//! A command-line frontend for Sequoia. //! //! # Usage //! //! ```text //! A command-line frontend for Sequoia, an implementation of OpenPGP //! //! Functionality is grouped and available using subcommands. Currently, //! this interface is completely stateless. Therefore, you need to supply //! all configuration and certificates explicitly on each invocation. //! //! OpenPGP data can be provided in binary or ASCII armored form. This //! will be handled automatically. Emitted OpenPGP data is ASCII armored //! by default. //! //! We use the term "certificate", or cert for short, to refer to OpenPGP //! keys that do not contain secrets. Conversely, we use the term "key" //! to refer to OpenPGP keys that do contain secrets. //! //! USAGE: //! sq [FLAGS] [OPTIONS] //! //! FLAGS: //! -f, --force //! Overwrites existing files //! //! -h, --help //! Prints help information //! //! -V, --version //! Prints version information //! //! //! OPTIONS: //! --known-notation ... //! Adds NOTATION to the list of known notations. This is used when //! validating signatures. Signatures that have unknown notations with //! the critical bit set are considered invalid. //! //! SUBCOMMANDS: //! encrypt Encrypts a message //! decrypt Decrypts a message //! sign Signs messages or data files //! verify Verifies signed messages or detached signatures //! key Manages keys //! keyring Manages collections of keys or certs //! certify Certifies a User ID for a Certificate //! autocrypt Communicates certificates using Autocrypt //! keyserver Interacts with keyservers //! wkd Interacts with Web Key Directories //! armor Converts binary to ASCII //! dearmor Converts ASCII to binary //! inspect Inspects data, like file(1) //! packet Low-level packet manipulation //! revoke Generates revocation certificates //! help Prints this message or the help of the given subcommand(s) //! ``` //! //! ## Subcommand encrypt //! //! ```text //! Encrypts a message //! //! Encrypts a message for any number of recipients and with any number of //! passwords, optionally signing the message in the process. //! //! The converse operation is "sq decrypt". //! //! USAGE: //! sq encrypt [FLAGS] [OPTIONS] [--] [FILE] //! //! FLAGS: //! -B, --binary //! Emits binary data //! //! -h, --help //! Prints help information //! //! -s, --symmetric //! Adds a password to encrypt with. The message can be decrypted with //! either one of the recipient's keys, or any password. //! --use-expired-subkey //! If a certificate has only expired encryption-capable subkeys, falls //! back to using the one that expired last //! //! OPTIONS: //! --compression //! Selects compression scheme to use [default: pad] [possible values: //! none, pad, zip, zlib, bzip2] //! --mode //! Selects what kind of keys are considered for encryption. Transport //! select subkeys marked as suitable for transport encryption, rest //! selects those for encrypting data at rest, and all selects all //! encryption-capable subkeys. [default: all] [possible values: //! transport, rest, all] //! -o, --output //! Writes to FILE or stdout if omitted //! //! --private-key-store //! Provides parameters for private key store //! //! --recipient-cert ... //! Encrypts for all recipients in CERT-RING //! //! --signer-key ... //! Signs the message with KEY //! //! -t, --time