X-Git-Url: https://git.distorted.org.uk/~mdw/catacomb/blobdiff_plain/643eb1bbf91769f4f929173dd8452a94c36f1685..bd6d65e32b835551677456bf286d09ced6859882:/progs/key.1 diff --git a/progs/key.1 b/progs/key.1 index 95eb0ded..f5b64455 100644 --- a/progs/key.1 +++ b/progs/key.1 @@ -472,6 +472,14 @@ using a passphrase. Suppresses the progress indication which is usually generated while time-consuming key generation tasks are being performed. .TP +.BI "\-E, \-\-public-exponent" +Set the public exponent for RSA keys. +The default is 65537, +because this seems to be the overwhelmingly popular choice +among practitioners +and because it was the exponent used before this option was introduced. +The value 3 is fine unless you use a completely terrible padding scheme. +.TP .BI "\-L, \-\-lim-lee" When generating Diffie\(enHellman parameters, generate a Lim\(enLee prime rather than a random (or safe) prime. See the details on @@ -869,6 +877,13 @@ The private key is simply a random 256-bit string, from which a scalar and secret prefix are derived; the public key is the compressed form of the corresponding point. .TP +.B ed448 +Generate a private key and a corresponding public point on the +(Edwards-form) Ed448-Goldilocks elliptic curve. +The private key is simply a random 456-bit string, +from which a scalar and secret prefix are derived; +the public key is the compressed form of the corresponding point. +.TP .B empty Generate an empty key, with trivial contents. This is useful as a `parameters' key, @@ -891,7 +906,12 @@ new tag to be set. If no second argument is given, the existing tag, if any, is removed and no new tag is set. It is an error to set a tag which already exists on another key, unless you give the .B \-r -option, which removes the tag first. +option. +.PP +The following options are recognized. +.TP +.B "\-r, \-\-retag" +Untag the existing key with the desired new tag, if any. .SS "setattr" Attaches attributes to a key. The key to which the attributes should be attached is given by its @@ -946,9 +966,9 @@ keyids, types, expiry and deletion dates, and comments. Additional .RB ` \-v ' options show more information, such as the exact time of day for expiry and deletion, key attributes, and a dump of the actual key data. If the -verbosity level is sufficiently high, passphrases are requested to -decrypt locked keys. Make sure nobody is looking over your shoulder -when you do this! +verbosity level is sufficiently high, secret parts of keys are printed, +and passphrases are requested to decrypt locked keys. Make sure nobody +is looking over your shoulder when you do this! .SS "fingerprint" Reports a fingerprint (secure hash) on components of requested keys. The following options are supported: