2009-03-16 19:45:46 +01:00
|
|
|
@c Copyright (C) 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007,
|
|
|
|
@c 2008, 2009 Free Software Foundation, Inc.
|
2004-09-30 10:39:08 +02:00
|
|
|
@c This is part of the GnuPG manual.
|
|
|
|
@c For copying conditions, see the file gnupg.texi.
|
2003-12-09 10:07:09 +01:00
|
|
|
|
2004-09-30 10:39:08 +02:00
|
|
|
@node Invoking GPG
|
|
|
|
@chapter Invoking GPG
|
|
|
|
@cindex GPG command options
|
|
|
|
@cindex command options
|
|
|
|
@cindex options, GPG command
|
2003-12-09 10:07:09 +01:00
|
|
|
|
2006-09-22 16:38:38 +02:00
|
|
|
@c Begin GnuPG 1.x specific stuff
|
|
|
|
@ifset gpgone
|
|
|
|
@macro gpgname
|
|
|
|
gpg
|
|
|
|
@end macro
|
|
|
|
@manpage gpg.1
|
|
|
|
@ifset manverb
|
|
|
|
.B gpg
|
|
|
|
\- OpenPGP encryption and signing tool
|
|
|
|
@end ifset
|
|
|
|
|
|
|
|
@mansect synopsis
|
|
|
|
@ifset manverb
|
|
|
|
.B gpg
|
|
|
|
.RB [ \-\-homedir
|
|
|
|
.IR dir ]
|
|
|
|
.RB [ \-\-options
|
|
|
|
.IR file ]
|
|
|
|
.RI [ options ]
|
|
|
|
.I command
|
|
|
|
.RI [ args ]
|
|
|
|
@end ifset
|
|
|
|
@end ifset
|
|
|
|
@c End GnuPG 1.x specific stuff
|
2003-12-09 10:07:09 +01:00
|
|
|
|
2006-09-22 16:38:38 +02:00
|
|
|
@c Begin GnuPG 2 specific stuff
|
|
|
|
@ifclear gpgone
|
|
|
|
@macro gpgname
|
|
|
|
gpg2
|
|
|
|
@end macro
|
2006-08-17 20:01:25 +02:00
|
|
|
@manpage gpg2.1
|
|
|
|
@ifset manverb
|
|
|
|
.B gpg2
|
2006-08-17 21:58:28 +02:00
|
|
|
\- OpenPGP encryption and signing tool
|
2006-08-17 20:01:25 +02:00
|
|
|
@end ifset
|
|
|
|
|
|
|
|
@mansect synopsis
|
|
|
|
@ifset manverb
|
|
|
|
.B gpg2
|
|
|
|
.RB [ \-\-homedir
|
|
|
|
.IR dir ]
|
|
|
|
.RB [ \-\-options
|
|
|
|
.IR file ]
|
|
|
|
.RI [ options ]
|
|
|
|
.I command
|
|
|
|
.RI [ args ]
|
|
|
|
@end ifset
|
2006-09-22 16:38:38 +02:00
|
|
|
@end ifclear
|
|
|
|
@c Begin GnuPG 2 specific stuff
|
2006-08-17 20:01:25 +02:00
|
|
|
|
|
|
|
@mansect description
|
2006-09-22 16:38:38 +02:00
|
|
|
@command{@gpgname} is the OpenPGP part of the GNU Privacy Guard (GnuPG). It
|
2006-09-08 19:02:06 +02:00
|
|
|
is a tool to provide digital encryption and signing services using the
|
2006-09-22 16:38:38 +02:00
|
|
|
OpenPGP standard. @command{@gpgname} features complete key management and
|
2006-08-17 20:01:25 +02:00
|
|
|
all bells and whistles you can expect from a decent OpenPGP
|
|
|
|
implementation.
|
|
|
|
|
2006-09-22 16:38:38 +02:00
|
|
|
@ifset gpgone
|
2006-09-25 20:29:20 +02:00
|
|
|
This is the standalone version of @command{gpg}. For desktop use you
|
|
|
|
should consider using @command{gpg2}.
|
2006-09-22 16:38:38 +02:00
|
|
|
@end ifset
|
|
|
|
|
|
|
|
@ifclear gpgone
|
2006-08-17 20:01:25 +02:00
|
|
|
In contrast to the standalone version @command{gpg}, which is more
|
2006-08-16 16:54:19 +02:00
|
|
|
suited for server and embedded platforms, this version is installed
|
|
|
|
under the name @command{gpg2} and more targeted to the desktop as it
|
|
|
|
requires several other modules to be installed. The standalone version
|
|
|
|
will be kept maintained and it is possible to install both versions on
|
|
|
|
the same system. If you need to use different configuration files, you
|
|
|
|
should make use of something like @file{gpg.conf-2} instead of just
|
|
|
|
@file{gpg.conf}.
|
2006-09-22 16:38:38 +02:00
|
|
|
@end ifclear
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-08-17 20:01:25 +02:00
|
|
|
@manpause
|
2006-09-22 16:38:38 +02:00
|
|
|
@ifclear gpgone
|
|
|
|
Documentation for the old standard @command{gpg} is available as a man
|
|
|
|
page and at @inforef{Top,GnuPG 1,gpg}.
|
|
|
|
@end ifclear
|
2003-12-09 10:07:09 +01:00
|
|
|
|
2006-09-22 16:38:38 +02:00
|
|
|
@xref{Option Index}, for an index to @command{@gpgname}'s commands and options.
|
2006-08-17 20:01:25 +02:00
|
|
|
@mancont
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
@menu
|
|
|
|
* GPG Commands:: List of all commands.
|
|
|
|
* GPG Options:: List of all options.
|
|
|
|
* GPG Configuration:: Configuration files.
|
|
|
|
* GPG Examples:: Some usage examples.
|
|
|
|
|
|
|
|
Developer information:
|
|
|
|
@c * Unattended Usage:: Using @command{gpg} from other programs.
|
|
|
|
@c * GPG Protocol:: The protocol the server mode uses.
|
|
|
|
@end menu
|
|
|
|
|
|
|
|
|
2006-08-17 20:01:25 +02:00
|
|
|
|
2006-08-16 16:54:19 +02:00
|
|
|
@c *******************************************
|
|
|
|
@c *************** ****************
|
|
|
|
@c *************** COMMANDS ****************
|
|
|
|
@c *************** ****************
|
|
|
|
@c *******************************************
|
2006-08-17 20:01:25 +02:00
|
|
|
@mansect commands
|
2006-08-16 16:54:19 +02:00
|
|
|
@node GPG Commands
|
|
|
|
@section Commands
|
|
|
|
|
2007-12-13 16:45:40 +01:00
|
|
|
Commands are not distinguished from options except for the fact that
|
2006-08-16 16:54:19 +02:00
|
|
|
only one command is allowed.
|
|
|
|
|
2006-09-22 16:38:38 +02:00
|
|
|
@command{@gpgname} may be run with no commands, in which case it will
|
2006-08-16 16:54:19 +02:00
|
|
|
perform a reasonable action depending on the type of file it is given
|
|
|
|
as input (an encrypted message is decrypted, a signature is verified,
|
|
|
|
a file containing keys is listed).
|
|
|
|
|
|
|
|
Please remember that option as well as command parsing stops as soon as
|
|
|
|
a non-option is encountered, you can explicitly stop parsing by
|
2006-09-25 20:29:20 +02:00
|
|
|
using the special option @option{--}.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
|
|
|
|
@menu
|
|
|
|
* General GPG Commands:: Commands not specific to the functionality.
|
|
|
|
* Operational GPG Commands:: Commands to select the type of operation.
|
|
|
|
* OpenPGP Key Management:: How to manage your keys.
|
|
|
|
@end menu
|
|
|
|
|
|
|
|
|
|
|
|
@c *******************************************
|
|
|
|
@c ********** GENERAL COMMANDS *************
|
|
|
|
@c *******************************************
|
|
|
|
@node General GPG Commands
|
|
|
|
@subsection Commands not specific to the function
|
|
|
|
|
|
|
|
@table @gnupgtabopt
|
|
|
|
@item --version
|
|
|
|
@opindex version
|
|
|
|
Print the program version and licensing information. Note that you
|
|
|
|
cannot abbreviate this command.
|
|
|
|
|
2006-08-17 20:01:25 +02:00
|
|
|
@item --help
|
|
|
|
@itemx -h
|
2006-08-16 16:54:19 +02:00
|
|
|
@opindex help
|
|
|
|
Print a usage message summarizing the most useful command line options.
|
2008-12-12 15:04:22 +01:00
|
|
|
Note that you cannot abbreviate this command.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
@item --warranty
|
|
|
|
@opindex warranty
|
|
|
|
Print warranty information.
|
|
|
|
|
|
|
|
@item --dump-options
|
|
|
|
@opindex dump-options
|
|
|
|
Print a list of all available options and commands. Note that you cannot
|
|
|
|
abbreviate this command.
|
|
|
|
@end table
|
|
|
|
|
|
|
|
|
|
|
|
@c *******************************************
|
|
|
|
@c ******** OPERATIONAL COMMANDS ***********
|
|
|
|
@c *******************************************
|
|
|
|
@node Operational GPG Commands
|
|
|
|
@subsection Commands to select the type of operation
|
|
|
|
|
|
|
|
|
|
|
|
@table @gnupgtabopt
|
|
|
|
|
2006-08-17 20:01:25 +02:00
|
|
|
@item --sign
|
2006-08-16 16:54:19 +02:00
|
|
|
@itemx -s
|
|
|
|
@opindex sign
|
2006-09-25 20:29:20 +02:00
|
|
|
Make a signature. This command may be combined with @option{--encrypt}
|
2008-05-15 12:59:35 +02:00
|
|
|
(for a signed and encrypted message), @option{--symmetric} (for a
|
|
|
|
signed and symmetrically encrypted message), or @option{--encrypt} and
|
2006-09-25 20:29:20 +02:00
|
|
|
@option{--symmetric} together (for a signed message that may be
|
2008-05-15 12:59:35 +02:00
|
|
|
decrypted via a secret key or a passphrase). The key to be used for
|
|
|
|
signing is chosen by default or can be set with the
|
|
|
|
@option{--local-user} and @option{--default-key} options.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-08-17 20:01:25 +02:00
|
|
|
@item --clearsign
|
2006-08-16 16:54:19 +02:00
|
|
|
@opindex clearsign
|
2008-05-15 12:59:35 +02:00
|
|
|
Make a clear text signature. The content in a clear text signature is
|
|
|
|
readable without any special software. OpenPGP software is only needed
|
|
|
|
to verify the signature. Clear text signatures may modify end-of-line
|
|
|
|
whitespace for platform independence and are not intended to be
|
|
|
|
reversible. The key to be used for signing is chosen by default or
|
|
|
|
can be set with the @option{--local-user} and @option{--default-key}
|
|
|
|
options.
|
|
|
|
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-08-17 20:01:25 +02:00
|
|
|
@item --detach-sign
|
2006-08-16 16:54:19 +02:00
|
|
|
@itemx -b
|
|
|
|
@opindex detach-sign
|
|
|
|
Make a detached signature.
|
|
|
|
|
2006-08-17 20:01:25 +02:00
|
|
|
@item --encrypt
|
2006-08-16 16:54:19 +02:00
|
|
|
@itemx -e
|
|
|
|
@opindex encrypt
|
2006-09-25 20:29:20 +02:00
|
|
|
Encrypt data. This option may be combined with @option{--sign} (for a
|
|
|
|
signed and encrypted message), @option{--symmetric} (for a message that
|
|
|
|
may be decrypted via a secret key or a passphrase), or @option{--sign}
|
|
|
|
and @option{--symmetric} together (for a signed message that may be
|
|
|
|
decrypted via a secret key or a passphrase).
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-08-17 20:01:25 +02:00
|
|
|
@item --symmetric
|
2006-08-16 16:54:19 +02:00
|
|
|
@itemx -c
|
|
|
|
@opindex symmetric
|
|
|
|
Encrypt with a symmetric cipher using a passphrase. The default
|
|
|
|
symmetric cipher used is CAST5, but may be chosen with the
|
2006-09-25 20:29:20 +02:00
|
|
|
@option{--cipher-algo} option. This option may be combined with
|
|
|
|
@option{--sign} (for a signed and symmetrically encrypted message),
|
|
|
|
@option{--encrypt} (for a message that may be decrypted via a secret key
|
|
|
|
or a passphrase), or @option{--sign} and @option{--encrypt} together
|
|
|
|
(for a signed message that may be decrypted via a secret key or a
|
|
|
|
passphrase).
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-08-17 20:01:25 +02:00
|
|
|
@item --store
|
2006-08-16 16:54:19 +02:00
|
|
|
@opindex store
|
|
|
|
Store only (make a simple RFC1991 literal data packet).
|
|
|
|
|
2006-08-17 20:01:25 +02:00
|
|
|
@item --decrypt
|
2006-08-16 16:54:19 +02:00
|
|
|
@itemx -d
|
|
|
|
@opindex decrypt
|
2008-12-08 20:10:42 +01:00
|
|
|
Decrypt the file given on the command line (or STDIN if no file
|
|
|
|
is specified) and write it to STDOUT (or the file specified with
|
2006-09-25 20:29:20 +02:00
|
|
|
@option{--output}). If the decrypted file is signed, the signature is also
|
2006-08-16 16:54:19 +02:00
|
|
|
verified. This command differs from the default operation, as it never
|
|
|
|
writes to the filename which is included in the file and it rejects
|
|
|
|
files which don't begin with an encrypted message.
|
|
|
|
|
2006-08-17 20:01:25 +02:00
|
|
|
@item --verify
|
2006-08-16 16:54:19 +02:00
|
|
|
@opindex verify
|
|
|
|
Assume that the first argument is a signed file or a detached signature
|
|
|
|
and verify it without generating any output. With no arguments, the
|
2008-12-08 20:10:42 +01:00
|
|
|
signature packet is read from STDIN. If only a sigfile is given, it may
|
2006-08-16 16:54:19 +02:00
|
|
|
be a complete signature or a detached signature, in which case the
|
|
|
|
signed stuff is expected in a file without the ".sig" or ".asc"
|
|
|
|
extension. With more than 1 argument, the first should be a detached
|
|
|
|
signature and the remaining files are the signed stuff. To read the
|
2008-12-08 20:10:42 +01:00
|
|
|
signed stuff from STDIN, use @samp{-} as the second filename. For
|
2006-08-16 16:54:19 +02:00
|
|
|
security reasons a detached signature cannot read the signed material
|
2008-12-08 20:10:42 +01:00
|
|
|
from STDIN without denoting it in the above way.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
@item --multifile
|
|
|
|
@opindex multifile
|
|
|
|
This modifies certain other commands to accept multiple files for
|
2008-12-08 20:10:42 +01:00
|
|
|
processing on the command line or read from STDIN with each filename on
|
2006-08-16 16:54:19 +02:00
|
|
|
a separate line. This allows for many files to be processed at
|
2006-09-25 20:29:20 +02:00
|
|
|
once. @option{--multifile} may currently be used along with
|
|
|
|
@option{--verify}, @option{--encrypt}, and @option{--decrypt}. Note that
|
|
|
|
@option{--multifile --verify} may not be used with detached signatures.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-08-17 20:01:25 +02:00
|
|
|
@item --verify-files
|
2006-08-16 16:54:19 +02:00
|
|
|
@opindex verify-files
|
2006-09-25 20:29:20 +02:00
|
|
|
Identical to @option{--multifile --verify}.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-08-17 20:01:25 +02:00
|
|
|
@item --encrypt-files
|
2006-08-16 16:54:19 +02:00
|
|
|
@opindex encrypt-files
|
2006-09-25 20:29:20 +02:00
|
|
|
Identical to @option{--multifile --encrypt}.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-08-17 20:01:25 +02:00
|
|
|
@item --decrypt-files
|
2006-08-16 16:54:19 +02:00
|
|
|
@opindex decrypt-files
|
2006-09-25 20:29:20 +02:00
|
|
|
Identical to @option{--multifile --decrypt}.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-08-17 20:01:25 +02:00
|
|
|
@item --list-keys
|
2006-08-16 16:54:19 +02:00
|
|
|
@itemx -k
|
2006-08-17 20:01:25 +02:00
|
|
|
@itemx --list-public-keys
|
2006-08-16 16:54:19 +02:00
|
|
|
@opindex list-keys
|
2006-09-25 20:29:20 +02:00
|
|
|
List all keys from the public keyrings, or just the keys given on the
|
2006-08-16 16:54:19 +02:00
|
|
|
command line.
|
2006-09-25 20:29:20 +02:00
|
|
|
@ifset gpgone
|
|
|
|
@option{-k} is slightly different from @option{--list-keys} in that it
|
2006-10-04 12:22:56 +02:00
|
|
|
allows only for one argument and takes the second argument as the
|
2006-09-25 20:29:20 +02:00
|
|
|
keyring to search. This is for command line compatibility with PGP 2
|
|
|
|
and has been removed in @command{gpg2}.
|
|
|
|
@end ifset
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
Avoid using the output of this command in scripts or other programs as
|
2006-09-25 20:29:20 +02:00
|
|
|
it is likely to change as GnuPG changes. See @option{--with-colons} for a
|
2006-08-16 16:54:19 +02:00
|
|
|
machine-parseable key listing command that is appropriate for use in
|
|
|
|
scripts and other programs.
|
|
|
|
|
2006-08-17 20:01:25 +02:00
|
|
|
@item --list-secret-keys
|
2006-08-16 16:54:19 +02:00
|
|
|
@itemx -K
|
|
|
|
@opindex list-secret-keys
|
|
|
|
List all keys from the secret keyrings, or just the ones given on the
|
|
|
|
command line. A @code{#} after the letters @code{sec} means that the
|
|
|
|
secret key is not usable (for example, if it was created via
|
2006-09-25 20:29:20 +02:00
|
|
|
@option{--export-secret-subkeys}).
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-08-17 20:01:25 +02:00
|
|
|
@item --list-sigs
|
2006-08-16 16:54:19 +02:00
|
|
|
@opindex list-sigs
|
2006-09-25 20:29:20 +02:00
|
|
|
Same as @option{--list-keys}, but the signatures are listed too.
|
2008-05-07 17:40:36 +02:00
|
|
|
@ifclear gpgone
|
|
|
|
This command has the same effect as
|
|
|
|
using @option{--list-keys} with @option{--with-sig-list}.
|
|
|
|
@end ifclear
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
For each signature listed, there are several flags in between the "sig"
|
|
|
|
tag and keyid. These flags give additional information about each
|
|
|
|
signature. From left to right, they are the numbers 1-3 for certificate
|
2006-09-25 20:29:20 +02:00
|
|
|
check level (see @option{--ask-cert-level}), "L" for a local or
|
|
|
|
non-exportable signature (see @option{--lsign-key}), "R" for a
|
|
|
|
nonRevocable signature (see the @option{--edit-key} command "nrsign"),
|
|
|
|
"P" for a signature that contains a policy URL (see
|
|
|
|
@option{--cert-policy-url}), "N" for a signature that contains a
|
|
|
|
notation (see @option{--cert-notation}), "X" for an eXpired signature
|
|
|
|
(see @option{--ask-cert-expire}), and the numbers 1-9 or "T" for 10 and
|
|
|
|
above to indicate trust signature levels (see the @option{--edit-key}
|
|
|
|
command "tsign").
