1 # The default key to sign with. If this option is not used, the default key is
2 # the first key found in the secret keyring
3 #default-key 0xD8692123C4065DEA5E0F3AB5249B39D24F25E3B6
5 # Disable inclusion of the version string in ASCII armored output
8 # Disable comment string in clear text signatures and ASCII armored messages
11 # Display long key IDs
14 # List all keys (or the specified ones) along with their fingerprints
17 # Display the calculated validity of user IDs during key listings
18 list-options show-uid-validity
19 verify-options show-uid-validity
21 # Try to use the GnuPG-Agent. With this option, GnuPG first tries to connect to
22 # the agent before it asks for a passphrase.
28 # View images with feh
31 # When using --refresh-keys, if the key in question has a preferred keyserver
32 # URL, then disable use of that preferred keyserver to refresh the key from
33 keyserver-options no-honor-keyserver-url
35 keyserver-options auto-key-retrieve
37 # When searching for a key with --search-keys, include keys that are marked on
38 # the keyserver as revoked
39 keyserver-options include-revoked
41 # list of personal digest preferences. When multiple digests are supported by
42 # all recipients, choose the strongest one
43 personal-cipher-preferences AES256 AES192 AES CAST5
45 # list of personal digest preferences. When multiple ciphers are supported by
46 # all recipients, choose the strongest one
47 personal-digest-preferences SHA512 SHA384 SHA256 SHA224
49 # message digest algorithm used when signing a key
50 cert-digest-algo SHA512
52 # This preference list is used for new keys and becomes the default for
53 # "setpref" in the edit menu
54 default-preference-list SHA512 SHA384 SHA256 SHA224 AES256 AES192 AES CAST5 ZLIB BZIP2 ZIP Uncompressed