Previous: Unattended Usage, Up: Invoking GPGSM [Contents][Index]
Description of the protocol used to access GPGSM.
GPGSM does implement the Assuan protocol and in addition
provides a regular command line interface which exhibits a full client
to this protocol (but uses internal linking). To start
gpgsm as a server the command line the option
--server must be used. Additional options are provided to
select the communication method (i.e., the name of the socket).
We assume that the connection has already been established; see the Assuan manual for details.
| • GPGSM ENCRYPT | Encrypting a message. | |
| • GPGSM DECRYPT | Decrypting a message. | |
| • GPGSM SIGN | Signing a message. | |
| • GPGSM VERIFY | Verifying a message. | |
| • GPGSM GENKEY | Generating a key. | |
| • GPGSM LISTKEYS | List available keys. | |
| • GPGSM EXPORT | Export certificates. | |
| • GPGSM IMPORT | Import certificates. | |
| • GPGSM DELETE | Delete certificates. | |
| • GPGSM GETAUDITLOG | Retrieve an audit log. | |
| • GPGSM GETINFO | Information about the process | |
| • GPGSM OPTION | Session options. |