Receiving a key on standard output

greg@turnstep.com greg@turnstep.com
Thu Jan 2 15:30:01 2003


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


> At 2) it creates the files secring.gpg. pubring.gpg and 
> trustdb.gpg, even when specifying different files
..

What is wrong with this approach? Seems to me that this 
should work fine:

1) gpg --homedir /tmp --keyserver pgp.mit.edu --recv-key 84321DED

2) gpg --homedir /tmp --with-colons --list-keys 84321DED

3) Present the output to the user. 
If acceptable, import to the "real" directory:

4) gpg --keyserver pgp.mit.edu --recv-key 84321DED

The file in /tmp will end up having multiple keys, but this 
should not be a problem. If it is, use the --delete-key command 
after doing the above.


Also check out the --dry-run option, which generates all the normal 
output, but makes no physical changes. You cannot get the ascii 
armored key, but you can check the output for the key ID, name, 
email, and comment like this:

gpg -v --keyserver pgp.mit.edu --dry-run --recv-key 84321DED

This avoids worrying about which files to use. Just read the output 
and present it to the user.


Greg Sabino Mullane greg@turnstep.com
PGP Key: 0x14964AC8 20021007
EICS: -D 9079f3957ed45bae12d990be5f4edf17

-----BEGIN PGP SIGNATURE-----
Comment: http://www.turnstep.com/pgp.html

iD8DBQE+FEzlvJuQZxSWSsgRAu9yAKDBxBUxUqVIGeTTNOzeQ4YKK0AC1gCfdpun
lGs8J6kxb7iEIy3whymaGGo=
=KhDI
-----END PGP SIGNATURE-----