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-08-17 20:01:25 +02:00
|
|
|
@item --check-sigs
|
2006-08-16 16:54:19 +02:00
|
|
|
@opindex check-sigs
|
2008-05-09 11:54:35 +02:00
|
|
|
Same as @option{--list-sigs}, but the signatures are verified. Note
|
|
|
|
that for performance reasons the revocation status of a signing key is
|
|
|
|
not shown.
|
2008-05-07 17:40:36 +02:00
|
|
|
@ifclear gpgone
|
|
|
|
This command has the same effect as
|
|
|
|
using @option{--list-keys} with @option{--with-sig-check}.
|
|
|
|
@end ifclear
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2007-06-25 13:54:43 +02:00
|
|
|
The status of the verification is indicated by a flag directly following
|
|
|
|
the "sig" tag (and thus before the flags described above for
|
|
|
|
@option{--list-sigs}). A "!" indicates that the signature has been
|
|
|
|
successfully verified, a "-" denotes a bad signature and a "%" is used
|
2009-07-22 15:33:46 +02:00
|
|
|
if an error occurred while checking the signature (e.g. a non supported
|
2007-06-25 13:54:43 +02:00
|
|
|
algorithm).
|
|
|
|
|
2008-05-07 17:40:36 +02:00
|
|
|
@ifclear gpgone
|
|
|
|
@item --locate-keys
|
|
|
|
@opindex locate-keys
|
|
|
|
Locate the keys given as arguments. This command basically uses the
|
|
|
|
same algorithm as used when locating keys for encryption or signing and
|
|
|
|
may thus be used to see what keys @command{@gpgname} might use. In
|
|
|
|
particular external methods as defined by @option{--auto-key-locate} may
|
|
|
|
be used to locate a key. Only public keys are listed.
|
|
|
|
@end ifclear
|
|
|
|
|
2007-06-25 13:54:43 +02:00
|
|
|
|
2006-08-17 20:01:25 +02:00
|
|
|
@item --fingerprint
|
2006-08-16 16:54:19 +02:00
|
|
|
@opindex fingerprint
|
|
|
|
List all keys (or the specified ones) along with their
|
2006-09-25 20:29:20 +02:00
|
|
|
fingerprints. This is the same output as @option{--list-keys} but with
|
|
|
|
the additional output of a line with the fingerprint. May also be
|
|
|
|
combined with @option{--list-sigs} or @option{--check-sigs}. If this
|
|
|
|
command is given twice, the fingerprints of all secondary keys are
|
|
|
|
listed too.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
@item --list-packets
|
|
|
|
@opindex list-packets
|
|
|
|
List only the sequence of packets. This is mainly
|
|
|
|
useful for debugging.
|
|
|
|
|
|
|
|
|
|
|
|
@item --card-edit
|
|
|
|
@opindex card-edit
|
|
|
|
Present a menu to work with a smartcard. The subcommand "help" provides
|
|
|
|
an overview on available commands. For a detailed description, please
|
2006-08-17 20:01:25 +02:00
|
|
|
see the Card HOWTO at
|
2006-08-16 16:54:19 +02:00
|
|
|
http://www.gnupg.org/documentation/howtos.html#GnuPG-cardHOWTO .
|
|
|
|
|
|
|
|
@item --card-status
|
|
|
|
@opindex card-status
|
|
|
|
Show the content of the smart card.
|
|
|
|
|
|
|
|
@item --change-pin
|
|
|
|
@opindex change-pin
|
|
|
|
Present a menu to allow changing the PIN of a smartcard. This
|
|
|
|
functionality is also available as the subcommand "passwd" with the
|
2006-09-25 20:29:20 +02:00
|
|
|
@option{--card-edit} command.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
@item --delete-key @code{name}
|
|
|
|
@opindex delete-key
|
2006-09-25 20:29:20 +02:00
|
|
|
Remove key from the public keyring. In batch mode either @option{--yes} is
|
2006-08-16 16:54:19 +02:00
|
|
|
required or the key must be specified by fingerprint. This is a
|
|
|
|
safeguard against accidental deletion of multiple keys.
|
|
|
|
|
|
|
|
@item --delete-secret-key @code{name}
|
|
|
|
@opindex delete-secret-key
|
|
|
|
Remove key from the secret and public keyring. In batch mode the key
|
|
|
|
must be specified by fingerprint.
|
|
|
|
|
|
|
|
@item --delete-secret-and-public-key @code{name}
|
|
|
|
@opindex delete-secret-and-public-key
|
2006-09-25 20:29:20 +02:00
|
|
|
Same as @option{--delete-key}, but if a secret key exists, it will be
|
|
|
|
removed first. In batch mode the key must be specified by fingerprint.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-08-17 20:01:25 +02:00
|
|
|
@item --export
|
2006-08-16 16:54:19 +02:00
|
|
|
@opindex export
|
|
|
|
Either export all keys from all keyrings (default keyrings and those
|
2006-09-25 20:29:20 +02:00
|
|
|
registered via option @option{--keyring}), or if at least one name is given,
|
2008-12-08 20:10:42 +01:00
|
|
|
those of the given name. The new keyring is written to STDOUT or to the
|
2006-09-25 20:29:20 +02:00
|
|
|
file given with option @option{--output}. Use together with
|
|
|
|
@option{--armor} to mail those keys.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-10-23 16:02:13 +02:00
|
|
|
@item --send-keys @code{key IDs}
|
2006-08-16 16:54:19 +02:00
|
|
|
@opindex send-keys
|
2006-10-23 16:02:13 +02:00
|
|
|
Similar to @option{--export} but sends the keys to a keyserver.
|
|
|
|
Fingerprints may be used instead of key IDs. Option @option{--keyserver}
|
|
|
|
must be used to give the name of this keyserver. Don't send your
|
|
|
|
complete keyring to a keyserver --- select only those keys which are new
|
2009-07-20 12:42:45 +02:00
|
|
|
or changed by you. If no key IDs are given, @command{gpg} does nothing.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-08-17 20:01:25 +02:00
|
|
|
@item --export-secret-keys
|
|
|
|
@itemx --export-secret-subkeys
|
2006-08-16 16:54:19 +02:00
|
|
|
@opindex export-secret-keys
|
|
|
|
@opindex export-secret-subkeys
|
2006-09-25 20:29:20 +02:00
|
|
|
Same as @option{--export}, but exports the secret keys instead. This is
|
|
|
|
normally not very useful and a security risk. The second form of the
|
|
|
|
command has the special property to render the secret part of the
|
|
|
|
primary key useless; this is a GNU extension to OpenPGP and other
|
|
|
|
implementations can not be expected to successfully import such a key.
|
|
|
|
See the option @option{--simple-sk-checksum} if you want to import such
|
|
|
|
an exported key with an older OpenPGP implementation.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-08-17 20:01:25 +02:00
|
|
|
@item --import
|
|
|
|
@itemx --fast-import
|
2006-08-16 16:54:19 +02:00
|
|
|
@opindex import
|
|
|
|
Import/merge keys. This adds the given keys to the
|
|
|
|
keyring. The fast version is currently just a synonym.
|
|
|
|
|
|
|
|
There are a few other options which control how this command works.
|
2009-03-05 20:19:37 +01:00
|
|
|
Most notable here is the @option{--import-options merge-only} option
|
2006-09-25 20:29:20 +02:00
|
|
|
which does not insert new keys but does only the merging of new
|
|
|
|
signatures, user-IDs and subkeys.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
@item --recv-keys @code{key IDs}
|
|
|
|
@opindex recv-keys
|
|
|
|
Import the keys with the given key IDs from a keyserver. Option
|
2006-09-25 20:29:20 +02:00
|
|
|
@option{--keyserver} must be used to give the name of this keyserver.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-08-17 20:01:25 +02:00
|
|
|
@item --refresh-keys
|
2006-08-16 16:54:19 +02:00
|
|
|
@opindex refresh-keys
|
|
|
|
Request updates from a keyserver for keys that already exist on the
|
|
|
|
local keyring. This is useful for updating a key with the latest
|
2006-09-25 20:29:20 +02:00
|
|
|
signatures, user IDs, etc. Calling this with no arguments will refresh
|
|
|
|
the entire keyring. Option @option{--keyserver} must be used to give the
|
|
|
|
name of the keyserver for all keys that do not have preferred keyservers
|
|
|
|
set (see @option{--keyserver-options honor-keyserver-url}).
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
@item --search-keys @code{names}
|
|
|
|
@opindex search-keys
|
2006-09-25 20:29:20 +02:00
|
|
|
Search the keyserver for the given names. Multiple names given here will
|
|
|
|
be joined together to create the search string for the keyserver.
|
|
|
|
Option @option{--keyserver} must be used to give the name of this
|
|
|
|
keyserver. Keyservers that support different search methods allow using
|
|
|
|
the syntax specified in "How to specify a user ID" below. Note that
|
2006-08-16 16:54:19 +02:00
|
|
|
different keyserver types support different search methods. Currently
|
|
|
|
only LDAP supports them all.
|
|
|
|
|
|
|
|
@item --fetch-keys @code{URIs}
|
|
|
|
@opindex fetch-keys
|
|
|
|
Retrieve keys located at the specified URIs. Note that different
|
|
|
|
installations of GnuPG may support different protocols (HTTP, FTP,
|
|
|
|
LDAP, etc.)
|
|
|
|
|
|
|
|
@item --update-trustdb
|
|
|
|
@opindex update-trustdb
|
|
|
|
Do trust database maintenance. This command iterates over all keys and
|
|
|
|
builds the Web of Trust. This is an interactive command because it may
|
|
|
|
have to ask for the "ownertrust" values for keys. The user has to give
|
|
|
|
an estimation of how far she trusts the owner of the displayed key to
|
|
|
|
correctly certify (sign) other keys. GnuPG only asks for the ownertrust
|
2006-09-25 20:29:20 +02:00
|
|
|
value if it has not yet been assigned to a key. Using the
|
|
|
|
@option{--edit-key} menu, the assigned value can be changed at any time.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
@item --check-trustdb
|
|
|
|
@opindex check-trustdb
|
|
|
|
Do trust database maintenance without user interaction. From time to
|
|
|
|
time the trust database must be updated so that expired keys or
|
|
|
|
signatures and the resulting changes in the Web of Trust can be
|
|
|
|
tracked. Normally, GnuPG will calculate when this is required and do it
|
2006-09-25 20:29:20 +02:00
|
|
|
automatically unless @option{--no-auto-check-trustdb} is set. This
|
|
|
|
command can be used to force a trust database check at any time. The
|
|
|
|
processing is identical to that of @option{--update-trustdb} but it
|
|
|
|
skips keys with a not yet defined "ownertrust".
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-09-25 20:29:20 +02:00
|
|
|
For use with cron jobs, this command can be used together with
|
|
|
|
@option{--batch} in which case the trust database check is done only if
|
|
|
|
a check is needed. To force a run even in batch mode add the option
|
|
|
|
@option{--yes}.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2009-07-22 12:24:46 +02:00
|
|
|
@anchor{option --export-ownertrust}
|
2006-08-16 16:54:19 +02:00
|
|
|
@item --export-ownertrust
|
|
|
|
@opindex export-ownertrust
|
2008-12-08 20:10:42 +01:00
|
|
|
Send the ownertrust values to STDOUT. This is useful for backup purposes
|
2006-08-16 16:54:19 +02:00
|
|
|
as these values are the only ones which can't be re-created from a
|
2009-07-22 12:24:46 +02:00
|
|
|
corrupted trustdb. Example:
|
|
|
|
@c man:.RS
|
|
|
|
@example
|
|
|
|
@gpgname{} --export-ownertrust > otrust.txt
|
|
|
|
@end example
|
|
|
|
@c man:.RE
|
|
|
|
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-08-17 20:01:25 +02:00
|
|
|
@item --import-ownertrust
|
2006-08-16 16:54:19 +02:00
|
|
|
@opindex import-ownertrust
|
|
|
|
Update the trustdb with the ownertrust values stored in @code{files} (or
|
2009-07-22 12:24:46 +02:00
|
|
|
STDIN if not given); existing values will be overwritten. In case of a
|
|
|
|
severely damaged trustdb and if you have a recent backup of the
|
|
|
|
ownertrust values (e.g. in the file @file{otrust.txt}, you may re-create
|
|
|
|
the trustdb using these commands:
|
|
|
|
@c man:.RS
|
|
|
|
@example
|
|
|
|
cd ~/.gnupg
|
|
|
|
rm trustdb.gpg
|
|
|
|
@gpgname{} --import-ownertrust < otrust.txt
|
|
|
|
@end example
|
|
|
|
@c man:.RE
|
|
|
|
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
@item --rebuild-keydb-caches
|
|
|
|
@opindex rebuild-keydb-caches
|
2006-09-25 20:29:20 +02:00
|
|
|
When updating from version 1.0.6 to 1.0.7 this command should be used
|
2006-08-16 16:54:19 +02:00
|
|
|
to create signature caches in the keyring. It might be handy in other
|
|
|
|
situations too.
|
|
|
|
|
2006-08-17 20:01:25 +02:00
|
|
|
@item --print-md @code{algo}
|
|
|
|
@itemx --print-mds
|
2006-08-16 16:54:19 +02:00
|
|
|
@opindex print-md
|
2008-12-08 20:10:42 +01:00
|
|
|
Print message digest of algorithm ALGO for all given files or STDIN.
|
2006-08-16 16:54:19 +02:00
|
|
|
With the second form (or a deprecated "*" as algo) digests for all
|
|
|
|
available algorithms are printed.
|
|
|
|
|
2006-08-17 20:01:25 +02:00
|
|
|
@item --gen-random @code{0|1|2}
|
2006-08-16 16:54:19 +02:00
|
|
|
@opindex gen-random
|
|
|
|
Emit @var{count} random bytes of the given quality level. If count is
|
|
|
|
not given or zero, an endless sequence of random bytes will be emitted.
|
|
|
|
PLEASE, don't use this command unless you know what you are doing; it
|
|
|
|
may remove precious entropy from the system!
|
|
|
|
|
2006-08-17 20:01:25 +02:00
|
|
|
@item --gen-prime @code{mode} @code{bits}
|
2006-08-16 16:54:19 +02:00
|
|
|
@opindex gen-prime
|
|
|
|
Use the source, Luke :-). The output format is still subject to change.
|
|
|
|
|
2006-09-25 20:29:20 +02:00
|
|
|
|
|
|
|
@item --enarmor
|
|
|
|
@item --dearmor
|
|
|
|
@opindex enarmor
|
|
|
|
@opindex --enarmor
|
|
|
|
Pack or unpack an arbitrary input into/from an OpenPGP ASCII armor.
|
|
|
|
This is a GnuPG extension to OpenPGP and in general not very useful.
|
|
|
|
|
2006-08-16 16:54:19 +02:00
|
|
|
@end table
|
|
|
|
|
|
|
|
|
|
|
|
@c *******************************************
|
|
|
|
@c ******* KEY MANGEMENT COMMANDS **********
|
|
|
|
@c *******************************************
|
|
|
|
@node OpenPGP Key Management
|
|
|
|
@subsection How to manage your keys
|
|
|
|
|
|
|
|
This section explains the main commands for key management
|
|
|
|
|
|
|
|
@table @gnupgtabopt
|
|
|
|
|
|
|
|
@item --gen-key
|
|
|
|
@opindex gen-key
|
|
|
|
Generate a new key pair. This command is normally only used
|
|
|
|
interactively.
|
|
|
|
|
|
|
|
There is an experimental feature which allows you to create keys in
|
|
|
|
batch mode. See the file @file{doc/DETAILS} in the source distribution
|
|
|
|
on how to use this.
|
|
|
|
|
|
|
|
@item --gen-revoke @code{name}
|
|
|
|
@opindex gen-revoke
|
|
|
|
Generate a revocation certificate for the complete key. To revoke
|
2006-09-25 20:29:20 +02:00
|
|
|
a subkey or a signature, use the @option{--edit} command.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
@item --desig-revoke @code{name}
|
|
|
|
@opindex desig-revoke
|
|
|
|
Generate a designated revocation certificate for a key. This allows a
|
|
|
|
user (with the permission of the keyholder) to revoke someone else's
|
|
|
|
key.
|
|
|
|
|
|
|
|
|
2006-08-17 20:01:25 +02:00
|
|
|
@item --edit-key
|
2006-08-16 16:54:19 +02:00
|
|
|
@opindex edit-key
|
|
|
|
Present a menu which enables you to do most of the key management
|
|
|
|
related tasks. It expects the specification of a key on the command
|
|
|
|
line.
|
|
|
|
|
|
|
|
@c ******** Begin Edit-key Options **********
|
|
|
|
@table @asis
|
|
|
|
|
2009-08-25 00:21:39 +02:00
|
|
|
@item uid @code{n}
|
|
|
|
@opindex keyedit:uid
|
|
|
|
Toggle selection of user ID or photographic user ID with index @code{n}.
|
2009-09-04 13:52:03 +02:00
|
|
|
Use @code{*} to select all and @code{0} to deselect all.
|
2009-08-25 00:21:39 +02:00
|
|
|
|
|
|
|
@item key @code{n}
|
|
|
|
@opindex keyedit:key
|
|
|
|
Toggle selection of subkey with index @code{n}.
|
2009-09-04 13:52:03 +02:00
|
|
|
Use @code{*} to select all and @code{0} to deselect all.
|
2009-08-25 00:21:39 +02:00
|
|
|
|
2006-08-16 16:54:19 +02:00
|
|
|
@item sign
|
|
|
|
@opindex keyedit:sign
|
|
|
|
Make a signature on key of user @code{name} If the key is not yet
|
|
|
|
signed by the default user (or the users given with -u), the program
|
|
|
|
displays the information of the key again, together with its
|
|
|
|
fingerprint and asks whether it should be signed. This question is
|
|
|
|
repeated for all users specified with
|
|
|
|
-u.
|
|
|
|
|
|
|
|
@item lsign
|
|
|
|
@opindex keyedit:lsign
|
|
|
|
Same as "sign" but the signature is marked as non-exportable and will
|
|
|
|
therefore never be used by others. This may be used to make keys
|
|
|
|
valid only in the local environment.
|
|
|
|
|
|
|
|
@item nrsign
|
|
|
|
@opindex keyedit:nrsign
|
|
|
|
Same as "sign" but the signature is marked as non-revocable and can
|
|
|
|
therefore never be revoked.
|
|
|
|
|
|
|
|
@item tsign
|
|
|
|
@opindex keyedit:tsign
|
|
|
|
Make a trust signature. This is a signature that combines the notions
|
|
|
|
of certification (like a regular signature), and trust (like the
|
|
|
|
"trust" command). It is generally only useful in distinct communities
|
|
|
|
or groups.
|
|
|
|
@end table
|
|
|
|
|
2006-08-17 20:01:25 +02:00
|
|
|
@c man:.RS
|
2006-08-16 16:54:19 +02:00
|
|
|
Note that "l" (for local / non-exportable), "nr" (for non-revocable,
|
|
|
|
and "t" (for trust) may be freely mixed and prefixed to "sign" to
|
|
|
|
create a signature of any type desired.
|
2006-08-17 20:01:25 +02:00
|
|
|
@c man:.RE
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
@table @asis
|
|
|
|
|
2009-08-25 00:21:39 +02:00
|
|
|
@item delsig
|
|
|
|
@opindex keyedit:delsig
|
|
|
|
Delete a signature. Note that it is not possible to retract a signature,
|
|
|
|
once it has been send to the public (i.e. to a keyserver). In that case
|
|
|
|
you better use @code{revsig}.
|
|
|
|
|
2006-08-16 16:54:19 +02:00
|
|
|
@item revsig
|
|
|
|
@opindex keyedit:revsig
|
|
|
|
Revoke a signature. For every signature which has been generated by
|
|
|
|
one of the secret keys, GnuPG asks whether a revocation certificate
|
|
|
|
should be generated.
|
|
|
|
|
2009-08-25 00:21:39 +02:00
|
|
|
@item check
|
|
|
|
@opindex keyedit:check
|
|
|
|
Check the signatures on all selected user IDs.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
@item adduid
|
|
|
|
@opindex keyedit:adduid
|
2009-08-25 00:21:39 +02:00
|
|
|
Create an additional user ID.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
@item addphoto
|
|
|
|
@opindex keyedit:addphoto
|
2009-08-25 00:21:39 +02:00
|
|
|
Create a photographic user ID. This will prompt for a JPEG file that
|
2006-08-16 16:54:19 +02:00
|
|
|
will be embedded into the user ID. Note that a very large JPEG will make
|
|
|
|
for a very large key. Also note that some programs will display your
|
|
|
|
JPEG unchanged (GnuPG), and some programs will scale it to fit in a
|
|
|
|
dialog box (PGP).
|
|
|
|
|
2009-08-25 00:21:39 +02:00
|
|
|
@item showphoto
|
|
|
|
@opindex keyedit:showphoto
|
|
|
|
Display the selected photographic user ID.
|
|
|
|
|
2006-08-16 16:54:19 +02:00
|
|
|
@item deluid
|
|
|
|
@opindex keyedit:deluid
|
2009-08-25 00:21:39 +02:00
|
|
|
Delete a user ID or photographic user ID. Note that it is not
|
|
|
|
possible to retract a user id, once it has been send to the public
|
|
|
|
(i.e. to a keyserver). In that case you better use @code{revuid}.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
@item revuid
|
|
|
|
@opindex keyedit:revuid
|
2009-08-25 00:21:39 +02:00
|
|
|
Revoke a user ID or photographic user ID.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
@item primary
|
|
|
|
@opindex keyedit:primary
|
|
|
|
Flag the current user id as the primary one, removes the primary user
|
|
|
|
id flag from all other user ids and sets the timestamp of all affected
|
|
|
|
self-signatures one second ahead. Note that setting a photo user ID
|
|
|
|
as primary makes it primary over other photo user IDs, and setting a
|
|
|
|
regular user ID as primary makes it primary over other regular user
|
|
|
|
IDs.
|
|
|
|
|
2009-08-25 00:21:39 +02:00
|
|
|
@item keyserver
|
|
|
|
@opindex keyedit:keyserver
|
|
|
|
Set a preferred keyserver for the specified user ID(s). This allows
|
|
|
|
other users to know where you prefer they get your key from. See
|
|
|
|
@option{--keyserver-options honor-keyserver-url} for more on how this
|
|
|
|
works. Setting a value of "none" removes an existing preferred
|
|
|
|
keyserver.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2009-08-25 00:21:39 +02:00
|
|
|
@item notation
|
|
|
|
@opindex keyedit:notation
|
|
|
|
Set a name=value notation for the specified user ID(s). See
|
|
|
|
@option{--cert-notation} for more on how this works. Setting a value of
|
|
|
|
"none" removes all notations, setting a notation prefixed with a minus
|
|
|
|
sign (-) removes that notation, and setting a notation name (without the
|
|
|
|
=value) prefixed with a minus sign removes all notations with that name.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
@item pref
|
|
|
|
@opindex keyedit:pref
|
|
|
|
List preferences from the selected user ID. This shows the actual
|
|
|
|
preferences, without including any implied preferences.
|
|
|
|
|
|
|
|
@item showpref
|
|
|
|
@opindex keyedit:showpref
|
|
|
|
More verbose preferences listing for the selected user ID. This shows
|
|
|
|
the preferences in effect by including the implied preferences of 3DES
|
|
|
|
(cipher), SHA-1 (digest), and Uncompressed (compression) if they are
|
|
|
|
not already included in the preference list. In addition, the
|
|
|
|
preferred keyserver and signature notations (if any) are shown.
