PGP Command Line User Guide

PGP Command Line User Guide

Last updated: July 2020

Copyright statement

Broadcom, the pulse logo, Connecting everything, and Symantec are among the trademarks of Broadcom.

Copyright ? 2020 Broadcom. All Rights Reserved.

The term "Broadcom" refers to Broadcom Inc. and/or its subsidiaries. For more information, please visit .

Broadcom reserves the right to make changes without further notice to any products or data herein to improve reliability, function, or design. Information furnished by Broadcom is believed to be accurate and reliable. However, Broadcom does not assume any liability arising out of the application or use of this information, nor the application or use of any product or circuit described herein, neither does it convey any license under its patent rights nor the rights of others.

Contents

About PGP Command Line

1

Important Concepts

1

Technical Support

2

Installing

5

Install Location

5

Installing on AIX

6

Installing on AIX

6

Changing the Home Directory on AIX

7

Uninstalling on AIX

7

Installing on HP-UX

8

Installing on HP-UX

8

Changing the Home Directory on HP-UX

9

Installing to a Non-Default Directory on HP-UX

9

Uninstalling on HP-UX

9

Installing on macOS

10

Installing on macOS

10

Changing the Home Directory on macOS

10

Uninstalling on macOS

11

Installing on Red Hat Enterprise Linux, SLES, or Fedora Core

11

Installing on Red Hat Enterprise Linux or Fedora Core

11

Changing the Home Directory on Linux or Fedora Core

12

Uninstalling on Linux or Fedora Core

12

Installing on Oracle Solaris

13

Installing on Oracle Solaris

13

Changing the Home Directory on Oracle Solaris

14

Uninstalling on Oracle Solaris

14

Installing on Windows

15

PGP Command Line for Windows and Symantec Encryption Desktop on the Same System 15

To Install on Windows

15

Changing the Home Directory on Windows

15

Uninstalling on Windows

16

Upgrading

16

Relocating

17

Licensing

19

Overview

19

Using a License Number

20

Using a License Authorization

20

Re-Licensing

20

ii Contents

The Command-Line Interface

23

Overview

23

Flags and Arguments

24

Flags

25

Arguments

25

Configuration File

28

Keyserver Configuration File Settings

32

Environment Variables

33

Standard Input, Output, and Error

34

Redirecting an Existing File

34

Entering Data

34

Specifying a Key

35

'Secure' Options

36

First Steps

37

Overview

37

Creating Your Keypair

38

Protecting Your Private Key

40

Distributing Your Public Key

40

Posting Your Public Key to a Keyserver

41

Exporting Your Public Key to a Text File

41

Getting the Public Keys of Others

42

Finding a Public Key on a Keyserver

42

Importing a Public Key from a Keyserver

43

Verifying Keys

44

Cryptographic Operations

47

Overview

47

Commands

48

--armor (-a)

48

--clearsign

49

--decrypt

51

--detached (-b)

53

--dump-packets, --list-packets

54

--encrypt (-e)

55

--export-session-key

58

--list-sda

59

--list-archive

59

--sign (-s)

60

--symmetric (-c)

62

--verify

63

Key Listings

65

Overview

65

Commands

65

--fingerprint

66

--fingerprint-details

66

--list-key-details --list-keys (-l) --list-keys-xml --list-sig-details --list-sigs --list-userids

Working with Keyservers

Overview Commands

--keyserver-disable --keyserver-recv --keyserver-remove --keyserver-search --keyserver-send --keyserver-update

Managing Keys

Overview Commands

--add-adk --add-photoid --add-preferred-cipher --add-preferred-compression-algorithm --add-preferred-email-encoding --add-preferred-hash --add-revoker --add-userid --cache-passphrase --change-passphrase --clear-key-flag --disable --enable --export, --export-key-pair --export-photoid --gen-key --gen-revocation --gen-subkey --get-email-encoding --import --join-key --join-key-cache-only --key-recon-send --key-recon-recv-questions --key-recon-recv --remove --remove-adk --remove-all-adks --remove-all-photoids --remove-all-revokers --remove-expiration-date

Contents iii

68 69 70 70 71 71

73

73 74 74 74 75 76 77 78

79

81 81 81 82 82 83 83 84 84 85 85 86 87 87 88 88 90 91 93 94 94 95 96 99 100 101 102 103 103 104 104 104 105

iv Contents

--remove-key-pair --remove-photoid --remove-preferred-cipher --remove-preferred-compression-algorithm --remove-preferred-email-encoding --remove-preferred-hash --remove-preferred-keyserver --remove-revoker --remove-sig --remove-subkey --remove-userid --revoke --revoke-sig --revoke-subkey --send-shares --set-expiration-date --set-key-flag --set-preferred-ciphers --set-preferred-compression-algorithms --set-preferred-email-encodings --set-preferred-hashes --set-preferred-keyserver --set-primary-userid --set-trust --sign-key --sign-userid --split-key

Working with Email

Overview Encrypt Email Sign Email Decrypt Email Verify Email Annotate Email

Working with a PGP Key Management Server

Overview New Terms and Concepts Relationship with a PGP KMS Authentication for PGP KMS Operations

--decrypt --encrypt (-e) --create-mak --export-mak --export-mak-pair

Export Format --import-mak --request-cert --edit-mak --search-mak

105 106 106 106 107 107 108 108 109 109 110 110 111 111 112 112 113 113 114 114 115 115 116 116 117 118 119

123

123 124 125 126 126 126

129

130 130 131 131 133 133 134 134 135 136 137 138 138 139

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download