


PGPK(1)                    User Manual                    PGPK(1)


NNAAMMEE
       pgpk - Public and Private key management for PGP.

SSYYNNOOPPSSIISS
       ppggppkk  [[--aa  _k_e_y_f_i_l_e  _._._.  ||  --cc  [[uusseerriidd]]]]  || --dd <<uusseerriidd>> ||
       --ee <<uusseerriidd>> || --gg || --ll[[ll]] [[uusseerriidd]] || ----rreevvookkee[[ss]] <<uusseerriidd>> ||
       --rr[[uu||ss]]   <<uusseerriidd>>   ||   --ss   <<uusseerriidd>>   [[--uu  <<yyoouurriidd>>]]  ||
       --xx <<uusseerriidd>>]] [[--oo _<_o_u_t_f_i_l_e_>]] [[--zz]]


DDEESSCCRRIIPPTTIIOONN
       ppggppkk Manages public and  private  keys  for  PGP.   Unlike
       other  PGP applications, pgpk is stream based and not file
       based; if no files are specified,  _s_t_d_i_n  and  _s_t_d_o_u_t  are
       used.

OOPPTTIIOONNSS
       All  configuration options can be controlled from the com
       mand line.  See ppggpp..ccffgg(5) for a complete list and how  to
       specify them.


       -a [keyfile]
              Adds  the  contents of _k_e_y_f_i_l_e to your keyring.  If
              _k_e_y_f_i_l_e is  not  specified,  input  is  taken  from
              _s_t_d_i_n_.   _K_e_y_f_i_l_e  may also be an URL; the supported
              protocols are hhkkpp (Horowitz Key Protocol), hhttttpp and
              ffiinnggeerr.   To  add  ffoooo@@bbaarr..bbaazz..ccoomm's  key  to  your
              keyring from PGP, Inc's server, for example, enter:

              _p_g_p_k _-_a _h_k_p_:_/_/_k_e_y_s_._p_g_p_._c_o_m_/_f_o_o_@_b_a_r_._b_a_z_._c_o_m

              If ffoooo@@bbaarr..bbaazz..ccoomm has his key in his finger infor
              mation, you could add that with:

              _p_g_p_k _-_a _f_i_n_g_e_r_:_/_/_b_a_r_._b_a_z_._c_o_m_/_f_o_o

              If ffoooo@@bbaarr..bbaazz..ccoomm has his key on his web page, you
              could add that with:

              _p_g_p_k _-_a _h_t_t_p_:_/_/_w_w_w_._b_a_z_._c_o_m_/_f_o_o_/_D_S_S_k_e_y_._h_t_m_l

              If  the  _K_e_y_f_i_l_e  is  not  obviously a filename (it
              doesn't begin with "/"  or  "./")  and  it  doesn't
              exist  as  a readable file, an attempt will be made
              to fetch it from your default keyserver  using  the
              HHoorroowwiittzz  KKeeyy PPrroottooccooll.  (See ppggpp..ccffgg(5) for infor
              mation on setting  your  default  keyserver).   For
              example,  if there is no file named _f_o_o_@_b_a_r_._b_a_z_._c_o_m
              readable in the current directory,

              _p_g_p_k _-_a _f_o_o_@_b_a_r_._b_a_z_._c_o_m

              will  extract  foo@bar.baz.com's  key   from   your



PGP                      JULY 1997 (v5.0)                       1





PGPK(1)                    User Manual                    PGPK(1)


              default  keyserver.   Some  people  consider this a
              security risk (as it could potentially leak  infor
              mation about the files on your system if you make a
              typing error).  Use the GGeettNNoottFFoouunnddKKeeyyFFiilleess config
              uration option to disable this behavior.

       -c [userid]
              Checks  the  signatures  of all keys on your public
              keyring.  If [[uusseerriidd]] is specified, only the signa
              tures  on  that key are checked.  This command per
              forms _p_g_p_k _-_l_l on all specified keys, then  outputs
              an  explicit listing of trust and validity for each
              key.  TTrruusstt is the amount of trust placed  in  each
              key  as  an  introducer.  VVaalliiddiittyy is the certainty
              that the key and user  ID  belong  together.   Both
              this command and the long listing function output a
              leading column which succinctly describes the  con
              dition of the key.

