[pkg-gnupg-maint] Bug#1050886: Issues that need to be fixed in "yat2m" for transforming manuals to a man-page format

Bjarni Ingi Gislason bjarniig at simnet.is
Wed Aug 30 22:08:03 BST 2023


Package: gpgrt-tools
Version: 1.47-2
Severity: normal

Dear Maintainer,

  The following are issues that yat2m needs to correct when producing
man-page formatted manuals.

  The example is from "gpg(1)".

-.-

Output from "mandoc -T lint gpg.1":

mandoc: gpg.1:152:1: WARNING: skipping paragraph macro: sp after PP
mandoc: gpg.1:646:1: WARNING: skipping paragraph macro: sp after PP
mandoc: gpg.1:1174:1: WARNING: skipping paragraph macro: sp after PP
mandoc: gpg.1:2210:1: WARNING: skipping paragraph macro: sp after PP
mandoc: gpg.1:2350:1: WARNING: skipping paragraph macro: sp after PP
mandoc: gpg.1:2747:1: WARNING: skipping paragraph macro: sp after PP
mandoc: gpg.1:2866:1: WARNING: skipping paragraph macro: sp after PP
mandoc: gpg.1:2965:1: WARNING: skipping paragraph macro: sp after PP
mandoc: gpg.1:3689:1: WARNING: skipping paragraph macro: sp after PP
mandoc: gpg.1:3737:1: WARNING: skipping paragraph macro: sp after PP
mandoc: gpg.1:3781:1: WARNING: skipping paragraph macro: sp after PP
mandoc: gpg.1:4076:1: WARNING: skipping paragraph macro: sp after PP
mandoc: gpg.1:4092:1: WARNING: skipping paragraph macro: sp after PP
mandoc: gpg.1:4183:2: WARNING: skipping paragraph macro: PP empty
mandoc: gpg.1:4184:1: WARNING: skipping paragraph macro: sp after PP
mandoc: gpg.1:4201:1: WARNING: skipping paragraph macro: sp after PP
mandoc: gpg.1:4304:1: WARNING: skipping paragraph macro: sp after PP
mandoc: gpg.1:4355:1: WARNING: skipping paragraph macro: sp after PP

-.-.

Input file is gpg.1

Change '-' (\-) to '\(en' (en-dash) for a numeric range.

gpg.1:338:the numbers 1-3 for certificate check level (see
gpg.1:345:numbers 1-9 or "T" for 10 and above to indicate trust signature levels
gpg.1:2859:that not all values in the 1024-65011712 range are legal and if an

-.-.

Change three HYPHEN-MINUSES (code 0x055, 2D) to an em-dash (\(em),
if one is intended.  An en-dash is usually surrounded by a space,
while an em-dash is used without spaces.

gpg.1:2287:--- you cannot make an group that points to another group. When used

-.-.

Mark a full stop (.) and the exclamation mark (!) with "\&",
if it does not mean an end of a sentence.
This is a preventive action,
the paragraph could be reshaped, e.g., after changes.

When typing, one does not always notice when the line wraps after the
period.
There are too many examples of input lines in manual pages,
that end with an abbreviation point.

This marking is robust, and independent of the position on the line.

It corresponds to "\ " in TeX, and to "@:" in Texinfo.


331:checking the signature (e.g. a non supported algorithm).  Signatures
589:ownertrust values (e.g. in the file \(oq\fIotrust.txt\fR\(cq), you may re-create
867:once it has been send to the public (i.e. to a keyserver).  In that case
901:(i.e. to a keyserver).  In that case you better use \fBrevuid\fR.
1000:a subkey, once it has been send to the public (i.e. to a keyserver).  In
1043:that is no longer usable (e.g. revoked, or expired). Then, remove any
1446:(e.g. "jpg"), "%T" for the MIME type of the image (e.g. "image/jpeg"),
1448:viewed (e.g. "f"), "%V" for the calculated validity as a string (e.g.
2184:(i.e. run, but give a warning).
2396:known (e.g. keyserver, web key directory) and set.  For a standard
2562:e.g. "2016-08-17". (drop-subkey)
2604:e.g. "2016-08-17". (drop-sig)
2704:(i.e. \fB--with-colons\fR).  Note that the legacy format does not
2822:(e.g. \fB--clear-sign\fR or \fB--sign\fR).
2833:to consider (e.g. \fB--symmetric\fR).
3027:in C syntax (e.g. 0x0042) or as a comma separated list of flag names.
3045:(e.g. "20070924T154812").
3367:(cf. \fB--s2k-mode\fR).
3878:(i.e. inside the angle brackets).

-.-.

