How to generate non-bad cv25519 encryption key?

Ingo Klöcker kloecker at kde.org
Tue Aug 23 12:18:25 CEST 2022


On Dienstag, 23. August 2022 10:44:52 CEST theaetetos--- via Gnupg-users 
wrote:
> Aug 22, 2022, 21:07 by kloecker at kde.org:
> >> gpg2 --version
> >> 
> >> >gpg (GnuPG) 2.3.3
> >> >libgcrypt 1.9.4
> > 
> > The solution is easy: Use gpg 2.3.7.
> 
> Are you sure this should suffice?

Yes, I'm pretty sure. I followed your steps in a fresh GNUPGHOME and didn't 
see the warning message. I didn't protect the test keys with a passphrase 
though.

I'm using openSUSE Tumbleweed.

$ gpg --version
gpg (GnuPG) 2.3.7
libgcrypt 1.9.4-unknown

Or have I accidentally used
$ gpg --version
gpg (GnuPG) 2.3.8-beta28
libgcrypt 1.11.0
NOTE: THIS IS A DEVELOPMENT VERSION!
?

I'm not sure. I intended to test with the distro versions.

Regards,
Ingo
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 228 bytes
Desc: This is a digitally signed message part.
URL: <https://lists.gnupg.org/pipermail/gnupg-users/attachments/20220823/6019a82b/attachment.sig>


More information about the Gnupg-users mailing list