2004-01-29 20:16:59 +00:00
|
|
|
The GNU Privacy Guard 2
|
|
|
|
=========================
|
|
|
|
Version 1.9.x
|
2002-06-29 14:15:02 +00:00
|
|
|
|
|
|
|
|
2004-01-29 20:16:59 +00:00
|
|
|
GnuPG 1.9 is the future version of GnuPG; it is based on the gnupg-1.3
|
|
|
|
code and the previous newpg package. It will eventually lead to a
|
|
|
|
GnuPG 2.0 release. Note that GnuPG 1.3 and 1.9 are not always in sync
|
|
|
|
and thus features and bug fixes done in 1.3 are not necessary
|
|
|
|
available in 1.9.
|
|
|
|
|
|
|
|
|
|
|
|
BUILD INSTRUCTIONS
|
|
|
|
==================
|
|
|
|
|
|
|
|
GnuPG 1.9 depends on the following packages:
|
|
|
|
|
|
|
|
libgpg-error (ftp://ftp.gnupg.org/gcrypt/alpha/libgpg-error/)
|
|
|
|
libgcrypt (ftp://ftp.gnupg.org/gcrypt/alpha/libgcrypt/)
|
|
|
|
libassuan (ftp://ftp.gnupg.org/gcrypt/alpha/libassuan/)
|
|
|
|
libksba (ftp://ftp.gnupg.org/gcrypt/alpha/libksba/)
|
|
|
|
|
|
|
|
You also need the pinentry package for most function of GnupG; however
|
|
|
|
it is not a build requirement. pinentry is available at
|
|
|
|
ftp://ftp.gnupg.org/gcrypt/pinentry/ .
|
|
|
|
|
|
|
|
You should get the latest versions of course, the GnuPG configure
|
|
|
|
script complains if a version is not sufficient.
|
|
|
|
|
|
|
|
After building and installing the above packages in the order as given
|
|
|
|
above, you may now continue with GnupG installation (you may also just
|
|
|
|
try to build GnuPG to see whether your already installed versions are
|
|
|
|
sufficient).
|
|
|
|
|
|
|
|
As with all packages, you just have to do
|
2003-12-23 11:05:19 +00:00
|
|
|
|
2004-01-29 20:16:59 +00:00
|
|
|
./configure
|
|
|
|
make
|
|
|
|
make install
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2004-01-29 20:16:59 +00:00
|
|
|
(Before doing install you might need to become root.)
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2004-01-29 20:16:59 +00:00
|
|
|
If everything succeeds, you have a working GnuPG with support for
|
|
|
|
S/MIME and smartcards. Note that there is no binary gpg but a gpg2 so
|
|
|
|
that this package won't confict with a GnuPG 1.2 or1.3
|
|
|
|
installation. gpg2 behaves just like gpg and it is possible to symlink
|
|
|
|
oto gpg if you want to use gpg 1.9.
|
|
|
|
|
|
|
|
In case of problem please ask on gpa-dev@gnupg.org for advise. Note
|
|
|
|
that this release is only expected to build on GNU and *BSD systems.
|
|
|
|
|
|
|
|
A texinfo manual named `gnupg.info' will get installed. Some commands
|
|
|
|
and options given below. See also the section `SMARTCARD INTRO'.
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-07-01 09:44:56 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
COMMANDS
|
|
|
|
========
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
gpgsm:
|
|
|
|
------
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
--learn-card
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2003-12-23 11:05:19 +00:00
|
|
|
Read information about the private keys from the smartcard and
|
2002-10-19 07:55:27 +00:00
|
|
|
import the certificates from there.
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
--export
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2003-12-23 11:05:19 +00:00
|
|
|
Export all certificates stored in the Keybox or those specified on
|
|
|
|
the command line. When using --armor a few informational lines are
|
|
|
|
prepended before each block.
|
2002-06-29 14:15:02 +00:00
|
|
|
|
|
|
|
|
2003-08-05 17:11:04 +00:00
|
|
|
gpg2:
|
|
|
|
-----
|
|
|
|
|
|
|
|
--card-status
|
|
|
|
|
|
|
|
Show information pertaining smartcards implementing the OpenPGP
|
|
|
|
application.
|
|
|
|
|
|
|
|
--change-pin
|
|
|
|
|
|
|
|
Offers a menu to change the PIN of OpenPGP smartcards and to reset
|
|
|
|
the retry counters.
|
|
|
|
|
2003-10-08 10:46:58 +00:00
|
|
|
--card-edit
|
|
|
|
|
|
|
|
Offers a menu to change any data object on the card and to generate
|
|
|
|
the keys.