Change -- in x--y to \(em (em-dash), or, if an
option, to \-\-

71:options \fB--with-colons\fR and \fB--status-fd\fR.  For certain
72:operations the option \fB--command-fd\fR may come handy too.  See
86:forcing their use via the \fB--cipher-algo\fR,
87:\fB--digest-algo\fR, \fB--cert-digest-algo\fR, or
88:\fB--compress-algo\fR options in GnuPG, it is possible to create a
104:the \fB--pgp6\fR, \fB--pgp7\fR, or \fB--pgp8\fR options. These
120:If you run into any problems, please add the option \fB--verbose\fR
131:.B  --version
136:.B  --help
144:.B  --warranty
148:.B  --dump-options
161:.B  --sign
164:Sign a message. This command may be combined with \fB--encrypt\fR
165:(to sign and encrypt a message), \fB--symmetric\fR (to sign and
166:symmetrically encrypt a message), or both \fB--encrypt\fR and
167:\fB--symmetric\fR (to sign and encrypt a message that can be
170:\fB--local-user\fR and \fB--default-key\fR options.
173:.B  --clear-sign
175:.B  --clearsign
181:explicitly using the \fB--local-user\fR and \fB--default-key\fR
186:.B  --detach-sign
192:.B  --encrypt
196:with \fB--sign\fR (to sign and encrypt a message),
197:\fB--symmetric\fR (to encrypt a message that can be decrypted using a
198:secret key or a passphrase), or \fB--sign\fR and
199:\fB--symmetric\fR together (for a signed message that can be
200:decrypted using a secret key or a passphrase).  \fB--recipient\fR
204:.B  --symmetric
209:\fB--cipher-algo\fR option. This command may be combined with
210:\fB--sign\fR (for a signed and symmetrically encrypted message),
211:\fB--encrypt\fR (for a message that may be decrypted via a secret key
212:or a passphrase), or \fB--sign\fR and \fB--encrypt\fR together
217:\fB--no-symkey-cache\fR can be used to disable this feature.
220:.B  --store
224:.B  --decrypt
229:\fB--output\fR). If the decrypted file is signed, the signature is also
235:.B  --verify
247:Note: If the option \fB--batch\fR is not used, \fBgpg\fR
257:the dash marker line.  The option \fB--output\fR may be used to write
270:.B  --multifile
274:once. \fB--multifile\fR may currently be used along with
275:\fB--verify\fR, \fB--encrypt\fR, and \fB--decrypt\fR. Note that
276:\fB--multifile --verify\fR may not be used with detached signatures.
279:.B  --verify-files
280:Identical to \fB--multifile --verify\fR.
283:.B  --encrypt-files
284:Identical to \fB--multifile --encrypt\fR.
287:.B  --decrypt-files
288:Identical to \fB--multifile --decrypt\fR.
291:.B  --list-keys
295:.B  --list-public-keys
301:change.  The \fB--with-colons\fR option emits the output in a
306:.B  --list-secret-keys
314:the key using the command \fB--export-secret-subkeys\fR).  A
316:smartcard.  See also \fB--list-keys\fR.
319:.B  --check-signatures
321:.B  --check-sigs
322:Same as \fB--list-keys\fR, but the key signatures are verified and
325:using \fB--list-keys\fR with \fB--with-sig-check\fR.
333:keyids the command \fB--list-sigs\fR can be used.
339:\fB--ask-cert-level\fR), "L" for a local or non-exportable
340:signature (see \fB--lsign-key\fR), "R" for a nonRevocable signature
341:(see the \fB--edit-key\fR command "nrsign"), "P" for a signature
342:that contains a policy URL (see \fB--cert-policy-url\fR), "N" for a
343:signature that contains a notation (see \fB--cert-notation\fR), "X"
344:for an eXpired signature (see \fB--ask-cert-expire\fR), and the
346:(see the \fB--edit-key\fR command "tsign").
350:.B  --locate-keys
352:.B  --locate-external-keys
356:external methods as defined by \fB--auto-key-locate\fR are used to
360:The variant \fB--locate-external-keys\fR does not consider a
363:and the methods defined by --auto-key-locate define LDAP servers, the
368:.B  --show-keys
370:them in the same way the command \fB--list-keys\fR does for locally
375:\fB--with-colons\fR.
378:.B  --fingerprint
380:fingerprints. This is the same output as \fB--list-keys\fR but with
382:combined with \fB--check-signatures\fR.  If this
388:.B  --list-packets
390:debugging.  When used with option \fB--verbose\fR the actual MPI
396:.B  --edit-card
398:.B  --card-edit
405:.B  --card-status
409:.B  --change-pin
412:\fB--edit-card\fR command.
415:.B  --delete-keys \fIname\fR
416:Remove key from the public keyring. In batch mode either \fB--yes\fR is
424:.B  --delete-secret-keys \fIname\fR
426:specified by fingerprint.  The option \fB--yes\fR can be used to
437:.B  --delete-secret-and-public-key \fIname\fR
438:Same as \fB--delete-key\fR, but if a secret key exists, it will be
440:The option \fB--yes\fR can be used to advise gpg-agent not to
444:.B  --export
446:registered via option \fB--keyring\fR), or if at least one name is given,
448:file given with option \fB--output\fR.  Use together with
449:\fB--armor\fR to mail those keys.
452:.B  --send-keys \fIkeyIDs\fR
453:Similar to \fB--export\fR but sends the keys to a keyserver.
465:.B  --export-secret-keys
467:.B  --export-secret-subkeys
468:Same as \fB--export\fR, but exports the secret keys instead.  The
470:\fB--output\fR.  This command is often used along with the option
471:\fB--armor\fR to allow for easy printing of the key for paper backup;
488:.B  --export-ssh-key
492:to STDOUT or to the file given with option \fB--output\fR.  That
501:.B  --import
503:.B  --fast-import
508:Most notable here is the \fB--import-options merge-only\fR option
513:.B  --receive-keys \fIkeyIDs\fR
515:.B  --recv-keys \fIkeyIDs\fR
519:.B  --refresh-keys
526:.B  --search-keys \fInames\fR
533:results when being used with the \fB--recv-key\fR command to
537:.B  --fetch-keys \fIURIs\fR
544:.B  --update-trustdb
551:\fB--edit-key\fR menu, the assigned value can be changed at any time.
554:.B  --check-trustdb
559:automatically unless \fB--no-auto-check-trustdb\fR is set. This
561:processing is identical to that of \fB--update-trustdb\fR but it
565:\fB--batch\fR in which case the trust database check is done only if
567:\fB--yes\fR.
571:.B  --export-ownertrust
578:  gpg --export-ownertrust > otrust.txt
585:.B  --import-ownertrust
596:  gpg --import-ownertrust < otrust.txt
603:.B  --rebuild-keydb-caches
609:.B  --print-md \fIalgo\fR
611:.B  --print-mds
617:.B  --gen-random \fI0|1|2\fR \fIcount\fR
620:will be emitted.  If used with \fB--armor\fR the output will be
625:.B  --gen-prime \fImode\fR  \fIbits\fR
631:.B  --enarmor
633:.B  --dearmor
638:.B  --tofu-policy {auto|good|unknown|bad|ask}  \fIkeys\fR
656:.B  --quick-generate-key \fIuser-id\fR [\fIalgo\fR [\fIusage\fR [\fIexpire\fR]]]
658:.B  --quick-gen-key
660:In contrast to \fB--generate-key\fR the key is generated directly
