summaryrefslogtreecommitdiffstats
path: root/g10/OPTIONS
blob: dc5f3158f25f05e072737ec30f29b228b414e181 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
# This is a sample option file
#
# Unless you you specify which option file to use with the
# commandline option "--options filename", g10 uses per
# default the file ~/.g10/options.
#
# An option file can contain all long options which are
# available in G10. If the first non white space character of
# a line is a '#', this line is ignored.  Empty lines are also
# ignored.
#
# Here is a list of all possible options. Not of all them make
# sense in an option file; consider this as a complete option
# reference

add-key
# add key to the public keyring

armor
# create ascii armored output


batch
# batch mode: never ask

cache-all
# hold everything in memory

change-passphrase
# change the passphrase of your secret keyring

check
# check a signature

check-key
# check signatures on a key in the keyring

debug  value|hexvalue
#  set debugging flags,

debug-all
# enable full debugging

decrypt
# decrypt data (default)

delete-key
# remove key from public keyring,

detach-sign
# make a detached signature,

dry-run
# don't make any changes

encrypt
# encrypt data

fingerprint
# show the fingerprints,

gen-key
# generate a new key pair,

gen-prime
# Generate a prime.
# With one argument:  take it as the bitsize and make a simple prime of
#		      this size
# With two arguments: Generate a prime, usable for DL algorithms.
# With three arguments: same as above, but a third argument indicates
#			taht a generator should also be calculated.

keyring  filename
# add this filename to the list of keyrings

local-user user-string
#  use this user-string to sign or decrypt

no
# assume no on most questions

no-armor
# Assume the input data is not in ascii armored format.

no-default-keyring
# Do not add the default keyrings to the list of keyrings

options filename
#  Ignored in option files.

output filename
# use filename for output

print-mds
# print all message digests of all give filenames

remote-user
# use this user-id for encryption"


secret-keyring filename
# add filename to the list of secret keyrings

sign
# make a signature

sign-key
# make a signature on a key in the keyring
# Argument is the userid of the key to sign.
# This looks for the key, displays the key and checks all
# existing signatures of this key. If the key is not yet signed
# by the default user (or the users given with "-l"), the programm
# displays the information of the key again, together with
# it's fingerprint and asked wehter it should be signed. This question
# is repeated for all users specified with "-l".  The key is then signed
# and the keyring which contains the key is updated.

store
# simply packs the input data into a rfc1991 packet format

symmetric
# encrypt the input only with the symmetric (conventional) cipher.
# This asks for a passphrase.

test
# Used for testing some parts of the program

verbose
# Give more informations suring processing. If used 2 times, the input data
# is listed in detail.

yes
# assume yes on most questions