aboutsummaryrefslogtreecommitdiffstats
path: root/doc/DETAILS
diff options
context:
space:
mode:
Diffstat (limited to 'doc/DETAILS')
-rw-r--r--doc/DETAILS47
1 files changed, 24 insertions, 23 deletions
diff --git a/doc/DETAILS b/doc/DETAILS
index c00914bb7..da9df27bb 100644
--- a/doc/DETAILS
+++ b/doc/DETAILS
@@ -36,6 +36,7 @@ record.
pkd = public key data (special field format, see below)
grp = reserved for gpgsm
rvk = revocation key
+ tru = trust database information
2. Field: A letter describing the calculated trust. This is a single
letter, but be prepared that additional information may follow
@@ -123,6 +124,21 @@ pkd:0:1024:B665B1435F4C2 .... FF26ABB:
! !------ for information number of bits in the value
!--------- index (eg. DSA goes from 0 to 3: p,q,g,y)
+
+The "tru" trust database records have the fields:
+
+ 1: Reason for staleness of trust. If this field is empty, then the
+ trustdb is not stale. This field may have multiple flags in it:
+
+ o: Trustdb is old
+ t: Trustdb was built with a different trust model than the one we
+ are using now.
+
+ 2: Trust model. This is always zero (i.e. "Classic") in this version
+ of GnuPG.
+ 3: Date trustdb was created in seconds since 1/1/1970.
+ 4: Date trustdb will expire in seconds since 1/1/1970.
+
Format of the "--status-fd" output
@@ -150,6 +166,11 @@ more arguments in future versions.
made by an expired key. The username is the primary one
encoded in UTF-8 and %XX escaped.
+ REVKEYSIG <long keyid> <username>
+ The signature with the keyid is good, but the signature was
+ made by a revoked key. The username is the primary one
+ encoded in UTF-8 and %XX escaped.
+
BADSIG <long keyid> <username>
The signature with the keyid has not been verified okay.
The username is the primary one encoded in UTF-8 and %XX
@@ -876,33 +897,13 @@ After the hash algorithm the 3 bytes "GNU" are used to make
clear that these are extensions for GNU, the next bytes gives the
GNU protection mode - 1000. Defined modes are:
1001 - do not store the secret part at all
-
-
-Usage of gdbm files for keyrings
-================================
- The key to store the keyblock is its fingerprint, other records
- are used for secondary keys. Fingerprints are always 20 bytes
- where 16 bit fingerprints are appended with zero.
- The first byte of the key gives some information on the type of the
- key.
- 1 = key is a 20 bit fingerprint (16 bytes fpr are padded with zeroes)
- data is the keyblock
- 2 = key is the complete 8 byte keyid
- data is a list of 20 byte fingerprints
- 3 = key is the short 4 byte keyid
- data is a list of 20 byte fingerprints
- 4 = key is the email address
- data is a list of 20 byte fingerprints
-
- Data is prepended with a type byte:
- 1 = keyblock
- 2 = list of 20 byte padded fingerprints
- 3 = list of list fingerprints (but how to we key them?)
-
+ 1002 - a stub to access smartcards (not used in 1.2.x)
Pipemode
========
+NOTE: This is deprecated and will be removed in future versions.
+
This mode can be used to perform multiple operations with one call to
gpg. It comes handy in cases where you have to verify a lot of
signatures. Currently we support only detached signatures. This mode