manpagez: man pages & more
info gnupg
Home | html | info | man

File: gnupg.info,  Node: GPG Esoteric Options,  Next: Deprecated Options,  Prev: Compliance Options,  Up: GPG Options

4.2.6 Doing things one usually doesn't want to do
-------------------------------------------------

'-n'
'--dry-run'
     Don't make any changes (this is not completely implemented).

'--list-only'
     Changes the behaviour of some commands.  This is like '--dry-run'
     but different in some cases.  The semantic of this option may be
     extended in the future.  Currently it only skips the actual
     decryption pass and therefore enables a fast listing of the
     encryption keys.

'-i'
'--interactive'
     Prompt before overwriting any files.

'--compatibility-flags FLAGS'
     Set compatibility flags to work around problems due to
     non-compliant keys or data.  The FLAGS are given as a comma
     separated list of flag names and are OR-ed together.  The special
     flag "none" clears the list and allows one to start over with an
     empty list.  To get a list of available flags the sole word "help"
     can be used.

'--debug-level LEVEL'
     Select the debug level for investigating problems.  LEVEL may be a
     numeric value or by a keyword:

     'none'
          No debugging at all.  A value of less than 1 may be used
          instead of the keyword.
     'basic'
          Some basic debug messages.  A value between 1 and 2 may be
          used instead of the keyword.
     'advanced'
          More verbose debug messages.  A value between 3 and 5 may be
          used instead of the keyword.
     'expert'
          Even more detailed messages.  A value between 6 and 8 may be
          used instead of the keyword.
     'guru'
          All of the debug messages you can get.  A value greater than 8
          may be used instead of the keyword.  The creation of hash
          tracing files is only enabled if the keyword is used.

     How these messages are mapped to the actual debugging flags is not
     specified and may change with newer releases of this program.  They
     are however carefully selected to best aid in debugging.

'--debug FLAGS'
     Set debug flags.  All flags are or-ed and FLAGS may be given in C
     syntax (e.g.  0x0042) or as a comma separated list of flag names.
     To get a list of all supported flags the single word "help" can be
     used.  This option is only useful for debugging and the behavior
     may change at any time without notice.

'--debug-all'
     Set all useful debugging flags.

'--debug-iolbf'
     Set stdout into line buffered mode.  This option is only honored
     when given on the command line.

'--debug-set-iobuf-size N'
     Change the buffer size of the IOBUFs to N kilobyte.  Using 0 prints
     the current size.  Note well: This is a maintainer only option and
     may thus be changed or removed at any time without notice.

'--debug-allow-large-chunks'
     To facilitate software tests and experiments this option allows one
     to specify a limit of up to 4 EiB ('--chunk-size 62').

'--debug-ignore-expiration'
     This option tries to override certain key expiration dates.  It is
     only useful for certain regression tests.

'--faked-system-time EPOCH'
     This option is only useful for testing; it sets the system time
     back or forth to EPOCH which is the number of seconds elapsed since
     the year 1970.  Alternatively EPOCH may be given as a full ISO time
     string (e.g.  "20070924T154812").

     If you suffix EPOCH with an exclamation mark (!), the system time
     will appear to be frozen at the specified time.

'--full-timestrings'
     Change the format of printed creation and expiration times from
     just the date to the date and time.  This is in general not useful
     and the same information is anyway available in '--with-colons'
     mode.  These longer strings are also not well aligned with other
     printed data.

'--enable-progress-filter'
     Enable certain PROGRESS status outputs.  This option allows
     frontends to display a progress indicator while gpg is processing
     larger files.  There is a slight performance overhead using it.

'--status-fd N'
     Write special status strings to the file descriptor N.  See the
     file DETAILS in the documentation for a listing of them.

'--status-file FILE'
     Same as '--status-fd', except the status data is written to file
     FILE.

'--logger-fd N'
     Write log output to file descriptor N and not to STDERR.

'--log-file FILE'
'--logger-file FILE'
     Same as '--logger-fd', except the logger data is written to file
     FILE.  Use 'socket://' to log to s socket.

'--log-time'
     Prefix all log output with a timestamp even if no log file is used.

'--attribute-fd N'
     Write attribute subpackets to the file descriptor N.  This is most
     useful for use with '--status-fd', since the status messages are
     needed to separate out the various subpackets from the stream
     delivered to the file descriptor.

'--attribute-file FILE'
     Same as '--attribute-fd', except the attribute data is written to
     file FILE.

