mirror of
				git://git.code.sf.net/p/zsh/code
				synced 2025-10-30 17:50:58 +01:00 
			
		
		
		
	
		
			
				
	
	
		
			282 lines
		
	
	
	
		
			14 KiB
		
	
	
	
		
			Text
		
	
	
	
	
	
			
		
		
	
	
			282 lines
		
	
	
	
		
			14 KiB
		
	
	
	
		
			Text
		
	
	
	
	
	
| #compdef gpg gpgv gpg-zip gpg2=gpg
 | |
| 
 | |
| local curcontext="$curcontext" state line expl ret=1
 | |
| local -a args allopts dups extra
 | |
| typeset -A opt_args
 | |
| 
 | |
| if [[ $service = gpg-zip ]]; then
 | |
|   args=(
 | |
|     '--gpg[command to use instead of gpg]:command:_command'
 | |
|     '--gpg-args[gpg arguments]:gpg arguments:'
 | |
|     '--tar[command to use instead of tar]:command:_command'
 | |
|     '--tar-args[tar arguments]:tar arguments:'
 | |
|     '--list-archive[list archive contents]'
 | |
|   )
 | |
| else
 | |
|   allopts=( $(_call_program options $words[1] --dump-options) )
 | |
|   args=(
 | |
|     '(-q --quiet)*'{-v,--verbose}'[increase amount of output]'
 | |
|     '(-q --quiet -v --verbose)'{-q,--quiet}'[reduce amount of output]'
 | |
|     '--keyring=[add specified file to list of keyrings]:file:_files'
 | |
|     '--'{status,logger}'-fd:file descriptor:_file_descriptors'
 | |
|     '--homedir:directory:_directories'
 | |
|   )
 | |
| fi
 | |
| 
 | |
| [[ $service = gpgv ]] || args+=(
 | |
|   '(-e --encrypt)'{-e,--encrypt}'[encrypt data. this option may be combined  with --sign]'
 | |
|   {-d,--decrypt}'[decrypt file or stdin]'
 | |
|   '(-c --symmetric)'{-c,--symmetric}'[encrypt with symmetric cipher only]'
 | |
|   '(-s --sign)'{-s,--sign}'[make a signature]'
 | |
|   '*'{-r+,--recipient}'[specify user to encrypt for]:recipient:->public-keys'
 | |
|   '(-u --local-user)'{-u+,--local-user}'[use name as the user ID to sign]:user attachment:_users'
 | |
|   '(-o --output)'{-o+,--output}'[write output to file]:output file:_files'
 | |
|   '(-h --help)'{-h,--help}'[display usage information]'
 | |
|   '--version[print info on program version and supported algorithms]'
 | |
| )
 | |
| 
 | |
| [[ $service = gpg ]] && args+=(
 | |
|   '--decrypt-files[decrypt multiple files]'
 | |
|   '(-b --detach-sign)'{-b,--detach-sign}'[make a detached signature]'
 | |
|   --clear{,-}sign'[make a clear text signature]'
 | |
|   '--store[store only]'
 | |
|   '--verify[verify a signature]'
 | |
|   '--verify-files[verify a list of files]'
 | |
|   '(-f --encrypt-files)'{-f,--encrypt-files}'[encrypt files]'
 | |
|   '(-k --list-keys)'{-k,--list-keys}'[list all keys]'
 | |
|   '--list-public-keys[list all public keys]'
 | |
|   '(-K --list-secret-keys)'{-K,--list-secret-keys}'[list all secret keys]'
 | |
|   --list-sig{,nature}s'[lists keys and signatures]:key attachment:->public-keys'
 | |
|   '--list-options[modify what the various --list-* commands show]: :->option-list'
 | |
|   --check-sig{,nature}s'[list key, signatures and check them]:key attachment:->public-keys'
 | |
|   '--fingerprint[list all keys with their fingerprints]:key attachment:->public-keys'
 | |
|   '--list-packets[list only the sequence of packets]'
 | |
|   '--gen-key[generate a new pair key]'
 | |
|   '--edit-key[interactively edit a key]:key attachment:->public-keys'
 | |