|
|
|
|
|
|
|
|
@item setpref @code{string}
|
|
|
|
@opindex keyedit:setpref
|
|
|
|
Set the list of user ID preferences to @code{string} for all (or just
|
|
|
|
the selected) user IDs. Calling setpref with no arguments sets the
|
|
|
|
preference list to the default (either built-in or set via
|
2008-09-23 21:18:52 +02:00
|
|
|
@option{--default-preference-list}), and calling setpref with "none"
|
|
|
|
as the argument sets an empty preference list. Use @command{@gpgname
|
2006-09-25 20:29:20 +02:00
|
|
|
--version} to get a list of available algorithms. Note that while you
|
|
|
|
can change the preferences on an attribute user ID (aka "photo ID"),
|
|
|
|
GnuPG does not select keys via attribute user IDs so these preferences
|
|
|
|
will not be used by GnuPG.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2008-09-23 21:18:52 +02:00
|
|
|
When setting preferences, you should list the algorithms in the order
|
|
|
|
which you'd like to see them used by someone else when encrypting a
|
|
|
|
message to your key. If you don't include 3DES, it will be
|
|
|
|
automatically added at the end. Note that there are many factors that
|
|
|
|
go into choosing an algorithm (for example, your key may not be the
|
|
|
|
only recipient), and so the remote OpenPGP application being used to
|
|
|
|
send to you may or may not follow your exact chosen order for a given
|
|
|
|
message. It will, however, only choose an algorithm that is present
|
|
|
|
on the preference list of every recipient key. See also the
|
|
|
|
INTEROPERABILITY WITH OTHER OPENPGP PROGRAMS section below.
|
|
|
|
|
2009-08-25 00:21:39 +02:00
|
|
|
@item addkey
|
|
|
|
@opindex keyedit:addkey
|
|
|
|
Add a subkey to this key.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2009-08-25 00:21:39 +02:00
|
|
|
@item addcardkey
|
|
|
|
@opindex keyedit:addcardkey
|
|
|
|
Generate a subkey on a card and add it to this key.
|
|
|
|
|
|
|
|
@item keytocard
|
|
|
|
@opindex keyedit:keytocard
|
|
|
|
Transfer the selected secret subkey (or the primary key if no subkey
|
|
|
|
has been selected) to a smartcard. The secret key in the keyring will
|
|
|
|
be replaced by a stub if the key could be stored successfully on the
|
|
|
|
card and you use the save command later. Only certain key types may be
|
|
|
|
transferred to the card. A sub menu allows you to select on what card
|
|
|
|
to store the key. Note that it is not possible to get that key back
|
|
|
|
from the card - if the card gets broken your secret key will be lost
|
|
|
|
unless you have a backup somewhere.
|
|
|
|
|
|
|
|
@item bkuptocard @code{file}
|
|
|
|
@opindex keyedit:bkuptocard
|
|
|
|
Restore the given file to a card. This command may be used to restore a
|
|
|
|
backup key (as generated during card initialization) to a new card. In
|
|
|
|
almost all cases this will be the encryption key. You should use this
|
|
|
|
command only with the corresponding public key and make sure that the
|
|
|
|
file given as argument is indeed the backup to restore. You should then
|
|
|
|
select 2 to restore as encryption key. You will first be asked to enter
|
|
|
|
the passphrase of the backup key and then for the Admin PIN of the card.
|
|
|
|
|
|
|
|
@item delkey
|
|
|
|
@opindex keyedit:delkey
|
|
|
|
Remove a subkey (secondart key). Note that it is not possible to retract
|
|
|
|
a subkey, once it has been send to the public (i.e. to a keyserver). In
|
|
|
|
that case you better use @code{revkey}.
|
|
|
|
|
|
|
|
@item revkey
|
|
|
|
@opindex keyedit:revkey
|
|
|
|
Revoke a subkey.
|
|
|
|
|
|
|
|
@item expire
|
|
|
|
@opindex keyedit:expire
|
|
|
|
Change the key or subkey expiration time. If a subkey is selected, the
|
|
|
|
expiration time of this subkey will be changed. With no selection, the
|
|
|
|
key expiration of the primary key is changed.
|
|
|
|
|
|
|
|
@item trust
|
|
|
|
@opindex keyedit:trust
|
|
|
|
Change the owner trust value for the key. This updates the trust-db
|
|
|
|
immediately and no save is required.
|
|
|
|
|
|
|
|
@item disable
|
|
|
|
@itemx enable
|
|
|
|
@opindex keyedit:disable
|
|
|
|
@opindex keyedit:enable
|
|
|
|
Disable or enable an entire key. A disabled key can not normally be
|
|
|
|
used for encryption.
|
|
|
|
|
|
|
|
@item addrevoker
|
|
|
|
@opindex keyedit:addrevoker
|
|
|
|
Add a designated revoker to the key. This takes one optional argument:
|
|
|
|
"sensitive". If a designated revoker is marked as sensitive, it will
|
|
|
|
not be exported by default (see export-options).
|
|
|
|
|
|
|
|
@item passwd
|
|
|
|
@opindex keyedit:passwd
|
|
|
|
Change the passphrase of the secret key.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
@item toggle
|
|
|
|
@opindex keyedit:toggle
|
|
|
|
Toggle between public and secret key listing.
|
|
|
|
|
|
|
|
@item clean
|
|
|
|
@opindex keyedit:clean
|
|
|
|
Compact (by removing all signatures except the selfsig) any user ID
|
|
|
|
that is no longer usable (e.g. revoked, or expired). Then, remove any
|
|
|
|
signatures that are not usable by the trust calculations.
|
|
|
|
Specifically, this removes any signature that does not validate, any
|
|
|
|
signature that is superseded by a later signature, revoked signatures,
|
|
|
|
and signatures issued by keys that are not present on the keyring.
|
|
|
|
|
|
|
|
@item minimize
|
|
|
|
@opindex keyedit:minimize
|
|
|
|
Make the key as small as possible. This removes all signatures from
|
|
|
|
each user ID except for the most recent self-signature.
|
|
|
|
|
|
|
|
@item cross-certify
|
|
|
|
@opindex keyedit:cross-certify
|
|
|
|
Add cross-certification signatures to signing subkeys that may not
|
|
|
|
currently have them. Cross-certification signatures protect against a
|
|
|
|
subtle attack against signing subkeys. See
|
2009-08-25 00:21:39 +02:00
|
|
|
@option{--require-cross-certification}. All new keys generated have
|
|
|
|
this signature by default, so this option is only useful to bring
|
|
|
|
older keys up to date.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
@item save
|
|
|
|
@opindex keyedit:save
|
|
|
|
Save all changes to the key rings and quit.
|
|
|
|
|
|
|
|
@item quit
|
|
|
|
@opindex keyedit:quit
|
|
|
|
Quit the program without updating the
|
|
|
|
key rings.
|
|
|
|
|
|
|
|
@end table
|
|
|
|
|
2006-08-17 20:01:25 +02:00
|
|
|
@c man:.RS
|
2006-08-16 16:54:19 +02:00
|
|
|
The listing shows you the key with its secondary keys and all user
|
2010-06-17 14:58:51 +02:00
|
|
|
ids. The primary user id is indicated by a dot, and selected keys or
|
|
|
|
user ids are indicated by an asterisk. The trust
|
2006-08-16 16:54:19 +02:00
|
|
|
value is displayed with the primary key: the first is the assigned owner
|
|
|
|
trust and the second is the calculated trust value. Letters are used for
|
|
|
|
the values:
|
2006-08-17 20:01:25 +02:00
|
|
|
@c man:.RE
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
@table @asis
|
|
|
|
|
|
|
|
@item -
|
|
|
|
No ownertrust assigned / not yet calculated.
|
|
|
|
|
|
|
|
@item e
|
|
|
|
Trust
|
|
|
|
calculation has failed; probably due to an expired key.
|
|
|
|
|
|
|
|
@item q
|
|
|
|
Not enough information for calculation.
|
|
|
|
|
|
|
|
@item n
|
|
|
|
Never trust this key.
|
|
|
|
|
|
|
|
@item m
|
|
|
|
Marginally trusted.
|
|
|
|
|
|
|
|
@item f
|
|
|
|
Fully trusted.
|
|
|
|
|
|
|
|
@item u
|
|
|
|
Ultimately trusted.
|
|
|
|
@end table
|
|
|
|
@c ******** End Edit-key Options **********
|
|
|
|
|
|
|
|
@item --sign-key @code{name}
|
|
|
|
@opindex sign-key
|
|
|
|
Signs a public key with your secret key. This is a shortcut version of
|
2006-09-25 20:29:20 +02:00
|
|
|
the subcommand "sign" from @option{--edit}.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
@item --lsign-key @code{name}
|
2006-08-17 20:01:25 +02:00
|
|
|
@opindex lsign-key
|
2006-08-16 16:54:19 +02:00
|
|
|
Signs a public key with your secret key but marks it as
|
|
|
|
non-exportable. This is a shortcut version of the subcommand "lsign"
|
2006-09-25 20:29:20 +02:00
|
|
|
from @option{--edit-key}.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2010-01-11 17:05:26 +01:00
|
|
|
@ifclear gpgone
|
|
|
|
@item --passwd @var{user_id}
|
|
|
|
@opindex passwd
|
|
|
|
Change the passphrase of the secret key belonging to the certificate
|
|
|
|
specified as @var{user_id}. This is a shortcut for the sub-command
|
2010-02-11 12:34:34 +01:00
|
|
|
@code{passwd} of the edit key menu.
|
2010-01-11 17:05:26 +01:00
|
|
|
@end ifclear
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
@end table
|
|
|
|
|
|
|
|
|
|
|
|
@c *******************************************
|
|
|
|
@c *************** ****************
|
|
|
|
@c *************** OPTIONS ****************
|
|
|
|
@c *************** ****************
|
|
|
|
@c *******************************************
|
2006-08-17 20:01:25 +02:00
|
|
|
@mansect options
|
2006-08-16 16:54:19 +02:00
|
|
|
@node GPG Options
|
|
|
|
@section Option Summary
|
|
|
|
|
2010-02-11 12:34:34 +01:00
|
|
|
@command{@gpgname} features a bunch of options to control the exact
|
2006-08-16 16:54:19 +02:00
|
|
|
behaviour and to change the default configuration.
|
|
|
|
|
2006-08-17 20:01:25 +02:00
|
|
|
@menu
|
2006-08-16 16:54:19 +02:00
|
|
|
* GPG Configuration Options:: How to change the configuration.
|
|
|
|
* GPG Key related Options:: Key related options.
|
|
|
|
* GPG Input and Output:: Input and Output.
|
|
|
|
* OpenPGP Options:: OpenPGP protocol specific options.
|
|
|
|
* GPG Esoteric Options:: Doing things one usually don't want to do.
|
|
|
|
@end menu
|
|
|
|
|
|
|
|
Long options can be put in an options file (default
|
|
|
|
"~/.gnupg/gpg.conf"). Short option names will not work - for example,
|
|
|
|
"armor" is a valid option for the options file, while "a" is not. Do not
|
|
|
|
write the 2 dashes, but simply the name of the option and any required
|
|
|
|
arguments. Lines with a hash ('#') as the first non-white-space
|
|
|
|
character are ignored. Commands may be put in this file too, but that is
|
|
|
|
not generally useful as the command will execute automatically with
|
|
|
|
every execution of gpg.
|
|
|
|
|
|
|
|
Please remember that option parsing stops as soon as a non-option is
|
|
|
|
encountered, you can explicitly stop parsing by using the special option
|
2006-09-25 20:29:20 +02:00
|
|
|
@option{--}.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
@c *******************************************
|
|
|
|
@c ******** CONFIGURATION OPTIONS **********
|
|
|
|
@c *******************************************
|
|
|
|
@node GPG Configuration Options
|
|
|
|
@subsection How to change the configuration
|
|
|
|
|
2007-12-13 16:45:40 +01:00
|
|
|
These options are used to change the configuration and are usually found
|
2006-08-16 16:54:19 +02:00
|
|
|
in the option file.
|
|
|
|
|
|
|
|
@table @gnupgtabopt
|
|
|
|
|
|
|
|
@item --default-key @var{name}
|
|
|
|
@opindex default-key
|
|
|
|
Use @var{name} as the default key to sign with. If this option is not
|
|
|
|
used, the default key is the first key found in the secret keyring.
|
2006-09-25 20:29:20 +02:00
|
|
|
Note that @option{-u} or @option{--local-user} overrides this option.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
@item --default-recipient @var{name}
|
|
|
|
@opindex default-recipient
|
2006-09-25 20:29:20 +02:00
|
|
|
Use @var{name} as default recipient if option @option{--recipient} is
|
|
|
|
not used and don't ask if this is a valid one. @var{name} must be
|
|
|
|
non-empty.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
@item --default-recipient-self
|
|
|
|
@opindex default-recipient-self
|
2006-09-25 20:29:20 +02:00
|
|
|
Use the default key as default recipient if option @option{--recipient} is not
|
2006-08-16 16:54:19 +02:00
|
|
|
used and don't ask if this is a valid one. The default key is the first
|
2006-09-25 20:29:20 +02:00
|
|
|
one from the secret keyring or the one set with @option{--default-key}.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
@item --no-default-recipient
|
|
|
|
@opindex no-default-recipient
|
2006-09-25 20:29:20 +02:00
|
|
|
Reset @option{--default-recipient} and @option{--default-recipient-self}.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
@item -v, --verbose
|
2006-09-19 18:25:51 +02:00
|
|
|
@opindex verbose
|
2006-08-16 16:54:19 +02:00
|
|
|
Give more information during processing. If used
|
|
|
|
twice, the input data is listed in detail.
|
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@item --no-verbose
|
|
|
|
@opindex no-verbose
|
|
|
|
Reset verbose level to 0.
|
|
|
|
|
2006-08-16 16:54:19 +02:00
|
|
|
@item -q, --quiet
|
2006-09-19 18:25:51 +02:00
|
|
|
@opindex quiet
|
2006-08-16 16:54:19 +02:00
|
|
|
Try to be as quiet as possible.
|
|
|
|
|
2007-04-13 13:45:05 +02:00
|
|
|
@item --batch
|
|
|
|
@itemx --no-batch
|
|
|
|
@opindex batch
|
|
|
|
@opindex no-batch
|
|
|
|
Use batch mode. Never ask, do not allow interactive commands.
|
2008-12-08 20:10:42 +01:00
|
|
|
@option{--no-batch} disables this option. Note that even with a
|
|
|
|
filename given on the command line, gpg might still need to read from
|
|
|
|
STDIN (in particular if gpg figures that the input is a
|
|
|
|
detached signature and no data file has been specified). Thus if you
|
|
|
|
do not want to feed data via STDIN, you should connect STDIN to
|
|
|
|
@file{/dev/null}.
|
2007-04-13 13:45:05 +02:00
|
|
|
|
|
|
|
@item --no-tty
|
|
|
|
@opindex no-tty
|
|
|
|
Make sure that the TTY (terminal) is never used for any output.
|
|
|
|
This option is needed in some cases because GnuPG sometimes prints
|
|
|
|
warnings to the TTY even if @option{--batch} is used.
|
|
|
|
|
|
|
|
@item --yes
|
|
|
|
@opindex yes
|
|
|
|
Assume "yes" on most questions.
|
|
|
|
|
|
|
|
@item --no
|
|
|
|
@opindex no
|
|
|
|
Assume "no" on most questions.
|
|
|
|
|
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@item --list-options @code{parameters}
|
|
|
|
@opindex list-options
|
|
|
|
This is a space or comma delimited string that gives options used when
|
2006-09-25 20:29:20 +02:00
|
|
|
listing keys and signatures (that is, @option{--list-keys},
|
|
|
|
@option{--list-sigs}, @option{--list-public-keys},
|
|
|
|
@option{--list-secret-keys}, and the @option{--edit-key} functions).
|
|
|
|
Options can be prepended with a @option{no-} (after the two dashes) to
|
|
|
|
give the opposite meaning. The options are:
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@table @asis
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@item show-photos
|
|
|
|
@opindex list-options:show-photos
|
2006-09-25 20:29:20 +02:00
|
|
|
Causes @option{--list-keys}, @option{--list-sigs},
|
|
|
|
@option{--list-public-keys}, and @option{--list-secret-keys} to display
|
|
|
|
any photo IDs attached to the key. Defaults to no. See also
|
|
|
|
@option{--photo-viewer}.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@item show-policy-urls
|
|
|
|
@opindex list-options:show-policy-urls
|
2006-09-25 20:29:20 +02:00
|
|
|
Show policy URLs in the @option{--list-sigs} or @option{--check-sigs}
|
|
|
|
listings. Defaults to no.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@item show-notations
|
|
|
|
@itemx show-std-notations
|
|
|
|
@itemx show-user-notations
|
|
|
|
@opindex list-options:show-notations
|
|
|
|
@opindex list-options:show-std-notations
|
|
|
|
@opindex list-options:show-user-notations
|
|
|
|
Show all, IETF standard, or user-defined signature notations in the
|
2006-09-25 20:29:20 +02:00
|
|
|
@option{--list-sigs} or @option{--check-sigs} listings. Defaults to no.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@item show-keyserver-urls
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-09-25 20:29:20 +02:00
|
|
|
Show any preferred keyserver URL in the @option{--list-sigs} or
|
|
|
|
@option{--check-sigs} listings. Defaults to no.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@item show-uid-validity
|
2010-03-05 12:52:13 +01:00
|
|
|
Display the calculated validity of user IDs during public key listings.
|
2006-09-19 18:25:51 +02:00
|
|
|
Defaults to no.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@item show-unusable-uids
|
|
|
|
Show revoked and expired user IDs in key listings. Defaults to no.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@item show-unusable-subkeys
|
|
|
|
Show revoked and expired subkeys in key listings. Defaults to no.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@item show-keyring
|
|
|
|
Display the keyring name at the head of key listings to show which
|
|
|
|
keyring a given key resides on. Defaults to no.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@item show-sig-expire
|
2006-09-25 20:29:20 +02:00
|
|
|
Show signature expiration dates (if any) during @option{--list-sigs} or
|
|
|
|
@option{--check-sigs} listings. Defaults to no.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@item show-sig-subpackets
|
2006-09-25 20:29:20 +02:00
|
|
|
Include signature subpackets in the key listing. This option can take an
|
|
|
|
optional argument list of the subpackets to list. If no argument is
|
|
|
|
passed, list all subpackets. Defaults to no. This option is only
|
|
|
|
meaningful when using @option{--with-colons} along with
|
|
|
|
@option{--list-sigs} or @option{--check-sigs}.
|
2006-09-19 18:25:51 +02:00
|
|
|
@end table
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@item --verify-options @code{parameters}
|
|
|
|
This is a space or comma delimited string that gives options used when
|
|
|
|
verifying signatures. Options can be prepended with a `no-' to give
|
|
|
|
the opposite meaning. The options are:
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@table @asis
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@item show-photos
|
|
|
|
Display any photo IDs present on the key that issued the signature.
|
2006-09-25 20:29:20 +02:00
|
|
|
Defaults to no. See also @option{--photo-viewer}.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@item show-policy-urls
|
|
|
|
Show policy URLs in the signature being verified. Defaults to no.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@item show-notations
|
|
|
|
@itemx show-std-notations
|
|
|
|
@itemx show-user-notations
|
|
|
|
Show all, IETF standard, or user-defined signature notations in the
|
|
|
|
signature being verified. Defaults to IETF standard.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@item show-keyserver-urls
|
|
|
|
Show any preferred keyserver URL in the signature being verified.
|
|
|
|
Defaults to no.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@item show-uid-validity
|
|
|
|
Display the calculated validity of the user IDs on the key that issued
|
|
|
|
the signature. Defaults to no.
|
|
|
|
|
|
|
|
@item show-unusable-uids
|
|
|
|
Show revoked and expired user IDs during signature verification.
|
|
|
|
Defaults to no.
|
|
|
|
|
2007-02-26 21:24:29 +01:00
|
|
|
@item show-primary-uid-only
|
|
|
|
Show only the primary user ID during signature verification. That is
|
|
|
|
all the AKA lines as well as photo Ids are not shown with the signature
|
|
|
|
verification status.
|
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@item pka-lookups
|
|
|
|
Enable PKA lookups to verify sender addresses. Note that PKA is based
|
|
|
|
on DNS, and so enabling this option may disclose information on when
|
|
|
|
and what signatures are verified or to whom data is encrypted. This
|
|
|
|
is similar to the "web bug" described for the auto-key-retrieve
|
|
|
|
feature.
|
|
|
|
|
|
|
|
@item pka-trust-increase
|
|
|
|
Raise the trust in a signature to full if the signature passes PKA
|
|
|
|
validation. This option is only meaningful if pka-lookups is set.
|
|
|
|
@end table
|
|
|
|
|
|
|
|
@item --enable-dsa2
|
|
|
|
@itemx --disable-dsa2
|
2009-05-20 11:57:10 +02:00
|
|
|
Enable hash truncation for all DSA keys even for old DSA Keys up to
|
|
|
|
1024 bit. This is also the default with @option{--openpgp}. Note
|
|
|
|
that older versions of GnuPG also required this flag to allow the
|
|
|
|
generation of DSA larger than 1024 bit.
|
2006-09-19 18:25:51 +02:00
|
|
|
|
|
|
|
@item --photo-viewer @code{string}
|
|
|
|
This is the command line that should be run to view a photo ID. "%i"
|
|
|
|
will be expanded to a filename containing the photo. "%I" does the
|
|
|
|
same, except the file will not be deleted once the viewer exits.
|
|
|
|
Other flags are "%k" for the key ID, "%K" for the long key ID, "%f"
|
|
|
|
for the key fingerprint, "%t" for the extension of the image type
|
|
|
|
(e.g. "jpg"), "%T" for the MIME type of the image (e.g. "image/jpeg"),
|
|
|
|
and "%%" for an actual percent sign. If neither %i or %I are present,
|
|
|
|
then the photo will be supplied to the viewer on standard input.
