a chance to fully implement it.
were found but none were acceptable. `a' may be used in place of
`update-authorized_keys'.
.TP
-.B import-subkey FILE [KEYID]
-Import an existing ssh RSA key as an authentication subkey for a
-private key in your GnuPG keyring. KEYID is the key ID for the
-primary key for which the subkey with "authentication" capability will
-be imported. If no key ID is specified, but only one key exists in
-the secret keyring, that key will be used. `i' may be used in place
-of `import-subkey'.
-.TP
.B gen-subkey [KEYID]
Generate an authentication subkey for a private key in your GnuPG
keyring. KEYID is the key ID for the primary key for which the subkey
subcommands:
update-known_hosts (k) [HOST]... update known_hosts file
update-authorized_keys (a) update authorized_keys file
- import-subkey (i) FILE [KEYID] import existing ssh key as gpg subkey
gen-subkey (g) [KEYID] generate an authentication subkey
--length (-l) BITS key length in bits (2048)
ssh-proxycommand monkeysphere ssh ProxyCommand
local gpgSecOut
local fifoDir
+ # FIXME: implement!
+ failure "implement me!"
+
sshKeyFile="$1"
shift
# check that an authentication subkey does not already exist
check_gpg_authentication_subkey "$keyID"
- # FIXME: implement!
- failure "implement me!"
-
# setup the temp fifo dir for retrieving the key password
log debug "creating password fifo..."
fifoDir=$(msmktempdir)