On 05/09/18 10:45, Fiedler Roman wrote: > * Decrypt and verify with gpg1 on receiver side: > > /usr/bin/gpg1 --no-options --homedir Receiver --no-default-keyring --keyring > Sender/SenderKey.pub --lock-never --trust-model always --batch > --display-charset utf-8 --status-fd 2 --decrypt --try-all-secrets < > Sender/OutgoingMessage.gpg
If you want to know which of the public keys you have signed a particular message, instead of restricting your "keyring" to a single, desired key, you can scan the status-fd for [GNUPG:] GOODSIG <long_keyid_or_fpr> <username> In this case, just keep your keyring as it normally is, containing all public keys. You might then also reach a situation where you can meaningfully use a trust model, instead of your --trust-model always. status-fd is documented in doc/DETAILS. HTH, Peter. -- I use the GNU Privacy Guard (GnuPG) in combination with Enigmail. You can send me encrypted mail if you want some privacy. My key is available at <http://digitalbrains.com/2012/openpgp-key-peter>
signature.asc
Description: OpenPGP digital signature
_______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users