mirror of
git://git.gnupg.org/gnupg.git
synced 2024-10-29 19:48:43 +01:00
138e018592
-- We actually reuse the private keys here by having deleted the subkey and crated a new one using the option "From existing key". Of course the encrypted data changed while the plaintext stayed the same. |
||
---|---|---|
.. | ||
authenticate-only.pub.asc | ||
authenticate-only.sec.asc | ||
dda252ebb8ebe1af-1.asc | ||
dda252ebb8ebe1af-2.asc | ||
e2e-p256-1-clr.asc | ||
e2e-p256-1-prt.asc | ||
E657FB607BB4F21C90BB6651BC067AF28BC90111.asc | ||
ecc-sample-1-pub.asc | ||
ecc-sample-1-sec.asc | ||
ecc-sample-2-pub.asc | ||
ecc-sample-2-sec.asc | ||
ecc-sample-3-pub.asc | ||
ecc-sample-3-sec.asc | ||
ed25519-cv25519-sample-1.asc | ||
ed25519-cv25519-sample-2.asc | ||
eddsa-sample-1-pub.asc | ||
eddsa-sample-1-sec.asc | ||
issue2346.gpg | ||
no-creation-time.gpg | ||
pgp-desktop-skr.asc | ||
pqc-sample-1.key.asc | ||
pqc-sample-2.key.asc | ||
pqc-sample-3.key.asc | ||
pqc-sample-4.key.asc | ||
pqc-sample-5.key.asc | ||
README | ||
rsa-primary-auth-only.pub.asc | ||
rsa-primary-auth-only.sec.asc | ||
rsa-rsa-sample-1.asc | ||
silent-running.asc | ||
ssh-dsa.key | ||
ssh-ecdsa.key | ||
ssh-ed25519.key | ||
ssh-rsa.key | ||
v5-sample-1-pub.asc | ||
v5-sample-1-sec.asc | ||
whats-new-in-2.1.asc |
no-creation-time.gpg A key with a zero creation time. ecc-sample-1-pub.asc A NIST P-256 ECC sample key. ecc-sample-1-sec.asc Ditto, but the secret keyblock. ecc-sample-2-pub.asc A NIST P-384 ECC sample key. ecc-sample-2-sec.asc Ditto, but the secret keyblock. ecc-sample-3-pub.asc A NIST P-521 ECC sample key. ecc-sample-3-sec.asc Ditto, but the secret keyblock. eddsa-sample-1-pub.asc An Ed25519 sample key. eddsa-sample-1-sec.asc Ditto, but as protected secret keyblock. dda252ebb8ebe1af-1.asc rsa4096 key 1 dda252ebb8ebe1af-2.asc rsa4096 key 2 with a long keyid collision. whats-new-in-2.1.asc Collection of sample keys. e2e-p256-1-clr.asc Google End-end-End test key (no protection) e2e-p256-1-prt.asc Ditto, but protected with passphrase "a". E657FB607BB4F21C90BB6651BC067AF28BC90111.asc Key with subkeys (no protection) pgp-desktop-skr.asc Secret key with subkeys w/o signatures rsa-rsa-sample-1.asc RSA+RSA sample key (no passphrase) ed25519-cv25519-sample-1.asc Ed25519+CV25519 sample key (no passphrase) ed25519-cv25519-sample-2.asc Ed25519+CV25519 sample key (no passphrase) silent-running.asc Collection of sample secret keys (no passphrases) rsa-primary-auth-only.pub.asc rsa2408 primary only, usage: cert,auth rsa-primary-auth-only.sec.asc Ditto but the secret keyblock. v5-sample-1-pub.asc A version 5 key (ed25519/cert,sign,v5+cv25519/v5) v5-sample-1-sec.asc Ditto, but the secret keyblock (unprotected). pqc-sample-1.key.asc ky768_cv25519 public key. [*] pqc-sample-2.key.asc ky1024_cv448 public key. [*] pqc-sample-3.key.asc ky768_bp256 public key. [*] pqc-sample-4.key.asc ky1024_bp384 public key. [*] pqc-sample-5.key.asc ky1024_bp384 public key. [*] Notes: - A [*] marks public keys with their private parts in ../privkeys. - pgp-desktop-skr.asc is a secret keyblock without the uid and subkey binding signatures. When exporting a secret key from PGP desktop such a file is created which is then directly followed by a separate armored public key block. To create such a sample concatenate pgp-desktop-skr.asc and E657FB607BB4F21C90BB6651BC067AF28BC90111.asc - ecc-sample-2-sec.asc and ecc-sample-3-sec.asc do not have and binding signatures either. ecc-sample-1-sec.asc has them, though.