X-Git-Url: https://git.saurik.com/apt.git/blobdiff_plain/3a341a1deda6123f219765d0cd4a51fd826e213e..29d0b55e368aa2ae26ad61f7ecd60b723a3a4e05:/cmdline/apt-key?ds=inline diff --git a/cmdline/apt-key b/cmdline/apt-key index bf1a5fefb..7bb30240e 100755 --- a/cmdline/apt-key +++ b/cmdline/apt-key @@ -1,6 +1,7 @@ #!/bin/sh set -e +unset GREP_OPTIONS # We don't use a secret keyring, of course, but gpg panics and # implodes if there isn't one available @@ -86,7 +87,7 @@ update() { # add new keys from the package; # we do not use add_keys_with_verify_against_master_keyring here, - # because we "update" is run on regular package updates. A + # because "update" is run on regular package updates. A # attacker might as well replace the master-archive-keyring file # in the package and add his own keys. so this check wouldn't # add any security. we *need* this check on net-update though @@ -114,6 +115,8 @@ usage() { echo " apt-key update - update keys using the keyring package" echo " apt-key net-update - update keys using the network" echo " apt-key list - list keys" + echo " apt-key finger - list fingerprints" + echo " apt-key adv - pass advanced options to gpg (download key)" echo }