|
2003-08-05 17:11:04 +00:00
|
|
|
|
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
OPTIONS
|
|
|
|
=======
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
gpgsm:
|
|
|
|
------
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
--include-certs <n>
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
Using N of -2 includes all certificate except for the Root cert,
|
|
|
|
-1 includes all certs, 0 does not include any certs, 1 includes only
|
|
|
|
the signers cert (this is the default) and all other positives
|
|
|
|
values include up to N certs starting with the signer cert.
|
|
|
|
|
|
|
|
--policy-file <filename>
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
Chnage the deault name of the policy file
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
--enable-policy-checks
|
|
|
|
--disable-policy-checks
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
By default policy checks are enabled. These options may be used to
|
|
|
|
change it.
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
--enable-crl-checks
|
|
|
|
--disable-crl-checks
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
By default the CRL checks are enabled and the DirMngr is used to
|
|
|
|
check for revoked certificates. The disable option is most useful
|
|
|
|
with a off-line connection to suppres this check.
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
--agent-program <path_to_agent_program>
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
Specify an agent program to be used for secret key operations. The
|
|
|
|
default value is "../agent/gpg-agent". This is only used as a
|
|
|
|
fallback when the envrionment varaibale GPG_AGENT_INFO is not set or
|
|
|
|
a running agent can't be connected.
|
|
|
|
|
|
|
|
--dirmngr-program <path_to_dirmgr_program>
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
Specify a dirmngr program to be used for CRL checks. The default
|
|
|
|
value is "/usr/sbin/dirmngr". This is only used as a fallback when
|
2003-12-23 11:05:19 +00:00
|
|
|
the environment varaibale DIRMNGR_INFO is not set or a running
|
2002-10-19 07:55:27 +00:00
|
|
|
dirmngr can't be connected.
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
--no-secmem-warning
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
Don't print the warning "no secure memory"
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
--armor
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
Create PEM ecoded output. Default is binary output.
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
--base64
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
Create Base-64 encoded output; i.e. PEM without the header lines.
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
--assume-armor
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
Assume the input data is PEM encoded. Default is to autodetect the
|
|
|
|
encoding but this is may fail.
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
--assume-base64
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
Assume the input data is plain base-64 encoded.
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
--assume-binary
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
Assume the input data is binary encoded.
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
--server
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
Run in server mode. This is used by GPGME to control gpgsm. See
|
|
|
|
the assuan specification regarding gpgsm about the used protocol.
|
|
|
|
Some options are ignored in server mode.
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
--local-user <user_id>
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
Set the user to be used for signing. The default is the first
|
|
|
|
secret key found in the database.
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
--with-key-data
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2004-01-27 16:40:42 +00:00
|
|
|
Displays extra information with the --list-keys commands. Especially
|
|
|
|
a line tagged "grp" is printed which tells you the keygrip of a
|
2002-10-19 07:55:27 +00:00
|
|
|
key. This is string is for example used as the filename of the
|
|
|
|
secret key.
|
2002-06-29 14:15:02 +00:00
|
|
|
|
|
|
|
|
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
gpg-agent:
|
|
|
|
---------
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
--pinentry-program <path_to_pinentry_program>
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
Specify the PINentry program. The default value is
|
2003-12-23 11:05:19 +00:00
|
|
|
"<prefix>/bin/pinentry" so you most likely want to specify it.
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
--no-grab
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2003-12-23 11:05:19 +00:00
|
|
|
Tell the pinentry not to grab keybourd and mouse. You most likely
|
2002-10-19 07:55:27 +00:00
|
|
|
want to give this option during testing and development to avoid
|
|
|
|
lockups in case of bugs.
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
|
2003-08-05 17:11:04 +00:00
|
|
|
scdaemon:
|
|
|
|
--------
|
|
|
|
|
|
|
|
--ctapi-driver <libraryname>
|
|
|
|
|
|
|
|
The default for Scdaemon is to use the PC/SC API currently provided
|
|
|
|
by libpcsclite.so. As an alternative the ctAPI can be used by
|
|
|
|
specify this option with the appropriate driver name
|
|
|
|
(e.g. libtowitoko.so).
|
|
|
|
|
|
|
|
--reader-port <portname>
|
|
|
|
|
|
|
|
This specifies the port of the chipcard reader. For PC/SC this is
|
|
|
|
currently ignored and the first PC/SC reader is used. For the
|
|
|
|
ctAPI, a number must be specified (the default is 32768 for the
|
|
|
|
first USB port).
