ecause they are expired: "show-unusable-subkeys"
reveal them and everything is good.
Thank you so much.
--
Damien Cassou
"Success is the ability to go from one failure to another without
losing enthusiasm." --Winston Churchill
_
packet:
…
# off=136 ctb=b4 tag=13 hlen=2 plen=32
:user ID packet: "Damien Cassou "
…
# off=974 ctb=9c tag=7 hlen=2 plen=134
:secret sub key packet:
version 4, algo 22, created 1531155780, expires 0
pkey[0]: [80 bits] ed25519 (1.3.6.1.4.1.11591.15.1)
pke
D202 F72C 652A E756 4ECC
Keygrip = 35A4020C4AFC2279CEE0BC36E2CEE4EFA8C6CFD5
uid [ultimate] Damien Cassou
uid [ultimate] Damien Cassou
uid [ultimate] Damien Cassou
ssb> ed25519/0xB68746238E59B548 2018-07-09
smartcard.
All my passwords are in GnuPG encrypted files and handled by
https://www.passwordstore.org/.
--
Damien Cassou
http://damiencassou.seasidehosting.st
"Success is the ability to go from one failure to another without
losing enthusiasm." --Winston Churchill
_
Phil Pennock writes:
> On 2018-06-29 at 18:07 +0200, Damien Cassou wrote:
>> I'm not sure I want ECC after reading this:
>> https://crypto.stackexchange.com/a/60394/60027
>
> Curve25519 is not NIST ECC. It is ECC.
I was referring to the discussion around
mation.
--
Damien Cassou
http://damiencassou.seasidehosting.st
"Success is the ability to go from one failure to another without
losing enthusiasm." --Winston Churchill
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/
-on-the-storage-2/1192/3,
the author says that (1) he is not aware of profound critic on Brainpool
curves and (2) Bernstein’s Curve 25519 is hard to protect against side
channel attacks when being implemented in embedded devices.
As a result, I'm a bit lost in what key/curve to choose.
--
Damien Cassou
David Shaw writes:
> On Jun 20, 2018, at 11:28 AM, Damien Cassou wrote:
>> $ gpg2 --export-secret-key "FooBar" | paperkey -
>
> What happens if you do this:
>
> $ gpg2 --export-secret-key "FooBar" > /tmp/foo.key
> $ paperkey < /tmp/foo.ke
the problem? I'll make it work.
Please find attached the very secret key :-).
I got it using:
$ gpg2 --export-secret-key "FooBar" > /tmp/foo.key
if you need it, the passphrase is "iletaitunpetithomme1".
--
Damien Cassou
http://damiencassou.seasidehosting.st
"Succe
uPG) 2.2.8, libgcrypt 1.8.3
Keys:
- key1: ed25519
- key2: rsa4096
Command:
$ gpg2 --export-secret-key "FooBar" | paperkey -
interrupt
$
Best
--
Damien Cassou
http://damiencassou.seasidehosting.st
"Success is the ability to go from one failure to another without
losing enthusi
ine identifing the pinentry used
> and thus reveal possible problems, for example a missing GPG_TTY
> envrionment variable.
I have 2.1.13 and only got that in Firefox console:
--stdout:
------stderr:
gpg: public key is XXX
gpg: using subkey XXX instead of primary key YYY
g
w for this.
For me, /usr/bin/pinentry is a 86-lines shell script that selects the
correct pinentry binary to use. In all cases, the binary used is
/usr/bin/pinentry-gnome3 (I'm on Gnome3) which is
$ pinentry-gnome3 --version
pinentry-gnome3 (pinentry) 0.9.7
--
Damien Cassou
http://damiencass
ed \n", 1002) = 44
In the terminal
read(5, "INQUIRE PINENTRY_LAUNCHED 22990\n", 1002) = 32
write(5, "END", 3)= 3
write(5, "\n", 1) = 1
read(5, "D (5:value511...) = 543
--
Damien Cassou
http://damiencassou.s
ddons/2017-July/002966.html. They
suggested I contact you.
Thank you
--
Damien Cassou
http://damiencassou.seasidehosting.st
"Success is the ability to go from one failure to another without
losing enthusiasm." --Winston Churchill
#!/usr/bin/env node
let {env} = require('process')
let {
14 matches
Mail list logo