662:\fB--yes\fR is given, the key creation will be canceled if the
675:\fB--quick-add-key\fR.  The \fIusage\fR accepts also the value
688:If this command is used with \fB--batch\fR,
689:\fB--pinentry-mode\fR has been set to \fBloopback\fR, and one of
690:the passphrase options (\fB--passphrase\fR,
691:\fB--passphrase-fd\fR, or \fB--passphrase-file\fR) is used, the
693:for it.  To create a key without any protection \fB--passphrase ''\fR
701:smartcards.  Note that the interactive \fB--full-gen-key\fR command
707:parameters using the option \fB--default-new-key-algo\fR.
710:.B  --quick-set-expire \fIfpr\fR \fIexpire\fR [*|\fIsubfprs\fR]
722:.B  --quick-add-key \fIfpr\fR [\fIalgo\fR [\fIusage\fR [\fIexpire\fR]]]
737:\fBgpg --with-colons --list-config curve\fR can be used.
759:.B  --generate-key
761:.B  --gen-key
768:.B  --full-generate-key
770:.B  --full-gen-key
772:extended version of \fB--generate-key\fR.
780:.B  --generate-revocation \fIname\fR
782:.B  --gen-revoke \fIname\fR
784:a subkey or a key signature, use the \fB--edit\fR command.
790:using the \fB--import\fR command.  Then the revoked key needs to be
792:(command \fB--send-key\fR) and by exporting (\fB--export\fR) it
797:.B  --generate-designated-revocation \fIname\fR
799:.B  --desig-revoke \fIname\fR
806:.B  --edit-key
858:If the option \fB--only-sign-text-ids\fR is specified, then any
920:\fB--keyserver-options honor-keyserver-url\fR for more on how this
927:\fB--cert-notation\fR for more on how this works. Setting a value of
950:\fB--default-preference-list\fR), and calling setpref with "none"
1068:\fB--require-cross-certification\fR.  All new keys generated have
1093:.B  --sign-key \fIname\fR
1095:the subcommand "sign" from \fB--edit\fR.
1098:.B  --lsign-key \fIname\fR
1101:from \fB--edit-key\fR.
1104:.B  --quick-sign-key \fIfpr\fR [\fInames\fR]
1106:.B  --quick-lsign-key \fIfpr\fR [\fInames\fR]
1115:The command \fB--quick-lsign-key\fR marks the signatures as
1117:\fB--quick-sign-key\fR turns it into a exportable signature.  If
1119:notation data, you need to use the option \fB--force-sign-key\fR.
1122:full flexibility of the "sign" subcommand from \fB--edit-key\fR.
1127:.B  --quick-add-uid  \fIuser-id\fR \fInew-user-id\fR
1129:the interactive sub-command \fBadduid\fR of \fB--edit-key\fR the
1135:.B  --quick-revoke-uid  \fIuser-id\fR \fIuser-id-to-revoke\fR
1141:sub-command \fBrevuid\fR of \fB--edit-key\fR.
1144:.B  --quick-revoke-sig  \fIfpr\fR \fIsigning-fpr\fR [\fInames\fR]
1148:given names are affected (see \fB--quick-sign-key\fR).  If a
1155:.B  --quick-set-primary-uid  \fIuser-id\fR \fIprimary-user-id\fR
1164:.B  --change-passphrase \fIuser-id\fR
1166:.B  --passwd \fIuser-id\fR
1170:option \fB--dry-run\fR this will not actually change the passphrase
1205:.B  --default-key \fIname\fR
1208:Note that \fB-u\fR or \fB--local-user\fR overrides this option.
1215:.B  --default-recipient \fIname\fR
1216:Use \fIname\fR as default recipient if option \fB--recipient\fR is
1221:.B  --default-recipient-self
1222:Use the default key as default recipient if option \fB--recipient\fR is not
1224:one from the secret keyring or the one set with \fB--default-key\fR.
1227:.B  --no-default-recipient
1228:Reset \fB--default-recipient\fR and \fB--default-recipient-self\fR.
1232:.B  -v, --verbose
1237:.B  --no-verbose
1241:.B  -q, --quiet
1245:.B  --batch
1247:.B  --no-batch
1249:\fB--no-batch\fR disables this option.  Note that even with a
1257:\fB--status-fd\fR and \fB--with-colons\fR for any unattended use of
1261:.B  --no-tty
1264:warnings to the TTY even if \fB--batch\fR is used.
1267:.B  --yes
1271:.B  --no
1276:.B  --list-options \fIparameters\fR
1278:listing keys and signatures (that is, \fB--list-keys\fR,
1279:\fB--check-signatures\fR, \fB--list-public-keys\fR,
1280:\fB--list-secret-keys\fR, and the \fB--edit-key\fR functions).
1288:Causes \fB--list-keys\fR, \fB--check-signatures\fR,
1289:\fB--list-public-keys\fR, and \fB--list-secret-keys\fR to
1291:\fB--photo-viewer\fR.  Does not work with \fB--with-colons\fR:
1292:see \fB--attribute-fd\fR for the appropriate way to get photo data
1304:Show policy URLs in the  \fB--check-signatures\fR
1314:\fB--check-signatures\fR listings. Defaults to no.
1319:\fB--check-signatures\fR listings. Defaults to no.
1342:\fB--check-signatures\fR listings. Defaults to no.
1349:meaningful when using \fB--with-colons\fR along with
1350:\fB--check-signatures\fR.
1359:.B  --verify-options \fIparameters\fR
1369:Defaults to no. See also \fB--photo-viewer\fR.
1410:is similar to the "web bug" described for the \fB--auto-key-retrieve\fR
1420:.B  --enable-large-rsa
1422:.B  --disable-large-rsa
1423:With --generate-key and --batch, enable the creation of RSA secret keys as
1431:.B  --enable-dsa2
1433:.B  --disable-dsa2
1435:1024 bit.  This is also the default with \fB--openpgp\fR.  Note
1440:.B  --photo-viewer \fIstring\fR
1467:.B  --exec-path \fIstring\fR
1472:.B  --keyring \fIfile\fR
1476:home directory ("~/.gnupg" unless \fB--homedir\fR or $GNUPGHOME is
1480:use the specified keyring alone, use \fB--keyring\fR along with
1481:\fB--no-default-keyring\fR.
1483:If the option \fB--no-keyring\fR has been used no keyrings will
1487:.B  --primary-keyring \fIfile\fR
1488:This is a varian of \fB--keyring\fR and designates \fIfile\fR as
1490:\fB--import\fR or keyserver \fB--recv-from\fR) will go to this
1495:.B  --secret-keyring \fIfile\fR
1500:.B  --trustdb-name \fIfile\fR
1504:home directory (\(oq\fI~/.gnupg\fR\(cq if \fB--homedir\fR or $GNUPGHOME is
1508:.B  --homedir \fIdir\fR
1531:.B  --display-charset \fIname\fR
1567:.B  --utf8-strings
1569:.B  --no-utf8-strings
1571:default (\fB--no-utf8-strings\fR) is to assume that arguments are
1573:\fB--display-charset\fR. These options affect all following
1585:.B  --options \fIfile\fR
1587:default options file in the homedir (see \fB--homedir\fR). This
1591:.B  --no-options
1592:Shortcut for \fB--options /dev/null\fR. This option is detected
1599:.B  --compress-level \fIn\fR
1601:.B  --bzip2-compress-level \fIn\fR
1604:(normally 6). \fB--bzip2-compress-level\fR sets the compression level
1606:different option from \fB--compress-level\fR since BZIP2 uses a
1611:.B  --bzip2-decompress-lowmem
1616:\fB--bzip2-compress-level\fR.
1620:.B  --mangle-dos-filenames
1622:.B  --no-mangle-dos-filenames
1624:dot. \fB--mangle-dos-filenames\fR causes GnuPG to replace (rather
1630:.B  --ask-cert-level
1632:.B  --no-ask-cert-level
1635:\fB--default-cert-level\fR. See \fB--default-cert-level\fR for
