Having trouble finding Options/gpg.conf file from command line

Steve Butler sbutler@fchn.com
Thu Jun 5 22:24:02 2003

GNUPGHOME works great on Unix/Linux type servers.  Our entry is:

-----Original Message-----
From: John Clizbe [mailto:JPClizbe@attbi.com]
Sent: Thursday, June 05, 2003 12:28 PM
To: Gates, Scott; GnuPG Users
Subject: Re: Having trouble finding Options/gpg.conf file from command

Hash: SHA1

Gates, Scott wrote:

> I'm trying to set up GnuPG on my server here. It's a WinXP Pro system.
> I want to be able to use dos style bats to encrypt files for certain
> users.  However, I can't get GnuPG to find the default options or
> gpg.conf file  I've been reading the docs and have written both hoping
> it would work.  The two files are exactly alike.
> The path to GnuPG is c:\Program Files\Windows Privacy Tools\GnuPG   the
> options and gpg.conf files are there.  Am I missing a system variable?
> I put GNUPGHOME=c:\Program Files\Windows Privacy Tools\GnuPG and have
> c:\Program Files\Windows Privacy Tools\GnuPG as part of the PATH.

Here's a sample .REG file (From the Nullify build for Windows):


"HomeDir"="C:\\Program Files\\GnuPG"
"gpgProgram"="C:\\Program Files\\GnuPG\\gpg.exe"

[HKEY_CURRENT_USER\Control Panel\Mingw32]

[HKEY_CURRENT_USER\Control Panel\Mingw32\NLS]
"MODir"="C:\\Program Files\\GnuPG\\Locale"

Never heard of GNUPGHOME. There was a PGPHOME in some of the old PGP
cmdline versions. Just use gpg.conf here, no Options. file.

- --
John P. Clizbe                   Inet:   JPClizbe AT attbi DOT com
Golden Bear Networks             PGP/GPG KeyID: 0x608D2A10
  "Most men take the straight and narrow. A few take the road less
traveled.  I chose to cut through the woods."

9:00PM Tonight on _REAL_IRONY_:  Vegetarian Man Eaten by Cannibals
Version: GnuPG v1.2.2-nr1 (Windows 2000)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org


Gnupg-users mailing list

CONFIDENTIALITY NOTICE:  This e-mail message, including any attachments, is for the sole use of the intended recipient(s) and may contain confidential and privileged information.  Any unauthorized review, use, disclosure or distribution is prohibited.  If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message.