/mutt.spec:22:# pgpewrap.c setenv.c sha1.c wcwidth.c which are Public Domain /mutt.spec:188:- fix md5 on big-endian systems /mutt.spec:191:- replace md5 implementation /mutt.spec:258:- rebuild against new ssl libs /mutt.spec:267:- rebuild against new openssl /mutt.spec:342:- forcibly enable SSL and GSSAPI support /mutt.spec:414:- enable SSL support /mutt.spec:433:- fix MD5 code /mutt-1.5.19/hdrline.c:644: else if (WithCrypto && hdr->security & ENCRYPT) /mutt-1.5.19/rfc822.c:795:/* incomplete. Only used to thwart the APOP MD5 attack (#2846). */ /mutt-1.5.19/postpone.c:424: flags |= ENCRYPT; /mutt-1.5.19/postpone.c:482: mutt_error _("Illegal S/MIME header"); /mutt-1.5.19/postpone.c:552: /* decrypt pgp/mime encoded messages */ /mutt-1.5.19/postpone.c:558: newhdr->security |= ENCRYPT | ccap; /mutt-1.5.19/postpone.c:563: if (((ccap & APPLICATION_PGP) && crypt_pgp_decrypt_mime (fp, &bfp, newhdr->content, &b) == -1) /mutt-1.5.19/postpone.c:564: || ((ccap & APPLICATION_SMIME) && crypt_smime_decrypt_mime (fp, &bfp, newhdr->content, &b) == -1) /mutt-1.5.19/postpone.c:590: && ascii_strcasecmp (mutt_get_parameter ("protocol", newhdr->content->parameter), "application/pgp-signature") == 0) /mutt-1.5.19/postpone.c:595: /* destroy the signature */ /mutt-1.5.19/postpone.c:659: && (mutt_is_application_pgp (b) & (ENCRYPT|SIGN))) /mutt-1.5.19/sendlib.c:1257: (hdr->security & ENCRYPT)) { /mutt-1.5.19/sendlib.c:1292: && option (OPTFORWDECRYPT) && (hdr->security & ENCRYPT)) /mutt-1.5.19/sendlib.c:2535: if (hdr->security & ENCRYPT) /mutt-1.5.19/sendlib.c:2553: if (hdr->security & ENCRYPT) { /mutt-1.5.19/color.c:80: { "signature", MT_COLOR_SIGNATURE }, /mutt-1.5.19/crypt-gpgme.h:30:BODY *pgp_gpgme_encrypt_message (BODY *a, char *keylist, int sign); /mutt-1.5.19/crypt-gpgme.h:33:int pgp_gpgme_decrypt_mime (FILE *fpin, FILE **fpout, BODY *b, BODY **cur); /mutt-1.5.19/crypt-gpgme.h:34:int smime_gpgme_decrypt_mime (FILE *fpin, FILE **fpout, BODY *b, BODY **cur); /mutt-1.5.19/pgplib.h:25:typedef struct pgp_signature /mutt-1.5.19/pgplib.h:27: struct pgp_signature *next; /mutt-1.5.19/pgplib.h:44: struct pgp_signature *sigs; /mutt-1.5.19/pgplib.h:48: * 20 for sha-1, 16 for md5. /mutt-1.5.19/pgplib.h:50: unsigned char fingerprint[20]; /* large enough to hold SHA-1 and RIPEMD160 /mutt-1.5.19/pgplib.h:51: hashes (20 bytes), MD5 hashes just use the /mutt-1.5.19/pgplib.h:63: struct pgp_signature *sigs; /mutt-1.5.19/doc/Muttrc.head:71:## I've added x-pkcs7 to this, since it functions (for S/MIME) /mutt-1.5.19/doc/Muttrc.head:72:## analogously to PGP signature attachments. S/MIME isn't supported /mutt-1.5.19/doc/reference.html:24:

Chapter 8. Reference

Table of Contents

1. Command line options
2. Configuration Commands
3. Configuration variables
3.1. abort_nosubject
3.2. abort_unmodified
3.3. alias_file
3.4. alias_format
3.5. allow_8bit
3.6. allow_ansi
3.7. arrow_cursor
3.8. ascii_chars
3.9. askbcc
3.10. askcc
3.11. assumed_charset
3.12. attach_charset
3.13. attach_format
3.14. attach_sep
3.15. attach_split
3.16. attribution
3.17. autoedit
3.18. auto_tag
3.19. beep
3.20. beep_new
3.21. bounce
3.22. bounce_delivered
3.23. braille_friendly
3.24. check_mbox_size
3.25. charset
3.26. check_new
3.27. collapse_unread
3.28. uncollapse_jump
3.29. compose_format
3.30. config_charset
3.31. confirmappend
3.32. confirmcreate
3.33. connect_timeout
3.34. content_type
3.35. copy
3.36. crypt_use_gpgme
3.37. crypt_use_pka
3.38. crypt_autopgp
3.39. crypt_autosmime
3.40. date_format
3.41. default_hook
3.42. delete
3.43. delete_untag
3.44. digest_collapse
3.45. display_filter
3.46. dotlock_program
3.47. dsn_notify
3.48. dsn_return
3.49. duplicate_threads
3.50. edit_headers
3.51. editor
3.52. encode_from
3.53. envelope_from_address
3.54. escape
3.55. fast_reply
3.56. fcc_attach
3.57. fcc_clear
3.58. folder
3.59. folder_format
3.60. followup_to
3.61. force_name
3.62. forward_decode
3.63. forward_edit
3.64. forward_format
3.65. forward_quote
3.66. from
3.67. gecos_mask
3.68. hdrs
3.69. header
3.70. help
3.71. hidden_host
3.72. hide_limited
3.73. hide_missing
3.74. hide_thread_subject
3.75. hide_top_limited
3.76. hide_top_missing
3.77. history
3.78. history_file
3.79. honor_followup_to
3.80. hostname
3.81. ignore_linear_white_space
3.82. ignore_list_reply_to
3.83. imap_authenticators
3.84. imap_check_subscribed
3.85. imap_delim_chars
3.86. imap_headers
3.87. imap_idle
3.88. imap_keepalive
3.89. imap_list_subscribed
3.90. imap_login
3.91. imap_pass
3.92. imap_passive
3.93. imap_peek
3.94. imap_pipeline_depth
3.95. imap_servernoise
3.96. imap_user
3.97. implicit_autoview
3.98. include
3.99. include_onlyfirst
3.100. indent_string
3.101. index_format
3.102. ispell
3.103. keep_flagged
3.104. locale
3.105. mail_check
3.106. mailcap_path
3.107. mailcap_sanitize
3.108. header_cache
3.109. maildir_header_cache_verify
3.110. header_cache_pagesize
3.111. header_cache_compress
3.112. maildir_trash
3.113. mark_old
3.114. markers
3.115. mask
3.116. mbox
3.117. mbox_type
3.118. metoo
3.119. menu_context
3.120. menu_move_off
3.121. menu_scroll
3.122. meta_key
3.123. mh_purge
3.124. mh_seq_flagged
3.125. mh_seq_replied
3.126. mh_seq_unseen
3.127. mime_forward
3.128. mime_forward_decode
3.129. mime_forward_rest
3.130. mix_entry_format
3.131. mixmaster
3.132. move
3.133. message_cachedir
3.134. message_cache_clean
3.135. message_format
3.136. narrow_tree
3.137. net_inc
3.138. pager
3.139. pager_context
3.140. pager_format
3.141. pager_index_lines
3.142. pager_stop
3.143. crypt_autosign
3.144. crypt_autoencrypt
3.145. pgp_ignore_subkeys
3.146. crypt_replyencrypt
3.147. crypt_replysign
3.148. crypt_replysignencrypted
3.149. crypt_timestamp
3.150. pgp_use_gpg_agent
3.151. crypt_verify_sig
3.152. smime_is_default
3.153. smime_ask_cert_label
3.154. smime_decrypt_use_default_key
3.155. pgp_entry_format
3.156. pgp_good_sign
3.157. pgp_check_exit
3.158. pgp_long_ids
3.159. pgp_retainable_sigs
3.160. pgp_autoinline
3.161. pgp_replyinline
3.162. pgp_show_unusable
3.163. pgp_sign_as
3.164. pgp_strict_enc
3.165. pgp_timeout
3.166. pgp_sort_keys
3.167. pgp_mime_auto
3.168. pgp_auto_decode
3.169. pgp_decode_command
3.170. pgp_getkeys_command
3.171. pgp_verify_command
3.172. pgp_decrypt_command
3.173. pgp_clearsign_command
3.174. pgp_sign_command
3.175. pgp_encrypt_sign_command
3.176. pgp_encrypt_only_command
3.177. pgp_import_command
3.178. pgp_export_command
3.179. pgp_verify_key_command
3.180. pgp_list_secring_command
3.181. pgp_list_pubring_command
3.182. forward_decrypt
3.183. smime_timeout
3.184. smime_encrypt_with
3.185. smime_keys
3.186. smime_ca_location
3.187. smime_certificates
3.188. smime_decrypt_command
3.189. smime_verify_command
3.190. smime_verify_opaque_command
3.191. smime_sign_command
3.192. smime_sign_opaque_command
3.193. smime_encrypt_command
3.194. smime_pk7out_command
3.195. smime_get_cert_command
3.196. smime_get_signer_cert_command
3.197. smime_import_cert_command
3.198. smime_get_cert_email_command
3.199. smime_default_key
3.200. ssl_client_cert
3.201. ssl_force_tls
3.202. ssl_starttls
3.203. certificate_file
3.204. ssl_usesystemcerts
3.205. entropy_file
3.206. ssl_use_sslv2
3.207. ssl_use_sslv3
3.208. ssl_use_tlsv1
3.209. ssl_min_dh_prime_bits
3.210. ssl_ca_certificates_file
3.211. pipe_split
3.212. pipe_decode
3.213. pipe_sep
3.214. pop_authenticators
3.215. pop_auth_try_all
3.216. pop_checkinterval
3.217. pop_delete
3.218. pop_host
3.219. pop_last
3.220. pop_reconnect
3.221. pop_user
3.222. pop_pass
3.223. post_indent_string
3.224. postpone
3.225. postponed
3.226. preconnect
3.227. print
3.228. print_command
3.229. print_decode
3.230. print_split
3.231. prompt_after
3.232. query_command
3.233. query_format
3.234. quit
3.235. quote_regexp
3.236. read_inc
3.237. read_only
3.238. realname
3.239. recall
3.240. record
3.241. reply_regexp
3.242. reply_self
3.243. reply_to
3.244. resolve
3.245. reverse_alias
3.246. reverse_name
3.247. reverse_realname
3.248. rfc2047_parameters
3.249. save_address
3.250. save_empty
3.251. save_history
3.252. save_name
3.253. score
3.254. score_threshold_delete
3.255. score_threshold_flag
3.256. score_threshold_read
3.257. send_charset
3.258. sendmail
3.259. sendmail_wait
3.260. shell
3.261. sig_dashes
3.262. sig_on_top
3.263. signature
3.264. simple_search
3.265. smart_wrap
3.266. smileys
3.267. sleep_time
3.268. smtp_authenticators
3.269. smtp_pass
3.270. smtp_url
3.271. sort
3.272. sort_alias
3.273. sort_aux
3.274. sort_browser
3.275. sort_re
3.276. spam_separator
3.277. spoolfile
3.278. status_chars
3.279. status_format
3.280. status_on_top
3.281. strict_threads
3.282. suspend
3.283. text_flowed
3.284. thread_received
3.285. thorough_search
3.286. tilde
3.287. time_inc
3.288. timeout
3.289. tmpdir
3.290. to_chars
3.291. tunnel
3.292. use_8bitmime
3.293. use_domain
3.294. use_envelope_from
3.295. use_from
3.296. use_idn
3.297. use_ipv6
3.298. user_agent
3.299. visual
3.300. wait_key
3.301. weed
3.302. wrap
3.303. wrap_search
3.304. wrapmargin
3.305. write_inc
3.306. write_bcc
4. Functions
4.1. generic menu
4.2. index menu
4.3. pager menu
4.4. alias menu
4.5. query menu
4.6. attach menu
4.7. compose menu
4.8. postpone menu
4.9. browser menu
4.10. pgp menu
4.11. smime menu
4.12. mix menu
4.13. editor menu

