Main key
BDB397F8D6B6802EB4CCCB79BF73B7A306CA84AF
Secret key
Initialize
mkdir ~/.gnupg-secret
chmod 700 ~/.gnupg-secret
echo pinentry-program /usr/bin/pinentry-qt > ~/.gnupg-secret/gpg-agent.conf
echo no-greeting > ~/.gnupg-secret/gpg.conf
echo keyid-format LONG >> ~/.gnupg-secret/gpg.conf
echo keyserver hkps://keys.openpgp.org >> ~/.gnupg-secret/gpg.conf
Backup
gpg --homedir .gnupg-secret --armor --export-secret-keys BDB397F8D6B6802EB4CCCB79BF73B7A306CA84AF > mael@clerambault.fr.gpg
Restore
gpg --homedir .gnupg-secret --import mael@clerambault.fr.gpg
Change expiration date
gpg --homedir .gnupg-secret --edit-key BDB397F8D6B6802EB4CCCB79BF73B7A306CA84AF
expire
gpg --homedir .gnupg-secret --send-keys BDB397F8D6B6802EB4CCCB79BF73B7A306CA84AF
Subkeys
List
gpg --homedir .gnupg-secret -K
encrypt
C7919D132638DB5A
Sign
- londres: 4E04AC5E252824EA
- phone: 990F6AA7E37BC0BC
- dell: BB2C45BDFEA3F3E1
Authentication
- dell: 46DA830AB243C64F
- londres: 5A3C309735367792
- phone: 299C127DD36FB044
Add
gpg --homedir .gnupg-secret --expert --edit-key BDB397F8D6B6802EB4CCCB79BF73B7A306CA84AF
gpg> addkey
Export
gpg --homedir .gnupg-secret --armor --export-secret-subkeys 990F6AA7E37BC0BC! C7919D132638DB5A! > subkey.pgp
Remove subkey
gpg --with-keygrip -K
rm .gnupg/private-keys-v1.d/ < keygrip > .key
The subkey will be displayed with a '#' prefix
Sign keys
gpg --homedir .gnupg-secret --edit-key someone@example.com
sign
quit
or gpg --homedir .gnupg-secret/ --ask-cert-level --sign-key someone@example.com
List signatures
gpg --homedir ~/.gnupg-secret/ --list-sigs someone@example.com
Export signatures
gpg --homedir ~/.gnupg-secret --armor --export someone@example.com > someone@example.com.key
Send signature
gpg --homedir .gnupg-secret --send-keys KEYID
Display ssh public key
gpg --homedir .gnupg-secret --export-ssh-key 299C127DD36FB044
Remove key
gpg --homedir .gnupg-secret --delete-key someone@example.com
Encrypt/Decrypt file with a password
Encrypt
gpg -c somefile
Decrypt
gpg -d somefile.gpg > somefile