'--comment STRING'
'--no-comments'
     Use STRING as a comment string in cleartext signatures and ASCII
     armored messages or keys (see '--armor').  The default behavior is
     not to use a comment string.  '--comment' may be repeated multiple
     times to get multiple comment strings.  '--no-comments' removes all
     comments.  It is a good idea to keep the length of a single comment
     below 60 characters to avoid problems with mail programs wrapping
     such lines.  Note that comment lines, like all other header lines,
     are not protected by the signature.

'--emit-version'
'--no-emit-version'
     Force inclusion of the version string in ASCII armored output.  If
     given once only the name of the program and the major number is
     emitted, given twice the minor is also emitted, given thrice the
     micro is added, and given four times an operating system
     identification is also emitted.  '--no-emit-version' (default)
     disables the version line.

'--sig-notation {NAME=VALUE}'
'--cert-notation {NAME=VALUE}'
'-N, --set-notation {NAME=VALUE}'
     Put the name value pair into the signature as notation data.  NAME
     must consist only of printable characters or spaces, and must
     contain a '@' character in the form keyname@domain.example.com
     (substituting the appropriate keyname and domain name, of course).
     This is to help prevent pollution of the IETF reserved notation
     namespace.  The '--expert' flag overrides the '@' check.  VALUE may
     be any printable string; it will be encoded in UTF-8, so you should
     check that your '--display-charset' is set correctly.  If you
     prefix NAME with an exclamation mark (!), the notation data will be
     flagged as critical (rfc4880:5.2.3.16).  '--sig-notation' sets a
     notation for data signatures.  '--cert-notation' sets a notation
     for key signatures (certifications).  '--set-notation' sets both.

     There are special codes that may be used in notation names.  "%k"
     will be expanded into the key ID of the key being signed, "%K" into
     the long key ID of the key being signed, "%f" into the fingerprint
     of the key being signed, "%s" into the key ID of the key making the
     signature, "%S" into the long key ID of the key making the
     signature, "%g" into the fingerprint of the key making the
     signature (which might be a subkey), "%p" into the fingerprint of
     the primary key of the key making the signature, "%c" into the
     signature count from the OpenPGP smartcard, and "%%" results in a
     single "%".  %k, %K, and %f are only meaningful when making a key
     signature (certification), and %c is only meaningful when using the
     OpenPGP smartcard.

'--known-notation NAME'
     Adds NAME to a list of known critical signature notations.  The
     effect of this is that gpg will not mark a signature with a
     critical signature notation of that name as bad.  Note that gpg
     already knows by default about a few critical signatures notation
     names.

'--sig-policy-url STRING'
'--cert-policy-url STRING'
'--set-policy-url STRING'
     Use STRING as a Policy URL for signatures (rfc4880:5.2.3.20).  If
     you prefix it with an exclamation mark (!), the policy URL packet
     will be flagged as critical.  '--sig-policy-url' sets a policy url
     for data signatures.  '--cert-policy-url' sets a policy url for key
     signatures (certifications).  '--set-policy-url' sets both.

     The same %-expandos used for notation data are available here as
     well.

'--sig-keyserver-url STRING'
     Use STRING as a preferred keyserver URL for data signatures.  If
     you prefix it with an exclamation mark (!), the keyserver URL
     packet will be flagged as critical.

     The same %-expandos used for notation data are available here as
     well.

'--set-filename STRING'
     Use STRING as the filename which is stored inside messages.  This
     overrides the default, which is to use the actual filename of the
     file being encrypted.  Using the empty string for STRING
     effectively removes the filename from the output.

'--for-your-eyes-only'
'--no-for-your-eyes-only'
     Set the 'for your eyes only' flag in the message.  This causes
     GnuPG to refuse to save the file unless the '--output' option is
     given, and PGP to use a "secure viewer" with a claimed
     Tempest-resistant font to display the message.  This option
     overrides '--set-filename'.  '--no-for-your-eyes-only' disables
     this option.

'--use-embedded-filename'
'--no-use-embedded-filename'
     Try to create a file with a name as embedded in the data.  This can
     be a dangerous option as it enables overwriting files by giving the
     sender control on how to store files.  Defaults to no.  Note that
     the option '--output' overrides this option.