1. Command line options

/mutt-1.5.19/doc/reference.html:645:S/MIME and PGP will be used instead of the classic code. Note that /mutt-1.5.19/doc/reference.html:651:(see http://www.g10code.de/docs/pka-intro.de.pdf) during signature /mutt-1.5.19/doc/reference.html:662:S/MIME encryption/signing for messages. See also $crypt_autoencrypt, /mutt-1.5.19/doc/reference.html:996:side of an IMAP “AUTH=xxx” capability string, eg “digest-md5”, “gssapi” /mutt-1.5.19/doc/reference.html:997:or “cram-md5”. This option is case-insensitive. If it's /mutt-1.5.19/doc/reference.html:1004:set imap_authenticators="gssapi:cram-md5:login" /mutt-1.5.19/doc/reference.html:1465:then OpenSSL is used instead to create S/MIME messages and settings can /mutt-1.5.19/doc/reference.html:1471:encrypt outgoing messages. This is probably only useful in /mutt-1.5.19/doc/reference.html:1475:then OpenSSL is used instead to create S/MIME messages and /mutt-1.5.19/doc/reference.html:1486:If set, automatically PGP or OpenSSL encrypt replies to messages which are /mutt-1.5.19/doc/reference.html:1491:If set, automatically PGP or OpenSSL sign replies to messages which are /mutt-1.5.19/doc/reference.html:1499:If set, automatically PGP or OpenSSL sign replies to messages /mutt-1.5.19/doc/reference.html:1509:PGP or S/MIME output, so spoofing such lines is more difficult. /mutt-1.5.19/doc/reference.html:1519:If yes, always attempt to verify PGP or S/MIME signatures. /mutt-1.5.19/doc/reference.html:1520:If ask-*, ask whether or not to verify the signature. /mutt-1.5.19/doc/reference.html:1526:operations. To override and to use OpenSSL instead this must be set. /mutt-1.5.19/doc/reference.html:1528:select the same application that was used to sign/encrypt the original /mutt-1.5.19/doc/reference.html:1530:(S/MIME only) /mutt-1.5.19/doc/reference.html:1536:(S/MIME only) /mutt-1.5.19/doc/reference.html:1537:

3.154. smime_decrypt_use_default_key

Type: boolean
/mutt-1.5.19/doc/reference.html:1542:(S/MIME only) /mutt-1.5.19/doc/reference.html:1562:If you assign a text to this variable, then a PGP signature is only /mutt-1.5.19/doc/reference.html:1671:If set, mutt will automatically attempt to decrypt traditional PGP /mutt-1.5.19/doc/reference.html:1687:

%s

Expands to the name of a file containing the signature part /mutt-1.5.19/doc/reference.html:1710:

3.172. pgp_decrypt_command

Type: string
/mutt-1.5.19/doc/reference.html:1712:This command is used to decrypt a PGP encrypted message. /mutt-1.5.19/doc/reference.html:1728:This command is used to create the detached PGP signature for a /mutt-1.5.19/doc/reference.html:1734:

3.175. pgp_encrypt_sign_command

Type: string
/mutt-1.5.19/doc/reference.html:1736:This command is used to both sign and encrypt a body part. /mutt-1.5.19/doc/reference.html:1741:

3.176. pgp_encrypt_only_command

Type: string
/mutt-1.5.19/doc/reference.html:1743:This command is used to encrypt a body part without signing it. /mutt-1.5.19/doc/reference.html:1802:

3.182. forward_decrypt

Type: boolean
/mutt-1.5.19/doc/reference.html:1813:(S/MIME only) /mutt-1.5.19/doc/reference.html:1814:

3.184. smime_encrypt_with

Type: string
/mutt-1.5.19/doc/reference.html:1817:Valid choices are “des”, “des3”, “rc2-40”, “rc2-64”, “rc2-128”. /mutt-1.5.19/doc/reference.html:1818:If unset, “3des” (TripleDES) is used. /mutt-1.5.19/doc/reference.html:1819:(S/MIME only) /mutt-1.5.19/doc/reference.html:1822:Since for S/MIME there is no pubring/secring as with PGP, mutt has to handle /mutt-1.5.19/doc/reference.html:1825:named as the hash-value retrieved from OpenSSL. There is an index file /mutt-1.5.19/doc/reference.html:1828:(S/MIME only) /mutt-1.5.19/doc/reference.html:1832:contains trusted certificates for use with OpenSSL. /mutt-1.5.19/doc/reference.html:1833:(S/MIME only) /mutt-1.5.19/doc/reference.html:1836:Since for S/MIME there is no pubring/secring as with PGP, mutt has to handle /mutt-1.5.19/doc/reference.html:1840:OpenSSL. There is an index file which contains mailbox-address /mutt-1.5.19/doc/reference.html:1843:(S/MIME only) /mutt-1.5.19/doc/reference.html:1844:

3.188. smime_decrypt_command

Type: string
/mutt-1.5.19/doc/reference.html:1846:This format string specifies a command which is used to decrypt /mutt-1.5.19/doc/reference.html:1849:The OpenSSL command formats have their own set of printf(3)-like sequences /mutt-1.5.19/doc/reference.html:1853:

%s

Expands to the name of a file containing the signature part /mutt-1.5.19/doc/reference.html:1865:(S/MIME only) /mutt-1.5.19/doc/reference.html:1868:This command is used to verify S/MIME signatures of type multipart/signed. /mutt-1.5.19/doc/reference.html:1870:This is a format string, see the $smime_decrypt_command command for /mutt-1.5.19/doc/reference.html:1872:(S/MIME only) /mutt-1.5.19/doc/reference.html:1875:This command is used to verify S/MIME signatures of type /mutt-1.5.19/doc/reference.html:1878:This is a format string, see the $smime_decrypt_command command for /mutt-1.5.19/doc/reference.html:1880:(S/MIME only) /mutt-1.5.19/doc/reference.html:1883:This command is used to created S/MIME signatures of type /mutt-1.5.19/doc/reference.html:1886:This is a format string, see the $smime_decrypt_command command for /mutt-1.5.19/doc/reference.html:1888:(S/MIME only) /mutt-1.5.19/doc/reference.html:1891:This command is used to created S/MIME signatures of type /mutt-1.5.19/doc/reference.html:1892:application/x-pkcs7-signature, which can only be handled by mail /mutt-1.5.19/doc/reference.html:1893:clients supporting the S/MIME extension. /mutt-1.5.19/doc/reference.html:1895:This is a format string, see the $smime_decrypt_command command for /mutt-1.5.19/doc/reference.html:1897:(S/MIME only) /mutt-1.5.19/doc/reference.html:1898:

3.193. smime_encrypt_command

Type: string
/mutt-1.5.19/doc/reference.html:1900:This command is used to create encrypted S/MIME messages. /mutt-1.5.19/doc/reference.html:1902:This is a format string, see the $smime_decrypt_command command for /mutt-1.5.19/doc/reference.html:1904:(S/MIME only) /mutt-1.5.19/doc/reference.html:1907:This command is used to extract PKCS7 structures of S/MIME signatures, /mutt-1.5.19/doc/reference.html:1910:This is a format string, see the $smime_decrypt_command command for /mutt-1.5.19/doc/reference.html:1912:(S/MIME only) /mutt-1.5.19/doc/reference.html:1917:This is a format string, see the $smime_decrypt_command command for /mutt-1.5.19/doc/reference.html:1919:(S/MIME only) /mutt-1.5.19/doc/reference.html:1922:This command is used to extract only the signers X509 certificate from a S/MIME /mutt-1.5.19/doc/reference.html:1923:signature, so that the certificate's owner may get compared to the /mutt-1.5.19/doc/reference.html:1926:This is a format string, see the $smime_decrypt_command command for /mutt-1.5.19/doc/reference.html:1928:(S/MIME only) /mutt-1.5.19/doc/reference.html:1933:This is a format string, see the $smime_decrypt_command command for /mutt-1.5.19/doc/reference.html:1935:(S/MIME only) /mutt-1.5.19/doc/reference.html:1942:This is a format string, see the $smime_decrypt_command command for /mutt-1.5.19/doc/reference.html:1944:(S/MIME only) /mutt-1.5.19/doc/reference.html:1948:keyid (the hash-value that OpenSSL generates) to work properly /mutt-1.5.19/doc/reference.html:1949:(S/MIME only) /mutt-1.5.19/doc/reference.html:1950:

3.200. ssl_client_cert

Type: path
/mutt-1.5.19/doc/reference.html:1954:

3.201. ssl_force_tls

Type: boolean
/mutt-1.5.19/doc/reference.html:1958:negotiate TLS even if the server does not advertise the capability, /mutt-1.5.19/doc/reference.html:1960:option supersedes $ssl_starttls. /mutt-1.5.19/doc/reference.html:1961:

3.202. ssl_starttls

Type: quadoption
/mutt-1.5.19/doc/reference.html:1983:

3.204. ssl_usesystemcerts

Type: boolean
/mutt-1.5.19/doc/reference.html:1990:The file which includes random data that is used to initialize SSL /mutt-1.5.19/doc/reference.html:1992:

3.206. ssl_use_sslv2

Type: boolean
/mutt-1.5.19/doc/reference.html:1995:SSL authentication process. /mutt-1.5.19/doc/reference.html:1996:

3.207. ssl_use_sslv3

Type: boolean
/mutt-1.5.19/doc/reference.html:1999:SSL authentication process. /mutt-1.5.19/doc/reference.html:2000:

3.208. ssl_use_tlsv1

Type: boolean
/mutt-1.5.19/doc/reference.html:2003:SSL authentication process. /mutt-1.5.19/doc/reference.html:2004:

3.209. ssl_min_dh_prime_bits

Type: number
/mutt-1.5.19/doc/reference.html:2007:for use in any Diffie-Hellman key exchange. A value of 0 will use /mutt-1.5.19/doc/reference.html:2009:

3.210. ssl_ca_certificates_file

Type: path
/mutt-1.5.19/doc/reference.html:2018:set ssl_ca_certificates_file=/etc/ssl/certs/ca-certificates.crt /mutt-1.5.19/doc/reference.html:2043:SASL mechanism, eg “digest-md5”, “gssapi” or “cram-md5”. /mutt-1.5.19/doc/reference.html:2051:set pop_authenticators="digest-md5:apop:user" /mutt-1.5.19/doc/reference.html:2423:$signature. It is strongly recommended that you not unset /mutt-1.5.19/doc/reference.html:2424:this variable unless your signature contains just your name. The /mutt-1.5.19/doc/reference.html:2426:detect your signature. For example, Mutt has the ability to highlight /mutt-1.5.19/doc/reference.html:2427:the signature in a different color in the builtin pager. /mutt-1.5.19/doc/reference.html:2430:If set, the signature will be included before any quoted or forwarded /mutt-1.5.19/doc/reference.html:2434:

3.263. signature

Type: path
/mutt-1.5.19/doc/reference.html:2435:Default: “˜/.signature

/mutt-1.5.19/doc/reference.html:2436:Specifies the filename of your signature, which is appended to all /mutt-1.5.19/doc/reference.html:2473:“digest-md5”, “gssapi” or “cram-md5”. /mutt-1.5.19/doc/reference.html:2481:set smtp_authenticators="digest-md5:cram-md5" /mutt-1.5.19/doc/reference.html:2876:

Table 8.2. Default generic function bindings

FunctionDefault keyDescription
<top-page>Hmove to the top of the page
<next-entry>jmove to the next entry
<previous-entry>kmove to the previous entry
<bottom-page>Lmove to the bottom of the page
<refresh>^Lclear and redraw the screen
<middle-page>Mmove to the middle of the page
<search-next>nsearch for next match
<exit>qexit this menu
<tag-entry>ttag the current entry
<next-page>zmove to the next page
<previous-page>Zmove to the previous page
<last-entry>*move to the last entry
<first-entry>=move to the first entry
<enter-command>:enter a muttrc command
<next-line>>scroll down one line
<previous-line><scroll up one line
<half-up>[scroll up 1/2 page
<half-down>]scroll down 1/2 page
<help>?this screen
<tag-prefix>;apply next function to tagged messages
<tag-prefix-cond> apply next function ONLY to tagged messages
<end-cond> end of conditional execution (noop)
<shell-escape>!invoke a command in a subshell
<select-entry><Return>select the current entry
<search>/search for a regular expression
<search-reverse>Esc /search backwards for a regular expression
<search-opposite> search for next match in opposite direction
<jump> jump to an index number
<current-top> move entry to top of screen
<current-middle> move entry to middle of screen
<current-bottom> move entry to bottom of screen
<what-key> display the keycode for a key press

4.2. index menu

Table 8.3. Default index function bindings

FunctionDefault keyDescription
<create-alias>acreate an alias from a message sender
<bounce-message>bremail a message to another user
<break-thread>#break the thread in two
<change-folder>copen a different folder
<change-folder-readonly>Esc copen a different folder in read only mode
<next-unread-mailbox> open next mailbox with new mail
<collapse-thread>Esc vcollapse/uncollapse current thread
<collapse-all>Esc Vcollapse/uncollapse all threads
<copy-message>Ccopy a message to a file/mailbox
<decode-copy>Esc Cmake decoded (text/plain) copy
<decode-save>Esc smake decoded copy (text/plain) and delete
<delete-message>ddelete the current entry
<delete-pattern>Ddelete messages matching a pattern
<delete-thread>^Ddelete all messages in thread
<delete-subthread>Esc ddelete all messages in subthread
<edit>eedit the raw message
<edit-type>^Eedit attachment content type
<forward-message>fforward a message with comments
<flag-message>Ftoggle a message's 'important' flag
<group-reply>greply to all recipients
<fetch-mail>Gretrieve mail from POP server
<imap-fetch-mail> force retrieval of mail from IMAP server
<display-toggle-weed>hdisplay message and toggle header weeding
<next-undeleted>jmove to the next undeleted message
<previous-undeleted>kmove to the previous undeleted message
<limit>lshow only messages matching a pattern
<link-threads>&link tagged message to the current one
<list-reply>Lreply to specified mailing list
<mail>mcompose a new mail message
<toggle-new>Ntoggle a message's 'new' flag
<toggle-write>%toggle whether the mailbox will be rewritten
<next-thread>^Njump to the next thread
<next-subthread>Esc njump to the next subthread
<query>Qquery external program for addresses
<quit>qsave changes to mailbox and quit
<reply>rreply to a message
<show-limit>Esc lshow currently active limit pattern
<sort-mailbox>osort messages
<sort-reverse>Osort messages in reverse order
<print-message>pprint the current entry
<previous-thread>^Pjump to previous thread
<previous-subthread>Esc pjump to previous subthread
<recall-message>Rrecall a postponed message
<read-thread>^Rmark the current thread as read
<read-subthread>Esc rmark the current subthread as read
<resend-message>Esc euse the current message as a template for a new one
<save-message>ssave message/attachment to a file
<tag-pattern>Ttag messages matching a pattern
<tag-subthread> tag the current subthread
<tag-thread>Esc ttag the current thread
<untag-pattern>^Tuntag messages matching a pattern
<undelete-message>uundelete the current entry
<undelete-pattern>Uundelete messages matching a pattern
<undelete-subthread>Esc uundelete all messages in subthread
<undelete-thread>^Uundelete all messages in thread
<view-attachments>vshow MIME attachments
<show-version>Vshow the Mutt version number and date
<set-flag>wset a status flag on a message
<clear-flag>Wclear a status flag from a message
<display-message><Return>display a message
<buffy-list>.list mailboxes with new mail
<sync-mailbox>$save changes to mailbox
<display-address>@display full address of sender
<pipe-message>|pipe message/attachment to a shell command
<next-new> jump to the next new message
<next-new-then-unread><Tab>jump to the next new or unread message
<previous-new> jump to the previous new message
<previous-new-then-unread>Esc <Tab>jump to the previous new or unread message
<next-unread> jump to the next unread message
<previous-unread> jump to the previous unread message
<parent-message>Pjump to parent message in thread
<extract-keys>^Kextract supported public keys
<forget-passphrase>^Fwipe passphrase(s) from memory
<check-traditional-pgp>Esc Pcheck for classic PGP
<mail-key>Esc kmail a PGP public key
<decrypt-copy> make decrypted copy
<decrypt-save> make decrypted copy and delete

