* ckeader via Mutt-users :
> gpgsm --list-keys ralf.hildebra...@charite.de
>
> would give you all information about the key, including ID (which is the
> last part of the fingerprint), serial etc.
Yeah, that's awesome. Exactly what I need!
--
Ralf Hildebrandt
Geschäftsbereich IT | Abteilung
> certificate b43f1e2c.0 (foo) for firstname.lastn...@charite.de added.
>
> But what *IS* "b43f1e2c"? Is it a serial number, a part of the fingerprint?
It looks like an openssl hash, the type c_rehash generates. Like, what
you may find under /etc/ssl/certs.
> > Also check the config options `
* Bastian :
> Try ^K, which is the default keybind for `extract-keys`.
> This command extracts the public key and adds is to your keyring
> (smime_keys).
Yes, but this only displays precious little info.
Enter label: Found 1 certificate chains
Processing chain: subject=C = DE, ST = Berlin, L =
On 12Oct22 16:12+0200, Ralf Hildebrandt via Mutt-users wrote:
> when receiving an S/MIME signed mail, how can I extract information
> about the certificate / public key that was sent along with the
> signature?
Try ^K, which is the default keybind for `extract-keys`.
This command extracts the publ
Hi!
when receiving an S/MIME signed mail, how can I extract information
about the certificate / public key that was sent along with the
signature?
--
Ralf Hildebrandt
Geschäftsbereich IT | Abteilung Netzwerk
Charité - Universitätsmedizin Berlin
Campus Benjamin Franklin
Hindenburgdamm 30