-t, --textmode
--no-textmode
--force-v3-sigs
--no-force-v3-sigs
--force-v4-certs
--no-force-v4-certs
--force-mdc
--disable-mdc
--personal-cipher-preferences string
string
. Use
gpg2 --version to get a list of available algorithms,
and use none
to set no preference at all. This allows the user
to safely override the algorithm chosen by the recipient key
preferences, as GPG will only select an algorithm that is usable by
all recipients. The most highly ranked cipher in this list is also
used for the --symmetric encryption command.
--personal-digest-preferences string
string
. Use
gpg2 --version to get a list of available algorithms,
and use none
to set no preference at all. This allows the user
to safely override the algorithm chosen by the recipient key
preferences, as GPG will only select an algorithm that is usable by
all recipients. The most highly ranked digest algorithm in this list
is also used when signing without encryption
(e.g. --clearsign or --sign).
--personal-compress-preferences string
string
.
Use gpg2 --version to get a list of available
algorithms, and use none
to set no preference at all. This
allows the user to safely override the algorithm chosen by the
recipient key preferences, as GPG will only select an algorithm that
is usable by all recipients. The most highly ranked compression
algorithm in this list is also used when there are no recipient keys
to consider (e.g. --symmetric).
--s2k-cipher-algo name
name
as the cipher algorithm used to protect secret keys.
The default cipher is CAST5. This cipher is also used for symmetric
encryption with a passphrase if --personal-cipher-preferences
and --cipher-algo is not given.
--s2k-digest-algo name
name
as the digest algorithm used to mangle the passphrases.
The default algorithm is SHA-1.
--s2k-mode n
n
is 0 a plain
passphrase (which is not recommended) will be used, a 1 adds a salt to
the passphrase and a 3 (the default) iterates the whole process a
number of times (see –s2k-count). Unless --rfc1991 is used,
this mode is also used for symmetric encryption with a passphrase.
--s2k-count n