The symmetric passphrase for decrypting the payload of
is: 6460-5183-7821-0632-0177-4451-8821-9031-7887.When i decrypt it symmetrically though, gpg reports a different size than what is actually emitted:
$ gpg --batch --status-fd=2 --pinentry-mode=loopback --decrypt --passphrase 6460-5183-7821-0632-0177-4451-8821-9031-7887 < package/tests/resources/autocrypt-setup-message-2.eml | wc gpg: unknown armor header: Passphrase-Format: numeric9x4 gpg: unknown armor header: Passphrase-Begin: 64 gpg: AES256 encrypted session key [GNUPG:] NEED_PASSPHRASE_SYM 9 3 8 gpg: encrypted with 1 passphrase [GNUPG:] BEGIN_DECRYPTION [GNUPG:] DECRYPTION_COMPLIANCE_MODE 23 [GNUPG:] DECRYPTION_INFO 2 9 [GNUPG:] PLAINTEXT 75 1529933984 msg.txt [GNUPG:] PLAINTEXT_LENGTH 6793 [GNUPG:] DECRYPTION_OKAY [GNUPG:] GOODMDC [GNUPG:] END_DECRYPTION 108 115 6685 $
note that 6685 != 6793.
(this file is from the enigmail test suite -- i dont know how it was generated).
this test was run on GnuPG 2.2.17-3.