Warning, /pim/mimetreeparser/autotests/gnupg_home/gpg.conf is written in an unsupported language. File is not indexed.
0001 # Options for GnuPG 0002 # SPDX-FileCopyrightText: 1998, 1999, 2000, 2001, 2002, 2003 Free Software Foundation, Inc. 0003 # SPDX-License-Identifier: FSFULLR 0004 # 0005 # Unless you specify which option file to use (with the command line 0006 # option "--options filename"), GnuPG uses the file ~/.gnupg/gpg.conf 0007 # by default. 0008 # 0009 # An options file can contain any long options which are available in 0010 # GnuPG. If the first non white space character of a line is a '#', 0011 # this line is ignored. Empty lines are also ignored. 0012 # 0013 # See the man page for a list of options. 0014 0015 # Uncomment the following option to get rid of the copyright notice 0016 0017 #no-greeting 0018 0019 # If you have more than 1 secret key in your keyring, you may want to 0020 # uncomment the following option and set your preferred keyid. 0021 0022 #default-key 621CC013 0023 0024 # If you do not pass a recipient to gpg, it will ask for one. Using 0025 # this option you can encrypt to a default key. Key validation will 0026 # not be done in this case. The second form uses the default key as 0027 # default recipient. 0028 0029 #default-recipient some-user-id 0030 #default-recipient-self 0031 0032 # Use --encrypt-to to add the specified key as a recipient to all 0033 # messages. This is useful, for example, when sending mail through a 0034 # mail client that does not automatically encrypt mail to your key. 0035 # In the example, this option allows you to read your local copy of 0036 # encrypted mail that you've sent to others. 0037 0038 #encrypt-to some-key-id 0039 0040 # By default GnuPG creates version 3 signatures for data files. This 0041 # is not strictly OpenPGP compliant but PGP 6 and most versions of PGP 0042 # 7 require them. To disable this behavior, you may use this option 0043 # or --openpgp. 0044 0045 #no-force-v3-sigs 0046 0047 # Because some mailers change lines starting with "From " to ">From " 0048 # it is good to handle such lines in a special way when creating 0049 # cleartext signatures; all other PGP versions do it this way too. 0050 0051 #no-escape-from-lines 0052 0053 # If you do not use the Latin-1 (ISO-8859-1) charset, you should tell 0054 # GnuPG which is the native character set. Please check the man page 0055 # for supported character sets. This character set is only used for 0056 # metadata and not for the actual message which does not undergo any 0057 # translation. Note that future version of GnuPG will change to UTF-8 0058 # as default character set. In most cases this option is not required 0059 # as GnuPG is able to figure out the correct charset at runtime. 0060 0061 #charset utf-8 0062 0063 # Group names may be defined like this: 0064 # group mynames = paige 0x12345678 joe patti 0065 # 0066 # Any time "mynames" is a recipient (-r or --recipient), it will be 0067 # expanded to the names "paige", "joe", and "patti", and the key ID 0068 # "0x12345678". Note there is only one level of expansion - you 0069 # cannot make an group that points to another group. Note also that 0070 # if there are spaces in the recipient name, this will appear as two 0071 # recipients. In these cases it is better to use the key ID. 0072 0073 #group mynames = paige 0x12345678 joe patti 0074 0075 # Lock the file only once for the lifetime of a process. If you do 0076 # not define this, the lock will be obtained and released every time 0077 # it is needed, which is usually preferable. 0078 0079 #lock-once 0080 0081 # GnuPG can send and receive keys to and from a keyserver. These 0082 # servers can be HKP, email, or LDAP (if GnuPG is built with LDAP 0083 # support). 0084 # 0085 # Example HKP keyserver: 0086 # hkp://keys.gnupg.net 0087 # hkp://subkeys.pgp.net 0088 # 0089 # Example email keyserver: 0090 # mailto:pgp-public-keys@keys.pgp.net 0091 # 0092 # Example LDAP keyservers: 0093 # ldap://keyserver.pgp.com 0094 # 0095 # Regular URL syntax applies, and you can set an alternate port 0096 # through the usual method: 0097 # hkp://keyserver.example.net:22742 0098 # 0099 # Most users just set the name and type of their preferred keyserver. 0100 # Note that most servers (with the notable exception of 0101 # ldap://keyserver.pgp.com) synchronize changes with each other. Note 0102 # also that a single server name may actually point to multiple 0103 # servers via DNS round-robin. hkp://keys.gnupg.net is an example of 0104 # such a "server", which spreads the load over a number of physical 0105 # servers. To see the IP address of the server actually used, you may use 0106 # the "--keyserver-options debug". 0107 0108 keyserver hkp://keys.gnupg.net 0109 #keyserver mailto:pgp-public-keys@keys.nl.pgp.net 0110 #keyserver ldap://keyserver.pgp.com 0111 0112 # Common options for keyserver functions: 0113 # 0114 # include-disabled : when searching, include keys marked as "disabled" 0115 # on the keyserver (not all keyservers support this). 