Next: Crypto Operations, Previous: Context Attributes, Up: Contexts [Contents][Index]
Some of the cryptographic operations require that recipients or signers are specified. This is always done by specifying the respective keys that should be used for the operation. The following section describes how such keys can be selected and manipulated.
• Key objects: | Description of the key structures. | |
• Listing Keys: | Browsing the list of available keys. | |
• Information About Keys: | Requesting detailed information about keys. | |
• Manipulating Keys: | Operations on keys. | |
• Generating Keys: | Creating new key pairs. | |
• Signing Keys: | Adding key signatures to public keys. | |
• Exporting Keys: | Retrieving key data from the key ring. | |
• Importing Keys: | Adding keys to the key ring. | |
• Deleting Keys: | Removing keys from the key ring. | |
• Changing Passphrases: | Change the passphrase of a key. | |
• Changing TOFU Data: | Changing data pertaining to TOFU. | |
• Advanced Key Editing: | Advanced key edit operation. |