Page MenuHome GnuPG

gpg not built with large secure memory buffer. Ignoring --enable-large-rsa
Closed, ResolvedPublic

Description

The Windows release (not GPG4Win) of GnuPG modern 2.1.8 is apparently not built
with a large secure memory buffer, rendering users unable to use the --enable-
large-rsa flag with gpg. Could future builds be built with a large secure memory
buffer?

Details

Version
2.1.8

Event Timeline

Nope. Search for the original discussion on the debian bug tracker. We
introduced this option just for one Debian user and it shall in general not be
used. Thus who feel that they need a longer key should anywa switch to ecc.

werner claimed this task.