4.3. pager menu

Table 8.4. Default pager function bindings

FunctionDefault keyDescription
<break-thread>#break the thread in two
<create-alias>acreate an alias from a message sender
<bounce-message>bremail a message to another user
<change-folder>copen a different folder
<change-folder-readonly>Esc copen a different folder in read only mode
<next-unread-mailbox> open next mailbox with new mail
<copy-message>Ccopy a message to a file/mailbox
<decode-copy>Esc Cmake decoded (text/plain) copy
<delete-message>ddelete the current entry
<delete-thread>^Ddelete all messages in thread
<delete-subthread>Esc ddelete all messages in subthread
<edit>eedit the raw message
<edit-type>^Eedit attachment content type
<forward-message>fforward a message with comments
<flag-message>Ftoggle a message's 'important' flag
<group-reply>greply to all recipients
<imap-fetch-mail> force retrieval of mail from IMAP server
<display-toggle-weed>hdisplay message and toggle header weeding
<next-undeleted>jmove to the next undeleted message
<next-entry>Jmove to the next entry
<previous-undeleted>kmove to the previous undeleted message
<previous-entry>Kmove to the previous entry
<link-threads>&link tagged message to the current one
<list-reply>Lreply to specified mailing list
<redraw-screen>^Lclear and redraw the screen
<mail>mcompose a new mail message
<mark-as-new>Ntoggle a message's 'new' flag
<search-next>nsearch for next match
<next-thread>^Njump to the next thread
<next-subthread>Esc njump to the next subthread
<print-message>pprint the current entry
<previous-thread>^Pjump to previous thread
<previous-subthread>Esc pjump to previous subthread
<quit>Qsave changes to mailbox and quit
<exit>qexit this menu
<reply>rreply to a message
<recall-message>Rrecall a postponed message
<read-thread>^Rmark the current thread as read
<read-subthread>Esc rmark the current subthread as read
<resend-message>Esc euse the current message as a template for a new one
<save-message>ssave message/attachment to a file
<skip-quoted>Sskip beyond quoted text
<decode-save>Esc smake decoded copy (text/plain) and delete
<tag-message>ttag the current entry
<toggle-quoted>Ttoggle display of quoted text
<undelete-message>uundelete the current entry
<undelete-subthread>Esc uundelete all messages in subthread
<undelete-thread>^Uundelete all messages in thread
<view-attachments>vshow MIME attachments
<show-version>Vshow the Mutt version number and date
<search-toggle>\\toggle search pattern coloring
<display-address>@display full address of sender
<next-new> jump to the next new message
<pipe-message>|pipe message/attachment to a shell command
<help>?this screen
<next-page><Space>move to the next page
<previous-page>-move to the previous page
<top>^jump to the top of the message
<sync-mailbox>$save changes to mailbox
<shell-escape>!invoke a command in a subshell
<enter-command>:enter a muttrc command
<buffy-list>.list mailboxes with new mail
<search>/search for a regular expression
<search-reverse>Esc /search backwards for a regular expression
<search-opposite> search for next match in opposite direction
<next-line><Return>scroll down one line
<jump> jump to an index number
<next-unread> jump to the next unread message
<previous-new> jump to the previous new message
<previous-unread> jump to the previous unread message
<half-up> scroll up 1/2 page
<half-down> scroll down 1/2 page
<previous-line> scroll up one line
<bottom> jump to the bottom of the message
<parent-message>Pjump to parent message in thread
<check-traditional-pgp>Esc Pcheck for classic PGP
<mail-key>Esc kmail a PGP public key
<extract-keys>^Kextract supported public keys
<forget-passphrase>^Fwipe passphrase(s) from memory
<decrypt-copy> make decrypted copy
<decrypt-save> make decrypted copy and delete
<what-key> display the keycode for a key press

4.4. alias menu

Table 8.5. Default alias function bindings

FunctionDefault keyDescription
<delete-entry>ddelete the current entry
<undelete-entry>uundelete the current entry

4.5. query menu

Table 8.6. Default query function bindings

FunctionDefault keyDescription
<create-alias>acreate an alias from a message sender
<mail>mcompose a new mail message
<query>Qquery external program for addresses
<query-append>Aappend new query results to current results

4.6. attach menu

Table 8.7. Default attach function bindings

FunctionDefault keyDescription
<bounce-message>bremail a message to another user
<display-toggle-weed>hdisplay message and toggle header weeding
<edit-type>^Eedit attachment content type
<print-entry>pprint the current entry
<save-entry>ssave message/attachment to a file
<pipe-entry>|pipe message/attachment to a shell command
<view-mailcap>mforce viewing of attachment using mailcap
<reply>rreply to a message
<resend-message>Esc euse the current message as a template for a new one
<group-reply>greply to all recipients
<list-reply>Lreply to specified mailing list
<forward-message>fforward a message with comments
<view-text>Tview attachment as text
<view-attach><Return>view attachment using mailcap entry if necessary
<delete-entry>ddelete the current entry
<undelete-entry>uundelete the current entry
<collapse-parts>vToggle display of subparts
<check-traditional-pgp>Esc Pcheck for classic PGP
<extract-keys>^Kextract supported public keys
<forget-passphrase>^Fwipe passphrase(s) from memory

4.7. compose menu

Table 8.8. Default compose function bindings

FunctionDefault keyDescription
<attach-file>aattach file(s) to this message
<attach-message>Aattach message(s) to this message
<edit-bcc>bedit the BCC list
<edit-cc>cedit the CC list
<copy-file>Csave message/attachment to a file
<detach-file>Ddelete the current entry
<toggle-disposition>^Dtoggle disposition between inline/attachment
<edit-description>dedit attachment description
<edit-message>eedit the message
<edit-headers>Eedit the message with headers
<edit-file>^X eedit the file to be attached
<edit-encoding>^Eedit attachment transfer-encoding
<edit-from>Esc fedit the from field
<edit-fcc>fenter a file to save a copy of this message in
<filter-entry>Ffilter attachment through a shell command
<get-attachment>Gget a temporary copy of an attachment
<display-toggle-weed>hdisplay message and toggle header weeding
<ispell>irun ispell on the message
<print-entry>lprint the current entry
<edit-mime>medit attachment using mailcap entry
<new-mime>ncompose new attachment using mailcap entry
<postpone-message>Psave this message to send later
<edit-reply-to>redit the Reply-To field
<rename-file>Rrename/move an attached file
<edit-subject>sedit the subject of this message
<edit-to>tedit the TO list
<edit-type>^Tedit attachment content type
<write-fcc>wwrite the message to a folder
<toggle-unlink>utoggle whether to delete file after sending it
<toggle-recode> toggle recoding of this attachment
<update-encoding>Uupdate an attachment's encoding info
<view-attach><Return>view attachment using mailcap entry if necessary
<send-message>ysend the message
<pipe-entry>|pipe message/attachment to a shell command
<attach-key>Esc kattach a PGP public key
<pgp-menu>pshow PGP options
<forget-passphrase>^Fwipe passphrase(s) from memory
<smime-menu>Sshow S/MIME options
<mix>Msend the message through a mixmaster remailer chain

4.8. postpone menu

Table 8.9. Default postpone function bindings

FunctionDefault keyDescription
<delete-entry>ddelete the current entry
<undelete-entry>uundelete the current entry

4.9. browser menu

Table 8.10. Default browser function bindings

FunctionDefault keyDescription
<change-dir>cchange directories
<display-filename>@display the currently selected file's name
<enter-mask>menter a file mask
<sort>osort messages
<sort-reverse>Osort messages in reverse order
<select-new>Nselect a new file in this directory
<check-new> check mailboxes for new mail
<toggle-mailboxes><Tab>toggle whether to browse mailboxes or all files
<view-file><Space>view file
<buffy-list>.list mailboxes with new mail
<create-mailbox>Ccreate a new mailbox (IMAP only)
<delete-mailbox>ddelete the current mailbox (IMAP only)
<rename-mailbox>rrename the current mailbox (IMAP only)
<subscribe>ssubscribe to current mailbox (IMAP only)
<unsubscribe>uunsubscribe from current mailbox (IMAP only)
<toggle-subscribed>Ttoggle view all/subscribed mailboxes (IMAP only)

4.10. pgp menu

Table 8.11. Default pgp function bindings

FunctionDefault keyDescription
<verify-key>cverify a PGP public key
<view-name>%view the key's user id

4.11. smime menu

Table 8.12. Default smime function bindings

FunctionDefault keyDescription
<verify-key>cverify a PGP public key
<view-name>%view the key's user id

4.12. mix menu

Table 8.13. Default mix function bindings

FunctionDefault keyDescription
<accept><Return>Accept the chain constructed
<append>aAppend a remailer to the chain
<insert>iInsert a remailer into the chain
<delete>dDelete a remailer from the chain
<chain-prev><Left>Select the previous element of the chain
<chain-next><Right>Select the next element of the chain

4.13. editor menu

Table 8.14. Default editor function bindings

FunctionDefault keyDescription
<bol>^Ajump to the beginning of the line
<backward-char>^Bmove the cursor one character to the left
<backward-word>Esc bmove the cursor to the beginning of the word
<capitalize-word>Esc ccapitalize the word
<downcase-word>Esc lconvert the word to lower case
<upcase-word>Esc uconvert the word to upper case
<delete-char>^Ddelete the char under the cursor
<eol>^Ejump to the end of the line
<forward-char>^Fmove the cursor one character to the right
<forward-word>Esc fmove the cursor to the end of the word
<backspace><Backspace>delete the char in front of the cursor
<kill-eol>^Kdelete chars from cursor to end of line
<kill-eow>Esc ddelete chars from the cursor to the end of the word
<kill-line>^Udelete all chars on the line
<quote-char>^Vquote the next typed key
<kill-word>^Wdelete the word in front of the cursor
<complete><Tab>complete filename or alias
<complete-query>^Tcomplete address with query
<buffy-cycle><Space>cycle among incoming mailboxes
<history-up> scroll up through the history list
<history-down> scroll down through the history list
<transpose-chars> transpose character under cursor with previous