|
|
|
|
|
|
|
|
The default viewer is "xloadimage -fork -quiet -title 'KeyID 0x%k'
|
2008-12-08 20:10:42 +01:00
|
|
|
STDIN". Note that if your image viewer program is not secure, then
|
2006-09-19 18:25:51 +02:00
|
|
|
executing it from GnuPG does not make it secure.
|
|
|
|
|
|
|
|
@item --exec-path @code{string}
|
|
|
|
Sets a list of directories to search for photo viewers and keyserver
|
|
|
|
helpers. If not provided, keyserver helpers use the compiled-in
|
|
|
|
default directory, and photo viewers use the $PATH environment
|
|
|
|
variable.
|
|
|
|
Note, that on W32 system this value is ignored when searching for
|
|
|
|
keyserver helpers.
|
|
|
|
|
|
|
|
@item --keyring @code{file}
|
|
|
|
Add @code{file} to the current list of keyrings. If @code{file} begins
|
2006-09-25 20:29:20 +02:00
|
|
|
with a tilde and a slash, these are replaced by the $HOME directory. If
|
|
|
|
the filename does not contain a slash, it is assumed to be in the GnuPG
|
|
|
|
home directory ("~/.gnupg" if @option{--homedir} or $GNUPGHOME is not
|
|
|
|
used).
|
2006-09-19 18:25:51 +02:00
|
|
|
|
2006-09-25 20:29:20 +02:00
|
|
|
Note that this adds a keyring to the current list. If the intent is to
|
|
|
|
use the specified keyring alone, use @option{--keyring} along with
|
|
|
|
@option{--no-default-keyring}.
|
2006-09-19 18:25:51 +02:00
|
|
|
|
|
|
|
@item --secret-keyring @code{file}
|
2006-09-25 20:29:20 +02:00
|
|
|
Same as @option{--keyring} but for the secret keyrings.
|
2006-09-19 18:25:51 +02:00
|
|
|
|
|
|
|
@item --primary-keyring @code{file}
|
|
|
|
Designate @code{file} as the primary public keyring. This means that
|
2006-09-25 20:29:20 +02:00
|
|
|
newly imported keys (via @option{--import} or keyserver
|
|
|
|
@option{--recv-from}) will go to this keyring.
|
2006-09-19 18:25:51 +02:00
|
|
|
|
|
|
|
@item --trustdb-name @code{file}
|
|
|
|
Use @code{file} instead of the default trustdb. If @code{file} begins
|
2006-09-25 20:29:20 +02:00
|
|
|
with a tilde and a slash, these are replaced by the $HOME directory. If
|
|
|
|
the filename does not contain a slash, it is assumed to be in the GnuPG
|
|
|
|
home directory (@file{~/.gnupg} if @option{--homedir} or $GNUPGHOME is
|
|
|
|
not used).
|
2006-09-19 18:25:51 +02:00
|
|
|
|
2006-12-06 11:16:50 +01:00
|
|
|
@ifset gpgone
|
|
|
|
@anchor{option --homedir}
|
|
|
|
@end ifset
|
2006-09-19 18:25:51 +02:00
|
|
|
@include opt-homedir.texi
|
|
|
|
|
|
|
|
|
2007-02-18 14:48:03 +01:00
|
|
|
@ifset gpgone
|
2006-09-19 18:25:51 +02:00
|
|
|
@item --pcsc-driver @code{file}
|
|
|
|
Use @code{file} to access the smartcard reader. The current default is
|
|
|
|
`libpcsclite.so.1' for GLIBC based systems,
|
|
|
|
`/System/Library/Frameworks/PCSC.framework/PCSC' for MAC OS X,
|
|
|
|
`winscard.dll' for Windows and `libpcsclite.so' for other systems.
|
2007-02-18 14:48:03 +01:00
|
|
|
@end ifset
|
2006-09-19 18:25:51 +02:00
|
|
|
|
2007-02-18 14:48:03 +01:00
|
|
|
@ifset gpgone
|
2006-09-19 18:25:51 +02:00
|
|
|
@item --disable-ccid
|
|
|
|
Disable the integrated support for CCID compliant readers. This
|
|
|
|
allows to fall back to one of the other drivers even if the internal
|
|
|
|
CCID driver can handle the reader. Note, that CCID support is only
|
|
|
|
available if libusb was available at build time.
|
2007-02-18 14:48:03 +01:00
|
|
|
@end ifset
|
2006-09-19 18:25:51 +02:00
|
|
|
|
2007-02-18 14:48:03 +01:00
|
|
|
@ifset gpgone
|
2006-09-19 18:25:51 +02:00
|
|
|
@item --reader-port @code{number_or_string}
|
|
|
|
This option may be used to specify the port of the card terminal. A
|
|
|
|
value of 0 refers to the first serial device; add 32768 to access USB
|
|
|
|
devices. The default is 32768 (first USB device). PC/SC or CCID
|
|
|
|
readers might need a string here; run the program in verbose mode to get
|
|
|
|
a list of available readers. The default is then the first reader
|
|
|
|
found.
|
2007-02-18 14:48:03 +01:00
|
|
|
@end ifset
|
2006-09-19 18:25:51 +02:00
|
|
|
|
|
|
|
@item --display-charset @code{name}
|
|
|
|
Set the name of the native character set. This is used to convert
|
|
|
|
some informational strings like user IDs to the proper UTF-8 encoding.
|
|
|
|
Note that this has nothing to do with the character set of data to be
|
2007-11-27 09:01:19 +01:00
|
|
|
encrypted or signed; GnuPG does not recode user-supplied data. If
|
2006-09-19 18:25:51 +02:00
|
|
|
this option is not used, the default character set is determined from
|
|
|
|
the current locale. A verbosity level of 3 shows the chosen set.
|
|
|
|
Valid values for @code{name} are:
|
|
|
|
|
|
|
|
@table @asis
|
|
|
|
|
|
|
|
@item iso-8859-1
|
|
|
|
This is the Latin 1 set.
|
|
|
|
|
|
|
|
@item iso-8859-2
|
|
|
|
The Latin 2 set.
|
|
|
|
|
|
|
|
@item iso-8859-15
|
|
|
|
This is currently an alias for
|
|
|
|
the Latin 1 set.
|
|
|
|
|
|
|
|
@item koi8-r
|
|
|
|
The usual Russian set (rfc1489).
|
|
|
|
|
|
|
|
@item utf-8
|
|
|
|
Bypass all translations and assume
|
|
|
|
that the OS uses native UTF-8 encoding.
|
|
|
|
@end table
|
|
|
|
|
|
|
|
@item --utf8-strings
|
|
|
|
@itemx --no-utf8-strings
|
|
|
|
Assume that command line arguments are given as UTF8 strings. The
|
2006-09-25 20:29:20 +02:00
|
|
|
default (@option{--no-utf8-strings}) is to assume that arguments are
|
|
|
|
encoded in the character set as specified by
|
|
|
|
@option{--display-charset}. These options affect all following
|
|
|
|
arguments. Both options may be used multiple times.
|
2006-09-19 18:25:51 +02:00
|
|
|
|
2006-12-06 11:16:50 +01:00
|
|
|
@ifset gpgone
|
|
|
|
@anchor{option --options}
|
|
|
|
@end ifset
|
2006-09-19 18:25:51 +02:00
|
|
|
@item --options @code{file}
|
2006-09-25 20:29:20 +02:00
|
|
|
Read options from @code{file} and do not try to read them from the
|
|
|
|
default options file in the homedir (see @option{--homedir}). This
|
|
|
|
option is ignored if used in an options file.
|
2006-09-19 18:25:51 +02:00
|
|
|
|
|
|
|
@item --no-options
|
2006-09-25 20:29:20 +02:00
|
|
|
Shortcut for @option{--options /dev/null}. This option is detected
|
|
|
|
before an attempt to open an option file. Using this option will also
|
|
|
|
prevent the creation of a @file{~/.gnupg} homedir.
|
2006-09-19 18:25:51 +02:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
@item -z @code{n}
|
|
|
|
@itemx --compress-level @code{n}
|
|
|
|
@itemx --bzip2-compress-level @code{n}
|
|
|
|
Set compression level to @code{n} for the ZIP and ZLIB compression
|
2006-09-25 20:29:20 +02:00
|
|
|
algorithms. The default is to use the default compression level of zlib
|
|
|
|
(normally 6). @option{--bzip2-compress-level} sets the compression level
|
|
|
|
for the BZIP2 compression algorithm (defaulting to 6 as well). This is a
|
|
|
|
different option from @option{--compress-level} since BZIP2 uses a
|
2006-09-19 18:25:51 +02:00
|
|
|
significant amount of memory for each additional compression level.
|
2006-09-25 20:29:20 +02:00
|
|
|
@option{-z} sets both. A value of 0 for @code{n} disables compression.
|
2006-09-19 18:25:51 +02:00
|
|
|
|
|
|
|
@item --bzip2-decompress-lowmem
|
|
|
|
Use a different decompression method for BZIP2 compressed files. This
|
|
|
|
alternate method uses a bit more than half the memory, but also runs
|
|
|
|
at half the speed. This is useful under extreme low memory
|
|
|
|
circumstances when the file was originally compressed at a high
|
2006-09-25 20:29:20 +02:00
|
|
|
@option{--bzip2-compress-level}.
|
2006-09-19 18:25:51 +02:00
|
|
|
|
|
|
|
|
|
|
|
@item --mangle-dos-filenames
|
|
|
|
@itemx --no-mangle-dos-filenames
|
|
|
|
@opindex mangle-dos-filenames
|
|
|
|
@opindex no-mangle-dos-filenames
|
|
|
|
Older version of Windows cannot handle filenames with more than one
|
2006-09-25 20:29:20 +02:00
|
|
|
dot. @option{--mangle-dos-filenames} causes GnuPG to replace (rather
|
|
|
|
than add to) the extension of an output filename to avoid this
|
|
|
|
problem. This option is off by default and has no effect on non-Windows
|
|
|
|
platforms.
|
2006-09-19 18:25:51 +02:00
|
|
|
|
|
|
|
@item --ask-cert-level
|
|
|
|
@itemx --no-ask-cert-level
|
2006-09-25 20:29:20 +02:00
|
|
|
When making a key signature, prompt for a certification level. If this
|
|
|
|
option is not specified, the certification level used is set via
|
|
|
|
@option{--default-cert-level}. See @option{--default-cert-level} for
|
|
|
|
information on the specific levels and how they are
|
|
|
|
used. @option{--no-ask-cert-level} disables this option. This option
|
|
|
|
defaults to no.
|
2006-09-19 18:25:51 +02:00
|
|
|
|
|
|
|
@item --default-cert-level @code{n}
|
|
|
|
The default to use for the check level when signing a key.
|
|
|
|
|
|
|
|
0 means you make no particular claim as to how carefully you verified
|
|
|
|
the key.
|
|
|
|
|
|
|
|
1 means you believe the key is owned by the person who claims to own
|
|
|
|
it but you could not, or did not verify the key at all. This is
|
|
|
|
useful for a "persona" verification, where you sign the key of a
|
|
|
|
pseudonymous user.
|
|
|
|
|
|
|
|
2 means you did casual verification of the key. For example, this
|
|
|
|
could mean that you verified that the key fingerprint and checked the
|
|
|
|
user ID on the key against a photo ID.
|
|
|
|
|
|
|
|
3 means you did extensive verification of the key. For example, this
|
|
|
|
could mean that you verified the key fingerprint with the owner of the
|
|
|
|
key in person, and that you checked, by means of a hard to forge
|
|
|
|
document with a photo ID (such as a passport) that the name of the key
|
|
|
|
owner matches the name in the user ID on the key, and finally that you
|
|
|
|
verified (by exchange of email) that the email address on the key
|
|
|
|
belongs to the key owner.
|
|
|
|
|
|
|
|
Note that the examples given above for levels 2 and 3 are just that:
|
|
|
|
examples. In the end, it is up to you to decide just what "casual"
|
|
|
|
and "extensive" mean to you.
|
|
|
|
|
|
|
|
This option defaults to 0 (no particular claim).
|
|
|
|
|
|
|
|
@item --min-cert-level
|
|
|
|
When building the trust database, treat any signatures with a
|
|
|
|
certification level below this as invalid. Defaults to 2, which
|
|
|
|
disregards level 1 signatures. Note that level 0 "no particular
|
|
|
|
claim" signatures are always accepted.
|
|
|
|
|
|
|
|
@item --trusted-key @code{long key ID}
|
|
|
|
Assume that the specified key (which must be given
|
|
|
|
as a full 8 byte key ID) is as trustworthy as one of
|
|
|
|
your own secret keys. This option is useful if you
|
|
|
|
don't want to keep your secret keys (or one of them)
|
|
|
|
online but still want to be able to check the validity of a given
|
|
|
|
recipient's or signator's key.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
@item --trust-model @code{pgp|classic|direct|always|auto}
|
|
|
|
Set what trust model GnuPG should follow. The models are:
|
|
|
|
|
|
|
|
@table @asis
|
|
|
|
|
|
|
|
@item pgp
|
|
|
|
This is the Web of Trust combined with trust signatures as used in PGP
|
|
|
|
5.x and later. This is the default trust model when creating a new
|
|
|
|
trust database.
|
|
|
|
|
|
|
|
@item classic
|
|
|
|
This is the standard Web of Trust as used in PGP 2.x and earlier.
|
|
|
|
|
|
|
|
@item direct
|
|
|
|
Key validity is set directly by the user and not calculated via the
|
|
|
|
Web of Trust.
|
|
|
|
|
|
|
|
@item always
|
|
|
|
Skip key validation and assume that used keys are always fully
|
|
|
|
trusted. You generally won't use this unless you are using some
|
|
|
|
external validation scheme. This option also suppresses the
|
|
|
|
"[uncertain]" tag printed with signature checks when there is no
|
|
|
|
evidence that the user ID is bound to the key.
|
|
|
|
|
|
|
|
@item auto
|
|
|
|
Select the trust model depending on whatever the internal trust
|
|
|
|
database says. This is the default model if such a database already
|
|
|
|
exists.
|
|
|
|
@end table
|
|
|
|
|
|
|
|
@item --auto-key-locate @code{parameters}
|
|
|
|
@itemx --no-auto-key-locate
|
|
|
|
GnuPG can automatically locate and retrieve keys as needed using this
|
|
|
|
option. This happens when encrypting to an email address (in the
|
|
|
|
"user@@example.com" form), and there are no user@@example.com keys on
|
2008-04-08 13:04:16 +02:00
|
|
|
the local keyring. This option takes any number of the following
|
|
|
|
mechanisms, in the order they are to be tried:
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
@table @asis
|
|
|
|
|
|
|
|
@item cert
|
2008-04-08 13:04:16 +02:00
|
|
|
Locate a key using DNS CERT, as specified in rfc4398.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
@item pka
|
2008-04-08 13:04:16 +02:00
|
|
|
Locate a key using DNS PKA.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
@item ldap
|
2009-07-23 20:28:54 +02:00
|
|
|
Using DNS Service Discovery, check the domain in question for any LDAP
|
|
|
|
keyservers to use. If this fails, attempt to locate the key using the
|
|
|
|
PGP Universal method of checking @samp{ldap://keys.(thedomain)}.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
@item keyserver
|
2008-04-08 13:04:16 +02:00
|
|
|
Locate a key using whatever keyserver is defined using the
|
2006-09-25 20:29:20 +02:00
|
|
|
@option{--keyserver} option.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2008-04-08 13:04:16 +02:00
|
|
|
@item keyserver-URL
|
|
|
|
In addition, a keyserver URL as used in the @option{--keyserver} option
|
|
|
|
may be used here to query that particular keyserver.
|
|
|
|
|
|
|
|
@item local
|
|
|
|
Locate the key using the local keyrings. This mechanism allows to
|
|
|
|
select the order a local key lookup is done. Thus using
|
|
|
|
@samp{--auto-key-locate local} is identical to
|
|
|
|
@option{--no-auto-key-locate}.
|
|
|
|
|
|
|
|
@item nodefault
|
|
|
|
This flag disables the standard local key lookup, done before any of the
|
|
|
|
mechanisms defined by the @option{--auto-key-locate} are tried. The
|
|
|
|
position of this mechanism in the list does not matter. It is not
|
|
|
|
required if @code{local} is also used.
|
|
|
|
|
2006-08-16 16:54:19 +02:00
|
|
|
@end table
|
|
|
|
|
|
|
|
@item --keyid-format @code{short|0xshort|long|0xlong}
|
|
|
|
Select how to display key IDs. "short" is the traditional 8-character
|
|
|
|
key ID. "long" is the more accurate (but less convenient)
|
|
|
|
16-character key ID. Add an "0x" to either to include an "0x" at the
|
|
|
|
beginning of the key ID, as in 0x99242560.
|
|
|
|
|
2006-08-17 20:01:25 +02:00
|
|
|
@item --keyserver @code{name}
|
2006-08-16 16:54:19 +02:00
|
|
|
Use @code{name} as your keyserver. This is the server that
|
2006-09-25 20:29:20 +02:00
|
|
|
@option{--recv-keys}, @option{--send-keys}, and @option{--search-keys}
|
|
|
|
will communicate with to receive keys from, send keys to, and search for
|
|
|
|
keys on. The format of the @code{name} is a URI:
|
|
|
|
`scheme:[//]keyservername[:port]' The scheme is the type of keyserver:
|
|
|
|
"hkp" for the HTTP (or compatible) keyservers, "ldap" for the LDAP
|
|
|
|
keyservers, or "mailto" for the Graff email keyserver. Note that your
|
|
|
|
particular installation of GnuPG may have other keyserver types
|
|
|
|
available as well. Keyserver schemes are case-insensitive. After the
|
|
|
|
keyserver name, optional keyserver configuration options may be
|
|
|
|
provided. These are the same as the global @option{--keyserver-options}
|
|
|
|
from below, but apply only to this particular keyserver.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
Most keyservers synchronize with each other, so there is generally no
|
|
|
|
need to send keys to more than one server. The keyserver
|
2008-04-08 13:04:16 +02:00
|
|
|
@code{hkp://keys.gnupg.net} uses round robin DNS to give a different
|
2006-08-16 16:54:19 +02:00
|
|
|
keyserver each time you use it.
|
|
|
|
|
|
|
|
@item --keyserver-options @code{name=value1 }
|
|
|
|
This is a space or comma delimited string that gives options for the
|
2009-08-14 21:43:26 +02:00
|
|
|
keyserver. Options can be prefixed with a `no-' to give the opposite
|
|
|
|
meaning. Valid import-options or export-options may be used here as
|
|
|
|
well to apply to importing (@option{--recv-key}) or exporting
|
|
|
|
(@option{--send-key}) a key from a keyserver. While not all options
|
|
|
|
are available for all keyserver types, some common options are:
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
@table @asis
|
|
|
|
|
|
|
|
@item include-revoked
|
2006-09-25 20:29:20 +02:00
|
|
|
When searching for a key with @option{--search-keys}, include keys that
|
|
|
|
are marked on the keyserver as revoked. Note that not all keyservers
|
2006-08-16 16:54:19 +02:00
|
|
|
differentiate between revoked and unrevoked keys, and for such
|
2006-09-25 20:29:20 +02:00
|
|
|
keyservers this option is meaningless. Note also that most keyservers do
|
|
|
|
not have cryptographic verification of key revocations, and so turning
|
|
|
|
this option off may result in skipping keys that are incorrectly marked
|
|
|
|
as revoked.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
@item include-disabled
|
2006-09-25 20:29:20 +02:00
|
|
|
When searching for a key with @option{--search-keys}, include keys that
|
|
|
|
are marked on the keyserver as disabled. Note that this option is not
|
2006-08-16 16:54:19 +02:00
|
|
|
used with HKP keyservers.
|
|
|
|
|
|
|
|
@item auto-key-retrieve
|
|
|
|
This option enables the automatic retrieving of keys from a keyserver
|
|
|
|
when verifying signatures made by keys that are not on the local
|
|
|
|
keyring.
|
|
|
|
|
|
|
|
Note that this option makes a "web bug" like behavior possible.
|
|
|
|
Keyserver operators can see which keys you request, so by sending you
|
|
|
|
a message signed by a brand new key (which you naturally will not have
|
|
|
|
on your local keyring), the operator can tell both your IP address and
|
|
|
|
the time when you verified the signature.
|
|
|
|
|
|
|
|
@item honor-keyserver-url
|
2006-09-25 20:29:20 +02:00
|
|
|
When using @option{--refresh-keys}, if the key in question has a preferred
|
2006-08-16 16:54:19 +02:00
|
|
|
keyserver URL, then use that preferred keyserver to refresh the key
|
|
|
|
from. In addition, if auto-key-retrieve is set, and the signature
|
|
|
|
being verified has a preferred keyserver URL, then use that preferred
|
|
|
|
keyserver to fetch the key from. Defaults to yes.
|
|
|
|
|
|
|
|
@item honor-pka-record
|
|
|
|
If auto-key-retrieve is set, and the signature being verified has a
|
|
|
|
PKA record, then use the PKA information to fetch the key. Defaults
|
|
|
|
to yes.
|
|
|
|
|
|
|
|
@item include-subkeys
|
|
|
|
When receiving a key, include subkeys as potential targets. Note that
|
|
|
|
this option is not used with HKP keyservers, as they do not support
|
|
|
|
retrieving keys by subkey id.
|
|
|
|
|
|
|
|
@item use-temp-files
|
|
|
|
On most Unix-like platforms, GnuPG communicates with the keyserver
|
|
|
|
helper program via pipes, which is the most efficient method. This
|
|
|
|
option forces GnuPG to use temporary files to communicate. On some
|
|
|
|
platforms (such as Win32 and RISC OS), this option is always enabled.
|
|
|
|
|
|
|
|
@item keep-temp-files
|
|
|
|
If using `use-temp-files', do not delete the temp files after using
|
|
|
|
them. This option is useful to learn the keyserver communication
|
|
|
|
protocol by reading the temporary files.
|
|
|
|
|
|
|
|
@item verbose
|
|
|
|
Tell the keyserver helper program to be more verbose. This option can
|
|
|
|
be repeated multiple times to increase the verbosity level.
|
|
|
|
|
|
|
|
@item timeout
|
|
|
|
Tell the keyserver helper program how long (in seconds) to try and
|
|
|
|
perform a keyserver action before giving up. Note that performing
|
|
|
|
multiple actions at the same time uses this timeout value per action.
|
2006-09-25 20:29:20 +02:00
|
|
|
For example, when retrieving multiple keys via @option{--recv-keys}, the
|
2006-08-16 16:54:19 +02:00
|
|
|
timeout applies separately to each key retrieval, and not to the
|
2006-09-25 20:29:20 +02:00
|
|
|
@option{--recv-keys} command as a whole. Defaults to 30 seconds.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2007-01-18 00:38:56 +01:00
|
|
|
@item http-proxy=@code{value}
|
|
|
|
Set the proxy to use for HTTP and HKP keyservers. This overrides the
|
|
|
|
"http_proxy" environment variable, if any.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
@item max-cert-size
|
|
|
|
When retrieving a key via DNS CERT, only accept keys up to this size.
|
|
|
|
Defaults to 16384 bytes.
|
2009-03-16 19:45:46 +01:00
|
|
|
|
|
|
|
@item debug
|
|
|
|
Turn on debug output in the keyserver helper program. Note that the
|
|
|
|
details of debug output depends on which keyserver helper program is
|
|
|
|
being used, and in turn, on any libraries that the keyserver helper
|
|
|
|
program uses internally (libcurl, openldap, etc).
|
2009-08-14 21:43:26 +02:00
|
|
|
|
|
|
|
@item check-cert
|
|
|
|
Enable certificate checking if the keyserver presents one (for hkps or
|
|
|
|
ldaps). Defaults to on.
|
|
|
|
|
|
|
|
@item ca-cert-file
|
2010-02-11 12:34:34 +01:00
|
|
|
Provide a certificate store to override the system default. Only
|
2009-08-14 21:43:26 +02:00
|
|
|
necessary if check-cert is enabled, and the keyserver is using a
|
|
|
|
certificate that is not present in a system default certificate list.
|
|
|
|
|
2010-02-11 12:34:34 +01:00
|
|
|
Note that depending on the SSL library that the keyserver helper is
|
|
|
|
built with, this may actually be a directory or a file.
|
2006-08-16 16:54:19 +02:00
|
|
|
@end table
|
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@item --completes-needed @code{n}
|
|
|
|
Number of completely trusted users to introduce a new
|
|
|
|
key signer (defaults to 1).
