McAfee MEJCAE-AM-DA Product Guide - Page 157

A Command-Line Reference, Key options, Email and file options

Page 157 highlights

A Command-Line Reference Key options The --help --key option lists all the key management functions available in E-Business Server. --key is also used in combination with other options. The following table lists and describes these combinations, and lists the corresponding legacy options. Long Option --help --key --import --key-add --key-check --key-edit --key-edit --disable --key-edit --revoke --key-edit --revoke-sig --key-gen --key-edit --split --key-join --key-join --network --key-edit --remove-sig --key-edit --remove-userid --key-sign --key-sign --expires-after --key-list --key-detail --key-list --with-userids --key-list --with-sigs --key-export --key-export --armor Legacy Option -k -ka -kc -ke -kd -kd -kds -kg -kl -kj -kq -krs -ks -ksx -kv -kvc -kvv -kvv -kx -kxa Description Displays help on key options. Adds keys to the keyring. Checks signatures. Edits your user ID, passphrase, trust options, default signing key, or adds a designated revoker for your secret key. Disables keys on the keyring. Revokes keys on the keyring. Revokes signatures attached to keys on the keyring. Generates a new key. Creates a split key. Reconstitutes a split key. Reconstitutes a split key remotely, or over a network. Removes signatures attached to keys on the keyring. Removes a user ID from the keyring. Signs keys on the keyring. Signs keys on the keyring and adds an expiration date to your signature. Lists the keys on the keyring. Display key information, such as the key's fingerprint. List all user IDs on keys on the keyring. List all signatures on keys on the keyring. Extract keys from the keyring to exchange with others. Extract keys from the keyring in ASCII-armored format, which makes it easy to paste into email Email and file options The following table identifies and describes E-Business Server's command-line options used to encrypt, decrypt, and manage files, and lists the corresponding legacy options. Long Option --armor --conventional --encrypt Legacy Option -a -c -e Description Use ASCII-armored format for encrypt, sign, and export operations Use conventional (symmetric) encryption, not using public-key operations. Only applies to --encrypt operations. Specify that an encryption operation is performed. By default, this is a public-key operation unless --conventional is specified in the config file. (--no-conventional entered on the command line overrides the config file) E-Business Server™ 8.6 Product Guide 155

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188

E-Business Server
8.6
Product Guide
155
A
Command-Line Reference
Key options
The
--help --key
option lists all the key management functions available in E-Business Server.
--key
is also used in combination with other options. The following table lists and describes these
combinations, and lists the corresponding legacy options.
Email and file options
The following table identifies and describes E-Business Server’s command-line options used to encrypt,
decrypt, and manage files, and lists the corresponding legacy options.
Long Option
Legacy Option
Description
--help --key
-k
Displays help on key options.
--import --key-add
-ka
Adds keys to the keyring.
--key-check
-kc
Checks signatures.
--key-edit
-ke
Edits your user ID, passphrase, trust options, default
signing key, or adds a designated revoker for your secret
key.
--key-edit --disable
-kd
Disables keys on the keyring.
--key-edit --revoke
-kd
Revokes keys on the keyring.
--key-edit --revoke-sig
-kds
Revokes signatures attached to keys on the keyring.
--key-gen
-kg
Generates a new key.
--key-edit --split
-kl
Creates a split key.
--key-join
-kj
Reconstitutes a split key.
--key-join --network
-kq
Reconstitutes a split key remotely, or over a network.
--key-edit --remove-sig
-krs
Removes signatures attached to keys on the keyring.
--key-edit --remove-userid
Removes a user ID from the keyring.
--key-sign
-ks
Signs keys on the keyring.
--key-sign --expires-after
-ksx
Signs keys on the keyring and adds an expiration date to
your signature.
--key-list
-kv
Lists the keys on the keyring.
--key-detail
-kvc
Display key information, such as the key’s fingerprint.
--key-list --with-userids
-kvv
List all user IDs on keys on the keyring.
--key-list --with-sigs
-kvv
List all signatures on keys on the keyring.
--key-export
-kx
Extract keys from the keyring to exchange with others.
--key-export --armor
-kxa
Extract keys from the keyring in ASCII-armored format,
which makes it easy to paste into email
Long Option
Legacy Option
Description
--armor
-a
Use ASCII-armored format for encrypt, sign, and export
operations
--conventional
-c
Use conventional (symmetric) encryption, not using
public-key operations. Only applies to --encrypt operations.
--encrypt
-e
Specify that an encryption operation is performed. By
default, this is a public-key operation unless --conventional
is specified in the config file. (--no-conventional entered on
the command line overrides the config file)