Warning, /pim/mimetreeparser/autotests/gnupg_home/gpg.conf is written in an unsupported language. File is not indexed.

0001 # Options for GnuPG
0002 # SPDX-FileCopyrightText: 1998, 1999, 2000, 2001, 2002, 2003 Free Software Foundation, Inc.
0003 # SPDX-License-Identifier: FSFULLR
0004 #
0005 # Unless you specify which option file to use (with the command line
0006 # option "--options filename"), GnuPG uses the file ~/.gnupg/gpg.conf
0007 # by default.
0008 #
0009 # An options file can contain any long options which are available in
0010 # GnuPG. If the first non white space character of a line is a '#',
0011 # this line is ignored.  Empty lines are also ignored.
0012 #
0013 # See the man page for a list of options.
0014 
0015 # Uncomment the following option to get rid of the copyright notice
0016 
0017 #no-greeting
0018 
0019 # If you have more than 1 secret key in your keyring, you may want to
0020 # uncomment the following option and set your preferred keyid.
0021 
0022 #default-key 621CC013
0023 
0024 # If you do not pass a recipient to gpg, it will ask for one.  Using
0025 # this option you can encrypt to a default key.  Key validation will
0026 # not be done in this case.  The second form uses the default key as
0027 # default recipient.
0028 
0029 #default-recipient some-user-id
0030 #default-recipient-self
0031 
0032 # Use --encrypt-to to add the specified key as a recipient to all
0033 # messages.  This is useful, for example, when sending mail through a
0034 # mail client that does not automatically encrypt mail to your key.
0035 # In the example, this option allows you to read your local copy of
0036 # encrypted mail that you've sent to others.
0037 
0038 #encrypt-to some-key-id
0039 
0040 # By default GnuPG creates version 3 signatures for data files.  This
0041 # is not strictly OpenPGP compliant but PGP 6 and most versions of PGP
0042 # 7 require them.  To disable this behavior, you may use this option
0043 # or --openpgp.
0044 
0045 #no-force-v3-sigs
0046 
0047 # Because some mailers change lines starting with "From " to ">From "
0048 # it is good to handle such lines in a special way when creating
0049 # cleartext signatures; all other PGP versions do it this way too.
0050 
0051 #no-escape-from-lines
0052 
0053 # If you do not use the Latin-1 (ISO-8859-1) charset, you should tell
0054 # GnuPG which is the native character set.  Please check the man page
0055 # for supported character sets.  This character set is only used for
0056 # metadata and not for the actual message which does not undergo any
0057 # translation.  Note that future version of GnuPG will change to UTF-8
0058 # as default character set.  In most cases this option is not required
0059 # as GnuPG is able to figure out the correct charset at runtime.
0060 
0061 #charset utf-8
0062 
0063 # Group names may be defined like this:
0064 #   group mynames = paige 0x12345678 joe patti
0065 #
0066 # Any time "mynames" is a recipient (-r or --recipient), it will be
0067 # expanded to the names "paige", "joe", and "patti", and the key ID
0068 # "0x12345678".  Note there is only one level of expansion - you
0069 # cannot make an group that points to another group.  Note also that
0070 # if there are spaces in the recipient name, this will appear as two
0071 # recipients.  In these cases it is better to use the key ID.
0072 
0073 #group mynames = paige 0x12345678 joe patti
0074 
0075 # Lock the file only once for the lifetime of a process.  If you do
0076 # not define this, the lock will be obtained and released every time
0077 # it is needed, which is usually preferable.
0078 
0079 #lock-once
0080 
0081 # GnuPG can send and receive keys to and from a keyserver.  These
0082 # servers can be HKP, email, or LDAP (if GnuPG is built with LDAP
0083 # support).
0084 #
0085 # Example HKP keyserver:
0086 #      hkp://keys.gnupg.net
0087 #      hkp://subkeys.pgp.net
0088 #
0089 # Example email keyserver:
0090 #      mailto:pgp-public-keys@keys.pgp.net
0091 #
0092 # Example LDAP keyservers:
0093 #      ldap://keyserver.pgp.com
0094 #
0095 # Regular URL syntax applies, and you can set an alternate port
0096 # through the usual method:
0097 #      hkp://keyserver.example.net:22742
0098 #
0099 # Most users just set the name and type of their preferred keyserver.
0100 # Note that most servers (with the notable exception of
0101 # ldap://keyserver.pgp.com) synchronize changes with each other.  Note
0102 # also that a single server name may actually point to multiple
0103 # servers via DNS round-robin.  hkp://keys.gnupg.net is an example of
0104 # such a "server", which spreads the load over a number of physical
0105 # servers.  To see the IP address of the server actually used, you may use
0106 # the "--keyserver-options debug".
0107 
0108 keyserver hkp://keys.gnupg.net
0109 #keyserver mailto:pgp-public-keys@keys.nl.pgp.net
0110 #keyserver ldap://keyserver.pgp.com
0111 
0112 # Common options for keyserver functions:
0113 #
0114 # include-disabled : when searching, include keys marked as "disabled"
0115 #                    on the keyserver (not all keyservers support this).
0116 #
0117 # no-include-revoked : when searching, do not include keys marked as
0118 #                      "revoked" on the keyserver.
0119 #
0120 # verbose : show more information as the keys are fetched.
