1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
|
.TH SQ-KEY-GENERATE "1" "JANUARY 2021" " " "USER COMMANDS" 5
.SH NAME
sq key generate \- Generates a new key
Generating a key is the prerequisite to receiving encrypted messages
and creating signatures. There are a few parameters to this process,
but we provide reasonable defaults for most users.
When generating a key, we also generate a revocation certificate.
This can be used in case the key is superseded, lost, or compromised.
It is a good idea to keep a copy of this in a safe place.
.SH SYNOPSIS
\fBsq key generate\fR [FLAGS] [OPTIONS]
.SH FLAGS
.TP
\fB\-h\fR, \fB\-\-help\fR
Prints help information
.TP
\fB\-\-with\-password\fR
Protects the key with a password
.TP
\fB\-\-can\-sign\fR
Adds a signing\-capable subkey (default)
.TP
\fB\-\-cannot\-sign\fR
Adds no signing\-capable subkey
.TP
\fB\-\-cannot\-encrypt\fR
Adds no encryption\-capable subkey
.SH OPTIONS
.TP
\fB\-u\fR, \fB\-\-userid\fR EMAIL
Adds a userid to the key
.TP
\fB\-c\fR, \fB\-\-cipher\-suite\fR CIPHER\-SUITE
Selects the cryptographic algorithms for the key [default: cv25519] [possible values: rsa3k, rsa4k, cv25519]
.TP
\fB\-\-expires\fR TIME
Makes the key expire at TIME (as ISO 8601). Use 'never' to create keys that do not expire.
.TP
\fB\-\-expires\-in\fR DURATION
Makes the key expire after DURATION. Either 'N[ymwd]', for N years, months, weeks, or days, or 'never'.
.TP
\fB\-\-can\-encrypt\fR PURPOSE
Adds an encryption\-capable subkey. Encryption\-capable subkeys can be marked as suitable for transport encryption, storage encryption, or both. [default: universal] [possible values: transport, storage, universal]
.TP
\fB\-e\fR, \fB\-\-export\fR OUTFILE
Writes the key to OUTFILE
.TP
\fB\-\-rev\-cert\fR FILE or \-
Writes the revocation certificate to FILE. mandatory if OUTFILE is '\-'. [default: <OUTFILE>.rev]
.SH EXAMPLES
.TP
Generates a key
\fB$ sq key generate \-\-userid '<juliet@example.org>'\fR
.TP
Generates a key protecting it with a password
\fB$ sq key generate \-\-userid '<juliet@example.org>' \-\-with\-password\fR
.TP
Generates a key with multiple userids
\fB$ sq key generate \-\-userid '<juliet@example.org>' \-\-userid 'Juliet Capulet'\fR
.SH SEE ALSO
For the full documentation see <https://docs.sequoia\-pgp.org/sq/>.
.ad l
.nh
sq(1), sq\-armor(1), sq\-autocrypt(1), sq\-certify(1), sq\-dearmor(1), sq\-decrypt(1), sq\-encrypt(1), sq\-inspect(1), sq\-key(1), sq\-key\-adopt(1), sq\-key\-attest\-certifications(1), sq\-key\-generate(1), sq\-keyring(1), sq\-keyring\-filter(1), sq\-keyring\-join(1), sq\-keyring\-list(1), sq\-keyring\-merge(1), sq\-keyring\-split(1), sq\-packet(1), sq\-sign(1), sq\-verify(1)
.SH AUTHORS
.P
.RS 2
.nf
Azul <azul@sequoia\-pgp.org>
Igor Matuszewski <igor@sequoia\-pgp.org>
Justus Winter <justus@sequoia\-pgp.org>
Kai Michaelis <kai@sequoia\-pgp.org>
Neal H. Walfield <neal@sequoia\-pgp.org>
Nora Widdecke <nora@sequoia\-pgp.org>
Wiktor Kwapisiewicz <wiktor@sequoia\-pgp.org>
|