1637:used. \fB--no-ask-cert-level\fR disables this option. This option
1641:.B  --default-cert-level \fIn\fR
1671:.B  --min-cert-level
1678:.B  --trusted-key \fIlong key ID or fingerprint\fR
1688:.B  --trust-model {pgp|classic|tofu|tofu+pgp|direct|always|auto}
1737:using the \fB--tofu-policy\fR option.  The default policy can be
1738:set using the \fB--tofu-default-policy\fR option.
1742:default (unless overridden by \fB--tofu-default-policy\fR) and
1761:By setting \fB--tofu-default-policy=unknown\fR, this model can be
1794:.B  --auto-key-locate \fImechanisms\fR
1796:.B  --no-auto-key-locate
1804:\fB--no-auto-key-locate\fR or the mechanism "clear" resets the
1836:\fB--locate-external-key\fR.  Note that this mechanism is
1843:by fingerprint using the command \fB--locate-external-key\fR if
1851:\fB--locate-external-key\fR if the URL specifies an LDAP server.
1857:\(oq--auto-key-locate local\(cq is identical to
1858:\fB--no-auto-key-locate\fR.
1863:mechanisms defined by the \fB--auto-key-locate\fR are tried.  The
1878:.B  --auto-key-import
1880:.B  --no-auto-key-import
1885:imported. The default is \fB--no-auto-key-import\fR.
1887:On the sender (signing) site the option \fB--include-key-block\fR
1892:.B  --auto-key-retrieve
1894:.B  --no-auto-key-retrieve
1897:local keyring.  The default is \fB--no-auto-key-retrieve\fR.
1901:1. If the option \fB--auto-key-import\fR is set and the signatures
1908:signature uses the option \fB--sig-keyserver-url\fR to specify the
1912:\fB--sender\fR while creating the signature) a Web Key Directory
1915:option \fB--disable-signer-uid\fR.
1932:.B  --keyid-format {none|short|0xshort|long|0xlong}
1938:option is ignored if the option \fB--with-colons\fR is used.
1941:.B  --keyserver \fIname\fR
1942:This option is deprecated - please use the \fB--keyserver\fR in
1946:\fB--receive-keys\fR, \fB--send-keys\fR, and \fB--search-keys\fR
1961:.B  --keyserver-options {\fIname\fR=\fIvalue\fR}
1965:well to apply to importing (\fB--recv-key\fR) or exporting
1966:(\fB--send-key\fR) a key from a keyserver. While not all options
1973:When searching for a key with \fB--search-keys\fR, include keys that
1983:When searching for a key with \fB--search-keys\fR, include keys that
1994:When using \fB--refresh-keys\fR, if the key in question has a preferred
2004:If \fB--auto-key-retrieve\fR is used, and the signature being
2039:.B  --completes-needed \fIn\fR
2044:.B  --marginals-needed \fIn\fR
2049:.B  --tofu-default-policy {auto|good|unknown|bad|ask}
2054:.B  --max-cert-depth \fIn\fR
2058:.B  --no-sig-cache
2067:.B  --auto-check-trustdb
2069:.B  --no-auto-check-trustdb
2071:updated, it automatically runs the \fB--check-trustdb\fR command
2073:process. \fB--no-auto-check-trustdb\fR disables this option.
2076:.B  --use-agent
2078:.B  --no-use-agent
2082:.B  --gpg-agent-info
2087:.B  --agent-program \fIfile\fR
2090:option \fB--list-dirs\fR.  Note that the pipe symbol (\fB|\fR) is
2095:.B  --dirmngr-program \fIfile\fR
2100:.B  --disable-dirmngr
2104:.B  --no-autostart
2109:may be started manually using \fBgpgconf --launch dirmngr\fR.
2112:.B  --lock-once
2118:.B  --lock-multiple
2120:needed. Use this to override a previous \fB--lock-once\fR
2124:.B  --lock-never
2132:.B  --exit-on-status-write-error
2138:\fB--enable-progress-filter\fR may be used to cleanly cancel long
2142:.B  --limit-card-insert-tries \fIn\fR
2151:.B  --no-random-seed-file
2158:.B  --no-greeting
2162:.B  --no-secmem-warning
2166:.B  --no-permission-warning
2167:Suppress the warning about unsafe file and home directory (\fB--homedir\fR)
2173:Note that the warning for unsafe \fB--homedir\fR permissions cannot be
2176:warnings about itself. The \fB--homedir\fR permissions warning may only be
2180:.B  --require-secmem
2182:.B  --no-require-secmem
2188:.B  --require-cross-certification
2190:.B  --no-require-cross-certification
2194:Defaults to \fB--require-cross-certification\fR for
2198:.B  --expert
2200:.B  --no-expert
2207:off. \fB--no-expert\fR disables this option.
2218:.B  --recipient \fIname\fR
2222:\fB--hidden-recipient\fR is not specified, GnuPG asks for the user-id
2223:unless \fB--default-recipient\fR is given.
2226:.B  --hidden-recipient \fIname\fR
2232:\fB--recipient\fR is not specified, GnuPG asks for the user ID unless
2233:\fB--default-recipient\fR is given.
2236:.B  --recipient-file \fIfile\fR
2239:This option is similar to \fB--recipient\fR except that it
2245:.B  --hidden-recipient-file \fIfile\fR
2248:This option is similar to \fB--hidden-recipient\fR except that it
2254:.B  --encrypt-to \fIname\fR
2255:Same as \fB--recipient\fR but this one is intended for use in the
2258:recipients given either by use of \fB--recipient\fR or by the asked
2263:.B  --hidden-encrypt-to \fIname\fR
2264:Same as \fB--hidden-recipient\fR but this one is intended for use in the
2267:recipients given either by use of \fB--recipient\fR or by the asked user id.
2272:.B  --no-encrypt-to
2273:Disable the use of all \fB--encrypt-to\fR and
2274:\fB--hidden-encrypt-to\fR keys.
2277:.B  --group {\fIname\fR=\fIvalue\fR}
2280:\fB--recipient\fR), it will be expanded to the values
2293:.B  --ungroup \fIname\fR
2294:Remove a given entry from the \fB--group\fR list.
2297:.B  --no-groups
2298:Remove all entries from the \fB--group\fR list.
2301:.B  --local-user \fIname\fR
2305:\fB--default-key\fR.
2308:.B  --sender \fImbox\fR
2317:.B  --try-secret-key \fIname\fR
2319:decryption.  The key set with \fB--default-key\fR is always tried
2329:.B  --try-all-secrets
2333:\fB--throw-keyids\fR or \fB--hidden-recipient\fR) and might come
2337:.B  --skip-hidden-recipients
2339:.B  --no-skip-hidden-recipients
2357:.B  --armor
2364:.B  --no-armor
2368:.B  --output \fIfile\fR
2375:.B  --max-output \fIn\fR
2385:.B  --input-size-hint \fIn\fR
2390:the \fB--status-fd\fR line ``PROGRESS'' to provide a value for
2394:.B  --key-origin \fIstring\fR[,\fIurl\fR]
2403:.B  --import-options \fIparameters\fR
2432:subkey. Defaults to no for regular \fB--import\fR and to yes for
2433:keyserver \fB--receive-keys\fR.
2440:This can be combined with the option \fB--dry-run\fR to only look
2442:combination.  The command \fB--show-keys\fR is another shortcut
2465:on the keyring. This option is the same as running the \fB--edit-key\fR
2489:same as running the \fB--edit-key\fR command "minimize" after import.
2502:.B  --import-filter {\fIname\fR=\fIexpr\fR}
2504:.B  --export-filter {\fIname\fR=\fIexpr\fR}
2524:Currently only implemented for --export-filter.
