Previous: Unattended Usage, Up: Invoking GPGSM [Contents][Index]
Description of the protocol used to access GPGSM
.
GPGSM
does implement the Assuan protocol and in addition
provides a regular command line interface which exhibits a full client
to this protocol (but uses internal linking). To start
gpgsm
as a server the command line the option
--server
must be used. Additional options are provided to
select the communication method (i.e. the name of the socket).
We assume that the connection has already been established; see the Assuan manual for details.
• GPGSM ENCRYPT: | Encrypting a message. | |
• GPGSM DECRYPT: | Decrypting a message. | |
• GPGSM SIGN: | Signing a message. | |
• GPGSM VERIFY: | Verifying a message. | |
• GPGSM GENKEY: | Generating a key. | |
• GPGSM LISTKEYS: | List available keys. | |
• GPGSM EXPORT: | Export certificates. | |
• GPGSM IMPORT: | Import certificates. | |
• GPGSM DELETE: | Delete certificates. | |
• GPGSM GETAUDITLOG: | Retrieve an audit log. | |
• GPGSM GETINFO: | Information about the process | |
• GPGSM OPTION: | Session options. |