Discrepancies in extracted photo-id images from dumps

Peter Lebbing peter at digitalbrains.com
Sun Jan 20 15:22:08 CET 2019


On 20/01/2019 13:38, Stefan Claas wrote:
> So taking the smallest image and looking at the %U part i am
> wondering what key data is encoded in this base32 string?

From the gpg man page:

| --photo-viewer string
|        This  is the command line that should be run to view a photo ID.
|        "%i" will be expanded to a filename containing the  photo.  "%I"
|        does  the  same,  except  the  file will not be deleted once the
|        viewer exits.  Other flags are "%k" for the key ID, "%K" for the
|        long  key  ID, "%f" for the key fingerprint, "%t" for the exten‐
|        sion of the image type (e.g. "jpg"), "%T" for the MIME  type  of
|        the  image  (e.g.  "image/jpeg"),  "%v" for the single-character
|        calculated validity of the image being viewed (e.g.  "f"),  "%V"
|        for the calculated validity as a string (e.g.  "full"), "%U" for
|        a base32 encoded hash of the user ID, and  "%%"  for  an  actual
|        percent  sign.  If  neither %i or %I are present, then the photo
|        will be supplied to the viewer on standard input.

HTH,

Peter.

-- 
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some privacy.
My key is available at <http://digitalbrains.com/2012/openpgp-key-peter>

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 488 bytes
Desc: OpenPGP digital signature
URL: <https://lists.gnupg.org/pipermail/gnupg-users/attachments/20190120/834c68c7/attachment.sig>


More information about the Gnupg-users mailing list