     A better approach than using this option is to decrypt to a
     temporary filename and then rename that file to the embedded file
     name after checking that the embedded filename is harmless.  When
     using the '--status-fd' option gpg tells the filename as part of
     the PLAINTEXT status message.  If the filename is important, the
     use of 'gpgtar' is another option because gpgtar will never
     overwrite a file but decrypt the files to a new directory.

     Note also that unless a modern version 5 signature is used the
     embedded filename is not part of the signed data.

'--cipher-algo NAME'
     Use NAME as cipher algorithm.  Running the program with the command
     '--version' yields a list of supported algorithms.  If this is not
     used the cipher algorithm is selected from the preferences stored
     with the key.  In general, you do not want to use this option as it
     allows you to violate the OpenPGP standard.  The option
     '--personal-cipher-preferences' is the safe way to accomplish the
     same thing.

'--digest-algo NAME'
     Use NAME as the message digest algorithm.  Running the program with
     the command '--version' yields a list of supported algorithms.  In
     general, you do not want to use this option as it allows you to
     violate the OpenPGP standard.  The option
     '--personal-digest-preferences' is the safe way to accomplish the
     same thing.

'--compress-algo NAME'
     Use compression algorithm NAME.  "zlib" is RFC-1950 ZLIB
     compression.  "zip" is RFC-1951 ZIP compression which is used by
     PGP. "bzip2" is a more modern compression scheme that can compress
     some things better than zip or zlib, but at the cost of more memory
     used during compression and decompression.  "uncompressed" or
     "none" disables compression.  If this option is not used, the
     default behavior is to examine the recipient key preferences to see
     which algorithms the recipient supports.  If all else fails, ZIP is
     used for maximum compatibility.

     ZLIB may give better compression results than ZIP, as the
     compression window size is not limited to 8k.  BZIP2 may give even
     better compression results than that, but will use a significantly
     larger amount of memory while compressing and decompressing.  This
     may be significant in low memory situations.  Note, however, that
     PGP (all versions) only supports ZIP compression.  Using any
     algorithm other than ZIP or "none" will make the message unreadable
     with PGP. In general, you do not want to use this option as it
     allows you to violate the OpenPGP standard.  The option
     '--personal-compress-preferences' is the safe way to accomplish the
     same thing.

'--cert-digest-algo NAME'
     Use NAME as the message digest algorithm used when signing a key.
     Running the program with the command '--version' yields a list of
     supported algorithms.  Be aware that if you choose an algorithm
     that GnuPG supports but other OpenPGP implementations do not, then
     some users will not be able to use the key signatures you make, or
     quite possibly your entire key.  Note also that a public key
     algorithm must be compatible with the specified digest algorithm;
     thus selecting an arbitrary digest algorithm may result in error
     messages from lower crypto layers or lead to security flaws.

'--disable-cipher-algo NAME'
     Never allow the use of NAME as cipher algorithm.  The given name
     will not be checked so that a later loaded algorithm will still get
     disabled.

'--disable-pubkey-algo NAME'
     Never allow the use of NAME as public key algorithm.  The given
     name will not be checked so that a later loaded algorithm will
     still get disabled.

'--throw-keyids'
'--no-throw-keyids'
     Do not put the recipient key IDs into encrypted messages.  This
     helps to hide the receivers of the message and is a limited
     countermeasure against traffic analysis.(1)  On the receiving side,
     it may slow down the decryption process because all available
     secret keys must be tried.  '--no-throw-keyids' disables this
     option.  This option is essentially the same as using
     '--hidden-recipient' for all recipients.

'--not-dash-escaped'
     This option changes the behavior of cleartext signatures so that
     they can be used for patch files.  You should not send such an
     armored file via email because all spaces and line endings are
     hashed too.  You can not use this option for data which has 5
     dashes at the beginning of a line, patch files don't have this.  A
     special armor header line tells GnuPG about this cleartext
     signature option.

'--escape-from-lines'
'--no-escape-from-lines'
     Because some mailers change lines starting with "From " to ">From "
     it is good to handle such lines in a special way when creating
     cleartext signatures to prevent the mail system from breaking the
     signature.  Note that all other PGP versions do it this way too.
     Enabled by default.  '--no-escape-from-lines' disables this option.

'--passphrase-repeat N'
     Specify how many times 'gpg' will request a new passphrase be
     repeated.  This is useful for helping memorize a passphrase.
     Defaults to 1 repetition; can be set to 0 to disable any passphrase
     repetition.  Note that a N greater than 1 will pop up the pinentry
     window N+1 times even if a modern pinentry with two entry fields is
     used.

'--passphrase-fd N'
     Read the passphrase from file descriptor N.  Only the first line
     will be read from file descriptor N.  If you use 0 for N, the
     passphrase will be read from STDIN. This can only be used if only
     one passphrase is supplied.

     Note that since Version 2.0 this passphrase is only used if the
     option '--batch' has also been given.  Since Version 2.1 the
     '--pinentry-mode' also needs to be set to 'loopback'.

'--passphrase-file FILE'
     Read the passphrase from file FILE.  Only the first line will be
     read from file FILE.  This can only be used if only one passphrase
     is supplied.  Obviously, a passphrase stored in a file is of
     questionable security if other users can read this file.  Don't use
     this option if you can avoid it.

     Note that since Version 2.0 this passphrase is only used if the
     option '--batch' has also been given.  Since Version 2.1 the
     '--pinentry-mode' also needs to be set to 'loopback'.

'--passphrase STRING'
     Use STRING as the passphrase.  This can only be used if only one
     passphrase is supplied.  Obviously, this is of very questionable
     security on a multi-user system.  Don't use this option if you can
     avoid it.

     Note that since Version 2.0 this passphrase is only used if the
     option '--batch' has also been given.  Since Version 2.1 the
     '--pinentry-mode' also needs to be set to 'loopback'.

'--pinentry-mode MODE'
     Set the pinentry mode to MODE.  Allowed values for MODE are:
     default
          Use the default of the agent, which is 'ask'.
     ask
          Force the use of the Pinentry.
     cancel
          Emulate use of Pinentry's cancel button.
     error
          Return a Pinentry error ("No Pinentry").
     loopback
          Redirect Pinentry queries to the caller.  Note that in
          contrast to Pinentry the user is not prompted again if he
          enters a bad password.

'--no-symkey-cache'
     Disable the passphrase cache used for symmetrical en- and
     decryption.  This cache is based on the message specific salt value
     (cf.  '--s2k-mode').

'--request-origin ORIGIN'
     Tell gpg to assume that the operation ultimately originated at
     ORIGIN.  Depending on the origin certain restrictions are applied
     and the Pinentry may include an extra note on the origin.
     Supported values for ORIGIN are: 'local' which is the default,
     'remote' to indicate a remote origin or 'browser' for an operation
     requested by a web browser.

'--command-fd N'
     This is a replacement for the deprecated shared-memory IPC mode.
     If this option is enabled, user input on questions is not expected
     from the TTY but from the given file descriptor.  It should be used
     together with '--status-fd'.  See the file doc/DETAILS in the
     source distribution for details on how to use it.

'--command-file FILE'
     Same as '--command-fd', except the commands are read out of file
     FILE

'--allow-non-selfsigned-uid'
'--no-allow-non-selfsigned-uid'
     Allow the import and use of keys with user IDs which are not
     self-signed.  This is not recommended, as a non self-signed user ID
     is trivial to forge.  '--no-allow-non-selfsigned-uid' disables.

'--allow-freeform-uid'
     Disable all checks on the form of the user ID while generating a
     new one.  This option should only be used in very special
     environments as it does not ensure the de-facto standard format of
     user IDs.

'--ignore-time-conflict'
     GnuPG normally checks that the timestamps associated with keys and
     signatures have plausible values.  However, sometimes a signature
     seems to be older than the key due to clock problems.  This option
     makes these checks just a warning.  See also '--ignore-valid-from'
     for timestamp issues on subkeys.

'--ignore-valid-from'
     GnuPG normally does not select and use subkeys created in the
     future.  This option allows the use of such keys and thus exhibits
     the pre-1.0.7 behaviour.  You should not use this option unless
     there is some clock problem.  See also '--ignore-time-conflict' for
     timestamp issues with signatures.

'--ignore-crc-error'
     The ASCII armor used by OpenPGP is protected by a CRC checksum
     against transmission errors.  Occasionally the CRC gets mangled
     somewhere on the transmission channel but the actual content (which
     is protected by the OpenPGP protocol anyway) is still okay.  This
     option allows GnuPG to ignore CRC errors.

'--ignore-mdc-error'
     This option changes a MDC integrity protection failure into a
     warning.  It is required to decrypt old messages which did not use
     an MDC. It may also be useful if a message is partially garbled,
     but it is necessary to get as much data as possible out of that
     garbled message.  Be aware that a missing or failed MDC can be an
     indication of an attack.  Use with great caution; see also option
     '--rfc2440'.

