# $Id: mutt.gpg,v 1.1 2003/12/29 07:13:09 dope Exp dope $ # # %p Expands to PGPPASSFD=0 when a pass phrase is needed, to an empty # string otherwise. Note: This may be used with a %? construct. # %f Expands to the name of a file containing a message. # %s Expands to the name of a file containing the signature part # of a multipart/signed attachment when verifying it. # %a The value of $pgp_sign_as. # %r One or more key IDs. set pgp_sign_as=0x47E322CE set pgp_autoinline=yes unset crypt_autoencrypt set crypt_replysign set pgp_timeout=14400 set pgp_entry_format="%4n %t%f %[%y/%m/%d] %rl/0x%k %-4a %2c %u" set pgp_sort_keys=trust set pgp_good_sign="`gettext -d gnupg -s 'Good signature from "' | tr -d '="'`" macro generic "2" " set pgp_sign_as=0x47E322CE" # decode application/pgp set pgp_decode_command="/usr/bin/gpg %?p?--passphrase-fd 0? --no-verbose --batch --output - %f" # verify a pgp/mime signature set pgp_verify_command="/usr/bin/gpg --no-verbose --batch --output - --verify %s %f" # decrypt a pgp/mime attachment set pgp_decrypt_command="/usr/bin/gpg --passphrase-fd 0 --no-verbose --batch --output - %f" # create a pgp/mime signed attachment set pgp_sign_command="/usr/bin/gpg --no-verbose --batch --output - --passphrase-fd 0 --armor --detach-sign --textmode %?a?-u %a? %f" # create a application/pgp signed (old-style) message set pgp_clearsign_command="/usr/bin/gpg --no-verbose --batch --output - --passphrase-fd 0 --armor --textmode --clearsign %?a?-u %a? %f" # create a pgp/mime encrypted attachment set pgp_encrypt_only_command="pgpewrap gpg -v --batch --output - --encrypt --textmode --armor --always-trust -- -r %r -- %f" # create a pgp/mime encrypted and signed attachment set pgp_encrypt_sign_command="pgpewrap gpg --passphrase-fd 0 -v --batch --output - --encrypt --sign %?a?-u %a? --armor --always-trust -- -r %r -- %f" # import a key into the public key ring set pgp_import_command="/usr/bin/gpg --no-verbose --import -v %f" # export a key from the public key ring set pgp_export_command="/usr/bin/gpg --no-verbose --export --armor %r" # verify a key set pgp_verify_key_command="/usr/bin/gpg --no-verbose --batch --fingerprint --check-sigs %r" # read in the public key ring set pgp_list_pubring_command="/usr/bin/gpg --no-verbose --batch --with-colons --list-keys %r"=20 # read in the secret key ring set pgp_list_secring_command="/usr/bin/gpg --no-verbose --batch --with-colons --list-secret-keys %r"=20 # receive key from keyserver: set pgp_getkeys_command="/usr/bin/gpg --recv-keys %r >/dev/null 2>&1"