Tools Menu

ToolsGnuPG Log Viewer...

Starts KWatchGnuPG, a tool to present the debug output of GnuPG applications. If signing, encryption, or verification mysteriously stop working, you might find out why by looking at the log.

This function is not available on Windows®, since the underlying mechanisms are not implemented in the backend on that platform.

ToolsRefresh OpenPGP Certificates

Refreshes all OpenPGP certificates by executing

gpg --refresh-keys

After successful completion of the command, your local keystore will reflect the latest changes with respect to validity of OpenPGP certificates.

See note under ToolsRefresh X.509 Certificates for some caveats.

ToolsRefresh X.509 Certificates

Refreshes all S/MIME certificates by executing

gpgsm -k --with-validation --force-crl-refresh --enable-crl-checks

After successful completion of the command, your local keystore will reflect the latest changes with respect to validity of S/MIME certificates.

Note

Refreshing X.509 or OpenPGP certificates implies downloading all certificates and CRLs, to check if any of them have been revoked in the meantime.

This can put a severe strain on your own as well as other people's network connections, and can take up to an hour or more to complete, depending on your network connection, and the number of certificates to check.

ToolsImport CRL From File...

Lets you manually import CRLs from files.

Normally, Certificate Revocation Lists (CRLs) are handled transparently by the backend, but it can sometimes be useful to import a CRL manually into the local CRL cache.

Note

For CRL import to work, the DirMngr tool must be in the search PATH. If this menu item is disabled, you should contact the system administrator and ask them to install DirMngr.

ToolsClear CRL Cache

Clears the GpgSM CRL cache.

You probably never need this. You can force a refresh of the CRL cache by selecting all certificates and using ToolsRefresh X.509 Certificates instead.

ToolsDump CRL Cache

Shows the detailed contents of the GpgSM CRL cache.