'--allow-old-cipher-algos'
     Old cipher algorithms like 3DES, IDEA, or CAST5 encrypt data using
     blocks of 64 bits; modern algorithms use blocks of 128 bit instead.
     To avoid certain attack on these old algorithms it is suggested not
     to encrypt more than 150 MiByte using the same key.  For this
     reason gpg does not allow the use of 64 bit block size algorithms
     for encryption unless this option is specified.

'--allow-weak-digest-algos'
     Signatures made with known-weak digest algorithms are normally
     rejected with an "invalid digest algorithm" message.  This option
     allows the verification of signatures made with such weak
     algorithms.  MD5 is the only digest algorithm considered weak by
     default.  See also '--weak-digest' to reject other digest
     algorithms.

'--weak-digest NAME'
     Treat the specified digest algorithm as weak.  Signatures made over
     weak digests algorithms are normally rejected.  This option can be
     supplied multiple times if multiple algorithms should be considered
     weak.  See also '--allow-weak-digest-algos' to disable rejection of
     weak digests.  MD5 is always considered weak, and does not need to
     be listed explicitly.

'--allow-weak-key-signatures'
     To avoid a minor risk of collision attacks on third-party key
     signatures made using SHA-1, those key signatures are considered
     invalid.  This options allows one to override this restriction.

'--override-compliance-check'
     This was a temporary introduced option and has no more effect.

'--no-default-keyring'
     Do not add the default keyring to the list of keyrings.  Note that
     GnuPG needs for almost all operations a keyring.  Thus if you use
     this option and do not provide alternate keyrings via '--keyring',
     then GnuPG will still use the default keyring.

     Note that if the option 'use-keyboxd' is enabled in 'common.conf',
     no keyrings are used at all and keys are all maintained by the
     keyboxd process in its own database.

'--no-keyring'
     Do not use any keyring at all.  This overrides the default and all
     options which specify keyrings.

'--skip-verify'
     Skip the signature verification step.  This may be used to make the
     decryption faster if the signature verification is not needed.

'--with-key-data'
     Print key listings delimited by colons (like '--with-colons') and
     print the public key data.

'--list-signatures'
'--list-sigs'
     Same as '--list-keys', but the signatures are listed too.  This
     command has the same effect as using '--list-keys' with
     '--with-sig-list'.  Note that in contrast to '--check-signatures'
     the key signatures are not verified.  This command can be used to
     create a list of signing keys missing in the local keyring; for
     example:

                gpg --list-sigs --with-colons USERID | \
                  awk -F: '$1=="sig" && $2=="?" {if($13){print $13}else{print $5}}'

'--fast-list-mode'
     Changes the output of the list commands to work faster; this is
     achieved by leaving some parts empty.  Some applications don't need
     the user ID and the trust information given in the listings.  By
     using this options they can get a faster listing.  The exact
     behaviour of this option may change in future versions.  If you are
     missing some information, don't use this option.

'--no-literal'
     This is not for normal use.  Use the source to see for what it
     might be useful.

'--set-filesize'
     This is not for normal use.  Use the source to see for what it
     might be useful.

'--show-session-key'
     Display the session key used for one message.  See
     '--override-session-key' for the counterpart of this option.

     We think that Key Escrow is a Bad Thing; however the user should
     have the freedom to decide whether to go to prison or to reveal the
     content of one specific message without compromising all messages
     ever encrypted for one secret key.

     You can also use this option if you receive an encrypted message
     which is abusive or offensive, to prove to the administrators of
     the messaging system that the ciphertext transmitted corresponds to
     an inappropriate plaintext so they can take action against the
     offending user.

'--override-session-key STRING'
'--override-session-key-fd FD'
     Don't use the public key but the session key STRING respective the
     session key taken from the first line read from file descriptor FD.
     The format of this string is the same as the one printed by
     '--show-session-key'.  This option is normally not used but comes
     handy in case someone forces you to reveal the content of an
     encrypted message; using this option you can do this without
     handing out the secret key.  Note that using
     '--override-session-key' may reveal the session key to all local
     users via the global process table.  Often it is useful to combine
     this option with '--no-keyring'.

'--ask-sig-expire'
'--no-ask-sig-expire'
     When making a data signature, prompt for an expiration time.  If
     this option is not specified, the expiration time set via
     '--default-sig-expire' is used.  '--no-ask-sig-expire' disables
     this option.

