This page contains various tips and tricks for encryption technologies.
====== SSH ======
===== Generate a public key from existing private key =====
[[http://ubuntuforums.org/showthread.php?t=843896|On Linux, using OpenSSH]]
$ ssh-keygen -y -f private-keyfile
====== PGP/GnuPG ======
===== Un-revoke a key =====
The revocation of a private/public key pair is designed to be un-reversible.
However, it **is** technically possible to remove the revocation signature
from the key. **NOTE:** This is only useful if the revocation has not
left your control. If the key was uploaded, copied or transfered to anybody
else then removing the revocation signature will not have any meaningful
effect.
==== OpenSSH keys ====
[[http://www.gossamer-threads.com/lists/gnupg/users/40163#40163|To remove the revocation signature]]:
# I recommend these steps be performed in a clean/empty directory
# split key into component parts
$ gpg --export therevokedkey > tempkey.gpg
$ gpgsplit tempkey.gpg
# figure out which packet is the revocation
$ gpg --list-packets 0000*.sig
# 'sigclass' of 0x20 = revocation
$ rm (revocationfile).sig
# Re-assemble
$ cat 0000* > fixedkey.gpg
$ gpg --expert --delete-key therevokedkey
$ gpg --import fixedkey.gpg
==== SSL/TLS ====
See also
* [[Software development#TLS/SSL testing/verification|Software development > TLS/SSL testing/verification]]
* [[Windows servers#TLS/SSL support|Windows servers > TLS/SSL support]]