This document lists various command line options for the GNU Privacy Guard (GnuPG or GPG) encryption software. There are over 100 options listed that control features like signing keys, encrypting/decrypting files, verifying signatures, managing keys, and configuring GPG's behavior.
This document lists various command line options for the GNU Privacy Guard (GnuPG or GPG) encryption software. There are over 100 options listed that control features like signing keys, encrypting/decrypting files, verifying signatures, managing keys, and configuring GPG's behavior.
This document lists various command line options for the GNU Privacy Guard (GnuPG or GPG) encryption software. There are over 100 options listed that control features like signing keys, encrypting/decrypting files, verifying signatures, managing keys, and configuring GPG's behavior.