# Install hokey (https://hackage.haskell.org/package/hopenpgp-tools)$sudoaptinstallhopenpgp-tools
# Get the available PGP keys on your machine. Retrieve the fingerprint or the user ID:$gpg--list-key
--------------------------------
pubed255192022-04-06[SC]7D438CA8D0C6D57EA163751C2C800B246796CFC9
uid[ultimate]JohnDoe<john.doe@example.org>
subcv255192022-04-06[E]# Now, simply export the key and pipe it to hokey lint:gpg--export7D438CA8D0C6D57EA163751C2C800B246796CFC9|hokeylint
# Orgpg--export"John Doe"|hokeylint
# Output:hokey(hopenpgp-tools)0.22
Copyright(C)2012-2019ClintAdams
hokeycomeswithABSOLUTELYNOWARRANTY.Thisisfreesoftware,andyouarewelcometoredistributeitundercertainconditions.
Keyhaspotentialvalidity:good
Keyhasfingerprint:7D438CA8D0C6D57EA163751C2C800B246796CFC9
CheckingtoseeifkeyisOpenPGPv4:V4
CheckingtoseeifkeyisRSAorDSA(>=2048-bit):EdDSA256Checkinguser-ID-anduser-attribute-relateditems:
JognDoe<john.doe@example.org>:
Self-sighashalgorithms:[SHA-256]Preferredhashalgorithms:[SHA-512,SHA-384,SHA-256,SHA-224,SHA-1]Keyexpirationtimes:[]Keyusageflags:[[sign-data,certify-keys]]Checkingsubkeys:
oneofthesubkeysisencryption-capable:True
fpr:43C3C78E95BA71704B4B2342F3241786F03ADAF0
version:v4
timestamp:20220406-140557
algo/size:ECDH256bindingsighashalgorithms:[SHA-256]usageflags:[[encrypt-storage,encrypt-communications]]embeddedcross-cert:False
cross-certhashalgorithms:[SHA-256]