2530:Currently only implemented for --import-filter.
2617:.B  --export-options \fIparameters\fR
2658:the same as running the \fB--edit-key\fR command "clean" before export
2666:running the \fB--edit-key\fR command "minimize" before export except
2685:.B  --with-colons
2687:encoded in UTF-8 regardless of any \fB--display-charset\fR setting. This
2694:.B  --fixed-list-mode
2695:Do not merge primary user ID and primary key in \fB--with-colon\fR
2701:.B  --legacy-list-mode
2704:(i.e. \fB--with-colons\fR).  Note that the legacy format does not
2708:.B  --with-fingerprint
2709:Same as the command \fB--fingerprint\fR but changes only the format
2713:.B  --with-subkey-fingerprint
2716:achieved by using the \fB--with-fingerprint\fR twice but by using
2721:.B  --with-icao-spelling
2725:.B  --with-keygrip
2726:Include the keygrip in the key listings.  In \fB--with-colons\fR mode
2730:.B  --with-key-origin
2732:a key in a key listing.  In \fB--with-colons\fR mode this is always
2737:.B  --with-wkd-hash
2742:.B  --with-secret
2744:done with \fB--with-colons\fR.
2754:.B  -t, --textmode
2756:.B  --no-textmode
2763:Mac to Windows, etc). \fB--no-textmode\fR disables this option, and
2767:.B  --force-v3-sigs
2769:.B  --no-force-v3-sigs
2771:.B  --force-v4-certs
2773:.B  --no-force-v4-certs
2777:.B  --force-mdc
2779:.B  --disable-mdc
2782:message is exceptionally required, the option \fB--rfc2440\fR
2786:.B  --disable-signer-uid
2791:\fB--auto-key-retrieve\fR.
2794:.B  --include-key-block
2801:\fB--include-certs\fR.
2804:.B  --personal-cipher-preferences \fIstring\fR
2806:\fBgpg --version\fR to get a list of available algorithms,
2811:used for the \fB--symmetric\fR encryption command.
2814:.B  --personal-digest-preferences \fIstring\fR
2816:\fBgpg --version\fR to get a list of available algorithms,
2822:(e.g. \fB--clear-sign\fR or \fB--sign\fR).
2825:.B  --personal-compress-preferences \fIstring\fR
2827:Use \fBgpg --version\fR to get a list of available
2833:to consider (e.g. \fB--symmetric\fR).
2836:.B  --s2k-cipher-algo \fIname\fR
2838:a passphrase if \fB--personal-cipher-preferences\fR and
2839:\fB--cipher-algo\fR are not given.  The default is AES-128.
2842:.B  --s2k-digest-algo \fIname\fR
2847:.B  --s2k-mode \fIn\fR
2852:of times (see \fB--s2k-count\fR).
2855:.B  --s2k-count \fIn\fR
2861:value.  This option is only meaningful if \fB--s2k-mode\fR is set
2879:.B  --gnupg
2881:(see \fB--openpgp\fR), but with some additional workarounds for common
2887:.B  --openpgp
2890:\fB--s2k-*\fR, \fB--cipher-algo\fR, \fB--digest-algo\fR and
2891:\fB--compress-algo\fR to OpenPGP compliant values. All PGP
2895:.B  --rfc4880
2898:\fB--openpgp\fR.
2901:.B  --rfc4880bis
2908:.B  --rfc2440
2913:\fB--ignore-mdc-error\fR.
2916:.B  --pgp6
2921:\fB--throw-keyids\fR, and making signatures with signing subkeys as PGP 6
2924:This option implies \fB--escape-from-lines\fR.
2927:.B  --pgp7
2929:identical to \fB--pgp6\fR except that MDCs are not disabled, and the
2934:.B  --pgp8
2937:this does is disable \fB--throw-keyids\fR and set
2938:\fB--escape-from-lines\fR.  All algorithms are allowed except for the
2942:.B  --compliance \fIstring\fR
2948:.B  --min-rsa-length \fIn\fR
2954:.B  --require-compliance
2975:.B  --dry-run
2979:.B  --list-only
2980:Changes the behaviour of some commands. This is like \fB--dry-run\fR but
2988:.B  --interactive
2992:.B  --debug-level \fIlevel\fR
3025:.B  --debug \fIflags\fR
3032:.B  --debug-all
3036:.B  --debug-iolbf
3041:.B  --faked-system-time \fIepoch\fR
3051:.B  --enable-progress-filter
3057:.B  --status-fd \fIn\fR
3062:.B  --status-file \fIfile\fR
3063:Same as \fB--status-fd\fR, except the status data is written to file
3067:.B  --logger-fd \fIn\fR
3071:.B  --log-file \fIfile\fR
3073:.B  --logger-file \fIfile\fR
3074:Same as \fB--logger-fd\fR, except the logger data is written to
3077:\fB--batch\fR is also used.
3080:.B  --attribute-fd \fIn\fR
3082:useful for use with \fB--status-fd\fR, since the status messages are
3087:.B  --attribute-file \fIfile\fR
3088:Same as \fB--attribute-fd\fR, except the attribute data is written to
3092:.B  --comment \fIstring\fR
3094:.B  --no-comments
3096:armored messages or keys (see \fB--armor\fR). The default behavior is
3097:not to use a comment string. \fB--comment\fR may be repeated multiple
3098:times to get multiple comment strings. \fB--no-comments\fR removes
3105:.B  --emit-version
3107:.B  --no-emit-version
3112:is also emitted.  \fB--no-emit-version\fR (default) disables the version
3116:.B  --sig-notation {\fIname\fR=\fIvalue\fR}
3118:.B  --cert-notation {\fIname\fR=\fIvalue\fR}
3120:.B  -N, --set-notation {\fIname\fR=\fIvalue\fR}
3126:namespace. The \fB--expert\fR flag overrides the '@'
3128:UTF-8, so you should check that your \fB--display-charset\fR is set
3131:(rfc4880:5.2.3.16). \fB--sig-notation\fR sets a notation for data
3132:signatures. \fB--cert-notation\fR sets a notation for key signatures
3133:(certifications). \fB--set-notation\fR sets both.
3148:.B  --known-notation \fIname\fR
3155:.B  --sig-policy-url \fIstring\fR
3157:.B  --cert-policy-url \fIstring\fR
3159:.B  --set-policy-url \fIstring\fR
3162:be flagged as critical. \fB--sig-policy-url\fR sets a policy url for
3163:data signatures. \fB--cert-policy-url\fR sets a policy url for key
3164:signatures (certifications). \fB--set-policy-url\fR sets both.
3169:.B  --sig-keyserver-url \fIstring\fR
3177:.B  --set-filename \fIstring\fR
3184:.B  --for-your-eyes-only
3186:.B  --no-for-your-eyes-only
3188:refuse to save the file unless the \fB--output\fR option is given,
3190:to display the message. This option overrides \fB--set-filename\fR.
3191:\fB--no-for-your-eyes-only\fR disables this option.
3194:.B  --use-embedded-filename
3196:.B  --no-use-embedded-filename
3199:Note that the option \fB--output\fR overrides this option.
3202:.B  --cipher-algo \fIname\fR
3204:command \fB--version\fR yields a list of supported algorithms. If
3208:\fB--personal-cipher-preferences\fR is the safe way to accomplish the
3212:.B  --digest-algo \fIname\fR
3214:with the command \fB--version\fR yields a list of supported algorithms. In
3216:violate the OpenPGP standard. \fB--personal-digest-preferences\fR is the
3220:.B  --compress-algo \fIname\fR
3239:violate the OpenPGP standard. \fB--personal-compress-preferences\fR is the
3243:.B  --cert-digest-algo \fIname\fR
3245:key. Running the program with the command \fB--version\fR yields a
3252:.B  --disable-cipher-algo \fIname\fR
3258:.B  --disable-pubkey-algo \fIname\fR
