent copies of the output to the author, he asked for verbose output, which is listed below. I have not yet gotten a reply. ----- Forwarded message from Darxus@ChaosReigns.com ----- Date: Wed, 11 Oct 2000 13:28:48 -0400 From: Darxus@ChaosReigns.com To: gnupg-users@gnupg.org On 10/11, Werner Koch wrote: > Please run again using "-vv" ---------------------------------------------------------------------- $ gpg --version gpg (GnuPG) 1.0.1 $ gpg -vv --decrypt -----BEGIN PGP MESSAGE----- Version: GnuPG v1.0.3 (GNU/Linux) Comment: For info see http://www.gnupg.org hQEOA/rhN5+gib3EEAP+No/Q+yoqPnf9bimfLz/AGDhBtusOZ92kYr0zWPezYTy1 DTnbba8CSTXutkkGd5J5wtqs8ltNhdpOEXhoAkiIA0wOi7WJgNjTw4ECyh+1vK2F jJ4IE0tj/khfva4bN254hy5Pb58z8OQV7c0krG43WXHsfv5UwQE13ftbUpYP2TMD +wU56tdK+8gctT01tNx0zUQ1cSBfD5F0XWrZF5sNDtebHmn11Fo590/VtXgN0LiB FrviqU0sL5NipZqYbIihszdYGuRj3FXbgmOzJDZMbFCjnuNQx0hBBIpsowGA/Sp7 DbAK3HAtfxBX12+KBOFFDP0aRSJCoE6oawFmHpi6fBmm0r4BmJ3DoCVJ6c6ASs6x WaE7elp2riEYPaPTH9U5H2z5DWYlRK7jVNL4GW+f3w21je+P+ZqadApLljVEM3BP nvlXdAILEmjQN3ODcSdwfFqqYUS+xxD70G0UzatflJEsdbFvgVhW9TwiSA3LAnp7 cuOk39CNFdEg1hYPLcK2Kb9NlaT+WVTC8GEcsYr+Bot4lyZsknyulInvGoL1Lx/q azrXjBvLNVxCh59CVMDWBtWJeLLWYie0l6kQ+OGuDKBM =KydG -----END PGP MESSAGE----- gpg: armor: BEGIN PGP MESSAGE gpg: armor header: Version: GnuPG v1.0.3 (GNU/Linux) gpg: armor header: Comment: For info see http://www.gnupg.org :pubkey enc packet: version 3, algo 16, keyid FAE1379FA089BDC4 data: [1022 bits] data: [1019 bits] gpg: public key is A089BDC4 gpg: loaded digest 2 gpg: /usr/lib/gnupg/rsa: RSA ($Revision: 1.8 $) gpg: /usr/lib/gnupg/idea: IDEA ($Revision: 1.8 $) You need a passphrase to unlock the secret key for user: "test key, delete <test@chaosreigns.com>" gpg: loaded pubkey 1 (RSA) gpg: loaded pubkey 2 (RSA-E) gpg: loaded pubkey 3 (RSA-S) 1024-bit ELG-E key, ID A089BDC4, created 2000-10-11 (main key ID 9F2C2471) gpg: loaded digest 3 gpg: key 9F2C2471: accepted as trusted key. gpg: public key encrypted data: good DEK :unknown packet: type 18, length 190 dump: 01 98 9d c3 a0 25 49 e9 ce 80 4a ce b1 59 a1 3b 7a 5a 76 ae 21 18 3d a3 24: d3 1f d5 39 1f 6c f9 0d 66 25 44 ae e3 54 d2 f8 19 6f 9f df 0d b5 8d ef 48: 8f f9 9a 9a 74 0a 4b 96 35 44 33 70 4f 9e f9 57 74 02 0b 12 68 d0 37 73 72: 83 71 27 70 7c 5a aa 61 44 be c7 10 fb d0 6d 14 cd ab 5f 94 91 2c 75 b1 96: 6f 81 58 56 f5 3c 22 48 0d cb 02 7a 7b 72 e3 a4 df d0 8d 15 d1 20 d6 16 120: 0f 2d c2 b6 29 bf 4d 95 a4 fe 59 54 c2 f0 61 1c b1 8a fe 06 8b 78 97 26 144: 6c 92 7c ae 94 89 ef 1a 82 f5 2f 1f ea 6b 3a d7 8c 1b cb 35 5c 42 87 9f 168: 42 54 c0 d6 06 d5 89 78 b2 d6 62 27 b4 97 a9 10 f8 e1 ae 0c a0 4c ---------------------------------------------------------------------- ---------------------------------------------------------------------- $ gpg --version gpg (GnuPG) 1.0.2 $ gpg -vv --decrypt -----BEGIN PGP MESSAGE----- Version: GnuPG v1.0.3 (GNU/Linux) Comment: For info see http://www.gnupg.org hQEOA/rhN5+gib3EEAP+No/Q+yoqPnf9bimfLz/AGDhBtusOZ92kYr0zWPezYTy1 DTnbba8CSTXutkkGd5J5wtqs8ltNhdpOEXhoAkiIA0wOi7WJgNjTw4ECyh+1vK2F jJ4IE0tj/khfva4bN254hy5Pb58z8OQV7c0krG43WXHsfv5UwQE13ftbUpYP2TMD +wU56tdK+8gctT01tNx0zUQ1cSBfD5F0XWrZF5sNDtebHmn11Fo590/VtXgN0LiB FrviqU0sL5NipZqYbIihszdYGuRj3FXbgmOzJDZMbFCjnuNQx0hBBIpsowGA/Sp7 DbAK3HAtfxBX12+KBOFFDP0aRSJCoE6oawFmHpi6fBmm0r4BmJ3DoCVJ6c6ASs6x WaE7elp2riEYPaPTH9U5H2z5DWYlRK7jVNL4GW+f3w21je+P+ZqadApLljVEM3BP nvlXdAILEmjQN3ODcSdwfFqqYUS+xxD70G0UzatflJEsdbFvgVhW9TwiSA3LAnp7 cuOk39CNFdEg1hYPLcK2Kb9NlaT+WVTC8GEcsYr+Bot4lyZsknyulInvGoL1Lx/q azrXjBvLNVxCh59CVMDWBtWJeLLWYie0l6kQ+OGuDKBM =KydG -----END PGP MESSAGE----- gpg: armor: BEGIN PGP MESSAGE gpg: armor header: Version: GnuPG v1.0.3 (GNU/Linux) gpg: armor header: Comment: For info see http://www.gnupg.org :pubkey enc packet: version 3, algo 16, keyid FAE1379FA089BDC4 data: [1022 bits] data: [1019 bits] gpg: public key is A089BDC4 gpg: loaded digest 2 gpg: /usr/lib/gnupg/rsa: RSA ($Revision: 1.8 $) gpg: /usr/lib/gnupg/idea: IDEA ($Revision: 1.8 $) You need a passphrase to unlock the secret key for user: "test key, delete <test@chaosreigns.com>" gpg: loaded pubkey 1 (RSA) gpg: loaded pubkey 2 (RSA-E) gpg: loaded pubkey 3 (RSA-S) 1024-bit ELG-E key, ID A089BDC4, created 2000-10-11 (main key ID 9F2C2471) gpg: loaded digest 3 gpg: key 9F2C2471: accepted as trusted key. gpg: public key encrypted data: good DEK :encrypted data packet: length: 189 mdc_method: 2 gpg: TWOFISH encrypted data :compressed packet: algo=2 :literal data packet: mode t, created 971280357, name="mutt-curious-20470-734", raw data: 125 bytes gpg: original file name='mutt-curious-20470-734' gpg: loaded digest 1 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline this is a test -- http://www.ChaosReigns.com gpg: decryption okay ---------------------------------------------------------------------- -- http://www.ChaosReigns.com -- Archive is at http://lists.gnupg.org - Unsubscribe by sending mail with a subject of "unsubscribe" to gnupg-users-request@gnupg.org ----- End forwarded message ----- -- http://www.ChaosReigns.com ______________________________________________________________________ Philadelphia Linux Users Group - http://www.phillylinux.org Announcements-http://lists.phillylinux.org/mail/listinfo/plug-announce General Discussion - http://lists.phillylinux.org/mail/listinfo/plug
|
|