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2004-01-29 20:16:59 +00:00
|
|
|
--disable-ccid
|
|
|
|
|
|
|
|
Disable the integrated support for CCID compliant readers. This
|
|
|
|
allows to fall back to one of the other drivers even if the internal
|
|
|
|
CCID driver can handle the reader. Note, that CCID support is only
|
|
|
|
available if libusb was available at build time.
|
2002-06-29 14:15:02 +00:00
|
|
|
|
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
FILES
|
|
|
|
=====
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
The default home directory is ~/.gnupg. It can be changed by
|
|
|
|
either the --homedir option or by seting the environment variable
|
|
|
|
GNUPGHOME. This is a list of files usually found in this directory:
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
gpgsm.conf
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
Options for gpgsm. Options are the same as the command line
|
|
|
|
options but don't enter the leading dashes and give arguments
|
|
|
|
without an equal sign. Blank lines and lines starting with a
|
|
|
|
hash mark as the first non whitye space character are ignored.
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
gpg-agent.conf
|
|
|
|
|
|
|
|
Options for gpg-agent
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
scdaemon.conf
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
Options for scdaemon.
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
dirmngr.conf
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
Options for the DirMngr which is not part of this package and
|
|
|
|
the option file wilol most likely be moved to /etc
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
gpg.conf
|
|
|
|
|
|
|
|
Options for gpg. Note that old versions of gpg use the
|
|
|
|
filename `options' instead of `gpg.conf'.
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2003-08-05 17:11:04 +00:00
|
|
|
gpg.conf-1.9.x
|
|
|
|
|
|
|
|
Options for gpg; tried before gpg.conf
|
|
|
|
|
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
policies.txt
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
A list of allowed CA policies. This file should give the
|
2003-08-05 17:11:04 +00:00
|
|
|
object identifiers of the policies line by line. Empty lines
|
2002-10-19 07:55:27 +00:00
|
|
|
and lines startung with a hash mark are ignored.
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
++++++++++
|
|
|
|
2.289.9.9
|
|
|
|
++++++++++
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
trustlist.txt
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
A list of trusted certificates usually maintained by
|
|
|
|
gpg-agent. It can however be edited manually. The file will
|
|
|
|
be created automagically with some explaining comments.
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
random_seed
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
Used internally for keeping the state of the RNG over
|
|
|
|
invocations.
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
pubring.kbx
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
The database file with the certificates.
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
pubring.gpg
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
The database file with the OpenPGP public keys. This will
|
|
|
|
eventually be merged with pubring.kbx
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
secring.gpg
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
The database file with the OpenPGP secret keys. This will be
|
|
|
|
removed when gpg is changed to make use of the gpg-agent.
|
2002-06-29 14:15:02 +00:00
|
|
|
|
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
private-keys-v1.d/
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
Directory holding the private keys maintained by gpg-agent.
|
|
|
|
For detailed info see agent/keyformat.txt. Note that there is
|
|
|
|
a helper tool gpg-protect-tool which may be used to protect or
|
|
|
|
unprotect keys. This is however nothing a user should care
|
|
|
|
about.
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-07-01 09:44:56 +00:00
|
|
|
|
2004-01-29 20:16:59 +00:00
|
|
|
SOURCE FILES
|
|
|
|
============
|
|
|
|
|
|
|
|
Here is a list of directories with source files:
|
|
|
|
|
|
|
|
jnlib/ utility functions
|
|
|
|
kbx/ keybox library
|
|
|
|
g10/ the gpg program here called gpg2
|
|
|
|
sm/ the gpgsm program
|
|
|
|
agent/ the gpg-agent
|
|
|
|
scd/ the smartcard daemon
|
|
|
|
doc/ documentation
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
HOW TO SPECIFY A USER ID
|
2002-10-19 07:55:27 +00:00
|
|
|
========================
|
|
|
|
|
|
|
|
Due to the way X.509 certificates are made up we need a few new ways
|
|
|
|
to specify a certificate (aka key in OpenPGP). In addition to the
|
|
|
|
ways a user ID can be specified with gpg, I have implemented 3 new
|
|
|
|
modes for gpgsm, here is the entire list of ways to specify a key:
|
|
|
|
|
|
|
|
* By keyID.
|
|
|
|
|
|
|
|
This format is deducded from the length of the string and its
|
|
|
|
content or "0x" prefix. For use with OpenPGP a exclamation mark may
|
|
|
|
be appended to force use of the specified (sub)key.