0116 # 0117 # no-include-revoked : when searching, do not include keys marked as 0118 # "revoked" on the keyserver. 0119 # 0120 # verbose : show more information as the keys are fetched. 0121 # Can be used more than once to increase the amount 0122 # of information shown. 0123 # 0124 # use-temp-files : use temporary files instead of a pipe to talk to the 0125 # keyserver. Some platforms (Win32 for one) always 0126 # have this on. 0127 # 0128 # keep-temp-files : do not delete temporary files after using them 0129 # (really only useful for debugging) 0130 # 0131 # http-proxy="proxy" : set the proxy to use for HTTP and HKP keyservers. 0132 # This overrides the "http_proxy" environment variable, 0133 # if any. 0134 # 0135 # auto-key-retrieve : automatically fetch keys as needed from the keyserver 0136 # when verifying signatures or when importing keys that 0137 # have been revoked by a revocation key that is not 0138 # present on the keyring. 0139 # 0140 # no-include-attributes : do not include attribute IDs (aka "photo IDs") 0141 # when sending keys to the keyserver. 0142 0143 #keyserver-options auto-key-retrieve 0144 0145 # Display photo user IDs in key listings 0146 0147 # list-options show-photos 0148 0149 # Display photo user IDs when a signature from a key with a photo is 0150 # verified 0151 0152 # verify-options show-photos 0153 0154 # Use this program to display photo user IDs 0155 # 0156 # %i is expanded to a temporary file that contains the photo. 0157 # %I is the same as %i, but the file isn't deleted afterwards by GnuPG. 0158 # %k is expanded to the key ID of the key. 0159 # %K is expanded to the long OpenPGP key ID of the key. 0160 # %t is expanded to the extension of the image (e.g. "jpg"). 0161 # %T is expanded to the MIME type of the image (e.g. "image/jpeg"). 0162 # %f is expanded to the fingerprint of the key. 0163 # %% is %, of course. 0164 # 0165 # If %i or %I are not present, then the photo is supplied to the 0166 # viewer on standard input. If your platform supports it, standard 0167 # input is the best way to do this as it avoids the time and effort in 0168 # generating and then cleaning up a secure temp file. 0169 # 0170 # If no photo-viewer is provided, GnuPG will look for xloadimage, eog, 0171 # or display (ImageMagick). On Mac OS X and Windows, the default is 0172 # to use your regular JPEG image viewer. 0173 # 0174 # Some other viewers: 0175 # photo-viewer "qiv %i" 0176 # photo-viewer "ee %i" 0177 # 0178 # This one saves a copy of the photo ID in your home directory: 0179 # photo-viewer "cat > ~/photoid-for-key-%k.%t" 0180 # 0181 # Use your MIME handler to view photos: 0182 # photo-viewer "metamail -q -d -b -c %T -s 'KeyID 0x%k' -f GnuPG" 0183 0184 # Passphrase agent 0185 # 0186 # We support the old experimental passphrase agent protocol as well as 0187 # the new Assuan based one (currently available in the "newpg" package 0188 # at ftp.gnupg.org/gcrypt/alpha/aegypten/). To make use of the agent, 0189 # you have to run an agent as daemon and use the option 0190 # 0191 # use-agent 0192 # 0193 # which tries to use the agent but will fallback to the regular mode 0194 # if there is a problem connecting to the agent. The normal way to 0195 # locate the agent is by looking at the environment variable 0196 # GPG_AGENT_INFO which should have been set during gpg-agent startup. 0197 # In certain situations the use of this variable is not possible, thus 0198 # the option 0199 # 0200 # --gpg-agent-info=<path>:<pid>:1 0201 # 0202 # may be used to override it. 0203 0204 # Automatic key location 0205 # 0206 # GnuPG can automatically locate and retrieve keys as needed using the 0207 # auto-key-locate option. This happens when encrypting to an email 0208 # address (in the "user@example.com" form), and there are no 0209 # user@example.com keys on the local keyring. This option takes the 0210 # following arguments, in the order they are to be tried: 0211 # 0212 # cert = locate a key using DNS CERT, as specified in RFC-4398. 0213 # GnuPG can handle both the PGP (key) and IPGP (URL + fingerprint) 0214 # CERT methods. 0215 # 0216 # pka = locate a key using DNS PKA. 0217 # 0218 # ldap = locate a key using the PGP Universal method of checking 0219 # "ldap://keys.(thedomain)". For example, encrypting to 0220 # user@example.com will check ldap://keys.example.com. 0221 # 0222 # keyserver = locate a key using whatever keyserver is defined using 0223 # the keyserver option. 0224 # 0225 # You may also list arbitrary keyservers here by URL. 0226 # 0227 # Try CERT, then PKA, then LDAP, then hkp://subkeys.net: 0228 #auto-key-locate cert pka ldap hkp://subkeys.pgp.net 0229 0230 ###+++--- GPGConf ---+++### 0231 utf8-strings 0232 #debug-level basic 0233 #log-file socket:///home/leo/kde/src/kdepim/messagecomposer/tests/gnupg_home/log-socket 0234 ###+++--- GPGConf ---+++### Tue 29 Jun 2010 10:23:13 AM EDT 0235 # GPGConf edited this configuration file. 0236 # It will disable options before this marked block, but it will 0237 # never change anything below these lines.