.mutt/gpg2.rc

changeset 315
4f39f5f13418
child 319
c8183f797981
equal deleted inserted replaced
314:1028fece0d41 315:4f39f5f13418
1
2 set pgp_use_gpg_agent=yes
3
4 # decode application/pgp
5 set pgp_decode_command="gpg2 --status-fd=2 %?p?--passphrase-fd 0? --no-verbose --quiet --batch --output - %f"
6
7 # verify a pgp/mime signature
8 set pgp_verify_command="gpg2 --status-fd=2 --no-verbose --quiet --batch --output - --verify %s %f"
9
10 # decrypt a pgp/mime attachment
11 set pgp_decrypt_command="gpg2 --status-fd=2 %?p?--passphrase-fd 0? --no-verbose --quiet --batch --output - %f"
12
13 # create a pgp/mime signed attachment
14 set pgp_sign_command="gpg2 --no-verbose --batch --quiet --output - %?p?--passphrase-fd 0? --armor --detach-sign --textmode %?a?-u %a? %f"
15
16 # create a application/pgp signed (old-style) message
17 set pgp_clearsign_command="gpg2 --no-verbose --batch --quiet --output - %?p?--passphrase-fd 0? --armor --textmode --clearsign %?a?-u %a? %f"
18
19 # create a pgp/mime encrypted attachment
20 set pgp_encrypt_only_command="pgpewrap gpg2 --batch --quiet --no-verbose --output - --encrypt --textmode --armor --always-trust -- -r %r -- %f"
21
22 # create a pgp/mime encrypted and signed attachment
23 set pgp_encrypt_sign_command="pgpewrap gpg2 %?p?--passphrase-fd 0? --batch --quiet --no-verbose --textmode --output - --encrypt --sign %?a?-u %a? --armor --always-trust -- -r %r -- %f"
24
25 # import a key into the public key ring
26 set pgp_import_command="gpg2 --no-verbose --import %f"
27
28 # export a key from the public key ring
29 set pgp_export_command="gpg2 --no-verbose --export --armor %r"
30
31 # verify a key
32 set pgp_verify_key_command="gpg2 --verbose --batch --fingerprint --check-sigs %r"
33
34 # read in the public key ring
35 set pgp_list_pubring_command="gpg2 --no-verbose --batch --quiet --with-colons --with-fingerprint --with-fingerprint --list-keys %r"
36
37 # read in the secret key ring
38 set pgp_list_secring_command="gpg2 --no-verbose --batch --quiet --with-colons --with-fingerprint --with-fingerprint --list-secret-keys %r"
39
40 # fetch keys
41 set pgp_getkeys_command="gpg2 --recv-keys %r"
42
43 # pattern for good signature
44 # This version uses --status-fd messages
45 set pgp_good_sign="^\\[GNUPG:\\] GOODSIG"
46
47 # pattern to verify a decryption occurred
48 set pgp_decryption_okay="^\\[GNUPG:\\] DECRYPTION_OKAY"
49

mercurial