jaromail

a commandline tool to easily and privately handle your e-mail
git clone git://parazyd.org/jaromail.git
Log | Files | Refs | Submodules | README

gpg (3211B)


      1 # -*-muttrc-*-
      2 #
      3 # Command formats for gpg.
      4 # 
      5 # This version uses gpg-2comp from 
      6 #   http://70t.de/download/gpg-2comp.tar.gz
      7 #
      8 # $Id$
      9 #
     10 # %p    The empty string when no passphrase is needed,
     11 #       the string "PGPPASSFD=0" if one is needed.
     12 #
     13 #       This is mostly used in conditional % sequences.
     14 #
     15 # %f    Most PGP commands operate on a single file or a file
     16 #       containing a message.  %f expands to this file's name.
     17 #
     18 # %s    When verifying signatures, there is another temporary file
     19 #       containing the detached signature.  %s expands to this
     20 #       file's name.
     21 #
     22 # %a    In "signing" contexts, this expands to the value of the
     23 #       configuration variable $pgp_sign_as.  You probably need to
     24 #       use this within a conditional % sequence.
     25 #
     26 # %r    In many contexts, mutt passes key IDs to pgp.  %r expands to
     27 #       a list of key IDs.
     28 
     29 # Note that we explicitly set the comment armor header since GnuPG, when used
     30 # in some localiaztion environments, generates 8bit data in that header, thereby
     31 # breaking PGP/MIME.
     32 
     33 # decode application/pgp
     34 set pgp_decode_command="gpg --status-fd=2 %?p?--passphrase-fd 0? --no-verbose --quiet --batch --output - '%f'"
     35 
     36 # verify a pgp/mime signature
     37 set pgp_verify_command="gpg --status-fd=2 --no-verbose --quiet --batch --output - --verify %s '%f'"
     38 
     39 # decrypt a pgp/mime attachment
     40 set pgp_decrypt_command="gpg --status-fd=2 %?p?--passphrase-fd 0? --no-verbose --quiet --batch --output - '%f'"
     41 
     42 # create a pgp/mime signed attachment
     43 set pgp_sign_command="gpg --no-verbose --batch --quiet --output - %?p?--passphrase-fd 0? --armor --detach-sign --textmode %?a?-u %a? '%f'"
     44 
     45 # create a application/pgp signed (old-style) message
     46 set pgp_clearsign_command="gpg --no-verbose --batch --quiet --output - %?p?--passphrase-fd 0? --armor --textmode --clearsign %?a?-u %a? '%f'"
     47 
     48 # create a pgp/mime encrypted attachment
     49 set pgp_encrypt_only_command="pgpewrap gpg --batch --quiet --no-verbose --output - --encrypt --textmode --armor --always-trust -- -r %r -- '%f'"
     50 
     51 # create a pgp/mime encrypted and signed attachment
     52 set pgp_encrypt_sign_command="pgpewrap gpg %?p?--passphrase-fd 0? --batch --quiet --no-verbose --textmode --output - --encrypt --sign %?a?-u %a? --armor --always-trust -- -r %r -- '%f'"
     53 
     54 # import a key into the public key ring
     55 set pgp_import_command="gpg --no-verbose --import '%f'"
     56 
     57 # export a key from the public key ring
     58 set pgp_export_command="gpg --no-verbose --export --armor %r"
     59 
     60 # verify a key
     61 set pgp_verify_key_command="gpg --verbose --batch --fingerprint --check-sigs %r"
     62 
     63 # read in the public key ring
     64 set pgp_list_pubring_command="gpg --no-verbose --batch --quiet --with-colons --list-keys %r" 
     65 
     66 # read in the secret key ring
     67 set pgp_list_secring_command="gpg --no-verbose --batch --quiet --with-colons --list-secret-keys %r" 
     68 
     69 # fetch keys
     70 # set pgp_getkeys_command="pkspxycwrap %r"
     71 
     72 # pattern for good signature - may need to be adapted to locale!
     73 
     74 # set pgp_good_sign="^gpgv?: Good signature from "
     75 
     76 # OK, here's a version which uses gnupg's message catalog:
     77 # set pgp_good_sign="`gettext -d gnupg -s 'Good signature from "' | tr -d '"'`"
     78 
     79 # This version uses --status-fd messages
     80 set pgp_good_sign="^\\[GNUPG:\\] GOODSIG"
     81