A `gpg-agent` backend for Sequoia's private key store. The `sequoia-keystore` crate implements a server that manages secret keys. Secret key material can be stored in files, on hardware devices like smartcards, or accessed via the network. `sequoia-keystore` doesn't implement these access methods. This is taken care of by various backends. This crate includes a backend that exposes the secret keys managed by a `gpg-agent` process. By default, this backend uses the default `gpg-agent`, i.e., the one for `$HOME/.gnupg`. Whereas the keystore and consequently this backend make use of OpenPGP data structures, `gpg-agent` uses a lower-level representation, which is independent of the encoding. As a first approximation, `gpg-agent` works with the low-level public and private keys, and does not know about OpenPGP metadata. A consequence of this is that it can also work with X.509 keys. `gpg-agent` addresses keys using their so-called keygrip, which is basically a hash of the public key material. This can usually be derived from the OpenPGP key material (although the function is not total). This backend finds the OpenPGP keys corresponding to the low-level keys managed by the `gpg-agent` by iterating over all OpenPGP certificates stored in the user's default [certificate store]. If the backend doesn't find a key with the corresponding keygrip, it does not expose that key; it is unusable. If the certificate is known, the key can be exposed by simply importing the certificate in the usual way: ```sh $ sq cert import cert.pgp ``` The backend doesn't need to be restarted, it will pick it up on its own. [certificate store]: https://gitlab.com/sequoia-pgp/pgp-cert-d