PGP Command Line User Guide
PGP Command Line User Guide
Last updated: July 2020
Copyright statement
Broadcom, the pulse logo, Connecting everything, and Symantec are among the trademarks of Broadcom.
Copyright ? 2020 Broadcom. All Rights Reserved.
The term "Broadcom" refers to Broadcom Inc. and/or its subsidiaries. For more information, please visit .
Broadcom reserves the right to make changes without further notice to any products or data herein to improve reliability, function, or design. Information furnished by Broadcom is believed to be accurate and reliable. However, Broadcom does not assume any liability arising out of the application or use of this information, nor the application or use of any product or circuit described herein, neither does it convey any license under its patent rights nor the rights of others.
Contents
About PGP Command Line
1
Important Concepts
1
Technical Support
2
Installing
5
Install Location
5
Installing on AIX
6
Installing on AIX
6
Changing the Home Directory on AIX
7
Uninstalling on AIX
7
Installing on HP-UX
8
Installing on HP-UX
8
Changing the Home Directory on HP-UX
9
Installing to a Non-Default Directory on HP-UX
9
Uninstalling on HP-UX
9
Installing on macOS
10
Installing on macOS
10
Changing the Home Directory on macOS
10
Uninstalling on macOS
11
Installing on Red Hat Enterprise Linux, SLES, or Fedora Core
11
Installing on Red Hat Enterprise Linux or Fedora Core
11
Changing the Home Directory on Linux or Fedora Core
12
Uninstalling on Linux or Fedora Core
12
Installing on Oracle Solaris
13
Installing on Oracle Solaris
13
Changing the Home Directory on Oracle Solaris
14
Uninstalling on Oracle Solaris
14
Installing on Windows
15
PGP Command Line for Windows and Symantec Encryption Desktop on the Same System 15
To Install on Windows
15
Changing the Home Directory on Windows
15
Uninstalling on Windows
16
Upgrading
16
Relocating
17
Licensing
19
Overview
19
Using a License Number
20
Using a License Authorization
20
Re-Licensing
20
ii Contents
The Command-Line Interface
23
Overview
23
Flags and Arguments
24
Flags
25
Arguments
25
Configuration File
28
Keyserver Configuration File Settings
32
Environment Variables
33
Standard Input, Output, and Error
34
Redirecting an Existing File
34
Entering Data
34
Specifying a Key
35
'Secure' Options
36
First Steps
37
Overview
37
Creating Your Keypair
38
Protecting Your Private Key
40
Distributing Your Public Key
40
Posting Your Public Key to a Keyserver
41
Exporting Your Public Key to a Text File
41
Getting the Public Keys of Others
42
Finding a Public Key on a Keyserver
42
Importing a Public Key from a Keyserver
43
Verifying Keys
44
Cryptographic Operations
47
Overview
47
Commands
48
--armor (-a)
48
--clearsign
49
--decrypt
51
--detached (-b)
53
--dump-packets, --list-packets
54
--encrypt (-e)
55
--export-session-key
58
--list-sda
59
--list-archive
59
--sign (-s)
60
--symmetric (-c)
62
--verify
63
Key Listings
65
Overview
65
Commands
65
--fingerprint
66
--fingerprint-details
66
--list-key-details --list-keys (-l) --list-keys-xml --list-sig-details --list-sigs --list-userids
Working with Keyservers
Overview Commands
--keyserver-disable --keyserver-recv --keyserver-remove --keyserver-search --keyserver-send --keyserver-update
Managing Keys
Overview Commands
--add-adk --add-photoid --add-preferred-cipher --add-preferred-compression-algorithm --add-preferred-email-encoding --add-preferred-hash --add-revoker --add-userid --cache-passphrase --change-passphrase --clear-key-flag --disable --enable --export, --export-key-pair --export-photoid --gen-key --gen-revocation --gen-subkey --get-email-encoding --import --join-key --join-key-cache-only --key-recon-send --key-recon-recv-questions --key-recon-recv --remove --remove-adk --remove-all-adks --remove-all-photoids --remove-all-revokers --remove-expiration-date
Contents iii
68 69 70 70 71 71
73
73 74 74 74 75 76 77 78
79
81 81 81 82 82 83 83 84 84 85 85 86 87 87 88 88 90 91 93 94 94 95 96 99 100 101 102 103 103 104 104 104 105
iv Contents
--remove-key-pair --remove-photoid --remove-preferred-cipher --remove-preferred-compression-algorithm --remove-preferred-email-encoding --remove-preferred-hash --remove-preferred-keyserver --remove-revoker --remove-sig --remove-subkey --remove-userid --revoke --revoke-sig --revoke-subkey --send-shares --set-expiration-date --set-key-flag --set-preferred-ciphers --set-preferred-compression-algorithms --set-preferred-email-encodings --set-preferred-hashes --set-preferred-keyserver --set-primary-userid --set-trust --sign-key --sign-userid --split-key
Working with Email
Overview Encrypt Email Sign Email Decrypt Email Verify Email Annotate Email
Working with a PGP Key Management Server
Overview New Terms and Concepts Relationship with a PGP KMS Authentication for PGP KMS Operations
--decrypt --encrypt (-e) --create-mak --export-mak --export-mak-pair
Export Format --import-mak --request-cert --edit-mak --search-mak
105 106 106 106 107 107 108 108 109 109 110 110 111 111 112 112 113 113 114 114 115 115 116 116 117 118 119
123
123 124 125 126 126 126
129
130 130 131 131 133 133 134 134 135 136 137 138 138 139
................
................
In order to avoid copyright disputes, this page is only a partial summary.
To fulfill the demand for quickly locating and searching documents.
It is intelligent file search solution for home and business.