[Pkg-gnupg-maint] Bug#739424: Bug#739424: Bug#739424: gnupg dies with "gpg: out of secure memory [...]" since 1.4.16-1

Daniel Kahn Gillmor dkg at fifthhorseman.net
Thu Oct 2 20:06:22 UTC 2014


On Thu 2014-10-02 15:23:10 -0400, Daniel Kahn Gillmor wrote:
> it sounds like you might be willing to consider a combination of the two
> patches.  What would you think about the following proposal?
>
>  * ./configure --enable-large-rsa doubles the secmem size
>
>  * gpg --enable-large-rsa option (acceptable either on the command line
> or in the config file) (a) produces a warning when built without the
> ./configure option, or (b) bumps the upper limit to 8192 bits during
> --batch --key-gen

Attached is a patch (a third variant) for gpg's 1.4 stable branch that
does what i've outlined above.  let me know what you think.

Note: with this patch, for aesthetic reasons, i've also changed the
configure option to --enable-large-rsa, so that the build-time and
run-time options are symmetric.

     --dkg

-------------- next part --------------
A non-text attachment was scrubbed...
Name: 0001-add-build-and-runtime-support-for-larger-RSA-keys.patch
Type: text/x-diff
Size: 6323 bytes
Desc: build and runtime support for larger RSA keys for gnupg 1.4.x
URL: <http://lists.alioth.debian.org/pipermail/pkg-gnupg-maint/attachments/20141002/1648d40f/attachment.patch>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 948 bytes
Desc: not available
URL: <http://lists.alioth.debian.org/pipermail/pkg-gnupg-maint/attachments/20141002/1648d40f/attachment.sig>


More information about the Pkg-gnupg-maint mailing list