Previous: Unattended Usage, Up: Invoking GPGSM [Contents][Index]
Description of the protocol used to access GPGSM
.
GPGSM
does implement the Assuan protocol and in addition
provides a regular command line interface which exhibits a full client
to this protocol (but uses internal linking). To start
gpgsm
as a server the command line the option
--server
must be used. Additional options are provided to
select the communication method (i.e. the name of the socket).
We assume that the connection has already been established; see the Assuan manual for details.
• GPGSM ENCRYPT | Encrypting a message. | |
• GPGSM DECRYPT | Decrypting a message. | |
• GPGSM SIGN | Signing a message. | |
• GPGSM VERIFY | Verifying a message. | |
• GPGSM GENKEY | Generating a key. | |
• GPGSM LISTKEYS | List available keys. | |
• GPGSM EXPORT | Export certificates. | |
• GPGSM IMPORT | Import certificates. | |
• GPGSM DELETE | Delete certificates. | |
• GPGSM GETAUDITLOG | Retrieve an audit log. | |
• GPGSM GETINFO | Information about the process | |
• GPGSM OPTION | Session options. |