|   '--sign-key[sign a key]:key attachment:->public-keys'
 | |
|   '--lsign-key[sign a key but mark as non-exportable]:key attachment:->public-keys'
 | |
|   '--delete-keys[remove key from public keyring]:key attachment:->public-keys'
 | |
|   '--delete-secret-keys[remove key from public & private keyring]:key attachment:->secret-keys'
 | |
|   '--delete-secret-and-public-keys:key attachment:->secret-keys'
 | |
|   '--gen-revoke[generate a revocation certificate]'
 | |
|   '--desig-revoke[generate a designated revocation certificate]'
 | |
|   '--passwd[change a passphrase]'
 | |
|   '--export[export all keys from all keyrings]'
 | |
|   '--send-keys[send keys to a keyserver]:key attachment:->public-keyids'
 | |
|   '--export-secret-keys:key attachment:->secret-keys'
 | |
|   '--export-secret-subkeys:key attachment:->secret-keys'
 | |
|   '--import[import a gpg key from a file]:attachment (file):_files'
 | |
|   '--fast-import[import a file without adding to trustdb]:attachment (file):_files'
 | |
|   '--fetch-keys[fetch key at URIs]:uri:'
 | |
|   --rec{eive,v}-keys'[receive a list of keys from a keyserver]:key attachment:->public-keyids'
 | |
|   '--refresh-keys[update all keys from a keyserver]'
 | |
|   '--search-keys[search for keys on a key server]'
 | |
|   '--update-trustdb[update the trust database]'
 | |
|   '--check-trustdb[unattended trust database update]'
 | |
|   '--fix-trustdb[fix a corrupted trust database]'
 | |
|   '--export-ownertrust[list the assigned ownertrust values in ASCII format]:file:_files'
 | |
|   '--import-ownertrust[update the trustdb with a file]:file:_files'
 | |
|   '--dearmor[de-Armor a file or stdin]'
 | |
|   '--enarmor[en-Armor a file or stdin]'
 | |
|   '--print-md[print message digests]:algorithm:->ciphers::file:_files'
 | |
|   '--print-mds[print message digests]::file:_files'
 | |
|   '--tofu-policy:policy:(good unknown bad ask auto):*:keys:->public-keys'
 | |
|   '--tofu-default-policy:policy:(good unknown bad ask auto)'
 | |
|   '--quick-generate-key:user-id: :algorithm:(default future-default rsa dsa elg ed25519 cv25519): : _values -s , usage - default sign auth encr::expiration'
 | |
|   '--quick-add-key:fingerprint: :algorithm:(default future-default rsa dsa elg ed25519 cv25519): : _values -s , usage - default sign auth encr::expiration'
 | |
|   '--gen-random:quality level:(0 1 2):count (bytes)' '--gen-prime'
 | |
|   '--warranty[print warranty info]'
 | |
|   '(-a --armor)'{-a,--armor}'[create ASCII armored output]'
 | |
|   '--default-key[specify default user ID for signatures]:key:->secret-keys'
 | |
|   '--default-recipient[specify default recipient]:recipient:->public-keys'
 | |
|   '--default-recipient-self[use default key as default recipient]'
 | |
|   '--no-default-recipient[reset default recipient]'
 | |
|   '*--encrypt-to[specify recipient]:key:->public-keys'
 | |
|   '(--encrypt-to)--no-encrypt-to[disable the use of all --encrypt-to keys]'
 | |
|   '-z[specify compression level]:compression level:((0\:no\ compression 1\:minimum 2 3 4 5 6\:default 7 8 9\:maximum))'
 | |
|   '(-t --textmode)'{-t,--textmode}'[use canonical text mode]'
 | |
|   '(-n --dry-run)'{-n,--dry-run}"[don't make any changes]"
