diff options
Diffstat (limited to 'doc/gpg.1pod')
-rw-r--r-- | doc/gpg.1pod | 46 |
1 files changed, 36 insertions, 10 deletions
diff --git a/doc/gpg.1pod b/doc/gpg.1pod index 93b1a199f..40c930b45 100644 --- a/doc/gpg.1pod +++ b/doc/gpg.1pod @@ -75,7 +75,7 @@ B<-k> [I<username>] [I<keyring>] B<-kvc> List fingerprints B<-kvvc> List fingerprints and signatures -B<--list-keys> [I<names>] +B<--list-keys> [I<names>] List all keys from the public keyrings, or just the ones given on the command line. @@ -83,7 +83,7 @@ B<--list-secret-keys> [I<names>] List all keys from the secret keyrings, or just the ones given on the command line. -B<--list-sigs> [I<names>] +B<--list-sigs> [I<names>] Same as B<--list-keys>, but the signatures are listed too. @@ -201,7 +201,7 @@ B<--import-ownertrust> [I<filename>] Long options can be put in an options file (default F<~/.gnupg/options>); do not write the 2 dashes, but simply the name of the option and any -arguments if required. Lines with a hash as the first non-white-space +arguments if required. Lines with a hash as the first non-white-space character are ignored. Commands may be put in this file too, but that does not make sense. @@ -324,6 +324,26 @@ B<--digest-algo> I<name> program with the option B<--verbose> yields a list of supported algorithms. +B<--s2k-cipher-algo> I<name> + Use I<name> as the cipher algorithm used to protect secret + keys. The default cipher is BLOWFISH. This cipher is + also used for conventional encryption if B<--cipher-algo> + is not given. + +B<--s2k-digest-algo> I<name> + Use I<name> as the digest algorithm used to mangle the + passphrases. The default algorithm is RIPE-MD-160. + This digest algorithm is also used for conventional + encryption if B<--digest-algo> is not given. + +B<--s2k-mode> I<number> + Selects how passphrases are mangled: A number of I<0> + uses the plain passphrase (which is not recommended), + a I<1> (default) adds a salt to the passphrase and + I<3> interates the whole process a couple of times. + Unless -B<--rfc1991> is used, this mode is also used + for conventional encryption. + B<--compress-algo> I<number> Use compress algorithm I<number>. Default is I<2> which is RFC1950 compression; you may use I<1> to use the old zlib @@ -333,6 +353,12 @@ B<--compress-algo> I<number> If this is not used the OpenPGP behaviour is used; i.e. the compression algorith is selected from the preferences. +B<--digest-algo> I<name> + Use I<name> as message digest algorithm. Running the + program with the option B<--verbose> yields a list of + supported algorithms. + + B<--throw-keyid> Do not put the keyid into encrypted packets. This option hides the receiver of the message and is a countermeasure @@ -385,11 +411,11 @@ a signature was bad and other errorcode for fatal errors. =head1 EXAMPLES - -se -r Bob [file] sign and encrypt for user Bob - -sat [file] make a clear text signature - -sb [file] make a detached signature - -k [userid] show keys - -kc [userid] show fingerprint + -se -r Bob [file] sign and encrypt for user Bob + -sat [file] make a clear text signature + -sb [file] make a detached signature + -k [userid] show keys + -kc [userid] show fingerprint =head1 ENVIRONMENT @@ -404,13 +430,13 @@ F<~/.gnupg/pubring.gpg> The public keyring F<~/.gnupg/trustdb.gpg> The trust database -F<~/.gnupg/options> May contain options +F<~/.gnupg/options> May contain options F</usr[/local]/lib/gnupg/> Default location for extensions =head1 SEE ALSO -gpgm(1) gpgd(1) +gpg(1) gpgm(1) =head1 WARNINGS |