Reprovision existing key (zero backups) off of existing shard file
Changing requirements: We will assume we know which operator is missing. Therefore, bus factor can be more than 2.
This is implemented now as keyfork provision shard
.
OpenPGP key generation for
keyfork wizard generate-shard-secret
This is done in keyfork mnemonic generate
, which will replace the wizard.
OpenPGP key generation for
keyfork wizard generate-shard-secret
OpenPGP key generation for
keyfork wizard generate-shard-secret
--derive='openpgp --public "<userid>"'
. auto-outputs to a file based on the certfp, as preferred by qvs docs
Keyfork Prompt on the Linux Terminal doesn't clear terminal when leaving alternate mode
Resolved, but untested.
Keyfork Prompt on the Linux Terminal doesn't clear terminal when leaving alternate mode
Ensure matching signature is not found when --add-signature-to-quorum
--encrypt-to-self should make the certificate export filename the fingerprint
--encrypt-to-self should make the certificate export filename the fingerprint
done, by default cert is output to a file based on the fingerprint.
Restructure
keyfork mnemonic generate --encrypt-to-self
to name the encrypted file, automagically default name certificate based on fp
Add key touch policies to openpgp-card provisioners
Skip needing identifier for provisioner during
keyfork mnemonic generate
Skip needing identifier for provisioner during
keyfork mnemonic generate
Implemented. Identifiers are only needed if the count doesn't equal the amount of plugged in smartcards.