On 05/05/15 09:41, Werner Koch wrote:
> Note that GnuPG 2.1 generates revocation certificates by default. 

Great! Good to know!

> The idea is that you should be able to tell the reason for the
> revocation. 
Yes of course, this makes perfect sense. There is however the fact that
good practice guides now a days often advice to generate a preemptive
revocation certificate at the time of creation of the key. So at that
moment the reason is well... not really relevant. So it's great that 2.1
does this on keypair generation.

> You need to use this command
>
>   gpg --command-fd 0 --status-fd 2 --gen-revoke 0x12345678
>
> and act upon the GET_* status lines.
Great, thanks!

This hack seems to have worked though (in python), but your suggestion
seems more robust:

    import pexpect

    cmd = "gpg --homedir {0} --gen-revoke {1}".format(KEYRING_DIR, 
'0xDEADD00D')
    px = pexpect.spawn(cmd, timeout=5)

    px.expect("(y/N)")
    px.sendline("y")
    px.expect("Your decision?")
    px.sendline('0')
    px.expect("> ")
    px.sendline("\n")
    px.sendline("\n")
    px.expect("Is this okay?")
    px.sendline("y")

    px.expect(pexpect.EOF)

    bidx = px.before.index('-----BEGIN PGP PUBLIC KEY BLOCK-----')
    eidx = px.before.index('-----END PGP PUBLIC KEY BLOCK-----')
    eidx += len('-----END PGP PUBLIC KEY BLOCK-----')
    print px.before[bidx:eidx]


Salud,
Luis.



_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to