On Friday, June 2, 2017 at 4:46:33 AM UTC-6, Ian wrote:
[...]
> pgp --gen-key [other options]
> pgp --export 0xNewlyCreatedKey -o wibble.ToBeSentToTheFarEnd
Results in having only keys in the PGP system which of course is not saying whether you rely on web of trust at all but that's what you should do with these keys...
> openssl req -newkey rsa:2048 -keyout wibble.key -out wibble.csr
>
> Get the csr signed by a cert authority, they send back wibble.crt
>
> openssl pkcs12 -export \
> -in wibble.crt \
> -inkey wibble.key \
> -certfile root.crt \
> -certfile intermediate.crt \
> -out wibble.p12
>
> pgp --import wibble.p12
>
> pgp --export 0xNewlyImportedKeyID -o wibble.ToBeSentToTheFarEnd
Interestingly the difference is that you would I guess have the same key for SSL applications in addition to PGP. There is certainly no reason to do this extra work if they were not using the key later in OpenSSL as well as PGP which are different systems.