I'd like to take a look at the credentials from my alpine's passfile. Some likely-looking openssl foo returned jibberish:

openssl smime -decrypt -inform pem -in <filename> -inkey .alpine-smime/.pwd/MasterPassword.key

Is there a simple way to examine the contents please, or do I need to start looking at the source code?

The passfile is obfuscated (a throw-back to the days before strong crypto was available), and there is no standalone utility to de-obfuscate it.

The source is in alpine/imap.c, in xlate_in() and xlate_out().

Once, when I had a similar need, I took those routines and dropped them more-or-less verbatim into perl, and it worked as expected. YMMV...

https://pastebin.com/JVVRf2gy


 -Jason

_______________________________________________
Alpine-info mailing list
Alpine-info@u.washington.edu
http://mailman12.u.washington.edu/mailman/listinfo/alpine-info

Reply via email to