 | |
|   '(-i --interactive --batch)'{-i,--interactive}'[prompt before overwriting files]'
 | |
|   '(-i --interactive --no-batch)--batch[use batch mode]'
 | |
|   '--no-tty[never output to tty]'
 | |
|   '(--batch)--no-batch[disable batch mode]'
 | |
|   '(--no)--yes[assume "yes" on most questions]'
 | |
|   '(--yes)--no[assume "no" on most questions]'
 | |
|   '--default-cert-check-level:check level:((0\:no\ claim 1\:no\ verification 2\:casual\ verification 3\:extensive\ verification))'
 | |
|   '--trusted-key[assume that the specified key is trustworthy]:long key id'
 | |
|   '--always-trust[skip key validation]'
 | |
|   '--keyserver[specify key server to use]:key server:_hosts'
 | |
|   '--keyserver-options[specify keyserver options]:options'
 | |
|   '--import-options[specify options for importing keys]:options'
 | |
|   '--export-options[specify options for exporting keys]:options'
 | |
|   '--photo-viewer:command:_command_names -e'
 | |
|   '--exec-path:path:_dir_list'
 | |
|   '--show-keyring[display keyring name when listing keys]'
 | |
|   '--secret-keyring[add specified file to list of secret keyrings]:file:_files'
 | |
|   '--charset:character set:(iso-8859-1 iso-8859-2 koi8-r utf-8)'
 | |
|   '--utf8-strings' '--no-utf8-strings[arguments are not in UTF8]'
 | |
|   '(--no-options)--options[specify file to read options from]:options file:_files'
 | |
|   "(--options)--no-options[don't read options file]"
 | |
|   '--'{attribute,passphrase,command}'-fd:file descriptor:_file_descriptors'
 | |
|   '--sk-comments[include secret key comments when exporting keys]'
 | |
|   '(--emit-version)--no-emit-version[omit version string in clear text signatures]'
 | |
|   '(--no-emit-version)--emit-version[force writing of version string in clear text signatures]'
 | |
|   '(-N --notation-data)'{-N,--notation-data}'[put parameter in signature]:name=value'
 | |
|   '(--no-show-notation)--show-notation[show key signature notations]'
 | |
|   "(--show-notation)--no-show-notation[don't show key signature notations]"
 | |
|   '--set-policy-url:policy URL'
 | |
|   '--set-filename[specify file which is stored in messages]:file:_files'
 | |
|   '--completes-needed:number' '--marginals-needed:number' '--max-cert-depth:number'
 | |
|   '--'{{,disable-,s2k-}cipher,{,s2k-,cert-}digest,disable-pubkey}'-algo:cipher:->ciphers'
 | |
|   '--s2k-mode:value'
 | |
|   '--compress-algo:compression algorithm:((0\:disable\ compression 1\:zlib 2\:rfc1950))'
 | |
|   '--personal-'{cipher,digest,compress}'-preferences:string'
 | |
|   --{card-edit,edit-card}'[present smartcard menu]' '--card-status[show smartcard content]'
 | |
|   '--change-pin[present menu to change smartcard pin]'
 | |
|   '--list-config[display internal configuration parameters]'
 | |
|   '--hidden-recipient[hidden recipient]:recipient:->public-keys'
 | |
|   '--default-preference-list:string'
 | |
|   '--fetch-keys:URIs'
 | |
|   '--hidden-encrypt-to:recipient:->public-keys'
 | |
|   '--compress-level:integer'
 | |
|   '--bzip2-compress-level:integer'
 | |
|   '--default-cert-level:integer'
 | |
|   '--max-output[maximum output generated when processing file]:bytes:'
 | |
|   '--gpg-agent-info[override GPG_AGENT_INFO]:'