|
|
|
|
|
|
|
|
As with v34 OpenPGP keys, the keyID of an X509 certificate are the
|
|
|
|
low 64 bits of the SHA-1 fingerprint. The use of keyIDs is just a
|
|
|
|
shortcut, for all automated processing the fingerprint should be
|
|
|
|
used.
|
|
|
|
|
|
|
|
Examples:
|
|
|
|
|
|
|
|
234567C4
|
|
|
|
0F34E556E
|
|
|
|
01347A56A
|
|
|
|
0xAB123456
|
|
|
|
|
|
|
|
234AABBCC34567C4
|
|
|
|
0F323456784E56EAB
|
|
|
|
01AB3FED1347A5612
|
|
|
|
0x234AABBCC34567C4
|
|
|
|
|
|
|
|
* By fingerprint
|
|
|
|
|
|
|
|
This is format is deduced from the length of the string and its
|
|
|
|
content or "0x" prefix. Note, that only the 20 byte fingerprint is
|
|
|
|
used with GPGSM (SHA-1 hash of the certificate). For use with
|
|
|
|
OpenPGP a exclamation mark may be appended to force use of the
|
|
|
|
specified (sub)key.
|
|
|
|
|
|
|
|
Examples:
|
|
|
|
|
|
|
|
1234343434343434C434343434343434
|
|
|
|
123434343434343C3434343434343734349A3434
|
|
|
|
0E12343434343434343434EAB3484343434343434
|
|
|
|
0xE12343434343434343434EAB3484343434343434
|
|
|
|
|
|
|
|
* Exact match on OpenPGP user ID
|
|
|
|
|
|
|
|
This is denoted by a leading equal sign. It does not make much
|
|
|
|
sense for X.509.
|
|
|
|
|
|
|
|
Example:
|
|
|
|
|
|
|
|
=Heinrich Heine <heinrichh@uni-duesseldorf.de>
|
|
|
|
|
|
|
|
* Exact match on an email address.
|
|
|
|
|
|
|
|
This is indicated by enclosing the email address in the usual way
|
|
|
|
with left and right angles
|
|
|
|
|
|
|
|
Example:
|
|
|
|
|
|
|
|
<heinrichh@uni-duesseldorf.de>
|
|
|
|
|
|
|
|
* Word match
|
2002-07-04 13:35:42 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
All words must match exactly (not case sensitive) but can appear in
|
|
|
|
any order in the user ID or a subjects name. Words are any
|
|
|
|
sequences of letters, digits, the underscore and all characters
|
|
|
|
with bit 7 set.
|
2002-07-01 09:44:56 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
Example:
|
2002-07-01 09:44:56 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
+Heinrich Heine duesseldorf
|
2002-07-01 09:44:56 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
* [NEW] Exact match by subject's DN
|
2002-07-01 09:44:56 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
This is indicated by a leading slash, directly followed by the
|
2004-01-29 07:41:55 +00:00
|
|
|
rfc2253 encoded DN of the subject. Note that you can't use the
|
|
|
|
string printed by "gpgsm --list-keys" because that one as been
|
|
|
|
reordered and modified for better readability; use --with-colons to
|
|
|
|
print the raw (but standard escaped) rfc2253 string
|
2002-07-01 09:44:56 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
Example:
|
2002-07-01 09:44:56 +00:00
|
|
|
|
2004-01-29 07:41:55 +00:00
|
|
|
/CN=Heinrich Heine,O=Poets,L=Paris,C=FR
|
2002-07-01 09:44:56 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
* [NEW] Excact match by issuer's DN
|
2002-07-01 09:44:56 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
This is indicated by a leading hash mark, directly followed by a
|
|
|
|
slash and then directly followed by the rfc2253 encoded DN of the
|
2004-01-29 07:41:55 +00:00
|
|
|
issuer. This should return the Root cert of the issuer. See note
|
|
|
|
above.
|
2002-07-01 09:44:56 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
Example:
|
2002-07-01 09:44:56 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
#/CN=Root Cert,O=Poets,L=Paris,C=FR
|
2002-07-01 09:44:56 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
* [NEW] Exact match by serial number and subject's DN
|
2002-07-01 09:44:56 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
This is indicated by a hash mark, followed by the hexadecmal
|
|
|
|
representation of the serial number, the followed by a slahs and
|
2004-01-29 07:41:55 +00:00
|
|
|
the RFC2253 encoded DN of the issuer. See note above.
|
2002-07-01 09:44:56 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
Example:
|
2002-07-01 09:44:56 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
#4F03/CN=Root Cert,O=Poets,L=Paris,C=FR
|
2002-09-02 13:50:05 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
* Substring match
|
2002-07-01 09:44:56 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
By case insensitive substring matching. This is the default mode
|
|
|
|
but applications may want to explicitly indicate this by putting
|
|
|
|
the asterisk in front.
|
2002-07-01 09:44:56 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
Example:
|
2002-07-01 09:44:56 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
Heine
|
|
|
|
*Heine
|
2002-07-01 09:44:56 +00:00
|
|
|
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
Please note that we have reused the hash mark indentifier which was
|
|
|
|
used in old GnuPG versions to indicate the so called local-id. It is
|
|
|
|
not anymore used and there should be no conflict when used with X.509
|
|
|
|
stuff.
