t's just because they are expired: "show-unusable-subkeys"
reveal them and everything is good.
Thank you so much.
--
Damien Cassou
"Success is the ability to go from one failure to another without
losing enthusiasm." --Winston Churchill
__
4
:secret key packet:
…
# off=136 ctb=b4 tag=13 hlen=2 plen=32
:user ID packet: "Damien Cassou "
…
# off=974 ctb=9c tag=7 hlen=2 plen=134
:secret sub key packet:
version 4, algo 22, created 1531155780, expires 0
pkey[0]: [80 bits] ed25519 (1.3.6.1.4.1.11591.15.1
D202 F72C 652A E756 4ECC
Keygrip = 35A4020C4AFC2279CEE0BC36E2CEE4EFA8C6CFD5
uid [ultimate] Damien Cassou
uid [ultimate] Damien Cassou
uid [ultimate] Damien Cassou
ssb> ed25519/0xB68746238E59B548 2018-07-09
your smartcard.
All my passwords are in GnuPG encrypted files and handled by
https://www.passwordstore.org/.
--
Damien Cassou
http://damiencassou.seasidehosting.st
"Success is the ability to go from one failure to another without
losing enthusiasm." --Winston Churchill
Phil Pennock writes:
> On 2018-06-29 at 18:07 +0200, Damien Cassou wrote:
>> I'm not sure I want ECC after reading this:
>> https://crypto.stackexchange.com/a/60394/60027
>
> Curve25519 is not NIST ECC. It is ECC.
I was referring to the discussion a
information.
--
Damien Cassou
http://damiencassou.seasidehosting.st
"Success is the ability to go from one failure to another without
losing enthusiasm." --Winston Churchill
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg
n-the-storage-2/1192/3,
the author says that (1) he is not aware of profound critic on Brainpool
curves and (2) Bernstein’s Curve 25519 is hard to protect against side
channel attacks when being implemented in embedded devices.
As a result, I'm a bit lost in what key/curve to choose.
--
Dam
David Shaw writes:
> On Jun 20, 2018, at 11:28 AM, Damien Cassou wrote:
>> $ gpg2 --export-secret-key "FooBar" | paperkey -
>
> What happens if you do this:
>
> $ gpg2 --export-secret-key "FooBar" > /tmp/foo.key
> $ paperkey < /tmp/foo.ke
ibits the problem? I'll make it work.
Please find attached the very secret key :-).
I got it using:
$ gpg2 --export-secret-key "FooBar" > /tmp/foo.key
if you need it, the passphrase is "iletaitunpetithomme1".
--
Damien Cassou
http://damiencassou.seasidehosting.st
&quo
- gpg (GnuPG) 2.2.8, libgcrypt 1.8.3
Keys:
- key1: ed25519
- key2: rsa4096
Command:
$ gpg2 --export-secret-key "FooBar" | paperkey -
interrupt
$
Best
--
Damien Cassou
http://damiencassou.seasidehosting.st
"Success is the ability to go from one failure to another without
losi
print a line identifing the pinentry used
> and thus reveal possible problems, for example a missing GPG_TTY
> envrionment variable.
I have 2.1.13 and only got that in Firefox console:
--stdout:
--stderr:
gpg: public key is XXX
gpg: using subkey XXX
n/pinentry is a 86-lines shell script that selects the
correct pinentry binary to use. In all cases, the binary used is
/usr/bin/pinentry-gnome3 (I'm on Gnome3) which is
$ pinentry-gnome3 --version
pinentry-gnome3 (pinentry) 0.9.7
--
Damien Cassou
http://damiencassou.seasidehosting.s
ed \n", 1002) = 44
In the terminal
read(5, "INQUIRE PINENTRY_LAUNCHED 22990\n", 1002) = 32
write(5, "END", 3)= 3
write(5, "\n", 1) = 1
read(5, "D (5:value511...) = 543
--
Damien Cassou
http://damiencassou.s
mail/dev-addons/2017-July/002966.html. They
suggested I contact you.
Thank you
--
Damien Cassou
http://damiencassou.seasidehosting.st
"Success is the ability to go from one failure to another without
losing enthusiasm." --Winston Churchill
#!/usr/bin/env node
let {env} = require('p
14 matches
Mail list logo