summaryrefslogtreecommitdiffstats
path: root/contrib/pgp2.rc
blob: bd66cf10e80bac480101056379a30793f2003a05 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
# -*-muttrc-*-
#
# PGP command formats for PGP 2.
#
# $Id$
#

#
# Note: In order to be able to read your own messages, you'll have
# the +encrypttoself command line parameter to the pgp_encrypt_only_command
# and pgp_encrypt_sign_command variables.
#

# decode application/pgp
set pgp_decode_command="%?p?PGPPASSFD=0; export PGPPASSFD;? cat %?p?-? %f | pgp +language=mutt +verbose=0 +batchmode -f"

# verify a pgp/mime signature
set pgp_verify_command="pgp +language=mutt +verbose=0 +batchmode -t %s %f"

# decrypt a pgp/mime attachment
set pgp_decrypt_command="PGPPASSFD=0; export PGPPASSFD; cat - %f | pgp +language=mutt +verbose=0 +batchmode -f"

# create a pgp/mime signed attachment
set pgp_sign_command="PGPPASSFD=0; export PGPPASSFD; cat - %f | pgp +language=mutt +verbose=0 +batchmode -abfst %?a? -u %a?"

# create a pgp/mime encrypted attachment
set pgp_encrypt_only_command="pgp +language=mutt +verbose=0 +batchmode -aeft %r < %f"

# create a pgp/mime encrypted and signed attachment
set pgp_encrypt_sign_command="PGPPASSFD=0; export PGPPASSFD; cat - %f | pgp +language=mutt +verbose=0 +batchmode -aefts %?a?-u %a? %r"

# import a key into the public key ring
set pgp_import_command="pgp -ka %f +language=mutt"

# export a key from the public key ring
set pgp_export_command="pgp -kxaf +language=mutt %r"

# verify a key
set pgp_verify_key_command="pgp -kcc +language=mutt %r"

# read in the public key ring
set pgp_list_pubring_command="pgpring -2 %r"

# read in the secret key ring
set pgp_list_secring_command="pgpring -s -2 %r"

# pattern for good signature
set pgp_good_sign="Good signature"