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
Using the rfc2253 format of DNs has the drawback that it is not
|
|
|
|
possible to map them back to the original encoding, however we don't
|
|
|
|
have to do this, because our key database stores this encoding as meta
|
|
|
|
data.
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2002-10-19 07:55:27 +00:00
|
|
|
Some of the search modes are not yet implemented ;-)
|
2002-06-29 14:15:02 +00:00
|
|
|
|
|
|
|
|
2004-01-29 20:16:59 +00:00
|
|
|
HOW TO IMPORT A PRIVATE KEY
|
2002-10-19 07:55:27 +00:00
|
|
|
===========================
|
|
|
|
There is some limited support to import a private key from a PKCS-12
|
2004-02-13 12:40:54 +00:00
|
|
|
file.
|
2002-06-29 14:15:02 +00:00
|
|
|
|
2004-02-13 12:40:54 +00:00
|
|
|
gpgsm --import foo.p12
|
|
|
|
|
|
|
|
This require that the gpg-agent is running.
|
2002-06-29 14:15:02 +00:00
|
|
|
|
1999-09-18 07:18:02 +00:00
|
|
|
|
2004-01-29 20:16:59 +00:00
|
|
|
HOW TO EXPORT A PRIVATE KEY
|
2002-10-19 07:55:27 +00:00
|
|
|
===========================
|
|
|
|
There is also limited support to export a private key in PKCS-12
|
|
|
|
format. However the certificate is not stored and there is no MAC applied.
|
2001-07-04 09:42:04 +00:00
|
|
|
|
2003-01-09 13:15:07 +00:00
|
|
|
gpgsm --call-protect-tool --p12-export foo.key >foo.p12
|
2001-07-04 09:42:04 +00:00
|
|
|
|
1999-07-23 12:03:01 +00:00
|
|
|
|
2004-01-29 20:16:59 +00:00
|
|
|
SMARTCARD INTRO
|
|
|
|
===============
|
|
|
|
|
2004-02-13 12:40:54 +00:00
|
|
|
GPG, the OpenPGP part of GnuPG, supports the OpenPGP smartcard
|
2004-01-29 20:16:59 +00:00
|
|
|
(surprise!); see http://g10code.com/p-card.html.
|
|
|
|
|
|
|
|
[Fixme: We need to explain this further]
|
|
|
|
|
|
|
|
|
2004-02-13 12:40:54 +00:00
|
|
|
GPGSM, the CMS (S/MIME) part of GnuPG, supports two kinds of
|
2004-01-29 20:16:59 +00:00
|
|
|
smartcards. The most flexible way is to use PKCS#15 compliant cards,
|
|
|
|
however you must have build GnuPG with support for the OpenSC library.
|
|
|
|
The build process automagically detects the presence of this library
|
|
|
|
and will include support for these cards.
|
|
|
|
|
|
|
|
The other card we currently support is the Telesec NetKey card with
|
|
|
|
the NKS 2.0 card application.
|
|
|
|
|
|
|
|
Before GPGSM can make use of a new card it must gather some
|
|
|
|
information, like the card's serial number, the public keys and the
|
|
|
|
certificates stored on the card. Thus for a new card you need to run
|
|
|
|
the command
|
|
|
|
|
|
|
|
gpgsm --learn-card
|
|
|
|
|
|
|
|
once. This is also a good test to see whether your card reader is
|
|
|
|
properly installed. See below in case of error. Once this has been
|
|
|
|
done you may use the keys stored on the card in the same way you use
|
|
|
|
keys stored on the disk. gpgsm automagically knows whether a card is
|
|
|
|
required and will pop up the pinentry to ask you to insert the
|
|
|
|
correct card.
|
|
|
|
|
|
|
|
For selecting the driver, see the options of scdaemon. A useful
|
|
|
|
debugging flag is "--debug 2048" showing the communication between
|
|
|
|
scdaemon and the reader.
|
|
|
|
|
|
|
|
[fixme: write more stuff]
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|