On Freitag, 24. November 2017 02:44:08 CET Seby wrote:
> Back to the subject, saving to at least a temporary keyring is my only
> solution? Nothing else I can use in batch mode to serve the armored
> key from clipboard somehow and do the operation?
Yes.
> If this is the only solution, what are t
Seby wrote:
>> Approximation would be using ephemeral GNUPGHOME.
>>
>> I mean, starting your GnuPG session (or script) with:
>>
>>$ export GNUPGHOME=$(mktemp -p /run/user/$(id -u) -d)
>>$ chmod og-rwx $GNUPGHOME; echo $GNUPGHOME
>>
>> and remove the $GNUPGHOME after its use.
>>
>> This is
Hello,
Thanks a lot for the reply.
NIIBE Yutaka wrote:
> Seby wrote:
>> Basically use gnupg without a keyring or trustdb. And the pass the armored
>> pgp public key with each command and operation.
>
> AFAIK, such a usage is not supported by GnuPG.
>
> Well, I would imagine some use cases when
Seby wrote:
> Basically use gnupg without a keyring or trustdb. And the pass the armored
> pgp public key with each command and operation.
AFAIK, such a usage is not supported by GnuPG.
Well, I would imagine some use cases when we want to avoid any
dependency to specific user's configuration, ke
Thanks to all for suggestions. For a complete compile on a fresh
install of Ubuntu, I managed to get the bash file down to a minimum of:
cd ~/Downloads
version=gnupg-2.2.3
wget https://gnupg.org/ftp/gcrypt/gnupg/$version.tar.bz2
wget https://gnupg.org/ftp/gcrypt/gnupg/$version.tar.bz2.sig
tar xf