Warning: file_exists(): open_basedir restriction in effect. File(/srv/http/vhosts/aur.archlinux.org/public/web/locale//en/LC_MESSAGES/aurweb.mo) is not within the allowed path(s): (/srv/http/vhosts/aur-dev.archlinux.org/:/etc/aurweb/) in /srv/http/vhosts/aur-dev.archlinux.org/public/web/lib/streams.php on line 90
AUR (en) - gnupg-largekeys

Notice: Undefined variable: name in /srv/http/vhosts/aur-dev.archlinux.org/public/web/lib/pkgfuncs.inc.php on line 248

Package Details: gnupg-largekeys 2.0.30-1

Git Clone URL: https://aur-dev.archlinux.org/gnupg-largekeys.git (read-only)
Package Base: gnupg-largekeys
Description: Complete and free implementation of the OpenPGP standard
Upstream URL: http://www.gnupg.org/
Licenses: GPL
Conflicts: gnupg, gnupg2
Provides: gnupg=2.0.30, gnupg2=2.0.30
Replaces: gnupg, gnupg2
Submitter: ido
Maintainer: ido
Last Packager: ido
Votes: 4
Popularity: 0.000551
First Submitted: 2013-11-04 02:45
Last Updated: 2016-07-17 21:06

Required by (133)

Sources (3)

Latest Comments

1 2 Next › Last »

ido commented on 2016-07-17 16:20

I have disowned this package. If anyone wants to take it over and upgrade to 2.0.30, please feel free.

webdawg commented on 2016-04-24 22:17

:: gnupg-largekeys: requires dirmngr

ido commented on 2016-02-15 14:33

2.0.29 is the latest upstream stable version. This package tracks upstream stable, not upstream modern. Please do not flag it as out of date.

ido commented on 2015-04-18 03:01

GnuPG 2.1.x is the NON-STABLE "modern" distribution. It is not yet recommended for general use, as far as I know. I've uploaded 2.0.27, the latest upstream stable. Enjoy.

As a reminder, please submit pull requests to https://github.com/ido/packages-archlinux ...

reki commented on 2015-03-01 15:08

I didn't see there already was a package for large keys. I made a patch for 2.1.2

--enable-large-rsa will allow RSA keys up to 16k.

I didn't touch other algorithms since I don't even know if it's even possible to have bigger keys t

reki commented on 2015-02-25 18:18

I didn't see there already was a package for large keys. I made a patch for 2.1.2

For some unknown reason --enable-large-rsa option is nonfunctional, I changed it to --full-gen-key will always allow RSA keys up to 16k.

I didn't touch Elgamal and DSA since I don't even know if it's even possible to have bigger keys there.


korgan1983 commented on 2014-12-19 14:38

Hi Ido,

thanks for feedback! I will keep my eyes open and contact you, if I see any patch for 2.1 and at this point also thanks in advance for working on update for 2.1

ido commented on 2014-12-18 16:54

This package will stay with 2.0.x for a little while longer - 2.1.x is not yet marked stable. (I expect this to happen within a few weeks; if it takes too much longer we'll go back to tracking the gnupg package more closely.)

I am still squishing a few bugs in the patch for 2.1.x (currently 2.1.1), and only have a few minutes a week to work on that, so if you know of an existing working 2.1.x large keys patch out in the wild, please point me to it and I will test that instead of making one myself.

korgan1983 commented on 2014-12-18 11:44

Hi, are you planning to update to 2.1?

vwyodajl commented on 2014-11-25 10:23

Not sure if this is 100% correct tried to get the patch to work with the 2.1 release that is now in arch.

diff -aur gnupg-2.1.0/g10/gpg.c gnupg-2.1.0.mod/g10/gpg.c
--- gnupg-2.1.0/g10/gpg.c 2014-11-04 07:16:55.000000000 -0800
+++ gnupg-2.1.0.mod/g10/gpg.c 2014-11-25 02:05:28.364752873 -0800
@@ -2180,7 +2180,7 @@

/* Initialize the secure memory. */
+ if (!gcry_control (GCRYCTL_INIT_SECMEM, SECMEM_BUFFER_SIZE, 131072, 0))
got_secmem = 1;
#if defined(HAVE_GETUID) && defined(HAVE_GETEUID)
/* There should be no way to get to this spot while still carrying
diff -aur gnupg-2.1.0/g10/keygen.c gnupg-2.1.0.mod/g10/keygen.c
--- gnupg-2.1.0/g10/keygen.c 2014-11-04 01:38:37.000000000 -0800
+++ gnupg-2.1.0.mod/g10/keygen.c 2014-11-25 02:09:52.368794798 -0800
@@ -1366,7 +1366,7 @@
nbits = 2048;
log_info (_("keysize invalid; using %u bits\n"), nbits );
- else if (nbits > 4096)
+ else if (nbits > 65535)
nbits = 4096;
log_info (_("keysize invalid; using %u bits\n"), nbits );
@@ -1421,7 +1421,7 @@
nbits = 2048;
log_info(_("keysize invalid; using %u bits\n"), nbits );
- else if ( nbits > 3072 )
+ else if ( nbits > 65535 )
nbits = 3072;
log_info(_("keysize invalid; using %u bits\n"), nbits );

Hope this helps some.