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@item --marginals-needed @code{n}
|
|
|
|
Number of marginally trusted users to introduce a new
|
|
|
|
key signer (defaults to 3)
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@item --max-cert-depth @code{n}
|
|
|
|
Maximum depth of a certification chain (default is 5).
|
|
|
|
|
|
|
|
@item --simple-sk-checksum
|
|
|
|
Secret keys are integrity protected by using a SHA-1 checksum. This
|
|
|
|
method is part of the upcoming enhanced OpenPGP specification but
|
|
|
|
GnuPG already uses it as a countermeasure against certain attacks.
|
|
|
|
Old applications don't understand this new format, so this option may
|
|
|
|
be used to switch back to the old behaviour. Using this option bears
|
|
|
|
a security risk. Note that using this option only takes effect when
|
|
|
|
the secret key is encrypted - the simplest way to make this happen is
|
|
|
|
to change the passphrase on the key (even changing it to the same
|
|
|
|
value is acceptable).
|
|
|
|
|
|
|
|
@item --no-sig-cache
|
|
|
|
Do not cache the verification status of key signatures.
|
|
|
|
Caching gives a much better performance in key listings. However, if
|
|
|
|
you suspect that your public keyring is not save against write
|
|
|
|
modifications, you can use this option to disable the caching. It
|
|
|
|
probably does not make sense to disable it because all kind of damage
|
|
|
|
can be done if someone else has write access to your public keyring.
|
|
|
|
|
|
|
|
@item --no-sig-create-check
|
|
|
|
GnuPG normally verifies each signature right after creation to protect
|
|
|
|
against bugs and hardware malfunctions which could leak out bits from
|
|
|
|
the secret key. This extra verification needs some time (about 115%
|
|
|
|
for DSA keys), and so this option can be used to disable it.
|
|
|
|
However, due to the fact that the signature creation needs manual
|
|
|
|
interaction, this performance penalty does not matter in most settings.
|
|
|
|
|
|
|
|
@item --auto-check-trustdb
|
|
|
|
@itemx --no-auto-check-trustdb
|
|
|
|
If GnuPG feels that its information about the Web of Trust has to be
|
2006-09-25 20:29:20 +02:00
|
|
|
updated, it automatically runs the @option{--check-trustdb} command
|
|
|
|
internally. This may be a time consuming
|
|
|
|
process. @option{--no-auto-check-trustdb} disables this option.
|
2006-09-19 18:25:51 +02:00
|
|
|
|
|
|
|
@item --use-agent
|
|
|
|
@itemx --no-use-agent
|
2006-09-22 16:38:38 +02:00
|
|
|
@ifclear gpgone
|
|
|
|
This is dummy option. @command{@gpgname} always requires the agent.
|
|
|
|
@end ifclear
|
|
|
|
@ifset gpgone
|
2006-09-25 20:29:20 +02:00
|
|
|
Try to use the GnuPG-Agent. With this option, GnuPG first tries to
|
|
|
|
connect to the agent before it asks for a
|
|
|
|
passphrase. @option{--no-use-agent} disables this option.
|
2006-09-22 16:38:38 +02:00
|
|
|
@end ifset
|
2006-09-19 18:25:51 +02:00
|
|
|
|
|
|
|
@item --gpg-agent-info
|
2007-01-30 21:16:28 +01:00
|
|
|
@ifclear gpgone
|
|
|
|
This is dummy option. It has no effect when used with @command{gpg2}.
|
|
|
|
@end ifclear
|
|
|
|
@ifset gpgone
|
2006-09-19 18:25:51 +02:00
|
|
|
Override the value of the environment variable
|
2006-09-25 20:29:20 +02:00
|
|
|
@samp{GPG_AGENT_INFO}. This is only used when @option{--use-agent} has
|
2007-01-30 21:16:28 +01:00
|
|
|
been given. Given that this option is not anymore used by
|
|
|
|
@command{gpg2}, it should be avoided if possible.
|
2007-01-31 15:24:41 +01:00
|
|
|
@end ifset
|
2006-09-19 18:25:51 +02:00
|
|
|
|
|
|
|
@item --lock-once
|
|
|
|
Lock the databases the first time a lock is requested
|
|
|
|
and do not release the lock until the process
|
|
|
|
terminates.
|
|
|
|
|
|
|
|
@item --lock-multiple
|
|
|
|
Release the locks every time a lock is no longer
|
2006-09-25 20:29:20 +02:00
|
|
|
needed. Use this to override a previous @option{--lock-once}
|
2006-09-19 18:25:51 +02:00
|
|
|
from a config file.
|
|
|
|
|
|
|
|
@item --lock-never
|
|
|
|
Disable locking entirely. This option should be used only in very
|
|
|
|
special environments, where it can be assured that only one process
|
|
|
|
is accessing those files. A bootable floppy with a stand-alone
|
|
|
|
encryption system will probably use this. Improper usage of this
|
|
|
|
option may lead to data and key corruption.
|
|
|
|
|
|
|
|
@item --exit-on-status-write-error
|
|
|
|
This option will cause write errors on the status FD to immediately
|
2006-09-25 20:29:20 +02:00
|
|
|
terminate the process. That should in fact be the default but it never
|
|
|
|
worked this way and thus we need an option to enable this, so that the
|
|
|
|
change won't break applications which close their end of a status fd
|
|
|
|
connected pipe too early. Using this option along with
|
|
|
|
@option{--enable-progress-filter} may be used to cleanly cancel long
|
|
|
|
running gpg operations.
|
2006-09-19 18:25:51 +02:00
|
|
|
|
|
|
|
@item --limit-card-insert-tries @code{n}
|
|
|
|
With @code{n} greater than 0 the number of prompts asking to insert a
|
|
|
|
smartcard gets limited to N-1. Thus with a value of 1 gpg won't at
|
|
|
|
all ask to insert a card if none has been inserted at startup. This
|
|
|
|
option is useful in the configuration file in case an application does
|
|
|
|
not know about the smartcard support and waits ad infinitum for an
|
|
|
|
inserted card.
|
|
|
|
|
|
|
|
@item --no-random-seed-file
|
|
|
|
GnuPG uses a file to store its internal random pool over invocations.
|
|
|
|
This makes random generation faster; however sometimes write operations
|
|
|
|
are not desired. This option can be used to achieve that with the cost of
|
|
|
|
slower random generation.
|
|
|
|
|
|
|
|
@item --no-greeting
|
|
|
|
Suppress the initial copyright message.
|
|
|
|
|
|
|
|
@item --no-secmem-warning
|
|
|
|
Suppress the warning about "using insecure memory".
|
|
|
|
|
|
|
|
@item --no-permission-warning
|
2006-09-25 20:29:20 +02:00
|
|
|
Suppress the warning about unsafe file and home directory (@option{--homedir})
|
2006-09-19 18:25:51 +02:00
|
|
|
permissions. Note that the permission checks that GnuPG performs are
|
|
|
|
not intended to be authoritative, but rather they simply warn about
|
|
|
|
certain common permission problems. Do not assume that the lack of a
|
|
|
|
warning means that your system is secure.
|
|
|
|
|
2006-09-25 20:29:20 +02:00
|
|
|
Note that the warning for unsafe @option{--homedir} permissions cannot be
|
2006-09-19 18:25:51 +02:00
|
|
|
suppressed in the gpg.conf file, as this would allow an attacker to
|
|
|
|
place an unsafe gpg.conf file in place, and use this file to suppress
|
2006-09-25 20:29:20 +02:00
|
|
|
warnings about itself. The @option{--homedir} permissions warning may only be
|
2006-09-19 18:25:51 +02:00
|
|
|
suppressed on the command line.
|
|
|
|
|
|
|
|
@item --no-mdc-warning
|
|
|
|
Suppress the warning about missing MDC integrity protection.
|
|
|
|
|
|
|
|
@item --require-secmem
|
|
|
|
@itemx --no-require-secmem
|
|
|
|
Refuse to run if GnuPG cannot get secure memory. Defaults to no
|
|
|
|
(i.e. run, but give a warning).
|
|
|
|
|
|
|
|
|
|
|
|
@item --require-cross-certification
|
|
|
|
@itemx --no-require-cross-certification
|
|
|
|
When verifying a signature made from a subkey, ensure that the cross
|
2006-09-25 20:29:20 +02:00
|
|
|
certification "back signature" on the subkey is present and valid. This
|
|
|
|
protects against a subtle attack against subkeys that can sign.
|
|
|
|
Defaults to @option{--require-cross-certification} for
|
|
|
|
@command{@gpgname}.
|
2006-09-19 18:25:51 +02:00
|
|
|
|
|
|
|
@item --expert
|
|
|
|
@itemx --no-expert
|
|
|
|
Allow the user to do certain nonsensical or "silly" things like
|
|
|
|
signing an expired or revoked key, or certain potentially incompatible
|
|
|
|
things like generating unusual key types. This also disables certain
|
|
|
|
warning messages about potentially incompatible actions. As the name
|
|
|
|
implies, this option is for experts only. If you don't fully
|
|
|
|
understand the implications of what it allows you to do, leave this
|
2006-09-25 20:29:20 +02:00
|
|
|
off. @option{--no-expert} disables this option.
|
2006-09-19 18:25:51 +02:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
@end table
|
|
|
|
|
|
|
|
|
|
|
|
@c *******************************************
|
|
|
|
@c ******** KEY RELATED OPTIONS ************
|
|
|
|
@c *******************************************
|
|
|
|
@node GPG Key related Options
|
|
|
|
@subsection Key related options
|
|
|
|
|
|
|
|
@table @gnupgtabopt
|
|
|
|
|
|
|
|
@item --recipient @var{name}
|
|
|
|
@itemx -r
|
|
|
|
@opindex recipient
|
2006-09-25 20:29:20 +02:00
|
|
|
Encrypt for user id @var{name}. If this option or
|
|
|
|
@option{--hidden-recipient} is not specified, GnuPG asks for the user-id
|
|
|
|
unless @option{--default-recipient} is given.
|
2006-09-19 18:25:51 +02:00
|
|
|
|
|
|
|
@item --hidden-recipient @var{name}
|
|
|
|
@itemx -R
|
|
|
|
@opindex hidden-recipient
|
|
|
|
Encrypt for user ID @var{name}, but hide the key ID of this user's
|
|
|
|
key. This option helps to hide the receiver of the message and is a
|
|
|
|
limited countermeasure against traffic analysis. If this option or
|
2006-09-25 20:29:20 +02:00
|
|
|
@option{--recipient} is not specified, GnuPG asks for the user ID unless
|
|
|
|
@option{--default-recipient} is given.
|
2006-09-19 18:25:51 +02:00
|
|
|
|
|
|
|
@item --encrypt-to @code{name}
|
2006-09-25 20:29:20 +02:00
|
|
|
Same as @option{--recipient} but this one is intended for use in the
|
|
|
|
options file and may be used with your own user-id as an
|
|
|
|
"encrypt-to-self". These keys are only used when there are other
|
|
|
|
recipients given either by use of @option{--recipient} or by the asked
|
|
|
|
user id. No trust checking is performed for these user ids and even
|
|
|
|
disabled keys can be used.
|
2006-09-19 18:25:51 +02:00
|
|
|
|
|
|
|
@item --hidden-encrypt-to @code{name}
|
2006-09-25 20:29:20 +02:00
|
|
|
Same as @option{--hidden-recipient} but this one is intended for use in the
|
2006-09-19 18:25:51 +02:00
|
|
|
options file and may be used with your own user-id as a hidden
|
|
|
|
"encrypt-to-self". These keys are only used when there are other
|
2006-09-25 20:29:20 +02:00
|
|
|
recipients given either by use of @option{--recipient} or by the asked user id.
|
2006-09-19 18:25:51 +02:00
|
|
|
No trust checking is performed for these user ids and even disabled
|
|
|
|
keys can be used.
|
|
|
|
|
|
|
|
@item --no-encrypt-to
|
2006-09-25 20:29:20 +02:00
|
|
|
Disable the use of all @option{--encrypt-to} and
|
|
|
|
@option{--hidden-encrypt-to} keys.
|
2006-09-19 18:25:51 +02:00
|
|
|
|
|
|
|
@item --group @code{name=value1 }
|
|
|
|
Sets up a named group, which is similar to aliases in email programs.
|
2006-09-25 20:29:20 +02:00
|
|
|
Any time the group name is a recipient (@option{-r} or
|
|
|
|
@option{--recipient}), it will be expanded to the values
|
|
|
|
specified. Multiple groups with the same name are automatically merged
|
|
|
|
into a single group.
|
2006-09-19 18:25:51 +02:00
|
|
|
|
|
|
|
The values are @code{key IDs} or fingerprints, but any key description
|
|
|
|
is accepted. Note that a value with spaces in it will be treated as
|
|
|
|
two different values. Note also there is only one level of expansion
|
2006-09-25 20:29:20 +02:00
|
|
|
--- you cannot make an group that points to another group. When used
|
2006-09-19 18:25:51 +02:00
|
|
|
from the command line, it may be necessary to quote the argument to
|
|
|
|
this option to prevent the shell from treating it as multiple
|
|
|
|
arguments.
|
|
|
|
|
|
|
|
@item --ungroup @code{name}
|
2006-09-25 20:29:20 +02:00
|
|
|
Remove a given entry from the @option{--group} list.
|
2006-09-19 18:25:51 +02:00
|
|
|
|
|
|
|
@item --no-groups
|
2006-09-25 20:29:20 +02:00
|
|
|
Remove all entries from the @option{--group} list.
|
2006-09-19 18:25:51 +02:00
|
|
|
|
|
|
|
@item --local-user @var{name}
|
|
|
|
@itemx -u
|
|
|
|
@opindex local-user
|
|
|
|
Use @var{name} as the key to sign with. Note that this option overrides
|
2006-09-25 20:29:20 +02:00
|
|
|
@option{--default-key}.
|
2006-09-19 18:25:51 +02:00
|
|
|
|
|
|
|
@item --try-all-secrets
|
2010-02-11 12:34:34 +01:00
|
|
|
@opindex try-all-secrets
|
2006-09-19 18:25:51 +02:00
|
|
|
Don't look at the key ID as stored in the message but try all secret
|
|
|
|
keys in turn to find the right decryption key. This option forces the
|
|
|
|
behaviour as used by anonymous recipients (created by using
|
2006-09-25 20:29:20 +02:00
|
|
|
@option{--throw-keyids}) and might come handy in case where an encrypted
|
2006-09-19 18:25:51 +02:00
|
|
|
message contains a bogus key ID.
|
|
|
|
|
2010-02-11 12:34:34 +01:00
|
|
|
@item --skip-hidden-recipients
|
|
|
|
@itemx --no-skip-hidden-recipients
|
|
|
|
@opindex skip-hidden-recipients
|
|
|
|
@opindex no-skip-hidden-recipients
|
|
|
|
During decryption skip all anonymous recipients. This option helps in
|
|
|
|
the case that people use the hidden recipients feature to hide there
|
|
|
|
own encrypt-to key from others. If oneself has many secret keys this
|
|
|
|
may lead to a major annoyance because all keys are tried in turn to
|
|
|
|
decrypt soemthing which was not really intended for it. The drawback
|
|
|
|
of this option is that it is currently not possible to decrypt a
|
|
|
|
message which includes real anonymous recipients.
|
2006-09-19 18:25:51 +02:00
|
|
|
|
|
|
|
|
|
|
|
@end table
|
|
|
|
|
|
|
|
@c *******************************************
|
|
|
|
@c ******** INPUT AND OUTPUT ***************
|
|
|
|
@c *******************************************
|
|
|
|
@node GPG Input and Output
|
|
|
|
@subsection Input and Output
|
|
|
|
|
|
|
|
@table @gnupgtabopt
|
|
|
|
|
|
|
|
@item --armor
|
|
|
|
@itemx -a
|
|
|
|
@opindex armor
|
|
|
|
Create ASCII armored output. The default is to create the binary
|
|
|
|
OpenPGP format.
|
|
|
|
|
|
|
|
@item --no-armor
|
|
|
|
Assume the input data is not in ASCII armored format.
|
|
|
|
|
|
|
|
@item --output @var{file}
|
|
|
|
@itemx -o @var{file}
|
|
|
|
@opindex output
|
|
|
|
Write output to @var{file}.
|
|
|
|
|
|
|
|
@item --max-output @code{n}
|
|
|
|
@opindex max-output
|
|
|
|
This option sets a limit on the number of bytes that will be generated
|
|
|
|
when processing a file. Since OpenPGP supports various levels of
|
|
|
|
compression, it is possible that the plaintext of a given message may be
|
|
|
|
significantly larger than the original OpenPGP message. While GnuPG
|
|
|
|
works properly with such messages, there is often a desire to set a
|
|
|
|
maximum file size that will be generated before processing is forced to
|
|
|
|
stop by the OS limits. Defaults to 0, which means "no limit".
|
|
|
|
|
|
|
|
@item --import-options @code{parameters}
|
|
|
|
This is a space or comma delimited string that gives options for
|
|
|
|
importing keys. Options can be prepended with a `no-' to give the
|
|
|
|
opposite meaning. The options are:
|
|
|
|
|
|
|
|
@table @asis
|
|
|
|
|
|
|
|
@item import-local-sigs
|
|
|
|
Allow importing key signatures marked as "local". This is not
|
|
|
|
generally useful unless a shared keyring scheme is being used.
|
|
|
|
Defaults to no.
|
|
|
|
|
|
|
|
@item repair-pks-subkey-bug
|
2006-09-25 20:29:20 +02:00
|
|
|
During import, attempt to repair the damage caused by the PKS keyserver
|
|
|
|
bug (pre version 0.9.6) that mangles keys with multiple subkeys. Note
|
|
|
|
that this cannot completely repair the damaged key as some crucial data
|
|
|
|
is removed by the keyserver, but it does at least give you back one
|
|
|
|
subkey. Defaults to no for regular @option{--import} and to yes for
|
|
|
|
keyserver @option{--recv-keys}.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
@item merge-only
|
|
|
|
During import, allow key updates to existing keys, but do not allow
|
|
|
|
any new keys to be imported. Defaults to no.
|
|
|
|
|
|
|
|
@item import-clean
|
|
|
|
After import, compact (remove all signatures except the
|
|
|
|
self-signature) any user IDs from the new key that are not usable.
|
|
|
|
Then, remove any signatures from the new key that are not usable.
|
|
|
|
This includes signatures that were issued by keys that are not present
|
2006-09-25 20:29:20 +02:00
|
|
|
on the keyring. This option is the same as running the @option{--edit-key}
|
2006-08-16 16:54:19 +02:00
|
|
|
command "clean" after import. Defaults to no.
