Thank you sir. You are much to kind.
> On Thursday, 31. August 2023 14:35, Werner Koch via Gnupg-users
> [/webmail/[email protected]] wrote:
>
>
>
> On Wed, 30 Aug 2023 11:54, Andrew Ammerlaan said:
>
> > Signing /dev/null feels like more of a hack then an actual solution to
> > keeping the key unlocked until portage finishes. Therefore I would
> > like to ask you if you have any better ideas to do this?
>
> Don't use a passphrase or better use remote signing from your desktop
> and not on a server. See wiki.gnupg.org on how to use a remobe
> gpg-agent.
>
> Another option is to use gpg-preset-passphrase (installed to
> libexec). Use
>
> gpg -K --with-keygrip YOURSIGNINGKEY
>
> to find the keygrip; then use
>
> gpg-preset-passphrase --preset KEYGRIP
>
> and enter the passphrase followed by a LF (or provide to stdin). This
> puts the passphrase into gpg-agent's cache with no timeout. The --forget
> option might not work right now, thus you better use
>
> gpgconf --reload gpg-agent
>
> to flush gpg-agent's cache.
>
> Salam-Shalom,
>
> Werner
>
> --
> The pioneers of a warless world are the youth that
> refuse military service. - A. Einstein
>
> _______________________________________________
> Gnupg-users mailing list
> [email protected]
> https://lists.gnupg.org/mailman/listinfo/gnupg-users
_______________________________________________
Gnupg-users mailing list
[email protected]
https://lists.gnupg.org/mailman/listinfo/gnupg-users