Introduction
Introduction Statistics Contact Development Disclaimer Help
gpg.rc - dotfiles - These are my dotfiles. There are many like it, but these ar…
git clone git://jay.scot/dotfiles
Log
Files
Refs
README
---
gpg.rc (4833B)
---
1 # -*-muttrc-*-
2 #
3 # Command formats for gpg.
4 #
5 # Some of the older commented-out versions of the commands use gpg-2comp…
6 # http://70t.de/download/gpg-2comp.tar.gz
7 #
8 # %p The empty string when no passphrase is needed,
9 # the string "PGPPASSFD=0" if one is needed.
10 #
11 # This is mostly used in conditional % sequences.
12 #
13 # %f Most PGP commands operate on a single file or a file
14 # containing a message. %f expands to this file's name.
15 #
16 # %s When verifying signatures, there is another temporary file
17 # containing the detached signature. %s expands to this
18 # file's name.
19 #
20 # %a In "signing" contexts, this expands to the value of the
21 # configuration variable $pgp_sign_as, if set, otherwise
22 # $pgp_default_key. You probably need to
23 # use this within a conditional % sequence.
24 #
25 # %r In many contexts, mutt passes key IDs to pgp. %r expands to
26 # a list of key IDs.
27
28
29 # Section A: Key Management
30
31 # The default key for encryption (used by $pgp_self_encrypt and
32 # $postpone_encrypt).
33 #
34 # It will also be used for signing unless $pgp_sign_as is set to a
35 # key.
36 #
37 # Unless your key does not have encryption capability, uncomment this
38 # line and replace the keyid with your own.
39 #
40 # set pgp_default_key="0x12345678"
41
42 # If you have a separate signing key, or your key _only_ has signing
43 # capability, uncomment this line and replace the keyid with your
44 # signing keyid.
45 #
46 # set pgp_sign_as="0x87654321"
47
48
49 # Section B: Commands
50
51 # Note that we explicitly set the comment armor header since GnuPG, when…
52 # in some localiaztion environments, generates 8bit data in that header,…
53 # breaking PGP/MIME.
54
55 # decode application/pgp
56 set pgp_decode_command="gpg --status-fd=2 %?p?--passphrase-fd 0? --no-ve…
57
58 # verify a pgp/mime signature
59 set pgp_verify_command="gpg --status-fd=2 --no-verbose --quiet --batch -…
60
61 # decrypt a pgp/mime attachment
62 set pgp_decrypt_command="gpg --status-fd=2 %?p?--passphrase-fd 0? --no-v…
63
64 # create a pgp/mime signed attachment
65 # set pgp_sign_command="gpg-2comp --comment '' --no-verbose --batch --ou…
66 set pgp_sign_command="gpg --no-verbose --batch --quiet --output - %?p?--…
67
68 # create a application/pgp signed (old-style) message
69 # set pgp_clearsign_command="gpg-2comp --comment '' --no-verbose --batch…
70 set pgp_clearsign_command="gpg --no-verbose --batch --quiet --output - %…
71
72 # create a pgp/mime encrypted attachment
73 # set pgp_encrypt_only_command="pgpewrap gpg-2comp -v --batch --output -…
74 set pgp_encrypt_only_command="pgpewrap gpg --batch --quiet --no-verbose …
75
76 # create a pgp/mime encrypted and signed attachment
77 # set pgp_encrypt_sign_command="pgpewrap gpg-2comp %?p?--passphrase-fd 0…
78 set pgp_encrypt_sign_command="pgpewrap gpg %?p?--passphrase-fd 0? --batc…
79
80 # import a key into the public key ring
81 set pgp_import_command="gpg --no-verbose --import %f"
82
83 # export a key from the public key ring
84 set pgp_export_command="gpg --no-verbose --export --armor %r"
85
86 # verify a key
87 set pgp_verify_key_command="gpg --verbose --batch --fingerprint --check-…
88
89 # read in the public key ring
90 # note: the second --with-fingerprint adds fingerprints to subkeys
91 set pgp_list_pubring_command="gpg --no-verbose --batch --quiet --with-co…
92
93 # read in the secret key ring
94 # note: the second --with-fingerprint adds fingerprints to subkeys
95 set pgp_list_secring_command="gpg --no-verbose --batch --quiet --with-co…
96
97 # fetch keys
98 # set pgp_getkeys_command="pkspxycwrap %r"
99
100 # pattern for good signature - may need to be adapted to locale!
101
102 # set pgp_good_sign="^gpgv?: Good signature from "
103
104 # OK, here's a version which uses gnupg's message catalog:
105 # set pgp_good_sign="`gettext -d gnupg -s 'Good signature from "' | tr -…
106
107 # This version uses --status-fd messages
108 set pgp_good_sign="^\\[GNUPG:\\] GOODSIG"
109
110 # pattern to verify a decryption occurred
111 # This is now deprecated by pgp_check_gpg_decrypt_status_fd:
112 # set pgp_decryption_okay="^\\[GNUPG:\\] DECRYPTION_OKAY"
113 set pgp_check_gpg_decrypt_status_fd
114
You are viewing proxied material from jay.scot. The copyright of proxied material belongs to its original authors. Any comments or complaints in relation to proxied material should be directed to the original authors of the content concerned. Please see the disclaimer for more details.