-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Hello again!
Since GnuPG appears to be designed not to handle this use-case, I wrote a tool (a Python 2/3 library) to solve my problem: https://github.com/BjarniRunar/python-pgp_passtool It's also in PyPI, so `pip install pgp_passtool` should work. To sum up: this is a tool for changing the passphrase on a secret key, or removing the passphrase entirely. It can be used from the shell, or from within Python code. It is my hope that this will help folks like myself who need a level of automation, but don't want just use unprotected keys all the time. The tool has some support for coping with unusual character encodings, and also allows the user to specify they want fast (insecure) key derivation, for when we know the passphrase is already very strong. It's not a complete implementation, it's not well tested. There are probably many keys out there which it cannot handle. So, I very much welcome comments and bug reports and pull requests, either here or in the issue tracker. Cheers, - Bjarni - -- PageKite.net lets your personal computer be part of the web -----BEGIN PGP SIGNATURE----- iQEzBAEBCgAdFiEETBSz4pzXkOHlSFMhjgA3FgDPlJEFAl20bG0ACgkQjgA3FgDP lJHIDQf/YCDzxEuoyAA9IM6zkoE+371sDjzarvO1iK1MqUn+MXE6IrQBkjLEqaFh Y7toab2ZBU0n4CIObCX18qtNg9eMbPqRc9Zwb8e/GbwmI2VqUNteYGzUzIUSxvg6 3/p6Aw/eiTqJyujfYFNUOUrNmYPeujaKvmbm13nsf4/gnW/mlYs7UlYUmsGcTuQH NUOekRuvSra9UqNRq3SndWyuQYmdlv1k6PfccB+FMzQROCofVDOXwUmk2FiEMXRl KHHLkrCqujzqllnrQ/YD5qNcsEODyLxbtw1F4TwSDX539ejvgKp0YSXC3GUAh4Yj EMh1S+CK8HTiyCLNUjO6lCAffnTaGA== =6ENQ -----END PGP SIGNATURE-----
_______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users