3264:.B  --throw-keyids
3266:.B  --no-throw-keyids
3273:be tried.  \fB--no-throw-keyids\fR disables this option. This option
3274:is essentially the same as using \fB--hidden-recipient\fR for all
3278:.B  --not-dash-escaped
3288:.B  --escape-from-lines
3290:.B  --no-escape-from-lines
3295:default. \fB--no-escape-from-lines\fR disables this option.
3298:.B  --passphrase-repeat \fIn\fR
3307:.B  --passphrase-fd \fIn\fR
3314:option \fB--batch\fR has also been given. Since Version 2.1
3315:the \fB--pinentry-mode\fR also needs to be set to \fBloopback\fR.
3318:.B  --passphrase-file \fIfile\fR
3326:option \fB--batch\fR has also been given. Since Version 2.1
3327:the \fB--pinentry-mode\fR also needs to be set to \fBloopback\fR.
3330:.B  --passphrase \fIstring\fR
3337:option \fB--batch\fR has also been given. Since Version 2.1
3338:the \fB--pinentry-mode\fR also needs to be set to \fBloopback\fR.
3341:.B  --pinentry-mode \fImode\fR
3364:.B  --no-symkey-cache
3367:(cf. \fB--s2k-mode\fR).
3370:.B  --request-origin \fIorigin\fR
3379:.B  --command-fd \fIn\fR
3383:together with \fB--status-fd\fR. See the file doc/DETAILS in the source
3387:.B  --command-file \fIfile\fR
3388:Same as \fB--command-fd\fR, except the commands are read out of file
3392:.B  --allow-non-selfsigned-uid
3394:.B  --no-allow-non-selfsigned-uid
3397:trivial to forge. \fB--no-allow-non-selfsigned-uid\fR disables.
3400:.B  --allow-freeform-uid
3406:.B  --ignore-time-conflict
3410:makes these checks just a warning. See also \fB--ignore-valid-from\fR for
3414:.B  --ignore-valid-from
3418:is some clock problem. See also \fB--ignore-time-conflict\fR for timestamp
3422:.B  --ignore-crc-error
3430:.B  --ignore-mdc-error
3436:attack.  Use with great caution; see also option \fB--rfc2440\fR.
3439:.B  --allow-weak-digest-algos
3444:\fB--weak-digest\fR to reject other digest algorithms.
3447:.B  --weak-digest \fIname\fR
3451:weak.  See also \fB--allow-weak-digest-algos\fR to disable
3456:.B  --allow-weak-key-signatures
3462:.B  --override-compliance-check
3467:case.  This option is ignored in --batch mode so that no accidental
3471:.B  --no-default-keyring
3474:option and do not provide alternate keyrings via \fB--keyring\fR,
3478:.B  --no-keyring
3483:.B  --skip-verify
3489:.B  --with-key-data
3490:Print key listings delimited by colons (like \fB--with-colons\fR) and
3494:.B  --list-signatures
3496:.B  --list-sigs
3497:Same as \fB--list-keys\fR, but the signatures are listed too.  This
3498:command has the same effect as using \fB--list-keys\fR with
3499:\fB--with-sig-list\fR.  Note that in contrast to
3500:\fB--check-signatures\fR the key signatures are not verified.  This
3506:      gpg --list-sigs --with-colons USERID | \\
3512:.B  --fast-list-mode
3521:.B  --no-literal
3525:.B  --set-filesize
3529:.B  --show-session-key
3531:\fB--override-session-key\fR for the counterpart of this option.
3545:.B  --override-session-key \fIstring\fR
3547:.B  --override-session-key-fd \fIfd\fR
3551:\fB--show-session-key\fR. This option is normally not used but
3554:out the secret key.  Note that using \fB--override-session-key\fR
3557:\fB--no-keyring\fR.
3560:.B  --ask-sig-expire
3562:.B  --no-ask-sig-expire
3565:\fB--default-sig-expire\fR is used. \fB--no-ask-sig-expire\fR
3569:.B  --default-sig-expire
3577:.B  --ask-cert-expire
3579:.B  --no-ask-cert-expire
3582:\fB--default-cert-expire\fR is used. \fB--no-ask-cert-expire\fR
3586:.B  --default-cert-expire
3594:.B  --default-new-key-algo \fIstring\fR
3597:the command \fB--quick-add-key\fR but slightly different.  For
3606:.B  --force-sign-key
3608:\fB--quick-sign-key\fR, \fB--quick-lsign-key\fR, and the "sign"
3609:sub-commands of \fB--edit-key\fR by forcing the creation of a key
3613:.B  --forbid-gen-key
3619:.B  --allow-secret-key-import
3623:.B  --allow-multiple-messages
3625:.B  --no-allow-multiple-messages
3637:.B  --enable-special-filenames
3643:.B  --no-expensive-trust-checks
3647:.B  --preserve-permissions
3652:.B  --default-preference-list \fIstring\fR
3658:.B  --default-keyserver-url \fIname\fR
3664:.B  --list-config
3669:listed. \fB--list-config\fR is only usable with
3670:\fB--with-colons\fR set.
3673:.B  --list-gcrypt-config
3677:.B  --gpgconf-list
3678:This command is similar to \fB--list-config\fR but in general only
3682:.B  --gpgconf-test
3696:.B  --show-photos
3698:.B  --no-show-photos
3699:Causes \fB--list-keys\fR, \fB--list-signatures\fR,
3700:\fB--list-public-keys\fR, \fB--list-secret-keys\fR, and verifying
3702:any. See also \fB--photo-viewer\fR. These options are deprecated. Use
3703:\fB--list-options [no-]show-photos\fR and/or \fB--verify-options
3707:.B  --show-keyring
3710:\fB--list-options [no-]show-keyring\fR instead.
3713:.B  --always-trust
3714:Identical to \fB--trust-model always\fR. This option is deprecated.
3717:.B  --show-notation
3719:.B  --no-show-notation
3720:Show signature notations in the \fB--list-signatures\fR or \fB--check-signatures\fR listings
3722:options are deprecated. Use \fB--list-options [no-]show-notation\fR
3723:and/or \fB--verify-options [no-]show-notation\fR instead.
3726:.B  --show-policy-url
3728:.B  --no-show-policy-url
3729:Show policy URLs in the \fB--list-signatures\fR or \fB--check-signatures\fR
3731:it. These options are deprecated. Use \fB--list-options
3732:[no-]show-policy-url\fR and/or \fB--verify-options
3748:.B  gpg --clear-sign \fBfile\fR
3760:.B  gpg --list-keys \fBuser_ID\fR
3764:.B  gpg --fingerprint \fBuser_ID\fR
3768:.B  gpg --verify \fBpgpfile\fR
3770:.B  gpg --verify \fBsigfile\fR [\fBdatafile\fR]
3777:for the filename.  If the option \fB--output\fR is also used the
3804:using the option \fB--with-colons\fR.
3890:by \fBgpgsm --list-keys\fR because that one has been reordered and modified
3891:for better readability; use \fB--with-colons\fR to print the raw
3929:\fB--dump-cert\fR.
3969:The options \fB--import-filter\fR and \fB--export-filter\fR use
4099: --import-filter keep-uid="uid =~ Alfa"
4100: --import-filter keep-uid="&& uid !~ Test"
4101: --import-filter keep-uid="|| uid =~ Alpha"
4102: --import-filter keep-uid="uid !~ Test"
4113: --import-filter \\
4189:current home directory (see: [option --homedir]).
4197:name may be changed on the command line (see: [gpg-option --options]).
4217:\fB--homedir\fR is given.
4254:$ gpg --export-ownertrust >otrust.lst
4256:$ gpg --import-options restore --import publickeys.backups
4257:$ gpg --import-ownertrust otrust.lst
4282:to backup the ownertrust values (see: [option --export-ownertrust]).

