diff options
author | Werner Koch <wk@gnupg.org> | 1999-06-16 20:25:37 +0200 |
---|---|---|
committer | Werner Koch <wk@gnupg.org> | 1999-06-16 20:25:37 +0200 |
commit | 1423b4239b7ba81011e945d6eef5b9840f1de01c (patch) | |
tree | c0acd0b8ff3e1b51ce52e766598ea8ea46698516 /doc | |
parent | See ChangeLog: Tue Jun 15 14:23:10 CEST 1999 Werner Koch (diff) | |
download | gnupg2-1423b4239b7ba81011e945d6eef5b9840f1de01c.tar.xz gnupg2-1423b4239b7ba81011e945d6eef5b9840f1de01c.zip |
See ChangeLog: Wed Jun 16 20:16:21 CEST 1999 Werner Koch
Diffstat (limited to 'doc')
-rw-r--r-- | doc/Makefile.am | 18 | ||||
-rw-r--r-- | doc/gpg.1pod | 631 | ||||
-rw-r--r-- | doc/gpg.sgml | 1214 |
3 files changed, 1222 insertions, 641 deletions
diff --git a/doc/Makefile.am b/doc/Makefile.am index 460a63dbb..26f83e32b 100644 --- a/doc/Makefile.am +++ b/doc/Makefile.am @@ -1,25 +1,23 @@ ## Process this file with automake to create Makefile.in -EXTRA_DIST = DETAILS gpg.1pod gpg.1 FAQ HACKING OpenPGP +EXTRA_DIST = DETAILS gpg.sgml gpg.1 FAQ HACKING OpenPGP man_MANS = gpg.1 - -%: %pod - pod2man $< --section=`echo $@ | sed 's/^.*(?)$$/$$&/'`\ - --release="`date -r $< '+%d %b %Y'`"\ - --center="GNU Tools" --date=' '\ - >$@,$$$$ && mv -f $@,$$$$ $@\ - || rm -f $@,$$$$ - +%.1 : %.sgml +if HAVE_DOCBOOK_TO_MAN + docbook-to-man $< >$@ +else + : Warning: missing docbook-to-man, cannot make $@ +endif %.txt : %.sgml sgml2txt -c latin $* %.html : %.sgml - sgml2html -l deutsch -c latin $* + sgml2html -c latin $* %.dvi : %.sgml -rm $*.sgml.tmp diff --git a/doc/gpg.1pod b/doc/gpg.1pod deleted file mode 100644 index dc9a2e73e..000000000 --- a/doc/gpg.1pod +++ /dev/null @@ -1,631 +0,0 @@ -=head1 NAME - -gpg - GNU Privacy Guard - -=head1 SYNOPSIS - -B<gpg> [--homedir name] [--options file] [options] command [args] - -=head1 DESCRIPTION - -B<gpg> is the main program for the GnuPG system. - -=head1 COMMANDS - -B<gpg> recognizes these commands: - -B<-s>, B<--sign> - Make a signature. This option may be combined - with B<--encrypt>. - -B<--clearsign> - Make a clear text signature. - -B<-b>, B<--detach-sign> - Make a detached signature. - -B<-e>, B<--encrypt> - Encrypt data. This option may be combined with B<--sign>. - -B<-c>, B<--symmetric> - Encrypt with symmetric cipher only - This command asks for a passphrase. - -B<--store> - Store only (make a simple RFC1991 packet). - -B<--decrypt> [I<file>] - Decrypt file (or stdin if no file is specified) and - write it to stdout (or the file specified with - B<--output>). If the decrypted file is signed, the - signature is also verified. This command differs - from the default operation, as it never writes to the - filename which is included in the file and it - rejects files which don't begin with an encrypted - message. - -B<--verify> [[I<sigfile>] {I<signed-files>}] - Assume that I<sigfile> is a signature and verify it - without generating any output. With no arguments, - the signature packet is read from stdin (it may be a - detached signature when not used in batch mode). If - only a sigfile is given, it may be a complete - signature or a detached signature, in which case - the signed stuff is expected in a file without the - I<.sig> or I<.asc> extension (if such a file does - not exist it is expected at stdin - use B<-> as - filename to force a read from stdin). With more than - 1 argument, the first should be a detached signature - and the remaining files are the signed stuff. - -B<-k> [I<username>] [I<keyring>] - Kludge to be somewhat compatible with PGP. - Without arguments, all public keyrings are listed. - With one argument, only I<keyring> is listed. - Special combinations are also allowed, but they may - give strange results when combined with more options. - B<-kv> Same as B<-k> - B<-kvv> List the signatures with every key. - B<-kvvv> Additionally check all signatures. - B<-kvc> List fingerprints - B<-kvvc> List fingerprints and signatures - - B<This command may be removed in the future!> - -B<--list-keys> [I<names>] -B<--list-public-keys> [I<names>] - List all keys from the public keyrings, or just the - ones given on the command line. - -B<--list-secret-keys> [I<names>] - List all keys from the secret keyrings, or just the - ones given on the command line. - -B<--list-sigs> [I<names>] - Same as B<--list-keys>, but the signatures are listed - too. - -B<--check-sigs> [I<names>] - Same as B<--list-sigs>, but the signatures are verified. - -B<--fingerprint> [I<names>] - List all keys with their fingerprints. This is the - same output as B<list-keys> but with the additional output - of a line with the fingerprint. May also be combined - with B<--list-sigs> or B<--check-sigs>. - If this command is given twice, the fingerprints of all - secondary keys are listed too. - -B<--list-packets> - List only the sequence of packets. This is mainly - useful for debugging. - -B<--gen-key> - Generate a new key pair. This command can only be - used interactive. - - -B<--edit-key> I<name> - Present a menu which enables you to do all key - related tasks: - B<sign> - Make a signature on key of user I<name>. - If the key is not yet signed by the default - user (or the users given with B<-u>), the - program displays the information of the key - again, together with its fingerprint and - asks whether it should be signed. This - question is repeated for all users specified - with B<-u>. - B<lsign> - Same as B<sign> but the signature is marked as - non-exportbale and will therefore never be used - by others. This may be used to make keys valid - only in the local environment. - B<revsig> - Revoke a signature. GnuPG asks for every - every signature which has been done by one of - teh secret keys, whether a revocation - certificate should be generated. - B<trust> - Change the owner trust value. This updates the - trust-db immediately and no save is required. - B<adduid> - Create an alternate user id. - B<deluid> - Delete an user id. - B<addkey> - Add a subkey to this key. - B<delkey> - Remove a subkey. - B<revkey> - Revoke a subkey. - B<expire> - Change the key expiration time. If a key is - selected, the time of this key will be changed. - With no selection the key expiration of the - primary key is changed. - B<passwd> - Change the passphrase of the secret key. - B<uid> I<n> - Toggle selection of user id with index I<n>. - Use 0 to deselect all. - B<key> I<n> - Toggle selection of subkey with index I<n>. - Use 0 to deselect all. - B<check> - Check all selected user ids. - B<pref> - List preferences. - B<toggle> - Toggle between public and secret key listing. - B<save> - Save all changes to the key rings and quit. - B<quit> - Quit the program without updating the - key rings. - The listing shows you the key with its secondary - keys and all user ids. Selected keys or user ids - are indicated by an asterisk. The trust value is - displayed with the primary key: the first is the - assigned owner trust and the second is the calculated - trust value. Letters are used for the values: - B<-> No ownertrust assigned / not yet calculated. - B<e> Trust calculation has