IIUC, you would like to see which certificates have been used while
reading the mail. Sometime I also need such extra info, and I was
struggling to get the info. So I dove again a bit into it.
On 13Oct22 08:26+0200, Ralf Hildebrandt via Mutt-users wrote:
> > gpgsm --list-keys
* ckeader via Mutt-users :
> gpgsm --list-keys ralf.hildebra...@charite.de
>
> would give you all information about the key, including ID (which is the
> last part of the fingerprint), serial etc.
Yeah, that's awesome. Exactly what I need!
--
Ralf Hildebrandt
Geschäftsbereich IT |
> certificate b43f1e2c.0 (foo) for firstname.lastn...@charite.de added.
>
> But what *IS* "b43f1e2c"? Is it a serial number, a part of the fingerprint?
It looks like an openssl hash, the type c_rehash generates. Like, what
you may find under /etc/ssl/certs.
> > Also check the config options
* Bastian :
> Try ^K, which is the default keybind for `extract-keys`.
> This command extracts the public key and adds is to your keyring
> (smime_keys).
Yes, but this only displays precious little info.
Enter label: Found 1 certificate chains
Processing chain: subject=C = DE, ST = Berlin, L =