-.-.

Change - to \- if it shall be printed as a minus sign.

gpg.1:929:sign (-) removes that notation, and setting a notation name (without the

-.-

Use "\e" to print the escape character instead of "\\" (which gets
interpreted in copy mode).

1514:\fIHKCU\\Software\\GNU\\GnuPG:HomeDir\fR.

-.-.

Use a macro to change to the italic font, instead of \fI, if
possible (see man-pages(7)).
The macros have the italic corrections, but "\c" removes the "\/" part,
which is in the macro.
So "\/" must be added between the italic argument and the "\c" string.

73:this man page and the file \(oq\fIDETAILS\fR\(cq for the specification of the
456:only those keys which are new or changed by you.  If no \fIkeyIDs\fR
493:output can directly be added to ssh's \(oq\fIauthorized_key\fR\(cq file.
516:Import the keys with the given \fIkeyIDs\fR from a keyserver.
527:Search the keyserver for the given \fInames\fR. Multiple names given
529:keyserver.  Note that keyservers search for \fInames\fR in a different
538:Retrieve keys located at the specified \fIURIs\fR. Note that different
589:ownertrust values (e.g. in the file \(oq\fIotrust.txt\fR\(cq), you may re-create
612:Print message digest of algorithm \fIalgo\fR for all given files or STDIN.
613:With the second form (or a deprecated "*" for \fIalgo\fR) digests for all
618:Emit \fIcount\fR random bytes of the given quality level 0, 1 or 2. If
619:\fIcount\fR is not given or zero, an endless sequence of random bytes
640:\fIkeys\fR.  For more information about the meaning of the policies,
641:see: [trust-model-tofu].  The \fIkeys\fR may be specified either by their
670:If \fIalgo\fR or \fIusage\fR are given, only the primary key is
673:``future-default'' for \fIalgo\fR and ``default'' for \fIusage\fR.
675:\fB--quick-add-key\fR.  The \fIusage\fR accepts also the value
679:The \fIexpire\fR argument can be used to specify an expiration date
698:\fIalgo\fR.  If the card features an encryption and a signing key, gpg
712:primary key identified by \fIfpr\fR to \fIexpire\fR.  To remove the
715:not yet expired subkeys are set to \fIexpire\fR.  With more than two
716:arguments and a list of fingerprints given for \fIsubfprs\fR, all
718:\fIexpire\fR.
724:\fIfpr\fR.  Without the optional arguments an encryption subkey is
728:\fIalgo\fR may be any of the supported algorithms or curve names
739:Depending on the given \fIalgo\fR the subkey may either be an
741:signing and encryption and such a subkey is desired, a \fIusage\fR
749:The \fIexpire\fR argument can be used to specify an expiration date
765:\(oq\fIopenpgp-revocs.d\fR\(cq directory below the GnuPG home directory.
815:Toggle selection of user ID or photographic user ID with index \fIn\fR.
820:Toggle selection of subkey with index \fIn\fR or key ID \fIn\fR.
947:Set the list of user ID preferences to \fIstring\fR for all (or just
989:Restore the given \fIfile\fR to a card. This command may be used to restore a
1108:interaction.  The \fIfpr\fR must be the verified primary fingerprint
1109:of a key in the local keyring. If no \fInames\fR are given, all
1110:useful user ids are signed; with given [\fInames\fR] only useful user
1130:\fInew-user-id\fR is added verbatim with only leading and trailing
1145:This command revokes the key signatures made by \fIsigning-fpr\fR from
1146:the key specified by the fingerprint \fIfpr\fR.  With \fInames\fR
1157:key.  \fIuser-id\fR specifies the key and \fIprimary-user-id\fR the
1168:specified as \fIuser-id\fR.  This is a shortcut for the sub-command
1206:Use \fIname\fR as the default key to sign with. If this option is not
1216:Use \fIname\fR as default recipient if option \fB--recipient\fR is
1217:not used and don't ask if this is a valid one. \fIname\fR must be
1254:\(oq\fI/dev/null\fR\(cq.
1473:Add \fIfile\fR to the current list of keyrings. If \fIfile\fR begins
1488:This is a varian of \fB--keyring\fR and designates \fIfile\fR as
1497:the \(oq\fIprivate-keys-v1.d\fR\(cq directory below the GnuPG home directory.
1501:Use \fIfile\fR instead of the default trustdb. If \fIfile\fR begins
1504:home directory (\(oq\fI~/.gnupg\fR\(cq if \fB--homedir\fR or $GNUPGHOME is
1509:Set the name of the home directory to \fIdir\fR. If this option is not
1510:used, the home directory defaults to \(oq\fI~/.gnupg\fR\(cq.  It is only
1512:directory stated through the environment variable \(oq\fIGNUPGHOME\fR\(cq or
1514:\fIHKCU\\Software\\GNU\\GnuPG:HomeDir\fR.
1521:empty file named \(oq\fIgpgconf.ctl\fR\(cq in the same directory as the tool
1522:\(oq\fIgpgconf.exe\fR\(cq.  The root of the installation is then that
1523:directory; or, if \(oq\fIgpgconf.exe\fR\(cq has been installed directly below
1524:a directory named \(oq\fIbin\fR\(cq, its parent directory.  You also need to
1526:\(oq\fIROOT/home\fR\(cq for the GnuPG home and \(oq\fIROOT/var/cache/gnupg\fR\(cq
1538:option should not be used on Windows.  Valid values for \fIname\fR
1586:Read options from \fIfile\fR and do not try to read them from the
1594:prevent the creation of a \(oq\fI~/.gnupg\fR\(cq homedir.
1602:Set compression level to \fIn\fR for the ZIP and ZLIB compression
1608:\fB-z\fR sets both. A value of 0 for \fIn\fR disables compression.
1871:\fImechanisms\fR will also be cleared unless it is given after the
1943:\(oq\fIdirmngr.conf\fR\(cq instead.
1945:Use \fIname\fR as your keyserver. This is the server that
1948:keys on. The format of the \fIname\fR is a URI:
2097:default value is \(oq\fI/usr/bin/dirmngr\fR\(cq.
2143:With \fIn\fR greater than 0 the number of prompts asking to insert a
2221:Encrypt for user id \fIname\fR. If this option or
2229:Encrypt for user ID \fIname\fR, but hide the key ID of this user's
2240:encrypts to a key stored in the given file.  \fIfile\fR must be the
2249:encrypts to a key stored in the given file.  \fIfile\fR must be the
2304:Use \fIname\fR as the key to sign with. Note that this option overrides
2309:This option has two purposes.  \fImbox\fR must either be a complete
2313:id.  When verifying a signature the \fImbox\fR is used to restrict the
2322:specification may be used for \fIname\fR it makes sense to use at least
2371:Write output to \fIfile\fR.  To write to stdout use \fB-\fR as the
2387:bytes.  \fIn\fR must be a positive base-10 number.  This option is
2398:To list the possible values use "help" for \fIstring\fR.  Some origins
2399:can store an optional \fIurl\fR argument.  That URL can appended to
2400:\fIstring\fR after a comma.
2507:\fIname\fR defines the type of filter to use, \fIexpr\fR the
2509:then appends more expression to the same \fIname\fR.
2690:documented in the file \(oq\fIdoc/DETAILS\fR\(cq, which is included in the GnuPG
2805:Set the list of personal cipher preferences to \fIstring\fR.  Use
2815:Set the list of personal digest preferences to \fIstring\fR.  Use
2826:Set the list of personal compression preferences to \fIstring\fR.
2837:Use \fIname\fR as the cipher algorithm for symmetric encryption with
2843:Use \fIname\fR as the digest algorithm used to mangle the passphrases
2849:\fIn\fR is 0 a plain passphrase (which is in general not recommended)
2944:values for \fIstring\fR are the above option names (without the double
2945:dash) and possibly others as shown when using "help" for \fIstring\fR.
2993:Select the debug level for investigating problems. \fIlevel\fR may be
3026:Set debugging flags. All flags are or-ed and \fIflags\fR may be given
3043:forth to \fIepoch\fR which is the number of seconds elapsed since the year
3044:1970.  Alternatively \fIepoch\fR may be given as a full ISO time string
3047:If you suffix \fIepoch\fR with an exclamation mark (!), the system time
3058:Write special status strings to the file descriptor \fIn\fR.
3064:\fIfile\fR.
3068:Write log output to file descriptor \fIn\fR and not to STDERR.
3075:file \fIfile\fR.  Use \(oq\fIsocket://\fR\(cq to log to a socket.  Note that
3081:Write attribute subpackets to the file descriptor \fIn\fR. This is most
3089:file \fIfile\fR.
3095:Use \fIstring\fR as a comment string in cleartext signatures and ASCII
3122:\fIname\fR must consist only of printable characters or spaces, and
3127:check. \fIvalue\fR may be any printable string; it will be encoded in
3129:correctly. If you prefix \fIname\fR with an exclamation mark (!), the
3149:Adds \fIname\fR to a list of known critical signature notations.  The
3160:Use \fIstring\fR as a Policy URL for signatures (rfc4880:5.2.3.20).  If
3170:Use \fIstring\fR as a preferred keyserver URL for data signatures. If
3178:Use \fIstring\fR as the filename which is stored inside messages.
3180:file being encrypted.  Using the empty string for \fIstring\fR
3203:Use \fIname\fR as cipher algorithm. Running the program with the
3213:Use \fIname\fR as the message digest algorithm. Running the program
3221:Use compression algorithm \fIname\fR. "zlib" is RFC-1950 ZLIB
3244:Use \fIname\fR as the message digest algorithm used when signing a
3253:Never allow the use of \fIname\fR as cipher algorithm.
3259:Never allow the use of \fIname\fR as public key algorithm.
3302:passphrase repetition.  Note that a \fIn\fR greater than 1 will pop up
3303:the pinentry window \fIn\fR+1 times even if a modern pinentry with
3308:Read the passphrase from file descriptor \fIn\fR. Only the first line
3309:will be read from file descriptor \fIn\fR. If you use 0 for \fIn\fR,
3319:Read the passphrase from file \fIfile\fR. Only the first line will
3320:be read from file \fIfile\fR. This can only be used if only one
3331:Use \fIstring\fR as the passphrase. This can only be used if only one
3342:Set the pinentry mode to \fImode\fR.  Allowed values for \fImode\fR
3372:\fIorigin\fR.  Depending on the origin certain restrictions are applied
3374:values for \fIorigin\fR are: \fBlocal\fR which is the default,
3389:\fIfile\fR
3548:Don't use the public key but the session key \fIstring\fR respective
3550:\fIfd\fR.  The format of this string is the same as the one printed by
3596:generation. The \fIstring\fR is similar to the arguments required for
3639:\(oq\fI-&n\fR\(cq, where n is a non-negative decimal number,
3653:Set the list of default preferences to \fIstring\fR. This preference
3659:Set the default keyserver URL to \fIname\fR. This keyserver will be
3667:is thus not generally useful. See the file \(oq\fIdoc/DETAILS\fR\(cq in the
3982:The name of a property (\fIPROPNAME\fR) may only consist of letters,
3986:\fIVALUE\fR must always be given and may not be the empty string.  No
3992:applies.  \fIlc\fR is the logical connection operator; either
3995:have higher precedence than disjunctions.  If \fIVALUE\fR starts with
3996:one of the characters used in any \fIop\fR a space after the
3997:\fIop\fR is required.
4000:The supported operators (\fIop\fR) are:
4078:Values for \fIflag\fR must be space separated.  The supported flags
4083:\fIVALUE\fR spans to the end of the expression.
4089:Leading and trailing spaces are not removed from \fIVALUE\fR.
4090:The optional single space after \fIop\fR is here required.
4203:into the directory \(oq\fI/etc/skel/.gnupg\fR\(cq so that
4224:keybox format and creates a file \(oq\fIpubring.kbx\fR\(cq unless that file
4228:Note that in the case that both files, \(oq\fIpubring.gpg\fR\(cq and
4229:\(oq\fIpubring.kbx\fR\(cq exists but the latter has no OpenPGP keys, the
4230:legacy file \(oq\fIpubring.gpg\fR\(cq will be used.  Take care: GnuPG
4231:versions before 2.1 will always use the file \(oq\fIpubring.gpg\fR\(cq
4246:To convert an existing \(oq\fIpubring.gpg\fR\(cq file to the keybox format, you
4247:first backup the ownertrust values, then rename \(oq\fIpubring.gpg\fR\(cq to
4248:\(oq\fIpublickeys.backup\fR\(cq, so it won’t be recognized by any GnuPG version,
4263:The lock file for \(oq\fIpubring.kbx\fR\(cq.
4335:valid and available language name (\fIlangid\fR), the file with the
4337:\fB\fIgpgdir\fR/gnupg.nls/\fIlangid\fR.mo\fR.  Here \fIgpgdir\fR is the