0121 #           Can be used more than once to increase the amount
0122 #           of information shown.
0123 #
0124 # use-temp-files : use temporary files instead of a pipe to talk to the
0125 #                  keyserver.  Some platforms (Win32 for one) always
0126 #                  have this on.
0127 #
0128 # keep-temp-files : do not delete temporary files after using them
0129 #                   (really only useful for debugging)
0130 #
0131 # http-proxy="proxy" : set the proxy to use for HTTP and HKP keyservers.
0132 #                      This overrides the "http_proxy" environment variable,
0133 #                      if any.
0134 #
0135 # auto-key-retrieve : automatically fetch keys as needed from the keyserver
0136 #                     when verifying signatures or when importing keys that
0137 #                     have been revoked by a revocation key that is not
0138 #                     present on the keyring.
0139 #
0140 # no-include-attributes : do not include attribute IDs (aka "photo IDs")
0141 #                         when sending keys to the keyserver.
0142 
0143 #keyserver-options auto-key-retrieve
0144 
0145 # Display photo user IDs in key listings
0146 
0147 # list-options show-photos
0148 
0149 # Display photo user IDs when a signature from a key with a photo is
0150 # verified
0151 
0152 # verify-options show-photos
0153 
0154 # Use this program to display photo user IDs
0155 #
0156 # %i is expanded to a temporary file that contains the photo.
0157 # %I is the same as %i, but the file isn't deleted afterwards by GnuPG.
0158 # %k is expanded to the key ID of the key.
0159 # %K is expanded to the long OpenPGP key ID of the key.
0160 # %t is expanded to the extension of the image (e.g. "jpg").
0161 # %T is expanded to the MIME type of the image (e.g. "image/jpeg").
0162 # %f is expanded to the fingerprint of the key.
0163 # %% is %, of course.
0164 #
0165 # If %i or %I are not present, then the photo is supplied to the
0166 # viewer on standard input.  If your platform supports it, standard
0167 # input is the best way to do this as it avoids the time and effort in
0168 # generating and then cleaning up a secure temp file.
0169 #
0170 # If no photo-viewer is provided, GnuPG will look for xloadimage, eog,
0171 # or display (ImageMagick).  On Mac OS X and Windows, the default is
0172 # to use your regular JPEG image viewer.
0173 #
0174 # Some other viewers:
0175 # photo-viewer "qiv %i"
0176 # photo-viewer "ee %i"
0177 #
0178 # This one saves a copy of the photo ID in your home directory:
0179 # photo-viewer "cat > ~/photoid-for-key-%k.%t"
0180 #
0181 # Use your MIME handler to view photos:
0182 # photo-viewer "metamail -q -d -b -c %T -s 'KeyID 0x%k' -f GnuPG"
0183 
0184 # Passphrase agent
0185 #
0186 # We support the old experimental passphrase agent protocol as well as
0187 # the new Assuan based one (currently available in the "newpg" package
0188 # at ftp.gnupg.org/gcrypt/alpha/aegypten/).  To make use of the agent,
0189 # you have to run an agent as daemon and use the option
0190 #
0191 # use-agent
0192 # 
0193 # which tries to use the agent but will fallback to the regular mode
0194 # if there is a problem connecting to the agent.  The normal way to
0195 # locate the agent is by looking at the environment variable
0196 # GPG_AGENT_INFO which should have been set during gpg-agent startup.
0197 # In certain situations the use of this variable is not possible, thus
0198 # the option
0199 # 
0200 # --gpg-agent-info=<path>:<pid>:1
0201 #
0202 # may be used to override it.
0203 
0204 # Automatic key location
0205 #
0206 # GnuPG can automatically locate and retrieve keys as needed using the
0207 # auto-key-locate option.  This happens when encrypting to an email
0208 # address (in the "user@example.com" form), and there are no
0209 # user@example.com keys on the local keyring.  This option takes the
0210 # following arguments, in the order they are to be tried:
0211 # 
0212 # cert = locate a key using DNS CERT, as specified in RFC-4398.
0213 #        GnuPG can handle both the PGP (key) and IPGP (URL + fingerprint)
0214 #        CERT methods.
0215 #
0216 # pka = locate a key using DNS PKA.
0217 #
0218 # ldap = locate a key using the PGP Universal method of checking
0219 #        "ldap://keys.(thedomain)".  For example, encrypting to
0220 #        user@example.com will check ldap://keys.example.com.
0221 #
0222 # keyserver = locate a key using whatever keyserver is defined using
0223 #             the keyserver option.
0224 #
0225 # You may also list arbitrary keyservers here by URL.
0226 #
0227 # Try CERT, then PKA, then LDAP, then hkp://subkeys.net:
0228 #auto-key-locate cert pka ldap hkp://subkeys.pgp.net
0229 
0230 ###+++--- GPGConf ---+++###
0231 utf8-strings
0232 #debug-level basic
0233 #log-file socket:///home/leo/kde/src/kdepim/messagecomposer/tests/gnupg_home/log-socket
0234 ###+++--- GPGConf ---+++### Tue 29 Jun 2010 10:23:13 AM EDT
0235 # GPGConf edited this configuration file.
0236 # It will disable options before this marked block, but it will
0237 # never change anything below these lines.