failed. - B<q> Not enough information for calculation. - B<n> Never trust this key. - B<m> Marginally trusted. - B<f> Fully trusted. - B<u> Ultimately trusted - - -B<--delete-key> - Remove key from the public keyring - -B<--delete-secret-key> - Remove key from the secret and public keyring - -B<--gen-revoke> - Generate a revocation certificate. - -B<--export> [I<names>] - Either export all keys from all keyrings (default - keyrings and those registered via option B<--keyring>), - or if at least one name is given, those of the given - name. The new keyring is written to F<stdout> or to - the file given with option "output". Use together - with B<-a> to mail those keys. - -B<--send-keys> [I<names>] - Same as B<--export> but sends the keys to a keyserver. - Option B<--keyserver> must be used to give the name - of this keyserver. Don't send your complete keyring - to a keyserver - select only those keys which are new - or changed by you. - -B<--export-all> [I<names>] - Same as B<--export> but does also export keys which - are not compatible to OpenPGP. - -B<--export-secret-keys> [I<names>] - Same as B<--export>, but does export the secret keys. - This is normally not very useful. - -B<--import>, B<--fast-import> - Import/merge keys. The fast version does not build - the trustdb; this can be done at any time with the - command B<--update-trustdb>. - -B<--recv-keys> I<key_IDs> - Import the keys with the given key IDs from a HKP - keyserver. Option B<--keyserver> must be used to - give the name of this keyserver. - -B<--export-ownertrust> - List the assigned ownertrust values in ASCII format - for backup purposes - -B<--import-ownertrust> [I<filename>] - Update the trustdb with the ownertrust values stored - in I<filename> (or stdin if not given); existing - values will be overwritten. - -=head1 OPTIONS - -Long options can be put in an options file (default F<~/.gnupg/options>). -Do not write the 2 dashes, but simply the name of the option and any -required arguments. Lines with a hash as the first non-white-space -character are ignored. Commands may be put in this file too, but that -does not make sense. - -B<gpg> recognizes these options: - - -B<-a>, B<--armor> - Create ASCII armored output. - -B<-o> I<file>, B<--output> I<file> - Write output to I<file>. - -B<-u> I<name>, B<--local-user> I<name> - Use I<name> as the user-id to sign. - This option is silently ignored for the list commands, - so that it can be used in an options file. - -B<--default-key> I<name> - Use I<name> as default user-id for signatures. If this - is not used the default user-id is the first user-id - from the secret keyring. - -B<-r> I<name>, B<--recipient> I<name> - Encrypt for user id I<name>. If this option is not - specified, GnuPG asks for the user id. - -B<--encrypt-to> I<name> - Same as B<--recipient> but this one is intended for - in the options file and may be used together with - an own user-id as an "encrypt-to-self". These keys - are only used when there are other recipients given - either by use of --recipient or by the asked user id. - No trust checking is performed for these user ids. - -B<--no-encrypt-to> - Disable the use of all B<--encrypt-to> keys. - -B<-v>, B<--verbose> - Give more information during processing. If used - twice, the input data is listed in detail. - -B<-q>, B<--quiet> - Be somewhat more quiet in some cases. - -B<-z> I<n> - Set compress level to I<n>. A value of 0 for I<n> - disables compression. Default is to use the default - compression level of zlib (normally 6). - -B<-t>, B<--textmode> - Use canonical text mode. If B<-t> (but not - B<--textmode>) is used together with armoring - and signing, this enables clearsigned messages. - This kludge is needed for PGP compatibility; - normally you would use B<--sign> or B<--clearsign> - to selected the type of the signature. - -B<-n>, B<--dry-run> - Don't make any changes (not yet implemented). - -B<-i>, B<--interactive> - Prompt before overwriting any files. - -B<--batch> - Use batch mode. Never ask, do not allow interactive - commands. - -B<--no-batch> - Disable batch mode. This may be used if B<batch> - is used in the options file. - -B<--yes> - Assume "yes" on most questions. - -B<--no> - Assume "no" on most questions. - -B<--keyserver> I<name> - Use I<name> to lookup keys which are not yet in - your keyring. This is only done while verifying - messages with signatures. The option is also - required for the command B<--send-keys> to - specify the keyserver to where the keys should - be send. All keyservers synchronize with each - other - so there is no need to send keys to more - than one server. Using the command - "host -l pgp.net | grep wwwkeys" gives you a - list of keyservers. Because there is load - balancing using round-robin-dns you may notice - that you get different key servers. - -B<--keyring> I<file> - Add I<file> to the list of keyrings. - If I<file> begins with a tilde and a slash, these - are replaced by the HOME directory. If the filename - does not contain a slash, it is assumed to be in the - home-directory (F<~/.gnupg> if B<--homedir>) is not used. - The filename may be prefixed with a scheme: - "gnupg-ring:" is the default one. - "gnupg-gdbm:" may be used for a GDBM ring. - It might make sense to use it together with - B<--no-default-keyring>. - -B<--secret-keyring> I<file> - Same as B<--keyring> but for the secret keyrings. - -B<--homedir> I<dir> - Set the name of the home directory to I<dir>. If this - option is not used it defaults to F<~/.gnupg>. It does - not make sense to use this in a options file. This - also overrides the environment variable C<GNUPGHOME>. - -B<--charset> I<name> - Set the name of the native character set. This is used - to convert some strings to proper UTF-8 encoding. - Valid values for I<name> are: - B<iso-8859-1> This is the default Latin 1 set. - B<iso-8859-2> The Latin 2 set. - B<koi8-r> The usual Russian set (rfc1489). - -B<--options> I<file> - Read options from I<file> and do not try to read - them from the default options file in the homedir - (see B<--homedir>). This option is ignored when used - in an options file. - -B<--no-options> - Shortcut for B<--options> I</dev/null>. This option is - detected before an attempt to open an option file. - -B<--load-extension> I<modulename> - Load an extension module. If I<modulename> does not - contain a slash it is searched in B</usr/local/lib/gnupg> - See the manual for more information about extensions. - -B<--debug> I<flags> - Set debugging flags. All flags are or-ed and I<flags> may - be given in C syntax (e.g. 0x0042). - -B<--debug-all> - Set all useful debugging flags. - -B<--status-fd> I<n> - Write special status strings to the file descriptor I<n>. - -B<--logger-fd> I<n> - Write log output to file descriptor I<n> and not to stderr. - -B<--no-comment> - Do not write comment packets. This option affects only - the generation of secret keys. Output of option packets - is disabled since version 0.4.2. - -B<--comment> I<string> - Use I<string> as comment string in clear text