mutt stable branch with some hacks
1# -*-muttrc-*-
2#
3# PGP command formats for PGP 2.
4#
5# $Id$
6#
7
8#
9# Note: In order to be able to read your own messages, you'll have
10# the +encrypttoself command line parameter to the pgp_encrypt_only_command
11# and pgp_encrypt_sign_command variables.
12#
13
14# decode application/pgp
15set pgp_decode_command="%?p?PGPPASSFD=0; export PGPPASSFD;? cat %?p?-? %f | pgp +language=mutt +verbose=0 +batchmode -f"
16
17# verify a pgp/mime signature
18set pgp_verify_command="pgp +language=mutt +verbose=0 +batchmode -t %s %f"
19
20# decrypt a pgp/mime attachment
21set pgp_decrypt_command="PGPPASSFD=0; export PGPPASSFD; cat - %f | pgp +language=mutt +verbose=0 +batchmode -f"
22
23# create a pgp/mime signed attachment
24set pgp_sign_command="PGPPASSFD=0; export PGPPASSFD; cat - %f | pgp +language=mutt +verbose=0 +batchmode -abfst %?a? -u %a?"
25
26# create a pgp/mime encrypted attachment
27set pgp_encrypt_only_command="pgp +language=mutt +verbose=0 +batchmode -aeft %r < %f"
28
29# create a pgp/mime encrypted and signed attachment
30set pgp_encrypt_sign_command="PGPPASSFD=0; export PGPPASSFD; cat - %f | pgp +language=mutt +verbose=0 +batchmode -aefts %?a?-u %a? %r"
31
32# import a key into the public key ring
33set pgp_import_command="pgp -ka %f +language=mutt"
34
35# export a key from the public key ring
36set pgp_export_command="pgp -kxaf +language=mutt %r"
37
38# verify a key
39set pgp_verify_key_command="pgp -kcc +language=mutt %r"
40
41# read in the public key ring
42set pgp_list_pubring_command="pgpring -2 %r"
43
44# read in the secret key ring
45set pgp_list_secring_command="pgpring -s -2 %r"
46
47# pattern for good signature
48set pgp_good_sign="Good signature"