|DIRMNGR-CLIENT(1)||GNU Privacy Guard 2.2||DIRMNGR-CLIENT(1)|
NAME¶dirmngr-client - Tool to access the Dirmngr services
SYNOPSIS¶dirmngr-client [options] [certfile|pattern]
DESCRIPTION¶The dirmngr-client is a simple tool to contact a running dirmngr and test whether a certificate has been revoked --- either by being listed in the corresponding CRL or by running the OCSP protocol. If no dirmngr is running, a new instances will be started but this is in general not a good idea due to the huge performance overhead.
The usual way to run this tool is either:
Where acert is one DER encoded (binary) X.509 certificates to be tested.
RETURN VALUE¶dirmngr-client returns these values:
- The certificate under question is valid; i.e. there is a valid CRL available and it is not listed there or the OCSP request returned that that certificate is valid.
- The certificate has been revoked
- 2 (and other values)
- There was a problem checking the revocation state of the certificate. A message to stderr has given more detailed information. Most likely this is due to a missing or expired CRL or due to a network problem.
OPTIONS¶dirmngr-client may be called with the following options:
- Print the program version and licensing information. Note that you cannot abbreviate this command.
- --help, -h
- Print a usage message summarizing the most useful command-line options. Note that you cannot abbreviate this command.
- --quiet, -q
- Make the output extra brief by suppressing any informational messages.
- Outputs additional information while running. You can increase the verbosity by giving several verbose commands to dirmngr, such as ‘-vv’.
- Assume that the given certificate is in PEM (armored) format.
- Do the check using the OCSP protocol and ignore any CRLs.
- When checking using the OCSP protocol, force the use of the default OCSP responder. That is not to use the Reponder as given by the certificate.
- Check whether the dirmngr daemon is up and running.
- Put the given certificate into the cache of a running dirmngr. This is mainly useful for debugging.
- Validate the given certificate using dirmngr's internal validation code. This is mainly useful for debugging.
- This command expects a list of filenames with DER encoded CRL files. With the option --url URLs are expected in place of filenames and they are loaded directly from the given location. All CRLs will be validated and then loaded into dirmngr's cache.
- Take the remaining arguments and run a lookup command on each of them. The results are Base-64 encoded outputs (without header lines). This may be used to retrieve certificates from a server. However the output format is not very well suited if more than one certificate is returned.
- Modify the lookup and load-crl commands to take an URL.
- Let the lookup command only search the local cache.
- Run dirmngr-client in a mode suitable as a helper program for Squid's external_acl_type option.
SEE ALSO¶dirmngr(8), gpgsm(1)
The full documentation for this tool is maintained as a Texinfo manual. If GnuPG and the info program are properly installed at your site, the command
should give you access to the complete manual including a menu structure and an index.