`sq toolbox packet dump --hex` produces weirdly broken output on a secret key with unknown secret key material encryption
Using the same test key from sequoia-sop#32 (closed), sq toolbox packet dump --hex
shows strange brokenness on the packets with the unknown secret key material encryption:
$ sq version
sq 0.33.0
using sequoia-openpgp 1.19.0
with cryptographic backend Nettle 3.9 (Cv448: true, OCB: true)
$ sq toolbox packet dump --hex < test.key
Unknown or Unsupported Packet, new CTB, 2 header bytes + 52 bytes
Tag: Secret-Key Packet
Error: Malformed packet: unsupported secret key encryption
00000000 c5 CTB
00000001 34 length
00000002
00000002
00000002
00000002
00000002
00000002
00000002
00000002
I would have expected something more like:
Secret-Key Packet, new CTB, 2 header bytes + 88 bytes
Version: 4
Creation time: 2024-03-28 17:48:35 UTC
Pk algo: EdDSA
Pk size: 256 bits
Fingerprint: 5E53FC4EEAF459947E7F4237DFF8BD521E0E1C49
KeyID: DFF8BD521E0E1C49
Secret Key:
Encrypted
(unknown secret key encryption mechanism)
00000000 c5 CTB
00000001 34 length
00000002 04 version
00000003 66 05 ad 73 creation_time
00000007 16 pk_algo
00000008 09 curve_len
00000009 2b 06 01 04 01 da 47 curve
00000010 0f 01
00000012 01 07 eddsa_public_len
00000014 40 94 b2 ba 50 f4 2c 54 74 76 11 39 eddsa_public
00000020 35 4b 05 48 1b 7b 41 9a 98 84 b6 29 18 62 50 b2
00000030 d5 32 22 ab 36
00000035 fc s2k_usage
Edited by Daniel Kahn Gillmor