encryption - jgrey4296/templates GitHub Wiki
gpgconf to modify and update gpg-agent settings, restart the service etc
gpgconf –kill gpg-agent
Create Key Create Revocation Cert Create Fingerprint Export Public and Secret Keys Backup [Public, Secret, Revocation]
Import other persons public key Verify it against their fingerprint Sign the Key (optional, give the signed key back by exporting it)
Then decrypt messages sent to you, encrypt messages to them using their public key, or verify they sent a plaintext signature.
https://emacs.stackexchange.com/questions/32881
use epg package, set epg-pinentry-mode to ‘loopback
add “allow-emacs-pinentry” to “~/.gnupg/gpg-agent.conf”, and set pinentry-program to pinentry-mac’s path in gpg-agent.conf
reload the configuration with “gpgconf –reload gpg-agent”, and
gpg -k gpg –list-sigs
Works for secret and public keys gpg –import [filename]
gpg –gen-key gpg –gen-revoke –armor –output=RevocationCertificate.asc [email]
gpg –delete-secret-keys gpg –delete-keys
Fingerprints give a shorter to verify hash of public keys gpg –fingerprint [email]
gpg –sign-key [email] or gpg –interactive –edit-key [email]
gpg –armor –export[-secret-keys] [-o file] [-a ID | email]
Don’t forget to add yourself to the recipients gpg [-o output] –sign –armor [-r recipient] [-e file]
gpg -o output -d file
gpg –clearsign file
gpg –verify file
gpg –interactive –edit-key [email] Then ‘showpref’ will show algorithm preferences from most - least.
modify using ‘setpref [algorithms..]’
then ‘save’
https://www.sslshopper.com/article-most-common-openssl-commands.html
/etc/ssl/certs - linux /usr/local/etc/openssl/cert.pem -mac