//! A command-line frontend for Sequoia. //! //! # Usage //! //! ```text //! A command-line frontend for Sequoia, an implementation of OpenPGP //! //! Functionality is grouped and available using subcommands. Currently, //! this interface is completely stateless. Therefore, you need to supply //! all configuration and certificates explicitly on each invocation. //! //! OpenPGP data can be provided in binary or ASCII armored form. This //! will be handled automatically. Emitted OpenPGP data is ASCII armored //! by default. //! //! We use the term "certificate", or cert for short, to refer to OpenPGP //! keys that do not contain secrets. Conversely, we use the term "key" //! to refer to OpenPGP keys that do contain secrets. //! //! USAGE: //! sq [OPTIONS] //! //! OPTIONS: //! -f, --force //! Overwrites existing files //! //! -h, --help //! Print help information //! //! --known-notation //! Adds NOTATION to the list of known notations. This is used when //! validating signatures. Signatures that have unknown notations with //! the critical bit set are considered invalid. //! //! -V, --version //! Print version information //! //! SUBCOMMANDS: //! encrypt //! Encrypts a message //! decrypt //! Decrypts a message //! sign //! Signs messages or data files //! verify //! Verifies signed messages or detached signatures //! key //! Manages keys //! keyring //! Manages collections of keys or certs //! certify //! Certifies a User ID for a Certificate //! autocrypt //! Communicates certificates using Autocrypt //! keyserver //! Interacts with keyservers //! wkd //! Interacts with Web Key Directories //! armor //! Converts binary to ASCII //! dearmor //! Converts ASCII to binary //! inspect //! Inspects data, like file(1) //! packet //! Low-level packet manipulation //! revoke //! Generates revocation certificates //! help //! Print this message or the help of the given subcommand(s) //! ``` //! //! ## Subcommand encrypt //! //! ```text //! Encrypts a message //! //! Encrypts a message for any number of recipients and with any number of //! passwords, optionally signing the message in the process. //! //! The converse operation is "sq decrypt". //! //! USAGE: //! sq encrypt [OPTIONS] [FILE] //! //! ARGS: //! //! Reads from FILE or stdin if omitted //! //! OPTIONS: //! -B, --binary //! Emits binary data //! //! --compression //! Selects compression scheme to use //! //! [default: pad] //! [possible values: none, pad, zip, zlib, bzip2] //! //! -h, --help //! Print help information //! //! --mode //! Selects what kind of keys are considered for encryption. Transport //! select subkeys marked as suitable for transport encryption, rest //! selects those for encrypting data at rest, and all selects all //! encryption-capable subkeys. //! //! [default: all] //! [possible values: transport, rest, all] //! //! -o, --output //! Writes to FILE or stdout if omitted //! //! --private-key-store //! Provides parameters for private key store //! //! --recipient-cert //! Encrypts for all recipients in CERT-RING //! //! -s, --symmetric //! Adds a password to encrypt with. The message can be decrypted with //! either one of the recipient's keys, or any password. //! //! --signer-key //! Signs the message with KEY //! //! -t, --time