|
|
|
|
|
|
|
|
@item import-minimal
|
|
|
|
Import the smallest key possible. This removes all signatures except
|
|
|
|
the most recent self-signature on each user ID. This option is the
|
2006-09-25 20:29:20 +02:00
|
|
|
same as running the @option{--edit-key} command "minimize" after import.
|
2006-08-16 16:54:19 +02:00
|
|
|
Defaults to no.
|
|
|
|
@end table
|
|
|
|
|
|
|
|
@item --export-options @code{parameters}
|
|
|
|
This is a space or comma delimited string that gives options for
|
|
|
|
exporting keys. Options can be prepended with a `no-' to give the
|
|
|
|
opposite meaning. The options are:
|
|
|
|
|
|
|
|
@table @asis
|
|
|
|
|
|
|
|
@item export-local-sigs
|
|
|
|
Allow exporting key signatures marked as "local". This is not
|
|
|
|
generally useful unless a shared keyring scheme is being used.
|
|
|
|
Defaults to no.
|
|
|
|
|
|
|
|
@item export-attributes
|
|
|
|
Include attribute user IDs (photo IDs) while exporting. This is
|
|
|
|
useful to export keys if they are going to be used by an OpenPGP
|
|
|
|
program that does not accept attribute user IDs. Defaults to yes.
|
|
|
|
|
|
|
|
@item export-sensitive-revkeys
|
|
|
|
Include designated revoker information that was marked as
|
|
|
|
"sensitive". Defaults to no.
|
|
|
|
|
|
|
|
@item export-reset-subkey-passwd
|
2006-09-25 20:29:20 +02:00
|
|
|
When using the @option{--export-secret-subkeys} command, this option resets
|
2006-08-16 16:54:19 +02:00
|
|
|
the passphrases for all exported subkeys to empty. This is useful
|
|
|
|
when the exported subkey is to be used on an unattended machine where
|
|
|
|
a passphrase doesn't necessarily make sense. Defaults to no.
|
|
|
|
|
|
|
|
@item export-clean
|
|
|
|
Compact (remove all signatures from) user IDs on the key being
|
|
|
|
exported if the user IDs are not usable. Also, do not export any
|
|
|
|
signatures that are not usable. This includes signatures that were
|
|
|
|
issued by keys that are not present on the keyring. This option is
|
2006-09-25 20:29:20 +02:00
|
|
|
the same as running the @option{--edit-key} command "clean" before export
|
2006-08-16 16:54:19 +02:00
|
|
|
except that the local copy of the key is not modified. Defaults to
|
|
|
|
no.
|
|
|
|
|
|
|
|
@item export-minimal
|
2006-09-25 20:29:20 +02:00
|
|
|
Export the smallest key possible. This removes all signatures except the
|
|
|
|
most recent self-signature on each user ID. This option is the same as
|
|
|
|
running the @option{--edit-key} command "minimize" before export except
|
2006-08-16 16:54:19 +02:00
|
|
|
that the local copy of the key is not modified. Defaults to no.
|
|
|
|
@end table
|
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@item --with-colons
|
|
|
|
@opindex with-colons
|
|
|
|
Print key listings delimited by colons. Note that the output will be
|
2006-09-25 20:29:20 +02:00
|
|
|
encoded in UTF-8 regardless of any @option{--display-charset} setting. This
|
2006-09-19 18:25:51 +02:00
|
|
|
format is useful when GnuPG is called from scripts and other programs
|
|
|
|
as it is easily machine parsed. The details of this format are
|
|
|
|
documented in the file @file{doc/DETAILS}, which is included in the GnuPG
|
|
|
|
source distribution.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@item --fixed-list-mode
|
|
|
|
@opindex fixed-list-mode
|
2006-09-25 20:29:20 +02:00
|
|
|
Do not merge primary user ID and primary key in @option{--with-colon}
|
|
|
|
listing mode and print all timestamps as seconds since 1970-01-01.
|
2008-06-11 10:07:54 +02:00
|
|
|
@ifclear gpgone
|
|
|
|
Since GnuPG 2.0.10, this mode is always used and thus this option is
|
|
|
|
obsolete; it does not harm to use it though.
|
|
|
|
@end ifclear
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@item --with-fingerprint
|
|
|
|
@opindex with-fingerprint
|
2006-09-25 20:29:20 +02:00
|
|
|
Same as the command @option{--fingerprint} but changes only the format
|
|
|
|
of the output and may be used together with another command.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
|
|
|
|
@end table
|
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@c *******************************************
|
|
|
|
@c ******** OPENPGP OPTIONS ****************
|
|
|
|
@c *******************************************
|
|
|
|
@node OpenPGP Options
|
|
|
|
@subsection OpenPGP protocol specific options.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@table @gnupgtabopt
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@item -t, --textmode
|
|
|
|
@itemx --no-textmode
|
|
|
|
Treat input files as text and store them in the OpenPGP canonical text
|
|
|
|
form with standard "CRLF" line endings. This also sets the necessary
|
2006-09-25 20:29:20 +02:00
|
|
|
flags to inform the recipient that the encrypted or signed data is text
|
|
|
|
and may need its line endings converted back to whatever the local
|
|
|
|
system uses. This option is useful when communicating between two
|
|
|
|
platforms that have different line ending conventions (UNIX-like to Mac,
|
|
|
|
Mac to Windows, etc). @option{--no-textmode} disables this option, and
|
2006-09-19 18:25:51 +02:00
|
|
|
is the default.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-09-25 20:29:20 +02:00
|
|
|
@ifset gpgone
|
|
|
|
If @option{-t} (but not @option{--textmode}) is used together with
|
|
|
|
armoring and signing, this enables clearsigned messages. This kludge is
|
|
|
|
needed for command-line compatibility with command-line versions of PGP;
|
|
|
|
normally you would use @option{--sign} or @option{--clearsign} to select
|
|
|
|
the type of the signature.
|
|
|
|
@end ifset
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@item --force-v3-sigs
|
|
|
|
@itemx --no-force-v3-sigs
|
|
|
|
OpenPGP states that an implementation should generate v4 signatures
|
|
|
|
but PGP versions 5 through 7 only recognize v4 signatures on key
|
|
|
|
material. This option forces v3 signatures for signatures on data.
|
2007-10-27 16:09:36 +02:00
|
|
|
Note that this option implies @option{--ask-sig-expire},
|
2007-10-26 06:16:42 +02:00
|
|
|
@option{--sig-policy-url}, @option{--sig-notation}, and
|
|
|
|
@option{--sig-keyserver-url}, as these features cannot be used with v3
|
|
|
|
signatures. @option{--no-force-v3-sigs} disables this option.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@item --force-v4-certs
|
|
|
|
@itemx --no-force-v4-certs
|
|
|
|
Always use v4 key signatures even on v3 keys. This option also
|
|
|
|
changes the default hash algorithm for v3 RSA keys from MD5 to SHA-1.
|
2006-09-25 20:29:20 +02:00
|
|
|
@option{--no-force-v4-certs} disables this option.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@item --force-mdc
|
|
|
|
Force the use of encryption with a modification detection code. This
|
|
|
|
is always used with the newer ciphers (those with a blocksize greater
|
|
|
|
than 64 bits), or if all of the recipient keys indicate MDC support in
|
|
|
|
their feature flags.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@item --disable-mdc
|
|
|
|
Disable the use of the modification detection code. Note that by
|
|
|
|
using this option, the encrypted message becomes vulnerable to a
|
|
|
|
message modification attack.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@item --personal-cipher-preferences @code{string}
|
2007-04-15 07:01:22 +02:00
|
|
|
Set the list of personal cipher preferences to @code{string}. Use
|
|
|
|
@command{@gpgname --version} to get a list of available algorithms,
|
|
|
|
and use @code{none} to set no preference at all. This allows the user
|
2009-08-17 18:48:49 +02:00
|
|
|
to safely override the algorithm chosen by the recipient key
|
|
|
|
preferences, as GPG will only select an algorithm that is usable by
|
|
|
|
all recipients. The most highly ranked cipher in this list is also
|
|
|
|
used for the @option{--symmetric} encryption command.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@item --personal-digest-preferences @code{string}
|
2007-04-15 07:01:22 +02:00
|
|
|
Set the list of personal digest preferences to @code{string}. Use
|
|
|
|
@command{@gpgname --version} to get a list of available algorithms,
|
|
|
|
and use @code{none} to set no preference at all. This allows the user
|
2009-08-17 18:48:49 +02:00
|
|
|
to safely override the algorithm chosen by the recipient key
|
|
|
|
preferences, as GPG will only select an algorithm that is usable by
|
|
|
|
all recipients. The most highly ranked digest algorithm in this list
|
|
|
|
is also used when signing without encryption
|
2007-04-15 07:01:22 +02:00
|
|
|
(e.g. @option{--clearsign} or @option{--sign}). The default value is
|
|
|
|
SHA-1.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@item --personal-compress-preferences @code{string}
|
2007-04-15 07:01:22 +02:00
|
|
|
Set the list of personal compression preferences to @code{string}.
|
|
|
|
Use @command{@gpgname --version} to get a list of available
|
|
|
|
algorithms, and use @code{none} to set no preference at all. This
|
2009-08-17 18:48:49 +02:00
|
|
|
allows the user to safely override the algorithm chosen by the
|
|
|
|
recipient key preferences, as GPG will only select an algorithm that
|
|
|
|
is usable by all recipients. The most highly ranked compression
|
|
|
|
algorithm in this list is also used when there are no recipient keys
|
|
|
|
to consider (e.g. @option{--symmetric}).
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@item --s2k-cipher-algo @code{name}
|
|
|
|
Use @code{name} as the cipher algorithm used to protect secret keys.
|
|
|
|
The default cipher is CAST5. This cipher is also used for
|
2006-09-25 20:29:20 +02:00
|
|
|
conventional encryption if @option{--personal-cipher-preferences} and
|
|
|
|
@option{--cipher-algo} is not given.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@item --s2k-digest-algo @code{name}
|
|
|
|
Use @code{name} as the digest algorithm used to mangle the passphrases.
|
|
|
|
The default algorithm is SHA-1.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@item --s2k-mode @code{n}
|
|
|
|
Selects how passphrases are mangled. If @code{n} is 0 a plain
|
|
|
|
passphrase (which is not recommended) will be used, a 1 adds a salt to
|
|
|
|
the passphrase and a 3 (the default) iterates the whole process a
|
2006-11-06 04:22:13 +01:00
|
|
|
number of times (see --s2k-count). Unless @option{--rfc1991} is used,
|
|
|
|
this mode is also used for conventional encryption.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-10-13 06:09:56 +02:00
|
|
|
@item --s2k-count @code{n}
|
|
|
|
Specify how many times the passphrase mangling is repeated. This
|
|
|
|
value may range between 1024 and 65011712 inclusive, and the default
|
|
|
|
is 65536. Note that not all values in the 1024-65011712 range are
|
|
|
|
legal and if an illegal value is selected, GnuPG will round up to the
|
|
|
|
nearest legal value. This option is only meaningful if
|
|
|
|
@option{--s2k-mode} is 3.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@end table
|
2006-08-18 15:05:39 +02:00
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@c ***************************
|
|
|
|
@c ******* Compliance ********
|
|
|
|
@c ***************************
|
|
|
|
@subsection Compliance options
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
These options control what GnuPG is compliant to. Only one of these
|
|
|
|
options may be active at a time. Note that the default setting of
|
|
|
|
this is nearly always the correct one. See the INTEROPERABILITY WITH
|
|
|
|
OTHER OPENPGP PROGRAMS section below before using one of these
|
|
|
|
options.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@table @gnupgtabopt
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@item --gnupg
|
|
|
|
@opindex gnupg
|
|
|
|
Use standard GnuPG behavior. This is essentially OpenPGP behavior
|
2006-09-25 20:29:20 +02:00
|
|
|
(see @option{--openpgp}), but with some additional workarounds for common
|
2006-09-19 18:25:51 +02:00
|
|
|
compatibility problems in different versions of PGP. This is the
|
|
|
|
default option, so it is not generally needed, but it may be useful to
|
|
|
|
override a different compliance option in the gpg.conf file.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@item --openpgp
|
|
|
|
@opindex openpgp
|
|
|
|
Reset all packet, cipher and digest options to strict OpenPGP
|
|
|
|
behavior. Use this option to reset all previous options like
|
2007-10-27 16:09:36 +02:00
|
|
|
@option{--s2k-*}, @option{--cipher-algo}, @option{--digest-algo} and
|
2006-09-25 20:29:20 +02:00
|
|
|
@option{--compress-algo} to OpenPGP compliant values. All PGP
|
|
|
|
workarounds are disabled.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2007-10-27 16:09:36 +02:00
|
|
|
@item --rfc4880
|
|
|
|
@opindex rfc4880
|
|
|
|
Reset all packet, cipher and digest options to strict RFC-4880
|
|
|
|
behavior. Note that this is currently the same thing as
|
|
|
|
@option{--openpgp}.
|
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@item --rfc2440
|
2006-09-25 20:29:20 +02:00
|
|
|
@opindex rfc2440
|
2006-09-19 18:25:51 +02:00
|
|
|
Reset all packet, cipher and digest options to strict RFC-2440
|
2007-10-27 16:09:36 +02:00
|
|
|
behavior.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@item --rfc1991
|
|
|
|
@opindex rfc1991
|
|
|
|
Try to be more RFC-1991 (PGP 2.x) compliant.
|
|
|
|
|
|
|
|
@item --pgp2
|
|
|
|
@opindex pgp2
|
|
|
|
Set up all options to be as PGP 2.x compliant as possible, and warn if
|
|
|
|
an action is taken (e.g. encrypting to a non-RSA key) that will create
|
|
|
|
a message that PGP 2.x will not be able to handle. Note that `PGP
|
|
|
|
2.x' here means `MIT PGP 2.6.2'. There are other versions of PGP 2.x
|
|
|
|
available, but the MIT release is a good common baseline.
|
|
|
|
|
2007-10-26 06:16:42 +02:00
|
|
|
This option implies @option{--rfc1991 --disable-mdc
|
2009-07-31 16:36:22 +02:00
|
|
|
--no-force-v4-certs --escape-from-lines --force-v3-sigs --cipher-algo
|
|
|
|
IDEA --digest-algo MD5 --compress-algo ZIP}. It also disables
|
|
|
|
@option{--textmode} when encrypting.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@item --pgp6
|
|
|
|
@opindex pgp6
|
|
|
|
Set up all options to be as PGP 6 compliant as possible. This
|
|
|
|
restricts you to the ciphers IDEA (if the IDEA plugin is installed),
|
|
|
|
3DES, and CAST5, the hashes MD5, SHA1 and RIPEMD160, and the
|
|
|
|
compression algorithms none and ZIP. This also disables
|
|
|
|
--throw-keyids, and making signatures with signing subkeys as PGP 6
|
|
|
|
does not understand signatures made by signing subkeys.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2009-07-31 16:36:22 +02:00
|
|
|
This option implies @option{--disable-mdc --escape-from-lines
|
|
|
|
--force-v3-sigs}.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@item --pgp7
|
|
|
|
@opindex pgp7
|
|
|
|
Set up all options to be as PGP 7 compliant as possible. This is
|
2006-09-25 20:29:20 +02:00
|
|
|
identical to @option{--pgp6} except that MDCs are not disabled, and the
|
|
|
|
list of allowable ciphers is expanded to add AES128, AES192, AES256, and
|
2006-09-19 18:25:51 +02:00
|
|
|
TWOFISH.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@item --pgp8
|
|
|
|
@opindex pgp8
|
2006-09-25 20:29:20 +02:00
|
|
|
Set up all options to be as PGP 8 compliant as possible. PGP 8 is a lot
|
|
|
|
closer to the OpenPGP standard than previous versions of PGP, so all
|
|
|
|
this does is disable @option{--throw-keyids} and set
|
|
|
|
@option{--escape-from-lines}. All algorithms are allowed except for the
|
|
|
|
SHA224, SHA384, and SHA512 digests.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
@end table
|
|
|
|
|
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@c *******************************************
|
|
|
|
@c ******** ESOTERIC OPTIONS ***************
|
|
|
|
@c *******************************************
|
|
|
|
@node GPG Esoteric Options
|
2007-03-05 15:56:31 +01:00
|
|
|
@subsection Doing things one usually doesn't want to do.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@table @gnupgtabopt
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@item -n
|
|
|
|
@itemx --dry-run
|
|
|
|
@opindex dry-run
|
|
|
|
Don't make any changes (this is not completely implemented).
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@item --list-only
|
2006-09-25 20:29:20 +02:00
|
|
|
Changes the behaviour of some commands. This is like @option{--dry-run} but
|
2006-09-19 18:25:51 +02:00
|
|
|
different in some cases. The semantic of this command may be extended in
|
|
|
|
the future. Currently it only skips the actual decryption pass and
|
|
|
|
therefore enables a fast listing of the encryption keys.
|
|
|
|
|
|
|
|
@item -i
|
|
|
|
@itemx --interactive
|
|
|
|
@opindex interactive
|
|
|
|
Prompt before overwriting any files.
|
|
|
|
|
2009-12-03 20:13:19 +01:00
|
|
|
@item --debug-level @var{level}
|
|
|
|
@opindex debug-level
|
|
|
|
Select the debug level for investigating problems. @var{level} may be
|
|
|
|
a numeric value or by a keyword:
|
|
|
|
|
|
|
|
@table @code
|
|
|
|
@item none
|
|
|
|
No debugging at all. A value of less than 1 may be used instead of
|
|
|
|
the keyword.
|
|
|
|
@item basic
|
|
|
|
Some basic debug messages. A value between 1 and 2 may be used
|
|
|
|
instead of the keyword.
|
|
|
|
@item advanced
|
|
|
|
More verbose debug messages. A value between 3 and 5 may be used
|
|
|
|
instead of the keyword.
|
|
|
|
@item expert
|
|
|
|
Even more detailed messages. A value between 6 and 8 may be used
|
|
|
|
instead of the keyword.
|
|
|
|
@item guru
|
|
|
|
All of the debug messages you can get. A value greater than 8 may be
|
|
|
|
used instead of the keyword. The creation of hash tracing files is
|
|
|
|
only enabled if the keyword is used.
|
|
|
|
@end table
|
|
|
|
|
|
|
|
How these messages are mapped to the actual debugging flags is not
|
|
|
|
specified and may change with newer releases of this program. They are
|
|
|
|
however carefully selected to best aid in debugging.
|
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@item --debug @var{flags}
|
|
|
|
@opindex debug
|
|
|
|
Set debugging flags. All flags are or-ed and @var{flags} may
|
2006-08-16 16:54:19 +02:00
|
|
|
be given in C syntax (e.g. 0x0042).
|
|
|
|
|
|
|
|
@item --debug-all
|
|
|
|
Set all useful debugging flags.
|
|
|
|
|
2006-09-25 20:29:20 +02:00
|
|
|
@ifset gpgone
|
2006-08-16 16:54:19 +02:00
|
|
|
@item --debug-ccid-driver
|
|
|
|
Enable debug output from the included CCID driver for smartcards.
|
|
|
|
Note that this option is only available on some system.
|
2006-09-25 20:29:20 +02:00
|
|
|
@end ifset
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
@item --enable-progress-filter
|
|
|
|
Enable certain PROGRESS status outputs. This option allows frontends
|
|
|
|
to display a progress indicator while gpg is processing larger files.
|
|
|
|
There is a slight performance overhead using it.
|
|
|
|
|
|
|
|
@item --status-fd @code{n}
|
|
|
|
Write special status strings to the file descriptor @code{n}.
|
|
|
|
See the file DETAILS in the documentation for a listing of them.
|
|
|
|
|
|
|
|
@item --status-file @code{file}
|
2006-09-25 20:29:20 +02:00
|
|
|
Same as @option{--status-fd}, except the status data is written to file
|
2006-08-16 16:54:19 +02:00
|
|
|
@code{file}.
|
|
|
|
|
|
|
|
@item --logger-fd @code{n}
|
2008-12-08 20:10:42 +01:00
|
|
|
Write log output to file descriptor @code{n} and not to STDERR.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2008-01-10 09:13:14 +01:00
|
|
|
@item --log-file @code{file}
|
|
|
|
@itemx --logger-file @code{file}
|
2006-09-25 20:29:20 +02:00
|
|
|
Same as @option{--logger-fd}, except the logger data is written to file
|
2008-01-10 09:13:14 +01:00
|
|
|
@code{file}. Note that @option{--log-file} is only implemented for
|
|
|
|
GnuPG-2.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
@item --attribute-fd @code{n}
|
2006-09-25 20:29:20 +02:00
|
|
|
Write attribute subpackets to the file descriptor @code{n}. This is most
|
|
|
|
useful for use with @option{--status-fd}, since the status messages are
|
|
|
|
needed to separate out the various subpackets from the stream delivered
|
|
|
|
to the file descriptor.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
@item --attribute-file @code{file}
|
2006-09-25 20:29:20 +02:00
|
|
|
Same as @option{--attribute-fd}, except the attribute data is written to
|
|
|
|
file @code{file}.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
@item --comment @code{string}
|
|
|
|
@itemx --no-comments
|
2006-09-25 20:29:20 +02:00
|
|
|
Use @code{string} as a comment string in clear text signatures and ASCII
|
|
|
|
armored messages or keys (see @option{--armor}). The default behavior is
|
|
|
|
not to use a comment string. @option{--comment} may be repeated multiple
|
|
|
|
times to get multiple comment strings. @option{--no-comments} removes
|
|
|
|
all comments. It is a good idea to keep the length of a single comment
|
|
|
|
below 60 characters to avoid problems with mail programs wrapping such
|
|
|
|
lines. Note that comment lines, like all other header lines, are not
|
2006-08-16 16:54:19 +02:00
|
|
|
protected by the signature.