 | |
|   '--primary-keyring:file:_files'
 | |
|   '--verify-options: :->verify-options'
 | |
|   '--debug:flags:' '--status-file:file:_files'
 | |
|   '--attribute-file:file:_files' '--load-extension:file:_files'
 | |
|   '--s2k-count:integer'
 | |
|   '--sig-notation:name=value:' '--cert-notation:name=value:'
 | |
|   '--passphrase-file:file:_files' '--passphrase-repeat:integer:'
 | |
|   '--command-file:file:_files' '--trustdb-name:file:_files'
 | |
|   '--trust-model:trust model:(pgp classic tofu tofu+pgp direct always auto)'
 | |
|   '--sig-policy-url:string:' '--cert-policy-url:string:'
 | |
|   '--sig-keyserver-url:string:' '--comment[comment]:comment:'
 | |
|   '--no-comments[disable comments]'
 | |
|   '--logger-file[write log to file]:file:_files'
 | |
|   '--rebuild-keydb-caches[create signature caches in keyring]'
 | |
|   '--default-keyserver-url:name:'
 | |
|   '--display-charset[set native charset]:charset:((iso-8859-1 iso-8859-2 iso-8859-15 koi8-r utf-8))'
 | |
|   '--ungroup[remove group]:group name:'
 | |
|   '--no-groups[remove all entries from --group list]'
 | |
|   '--enable-progress-filter[enable progress status output]'
 | |
|   '--multifile[process multiple files]'
 | |
|   '--keyid-format[key id format]:key format:((short 0xshort long 0xlong))'
 | |
|   '--exit-on-status-write-error[exit immediately on error write]'
 | |
|   '--limit-card-insert-tries:integer'
 | |
|   '--reader-port[card reader port]:port'
 | |
|   '--ctapi-driver[file to use to access smartcard reader]:file:_files'
 | |
|   '--pcsc-driver[file to use to access smartcard reader]:file:_files'
 | |
|   '--auto-key-locate:parameters'
 | |
|   '--dump-options[show all options]'
 | |
| )
 | |
| 
 | |
| extra=( ${${${args#\([^\)]#\)}#\*}%%[=:\[]*} )
 | |
| extra=( ${allopts:|extra} )
 | |
| _arguments -C -s -S -A "-*" $args $extra '*:args:->args' && ret=0
 | |
| 
 | |
| if [[ $state = args ]]; then
 | |
|   if (( ${+opt_args[--export]} || ${+opt_args[-k]} || ${+opt_args[--list-keys]} || ${+opt_args[--list-public-keys]} )); then
 | |
|     state=public-keys
 | |
|   elif (( ${+opt_args[--list-secret-keys]} )); then
 | |
|     state=secret-keys
 | |
|   else
 | |
|     _files && return
 | |
|   fi
 | |
| fi
 | |
| 
 | |
| # We need to keep some arguments to get a consistent list of keys
 | |
| # etc.
 | |
| local -a needed
 | |
| integer krind=${words[(I)--keyring(|=*)]}
 | |
| needed=(${words[(r)--no-default-keyring]})
 | |
| if (( krind )); then
 | |
|   # We have a --keyring option.  We can't be completing its
 | |
|   # argument because that was handled above, so it must be complete.
 | |
|   if [[ $words[krind] = --keyring ]]; then
 | |
|     if [[ -n $words[krind+1] ]]; then
 | |
|       needed+=(--keyring=$words[krind+1])
 | |
|     fi
 | |
|   else
 | |
|     needed+=($words[krind])
 | |
|   fi
 | |
| fi
 | |
| 
 | |
| case "$state" in
 | |
|   public-keys)
 | |
|     local public_keys_lines=(${(f)"$(_call_program public-keys ${(q)words[1]} ${(q)needed} --list-public-keys --list-options no-show-photos --with-colons)"})
 | |
|     local -a uids emails
 | |
|     local i j parts current_uid
 | |
|     for (( i = 1; i < ${#public_keys_lines[@]}; ++i )); do
