tar cf vault.tar vault
gpg --armor --symmetric --cipher-algo AES256 vault.tar
gpg -o vault.tar --decrypt vault.tar.asc
tar xf vault.tar
gpg --list-secret-keys --keyid-format long
gpg --export-secret-keys -a > ${VAULTDIR}/secret-keys.gpg
gpg --export -a > ${VAULTDIR}/keys.gpg
gpg --export-ownertrust > ${VAULTDIR}/gpg.trustdb
gpg --import ${VAULTDIR}/secret-keys.gpg
gpg --import-ownertrust ${VAULTDIR}/gpg.trustdb
pass show gpg-public-keys
see https://gist.github.com/mcattarinussi/834fc4b641ff4572018d0c665e5a94d3
echo enable-ssh-support >> $HOME/.gnupg/gpg-agent.conf
unset SSH_AGENT_PID
if [ "${gnupg_SSH_AUTH_SOCK_by:-0}" -ne $$ ]; then export SSH_AUTH_SOCK="$(gpgconf --list-dirs agent-ssh-socket)"; fi
export GPG_TTY=$(tty)
gpg-connect-agent updatestartuptty /bye >/dev/null
gpg --list-keys --with-keygrip
echo xxx >> .gnupg/sshcontrol
ssh-add -l
ssh [email protected]
gpg --export-ssh-key <user-id>