Am facing issue in generating PGP keys. Can you please help me to figure this out??
I fired the below command to generate keys. The log say keys successfully created. But when i tried to list it doesnt shows me the keys created.
Does the PGP key needs to be created with root user??Am not using root user.
Any help is much appreciated!!!
Thanks in Advance!!!
---------- Post updated at 05:46 AM ---------- Previous update was at 03:18 AM ----------
Any help is deeply appreciated!!!
/Thanks
Last edited by zaxxon; 05-02-2014 at 07:49 AM..
Reason: code tags adjusted, moved descriptive text outside of the output
how to use the arrow keys in shell scripting. is there any special synatax / command for this.
i just want to use the arrow keys for navigation.
replies appreciated
raguram R (3 Replies)
i have successfully executed a PGP encrytp command with the following:
"echo `pgp --encrypt filename --recipient user-key` > $fromDir/.encrypt"
However, when i attempt to issue a decrypt command with following:
"echo `pgp --decrypt filename --passphrase passphrase`" > $fromDir/.decrypt
... (1 Reply)
I'm hoping someone can help get me moving in the right direction here, so bear with me.
I've got 2 RedHat Linux servers, let's call them A & B.
- A receives "sensitive" files, which are PGP encrypted, and immediately sends them off to B for decryption/processing/deletion
- B needs to make... (1 Reply)
Hi,
i am trying to encrypt a file using pgp with a recepient's public key. The file is encrypted but the output file has owner & group nobody. i am not able to change it either. Please let me know how to do pgp encryption so that i get the output with owner and group as the same user which runs... (4 Replies)
Hi all,
I am facing an issue while creating the ssh keys. i am using fedora 9
Please let me know how to solve this issue
# ssh-keygen -t rsa
Generating public/private rsa key pair.
Enter file in which to save the key (/root/.ssh/id_rsa):
Enter passphrase (empty for no... (5 Replies)
Hi,
I need to export an existing PGP key and import it into GnuPG on a different machine.
This is how I did the export:
pgp -kx myuser _myuser_public
pgp -kx myuser _myuser_private secring.skr
(this is from the pgp installation directory that contains secring.skr).
This produced two... (0 Replies)
Hi,
I need to export an existing PGP key and import it into GnuPG on a different machine.
This is how I did the export:
pgp -kx myuser _myuser_public
pgp -kx myuser _myuser_private secring.skr
(this is from the pgp installation directory that contains secring.skr).
This produced two... (0 Replies)
Hello,
I'm trying to perform these operations without entering any password, as user "fzd":fzd@machine1> scp /tmp/srcFile1 fzd@machine2:/tmp/$destFile
fzd@machine1> scp fzd@machine2:/tmp/$srcFile /tmp/$destFilebut alsofzd@machine1> scp /tmp/srcFile1 machine2:/tmp/$destFile
fzd@machine1> scp... (6 Replies)
Hi Guys,
I am trying to import the public of vendor to my system. I am getting below error while importing public key. can anyone please help me with this??
laranakejt4:/u/raja/.pgp $ pgp --import secure.asc
0x1545A56A52:import key (4007:key failed signature check)
secure.asc:import key... (0 Replies)
Hi Guys,
I am trying to import the public of vendor to my system. I am getting below error while importing public key. can anyone please help me with this??
laranakejt4:/u/raja/.pgp $ pgp --import secure.asc
0x1545A56A52:import key (4007:key failed signature check)
secure.asc:import key... (2 Replies)
Discussion started by: Vinoth Kumar G
2 Replies
LEARN ABOUT DEBIAN
yhsm-generate-keys
yhsm-generate-keys(1) General Commands Manual yhsm-generate-keys(1)NAME
yhsm-generate-keys - Generate AEADs with secrets for YubiKeys using a YubiHSM
SYNOPSIS
yhsm-generate-keys --key-handles KEY_HANDLES --start-public-id START_ID [options]
DESCRIPTION
With this tool, a YubiHSM can generate random secrets (using it's internal true random number generator), and these secrets protected in
AEAD files can be stored on the host computer.
The AEADs will be ready to be used by for example yhsm-yubikey-ksm(1) ), as a part of a YubiKey OTP validation service.
To program YubiKeys with the generated secrets, it is possible to decrypt the AEADs (knowledge of the AES key used inside the YubiHSM is
required) using yhsm-decrypt-aead(1)OPTIONS -D, --device
Device file name (default: /dev/ttyACM0).
-v, --verbose
Enable verbose operation.
--debug
Enable debug printout, including all data sent to/from YubiHSM.
-O dir Base output directory (default: /var/cache/yubikey-ksm/aeads).
-c integer
Number of AEADs to generate.
--public-id-chars integer
Number of chars in generated public ids (default: 12). Changing this might not work well.
--key-handles kh [kh ...]
Key handles to encrypt the generated secrets with. Examples : "1", "0xabcd".
--start-public-id id
Public id of the first generated secret, in modhex.
EXIT STATUS
0 Secrets generated successfully.
1 Failed to generate secrets.
BUGS
Report python-pyhsm/yhsm-generate-keys bugs in the issue tracker <https://github.com/Yubico/python-pyhsm/issues/>
SEE ALSO
The python-pyhsm home page <https://github.com/Yubico/python-pyhsm/>
YubiHSMs and YubiKeys can be obtained from Yubico <http://www.yubico.com/>.
python-pyhsm June 2012 yhsm-generate-keys(1)