Re: Changing key's passphrase in an automated way

2014-12-06 Thread Thomas Pelletier
On Sat Dec 06 2014 at 12:15:53 AM John Kennerson wrote: > > ECHO -e PASSWD\nOLDPASS\nNEWPASS\nSAVE|GPG --command-fd 0 --no-tty > --passphrase-repeat > 0 --status-fd 2 --verbose --edit-key 9C6BD0AC > Awesome! It did the trick with GPG 1.4. Thank you, Thomas ___

Signature-notation %-expandos expanding to strings of zeros

2014-12-06 Thread MFPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi I have the following line in my gpg.conf to generate a signature notation:- sig-notation issuer-...@notations.openpgp.fifthhorseman.net=%g I noticed when verifying signatures in the last few days that the %g in my recent signatures is expan

"key algorithm" in GnuPG's signature verification output

2014-12-06 Thread MFPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 When verifying a signature using GnuPG, it seems the line (eg):- textmode signature, digest algorithm SHA512 has become:- textmode signature, digest algorithm SHA512, key algorithm rsa2048 Unless I am mistaken, the key algorithm given is that

Changing key's passphrase in an automated way

2014-12-06 Thread gnupgpacker
Hello, did try it too: Thomas' attempt gave me with Gpg-1.4.18: gpg: verwende Vertrauensmodell PGP [GNUPG:] GET_LINE keyedit.prompt [GNUPG:] GOT_IT [GNUPG:] USERID_HINT 5D4F1C79E62651B3 testpassw tester (44) [GNUPG:] NEED_PASSPHRASE 5D4F1C79E62651B3 5D4F1C79E62651B3 1 0 [GNUPG:] BAD_PASSPHRASE 5