The certificates: ``` $ { for i in $(ls -1 *.pgp | grep -v -- -priv.pgp | sort); do echo; echo "- $i:"; sq inspect $i; done | grep -E '^- |Fingerprint|Key flags|Subkey|UserID'; } 2>/dev/null - alice2-adopted-alice.pgp: Fingerprint: 23CFE49D4BB7A0AA83619C147E716FFE77DF170A Key flags: certification Subkey: 662F03FC47C05D070B53A93AD5A5048A71CD012A Key flags: signing Subkey: 5989D7BE9908AE24799DF6CFBE678043781349F1 Key flags: transport encryption, data-at-rest encryption UserID: UserID: - alice2.pgp: Fingerprint: 23CFE49D4BB7A0AA83619C147E716FFE77DF170A Key flags: certification UserID: UserID: - alice.pgp: Fingerprint: 30505BCEB7403A1BBFA9DBF0BFBE63567B4BA57A Key flags: certification Subkey: 662F03FC47C05D070B53A93AD5A5048A71CD012A Key flags: signing Subkey: A6D92948A7ADEB809F04202F1CF1943DFE153D1E Key flags: authentication Subkey: 5989D7BE9908AE24799DF6CFBE678043781349F1 Key flags: transport encryption, data-at-rest encryption UserID: UserID: - bob.pgp: Fingerprint: 9994DBF9D34E88E2A21D0CE8E79C9395A1004BB0 Key flags: certification Subkey: 7E01441CBF6FAB5C4AB457E2FBD6F5322354B331 Key flags: authentication UserID: - carol.pgp: Fingerprint: E9C6EFC0E39CE6F9DF5274E7E362D45C7FF7B654 Key flags: certification Subkey: CD22D4BD99FF10FDA11A83D4213DCB92C95346CE Key flags: authentication UserID: UserID: - david.pgp: Fingerprint: A82BC944220BD5EBECC4D42883F74A0EAC207446 Key flags: certification Subkey: DF674FBAC52E00F0E6E48436481D2E18158FB594 Key flags: authentication Subkey: CD22D4BD99FF10FDA11A83D4213DCB92C95346CE UserID: - ed.pgp: Fingerprint: 0C346B2B6241263F64E9C7CF1EA300797258A74E Key flags: certification Subkey: 0C346B2B6241263F64E9C7CF1EA300797258A74E Key flags: certification UserID: - halfling-encryption.pgp: Fingerprint: D58E047C05D115EA4F3D1A98A67A733127BBE804 Key flags: certification Subkey: 69669E91C8D5C546D442FB246FE6D4751AC09E15 Key flags: authentication Subkey: CC4EFA3BFAB8E92A54CDEA3F3DC7543293DD4E53 Key flags: transport encryption, data-at-rest encryption UserID: UserID: Halfling - halfling-signing.pgp: Fingerprint: D58E047C05D115EA4F3D1A98A67A733127BBE804 Key flags: certification Subkey: 69669E91C8D5C546D442FB246FE6D4751AC09E15 Key flags: authentication Subkey: 9DCDA2A95A17B728D6A5115EFF5C6582E4D14B68 Key flags: signing UserID: UserID: Halfling - hans-puny-code.pgp: Fingerprint: F6675D0E4DA40823715C4811B89491F07D08E4F8 Key flags: certification Subkey: 3F60EA0AEBC13E290939A080DB1F5F11C17CB2D4 Key flags: signing UserID: Hans - peter.pgp: Fingerprint: 692E359EFB0BE115373F6CEAD5D8BA16C805A81F Key flags: certification Subkey: 69D325E20DA4D404279A6534A6DE34867DE8927E Key flags: authentication Subkey: 62D2D97F00DF96D2DFED85F98CE4FE6BD01282DE Key flags: signing Subkey: DBEF1760AA2631194301E60F485BDDEF4BD2AD9A Key flags: transport encryption, data-at-rest encryption UserID: Dad UserID: Peter - steve.pgp: Fingerprint: 217E256E176719A5452EDFF935AADEC66B56585B Key flags: certification Subkey: 32C5820540308752B7092EE5B596B656FD8F700B Key flags: signing UserID: Steve - una.pgp: Fingerprint: 119B01460659D8EF3732BEC271424ADE3EC61BBC Key flags: certification Subkey: EE58C32E3D2336F223BD89CED0BE447BF39B439F Key flags: signing UserID: Una ``` alice: A normal certificate with two User IDs. Shares one with alice. alice2: A normal certificate with two User IDs. Shares one with alice. alice2-adopted-alice: alice2, but adopts the signing and encryption subkeys from alice. (Note: does *not* adopt the authentication subkey.) bob: A normal certificate with two User IDs. carol: A normal certificate with two User IDs. david: A normal certificate, but with a copy of one of carol's subkeys (CD22D4BD99FF10FDA11A83D4213DCB92C95346CE). That is, the subkey is appended to david's certificate, but there is no binding signature. ed: An unusual certificate: his primary key is also a subkey on his certificate! halfling: Two versions of the same certificate. Both have the same authentication subkey, one has a signing subkey, the other an encryption subkey. Likewise, both have one User ID in common (regis@pup.com) and a second User ID ('Halfling ' and 'Halfling ', respectively). hans: A certificate with an email address that uses puny code. peter: A certificate with a user ID that has a third-party certification from Una, but is not self signed. steve: A certificate with an email address for a subdomain of `sub.company.com`. una: A certificate with an email address for the domain `company.com`.