|
|
|
|
|
|
|
|
@item --emit-version
|
|
|
|
@itemx --no-emit-version
|
|
|
|
Force inclusion of the version string in ASCII armored output.
|
2006-09-25 20:29:20 +02:00
|
|
|
@option{--no-emit-version} disables this option.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
@item --sig-notation @code{name=value}
|
|
|
|
@itemx --cert-notation @code{name=value}
|
|
|
|
@itemx -N, --set-notation @code{name=value}
|
|
|
|
Put the name value pair into the signature as notation data.
|
|
|
|
@code{name} must consist only of printable characters or spaces, and
|
|
|
|
must contain a '@@' character in the form keyname@@domain.example.com
|
2006-09-25 20:29:20 +02:00
|
|
|
(substituting the appropriate keyname and domain name, of course). This
|
|
|
|
is to help prevent pollution of the IETF reserved notation
|
|
|
|
namespace. The @option{--expert} flag overrides the '@@'
|
|
|
|
check. @code{value} may be any printable string; it will be encoded in
|
|
|
|
UTF8, so you should check that your @option{--display-charset} is set
|
|
|
|
correctly. If you prefix @code{name} with an exclamation mark (!), the
|
|
|
|
notation data will be flagged as critical
|
|
|
|
(rfc2440:5.2.3.15). @option{--sig-notation} sets a notation for data
|
|
|
|
signatures. @option{--cert-notation} sets a notation for key signatures
|
|
|
|
(certifications). @option{--set-notation} sets both.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
There are special codes that may be used in notation names. "%k" will
|
|
|
|
be expanded into the key ID of the key being signed, "%K" into the
|
|
|
|
long key ID of the key being signed, "%f" into the fingerprint of the
|
|
|
|
key being signed, "%s" into the key ID of the key making the
|
|
|
|
signature, "%S" into the long key ID of the key making the signature,
|
|
|
|
"%g" into the fingerprint of the key making the signature (which might
|
|
|
|
be a subkey), "%p" into the fingerprint of the primary key of the key
|
|
|
|
making the signature, "%c" into the signature count from the OpenPGP
|
|
|
|
smartcard, and "%%" results in a single "%". %k, %K, and %f are only
|
|
|
|
meaningful when making a key signature (certification), and %c is only
|
|
|
|
meaningful when using the OpenPGP smartcard.
|
|
|
|
|
|
|
|
@item --sig-policy-url @code{string}
|
|
|
|
@itemx --cert-policy-url @code{string}
|
|
|
|
@itemx --set-policy-url @code{string}
|
2006-09-25 20:29:20 +02:00
|
|
|
Use @code{string} as a Policy URL for signatures (rfc2440:5.2.3.19). If
|
|
|
|
you prefix it with an exclamation mark (!), the policy URL packet will
|
|
|
|
be flagged as critical. @option{--sig-policy-url} sets a policy url for
|
|
|
|
data signatures. @option{--cert-policy-url} sets a policy url for key
|
|
|
|
signatures (certifications). @option{--set-policy-url} sets both.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
The same %-expandos used for notation data are available here as well.
|
|
|
|
|
|
|
|
@item --sig-keyserver-url @code{string}
|
|
|
|
Use @code{string} as a preferred keyserver URL for data signatures. If
|
2007-01-18 19:52:24 +01:00
|
|
|
you prefix it with an exclamation mark (!), the keyserver URL packet
|
|
|
|
will be flagged as critical.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
The same %-expandos used for notation data are available here as well.
|
|
|
|
|
|
|
|
@item --set-filename @code{string}
|
|
|
|
Use @code{string} as the filename which is stored inside messages.
|
|
|
|
This overrides the default, which is to use the actual filename of the
|
|
|
|
file being encrypted.
|
|
|
|
|
|
|
|
@item --for-your-eyes-only
|
|
|
|
@itemx --no-for-your-eyes-only
|
2008-02-05 20:42:12 +01:00
|
|
|
Set the `for your eyes only' flag in the message. This causes GnuPG to
|
|
|
|
refuse to save the file unless the @option{--output} option is given,
|
|
|
|
and PGP to use a "secure viewer" with a claimed Tempest-resistant font
|
|
|
|
to display the message. This option overrides @option{--set-filename}.
|
2006-09-25 20:29:20 +02:00
|
|
|
@option{--no-for-your-eyes-only} disables this option.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
@item --use-embedded-filename
|
|
|
|
@itemx --no-use-embedded-filename
|
|
|
|
Try to create a file with a name as embedded in the data. This can be
|
|
|
|
a dangerous option as it allows to overwrite files. Defaults to no.
|
|
|
|
|
|
|
|
@item --cipher-algo @code{name}
|
|
|
|
Use @code{name} as cipher algorithm. Running the program with the
|
2006-09-25 20:29:20 +02:00
|
|
|
command @option{--version} yields a list of supported algorithms. If
|
|
|
|
this is not used the cipher algorithm is selected from the preferences
|
|
|
|
stored with the key. In general, you do not want to use this option as
|
|
|
|
it allows you to violate the OpenPGP standard.
|
|
|
|
@option{--personal-cipher-preferences} is the safe way to accomplish the
|
|
|
|
same thing.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
@item --digest-algo @code{name}
|
|
|
|
Use @code{name} as the message digest algorithm. Running the program
|
2006-09-25 20:29:20 +02:00
|
|
|
with the command @option{--version} yields a list of supported algorithms. In
|
2006-08-16 16:54:19 +02:00
|
|
|
general, you do not want to use this option as it allows you to
|
2006-09-25 20:29:20 +02:00
|
|
|
violate the OpenPGP standard. @option{--personal-digest-preferences} is the
|
2006-08-16 16:54:19 +02:00
|
|
|
safe way to accomplish the same thing.
|
|
|
|
|
|
|
|
@item --compress-algo @code{name}
|
|
|
|
Use compression algorithm @code{name}. "zlib" is RFC-1950 ZLIB
|
|
|
|
compression. "zip" is RFC-1951 ZIP compression which is used by PGP.
|
|
|
|
"bzip2" is a more modern compression scheme that can compress some
|
|
|
|
things better than zip or zlib, but at the cost of more memory used
|
|
|
|
during compression and decompression. "uncompressed" or "none"
|
|
|
|
disables compression. If this option is not used, the default
|
|
|
|
behavior is to examine the recipient key preferences to see which
|
|
|
|
algorithms the recipient supports. If all else fails, ZIP is used for
|
|
|
|
maximum compatibility.
|
|
|
|
|
|
|
|
ZLIB may give better compression results than ZIP, as the compression
|
|
|
|
window size is not limited to 8k. BZIP2 may give even better
|
|
|
|
compression results than that, but will use a significantly larger
|
|
|
|
amount of memory while compressing and decompressing. This may be
|
|
|
|
significant in low memory situations. Note, however, that PGP (all
|
|
|
|
versions) only supports ZIP compression. Using any algorithm other
|
|
|
|
than ZIP or "none" will make the message unreadable with PGP. In
|
|
|
|
general, you do not want to use this option as it allows you to
|
2006-09-25 20:29:20 +02:00
|
|
|
violate the OpenPGP standard. @option{--personal-compress-preferences} is the
|
2006-08-16 16:54:19 +02:00
|
|
|
safe way to accomplish the same thing.
|
|
|
|
|
|
|
|
@item --cert-digest-algo @code{name}
|
|
|
|
Use @code{name} as the message digest algorithm used when signing a
|
2006-09-25 20:29:20 +02:00
|
|
|
key. Running the program with the command @option{--version} yields a
|
|
|
|
list of supported algorithms. Be aware that if you choose an algorithm
|
|
|
|
that GnuPG supports but other OpenPGP implementations do not, then some
|
2006-08-16 16:54:19 +02:00
|
|
|
users will not be able to use the key signatures you make, or quite
|
|
|
|
possibly your entire key.
|
|
|
|
|
|
|
|
@item --disable-cipher-algo @code{name}
|
|
|
|
Never allow the use of @code{name} as cipher algorithm.
|
|
|
|
The given name will not be checked so that a later loaded algorithm
|
|
|
|
will still get disabled.
|
|
|
|
|
|
|
|
@item --disable-pubkey-algo @code{name}
|
|
|
|
Never allow the use of @code{name} as public key algorithm.
|
|
|
|
The given name will not be checked so that a later loaded algorithm
|
|
|
|
will still get disabled.
|
|
|
|
|
|
|
|
@item --throw-keyids
|
|
|
|
@itemx --no-throw-keyids
|
2008-08-28 16:57:25 +02:00
|
|
|
Do not put the recipient key IDs into encrypted messages. This helps to
|
|
|
|
hide the receivers of the message and is a limited countermeasure
|
|
|
|
against traffic analysis.@footnote{Using a little social engineering
|
|
|
|
anyone who is able to decrypt the message can check whether one of the
|
|
|
|
other recipients is the one he suspects.} On the receiving side, it may
|
|
|
|
slow down the decryption process because all available secret keys must
|
|
|
|
be tried. @option{--no-throw-keyids} disables this option. This option
|
|
|
|
is essentially the same as using @option{--hidden-recipient} for all
|
|
|
|
recipients.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
@item --not-dash-escaped
|
|
|
|
This option changes the behavior of cleartext signatures
|
|
|
|
so that they can be used for patch files. You should not
|
|
|
|
send such an armored file via email because all spaces
|
|
|
|
and line endings are hashed too. You can not use this
|
|
|
|
option for data which has 5 dashes at the beginning of a
|
|
|
|
line, patch files don't have this. A special armor header
|
|
|
|
line tells GnuPG about this cleartext signature option.
|
|
|
|
|
|
|
|
@item --escape-from-lines
|
|
|
|
@itemx --no-escape-from-lines
|
2006-09-25 20:29:20 +02:00
|
|
|
Because some mailers change lines starting with "From " to ">From " it
|
|
|
|
is good to handle such lines in a special way when creating cleartext
|
|
|
|
signatures to prevent the mail system from breaking the signature. Note
|
|
|
|
that all other PGP versions do it this way too. Enabled by
|
|
|
|
default. @option{--no-escape-from-lines} disables this option.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-12-03 05:48:42 +01:00
|
|
|
@item --passphrase-repeat @code{n}
|
|
|
|
Specify how many times @command{@gpgname} will request a new
|
|
|
|
passphrase be repeated. This is useful for helping memorize a
|
|
|
|
passphrase. Defaults to 1 repetition.
|
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@item --passphrase-fd @code{n}
|
|
|
|
Read the passphrase from file descriptor @code{n}. Only the first line
|
|
|
|
will be read from file descriptor @code{n}. If you use 0 for @code{n},
|
2008-12-08 20:10:42 +01:00
|
|
|
the passphrase will be read from STDIN. This can only be used if only
|
2006-09-19 18:25:51 +02:00
|
|
|
one passphrase is supplied.
|
2006-10-04 19:22:24 +02:00
|
|
|
@ifclear gpgone
|
|
|
|
Note that this passphrase is only used if the option @option{--batch}
|
|
|
|
has also been given. This is different from @command{gpg}.
|
|
|
|
@end ifclear
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@item --passphrase-file @code{file}
|
|
|
|
Read the passphrase from file @code{file}. Only the first line will
|
|
|
|
be read from file @code{file}. This can only be used if only one
|
|
|
|
passphrase is supplied. Obviously, a passphrase stored in a file is
|
|
|
|
of questionable security if other users can read this file. Don't use
|
|
|
|
this option if you can avoid it.
|
2006-10-04 19:22:24 +02:00
|
|
|
@ifclear gpgone
|
|
|
|
Note that this passphrase is only used if the option @option{--batch}
|
|
|
|
has also been given. This is different from @command{gpg}.
|
|
|
|
@end ifclear
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@item --passphrase @code{string}
|
|
|
|
Use @code{string} as the passphrase. This can only be used if only one
|
|
|
|
passphrase is supplied. Obviously, this is of very questionable
|
|
|
|
security on a multi-user system. Don't use this option if you can
|
|
|
|
avoid it.
|
2006-10-04 19:22:24 +02:00
|
|
|
@ifclear gpgone
|
|
|
|
Note that this passphrase is only used if the option @option{--batch}
|
|
|
|
has also been given. This is different from @command{gpg}.
|
|
|
|
@end ifclear
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@item --command-fd @code{n}
|
|
|
|
This is a replacement for the deprecated shared-memory IPC mode.
|
|
|
|
If this option is enabled, user input on questions is not expected
|
|
|
|
from the TTY but from the given file descriptor. It should be used
|
2006-09-25 20:29:20 +02:00
|
|
|
together with @option{--status-fd}. See the file doc/DETAILS in the source
|
2006-09-19 18:25:51 +02:00
|
|
|
distribution for details on how to use it.
|
|
|
|
|
|
|
|
@item --command-file @code{file}
|
2006-09-25 20:29:20 +02:00
|
|
|
Same as @option{--command-fd}, except the commands are read out of file
|
2006-09-19 18:25:51 +02:00
|
|
|
@code{file}
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
@item --allow-non-selfsigned-uid
|
|
|
|
@itemx --no-allow-non-selfsigned-uid
|
|
|
|
Allow the import and use of keys with user IDs which are not
|
|
|
|
self-signed. This is not recommended, as a non self-signed user ID is
|
2006-09-25 20:29:20 +02:00
|
|
|
trivial to forge. @option{--no-allow-non-selfsigned-uid} disables.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
@item --allow-freeform-uid
|
|
|
|
Disable all checks on the form of the user ID while generating a new
|
|
|
|
one. This option should only be used in very special environments as
|
|
|
|
it does not ensure the de-facto standard format of user IDs.
|
|
|
|
|
|
|
|
@item --ignore-time-conflict
|
|
|
|
GnuPG normally checks that the timestamps associated with keys and
|
|
|
|
signatures have plausible values. However, sometimes a signature
|
|
|
|
seems to be older than the key due to clock problems. This option
|
2006-09-25 20:29:20 +02:00
|
|
|
makes these checks just a warning. See also @option{--ignore-valid-from} for
|
2006-08-16 16:54:19 +02:00
|
|
|
timestamp issues on subkeys.
|
|
|
|
|
|
|
|
@item --ignore-valid-from
|
|
|
|
GnuPG normally does not select and use subkeys created in the future.
|
|
|
|
This option allows the use of such keys and thus exhibits the
|
|
|
|
pre-1.0.7 behaviour. You should not use this option unless you there
|
2006-09-25 20:29:20 +02:00
|
|
|
is some clock problem. See also @option{--ignore-time-conflict} for timestamp
|
2006-08-16 16:54:19 +02:00
|
|
|
issues with signatures.
|
|
|
|
|
|
|
|
@item --ignore-crc-error
|
|
|
|
The ASCII armor used by OpenPGP is protected by a CRC checksum against
|
|
|
|
transmission errors. Occasionally the CRC gets mangled somewhere on
|
|
|
|
the transmission channel but the actual content (which is protected by
|
|
|
|
the OpenPGP protocol anyway) is still okay. This option allows GnuPG
|
|
|
|
to ignore CRC errors.
|
|
|
|
|
|
|
|
@item --ignore-mdc-error
|
|
|
|
This option changes a MDC integrity protection failure into a warning.
|
|
|
|
This can be useful if a message is partially corrupt, but it is
|
|
|
|
necessary to get as much data as possible out of the corrupt message.
|
|
|
|
However, be aware that a MDC protection failure may also mean that the
|
|
|
|
message was tampered with intentionally by an attacker.
|
|
|
|
|
|
|
|
@item --no-default-keyring
|
|
|
|
Do not add the default keyrings to the list of keyrings. Note that
|
|
|
|
GnuPG will not operate without any keyrings, so if you use this option
|
2006-09-25 20:29:20 +02:00
|
|
|
and do not provide alternate keyrings via @option{--keyring} or
|
|
|
|
@option{--secret-keyring}, then GnuPG will still use the default public or
|
2006-08-16 16:54:19 +02:00
|
|
|
secret keyrings.
|
|
|
|
|
|
|
|
@item --skip-verify
|
|
|
|
Skip the signature verification step. This may be
|
|
|
|
used to make the decryption faster if the signature
|
|
|
|
verification is not needed.
|
|
|
|
|
|
|
|
@item --with-key-data
|
2006-09-25 20:29:20 +02:00
|
|
|
Print key listings delimited by colons (like @option{--with-colons}) and
|
|
|
|
print the public key data.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
@item --fast-list-mode
|
|
|
|
Changes the output of the list commands to work faster; this is achieved
|
2006-10-04 12:22:56 +02:00
|
|
|
by leaving some parts empty. Some applications don't need the user ID
|
|
|
|
and the trust information given in the listings. By using this options
|
|
|
|
they can get a faster listing. The exact behaviour of this option may
|
|
|
|
change in future versions. If you are missing some information, don't
|
|
|
|
use this option.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
@item --no-literal
|
|
|
|
This is not for normal use. Use the source to see for what it might be useful.
|
|
|
|
|
|
|
|
@item --set-filesize
|
|
|
|
This is not for normal use. Use the source to see for what it might be useful.
|
|
|
|
|
|
|
|
@item --show-session-key
|
2006-09-25 20:29:20 +02:00
|
|
|
Display the session key used for one message. See
|
|
|
|
@option{--override-session-key} for the counterpart of this option.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
We think that Key Escrow is a Bad Thing; however the user should have
|
|
|
|
the freedom to decide whether to go to prison or to reveal the content
|
|
|
|
of one specific message without compromising all messages ever
|
|
|
|
encrypted for one secret key. DON'T USE IT UNLESS YOU ARE REALLY
|
|
|
|
FORCED TO DO SO.
|
|
|
|
|
|
|
|
@item --override-session-key @code{string}
|
2006-09-25 20:29:20 +02:00
|
|
|
Don't use the public key but the session key @code{string}. The format
|
|
|
|
of this string is the same as the one printed by
|
|
|
|
@option{--show-session-key}. This option is normally not used but comes
|
|
|
|
handy in case someone forces you to reveal the content of an encrypted
|
|
|
|
message; using this option you can do this without handing out the
|
|
|
|
secret key.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
@item --ask-sig-expire
|
|
|
|
@itemx --no-ask-sig-expire
|
|
|
|
When making a data signature, prompt for an expiration time. If this
|
|
|
|
option is not specified, the expiration time set via
|
2006-09-25 20:29:20 +02:00
|
|
|
@option{--default-sig-expire} is used. @option{--no-ask-sig-expire}
|
|
|
|
disables this option. Note that by default, @option{--force-v3-sigs} is
|
|
|
|
set which also disables this option. If you want signature expiration,
|
|
|
|
you must set @option{--no-force-v3-sigs} as well as turning
|
|
|
|
@option{--ask-sig-expire} on.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
@item --default-sig-expire
|
|
|
|
The default expiration time to use for signature expiration. Valid
|
|
|
|
values are "0" for no expiration, a number followed by the letter d
|
|
|
|
(for days), w (for weeks), m (for months), or y (for years) (for
|
|
|
|
example "2m" for two months, or "5y" for five years), or an absolute
|
|
|
|
date in the form YYYY-MM-DD. Defaults to "0".
|
|
|
|
|
|
|
|
@item --ask-cert-expire
|
|
|
|
@itemx --no-ask-cert-expire
|
|
|
|
When making a key signature, prompt for an expiration time. If this
|
|
|
|
option is not specified, the expiration time set via
|
2006-09-25 20:29:20 +02:00
|
|
|
@option{--default-cert-expire} is used. @option{--no-ask-cert-expire}
|
|
|
|
disables this option.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
@item --default-cert-expire
|
|
|
|
The default expiration time to use for key signature expiration.
|
|
|
|
Valid values are "0" for no expiration, a number followed by the
|
|
|
|
letter d (for days), w (for weeks), m (for months), or y (for years)
|
|
|
|
(for example "2m" for two months, or "5y" for five years), or an
|
|
|
|
absolute date in the form YYYY-MM-DD. Defaults to "0".
|
|
|
|
|
|
|
|
@item --allow-secret-key-import
|
|
|
|
This is an obsolete option and is not used anywhere.
|
|
|
|
|
2007-03-05 15:56:31 +01:00
|
|
|
@item --allow-multiple-messages
|
|
|
|
@item --no-allow-multiple-messages
|
2008-08-07 09:46:52 +02:00
|
|
|
Allow processing of multiple OpenPGP messages contained in a single file
|
|
|
|
or stream. Some programs that call GPG are not prepared to deal with
|
|
|
|
multiple messages being processed together, so this option defaults to
|
|
|
|
no. Note that versions of GPG prior to 1.4.7 always allowed multiple
|
|
|
|
messages.
|
|
|
|
|
|
|
|
Warning: Do not use this option unless you need it as a temporary
|
|
|
|
workaround!
|
|
|
|
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
@item --enable-special-filenames
|
|
|
|
This options enables a mode in which filenames of the form
|
|
|
|
@file{-&n}, where n is a non-negative decimal number,
|
|
|
|
refer to the file descriptor n and not to a file with that name.
|
|
|
|
|
|
|
|
@item --no-expensive-trust-checks
|
|
|
|
Experimental use only.
|
|
|
|
|
|
|
|
@item --preserve-permissions
|
|
|
|
Don't change the permissions of a secret keyring back to user
|
|
|
|
read/write only. Use this option only if you really know what you are doing.