              The possible leading columns can have the following
              first three character values:

              ppuubb A public key
              rreett A revoked key
              sseecc A secret key
              ssuubb A sub-key (in 5.0, this  is  always  a  Diffie-
              Hellman key)
              SSIIGG A signature issued by a public key to which you
              have thecorresponding private key (i.e., your key)
              ssiigg A signature issued by a public key to which you
              do  NOT  have  the corresponding private key (i.e.,
              someone else's key)
              uuiidd A user ID

              Following this column is a single  character  which
              describes other attributes of the object:

              %%  The object is not valid (it does not have enough
              trusted signatures)
              ??  No information is  available  about  the  object
              (generally  because  it  is  a signature from a key
              that is not on your keyring)
              !!  The object has been checked
              ** The object has been tried
              @@ The object is disabled
              ++ The object is axiomatically trusted  (i.e.,  it's
              your key)

       -d <userid>
              Toggles  the  disablement of <<uusseerriidd>>'s key on your
              public keyring.

       -e <userid>
              Edits <<uusseerriidd>>'s key.  If  this  is  your  key,  it



PGP                      JULY 1997 (v5.0)                       2





PGPK(1)                    User Manual                    PGPK(1)


              allows  you  to edit your userid(s) and passphrase.
              If it is someone else's key, it allows you to  edit
              the trust you have in that person as an introducer.

       -g     Generate a public/private key pair.

       -l[l] [userid]
              Lists information about  a  key.   --llll  lists  more
              information about a key.  If [[uusseerriidd]] is specified,
              that  key  is  listed.   Otherwise,  all  keys  are
              listed.   See --cc, above, for more information about
              the long format.

       -o outfile
              Specifies that output should go to _o_u_t_f_i_l_e.  If not
              specified,  output  goes  to _s_t_d_o_u_t.  If the output
              file is from a key extraction (see --xx, below),  you
              may  specify  an  hkp  (Horowitz Key Protocol) URL.
              For   example:   _p_g_p_k   _-_x    _f_o_o_@_b_a_r_._b_a_z_._c_o_m    _-_o
              _h_k_p_:_/_/_k_e_y_s_._p_g_p_._c_o_m would send ffoooo@@bbaarr..bbaazz..ccoomm's key
              to the PGP, Inc. public key server.

       --revoke <userid>
              PPeerrmmaannaatteellyy revokes the key specified.  There is no
              way  to  undo  this,  so  don't play with it if you
              don't mean it.

       --revokes <userid>
              PPeerrmmaanneennttllyy revokes your signature (if any) on  the
              key specified.

       -r <userid>
              Removes  <<uusseerriidd>>'s  key  from your public keyring,
              and your private as well, if it's there.

       -ru <userid>
              Removes the given userid from your public and  pri
              vate keyrings.

       -rs <userid>
              Removes   the  given  signature  from  your  public
              keyring.

       -s <userid> [-u <yourid>]
              Signs <<uusseerriidd>>'s key with your default signing key.
              If --uu is specified, uses that key, instead.

       -x <userid>
              Extracts  the  specified key in ASCII-armored form.
              --xx <<uusseerriidd>>

       -z     Batch mode.  See ppggpp--iinntteeggrraattiioonn(7) for  a  discus
              sion  of integrating pgp support into your applica
              tion.



PGP                      JULY 1997 (v5.0)                       3





PGPK(1)                    User Manual                    PGPK(1)


EEXXAAMMPPLLEE
       _p_g_p_k _-_g Generates a key.

FFIILLEESS
       _~_/_._p_g_p_/_p_g_p_._c_f_g
              User-specific  configuration  file.   In   previous
              releases,  this  file  was  called _c_o_n_f_i_g_._t_x_t.  See
              ppggpp..ccffgg(5) for further details.

BBUUGGSS
              See ppggpp(1).

SSEEEE AALLSSOO
       ppggpp(1),    ppggppvv(1),    ppggppee(1),    ppggppss(1),    ppggpp..ccffgg(5),
       ppggpp--iinntteeggrraattiioonn(7),  http://www.pgp.com  (US versions) and
       http://www.pgpi.com (International versions)









































PGP                      JULY 1997 (v5.0)                       4


