Warning, /plasma-mobile/raven/src/mimetreeparser/tests/gnupg_home/gpg.conf is written in an unsupported language. File is not indexed.
0001 # Options for GnuPG 0002 # Copyright 1998, 1999, 2000, 2001, 2002, 2003 Free Software Foundation, Inc. 0003 # 0004 # This file is free software; as a special exception the author gives 0005 # unlimited permission to copy and/or distribute it, with or without 0006 # modifications, as long as this notice is preserved. 0007 # 0008 # This file is distributed in the hope that it will be useful, but 0009 # WITHOUT ANY WARRANTY, to the extent permitted by law; without even the 0010 # implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. 0011 # 0012 # Unless you specify which option file to use (with the command line 0013 # option "--options filename"), GnuPG uses the file ~/.gnupg/gpg.conf 0014 # by default. 0015 # 0016 # An options file can contain any long options which are available in 0017 # GnuPG. If the first non white space character of a line is a '#', 0018 # this line is ignored. Empty lines are also ignored. 0019 # 0020 # See the man page for a list of options. 0021 0022 # Uncomment the following option to get rid of the copyright notice 0023 0024 #no-greeting 0025 0026 # If you have more than 1 secret key in your keyring, you may want to 0027 # uncomment the following option and set your preferred keyid. 0028 0029 #default-key 621CC013 0030 0031 # If you do not pass a recipient to gpg, it will ask for one. Using 0032 # this option you can encrypt to a default key. Key validation will 0033 # not be done in this case. The second form uses the default key as 0034 # default recipient. 0035 0036 #default-recipient some-user-id 0037 #default-recipient-self 0038 0039 # Use --encrypt-to to add the specified key as a recipient to all 0040 # messages. This is useful, for example, when sending mail through a 0041 # mail client that does not automatically encrypt mail to your key. 0042 # In the example, this option allows you to read your local copy of 0043 # encrypted mail that you've sent to others. 0044 0045 #encrypt-to some-key-id 0046 0047 # By default GnuPG creates version 3 signatures for data files. This 0048 # is not strictly OpenPGP compliant but PGP 6 and most versions of PGP 0049 # 7 require them. To disable this behavior, you may use this option 0050 # or --openpgp. 0051 0052 #no-force-v3-sigs 0053 0054 # Because some mailers change lines starting with "From " to ">From " 0055 # it is good to handle such lines in a special way when creating 0056 # cleartext signatures; all other PGP versions do it this way too. 0057 0058 #no-escape-from-lines 0059 0060 # If you do not use the Latin-1 (ISO-8859-1) charset, you should tell 0061 # GnuPG which is the native character set. Please check the man page 0062 # for supported character sets. This character set is only used for 0063 # metadata and not for the actual message which does not undergo any 0064 # translation. Note that future version of GnuPG will change to UTF-8 0065 # as default character set. In most cases this option is not required 0066 # as GnuPG is able to figure out the correct charset at runtime. 0067 0068 #charset utf-8 0069 0070 # Group names may be defined like this: 0071 # group mynames = paige 0x12345678 joe patti 0072 # 0073 # Any time "mynames" is a recipient (-r or --recipient), it will be 0074 # expanded to the names "paige", "joe", and "patti", and the key ID 0075 # "0x12345678". Note there is only one level of expansion - you 0076 # cannot make an group that points to another group. Note also that 0077 # if there are spaces in the recipient name, this will appear as two 0078 # recipients. In these cases it is better to use the key ID. 0079 0080 #group mynames = paige 0x12345678 joe patti 0081 0082 # Lock the file only once for the lifetime of a process. If you do 0083 # not define this, the lock will be obtained and released every time 0084 # it is needed, which is usually preferable. 0085 0086 #lock-once 0087 0088 # GnuPG can send and receive keys to and from a keyserver. These 0089 # servers can be HKP, email, or LDAP (if GnuPG is built with LDAP 0090 # support). 0091 # 0092 # Example HKP keyserver: 0093 # hkp://keys.gnupg.net 0094 # hkp://subkeys.pgp.net 0095 # 0096 # Example email keyserver: 0097 # mailto:pgp-public-keys@keys.pgp.net 0098 # 0099 # Example LDAP keyservers: 0100 # ldap://keyserver.pgp.com 0101 # 0102 # Regular URL syntax applies, and you can set an alternate port 0103 # through the usual method: 0104 # hkp://keyserver.example.net:22742 0105 # 0106 # Most users just set the name and type of their preferred keyserver. 0107 # Note that most servers (with the notable exception of 0108 # ldap://keyserver.pgp.com) synchronize changes with each other. Note 0109 # also that a single server name may actually point to multiple 0110 # servers via DNS round-robin. hkp://keys.gnupg.net is an example of 0111 # such a "server", which spreads the load over a number of physical 0112 # servers. To see the IP address of the server actually used, you may use 0113 # the "--keyserver-options debug". 