diff options
author | Werner Koch <wk@gnupg.org> | 1999-02-25 13:03:29 +0100 |
---|---|---|
committer | Werner Koch <wk@gnupg.org> | 1999-02-25 13:03:29 +0100 |
commit | cbe6d2fd2abbf66fc85bde89789bd73833b6058e (patch) | |
tree | b536e0b6a32965e865a52f9797f8490e4e7dfa28 /BUGS | |
parent | See ChangeLog: Wed Feb 24 11:07:27 CET 1999 Werner Koch (diff) | |
download | gnupg2-cbe6d2fd2abbf66fc85bde89789bd73833b6058e.tar.xz gnupg2-cbe6d2fd2abbf66fc85bde89789bd73833b6058e.zip |
*** empty log message ***
Diffstat (limited to 'BUGS')
-rw-r--r-- | BUGS | 14 |
1 files changed, 14 insertions, 0 deletions
@@ -53,3 +53,17 @@ an "info standards" to find out why a disclaimer is needed for GNU.) "The keyring contains a bad (corrupted) PGP packet". The resulting file is missing information from the front. +[ *] #8 1999-02-25 <kazu@iijlab.net> + %gpg --encrypt -r kazu@iijlab.net --batch foo + gpg: Warning: using insecure memory! + gpg: 11C23F61: no info to calculate a trust probability + + This creates a symmetrically encrypted message WITHOUT a session key + encrypted with public cryptographic(i.e. foo.gpg). This is probably + because GNUPG encrypted a message with a random session key first then + tries to find public keys specified with the -r option. I don't like + this. + + + + |