X-Git-Url: https://git.distorted.org.uk/~mdw/catacomb/blobdiff_plain/ef3b232f49aef88b609efeb1f535212759c38dd1..4dafd519dbbdc17887f2de4f6cabe33ac4667ab0:/progs/key.1 diff --git a/progs/key.1 b/progs/key.1 index f301391f..a2ac3376 100644 --- a/progs/key.1 +++ b/progs/key.1 @@ -117,6 +117,8 @@ is one of: .B fingerprint .RB [ \-f .IR filter ] +.RB [ \-p +.IR style ] .RB [ \-a .IR hash ] .RI [ tag ...] @@ -124,6 +126,8 @@ is one of: .B verify .RB [ \-f .IR filter ] +.RB [ \-p +.IR style ] .RB [ \-a .IR hash ] .I tag @@ -340,6 +344,13 @@ The pseudorandom generators which are acceptable to the option of the .B add command. +.TP +.B fpres +Fingerprint presentation styles, as used by the +.B fingerprint +and +.B verify +commands. .SS add The .B add @@ -919,6 +930,11 @@ Specifies a filter. Only keys and key components which match the filter are fingerprinted. The default is to only fingerprint nonsecret components. .TP +.BI "\-p, \-\-presentation " style +Write fingerprints in the given +.IR style . +See below for a list of presentation styles. +.TP .BI "\-a, \-\-algorithm " hash Names the hashing algorithm. Run .B key show hash @@ -930,6 +946,18 @@ command line arguments. If no key tags are given, all keys which match the filter are fingerprinted. See .BR keyring (5) for a description of how key fingerprints are computed. +.PP +The fingerprint may be shown in the following styles. +.TP +.B hex +Lowercase hexadecimal, with groups of eight digits separated by hyphens +(`\-'). This is the default presentation style. (On input, colons are +also permitted as separators.) +.TP +.B base32 +Lowercase Base32 encoding, without `=' padding, with groups of six +digits separated by colons (`:'). (On input, padding characters are +ignored.) .SS "verify" Check a key's fingerprint against a reference copy. The following options are supported: @@ -939,15 +967,29 @@ Specifies a filter. Only key components which match the filter are hashed. The default is to only fingerprint nonsecret components. An error is reported if no part of the key matches. .TP +.BI "\-p, \-\-presentation " style +Expect the +.I fingerprint +to be in the given presentation +.IR style . +These match the styles produced by the +.B fingerprint +command described above. +.TP .BI "\-a, \-\-algorithm " hash Names the hashing algorithm. Run .B key show hash for a list of hashing algorithms. The default is .BR rmd160 . .PP -The reference fingerprint is given as hex, in upper or lower case. The -hash may contain hyphens, colons and whitespace. Other characters are -not permitted. +The fingerprint should be provided in the form printed by the +.B fingerprint +command, using the same presentation +.IR style . +A little flexibility is permitted: separators may be placed anywhere (or +not at all) and are ignored; whitespace is permitted and ignored; and +case is ignored in presentation styles which don't make use of both +upper- and lower-case characters. .SS "tidy" Simply reads the keyring from file and writes it back again. This has the effect of removing any deleted keys from the file.