Previous: Unattended Usage, Up: Invoking GPGSM [Contents][Index]
Description of the protocol used to access GPGSM.
GPGSM does implement the Assuan protocol and in addition
provides a regular command line interface which exhibits a full client
to this protocol (but uses internal linking).  To start
gpgsm as a server the command line the option
--server must be used.  Additional options are provided to
select the communication method (i.e. the name of the socket).
We assume that the connection has already been established; see the Assuan manual for details.
| • GPGSM ENCRYPT: | Encrypting a message. | |
| • GPGSM DECRYPT: | Decrypting a message. | |
| • GPGSM SIGN: | Signing a message. | |
| • GPGSM VERIFY: | Verifying a message. | |
| • GPGSM GENKEY: | Generating a key. | |
| • GPGSM LISTKEYS: | List available keys. | |
| • GPGSM EXPORT: | Export certificates. | |
| • GPGSM IMPORT: | Import certificates. | |
| • GPGSM DELETE: | Delete certificates. | |
| • GPGSM GETAUDITLOG: | Retrieve an audit log. | |
| • GPGSM GETINFO: | Information about the process | |
| • GPGSM OPTION: | Session options. |