Discrepancies in extracted photo-id images from dumps
Peter Lebbing
peter at digitalbrains.com
Sun Jan 20 15:22:08 CET 2019
On 20/01/2019 13:38, Stefan Claas wrote:
> So taking the smallest image and looking at the %U part i am
> wondering what key data is encoded in this base32 string?
From the gpg man page:
| --photo-viewer string
| This is the command line that should be run to view a photo ID.
| "%i" will be expanded to a filename containing the photo. "%I"
| does the same, except the file will not be deleted once the
| viewer exits. Other flags are "%k" for the key ID, "%K" for the
| long key ID, "%f" for the key fingerprint, "%t" for the exten‐
| sion of the image type (e.g. "jpg"), "%T" for the MIME type of
| the image (e.g. "image/jpeg"), "%v" for the single-character
| calculated validity of the image being viewed (e.g. "f"), "%V"
| for the calculated validity as a string (e.g. "full"), "%U" for
| a base32 encoded hash of the user ID, and "%%" for an actual
| percent sign. If neither %i or %I are present, then the photo
| will be supplied to the viewer on standard input.
HTH,
Peter.
--
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some privacy.
My key is available at <http://digitalbrains.com/2012/openpgp-key-peter>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 488 bytes
Desc: OpenPGP digital signature
URL: <https://lists.gnupg.org/pipermail/gnupg-users/attachments/20190120/834c68c7/attachment.sig>
More information about the Gnupg-users
mailing list