Re: Reading key capabilities information before importing a key

2013-04-12 Thread Werner Koch
On Fri, 12 Apr 2013 03:00, mailinglis...@hauke-laging.de said:

 That is an inconsistent explanation. If --list-packets can show data from 
 signatures without checking the signatures then obviously --with-colons 

It does not show that.  It dumps the packets.  The key capabilities need
to be computed.



Shalom-Salam,

   Werner

-- 
Die Gedanken sind frei.  Ausnahmen regelt ein Bundesgesetz.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Reading key capabilities information before importing a key

2013-04-11 Thread Werner Koch
On Thu, 11 Apr 2013 00:28, mailinglis...@hauke-laging.de said:

 2) You import the key but direct it to a different keyring, see
 --keyring
 --secret-keyring
 --primary-keyring
 --no-default-keyring

You better use a temporary directory.  This is far easier than to play
with all the options and it allows you to use gpgme.

Another option is to import the key and then delete it if you don't want
it.  However, we have a --merge-only option but not a --only-new-key-option.


Shalom-Salam,

   Werner

-- 
Die Gedanken sind frei.  Ausnahmen regelt ein Bundesgesetz.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Reading key capabilities information before importing a key

2013-04-11 Thread Greg Sabino Mullane

-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160


Branko Majic asked:
 I'm trying to find a way to list the key capabilities of a key before
 importing it. I can obtain some basic information by using the command
 (I've seen this one in the mailing list archives):

In addition to the other suggestions, I prefer using --dry-run 
and a double verbose:

gpg --dry-run --import --verbose --verbose test.key

- -- 
Greg Sabino Mullane g...@turnstep.com
PGP Key: 0x14964AC8 201304112056
http://biglumber.com/x/web?pk=2529DF6AB8F79407E94445B4BC9B906714964AC8
-BEGIN PGP SIGNATURE-

iEYEAREDAAYFAlFnZdcACgkQvJuQZxSWSsj/SwCgkcU/jWIFphT5t4zIL4eHKDya
9gAAn22R0GMK5ltureFUecNOgbFz/EJy
=WvD+
-END PGP SIGNATURE-



___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Reading key capabilities information before importing a key

2013-04-10 Thread Branko Majic
Hello all,

I'm trying to find a way to list the key capabilities of a key before
importing it. I can obtain some basic information by using the command
(I've seen this one in the mailing list archives):

gpg2 --with-colons test.key

The only catch being that the above command will not list the key
capabilities for the keys contained in a file. Any way to obtain this
information without importing the key into keyring?

I'm using GnuPG 2.0.19 with libgcrypt 1.5.0 on Debian Wheezy 64-bit.

Best regards

-- 
Branko Majic
Jabber: bra...@majic.rs
Please use only Free formats when sending attachments to me.

Бранко Мајић
Џабер: bra...@majic.rs
Молим вас да додатке шаљете искључиво у слободним форматима.


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Reading key capabilities information before importing a key

2013-04-10 Thread Hauke Laging
Am Mi 10.04.2013, 22:57:53 schrieb Branko Majic:
 Hello all,

 I'm trying to find a way to list the key capabilities of a key before
 importing it. I can obtain some basic information by using the command
 (I've seen this one in the mailing list archives):

 gpg2 --with-colons test.key

 The only catch being that the above command will not list the key
 capabilities for the keys contained in a file. Any way to obtain this
 information without importing the key into keyring?

Two possibilities:

1)
gpg --list-packets hauke__0x1a571df5.asc
[...]
:public sub key packet:
version 4, algo 1, created 1352000413, expires 0
pkey[0]: [2048 bits]
pkey[1]: [17 bits]
keyid: 486B17AB3F96AD8E
:signature packet: algo 1, keyid BF4B8EEF1A571DF5
version 4, created 1352000413, md5len 0, sigclass 0x18
digest algo 2, begin of digest c1 78
hashed subpkt 2 len 4 (sig created 2012-11-04)
hashed subpkt 27 len 1 (key flags: 02)
[...]

Subpacket class 27 is the key capabilities.

[http://www.ietf.org/rfc/rfc4880.txt]

   First octet:

   0x01 - This key may be used to certify other keys.

   0x02 - This key may be used to sign data.

   0x04 - This key may be used to encrypt communications.

   0x08 - This key may be used to encrypt storage.

   0x10 - The private component of this key may have been split
  by a secret-sharing mechanism.

   0x20 - This key may be used for authentication.

   0x80 - The private component of this key may be in the
  possession of more than one person.

2) You import the key but direct it to a different keyring, see
--keyring
--secret-keyring
--primary-keyring
--no-default-keyring


Hauke
--
☺
PGP: 7D82 FB9F D25A 2CE4 5241 6C37 BF4B 8EEF 1A57 1DF5 (seit 2012-11-04)
http://www.openpgp-schulungen.de/


signature.asc
Description: This is a digitally signed message part.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users