first, thanks for replying.  and thanks for monitoring the debian
list.  it gives me
a warm feeling to know that this critical program is being maintained.

On 5/26/05, Werner Koch <[EMAIL PROTECTED]> wrote:
> GnuPG requires is home directory for internal purposes and you should
> not fiddle around with it.  We can't use /var/lib/gnupg because these

i absolutely understand and agree.  that is why i need an --export-homedir
option to be certain that i do not unintentionally fiddle with the contents of
that directory with my homegrown --export/--export-secret-key/... attempts.

i am especially concerned that those commands are, or will be in the future,
insufficient to export the homedir exactly.

you see, i need the script to contain everything gpg might need on the
other end.  if a user of the script has a corrupted .gnupg, it will not work.
but if i include it in the script, everything will be ok.

> Using this data is on your own risk.  There is a documented interface
> on how to access it (--export/--import etc.).  You are on your own if

does that documented interface export the homedir without
leaving anything out or changing anything?  will it after 1.9?

my problem is that currently i have to use 3 export commands
(pub, sec, trust) to even attempt this.  and i fear 1.9 now.  will i have to use
4 or more commands to export it?  will it be exportable?

the rest of this message is a reply to your thoughtful comments.  the above
is my biggest issue.

> BTW, never ever look at any data printed for human reading - scripts
> need to parse the --status-fd and --with-colon output.  For

thanks for the pointer.  i am not currently having the script look at
human-readable
output -- it just passes it to the human or log.  however, it should bail at
problems.

i assume (and hope) that you consider the output of --armor --export, etc. to be
machine-readable.

> controlling gpg aside from this, the --command-fd/--status-fd
> interface is the way to go.  Please don't use canned commands but
> parse the requests seen on --status-fd before sending commands to gpg
> - if there is something you can't cope with: bail out.  Note that in
> most cases using the default response (which is sending an empty
> string) leads to proper results.

i will use those if i ever need to parse output.  now all i do is verify the
resulting encrypted file manually occasionally.  btw, i found no gpg
command that will verify that a file was properly encrypted after it has been
created.  that would be nice after a pipeline.  i suppose the solution is to
try to decrypt, then exit successfully when it wants a pass phrase.

i notice that --with-key-data is documented to "print the public key data".  i
assume it just means the meta data -- not the key itself.  is that right?  for
documentation i am using the gnupg package and the gnupg-doc package.
if it is the key itself, there appears to be no equivalent for secret keys,
trust db, etc.

> Salam-Shalom,

indeed.

Reply via email to