HELP: PGP key file export TYPE: OBJECT SYNTAX: PGP(FILE='str',USERID='str',NEWUID='str',PRIVATE,PASSWORD='bin'/DEFAULT,SIGNERID='str',SIGHASH=MD5/SHA1/RIPEMD/SHA224/SHA256/SHA384/SHA512,TIMESTAMP=num,ARMOR(),FKM5())
This object can be used to define parameters to export PGP keys.
You can define a new user ID for the exported key. This is required if your cryptographic infrastructure does not support custom key labels so that you are responsible to add your email address to the certificate.
To export a private key, a password must be provided to protect the resulting PGP key file. Depending on the cryptographic infrastructure, exporting private keys might not be possible.
The exported keys are usually self-signed. If you provide a signer ID, then cross-signing is possible. If you provide your own user ID also as signer ID, then signing is done with the currently active user key. For example, if you export a key which will be active in the future, this key will be signed with the current active user key.
When providing a timestamp, instead of the currently active key, the key is exported that is the youngest of valid keys at the given point in time. If there is more than one matching key (multiple keys with same user ID and creation date), the key with the shortest validity period is selected.
If the ARMOR object is specified, the key is exported in ASCII armor format. Otherwise, the key file is written in binary form.
STRING: FILE='str' - PGP key file name (binary or ASCII/EBCDIC Armor)
STRING: USERID='str' - User ID of the key(s) to be exported (search)
STRING: NEWUID='str' - User ID (additional) written to the key file [USERID]
SWITCH: PRIVATE - Also export private key [FALSE]
STRING: PASSWORD='bin'/DEFAULT - Passphrase for the PGP key file [optional]
DEFAULT - FLAM5 default password
STRING: SIGNERID='str' - User ID for the signing key to certify the key file [self signed]
NUMBER: SIGHASH=MD5/SHA1/RIPEMD/SHA224/SHA256/SHA384/SHA512 - Hash algorithm for signature generation [preferred]
MD5 - 128 bit (16 byte) MD5 checksum
SHA1 - 160 bit (20 byte) SHA checksum
RIPEMD - 160 bit (20 byte) RipeMD checksum
SHA224 - 224 bit (28 byte) SHA checksum
SHA256 - 256 bit (32 byte) SHA checksum
SHA384 - 384 bit (48 byte) SHA checksum
SHA512 - 512 bit (64 byte) SHA checksum
NUMBER: TIMESTAMP=num - Time stamp (seconds since 1970) used for key selection [0 - current]