- →
Starts KWatchGnuPG, a tool to present the debug output of GnuPG applications. If signing, encryption, or verification mysteriously stop working, you might find out why by looking at the log.
This function is not available on Windows®, since the underlying mechanisms are not implemented in the backend on that platform.
- →
Refreshes all OpenPGP certificates by executing
gpg
--refresh-keys
After successful completion of the command, your local keystore will reflect the latest changes with respect to validity of OpenPGP certificates.
See note under → for some caveats.
- →
Refreshes all S/MIME certificates by executing
gpgsm
-k
--with-validation
--force-crl-refresh
--enable-crl-checks
After successful completion of the command, your local keystore will reflect the latest changes with respect to validity of S/MIME certificates.
Note
Refreshing X.509 or OpenPGP certificates implies downloading all certificates and CRLs, to check if any of them have been revoked in the meantime.
This can put a severe strain on your own as well as other people's network connections, and can take up to an hour or more to complete, depending on your network connection, and the number of certificates to check.
- →
Lets you manually import CRLs from files.
Normally, Certificate Revocation Lists (CRLs) are handled transparently by the backend, but it can sometimes be useful to import a CRL manually into the local CRL cache.
Note
For CRL import to work, the DirMngr tool must be in the search
PATH
. If this menu item is disabled, you should contact the system administrator and ask them to install DirMngr.- →
Clears the GpgSM CRL cache.
You probably never need this. You can force a refresh of the CRL cache by selecting all certificates and using → instead.
- →
Shows the detailed contents of the GpgSM CRL cache.