# The default key to sign with. If this option is not used, the default key is # the first key found in the secret keyring default-key 0x6B147327595D299854FED9D51CED67750173FC1C #----------------------------- # behavior #----------------------------- # Get rid of copyright notice on every run. no-greeting # When verifying a signature made from a subkey, ensure that the cross # certification "back signature" on the subkey is present and valid. # This protects against a subtle attack against subkeys that can sign. require-cross-certification # Everyone should be using UTF-8. charset utf-8 display-charset utf-8 utf8-strings # when outputting certificates, view user IDs distinctly from keys: fixed-list-mode # Create ASCII armored output instead of binary OpenPGP format armor # Disable inclusion of the version string in ASCII armored output no-emit-version # Display long key IDs keyid-format 0xlong # List all keys (or the specified ones) along with their fingerprints with-fingerprint # Display the calculated validity of user IDs during key listings list-options show-uid-validity verify-options show-uid-validity # This is taken over by dirmngr, but needed here for send keys keyserver hkps://hkps.pool.sks-keyservers.net keyserver-options no-honor-keyserver-url keyserver-options include-revoked #----------------------------- # algorithm and ciphers #----------------------------- # list of personal digest preferences. When multiple digests are supported by # all recipients, choose the strongest one personal-cipher-preferences AES256 AES192 AES CAST5 # list of personal digest preferences. When multiple ciphers are supported by # all recipients, choose the strongest one personal-digest-preferences SHA512 SHA384 SHA256 SHA224 # message digest algorithm used when signing a key cert-digest-algo SHA512 # This preference list is used for new keys and becomes the default for # "setpref" in the edit menu default-preference-list SHA512 SHA384 SHA256 SHA224 AES256 AES192 AES CAST5 ZLIB BZIP2 ZIP Uncompressed