ssh-add -l like command in gpg
Hauke Laging
mailinglisten at hauke-laging.de
Wed Sep 10 14:36:24 CEST 2014
Am Mi 10.09.2014, 13:20:01 schrieb Sudhir Khanger:
> Hello,
>
> Is there a way to tell if a GPG key's passphrase is cached or not?
> Just like ssh-add -l prints all the keys that are in current keychain
> ready to be used.
I am working on a Python script which does that as preparation for its
main task. You could probably easily adapt it to your needs. Of course,
it does not (cannot) solve the race condition Werner mentioned).
The general approach is to read the fingerprints of all available secret
mainkeys and subkeys
gpg --with-colons --fingerprint --fingerprint --list-secret-keys
and check for each entry whether gpg-agent knows the fingerprint:
gpg-connect-agent "GET_PASSPHRASE --data --no-ask "\
"4F7E9F723D197D667842AE115F048E6F0E4B4494 t1 t2 t3" /bye
Hauke
--
Crypto für alle: http://www.openpgp-schulungen.de/fuer/unterstuetzer/
http://userbase.kde.org/Concepts/OpenPGP_Help_Spread
OpenPGP: 7D82 FB9F D25A 2CE4 5241 6C37 BF4B 8EEF 1A57 1DF5
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 490 bytes
Desc: This is a digitally signed message part.
URL: </pipermail/attachments/20140910/f9e401d1/attachment.sig>
More information about the Gnupg-users
mailing list