If you want, you can do this with the signer's key (certificate) as well. Just export it to a file first:
# gpg --export D24F6CB2C1B52632 | gpg --list-packets :public key packet: version 4, algo 1, created 1256993643, expires 0 pkey[0]: [4096 bits] pkey[1]: [17 bits] keyid: D24F6CB2C1B52632 :user ID packet: "Mantas Mikul\xc4\x97nas " :signature packet: algo 1, keyid D24F6CB2C1B52632 version 4, created 1256993643, md5len 0, sigclass 0x13 digest algo 10, begin of digest 5a e2 [many more lines]
The certificates also consist ouf of packets, starting with a public key, userid's (text labels) with a self-signature for each (to protect against someone attaching fake userids to the pubkey), then several public subkey packets (again with self-signatures).