doc: Suggest the use of a fingerprint for --default-key.

--

GnuPG-bug-id: 6975
This commit is contained in:
Werner Koch 2024-02-05 08:53:06 +01:00
parent e5f24218fc
commit 5842eee805
No known key found for this signature in database
GPG Key ID: E3FDFF218E45B72B
1 changed files with 23 additions and 18 deletions

View File

@ -1290,19 +1290,22 @@ are usually found in the option file.
@item --default-key @var{name} @item --default-key @var{name}
@opindex default-key @opindex default-key
Use @var{name} as the default key to sign with. If this option is not Use @var{name} as the default key to sign with. It is suggested to
used, the default key is the first key found in the secret keyring. use a fingerprint or at least a long keyID for @var{name}. If this
Note that @option{-u} or @option{--local-user} overrides this option. option is not used, the default key is the first key found in the
This option may be given multiple times. In this case, the last key secret keyring. Note that @option{-u} or @option{--local-user}
for which a secret key is available is used. If there is no secret overrides this option. This option may be given multiple times. In
key available for any of the specified values, GnuPG will not emit an this case, the last key for which a secret key is available is used.
error message but continue as if this option wasn't given. If there is no secret key available for any of the specified values,
GnuPG will not emit an error message but continue as if this option
wasn't given.
@item --default-recipient @var{name} @item --default-recipient @var{name}
@opindex default-recipient @opindex default-recipient
Use @var{name} as default recipient if option @option{--recipient} is Use @var{name} as default recipient if option @option{--recipient} is
not used and don't ask if this is a valid one. @var{name} must be not used and don't ask if this is a valid one. @var{name} must be
non-empty. non-empty and it is suggested to use a fingerprint for @var{name}.
@item --default-recipient-self @item --default-recipient-self
@opindex default-recipient-self @opindex default-recipient-self
@ -2336,19 +2339,21 @@ the key in this file is fully valid.
@opindex encrypt-to @opindex encrypt-to
Same as @option{--recipient} but this one is intended for use in the Same as @option{--recipient} but this one is intended for use in the
options file and may be used with your own user-id as an options file and may be used with your own user-id as an
"encrypt-to-self". These keys are only used when there are other "encrypt-to-self". It is suggested to use a fingerprint or at least a
recipients given either by use of @option{--recipient} or by the asked long keyID for @var{name}. These keys are only used when there are
user id. No trust checking is performed for these user ids and even other recipients given either by use of @option{--recipient} or by the
disabled keys can be used. asked user id. No trust checking is performed for these user ids and
even disabled keys can be used.
@item --hidden-encrypt-to @var{name} @item --hidden-encrypt-to @var{name}
@opindex hidden-encrypt-to @opindex hidden-encrypt-to
Same as @option{--hidden-recipient} but this one is intended for use in the Same as @option{--hidden-recipient} but this one is intended for use
options file and may be used with your own user-id as a hidden in the options file and may be used with your own user-id as a hidden
"encrypt-to-self". These keys are only used when there are other "encrypt-to-self". It is suggested to use a fingerprint or at least a
recipients given either by use of @option{--recipient} or by the asked user id. long keyID for @var{name}. These keys are only used when there are
No trust checking is performed for these user ids and even disabled other recipients given either by use of @option{--recipient} or by the
keys can be used. asked user id. No trust checking is performed for these user ids and
even disabled keys can be used.
@item --no-encrypt-to @item --no-encrypt-to
@opindex no-encrypt-to @opindex no-encrypt-to