On Mon, 5 Dec 2011 16:32, w...@gnupg.org said:
> gpg --verify-options pka-lookups,pka-trust-increase --verify
Well, you also need the options
--keyserver-options honor-pka-record,auto-key-retrieve
Shalom-Salam,
Werner
--
Die Gedanken sind frei. Ausnahmen regelt ein Bundesgesetz.
On Mon, 5 Dec 2011 15:30, gn...@lists.grepular.com said:
> I then tried verifying the output from the above command, by piping it
> into this, using a gpg homedir that didn't contain my key:
>
> gpg --verify-options pka-lookups --verify
You may want to use:
gpg --verify-options pka-lookups,pk
On 05/12/11 13:15, Werner Koch wrote:
>> verification, but if you don't have the key already, it doesn't know the
>> UID associated with the key used to sign and therefore can't do the PKA
>> lookup... Is there some additional command line option that I should be
>
> Well, PKA requires additional
On Mon, 5 Dec 2011 13:26, gn...@lists.grepular.com said:
> verification, but if you don't have the key already, it doesn't know the
> UID associated with the key used to sign and therefore can't do the PKA
> lookup... Is there some additional command line option that I should be
Well, PKA requir
Can anyone explain to me the purpose of "--verify-options pka-lookups" ?
I have successfully used "--auto-key-locate pka" when encrypting
messages, but I can't see how to use "pka-lookups".
I assumed it would automatically lookup/download the key in order to do
verification, but if you don't have