 | |
|       parts=("${(@s.:.)public_keys_lines[$i]}")
 | |
|       if [[ ${parts[1]} == "fpr" ]]; then
 | |
|         current_uid="${parts[10]}"
 | |
|         i=$((i + 1))
 | |
|         parts=("${(@s.:.)public_keys_lines[$i]}")
 | |
|         while [[ ${parts[1]} == "uid" ]]; do
 | |
|           uids+=("${current_uid}")
 | |
|           emails+=("${parts[10]}")
 | |
|           i=$((i + 1))
 | |
|           parts=("${(@s.:.)public_keys_lines[$i]}")
 | |
|         done
 | |
|       fi
 | |
|     done
 | |
|     _describe -t public-keys 'public key' emails uids
 | |
|   ;;
 | |
|   secret-keys)
 | |
|     local secret_keys_lines=(${(f)"$(_call_program secret-keys ${(q)words[1]} ${(q)needed} --list-secret-keys --list-options no-show-photos --with-colons)"})
 | |
|     local -a uids emails
 | |
|     local i j parts current_uid
 | |
|     for (( i = 1; i < ${#secret_keys_lines[@]}; ++i )); do
 | |
|       parts=("${(@s.:.)secret_keys_lines[$i]}")
 | |
|       if [[ ${parts[1]} == "fpr" ]]; then
 | |
|         current_uid="${parts[10]}"
 | |
|         i=$((i + 1))
 | |
|         parts=("${(@s.:.)secret_keys_lines[$i]}")
 | |
|         while [[ ${parts[1]} == "uid" ]]; do
 | |
|           uids+=("${current_uid}")
 | |
|           emails+=("${parts[10]}")
 | |
|           i=$((i + 1))
 | |
|           parts=("${(@s.:.)secret_keys_lines[$i]}")
 | |
|         done
 | |
|       fi
 | |
|     done
 | |
|     _describe -t secret-keys 'secret key' emails uids
 | |
|   ;;
 | |
|   ciphers)
 | |
|     _wanted ciphers expl cipher compadd \
 | |
|         ${${(s.,.)${(M)${(f)${"$(_call_program ciphers ${(q)words[1]} ${(q)needed} --version)"}//,$'\n' #/, }:#Cipher*}#*:}# } && return
 | |
|   ;;
 | |
|   (public-keyids)
 | |
|     local public_keys_lines=(${(f)"$(_call_program public-keyids ${(q)words[1]} ${(q)needed} --list-public-keys --list-options no-show-photos --with-colons)"})
 | |
|     local -a uids emails
 | |
|     local i j parts current_uid
 | |
|     for (( i = 1; i < ${#public_keys_lines[@]}; ++i )); do
 | |
|       parts=("${(@s.:.)public_keys_lines[$i]}")
 | |
|       if [[ ${parts[1]} == "fpr" ]]; then
 | |
|         current_uid="${parts[10]}"
 | |
|         i=$((i + 1))
 | |
|         parts=("${(@s.:.)public_keys_lines[$i]}")
 | |
|         while [[ ${parts[1]} == "uid" ]]; do
 | |
|           uids+=("${current_uid}")
 | |
|           emails+=("${parts[10]}")
 | |
|           i=$((i + 1))
 | |
|           parts=("${(@s.:.)public_keys_lines[$i]}")
 | |
|         done
 | |
|       fi
 | |
|     done
 | |
|     _describe -t public-keyids 'public key' emails uids
 | |
|   ;;
 | |
|   (option-list)
 | |
|     _sequence _wanted options expl option \
 | |
|         compadd - {no-,}show-{photos,usage,policy-urls,{std,user}-notations,keyserver-urls,uid-validity,unusable-{uids,subkeys},keyring,sig-{expire,subpackets}} && return
 | |
|   ;;
 | |
|   (verify-options)
 | |
|     _sequence _wanted options expl option \
 | |
|         compadd - {no-,}show-{photos,policy-urls,{std,user}-notations,keyserver-urls,uid-validity,unusable-uids,primary-uid-only} {no-,}pka-{lookups,trust-increase} && return
 | |
|   ;;
 | |
| esac
 | |
| 
 | |
| return ret
 |