Maxwell Krohn
Maxwell Krohn
Closed in #143. Sorry for the bug and thanks for the bug report. It will go live in 2.0.67.
By my read of the code, it's not supported... I don't remember implementing it....
this is a super old version of kbpgp
Not documented, but it currently works. Pass an array of KeyManagers as the `encrypt_for` parameter. On Tue, Oct 13, 2015 at 6:55 PM, garry415 [email protected] wrote: > It doesn't seem...
Run the message through `gpg --list-packets` to see who it's encrypted for.
That really doesn't conform to my understanding of how it works. What happens when you run the message through `gpg --list-packets`? I'm not convinced that `box` is producing the wrong...
Likely what your problem is is that your `keyfetch` isn't returning the **public** key that corresponds to the signing key, so signature verification is failing. Try supplying `strict : false`...
Turning off strict mode means it's no longer necessary to verify the signature inside the encrypted message. You're failing to do so because your `KeyRing` doesn't contain the **public key**...
Keep in mind, in PGP, the message only gives the 64-bit key ID of who signed the message. You must provide the full 2048-bit RSA key that corresponds to the...
Glad I could help. Sorry the docs aren't better, if only there was time to get it all done!