signatures. - -B<--default-comment> - Force to write the standard comment string in clear - text signatures. Use this to overwrite B<--comment> - from a config file. - -B<--no-version> - Omit the version string in clear text signatures. - -B<--emit-version> - Force to write the version string in clear text - signatures. Use this to overwrite a previous - B<--no-version> from a config file. - -B<--notation-data>, B<-N> I<name>=<value> - Put the name value pair into the signature as notation data. - I<name> Must consists only of alphanumeric characters, digits - or the underscore; the first character muts not be a digit. - B<value> May be any printable string; it will encoded in UTF8, - so sou should have check that your B<--charset> is set right. - If you prefix I<name> with an exclamation mark, the notation - data will be flagged as critical. (rfc2440:5.2.3.15). - -B<--set-policy-url> I<string> - Use I<string> as Policy URL for signatures (rfc2440:5.2.3.19). - If you prefix it with an exclamation mark, the policy URL - packet will be flagged as critical. - -B<--set-filename> I<string> - Use I<string> as the name of file which is stored in - messages. - -B<--completes-needed> I<n> - Number of completely trusted users to introduce a new - key signer (defaults to 1). - -B<--marginals-needed> I<n> - Number of marginally trusted users to introduce a new - key signer (defaults to 3) - -B<--max-cert-depth> I<n> - Maximum depth of a certification chain (default is 5). - -B<--cipher-algo> I<name> - Use I<name> as cipher algorithm. Running the program - with the command B<--version> yields a list of supported - algorithms. If this is not used the cipher algorithm is - selected from the preferences stored with the key. - -B<--digest-algo> I<name> - Use I<name> as message digest algorithm. Running the - program with the command B<--version> yields a list of - supported algorithms. Please note that using this - option may violate the OpenPGP requirement, that a - 160 bit hash is to be used for DSA. - -B<--s2k-cipher-algo> I<name> - Use I<name> as the cipher algorithm used to protect secret - keys. The default cipher is BLOWFISH. This cipher is - also used for conventional encryption if B<--cipher-algo> - is not given. - -B<--s2k-digest-algo> I<name> - Use I<name> as the digest algorithm used to mangle the - passphrases. The default algorithm is RIPE-MD-160. - This digest algorithm is also used for conventional - encryption if B<--digest-algo> is not given. - -B<--s2k-mode> I<number> - Selects how passphrases are mangled. A number of I<0> - uses the plain passphrase (which is not recommended), - a I<1> (default) adds a salt to the passphrase and - I<3> iterates the whole process a couple of times. - Unless -B<--rfc1991> is used, this mode is also used - for conventional encryption. - -B<--compress-algo> I<number> - Use compress algorithm I<number>. Default is I<2> which is - RFC1950 compression. You may use I<1> to use the old zlib - version which is used by PGP. The default algorithm may - give better results because the window size is not limited - to 8K. If this is not used the OpenPGP behavior is used, - i.e. the compression algorithm is selected from the - preferences. - -B<--throw-keyid> - Do not put the keyid into encrypted packets. This option - hides the receiver of the message and is a countermeasure - against traffic analysis. It may slow down the decryption - process because all available secret keys are tried. - -B<--not-dash-escaped> - This option changes the behavior of cleartext signatures - so that they can be used for patch files. You should not - send such an armored file via email because all spaces - and line endings are hashed too. You can not use this - option for data which has 5 dashes at the beginning of a - line, patch files don't have this. A special armor header - line tells GnuPG about this cleartext signature option. - -B<--escape-from-lines> - Because some mailers change lines starting with "From " - to ">From " it is good to handle such lines in a special - way when creating cleartext signatures. All other PGP - versions do it this way too. This option is not enabled - by default because it would violate rfc2440. - -B<--passphrase-fd> I<n> - Read the passphrase from file descriptor I<n>. If you use - 0 for I<n>, the passphrase will be read from stdin. This - can only be used if only one passphrase is supplied. - B<Don't use this option if you can avoid it> - -B<--rfc1991> - Try to be more RFC1991 (PGP 2.x) compliant. - -B<--openpgp> - Reset all packet, cipher and digest options to OpenPGP - behavior. Use this option to reset all previous - options like B<--rfc1991>, B<--force-v3-sigs>, B<--s2k-*>, - B<--cipher-algo>, B<--digest-algo> and B<--compress-algo> to - OpenPGP compliant values. - -B<--force-v3-sigs> - OpenPGP states that an implementation should generate - v4 signatures but PGP 5.x recognizes v4 signatures only - on key material. This options forces v3 signatures for - signatures on data. - -B<--force-mdc> - Force the use of encryption with appended manipulation - code. This is always used with the newer cipher (those - with a blocksize greater than 64 bit). - -B<--lock-once> - Lock the file the first time a lock is requested - and do not release the lock until the process - terminates. - -B<--lock-multiple> - Release the locks every time a lock is no longer - needed. Use this to overwrite a previous B<--lock-once> - from a config file. - -B<--no-verbose> - Reset verbose level to 0. - -B<--no-greeting> - Suppress the initial copyright message but do not - enter batch mode. - -B<--no-armor> - Assume the input data is not in ASCII armored format. - -B<--no-default-keyring> - Do not add the default keyrings to the list of - keyrings. - -B<--skip-verify> - Skip the signature verification step. This may be - used to make the encryption faster if the signature - verification is not needed. - -B<--version> - Print version information along with a list - of supported algorithms. - -B<--with-colons> - Print key listings delimited by colons. - -B<--with-key-data> - Print key listings delimited by colons and print the public key data. - -B<--warranty> - Print warranty information. - -B<-h>, B<--help> - Print usage information. - - -=head1 RETURN VALUE - -The Program returns 0 if everything was fine, 1 if at least -a signature was bad, and other error codes for fatal errors. - -=head1 EXAMPLES - - -se -r Bob [file] sign and encrypt for user Bob - -sat [file] make a clear text signature - -sb [file] make a detached signature - -k [userid] show keys - -kc [userid] show fingerprint - -=head1 ENVIRONMENT - -C<HOME> Used to locate the default home directory. -C<GNUPGHOME> If set directory used instead of F<~/.gnupg>. - -=head1 FILES - -F<~/.gnupg/secring.gpg> The secret keyring -F<~/.gnupg/secring.gpg.lock> and the lock file - -F<~/.gnupg/pubring.gpg> The public keyring -F<~/.gnupg/pubring.gpg.lock> and the lock file - -F<~/.gnupg/trustdb.gpg> The trust database -F<~/.gnupg/trustdb.gpg.lock> and the lock file - -F<~/.gnupg/options> May