0114 0115 keyserver hkp://keys.gnupg.net 0116 #keyserver mailto:pgp-public-keys@keys.nl.pgp.net 0117 #keyserver ldap://keyserver.pgp.com 0118 0119 # Common options for keyserver functions: 0120 # 0121 # include-disabled : when searching, include keys marked as "disabled" 0122 # on the keyserver (not all keyservers support this). 0123 # 0124 # no-include-revoked : when searching, do not include keys marked as 0125 # "revoked" on the keyserver. 0126 # 0127 # verbose : show more information as the keys are fetched. 0128 # Can be used more than once to increase the amount 0129 # of information shown. 0130 # 0131 # use-temp-files : use temporary files instead of a pipe to talk to the 0132 # keyserver. Some platforms (Win32 for one) always 0133 # have this on. 0134 # 0135 # keep-temp-files : do not delete temporary files after using them 0136 # (really only useful for debugging) 0137 # 0138 # http-proxy="proxy" : set the proxy to use for HTTP and HKP keyservers. 0139 # This overrides the "http_proxy" environment variable, 0140 # if any. 0141 # 0142 # auto-key-retrieve : automatically fetch keys as needed from the keyserver 0143 # when verifying signatures or when importing keys that 0144 # have been revoked by a revocation key that is not 0145 # present on the keyring. 0146 # 0147 # no-include-attributes : do not include attribute IDs (aka "photo IDs") 0148 # when sending keys to the keyserver. 0149 0150 #keyserver-options auto-key-retrieve 0151 0152 # Display photo user IDs in key listings 0153 0154 # list-options show-photos 0155 0156 # Display photo user IDs when a signature from a key with a photo is 0157 # verified 0158 0159 # verify-options show-photos 0160 0161 # Use this program to display photo user IDs 0162 # 0163 # %i is expanded to a temporary file that contains the photo. 0164 # %I is the same as %i, but the file isn't deleted afterwards by GnuPG. 0165 # %k is expanded to the key ID of the key. 0166 # %K is expanded to the long OpenPGP key ID of the key. 0167 # %t is expanded to the extension of the image (e.g. "jpg"). 0168 # %T is expanded to the MIME type of the image (e.g. "image/jpeg"). 0169 # %f is expanded to the fingerprint of the key. 0170 # %% is %, of course. 0171 # 0172 # If %i or %I are not present, then the photo is supplied to the 0173 # viewer on standard input. If your platform supports it, standard 0174 # input is the best way to do this as it avoids the time and effort in 0175 # generating and then cleaning up a secure temp file. 0176 # 0177 # If no photo-viewer is provided, GnuPG will look for xloadimage, eog, 0178 # or display (ImageMagick). On Mac OS X and Windows, the default is 0179 # to use your regular JPEG image viewer. 0180 # 0181 # Some other viewers: 0182 # photo-viewer "qiv %i" 0183 # photo-viewer "ee %i" 0184 # 0185 # This one saves a copy of the photo ID in your home directory: 0186 # photo-viewer "cat > ~/photoid-for-key-%k.%t" 0187 # 0188 # Use your MIME handler to view photos: 0189 # photo-viewer "metamail -q -d -b -c %T -s 'KeyID 0x%k' -f GnuPG" 0190 0191 # Passphrase agent 0192 # 0193 # We support the old experimental passphrase agent protocol as well as 0194 # the new Assuan based one (currently available in the "newpg" package 0195 # at ftp.gnupg.org/gcrypt/alpha/aegypten/). To make use of the agent, 0196 # you have to run an agent as daemon and use the option 0197 # 0198 # use-agent 0199 # 0200 # which tries to use the agent but will fallback to the regular mode 0201 # if there is a problem connecting to the agent. The normal way to 0202 # locate the agent is by looking at the environment variable 0203 # GPG_AGENT_INFO which should have been set during gpg-agent startup. 0204 # In certain situations the use of this variable is not possible, thus 0205 # the option 0206 # 0207 # --gpg-agent-info=<path>:<pid>:1 0208 # 0209 # may be used to override it. 0210 0211 # Automatic key location 0212 # 0213 # GnuPG can automatically locate and retrieve keys as needed using the 0214 # auto-key-locate option. This happens when encrypting to an email 0215 # address (in the "user@example.com" form), and there are no 0216 # user@example.com keys on the local keyring. This option takes the 0217 # following arguments, in the order they are to be tried: 0218 # 0219 # cert = locate a key using DNS CERT, as specified in RFC-4398. 0220 # GnuPG can handle both the PGP (key) and IPGP (URL + fingerprint) 0221 # CERT methods. 0222 # 0223 # pka = locate a key using DNS PKA. 0224 # 0225 # ldap = locate a key using the PGP Universal method of checking 0226 # "ldap://keys.(thedomain)". For example, encrypting to 0227 # user@example.com will check ldap://keys.example.com. 0228 # 0229 # keyserver = locate a key using whatever keyserver is defined using 0230 # the keyserver option. 0231 # 0232 # You may also list arbitrary keyservers here by URL. 0233 # 0234 # Try CERT, then PKA, then LDAP, then hkp://subkeys.net: 0235 #auto-key-locate cert pka ldap hkp://subkeys.pgp.net 0236 0237 ###+++--- GPGConf ---+++### 0238 utf8-strings 0239 #debug-level basic 0240 #log-file socket:///home/leo/kde/src/kdepim/messagecomposer/tests/gnupg_home/log-socket 0241 ###+++--- GPGConf ---+++### Tue 29 Jun 2010 10:23:13 AM EDT 0242 # GPGConf edited this configuration file. 0243 # It will disable options before this marked block, but it will 0244 # never change anything below these lines.