Echo password when using TTY

2025-01-12 Thread Eric Pruitt via Gnupg-users
Is it possible to get GPG to enable echoing input when prompting the user for a password? Since symmetric encryption prompts the user for a password once, it's vulnerable to silent typos, so I find myself decrypting files to double check the password when I generally wouldn't have to do this if I c

Re: GNU Privacy Handbook typo

2024-06-08 Thread Eric Pruitt via Gnupg-users
On Fri, Jun 07, 2024 at 11:47:08PM -0500, Jacob Bachmeyer via Gnupg-users wrote: > Few English-as-a-foreign-language courses should be expected to > mention singular "they", so its use is inappropriate in documentation. There are lots of things that aren't taught in classrooms that still apply to

Re: GNU Privacy Handbook typo

2024-06-07 Thread Eric Pruitt via Gnupg-users
On Fri, Jun 07, 2024 at 06:03:22PM -0500, Jacob Bachmeyer via Gnupg-users wrote: > Strictly, "their" is plural in English No, it is not. "They" and "their" have been used as gender-neutral, singular pronouns for centuries. Even if that wasn't the case, it's widely accepted in modern colloquial usa

Re: Is there built-in a way validate a signature against a specific key?

2024-04-26 Thread Eric Pruitt via Gnupg-users
On Wed, Apr 24, 2024 at 11:14:06AM +0200, Werner Koch via Gnupg-users wrote: > On Tue, 23 Apr 2024 21:39, Eric Pruitt said: > > I have multiple public keys in my GPG keyring. When validating > > signatures, I sometimes want to validate them against a specific key so > > The

Is there built-in a way validate a signature against a specific key?

2024-04-23 Thread Eric Pruitt via Gnupg-users
I have multiple public keys in my GPG keyring. When validating signatures, I sometimes want to validate them against a specific key so if the file is signed by someone other than the individual or organization I expect, it will fail. Currently, I do this by creating a keyring that consists of only

Re: 2 Q's

2016-08-15 Thread Eric Pruitt
On Tue, Aug 16, 2016 at 12:48:25AM +0200, Francesco Ariis wrote: > On Mon, Aug 15, 2016 at 06:33:47AM -0700, Daniel H. Werner wrote: > > 2) What is the best way to automatically send my Public Key to > > message recipients? > > Why not upload it to your site (if you have it) or to a keyserver? Fol

Re: Change agent-socket path

2016-06-30 Thread Eric Pruitt
On Fri, Jul 01, 2016 at 01:58:20AM +0200, Wolf wrote: > I'm in need of changing the path to the agent socket, but I cannot find > a way to do so. For GPG 1.x, you can change this by setting the GPG_AGENT_INFO environment variable or by using the --gpg-agent-info flag. Both of these are documented

Re: Querying gpg-agent configuration options

2016-04-27 Thread Eric Pruitt
On Wed, Apr 27, 2016 at 11:32:21AM +0200, Werner Koch wrote: > You may read the options from gpg-agent.conf using: > > gpgconf --list-options gpg-agent \ > | awk -F: '$1=="default-cache-ttl" {print $0}' > > which result in an output like this (line wrapped): > > default-cache-ttl:24:0:expire

Re: Querying gpg-agent configuration options

2016-04-26 Thread Eric Pruitt
On Tue, Apr 26, 2016 at 07:13:29PM -0700, Paul R. Ramer wrote: > I didn't see any indication of such a feature from the man page, but you > could just look at the gpg-agent.conf file. It's not that simple. I would also need to account for flags passed into the application via the command line (--d

Querying gpg-agent configuration options

2016-04-26 Thread Eric Pruitt
Is it possible to query the configuration of a running gpg-agent? In particular, I would like to query the running agent to see what values are being used for default-cache-ttl and max-cache-ttl. I have reviewed the documentation for gpg-connect-agent and its commands but haven't found what I'm loo

Re: When to use GPG flags

2016-02-20 Thread Eric Pruitt
On Sat, Feb 20, 2016 at 06:48:21PM +0100, Peter Lebbing wrote: > So --decrypt is: gimme the contents. --verify is: check the validity, > but don't ever produce any data. > > But since you ultimately need to choose a reasonably short name for the > option, they're not called --decrypt-verify-or-deco

Re: When to use GPG flags

2016-02-20 Thread Eric Pruitt
On Sat, Feb 20, 2016 at 12:28:44PM +0100, Peter Lebbing wrote: > For programmatic use of GnuPG, you should really be using a library, > preferably GPGME. That is the supported way of using GnuPG from another > program. Calling the gpg command line program directly is for use by > humans on a comman

When to use GPG flags

2016-02-19 Thread Eric Pruitt
I'm writing an email client with support for PGP encrypted and signed messages using GPG. I've noticed that GPG seems to do the right thing in may situations regardless of the flags used which makes it hard to know if I'm passing it the correct flags. For example, if I pipe a clearsigned message in