On 18/02/2019 22:39, Farhan Khan via Gnupg-users wrote:
> $ gpg --list-secret-keys farhan@farhan.codes
> sec> rsa2048 2019-02-18 [SCEA] [expires: 2021-02-17]
Ah, well, there's your problem.
You should not use your primary key for encryption; they invented
subkeys for that.
And with the
February 18, 2019 3:51 PM, "Andrew Gallagher" wrote:
>> On 18 Feb 2019, at 20:35, Farhan Khan wrote:
>> Hey Andrew,
>> I was given the message "gpg: decryption failed: No secret key". I ran this:
>>
>> mv .gnupg .gnupg.bak
>> gpg --card-status
>> cat encrypted_message | gpg --decrypt
>>
>>
> On 18 Feb 2019, at 20:35, Farhan Khan wrote:
> Hey Andrew,
> I was given the message "gpg: decryption failed: No secret key". I ran this:
>
> mv .gnupg .gnupg.bak
> gpg --card-status
> cat encrypted_message | gpg --decrypt
>
> This gave me the warning message:
> gpg: encrypted with 2048-bit
February 18, 2019 2:35 AM, "Andrew Gallagher" wrote:
>> On 18 Feb 2019, at 05:19, Farhan Khan via Gnupg-users
>> wrote:
>>
>> How does one utilize *just* the yubikey (or OpenPGP smartcard in general) to
>> encrypt, sign, or decrypt? This might be in a scenario where I only have the
>> keys on
> On 18 Feb 2019, at 05:19, Farhan Khan via Gnupg-users
> wrote:
>
> How does one utilize *just* the yubikey (or OpenPGP smartcard in general) to
> encrypt, sign, or decrypt? This might be in a scenario where I only have the
> keys on my card but not on disk such as while traveling. I can
Hi all,
How does one utilize *just* the yubikey (or OpenPGP smartcard in general) to
encrypt, sign, or decrypt? This might be in a scenario where I only have the
keys on my card but not on disk such as while traveling. I can confirm that
'gpg --card-status' lists the keys as present.
I am