|
|
|
|
|
|
|
|
@item --default-preference-list @code{string}
|
|
|
|
@opindex default-preference-list
|
|
|
|
Set the list of default preferences to @code{string}. This preference
|
|
|
|
list is used for new keys and becomes the default for "setpref" in the
|
|
|
|
edit menu.
|
|
|
|
|
|
|
|
@item --default-keyserver-url @code{name}
|
|
|
|
@opindex default-keyserver-url
|
|
|
|
Set the default keyserver URL to @code{name}. This keyserver will be
|
|
|
|
used as the keyserver URL when writing a new self-signature on a key,
|
|
|
|
which includes key generation and changing preferences.
|
|
|
|
|
2006-08-17 20:01:25 +02:00
|
|
|
@item --list-config
|
2006-08-16 16:54:19 +02:00
|
|
|
@opindex list-config
|
2006-09-25 20:29:20 +02:00
|
|
|
Display various internal configuration parameters of GnuPG. This option
|
|
|
|
is intended for external programs that call GnuPG to perform tasks, and
|
|
|
|
is thus not generally useful. See the file @file{doc/DETAILS} in the
|
|
|
|
source distribution for the details of which configuration items may be
|
|
|
|
listed. @option{--list-config} is only usable with
|
|
|
|
@option{--with-colons} set.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-10-24 16:45:34 +02:00
|
|
|
@item --gpgconf-list
|
|
|
|
@opindex gpgconf-list
|
2007-12-13 16:45:40 +01:00
|
|
|
This command is similar to @option{--list-config} but in general only
|
2006-10-24 16:45:34 +02:00
|
|
|
internally used by the @command{gpgconf} tool.
|
|
|
|
|
|
|
|
@item --gpgconf-test
|
|
|
|
@opindex gpgconf-test
|
|
|
|
This is more or less dummy action. However it parses the configuration
|
2007-12-13 16:45:40 +01:00
|
|
|
file and returns with failure if the configuration file would prevent
|
2006-10-24 16:45:34 +02:00
|
|
|
@command{gpg} from startup. Thus it may be used to run a syntax check
|
|
|
|
on the configuration file.
|
|
|
|
|
2006-08-16 16:54:19 +02:00
|
|
|
@end table
|
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@c *******************************
|
|
|
|
@c ******* Deprecated ************
|
|
|
|
@c *******************************
|
|
|
|
@subsection Deprecated options
|
|
|
|
|
|
|
|
@table @gnupgtabopt
|
|
|
|
|
2006-09-25 20:29:20 +02:00
|
|
|
@ifset gpgone
|
2006-09-19 18:25:51 +02:00
|
|
|
@item --load-extension @code{name}
|
|
|
|
Load an extension module. If @code{name} does not contain a slash it is
|
|
|
|
searched for in the directory configured when GnuPG was built
|
|
|
|
(generally "/usr/local/lib/gnupg"). Extensions are not generally
|
|
|
|
useful anymore, and the use of this option is deprecated.
|
2006-09-25 20:29:20 +02:00
|
|
|
@end ifset
|
2006-09-19 18:25:51 +02:00
|
|
|
|
|
|
|
@item --show-photos
|
|
|
|
@itemx --no-show-photos
|
2006-09-25 20:29:20 +02:00
|
|
|
Causes @option{--list-keys}, @option{--list-sigs},
|
|
|
|
@option{--list-public-keys}, @option{--list-secret-keys}, and verifying
|
|
|
|
a signature to also display the photo ID attached to the key, if
|
|
|
|
any. See also @option{--photo-viewer}. These options are deprecated. Use
|
|
|
|
@option{--list-options [no-]show-photos} and/or @option{--verify-options
|
|
|
|
[no-]show-photos} instead.
|
2006-09-19 18:25:51 +02:00
|
|
|
|
|
|
|
@item --show-keyring
|
|
|
|
Display the keyring name at the head of key listings to show which
|
|
|
|
keyring a given key resides on. This option is deprecated: use
|
2006-09-25 20:29:20 +02:00
|
|
|
@option{--list-options [no-]show-keyring} instead.
|
2006-09-19 18:25:51 +02:00
|
|
|
|
2007-02-18 14:48:03 +01:00
|
|
|
@ifset gpgone
|
2006-09-19 18:25:51 +02:00
|
|
|
@item --ctapi-driver @code{file}
|
|
|
|
Use @code{file} to access the smartcard reader. The current default
|
|
|
|
is `libtowitoko.so'. Note that the use of this interface is
|
|
|
|
deprecated; it may be removed in future releases.
|
2007-02-18 14:48:03 +01:00
|
|
|
@end ifset
|
2006-09-19 18:25:51 +02:00
|
|
|
|
|
|
|
@item --always-trust
|
2006-09-25 20:29:20 +02:00
|
|
|
Identical to @option{--trust-model always}. This option is deprecated.
|
2006-09-19 18:25:51 +02:00
|
|
|
|
|
|
|
@item --show-notation
|
|
|
|
@itemx --no-show-notation
|
2006-09-25 20:29:20 +02:00
|
|
|
Show signature notations in the @option{--list-sigs} or @option{--check-sigs} listings
|
2006-09-19 18:25:51 +02:00
|
|
|
as well as when verifying a signature with a notation in it. These
|
2006-09-25 20:29:20 +02:00
|
|
|
options are deprecated. Use @option{--list-options [no-]show-notation}
|
|
|
|
and/or @option{--verify-options [no-]show-notation} instead.
|
2006-09-19 18:25:51 +02:00
|
|
|
|
|
|
|
@item --show-policy-url
|
|
|
|
@itemx --no-show-policy-url
|
2006-09-25 20:29:20 +02:00
|
|
|
Show policy URLs in the @option{--list-sigs} or @option{--check-sigs}
|
|
|
|
listings as well as when verifying a signature with a policy URL in
|
|
|
|
it. These options are deprecated. Use @option{--list-options
|
|
|
|
[no-]show-policy-url} and/or @option{--verify-options
|
|
|
|
[no-]show-policy-url} instead.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
|
2006-09-19 18:25:51 +02:00
|
|
|
@end table
|
|
|
|
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
@c *******************************************
|
|
|
|
@c *************** ****************
|
|
|
|
@c *************** FILES ****************
|
|
|
|
@c *************** ****************
|
|
|
|
@c *******************************************
|
2006-08-17 20:01:25 +02:00
|
|
|
@mansect files
|
2006-08-16 16:54:19 +02:00
|
|
|
@node GPG Configuration
|
|
|
|
@section Configuration files
|
|
|
|
|
|
|
|
There are a few configuration files to control certain aspects of
|
2006-09-22 16:38:38 +02:00
|
|
|
@command{@gpgname}'s operation. Unless noted, they are expected in the
|
2006-08-16 16:54:19 +02:00
|
|
|
current home directory (@pxref{option --homedir}).
|
|
|
|
|
|
|
|
@table @file
|
|
|
|
|
|
|
|
@item gpg.conf
|
2009-07-22 12:24:46 +02:00
|
|
|
@cindex gpg.conf
|
2006-09-22 16:38:38 +02:00
|
|
|
This is the standard configuration file read by @command{@gpgname} on
|
2006-08-16 16:54:19 +02:00
|
|
|
startup. It may contain any valid long option; the leading two dashes
|
|
|
|
may not be entered and the option may not be abbreviated. This default
|
2009-07-22 12:24:46 +02:00
|
|
|
name may be changed on the command line (@pxref{option --options}).
|
|
|
|
You should backup this file.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
@end table
|
|
|
|
|
2006-08-17 20:01:25 +02:00
|
|
|
@c man:.RE
|
2006-08-16 16:54:19 +02:00
|
|
|
Note that on larger installations, it is useful to put predefined files
|
|
|
|
into the directory @file{/etc/skel/.gnupg/} so that newly created users
|
2006-12-06 11:16:50 +01:00
|
|
|
start up with a working configuration.
|
|
|
|
@ifclear gpgone
|
|
|
|
For existing users the a small
|
2006-08-16 16:54:19 +02:00
|
|
|
helper script is provided to create these files (@pxref{addgnupghome}).
|
2006-12-06 11:16:50 +01:00
|
|
|
@end ifclear
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2007-12-13 16:45:40 +01:00
|
|
|
For internal purposes @command{@gpgname} creates and maintains a few other
|
2006-08-16 16:54:19 +02:00
|
|
|
files; They all live in in the current home directory (@pxref{option
|
2006-09-22 16:38:38 +02:00
|
|
|
--homedir}). Only the @command{@gpgname} may modify these files.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-08-17 20:01:25 +02:00
|
|
|
|
2006-08-16 16:54:19 +02:00
|
|
|
@table @file
|
2006-08-17 20:01:25 +02:00
|
|
|
@item ~/.gnupg/secring.gpg
|
2009-07-22 12:24:46 +02:00
|
|
|
The secret keyring. You should backup this file.
|
2006-08-17 20:01:25 +02:00
|
|
|
|
|
|
|
@item ~/.gnupg/secring.gpg.lock
|
2009-07-22 15:33:46 +02:00
|
|
|
The lock file for the secret keyring.
|
2006-08-17 20:01:25 +02:00
|
|
|
|
|
|
|
@item ~/.gnupg/pubring.gpg
|
2009-07-22 12:24:46 +02:00
|
|
|
The public keyring. You should backup this file.
|
2006-08-17 20:01:25 +02:00
|
|
|
|
|
|
|
@item ~/.gnupg/pubring.gpg.lock
|
2009-07-22 12:24:46 +02:00
|
|
|
The lock file for the public keyring.
|
2006-08-17 20:01:25 +02:00
|
|
|
|
|
|
|
@item ~/.gnupg/trustdb.gpg
|
2009-07-22 12:24:46 +02:00
|
|
|
The trust database. There is no need to backup this file; it is better
|
|
|
|
to backup the ownertrust values (@pxref{option --export-ownertrust}).
|
2006-08-17 20:01:25 +02:00
|
|
|
|
|
|
|
@item ~/.gnupg/trustdb.gpg.lock
|
2009-07-22 12:24:46 +02:00
|
|
|
The lock file for the trust database.
|
2006-08-17 20:01:25 +02:00
|
|
|
|
|
|
|
@item ~/.gnupg/random_seed
|
2009-07-22 15:33:46 +02:00
|
|
|
A file used to preserve the state of the internal random pool.
|
2006-08-17 20:01:25 +02:00
|
|
|
|
|
|
|
@item /usr[/local]/share/gnupg/options.skel
|
2009-07-22 12:24:46 +02:00
|
|
|
The skeleton options file.
|
2006-08-17 20:01:25 +02:00
|
|
|
|
|
|
|
@item /usr[/local]/lib/gnupg/
|
2009-07-22 12:24:46 +02:00
|
|
|
Default location for extensions.
|
2006-08-17 20:01:25 +02:00
|
|
|
|
|
|
|
@end table
|
|
|
|
|
|
|
|
@c man:.RE
|
|
|
|
Operation is further controlled by a few environment variables:
|
|
|
|
|
|
|
|
@table @asis
|
|
|
|
|
|
|
|
@item HOME
|
|
|
|
Used to locate the default home directory.
|
|
|
|
|
|
|
|
@item GNUPGHOME
|
|
|
|
If set directory used instead of "~/.gnupg".
|
|
|
|
|
|
|
|
@item GPG_AGENT_INFO
|
2006-09-25 20:29:20 +02:00
|
|
|
Used to locate the gpg-agent.
|
|
|
|
@ifset gpgone
|
|
|
|
This is only honored when @option{--use-agent} is set.
|
|
|
|
@end ifset
|
|
|
|
The value consists of 3 colon delimited fields: The first is the path
|
|
|
|
to the Unix Domain Socket, the second the PID of the gpg-agent and the
|
|
|
|
protocol version which should be set to 1. When starting the gpg-agent
|
|
|
|
as described in its documentation, this variable is set to the correct
|
|
|
|
value. The option @option{--gpg-agent-info} can be used to override it.
|
2006-08-17 20:01:25 +02:00
|
|
|
|
2007-11-19 17:03:50 +01:00
|
|
|
@item PINENTRY_USER_DATA
|
|
|
|
This value is passed via gpg-agent to pinentry. It is useful to convey
|
2009-07-22 15:33:46 +02:00
|
|
|
extra information to a custom pinentry.
|
2007-11-19 17:03:50 +01:00
|
|
|
|
2006-08-17 20:01:25 +02:00
|
|
|
@item COLUMNS
|
|
|
|
@itemx LINES
|
|
|
|
Used to size some displays to the full size of the screen.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2007-02-26 21:24:29 +01:00
|
|
|
|
|
|
|
@item LANGUAGE
|
|
|
|
Apart from its use by GNU, it is used in the W32 version to override the
|
2009-07-22 15:33:46 +02:00
|
|
|
language selection done through the Registry. If used and set to a
|
2007-02-26 21:24:29 +01:00
|
|
|
valid and available language name (@var{langid}), the file with the
|
|
|
|
translation is loaded from
|
|
|
|
@code{@var{gpgdir}/gnupg.nls/@var{langid}.mo}. Here @var{gpgdir} is the
|
2009-07-22 15:33:46 +02:00
|
|
|
directory out of which the gpg binary has been loaded. If it can't be
|
2008-03-25 20:41:11 +01:00
|
|
|
loaded the Registry is tried and as last resort the native Windows
|
|
|
|
locale system is used.
|
2007-02-26 21:24:29 +01:00
|
|
|
|
2006-08-16 16:54:19 +02:00
|
|
|
@end table
|
|
|
|
|
|
|
|
|
|
|
|
@c *******************************************
|
|
|
|
@c *************** ****************
|
|
|
|
@c *************** EXAMPLES ****************
|
|
|
|
@c *************** ****************
|
|
|
|
@c *******************************************
|
2006-08-17 20:01:25 +02:00
|
|
|
@mansect examples
|
2006-08-16 16:54:19 +02:00
|
|
|
@node GPG Examples
|
|
|
|
@section Examples
|
|
|
|
|
2006-08-17 20:01:25 +02:00
|
|
|
@table @asis
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-08-17 20:01:25 +02:00
|
|
|
@item gpg -se -r @code{Bob} @code{file}
|
|
|
|
sign and encrypt for user Bob
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-08-17 20:01:25 +02:00
|
|
|
@item gpg --clearsign @code{file}
|
|
|
|
make a clear text signature
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-08-17 20:01:25 +02:00
|
|
|
@item gpg -sb @code{file}
|
|
|
|
make a detached signature
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2008-09-23 11:57:45 +02:00
|
|
|
@item gpg -u 0x12345678 -sb @code{file}
|
|
|
|
make a detached signature with the key 0x12345678
|
|
|
|
|
2006-08-17 20:01:25 +02:00
|
|
|
@item gpg --list-keys @code{user_ID}
|
|
|
|
show keys
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-08-17 20:01:25 +02:00
|
|
|
@item gpg --fingerprint @code{user_ID}
|
|
|
|
show fingerprint
|
2006-08-16 16:54:19 +02:00
|
|
|
|
2006-08-17 20:01:25 +02:00
|
|
|
@item gpg --verify @code{pgpfile}
|
|
|
|
@itemx gpg --verify @code{sigfile}
|
|
|
|
Verify the signature of the file but do not output the data. The
|
|
|
|
second form is used for detached signatures, where @code{sigfile}
|
|
|
|
is the detached signature (either ASCII armored or binary) and
|
|
|
|
are the signed data; if this is not given, the name of
|
|
|
|
the file holding the signed data is constructed by cutting off the
|
|
|
|
extension (".asc" or ".sig") of @code{sigfile} or by asking the
|
|
|
|
user for the filename.
|
|
|
|
@end table
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
|
2006-09-08 19:02:06 +02:00
|
|
|
@c *******************************************
|
|
|
|
@c *************** ****************
|
|
|
|
@c *************** USER ID ****************
|
|
|
|
@c *************** ****************
|
|
|
|
@c *******************************************
|
2006-08-17 20:01:25 +02:00
|
|
|
@mansect how to specify a user id
|
2006-09-08 19:02:06 +02:00
|
|
|
@ifset isman
|
|
|
|
@include specify-user-id.texi
|
|
|
|
@end ifset
|
2006-08-17 20:01:25 +02:00
|
|
|
|
2007-12-13 16:45:40 +01:00
|
|
|
@mansect return value
|
2006-08-16 16:54:19 +02:00
|
|
|
@chapheading RETURN VALUE
|
|
|
|
|
|
|
|
The program returns 0 if everything was fine, 1 if at least
|
|
|
|
a signature was bad, and other error codes for fatal errors.
|
|
|
|
|
2006-08-17 20:01:25 +02:00
|
|
|
@mansect warnings
|
|
|
|
@chapheading WARNINGS
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
Use a *good* password for your user account and a *good* passphrase
|
|
|
|
to protect your secret key. This passphrase is the weakest part of the
|
|
|
|
whole system. Programs to do dictionary attacks on your secret keyring
|
|
|
|
are very easy to write and so you should protect your "~/.gnupg/"
|
|
|
|
directory very well.
|
|
|
|
|
|
|
|
Keep in mind that, if this program is used over a network (telnet), it
|
|
|
|
is *very* easy to spy out your passphrase!
|
|
|
|
|
|
|
|
If you are going to verify detached signatures, make sure that the
|
|
|
|
program knows about it; either give both filenames on the command line
|
2008-12-08 20:10:42 +01:00
|
|
|
or use @samp{-} to specify STDIN.
|
2006-08-17 20:01:25 +02:00
|
|
|
|
|
|
|
@mansect interoperability
|
2006-08-16 16:54:19 +02:00
|
|
|
@chapheading INTEROPERABILITY WITH OTHER OPENPGP PROGRAMS
|
|
|
|
|
|
|
|
GnuPG tries to be a very flexible implementation of the OpenPGP
|
|
|
|
standard. In particular, GnuPG implements many of the optional parts
|
|
|
|
of the standard, such as the SHA-512 hash, and the ZLIB and BZIP2
|
|
|
|
compression algorithms. It is important to be aware that not all
|
|
|
|
OpenPGP programs implement these optional algorithms and that by
|
2007-10-26 06:16:42 +02:00
|
|
|
forcing their use via the @option{--cipher-algo},
|
|
|
|
@option{--digest-algo}, @option{--cert-digest-algo}, or
|
|
|
|
@option{--compress-algo} options in GnuPG, it is possible to create a
|
|
|
|
perfectly valid OpenPGP message, but one that cannot be read by the
|
|
|
|
intended recipient.
|
2006-08-16 16:54:19 +02:00
|
|
|
|
|
|
|
There are dozens of variations of OpenPGP programs available, and each
|
|
|
|
supports a slightly different subset of these optional algorithms.
|
|
|
|
For example, until recently, no (unhacked) version of PGP supported
|
|
|
|
the BLOWFISH cipher algorithm. A message using BLOWFISH simply could
|
|
|
|
not be read by a PGP user. By default, GnuPG uses the standard
|
|
|
|
OpenPGP preferences system that will always do the right thing and
|
|
|
|
create messages that are usable by all recipients, regardless of which
|
|
|
|
OpenPGP program they use. Only override this safe default if you
|
|
|
|
really know what you are doing.
|
|
|
|
|
2006-09-25 20:29:20 +02:00
|
|
|
If you absolutely must override the safe default, or if the preferences
|
|
|
|
on a given key are invalid for some reason, you are far better off using
|
|
|
|
the @option{--pgp6}, @option{--pgp7}, or @option{--pgp8} options. These
|
|
|
|
options are safe as they do not force any particular algorithms in
|
|
|
|
violation of OpenPGP, but rather reduce the available algorithms to a
|
|
|
|
"PGP-safe" list.
|
2006-08-17 20:01:25 +02:00
|
|
|
|
|
|
|
@mansect bugs
|
2006-08-16 16:54:19 +02:00
|
|
|
@chapheading BUGS
|
|
|
|
|
2010-02-11 12:34:34 +01:00
|
|
|
On older systems this program should be installed as setuid(root). This
|
2006-08-16 16:54:19 +02:00
|
|
|
is necessary to lock memory pages. Locking memory pages prevents the
|
|
|
|
operating system from writing memory pages (which may contain
|
|
|
|
passphrases or other sensitive material) to disk. If you get no
|
|
|
|
warning message about insecure memory your operating system supports
|
|
|
|
locking without being root. The program drops root privileges as soon
|
|
|
|
as locked memory is allocated.
|
|
|
|
|
2007-01-18 00:38:56 +01:00
|
|
|
Note also that some systems (especially laptops) have the ability to
|
|
|
|
``suspend to disk'' (also known as ``safe sleep'' or ``hibernate'').
|
|
|
|
This writes all memory to disk before going into a low power or even
|
|
|
|
powered off mode. Unless measures are taken in the operating system
|
|
|
|
to protect the saved memory, passphrases or other sensitive material
|
|
|
|
may be recoverable from it later.
|
|
|
|
|
2010-02-11 12:34:34 +01:00
|
|
|
Before you report a bug you should first search the mailing list
|
|
|
|
archives for similar problems and second check whether such a bug has
|
|
|
|
already been reported to our bug tracker at http://bugs.gnupg.org .
|
|
|
|
|
2006-09-04 16:53:20 +02:00
|
|
|
@mansect see also
|
|
|
|
@ifset isman
|
|
|
|
@command{gpgv}(1),
|
2006-12-06 11:16:50 +01:00
|
|
|
@ifclear gpgone
|
2006-09-04 16:53:20 +02:00
|
|
|
@command{gpgsm}(1),
|
|
|
|
@command{gpg-agent}(1)
|
2006-12-06 11:16:50 +01:00
|
|
|
@end ifclear
|
2006-09-04 16:53:20 +02:00
|
|
|
@end ifset
|
|
|
|
@include see-also-note.texi
|