'--default-sig-expire'
     The default expiration time to use for signature expiration.  Valid
     values are "0" for no expiration, a number followed by the letter d
     (for days), w (for weeks), m (for months), or y (for years) (for
     example "2m" for two months, or "5y" for five years), or an
     absolute date in the form YYYY-MM-DD. Defaults to "0".

'--ask-cert-expire'
'--no-ask-cert-expire'
     When making a key signature, prompt for an expiration time.  If
     this option is not specified, the expiration time set via
     '--default-cert-expire' is used.  '--no-ask-cert-expire' disables
     this option.

'--default-cert-expire'
     The default expiration time to use for key signature expiration.
     Valid values are "0" for no expiration, a number followed by the
     letter d (for days), w (for weeks), m (for months), or y (for
     years) (for example "2m" for two months, or "5y" for five years),
     or an absolute date in the form YYYY-MM-DD. Defaults to "0".

'--default-new-key-algo STRING'
     This option can be used to change the default algorithms for key
     generation.  The STRING is similar to the arguments required for
     the command '--quick-add-key' but slightly different.  For example
     the current default of '"rsa2048/cert,sign+rsa2048/encr"' (or
     '"rsa3072"') can be changed to the value of what we currently call
     future default, which is '"ed25519/cert,sign+cv25519/encr"'.  You
     need to consult the source code to learn the details.  Note that
     the advanced key generation commands can always be used to specify
     a key algorithm directly.

'--no-auto-trust-new-key'
     When creating a new key the ownertrust of the new key is set to
     ultimate.  This option disables this and the user needs to manually
     assign an ownertrust value.

'--force-sign-key'
     This option modifies the behaviour of the commands
     '--quick-sign-key', '--quick-lsign-key', and the "sign"
     sub-commands of '--edit-key' by forcing the creation of a key
     signature, even if one already exists.

'--forbid-gen-key'
     This option is intended for use in the global config file to
     disallow the use of generate key commands.  Those commands will
     then fail with the error code for Not Enabled.

'--allow-secret-key-import'
     This is an obsolete option and is not used anywhere.

'--allow-multiple-messages'
'--no-allow-multiple-messages'
     These are obsolete options; they have no more effect since GnuPG
     2.2.8.

'--enable-special-filenames'
     This option enables a mode in which filenames of the form '-&n',
     where n is a non-negative decimal number, refer to the file
     descriptor n and not to a file with that name.

'--no-expensive-trust-checks'
     Experimental use only.

'--preserve-permissions'
     Don't change the permissions of a secret keyring back to user
     read/write only.  Use this option only if you really know what you
     are doing.

'--default-preference-list STRING'
     Set the list of default preferences to STRING.  This preference
     list is used for new keys and becomes the default for "setpref" in
     the '--edit-key' menu.

'--default-keyserver-url NAME'
     Set the default keyserver URL to NAME.  This keyserver will be used
     as the keyserver URL when writing a new self-signature on a key,
     which includes key generation and changing preferences.

'--list-config'
     Display various internal configuration parameters of GnuPG. This
     option is intended for external programs that call GnuPG to perform
     tasks, and is thus not generally useful.  See the file
     'doc/DETAILS' in the source distribution for the details of which
     configuration items may be listed.  '--list-config' is only usable
     with '--with-colons' set.

'--list-gcrypt-config'
     Display various internal configuration parameters of Libgcrypt.

'--gpgconf-list'
     This command is similar to '--list-config' but in general only
     internally used by the 'gpgconf' tool.

'--gpgconf-test'
     This is more or less dummy action.  However it parses the
     configuration file and returns with failure if the configuration
     file would prevent 'gpg' from startup.  Thus it may be used to run
     a syntax check on the configuration file.

'--chuid UID'
     Change the current user to UID which may either be a number or a
     name.  This can be used from the root account to run gpg for
     another user.  If UID is not the current UID a standard PATH is set
     and the envvar GNUPGHOME is unset.  To override the latter the
     option '--homedir' can be used.  This option has only an effect
     when used on the command line.  This option has currently no effect
     at all on Windows.

   ---------- Footnotes ----------

   (1) Using a little social engineering anyone who is able to decrypt
the message can check whether one of the other recipients is the one he
suspects.

© manpagez.com 2000-2024
Individual documents may contain additional copyright information.