Thank you. Really helps! On May 1, 2015 6:57 AM, "Daniel Kahn Gillmor" <d...@fifthhorseman.net> wrote:
> On Fri 2015-05-01 02:37:03 -0400, Danny Crane wrote: > > > I have tried googling around. The closest solution I get is: > > > > private.key contains the private key file. > > > > $pgpdump -i private.key > > > > But this only gives me the following: > > > > ElGamal p > > ElGamal g > > ElGamal y > > Encrypted Elgamal x > > some other information of crypto > > > > It shows the value for p,g,y, but not x. How can I find out the value of > x? > > > pgpdump shows that x is encrypted. pgpdump isn't capable of decrypting > it. > > If you remove the passphrase from your secret key, you should be able to > produce a file that pgpdump can parse for you. > > however, note that this places your secret key material is a very > exposed place -- anyone who gets that file can trivially compromise your > key. > > Since el gamal keys are usually subkeys, you might try *only* exporting > the subkey without a passphrase, so that at least you do not expose the > secret key material for your primary key. > > Using gpg 1.4.x or 2.0.x, that should be possible with: > > > gpg --export-options export-reset-subkey-passwd --export-secret-subkeys > ${SUBKEYID}\! | pgpdump > > yes, that is a literal ! at the end. so if your subkey ID is > 0x1234567890abcdef, then you would run: > > gpg --export-options export-reset-subkey-passwd --export-secret-subkeys > 0x1234567890abcdef\! | pgpdump > > hth, > > --dkg >
_______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users