-.-.

Use the word (in)valid instead of (il)legal,
if not related to legal matters.
See "www.gnu.org/prep/standards".
Think about translations into other languages!

gpg.1:2859:that not all values in the 1024-65011712 range are legal and if an
gpg.1:2860:illegal value is selected, GnuPG will round up to the nearest legal

-.-.

Change a HYPHEN-MINUS (code 0x55, 2D) to a minus (\-), if in front of a
name for an option.

138:.B  -h
141:(though you can use its short form \fB-h\fR).
163:.B  -s
188:.B  -b
194:.B  -e
206:.B  -c
226:.B  -d
293:.B  -k
308:.B  -K
826:signed by the default user (or the users given with \fB-u\fR), the program
830:\fB-u\fR.
1208:Note that \fB-u\fR or \fB--local-user\fR overrides this option.
1232:.B  -v, --verbose
1241:.B  -q, --quiet
1454:\fBxloadimage -fork -quiet -title 'KeyID 0x%k' STDIN\fR
1456:\fBdisplay -title 'KeyID 0x%k' %i\fR
1597:.B  -z \fIn\fR
1608:\fB-z\fR sets both. A value of 0 for \fIn\fR disables compression.
2220:.B  -r
2228:.B  -R
2238:.B  -f
2247:.B  -F
2279:Any time the group name is a recipient (\fB-r\fR or
2303:.B  -u
2359:.B  -a
2370:.B  -o \fIfile\fR
2754:.B  -t, --textmode
2973:.B  -n
2986:.B  -i
3120:.B  -N, --set-notation {\fIname\fR=\fIvalue\fR}
3507:        awk -F: '$1=="sig" && $2=="?" {if($13){print $13}else{print $5}}'
3744:.B  gpg -se -r \fBBob\fR \fBfile\fR
3752:.B  gpg -sb \fBfile\fR
3756:.B  gpg -u 0x12345678 -sb \fBfile\fR
4044:.B   -le
4048:.B   -lt
4052:.B   -gt
4056:.B   -ge
4060:.B   -n
4064:.B   -z
4068:.B   -t
4072:.B   -f
4085:.B  -c
4088:.B  -t

-.-.

Add a comma (or \&) after "e.g." and "i.e.", or use English words
(man-pages(7).
Abbreviation points should be protected against being interpreted as
an end of sentence, if they are not, and that independent of the
current place on the line.

331:checking the signature (e.g. a non supported algorithm).  Signatures
589:ownertrust values (e.g. in the file \(oq\fIotrust.txt\fR\(cq), you may re-create
867:once it has been send to the public (i.e. to a keyserver).  In that case
901:(i.e. to a keyserver).  In that case you better use \fBrevuid\fR.
1000:a subkey, once it has been send to the public (i.e. to a keyserver).  In
1043:that is no longer usable (e.g. revoked, or expired). Then, remove any
1057:subkeys.  These usage flags (e.g. Certify, Sign, Authenticate,
1446:(e.g. "jpg"), "%T" for the MIME type of the image (e.g. "image/jpeg"),
1448:viewed (e.g. "f"), "%V" for the calculated validity as a string (e.g.
1911:3. If the signature has the Signer's UID set (e.g. using
2184:(i.e. run, but give a warning).
2396:known (e.g. keyserver, web key directory) and set.  For a standard
2562:e.g. "2016-08-17". (drop-subkey)
2604:e.g. "2016-08-17". (drop-sig)
2704:(i.e. \fB--with-colons\fR).  Note that the legacy format does not
2822:(e.g. \fB--clear-sign\fR or \fB--sign\fR).
2833:to consider (e.g. \fB--symmetric\fR).
3027:in C syntax (e.g. 0x0042) or as a comma separated list of flag names.
3045:(e.g. "20070924T154812").
3826:is available with \fBgpgsm\fR (i.e. the SHA-1 hash of the
3878:(i.e. inside the angle brackets).

-.-.

Wrong distance between sentences.

  Separate the sentences and subordinate clauses; each begins on a new
line.  See man-pages(7) ("Conventions for source file layout") and
"info groff" ("Input Conventions").

  The best procedure is to always start a new sentence on a new line,
at least, if you are typing on a computer.

Remember coding: Only one command ("sentence") on each (logical) line.

E-mail: Easier to quote exactly the relevant lines.

Generally: Easier to edit the sentence.

Patches: Less unaffected text.

Search for two adjacent words is easier, when they belong to the same line,
and the same phrase.

  The amount of space between sentences in the output can then be
controlled with the ".ss" request.

-.-

Use \(en for a dash (en-dash) between space characters, not a minus
(\-) or a hyphen (-), except in the NAME section.

gpg.1:5:\- OpenPGP encryption and signing tool
gpg.1:984:from the card - if the card gets broken your secret key will be lost
gpg.1:1184:"~/.gnupg/gpg.conf"). Short option names will not work - for example,
gpg.1:1942:This option is deprecated - please use the \fB--keyserver\fR in

-.-.

The name of a man page is set in bold type and the section in roman (see
man-pages(7)).

4392:\fBgpgv\fR(1),
4393:\fBgpgsm\fR(1),

-.-.

-- System Information:
Debian Release: trixie/sid
  APT prefers testing
  APT policy: (990, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 6.4.11-1 (SMP w/2 CPU threads; PREEMPT)
Locale: LANG=is_IS.iso88591, LC_CTYPE=is_IS.iso88591 (charmap=ISO-8859-1), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: sysvinit (via /sbin/init)

Versions of packages gpgrt-tools depends on:
ii  libc6          2.37-7
ii  libgpg-error0  1.47-2

gpgrt-tools recommends no packages.

gpgrt-tools suggests no packages.

-- no debconf information



More information about the pkg-gnupg-maint mailing list