contain options -F</usr[/local]/share/gnupg/options.skel> Skeleton file - -F</usr[/local]/lib/gnupg/> Default location for extensions - -=head1 SEE ALSO - -gpg(1) - - -=head1 WARNINGS - -Use a B<good> password for your user account and a B<good> passphrase -to protect your secret key. This passphrase is the weakest part of the -whole system. Programs to do dictionary attacks on your secret keyring -are very easy to write and so you should protect your B<~/.gnupg/> -directory very well. - -Keep in mind that, if this program is used over a network (telnet), it -is B<very> easy to spy out your passphrase! - -=head1 BUGS - -On many systems this program should be installed as setuid(root). This -is necessary to lock memory pages. Locking memory pages prevents the -operating system from writing memory pages to disk. If you get no -warning message about insecure memory your operating system supports -locking without being root. The program drops root privileges as soon -as locked memory is allocated. - diff --git a/doc/gpg.sgml b/doc/gpg.sgml new file mode 100644 index 000000000..645063db5 --- /dev/null +++ b/doc/gpg.sgml @@ -0,0 +1,1214 @@ +<!-- gpg.sgml - the man page for GnuPG + Copyright (C) 1998, 1999 Free Software Foundation, Inc. + + This file is part of GnuPG. + + GnuPG is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation; either version 2 of the License, or + (at your option) any later version. + + GnuPG is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + + You should have received a copy of the GNU General Public License + along with this program; if not, write to the Free Software + Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA +--> +<!-- This file should be processed by docbook-to-man to + create a manual page. This program has currenlty the bug + not to remove leading white space. So this source file does + not look very pretty + + FIXME: generated a file with entity (e.g. pathnames) from the + configure scripts and include it here +--> + + +<!doctype refentry PUBLIC "-//Davenport//DTD DocBook V3.0//EN" [ +<!entity ParmDir "<parameter>directory</parameter>"> +<!entity ParmFile "<parameter>file</parameter>"> +<!entity OptParmFile "<optional>&ParmFile;</optional>"> +<!entity ParmFiles "<parameter>files</parameter>"> +<!entity OptParmFiles "<optional>&ParmFiles;</optional>"> +<!entity ParmNames "<parameter>names</parameter>"> +<!entity OptParmNames "<optional>&ParmNames;</optional>"> +<!entity ParmName "<parameter>name</parameter>"> +<!entity OptParmName "<optional>&ParmName;</optional>"> +<!entity ParmKeyIDs "<parameter>key IDs</parameter>"> +<!entity ParmN "<parameter>n</parameter>"> +<!entity ParmFlags "<parameter>flags</parameter>"> +<!entity ParmString "<parameter>string</parameter>"> +<!entity ParmValue "<parameter>value</parameter>"> +<!entity ParmNameValue "<parameter>name=value</parameter>"> +]> + +<refentry id="gpg"> +<refmeta> + <refentrytitle>gpg</refentrytitle> + <manvolnum>1</manvolnum> + <refmiscinfo class="gnu">GNU Tools</refmiscinfo> +</refmeta> +<refnamediv> + <refname/gpg/ + <refpurpose>encryption and signing tool</> +</refnamediv> +<refsynopsisdiv> + <synopsis> +<command>gpg</> + <optional>--homedir <parameter/name/</optional> + <optional>--options <parameter/file/</optional> + <optional><parameter/options/</optional> + <parameter>command</> + <optional><parameter/args/</optional> + </synopsis> +</refsynopsisdiv> + +<refsect1> + <title>DESCRIPTION</title> + <para> +<command/gpg/ is the main program for the GnuPG system. + </para> +</refsect1> + +<refsect1> +<title>COMMANDS</title> +<para> +<command/gpg/ recognizes these commands: +</para> + +<variablelist> + +<varlistentry> +<term>-s, --sign</term> +<listitem><para> +Make a signature. This command may be combined +with --encrypt. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--clearsign</term> +<listitem><para> +Make a clear text signature. +</para></listitem></varlistentry> + + +<varlistentry> +<term>-b, --detach-sign</term> +<listitem><para> +Make a detached signature. +</para></listitem></varlistentry> + + +<varlistentry> +<term>-e, --encrypt</term> +<listitem><para> +Encrypt data. This option may be combined with --sign. +</para></listitem></varlistentry> + + +<varlistentry> +<term>-c, --symmetric</term> +<listitem><para> +Encrypt with symmetric cipher only +This command asks for a passphrase. +</para></listitem></varlistentry> + +<varlistentry> +<term>--store</term> +<listitem><para> +Store only (make a simple RFC1991 packet). +</para></listitem></varlistentry> + + +<varlistentry> +<term>--decrypt &OptParmFile;</term> +<listitem><para> +Decrypt &ParmFile; (or stdin if no file is specified) and +write it to stdout (or the file specified with +--output). If the decrypted file is signed, the +signature is also verified. This command differs +from the default operation, as it never writes to the +filename which is included in the file and it +rejects files which don't begin with an encrypted +message. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--verify <optional><optional><parameter/sigfile/</optional> + <optional><parameter/signed-files/</optional></optional></term> +<listitem><para> +Assume that <parameter/sigfile/ is a signature and verify it +without generating any output. With no arguments, +the signature packet is read from stdin (it may be a +detached signature when not used in batch mode). If +only a sigfile is given, it may be a complete +signature or a detached signature, in which case +the signed stuff is expected in a file without the +".sig" or ".asc" extension (if such a file does +not exist it is expected at stdin; use a single dash ("-") as +filename to force a read from stdin). With more than +1 argument, the first should be a detached signature +and the remaining files are the signed stuff. +</para></listitem></varlistentry> + +<!-- +B<-k> [I<username>] [I<keyring>] + Kludge to be somewhat compatible with PGP. + Without arguments, all public keyrings are listed. + With one argument, only I<keyring> is listed. + Special combinations are also allowed, but they may + give strange results when combined with more options. + B<-kv> Same as B<-k> + B<-kvv> List the signatures with every key. + B<-kvvv> Additionally check all signatures. + B<-kvc> List fingerprints + B<-kvvc> List fingerprints and signatures + + B<This command may be removed in the future!> +--> + +<varlistentry> +<term>--list-keys &OptParmNames;</term> +<term>--list-public-keys &OptParmNames;</term> +<listitem><para> +List all keys from the public keyrings, or just the +ones given on the command line. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--list-secret-keys &OptParmNames;</term> +<listitem><para> +List all keys from the secret keyrings, or just the +ones given on the command line. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--list-sigs &OptParmNames;</term> +<listitem><para> +Same as --list-keys, but the signatures are listed too. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--list-sigs &OptParmNames;</term> +<listitem><para> +Same as --list-sigs, but the signatures are verified. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--fingerprint &OptParmNames;</term> +<listitem><para> +List all keys with their fingerprints. This is the +same output as --list-keys but with the additional output +of a line with the fingerprint. May also be combined +with --list-sigs or --check-sigs. +If this command is given twice, the fingerprints of all +secondary keys are listed too. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--list-packets</term> +<listitem><para> +List only the sequence of packets. This is mainly +useful for debugging. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--gen-key</term> +<listitem><para> +Generate a new key pair. This command can only be +used interactive. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--edit-key &ParmName;</term> +<listitem><para> +Present a menu which enables you to do all key +related tasks:</para> + <variablelist> + + <varlistentry> + <term>sign</term> + <listitem><para> +Make a signature on key of user &ParmName; +If the key is not yet signed by the default +user (or the users given with -u), the +program displays the information of the key +again, together with its fingerprint and +asks whether it should be signed. This +question is repeated for all users specified +with -u.</para></listitem></varlistentry> + <varlistentry> + <term>lsign</term> + <listitem><para> +Same as --sign but the signature is marked as +non-exportbale and will therefore never be used +by others. This may be used to make keys valid +only in the local environment.</para></listitem></varlistentry> + <varlistentry> + <term>revsig</term> + <listitem><para> +Revoke a signature. GnuPG asks for every +every signature which has been done by one of +the secret keys, whether a revocation +certificate should be generated.</para></listitem></varlistentry> + <varlistentry> + <term>trust</term> + <listitem><para> +Change the owner trust value. This updates the +trust-db immediately and no save is required.</para></listitem></varlistentry> + <varlistentry> + <term>adduid</term> + <listitem><para> +Create an alternate user id.</para></listitem></varlistentry> + <varlistentry> + <term>deluid</term> + <listitem><para> +Delete an user id.</para></listitem></varlistentry> + <varlistentry> + <term>addkey</term> + <listitem><para> +Add a subkey to this key.</para></listitem></varlistentry> + <varlistentry> + <term>delkey</term> + <listitem><para> +Remove a subkey.</para></listitem></varlistentry> + <varlistentry> + <term>revkey</term> + <listitem><para> +Revoke a subkey.</para></listitem></varlistentry> + <varlistentry> + <term>expire</term> + <listitem><para> +Change the key expiration time. If a key is +selected, the time of this key will be changed. +With no selection the key expiration of the +primary key is changed.</para></listitem></varlistentry> + <varlistentry> + <term>passwd</term> + <listitem><para> +Change the passphrase of the secret key.</para></listitem></varlistentry> + <varlistentry> + <term>uid &ParmN;</term> + <listitem><para> +Toggle selection of user id with index &ParmN;. +Use 0 to deselect all.</para></listitem></varlistentry> + <varlistentry> + <term>key &ParmN;</term> + <listitem><para> +Toggle selection of subkey with index &ParmN;. +Use 0 to deselect all.</para></listitem></varlistentry> + <varlistentry> + <term>check</term> + <listitem><para> +Check all selected user ids.</para></listitem></varlistentry> + <varlistentry> + <term>pref</term> + <listitem><para> +List preferences.</para></listitem></varlistentry> + <varlistentry> + <term>toggle</term> + <listitem><para> +Toggle between public and secret key listing.</para></listitem></varlistentry> + <varlistentry> + <term>save</term> + <listitem><para> +Save all changes to the key rings and quit.</para></listitem></varlistentry> + <varlistentry> + <term>quit</term> + <listitem><para> +Quit the program without updating the +key rings.</para></listitem></varlistentry> + </variablelist> + <para> +The listing shows you the key with its secondary +keys and all user ids. Selected keys or user ids +are indicated by an asterisk. The trust value is +displayed with the primary key: the first is the +assigned owner trust and the second is the calculated +trust value. Letters are used for the values:</para> + <variablelist> + <varlistentry><term>-</term><listitem><para>No ownertrust assigned / not yet calculated.</para></listitem></varlistentry> + <varlistentry><term>e</term><listitem><para>Trust calculation has failed.</para></listitem></varlistentry> + <varlistentry><term>q</term><listitem><para>Not enough information for calculation.</para></listitem></varlistentry> + <varlistentry><term>n</term><listitem><para>Never trust this key.</para></listitem></varlistentry> + <varlistentry><term>m</term><listitem><para>Marginally trusted.</para></listitem></varlistentry> + <varlistentry><term>f</term><listitem><para>Fully trusted.</para></listitem></varlistentry> + <varlistentry><term>u</term><listitem><para>Ultimately trusted.</para></listitem></varlistentry> + </variablelist> +</listitem></varlistentry> + + +<varlistentry> +<term>--delete-key &ParmName;</term> +<listitem><para> +Remove key from the public keyring +</para></listitem></varlistentry> + +<varlistentry> +<term>--delete-secret-key &ParmName;</term> +<listitem><para> +Remove key from the secret and public keyring +</para></listitem></varlistentry> + +<varlistentry> +<term>--gen-revoke</term> +<listitem><para> +Generate a revocation certificate for the complete key. To revoke +a subkey or a signature, use the --edit command. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--export &OptParmNames;</term> +<listitem><para> +Either export all keys from all keyrings (default +keyrings and those registered via option --keyring), +or if at least one name is given, those of the given +name. The new keyring is written to stdout or to +the file given with option "output". Use together +with --armor to mail those keys. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--send-keys &OptParmNames;</term> +<listitem><para> +Same as --export but sends the keys to a keyserver. +Option --keyserver must be used to give the name +of this keyserver. Don't send your complete keyring +to a keyserver - select only those keys which are new +or changed by you. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--export-all &OptParmNames;</term> +<listitem><para> +Same as --export, but does also export keys which +are not compatible to OpenPGP. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--export-secret-keys &OptParmNames;</term> +<listitem><para> +Same as --export, but does export the secret keys. +This is normally not very useful and a security risk. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--import &OptParmFiles;</term> +<term>--fast-import &OptParmFiles;</term> +<listitem><para> +Import/merge keys. The fast version does not build +the trustdb; this can be done at any time with the +command --update-trustdb. