Update default GPG key

Signed-off-by: Knut Ahlers <knut@ahlers.me>
This commit is contained in:
Knut Ahlers 2022-09-29 13:45:55 +02:00
parent 2cea257954
commit 42cab9b67e
Signed by: luzifer
GPG key ID: D91C3E91E4CAD6F5

View file

@ -1,10 +1,10 @@
# Options for GnuPG # Options for GnuPG
# Copyright 1998, 1999, 2000, 2001, 2002, 2003 Free Software Foundation, Inc. # Copyright 1998, 1999, 2000, 2001, 2002, 2003 Free Software Foundation, Inc.
# #
# This file is free software; as a special exception the author gives # This file is free software; as a special exception the author gives
# unlimited permission to copy and/or distribute it, with or without # unlimited permission to copy and/or distribute it, with or without
# modifications, as long as this notice is preserved. # modifications, as long as this notice is preserved.
# #
# This file is distributed in the hope that it will be useful, but # This file is distributed in the hope that it will be useful, but
# WITHOUT ANY WARRANTY, to the extent permitted by law; without even the # WITHOUT ANY WARRANTY, to the extent permitted by law; without even the
# implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. # implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
@ -26,7 +26,7 @@ no-greeting
# If you have more than 1 secret key in your keyring, you may want to # If you have more than 1 secret key in your keyring, you may want to
# uncomment the following option and set your preferred keyid. # uncomment the following option and set your preferred keyid.
default-key D215AD7D default-key 5D7EEBD183A1F4395D1ED038A5143194CB681B44
# If you do not pass a recipient to gpg, it will ask for one. Using # If you do not pass a recipient to gpg, it will ask for one. Using
# this option you can encrypt to a default key. Key validation will # this option you can encrypt to a default key. Key validation will
@ -196,14 +196,14 @@ keyserver-options auto-key-retrieve
# you have to run an agent as daemon and use the option # you have to run an agent as daemon and use the option
# #
use-agent use-agent
# #
# which tries to use the agent but will fallback to the regular mode # which tries to use the agent but will fallback to the regular mode
# if there is a problem connecting to the agent. The normal way to # if there is a problem connecting to the agent. The normal way to
# locate the agent is by looking at the environment variable # locate the agent is by looking at the environment variable
# GPG_AGENT_INFO which should have been set during gpg-agent startup. # GPG_AGENT_INFO which should have been set during gpg-agent startup.
# In certain situations the use of this variable is not possible, thus # In certain situations the use of this variable is not possible, thus
# the option # the option
# #
# --gpg-agent-info=<path>:<pid>:1 # --gpg-agent-info=<path>:<pid>:1
# #
# may be used to override it. # may be used to override it.
@ -215,7 +215,7 @@ use-agent
# address (in the "user@example.com" form), and there are no # address (in the "user@example.com" form), and there are no
# user@example.com keys on the local keyring. This option takes the # user@example.com keys on the local keyring. This option takes the
# following arguments, in the order they are to be tried: # following arguments, in the order they are to be tried:
# #
# cert = locate a key using DNS CERT, as specified in RFC-4398. # cert = locate a key using DNS CERT, as specified in RFC-4398.
# GnuPG can handle both the PGP (key) and IPGP (URL + fingerprint) # GnuPG can handle both the PGP (key) and IPGP (URL + fingerprint)
# CERT methods. # CERT methods.
@ -234,7 +234,7 @@ use-agent
# Try CERT, then PKA, then LDAP, then hkp://subkeys.net: # Try CERT, then PKA, then LDAP, then hkp://subkeys.net:
#auto-key-locate cert pka ldap hkp://subkeys.pgp.net #auto-key-locate cert pka ldap hkp://subkeys.pgp.net
utf8-strings utf8-strings
personal-cipher-preferences AES256 AES192 AES personal-cipher-preferences AES256 AES192 AES
personal-digest-preferences SHA512 SHA384 SHA256 personal-digest-preferences SHA512 SHA384 SHA256