ascii-key-splitter (signature) takes stdin input consisting of multiple ASCII-armored PGP keyblocks (BEGIN PGP PUBLIC KEY BLOCK...END PGP PUBLIC KEY BLOCK) and places each key in a separate file named ./tmp/key.#. This is useful for selectively processing PGP keys.
check-sigs-and-sign (signature) takes a list of filenames and checks their detached signatures using GPG. Files with bad (including non-verifiable) or non-existent detached signatures are signed. When a file first needs to be signed, the passphrase is prompted for on, but is not echoed to, the terminal. The passphrase remains cached for the life of the process and is used for any subsequent signings. NB: this (Perl) program does not lock memory pages.
esha1sum (signature) calculates SHA-1 hashes of files and verifies hashes stored in a file (coming soon), much like md5sum(1) and sha1sum(1). File sizes are also reported, a feature many similar programs lack, to help guard against preimage attacks.
gvv (signature) reformats MIME-format PGP-signed messages or traditional-format signed content that has been indented or quoted so the signatures can be verified.
ka (signature) uses elinks to view intermediate keyanalyze reports for a given PGP key. (Other browsers (and the earlier, monthly, reports) can be used (viewed) by editing the script.)
kserver-all (signature) picks up where my kserver script for surfraw (should ship with the 1.0.8 distribution) leaves off. kserver-all generates a list of URLs to fetch a specific key from multiple PGP keyservers. I usually feed this list to wget -xi to fetch the keys, then see which keyservers have the keys or if the keys have different signatures. Most keyservers are well-synchronized, but with this program you will find the exceptions.
lget (signature) uses GPG's gpgkeys_ldap to fetch keys by keyid or fingerprint from an LDAP keyserver. Rather than importing the keys into a GPG keyring, they are stored in their own files for further processing.
pi (signature) does some argument preprocessing before sending commands to pks' pksclient. Search strings are grouped together and enclosed in quotes (helping prevent mishaps with "get" operations), keyids are prefixed with "0x," and all switches are grouped together as required by pksclient.
pf (signature) uses elinks to view pathfinder traces between two PGP keys. (Other browsers can be used by editing the script.)
pks-db-lister (signature) uses the BerkeleyDB Perl module to access the pks databases directly. For timedb, the times of key additions/updates are reported, as well as the keyids and the key creation times for the new/updated keys. For worddb, the indexed words are reported with the keyids and key creation times. For keydb, the keyids are reported.
pks-list-fingerprints (signature) extracts fingerprints from pksclient or GPG key listings on stdin, warns of duplicate keyids, and counts the keys and duplicates. Keyids and fingerprints are printed to stdout, sorted by keyid. This data can then be used to lookup PGP keyids by their key fingerprint.
pks-list-keyids (signature) extracts keyids from pksclient or GPG key listings on stdin and prints them to stdout. Duplicates can be removed with -d.
ufile (signature) uses esha1sum, sha1sum(1), sha(1), or md5sum(1) input on stdin to determine which files are unique. Filenames of unique files are printed to stdout. If -v is given, duplicates are reported instead.
$Date: 2004/01/06 22:41:57 $