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--recv-keys &ParmKeyIDs;</term> +<listitem><para> +Import the keys with the given key IDs from a HKP +keyserver. Option --keyserver must be used to +give the name of this keyserver. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--export-ownertrust</term> +<listitem><para> +List the assigned ownertrust values in ASCII format +for backup purposes +</para></listitem></varlistentry> + + +<varlistentry> +<term>--import-ownertrust &OptParmFiles;</term> +<listitem><para> +Update the trustdb with the ownertrust values stored +in &ParmFiles; (or stdin if not given); existing +values will be overwritten. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--version</term> +<listitem><para> +Print version information along with a list +of supported algorithms. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--warranty</term> +<listitem><para> +Print warranty information. +</para></listitem></varlistentry> + + +<varlistentry> +<term>-h, --help</term> +<listitem><para> +Print usage information. This is a really long list even it does list +not all options. +</para></listitem></varlistentry> + + + +</variablelist> +</refsect1> + +<refsect1> +<title>OPTIONS</title> +<para> +Long options can be put in an options file (default "~/.gnupg/options"). +Do not write the 2 dashes, but simply the name of the option and any +required arguments. Lines with a hash as the first non-white-space +character are ignored. Commands may be put in this file too, but that +does not make sense. +</para> +<para> +<command/gpg/ recognizes these options: +</para> + +<variablelist> + + +<varlistentry> +<term>-a, --armor</term> +<listitem><para> +Create ASCII armored output. +</para></listitem></varlistentry> + + +<varlistentry> +<term>-o, --output &ParmFile;</term> +<listitem><para> +Write output to &ParmFile;. +</para></listitem></varlistentry> + + +<varlistentry> +<term>-u, --local-user &ParmName;</term> +<listitem><para> +Use &ParmName as the user ID to sign. +This option is silently ignored for the list commands, +so that it can be used in an options file. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--default-key &ParmName;</term> +<listitem><para> +Use &ParmName; as default user ID for signatures. If this +is not used the default user ID is the first user ID +found in the secret keyring. +</para></listitem></varlistentry> + + +<varlistentry> +<term>-r, --recipient &ParmName;</term> +<term></term> +<listitem><para> +Encrypt for user id &ParmName;. If this option is not +specified, GnuPG asks for the user id. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--encrypt-to &ParmName;</term> +<listitem><para> +Same as --recipient but this one is intended for +in the options file and may be used together with +an own user-id as an "encrypt-to-self". These keys +are only used when there are other recipients given +either by use of --recipient or by the asked user id. +No trust checking is performed for these user ids. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--no-encrypt-to</term> +<listitem><para> +Disable the use of all --encrypt-to keys. +</para></listitem></varlistentry> + + +<varlistentry> +<term>-v, --verbose</term> +<listitem><para> +Give more information during processing. If used +twice, the input data is listed in detail. +</para></listitem></varlistentry> + + +<varlistentry> +<term>-q, --quiet</term> +<listitem><para> +Try to be as quiet as possible. +</para></listitem></varlistentry> + + +<varlistentry> +<term>-z &ParmN;</term> +<listitem><para> +Set compression level to &ParmN;. A value of 0 for &ParmN; +disables compression. Default is to use the default +compression level of zlib (normally 6). +</para></listitem></varlistentry> + + +<varlistentry> +<term>-t, --textmode</term> +<listitem><para> +Use canonical text mode. If -t (but not +--textmode) is used together with armoring +and signing, this enables clearsigned messages. +This kludge is needed for PGP compatibility; +normally you would use --sign or --clearsign +to selected the type of the signature. +</para></listitem></varlistentry> + + +<varlistentry> +<term>-n, --dry-run</term> +<listitem><para> +Don't make any changes (this is not completely implemented). +</para></listitem></varlistentry> + + +<varlistentry> +<term>-i, --interactive</term> +<listitem><para> +Prompt before overwriting any files. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--batch</term> +<listitem><para> +Use batch mode. Never ask, do not allow interactive +commands. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--no-batch</term> +<listitem><para> +Disable batch mode. This may be of use if --batch +is enabled from an options file. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--yes</term> +<listitem><para> +Assume "yes" on most questions. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--no</term> +<listitem><para> + Assume "no" on most questions. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--keyserver &ParmName;</term> +<listitem><para> +Use &ParmName to lookup keys which are not yet in +your keyring. This is only done while verifying +messages with signatures. The option is also +required for the command --send-keys to +specify the keyserver to where the keys should +be send. All keyservers synchronize with each +other - so there is no need to send keys to more +than one server. Using the command +"host -l pgp.net | grep wwwkeys" gives you a +list of keyservers. Because there is load +balancing using round-robin DNS you may notice +that you get different key servers. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--keyring &ParmFile;</term> +<listitem><para> +Add &ParmFile to the list of keyrings. +If &ParmFile begins with a tilde and a slash, these +are replaced by the HOME directory. If the filename +does not contain a slash, it is assumed to be in the +home-directory ("~/.gnupg" if --homedir is not used). +The filename may be prefixed with a scheme:</para> +<para>"gnupg-ring:" is the default one.</para> +<para>"gnupg-gdbm:" may be used for a GDBM ring.</para> +<para>It might make sense to use it together with --no-default-keyring. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--secret-keyring &ParmFile;</term> +<listitem><para> +Same as --keyring but for the secret keyrings. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--homedir &ParmDir;</term> +<listitem><para> +Set the name of the home directory to &ParmDir; If this +option is not used it defaults to "~/.gnupg". It does +not make sense to use this in a options file. This +also overrides the environment variable "GNUPGHOME". +</para></listitem></varlistentry> + + +<varlistentry> +<term>--charset &ParmName;</term> +<listitem><para> +Set the name of the native character set. This is used +to convert some strings to proper UTF-8 encoding. +Valid values for &ParmName; are:</para> +<variablelist> +<varlistentry> +<term>iso-8859-1</term><listitem><para>This is the default Latin 1 set.</para></listitem> +</varlistentry> +<varlistentry> +<term>iso-8859-2</term><listitem><para>The Latin 2 set.</para></listitem> +</varlistentry> +<varlistentry> +<term>koi8-r</term><listitem><para>The usual Russian set (rfc1489).</para></listitem> +</varlistentry> +</variablelist> +</listitem></varlistentry> + + +<varlistentry> +<term>--options &ParmFile;</term> +<listitem><para> +Read options from &ParmFile; and do not try to read +them from the default options file in the homedir +(see --homedir). This option is ignored if used +in an options file. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--no-options</term> +<listitem><para> +Shortcut for "--options /dev/null". This option is +detected before an attempt to open an option file. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--load-extension &ParmName;</term> +<listitem><para> +Load an extension module. If &ParmName; does not +contain a slash it is searched in "/usr/local/lib/gnupg" +See the manual for more information about extensions. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--debug &ParmFlags;</term> +<listitem><para> +Set debugging flags. All flags are or-ed and &ParmFlags; may +be given in C syntax (e.g. 0x0042). +</para></listitem></varlistentry> + + +<varlistentry> +<term>--debug-all</term> +<listitem><para> + Set all useful debugging flags. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--status-fd &ParmN;</term> +<listitem><para> +Write special status strings to the file descriptor &ParmN;. +See the file DETAILS in the documentation for a listing of them. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--logger-fd &ParmN;</term> +<listitem><para> +Write log output to file descriptor &ParmN; and not to stderr. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--no-comment</term> +<listitem><para> +Do not write comment packets. This option affects only +the generation of secret keys. Output of option packets +is disabled since version 0.4.2. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--comment &ParmString;</term> +<listitem><para> +Use &ParmString; as comment string in clear text signatures. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--default-comment</term> +<listitem><para> +Force to write the standard comment string in clear +text signatures. Use this to overwrite a --comment +from a config file. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--no-version</term> +<listitem><para> +Omit the version string in clear text signatures. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--emit-version</term> +<listitem><para> +Force to write the version string in clear text +signatures. Use this to overwrite a previous +--no-version from a config file. +</para></listitem></varlistentry> + + +<varlistentry> +<term>-N, --notation-data &ParmNameValue;</term> +<listitem><para> +Put the name value pair into the signature as notation data. +&ParmName; must consists only of alphanumeric characters, digits +or the underscore; the first character must not be a digit. +&ParmValue; may be any printable string; it will encoded in UTF8, +so sou should have check that your --charset is set right. +If you prefix &ParmName; with an exclamation mark, the notation +data will be flagged as critical (rfc2440:5.2.3.15). +</para></listitem></varlistentry> + + +<varlistentry> +<term>--set-policy-url &ParmString;</term> +<listitem><para> +Use &ParmString; as Policy URL for signatures (rfc2440:5.2.3.19). +If you prefix it with an exclamation mark, the policy URL +packet will be flagged as critical. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--set-filename &ParmString;</term> +<listitem><para> +Use &ParmString; as the name of file which is stored in +messages. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--completes-needed &ParmN;</term> +<listitem><para> +Number of completely trusted users to introduce a new +key signer (defaults to 1). +</para></listitem></varlistentry> + + +<varlistentry> +<term>--marginals-needed &ParmN;</term> +<listitem><para> +Number of marginally trusted users to introduce a new +key signer (defaults to 3) +</para></listitem></varlistentry> + + +<varlistentry> +<term>--max-cert-depth &ParmN;</term> +<listitem><para> +Maximum depth of a certification chain (default is 5). +</para></listitem></varlistentry> + + +<varlistentry> +<term>--cipher-algo &ParmName;</term> +<listitem><para> +Use &ParmName; as cipher algorithm. Running the program +with the command --version yields a list of supported +algorithms. If this is not used the cipher algorithm is +selected from the preferences stored with the key. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--digest-algo &ParmName;</term> +<listitem><para> +Use &ParmName; as message digest algorithm. Running the +program with the command --version yields a list of +supported algorithms. Please note that using this +option may violate the OpenPGP requirement, that a +160 bit hash is to be used for DSA. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--s2k-cipher-algo &ParmName;</term> +<listitem><para> +Use &ParmName; as the cipher algorithm used to protect secret +keys. The default cipher is BLOWFISH. This cipher is +also used for conventional encryption if --cipher-algo +is not given. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--s2k-digest-algo &ParmName;</term> +<listitem><para> +Use &ParmName; as the digest algorithm used to mangle the +passphrases. The default algorithm is RIPE-MD-160. +This digest algorithm is also used for conventional +encryption if --digest-algo is not given. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--s2k-mode &ParmN;</term> +<listitem><para> +Selects how passphrases are mangled. If &ParmN; is 0 +a plain passphrase (which is not recommended) will be used, +a 1 (default) adds a salt to the passphrase and +a 3 iterates the whole process a couple of times. +Unless --rfc1991 is used, this mode is also used +for conventional encryption. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--compress-algo &ParmN;</term> +<listitem><para> +Use compress algorithm &ParmN;. Default is 2 which is +RFC1950 compression. You may use 1 to use the old zlib +version which is used by PGP. The default algorithm may +give better results because the window size is not limited +to 8K. If this is not used the OpenPGP behavior is used, +i.e. the compression algorithm is selected from the +preferences; note, that this can't be done if you do +not encrypt the data. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--throw-keyid</term> +<listitem><para> +Do not put the keyid into encrypted packets. This option +hides the receiver of the message and is a countermeasure +against traffic analysis. It may slow down the decryption +process because all available secret keys are tried. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--not-dash-escaped</term> +<listitem><para> +This option changes the behavior of cleartext signatures +so that they can be used for patch files. You should not +send such an armored file via email because all spaces +and line endings are hashed too. You can not use this +option for data which has 5 dashes at the beginning of a +line, patch files don't have this. A special armor header +line tells GnuPG about this cleartext signature option. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--escape-from-lines</term> +<listitem><para> +Because some mailers change lines starting with "From " +to "<From " it is good to handle such lines in a special +way when creating cleartext signatures. All other PGP +versions do it this way too. This option is not enabled +by default because it would violate rfc2440. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--passphrase-fd &ParmN;</term> +<listitem><para> +Read the passphrase from file descriptor &ParmN;. If you use +0 for &ParmN;, the passphrase will be read from stdin. This +can only be used if only one passphrase is supplied. +<!--fixme: make this print strong--> +Don't use this option if you can avoid it. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--rfc1991</term> +<listitem><para> +Try to be more RFC1991 (PGP 2.x) compliant. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--openpgp</term> +<listitem><para> +Reset all packet, cipher and digest options to OpenPGP +behavior. Use this option to reset all previous +options like --rfc1991, --force-v3-sigs, --s2k-*, +--cipher-algo, --digest-algo and --compress-algo to +OpenPGP compliant values. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--force-v3-sigs</term> +<listitem><para> +OpenPGP states that an implementation should generate +v4 signatures but PGP 5.x recognizes v4 signatures only +on key material. This options forces v3 signatures for +signatures on data. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--force-mdc</term> +<listitem><para> +Force the use of encryption with appended manipulation +code. This is always used with the newer cipher (those +with a blocksize greater than 64 bit). +</para></listitem></varlistentry> + + +<varlistentry> +<term>--lock-once</term> +<listitem><para> +Lock the databases the first time a lock is requested +and do not release the lock until the process +terminates. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--lock-multiple</term> +<listitem><para> +Release the locks every time a lock is no longer +needed. Use this to override a previous --lock-once +from a config file. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--no-verbose</term> +<listitem><para> +Reset verbose level to 0. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--no-greeting</term> +<listitem><para> +Suppress the initial copyright message but do not +enter batch mode. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--no-armor</term> +<listitem><para> +Assume the input data is not in ASCII armored format. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--no-default-keyring</term> +<listitem><para> +Do not add the default keyrings to the list of +keyrings. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--skip-verify</term> +<listitem><para> +Skip the signature verification step. This may be +used to make the encryption faster if the signature +verification is not needed. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--with-colons</term> +<listitem><para> +Print key listings delimited by colons. +</para></listitem></varlistentry> + + +<varlistentry> +<term>--with-key-data</term> +<listitem><para> +Print key listings delimited by colons and print the public key data. +</para></listitem></varlistentry> + +</variablelist> +</refsect1> + +<refsect1> + <title>RETURN VALUE</title> + <para> +The program returns 0 if everything was fine, 1 if at least +a signature was bad, and other error codes for fatal errors. + </para> +</refsect1> + +<refsect1> + <title>EXAMPLES</title> + <variablelist> + +<varlistentry> +<term>gpg -se -r <parameter/Bob/ &ParmFile;</term> +<listitem><para>sign and encrypt for user Bob</para></listitem> +</varlistentry> + +<varlistentry> +<term>gpg --clearsign &ParmFile;</term> +<listitem><para>make a clear text signature</para></listitem> +</varlistentry> + +<varlistentry> +<term>gpg -sb &ParmFile;</term> +<listitem><para>make a detached signature</para></listitem> +</varlistentry> + +<varlistentry> +<term>gpg --list-keys <parameter/user_ID/</term> +<listitem><para>show keys</para></listitem> +</varlistentry> + +<varlistentry> +<term>gpg --fingerprint <parameter/user_ID/</term> +<listitem><para>show fingerprint</para></listitem> +</varlistentry> + + </variablelist> +</refsect1> + + +<refsect1> + <title>ENVIRONMENT</title> + + <variablelist> +<varlistentry> +<term>HOME</term> +<listitem><para>Used to locate the default home directory.</para></listitem> +</varlistentry> +<varlistentry> +<term>GNUPGHOME</term> +<listitem><para>If set directory used instead of "~/.gnupg".</para></listitem> +</varlistentry> + </variablelist> + +</refsect1> + +<refsect1> + <title>FILES</title> + <variablelist> + +<varlistentry> +<term>~/.gnupg/secring.gpg</term> +<listitem><para>The secret keyring</para></listitem> +</varlistentry> + +<varlistentry> +<term>~/.gnupg/secring.gpg.lock</term> +<listitem><para>and the lock file</para></listitem> +</varlistentry> + +<varlistentry> +<term>~/.gnupg/pubring.gpg</term> +<listitem><para>The public keyring</para></listitem> +</varlistentry> + +<varlistentry> +<term>~/.gnupg/pubring.gpg.lock</term> +<listitem><para>and the lock file</para></listitem> +</varlistentry> + +<varlistentry> +<term>~/.gnupg/trustdb.gpg</term> +<listitem><para>The trust database</para></listitem> +</varlistentry> + +<varlistentry> +<term>~/.gnupg/trustdb.gpg.lock</term> +<listitem><para>and the lock file</para></listitem> +</varlistentry> + +<varlistentry> +<term>~/.gnupg/options</term> +<listitem><para>May contain options</para></listitem> +</varlistentry> + +<varlistentry> +<term>/usr[/local]/share/gnupg/options.skel</term> +<listitem><para>Skeleton options file</para></listitem> +</varlistentry> + +<varlistentry> +<term>/usr[/local]/lib/gnupg/</term> +<listitem><para>Default location for extensions</para></listitem> +</varlistentry> + + </variablelist> +</refsect1> + +<!-- SEE ALSO not yet needed--> + +<refsect1> + <title>WARNINGS</title> + <para> +Use a *good* password for your user account and a *good* passphrase +to protect your secret key. This passphrase is the weakest part of the +whole system. Programs to do dictionary attacks on your secret keyring +are very easy to write and so you should protect your "~/.gnupg/" +directory very well. +</para> +<para> +Keep in mind that, if this program is used over a network (telnet), it +is *very* easy to spy out your passphrase! +</para> +</refsect1> + + +<refsect1> + <title>BUGS</title> + <para> +On many systems this program should be installed as setuid(root). This +is necessary to lock memory pages. Locking memory pages prevents the +operating system from writing memory pages to disk. If you get no +warning message about insecure memory your operating system supports +locking without being root. The program drops root privileges as soon +as locked memory is allocated. +</para> +</refsect1> + +</refentry> + |