/mutt-1.5.19/doc/Makefile.in:137:MUTT_MD5 = @MUTT_MD5@ /mutt-1.5.19/doc/Makefile.in:244: README NEWS TODO README.SECURITY README.SSL /mutt-1.5.19/doc/makedoc-defs.h:19:# ifndef USE_SSL_OPENSSL /mutt-1.5.19/doc/makedoc-defs.h:20:# define USE_SSL_OPENSSL /mutt-1.5.19/doc/makedoc-defs.h:22:# ifndef USE_SSL_GNUTLS /mutt-1.5.19/doc/makedoc-defs.h:23:# define USE_SSL_GNUTLS /mutt-1.5.19/doc/makedoc-defs.h:25:# ifndef USE_SSL /mutt-1.5.19/doc/makedoc-defs.h:26:# define USE_SSL /mutt-1.5.19/doc/mimesupport.html:544:## I've added x-pkcs7 to this, since it functions (for S/MIME) /mutt-1.5.19/doc/mimesupport.html:545:## analogously to PGP signature attachments. S/MIME isn't supported /mutt-1.5.19/doc/Muttrc:71:## I've added x-pkcs7 to this, since it functions (for S/MIME) /mutt-1.5.19/doc/Muttrc:72:## analogously to PGP signature attachments. S/MIME isn't supported /mutt-1.5.19/doc/Muttrc:622:# S/MIME and PGP will be used instead of the classic code. Note that /mutt-1.5.19/doc/Muttrc:635:# (see http://www.g10code.de/docs/pka-intro.de.pdf) during signature /mutt-1.5.19/doc/Muttrc:660:# S/MIME encryption/signing for messages. See also $crypt_autoencrypt, /mutt-1.5.19/doc/Muttrc:1296:# side of an IMAP ``AUTH=xxx'' capability string, eg ``digest-md5'', ``gssapi'' /mutt-1.5.19/doc/Muttrc:1297:# or ``cram-md5''. This option is case-insensitive. If it's /mutt-1.5.19/doc/Muttrc:1302:# set imap_authenticators="gssapi:cram-md5:login" /mutt-1.5.19/doc/Muttrc:2181:# then OpenSSL is used instead to create S/MIME messages and settings can /mutt-1.5.19/doc/Muttrc:2194:# encrypt outgoing messages. This is probably only useful in /mutt-1.5.19/doc/Muttrc:2198:# then OpenSSL is used instead to create S/MIME messages and /mutt-1.5.19/doc/Muttrc:2223:# If set, automatically PGP or OpenSSL encrypt replies to messages which are /mutt-1.5.19/doc/Muttrc:2235:# If set, automatically PGP or OpenSSL sign replies to messages which are /mutt-1.5.19/doc/Muttrc:2250:# If set, automatically PGP or OpenSSL sign replies to messages /mutt-1.5.19/doc/Muttrc:2267:# PGP or S/MIME output, so spoofing such lines is more difficult. /mutt-1.5.19/doc/Muttrc:2291:# If ``yes'', always attempt to verify PGP or S/MIME signatures. /mutt-1.5.19/doc/Muttrc:2292:# If ``ask-*'', ask whether or not to verify the signature. /mutt-1.5.19/doc/Muttrc:2305:# operations. To override and to use OpenSSL instead this must be set. /mutt-1.5.19/doc/Muttrc:2307:# select the same application that was used to sign/encrypt the original /mutt-1.5.19/doc/Muttrc:2309:# (S/MIME only) /mutt-1.5.19/doc/Muttrc:2322:# (S/MIME only) /mutt-1.5.19/doc/Muttrc:2325:# set smime_decrypt_use_default_key=yes /mutt-1.5.19/doc/Muttrc:2327:# Name: smime_decrypt_use_default_key /mutt-1.5.19/doc/Muttrc:2335:# (S/MIME only) /mutt-1.5.19/doc/Muttrc:2369:# If you assign a text to this variable, then a PGP signature is only /mutt-1.5.19/doc/Muttrc:2562:# If set, mutt will automatically attempt to decrypt traditional PGP /mutt-1.5.19/doc/Muttrc:2584:# %s Expands to the name of a file containing the signature part /mutt-1.5.19/doc/Muttrc:2624:# set pgp_decrypt_command="" /mutt-1.5.19/doc/Muttrc:2626:# Name: pgp_decrypt_command /mutt-1.5.19/doc/Muttrc:2631:# This command is used to decrypt a PGP encrypted message. /mutt-1.5.19/doc/Muttrc:2661:# This command is used to create the detached PGP signature for a /mutt-1.5.19/doc/Muttrc:2669:# set pgp_encrypt_sign_command="" /mutt-1.5.19/doc/Muttrc:2671:# Name: pgp_encrypt_sign_command /mutt-1.5.19/doc/Muttrc:2676:# This command is used to both sign and encrypt a body part. /mutt-1.5.19/doc/Muttrc:2683:# set pgp_encrypt_only_command="" /mutt-1.5.19/doc/Muttrc:2685:# Name: pgp_encrypt_only_command /mutt-1.5.19/doc/Muttrc:2690:# This command is used to encrypt a body part without signing it. /mutt-1.5.19/doc/Muttrc:2780:# set forward_decrypt=yes /mutt-1.5.19/doc/Muttrc:2782:# Name: forward_decrypt /mutt-1.5.19/doc/Muttrc:2803:# (S/MIME only) /mutt-1.5.19/doc/Muttrc:2806:# set smime_encrypt_with="" /mutt-1.5.19/doc/Muttrc:2808:# Name: smime_encrypt_with /mutt-1.5.19/doc/Muttrc:2814:# Valid choices are ``des'', ``des3'', ``rc2-40'', ``rc2-64'', ``rc2-128''. /mutt-1.5.19/doc/Muttrc:2815:# If unset, ``3des'' (TripleDES) is used. /mutt-1.5.19/doc/Muttrc:2816:# (S/MIME only) /mutt-1.5.19/doc/Muttrc:2826:# Since for S/MIME there is no pubring/secring as with PGP, mutt has to handle /mutt-1.5.19/doc/Muttrc:2829:# named as the hash-value retrieved from OpenSSL. There is an index file /mutt-1.5.19/doc/Muttrc:2832:# (S/MIME only) /mutt-1.5.19/doc/Muttrc:2843:# contains trusted certificates for use with OpenSSL. /mutt-1.5.19/doc/Muttrc:2844:# (S/MIME only) /mutt-1.5.19/doc/Muttrc:2854:# Since for S/MIME there is no pubring/secring as with PGP, mutt has to handle /mutt-1.5.19/doc/Muttrc:2858:# OpenSSL. There is an index file which contains mailbox-address /mutt-1.5.19/doc/Muttrc:2861:# (S/MIME only) /mutt-1.5.19/doc/Muttrc:2864:# set smime_decrypt_command="" /mutt-1.5.19/doc/Muttrc:2866:# Name: smime_decrypt_command /mutt-1.5.19/doc/Muttrc:2871:# This format string specifies a command which is used to decrypt /mutt-1.5.19/doc/Muttrc:2874:# The OpenSSL command formats have their own set of printf(3)-like sequences /mutt-1.5.19/doc/Muttrc:2877:# %s Expands to the name of a file containing the signature part /mutt-1.5.19/doc/Muttrc:2890:# (S/MIME only) /mutt-1.5.19/doc/Muttrc:2900:# This command is used to verify S/MIME signatures of type multipart/signed. /mutt-1.5.19/doc/Muttrc:2902:# This is a format string, see the $smime_decrypt_command command for /mutt-1.5.19/doc/Muttrc:2904:# (S/MIME only) /mutt-1.5.19/doc/Muttrc:2914:# This command is used to verify S/MIME signatures of type /mutt-1.5.19/doc/Muttrc:2917:# This is a format string, see the $smime_decrypt_command command for /mutt-1.5.19/doc/Muttrc:2919:# (S/MIME only) /mutt-1.5.19/doc/Muttrc:2929:# This command is used to created S/MIME signatures of type /mutt-1.5.19/doc/Muttrc:2932:# This is a format string, see the $smime_decrypt_command command for /mutt-1.5.19/doc/Muttrc:2934:# (S/MIME only) /mutt-1.5.19/doc/Muttrc:2944:# This command is used to created S/MIME signatures of type /mutt-1.5.19/doc/Muttrc:2945:# application/x-pkcs7-signature, which can only be handled by mail /mutt-1.5.19/doc/Muttrc:2946:# clients supporting the S/MIME extension. /mutt-1.5.19/doc/Muttrc:2948:# This is a format string, see the $smime_decrypt_command command for /mutt-1.5.19/doc/Muttrc:2950:# (S/MIME only) /mutt-1.5.19/doc/Muttrc:2953:# set smime_encrypt_command="" /mutt-1.5.19/doc/Muttrc:2955:# Name: smime_encrypt_command /mutt-1.5.19/doc/Muttrc:2960:# This command is used to create encrypted S/MIME messages. /mutt-1.5.19/doc/Muttrc:2962:# This is a format string, see the $smime_decrypt_command command for /mutt-1.5.19/doc/Muttrc:2964:# (S/MIME only) /mutt-1.5.19/doc/Muttrc:2974:# This command is used to extract PKCS7 structures of S/MIME signatures, /mutt-1.5.19/doc/Muttrc:2977:# This is a format string, see the $smime_decrypt_command command for /mutt-1.5.19/doc/Muttrc:2979:# (S/MIME only) /mutt-1.5.19/doc/Muttrc:2991:# This is a format string, see the $smime_decrypt_command command for /mutt-1.5.19/doc/Muttrc:2993:# (S/MIME only) /mutt-1.5.19/doc/Muttrc:3003:# This command is used to extract only the signers X509 certificate from a S/MIME /mutt-1.5.19/doc/Muttrc:3004:# signature, so that the certificate's owner may get compared to the /mutt-1.5.19/doc/Muttrc:3007:# This is a format string, see the $smime_decrypt_command command for /mutt-1.5.19/doc/Muttrc:3009:# (S/MIME only) /mutt-1.5.19/doc/Muttrc:3021:# This is a format string, see the $smime_decrypt_command command for /mutt-1.5.19/doc/Muttrc:3023:# (S/MIME only) /mutt-1.5.19/doc/Muttrc:3037:# This is a format string, see the $smime_decrypt_command command for /mutt-1.5.19/doc/Muttrc:3039:# (S/MIME only) /mutt-1.5.19/doc/Muttrc:3050:# keyid (the hash-value that OpenSSL generates) to work properly /mutt-1.5.19/doc/Muttrc:3051:# (S/MIME only) /mutt-1.5.19/doc/Muttrc:3054:# set ssl_client_cert="" /mutt-1.5.19/doc/Muttrc:3056:# Name: ssl_client_cert /mutt-1.5.19/doc/Muttrc:3065:# set ssl_force_tls=no /mutt-1.5.19/doc/Muttrc:3067:# Name: ssl_force_tls /mutt-1.5.19/doc/Muttrc:3074:# negotiate TLS even if the server does not advertise the capability, /mutt-1.5.19/doc/Muttrc:3076:# option supersedes $ssl_starttls. /mutt-1.5.19/doc/Muttrc:3079:# set ssl_starttls=yes /mutt-1.5.19/doc/Muttrc:3081:# Name: ssl_starttls /mutt-1.5.19/doc/Muttrc:3112:# set ssl_usesystemcerts=yes /mutt-1.5.19/doc/Muttrc:3114:# Name: ssl_usesystemcerts /mutt-1.5.19/doc/Muttrc:3131:# The file which includes random data that is used to initialize SSL /mutt-1.5.19/doc/Muttrc:3135:# set ssl_use_sslv2=yes /mutt-1.5.19/doc/Muttrc:3137:# Name: ssl_use_sslv2 /mutt-1.5.19/doc/Muttrc:3143:# SSL authentication process. /mutt-1.5.19/doc/Muttrc:3146:# set ssl_use_sslv3=yes /mutt-1.5.19/doc/Muttrc:3148:# Name: ssl_use_sslv3 /mutt-1.5.19/doc/Muttrc:3154:# SSL authentication process. /mutt-1.5.19/doc/Muttrc:3157:# set ssl_use_tlsv1=yes /mutt-1.5.19/doc/Muttrc:3159:# Name: ssl_use_tlsv1 /mutt-1.5.19/doc/Muttrc:3165:# SSL authentication process. /mutt-1.5.19/doc/Muttrc:3168:# set ssl_min_dh_prime_bits=0 /mutt-1.5.19/doc/Muttrc:3170:# Name: ssl_min_dh_prime_bits /mutt-1.5.19/doc/Muttrc:3176:# for use in any Diffie-Hellman key exchange. A value of 0 will use /mutt-1.5.19/doc/Muttrc:3180:# set ssl_ca_certificates_file="" /mutt-1.5.19/doc/Muttrc:3182:# Name: ssl_ca_certificates_file /mutt-1.5.19/doc/Muttrc:3192:# set ssl_ca_certificates_file=/etc/ssl/certs/ca-certificates.crt /mutt-1.5.19/doc/Muttrc:3244:# SASL mechanism, eg ``digest-md5'', ``gssapi'' or ``cram-md5''. /mutt-1.5.19/doc/Muttrc:3250:# set pop_authenticators="digest-md5:apop:user" /mutt-1.5.19/doc/Muttrc:3935:# $signature. It is strongly recommended that you not unset /mutt-1.5.19/doc/Muttrc:3936:# this variable unless your signature contains just your name. The /mutt-1.5.19/doc/Muttrc:3938:# detect your signature. For example, Mutt has the ability to highlight /mutt-1.5.19/doc/Muttrc:3939:# the signature in a different color in the builtin pager. /mutt-1.5.19/doc/Muttrc:3949:# If set, the signature will be included before any quoted or forwarded /mutt-1.5.19/doc/Muttrc:3955:# set signature="~/.signature" /mutt-1.5.19/doc/Muttrc:3957:# Name: signature /mutt-1.5.19/doc/Muttrc:3959:# Default: "~/.signature" /mutt-1.5.19/doc/Muttrc:3962:# Specifies the filename of your signature, which is appended to all /mutt-1.5.19/doc/Muttrc:4034:# ``digest-md5'', ``gssapi'' or ``cram-md5''. /mutt-1.5.19/doc/Muttrc:4040:# set smtp_authenticators="digest-md5:cram-md5" /mutt-1.5.19/doc/PGP-Notes.txt:60: -i "Content-Type: application/pgp; format=text; x-action=encrypt" /mutt-1.5.19/doc/PGP-Notes.txt:64: * ^-----BEGIN PGP SIGNATURE----- /mutt-1.5.19/doc/PGP-Notes.txt:65: * ^-----END PGP SIGNATURE----- /mutt-1.5.19/doc/PGP-Notes.txt:80:BPGPS="-----BEGIN PGP SIGNATURE-----" /mutt-1.5.19/doc/PGP-Notes.txt:81:EPGPS="-----END PGP SIGNATURE-----" /mutt-1.5.19/doc/PGP-Notes.txt:88: x-action=encrypt'" /mutt-1.5.19/doc/PGP-Notes.txt:224: containing the detached signature. %s expands to this /mutt-1.5.19/doc/PGP-Notes.txt:239: $pgp_verify_command Verify a PGP/MIME signature. /mutt-1.5.19/doc/PGP-Notes.txt:241: $pgp_decrypt_command Decrypt a PGP/MIME encrypted MIME body. /mutt-1.5.19/doc/PGP-Notes.txt:248: $pgp_encrypt_sign_command Encrypt and sign a MIME body. This /mutt-1.5.19/doc/PGP-Notes.txt:251: $pgp_encrypt_only_command Encrypt a MIME body, but don't sign it. /mutt-1.5.19/doc/manual.txt:149: 2. SSL/TLS Support /mutt-1.5.19/doc/manual.txt:331: 3.154. smime_decrypt_use_default_key /mutt-1.5.19/doc/manual.txt:349: 3.172. pgp_decrypt_command /mutt-1.5.19/doc/manual.txt:352: 3.175. pgp_encrypt_sign_command /mutt-1.5.19/doc/manual.txt:353: 3.176. pgp_encrypt_only_command /mutt-1.5.19/doc/manual.txt:359: 3.182. forward_decrypt /mutt-1.5.19/doc/manual.txt:361: 3.184. smime_encrypt_with /mutt-1.5.19/doc/manual.txt:365: 3.188. smime_decrypt_command /mutt-1.5.19/doc/manual.txt:370: 3.193. smime_encrypt_command /mutt-1.5.19/doc/manual.txt:377: 3.200. ssl_client_cert /mutt-1.5.19/doc/manual.txt:378: 3.201. ssl_force_tls /mutt-1.5.19/doc/manual.txt:379: 3.202. ssl_starttls /mutt-1.5.19/doc/manual.txt:381: 3.204. ssl_usesystemcerts /mutt-1.5.19/doc/manual.txt:383: 3.206. ssl_use_sslv2 /mutt-1.5.19/doc/manual.txt:384: 3.207. ssl_use_sslv3 /mutt-1.5.19/doc/manual.txt:385: 3.208. ssl_use_tlsv1 /mutt-1.5.19/doc/manual.txt:386: 3.209. ssl_min_dh_prime_bits /mutt-1.5.19/doc/manual.txt:387: 3.210. ssl_ca_certificates_file /mutt-1.5.19/doc/manual.txt:440: 3.263. signature /mutt-1.5.19/doc/manual.txt:994:|S |message is signed, and the signature is successfully verified| /mutt-1.5.19/doc/manual.txt:1341:specified a $signature, it will be appended to the message. /mutt-1.5.19/doc/manual.txt:1376:|S | |select S/MIME options | /mutt-1.5.19/doc/manual.txt:1440:If you have told mutt to PGP or S/MIME encrypt a message, it will guide you /mutt-1.5.19/doc/manual.txt:1473:|c |There are unknown critical self-signature packets.| /mutt-1.5.19/doc/manual.txt:1480:encryption. A dot (?.?) means that it's marked as a signature key in one of the /mutt-1.5.19/doc/manual.txt:1931: The pgp menu is used to select the OpenPGP keys used to encrypt outgoing /mutt-1.5.19/doc/manual.txt:1936: The smime menu is used to select the OpenSSL certificates used to encrypt /mutt-1.5.19/doc/manual.txt:2157: * signature /mutt-1.5.19/doc/manual.txt:2587:Example: send-hook mutt "set mime_forward signature=''" /mutt-1.5.19/doc/manual.txt:2590:$attribution, $signature and $locale variables in order to change the language /mutt-1.5.19/doc/manual.txt:2626:When encrypting messages with PGP/GnuPG or OpenSSL, you may want to associate a /mutt-1.5.19/doc/manual.txt:4423:## I've added x-pkcs7 to this, since it functions (for S/MIME) /mutt-1.5.19/doc/manual.txt:4424:## analogously to PGP signature attachments. S/MIME isn't supported /mutt-1.5.19/doc/manual.txt:4480:2. SSL/TLS Support /mutt-1.5.19/doc/manual.txt:4508:communication instead of OpenSSL, mutt -v would contain: /mutt-1.5.19/doc/manual.txt:4510:-USE_SSL_OPENSSL +USE_SSL_GNUTLS /mutt-1.5.19/doc/manual.txt:4522:establish an encrypted communication using SSL or TLS. If no explicit port is /mutt-1.5.19/doc/manual.txt:4537:make mutt attempt to connect using SSL or TLS on a different port to encrypt /mutt-1.5.19/doc/manual.txt:4540:2. SSL/TLS Support /mutt-1.5.19/doc/manual.txt:4543:compiled with support for SSL or TLS using either OpenSSL or GnuTLS ( by /mutt-1.5.19/doc/manual.txt:4544:running the configure script with the --enable-ssl=... option for OpenSSL or /mutt-1.5.19/doc/manual.txt:4545:--enable-gnutls=... for GnuTLS). Mutt can then attempt to encrypt communication /mutt-1.5.19/doc/manual.txt:4582:imapserver[:port][/ssl]}path/to/folder /mutt-1.5.19/doc/manual.txt:4629:CRAM-MD5, and LOGIN (there is a patch by Grant Edwards to add NTLM /mutt-1.5.19/doc/manual.txt:4636:(including GSSAPI, CRAM-MD5, ANONYMOUS, and DIGEST-MD5) the most secure method /mutt-1.5.19/doc/manual.txt:4638:DIGEST-MD5 and possibly GSSAPI), your entire session will be encrypted and /mutt-1.5.19/doc/manual.txt:4644:the following order: SASL, ANONYMOUS, GSSAPI, CRAM-MD5, LOGIN. /mutt-1.5.19/doc/manual.txt:4672:The built-in SMTP support supports encryption (the smtps protocol using SSL or /mutt-1.5.19/doc/manual.txt:4673:TLS) as well as SMTP authentication using SASL. The authentication mechanisms /mutt-1.5.19/doc/manual.txt:4726:named by the MD5 checksums of their path. These database files may be safely /mutt-1.5.19/doc/manual.txt:4732:The md5sum command may also be named md5, depending on your operating system. /mutt-1.5.19/doc/manual.txt:5009: 3.154. smime_decrypt_use_default_key /mutt-1.5.19/doc/manual.txt:5027: 3.172. pgp_decrypt_command /mutt-1.5.19/doc/manual.txt:5030: 3.175. pgp_encrypt_sign_command /mutt-1.5.19/doc/manual.txt:5031: 3.176. pgp_encrypt_only_command /mutt-1.5.19/doc/manual.txt:5037: 3.182. forward_decrypt /mutt-1.5.19/doc/manual.txt:5039: 3.184. smime_encrypt_with /mutt-1.5.19/doc/manual.txt:5043: 3.188. smime_decrypt_command /mutt-1.5.19/doc/manual.txt:5048: 3.193. smime_encrypt_command /mutt-1.5.19/doc/manual.txt:5055: 3.200. ssl_client_cert /mutt-1.5.19/doc/manual.txt:5056: 3.201. ssl_force_tls /mutt-1.5.19/doc/manual.txt:5057: 3.202. ssl_starttls /mutt-1.5.19/doc/manual.txt:5059: 3.204. ssl_usesystemcerts /mutt-1.5.19/doc/manual.txt:5061: 3.206. ssl_use_sslv2 /mutt-1.5.19/doc/manual.txt:5062: 3.207. ssl_use_sslv3 /mutt-1.5.19/doc/manual.txt:5063: 3.208. ssl_use_tlsv1 /mutt-1.5.19/doc/manual.txt:5064: 3.209. ssl_min_dh_prime_bits /mutt-1.5.19/doc/manual.txt:5065: 3.210. ssl_ca_certificates_file /mutt-1.5.19/doc/manual.txt:5118: 3.263. signature /mutt-1.5.19/doc/manual.txt:5868:set and Mutt was built with gpgme support, the gpgme code for S/MIME and PGP /mutt-1.5.19/doc/manual.txt:5878:pka-intro.de.pdf) during signature verification (only supported by the GPGME /mutt-1.5.19/doc/manual.txt:5895:This variable controls whether or not mutt may automatically enable S/MIME /mutt-1.5.19/doc/manual.txt:6421:xxx? capability string, eg ?digest-md5?, ?gssapi? or ?cram-md5?. This option is /mutt-1.5.19/doc/manual.txt:6427:set imap_authenticators="gssapi:cram-md5:login" /mutt-1.5.19/doc/manual.txt:7225:$smime_is_default is set, then OpenSSL is used instead to create S/MIME /mutt-1.5.19/doc/manual.txt:7234:Setting this variable will cause Mutt to always attempt to PGP encrypt outgoing /mutt-1.5.19/doc/manual.txt:7238:OpenSSL is used instead to create S/MIME messages and settings can be /mutt-1.5.19/doc/manual.txt:7255:If set, automatically PGP or OpenSSL encrypt replies to messages which are /mutt-1.5.19/doc/manual.txt:7263:If set, automatically PGP or OpenSSL sign replies to messages which are signed. /mutt-1.5.19/doc/manual.txt:7273:If set, automatically PGP or OpenSSL sign replies to messages which are /mutt-1.5.19/doc/manual.txt:7284:If set, mutt will include a time stamp in the lines surrounding PGP or S/MIME /mutt-1.5.19/doc/manual.txt:7300:If ?yes?, always attempt to verify PGP or S/MIME signatures. If ?ask-*?, ask /mutt-1.5.19/doc/manual.txt:7301:whether or not to verify the signature. If \Fi?no?, never attempt to verify /mutt-1.5.19/doc/manual.txt:7310:operations. To override and to use OpenSSL instead this must be set. However, /mutt-1.5.19/doc/manual.txt:7312:same application that was used to sign/encrypt the original message. (Note that /mutt-1.5.19/doc/manual.txt:7313:this variable can be overridden by unsetting $crypt_autosmime.) (S/MIME only) /mutt-1.5.19/doc/manual.txt:7324:3.154. smime_decrypt_use_default_key /mutt-1.5.19/doc/manual.txt:7332:if it can't find one. (S/MIME only) /mutt-1.5.19/doc/manual.txt:7386:If you assign a text to this variable, then a PGP signature is only considered /mutt-1.5.19/doc/manual.txt:7538:If set, mutt will automatically attempt to decrypt traditional PGP messages /mutt-1.5.19/doc/manual.txt:7566: Expands to the name of a file containing the signature part of a multipart/ /mutt-1.5.19/doc/manual.txt:7601:3.172. pgp_decrypt_command /mutt-1.5.19/doc/manual.txt:7606:This command is used to decrypt a PGP encrypted message. /mutt-1.5.19/doc/manual.txt:7627:This command is used to create the detached PGP signature for a multipart/ /mutt-1.5.19/doc/manual.txt:7633:3.175. pgp_encrypt_sign_command /mutt-1.5.19/doc/manual.txt:7638:This command is used to both sign and encrypt a body part. /mutt-1.5.19/doc/manual.txt:7643:3.176. pgp_encrypt_only_command /mutt-1.5.19/doc/manual.txt:7648:This command is used to encrypt a body part without signing it. /mutt-1.5.19/doc/manual.txt:7716:3.182. forward_decrypt /mutt-1.5.19/doc/manual.txt:7731:(S/MIME only) /mutt-1.5.19/doc/manual.txt:7733:3.184. smime_encrypt_with /mutt-1.5.19/doc/manual.txt:7739:?des?, ?des3?, ?rc2-40?, ?rc2-64?, ?rc2-128?. If unset, ?3des? (TripleDES) is /mutt-1.5.19/doc/manual.txt:7740:used. (S/MIME only) /mutt-1.5.19/doc/manual.txt:7747:Since for S/MIME there is no pubring/secring as with PGP, mutt has to handle /mutt-1.5.19/doc/manual.txt:7750:the hash-value retrieved from OpenSSL. There is an index file which contains /mutt-1.5.19/doc/manual.txt:7752:points to the location of the private keys. (S/MIME only) /mutt-1.5.19/doc/manual.txt:7760:trusted certificates for use with OpenSSL. (S/MIME only) /mutt-1.5.19/doc/manual.txt:7767:Since for S/MIME there is no pubring/secring as with PGP, mutt has to handle /mutt-1.5.19/doc/manual.txt:7770:hash-value retrieved from OpenSSL. There is an index file which contains /mutt-1.5.19/doc/manual.txt:7772:points to the location of the certificates. (S/MIME only) /mutt-1.5.19/doc/manual.txt:7774:3.188. smime_decrypt_command /mutt-1.5.19/doc/manual.txt:7779:This format string specifies a command which is used to decrypt application/ /mutt-1.5.19/doc/manual.txt:7782:The OpenSSL command formats have their own set of printf(3)-like sequences /mutt-1.5.19/doc/manual.txt:7791: Expands to the name of a file containing the signature part of a multipart/ /mutt-1.5.19/doc/manual.txt:7814:documentation. (S/MIME only) /mutt-1.5.19/doc/manual.txt:7821:This command is used to verify S/MIME signatures of type multipart/signed. /mutt-1.5.19/doc/manual.txt:7823:This is a format string, see the $smime_decrypt_command command for possible /mutt-1.5.19/doc/manual.txt:7824:printf(3)-like sequences. (S/MIME only) /mutt-1.5.19/doc/manual.txt:7831:This command is used to verify S/MIME signatures of type application/ /mutt-1.5.19/doc/manual.txt:7834:This is a format string, see the $smime_decrypt_command command for possible /mutt-1.5.19/doc/manual.txt:7835:printf(3)-like sequences. (S/MIME only) /mutt-1.5.19/doc/manual.txt:7842:This command is used to created S/MIME signatures of type multipart/signed, /mutt-1.5.19/doc/manual.txt:7845:This is a format string, see the $smime_decrypt_command command for possible /mutt-1.5.19/doc/manual.txt:7846:printf(3)-like sequences. (S/MIME only) /mutt-1.5.19/doc/manual.txt:7853:This command is used to created S/MIME signatures of type application/ /mutt-1.5.19/doc/manual.txt:7854:x-pkcs7-signature, which can only be handled by mail clients supporting the S/ /mutt-1.5.19/doc/manual.txt:7857:This is a format string, see the $smime_decrypt_command command for possible /mutt-1.5.19/doc/manual.txt:7858:printf(3)-like sequences. (S/MIME only) /mutt-1.5.19/doc/manual.txt:7860:3.193. smime_encrypt_command /mutt-1.5.19/doc/manual.txt:7865:This command is used to create encrypted S/MIME messages. /mutt-1.5.19/doc/manual.txt:7867:This is a format string, see the $smime_decrypt_command command for possible /mutt-1.5.19/doc/manual.txt:7868:printf(3)-like sequences. (S/MIME only) /mutt-1.5.19/doc/manual.txt:7875:This command is used to extract PKCS7 structures of S/MIME signatures, in order /mutt-1.5.19/doc/manual.txt:7878:This is a format string, see the $smime_decrypt_command command for possible /mutt-1.5.19/doc/manual.txt:7879:printf(3)-like sequences. (S/MIME only) /mutt-1.5.19/doc/manual.txt:7888:This is a format string, see the $smime_decrypt_command command for possible /mutt-1.5.19/doc/manual.txt:7889:printf(3)-like sequences. (S/MIME only) /mutt-1.5.19/doc/manual.txt:7896:This command is used to extract only the signers X509 certificate from a S/MIME /mutt-1.5.19/doc/manual.txt:7897:signature, so that the certificate's owner may get compared to the email's /mutt-1.5.19/doc/manual.txt:7900:This is a format string, see the $smime_decrypt_command command for possible /mutt-1.5.19/doc/manual.txt:7901:printf(3)-like sequences. (S/MIME only) /mutt-1.5.19/doc/manual.txt:7910:This is a format string, see the $smime_decrypt_command command for possible /mutt-1.5.19/doc/manual.txt:7911:printf(3)-like sequences. (S/MIME only) /mutt-1.5.19/doc/manual.txt:7922:This is a format string, see the $smime_decrypt_command command for possible /mutt-1.5.19/doc/manual.txt:7923:printf(3)-like sequences. (S/MIME only) /mutt-1.5.19/doc/manual.txt:7931:(the hash-value that OpenSSL generates) to work properly (S/MIME only) /mutt-1.5.19/doc/manual.txt:7933:3.200. ssl_client_cert /mutt-1.5.19/doc/manual.txt:7940:3.201. ssl_force_tls /mutt-1.5.19/doc/manual.txt:7946:servers be encrypted. Furthermore it will attempt to negotiate TLS even if the /mutt-1.5.19/doc/manual.txt:7948:abort the connection anyway. This option supersedes $ssl_starttls. /mutt-1.5.19/doc/manual.txt:7950:3.202. ssl_starttls /mutt-1.5.19/doc/manual.txt:7978:3.204. ssl_usesystemcerts /mutt-1.5.19/doc/manual.txt:7991:The file which includes random data that is used to initialize SSL library /mutt-1.5.19/doc/manual.txt:7994:3.206. ssl_use_sslv2 /mutt-1.5.19/doc/manual.txt:7999:This variables specifies whether to attempt to use SSLv2 in the SSL /mutt-1.5.19/doc/manual.txt:8002:3.207. ssl_use_sslv3 /mutt-1.5.19/doc/manual.txt:8007:This variables specifies whether to attempt to use SSLv3 in the SSL /mutt-1.5.19/doc/manual.txt:8010:3.208. ssl_use_tlsv1 /mutt-1.5.19/doc/manual.txt:8015:This variables specifies whether to attempt to use TLSv1 in the SSL /mutt-1.5.19/doc/manual.txt:8018:3.209. ssl_min_dh_prime_bits /mutt-1.5.19/doc/manual.txt:8024:any Diffie-Hellman key exchange. A value of 0 will use the default from the /mutt-1.5.19/doc/manual.txt:8027:3.210. ssl_ca_certificates_file /mutt-1.5.19/doc/manual.txt:8038:set ssl_ca_certificates_file=/etc/ssl/certs/ca-certificates.crt /mutt-1.5.19/doc/manual.txt:8077:?digest-md5?, ?gssapi? or ?cram-md5?. This option is case-insensitive. If this /mutt-1.5.19/doc/manual.txt:8083:set pop_authenticators="digest-md5:apop:user" /mutt-1.5.19/doc/manual.txt:8653:before your $signature. It is strongly recommended that you not unset this /mutt-1.5.19/doc/manual.txt:8654:variable unless your signature contains just your name. The reason for this is /mutt-1.5.19/doc/manual.txt:8655:because many software packages use ?-- \n? to detect your signature. For /mutt-1.5.19/doc/manual.txt:8656:example, Mutt has the ability to highlight the signature in a different color /mutt-1.5.19/doc/manual.txt:8664:If set, the signature will be included before any quoted or forwarded text. It /mutt-1.5.19/doc/manual.txt:8669:3.263. signature /mutt-1.5.19/doc/manual.txt:8672:Default: ??/.signature? /mutt-1.5.19/doc/manual.txt:8674:Specifies the filename of your signature, which is appended to all outgoing /mutt-1.5.19/doc/manual.txt:8727:Authentication methods are any SASL mechanism, eg ?digest-md5?, ?gssapi? or /mutt-1.5.19/doc/manual.txt:8728:?cram-md5?. This option is case-insensitive. If it is ?unset? (the default) /mutt-1.5.19/doc/manual.txt:8733:set smtp_authenticators="digest-md5:cram-md5" /mutt-1.5.19/doc/manual.txt:9574:| | |make decrypted copy | /mutt-1.5.19/doc/manual.txt:9576:| | |make decrypted copy and delete | /mutt-1.5.19/doc/manual.txt:9748:| | |make decrypted copy | /mutt-1.5.19/doc/manual.txt:9750:| | |make decrypted copy and delete | /mutt-1.5.19/doc/manual.txt:9923:| |S |show S/MIME options | /mutt-1.5.19/doc/muttrc.man.head:226:.BR search ", " signature ", " status ", " tilde ", " tree ", " /mutt-1.5.19/doc/smime-notes.txt:1:How to add use mutt's S/MIME capabilities /mutt-1.5.19/doc/smime-notes.txt:8:- Download and install OpenSSL. /mutt-1.5.19/doc/smime-notes.txt:28: time you sign or decrypt a message, mutt will ask for the PEM pass /mutt-1.5.19/doc/smime-notes.txt:53:Key management is done in a way similar to OpenSSL's CA directory. Private /mutt-1.5.19/doc/smime-notes.txt:54:keys and certificates are stored in different directories, as OpenSSL /mutt-1.5.19/doc/smime-notes.txt:60: and supplied by OpenSSL. /mutt-1.5.19/doc/smime-notes.txt:97:application/x-pkcs7-signature;openssl pkcs7 -in %s -inform der -noout \ /mutt-1.5.19/doc/manual.html:25:


Table of Contents

1. Introduction
1. Mutt Home Page
2. Mailing Lists
3. Software Distribution Sites
4. Mutt online resources
5. Contributing to Mutt
6. Typograhical conventions
7. Copyright
2. Getting Started
1. Core concepts
2. Moving Around in Menus
3. Editing Input Fields
3.1. Introduction
3.2. History
4. Reading Mail - The Index and Pager
4.1. The Message Index
4.2. The Pager
4.3. Threaded Mode
4.4. Miscellaneous Functions
5. Sending Mail
5.1. Introduction
5.2. Editing the message header
5.3. Sending cryptographically signed/encrypted messages
5.4. Sending anonymous messages via mixmaster
5.5. Sending format=flowed messages
6. Forwarding and Bouncing Mail
7. Postponing Mail
3. Configuration
1. Location of initialization files
2. Syntax of Initialization Files
3. Address groups
4. Defining/Using aliases
5. Changing the default key bindings
6. Defining aliases for character sets
7. Setting variables based upon mailbox
8. Keyboard macros
9. Using color and mono video attributes
10. Message header display
11. Alternative addresses
12. Mailing lists
13. Using Multiple spool mailboxes
14. Monitoring incoming mail
15. User defined headers
16. Specify default save mailbox
17. Specify default Fcc: mailbox when composing
18. Specify default save filename and default Fcc: mailbox at once
19. Change settings based upon message recipients
20. Change settings before formatting a message
21. Choosing the cryptographic key of the recipient
22. Adding key sequences to the keyboard buffer
23. Executing functions
24. Message Scoring
25. Spam detection
26. Setting and Querying Variables
26.1. Commands
26.2. User-defined variables
27. Reading initialization commands from another file
28. Removing hooks
29. Format Strings
29.1. Basic usage
29.2. Filters
4. Advanced Usage
1. Regular Expressions
2. Patterns: Searching, Limiting and Tagging
2.1. Pattern Modifier
2.2. Simple Patterns
2.3. Complex Patterns
2.4. Searching by Date
3. Using Tags
4. Using Hooks
4.1. Message Matching in Hooks
5. External Address Queries
6. Mailbox Formats
7. Mailbox Shortcuts
8. Handling Mailing Lists
9. Handling multiple folders
10. Editing threads
10.1. Linking threads
10.2. Breaking threads
11. Delivery Status Notification (DSN) Support
12. Start a WWW Browser on URLs
5. Mutt's MIME Support
1. Using MIME in Mutt
1.1. Viewing MIME messages in the pager
1.2. The Attachment Menu
1.3. The Compose Menu
2. MIME Type configuration with mime.types
3. MIME Viewer configuration with mailcap
3.1. The Basics of the mailcap file
3.2. Secure use of mailcap
3.3. Advanced mailcap Usage
3.4. Example mailcap files
4. MIME Autoview
5. MIME Multipart/Alternative
6. Attachment Searching and Counting
7. MIME Lookup
6. Optional features
1. General notes
1.1. Enabling/disabling features
1.2. URL syntax
2. SSL/TLS Support
3. POP3 Support
4. IMAP Support
4.1. The Folder Browser
4.2. Authentication
5. SMTP Support
6. Managing multiple accounts
7. Local caching
7.1. Header caching
7.2. Body caching
7.3. Maintenance
8. Exact address generation
7. Performance tuning
1. Reading and writing mailboxes
2. Reading messages from remote folders
3. Searching and limiting
8. Reference
1. Command line options
2. Configuration Commands
3. Configuration variables
3.1. abort_nosubject
3.2. abort_unmodified
3.3. alias_file
3.4. alias_format
3.5. allow_8bit
3.6. allow_ansi
3.7. arrow_cursor
3.8. ascii_chars
3.9. askbcc
3.10. askcc
3.11. assumed_charset
3.12. attach_charset
3.13. attach_format
3.14. attach_sep
3.15. attach_split
3.16. attribution
3.17. autoedit
3.18. auto_tag
3.19. beep
3.20. beep_new
3.21. bounce
3.22. bounce_delivered
3.23. braille_friendly
3.24. check_mbox_size
3.25. charset
3.26. check_new
3.27. collapse_unread
3.28. uncollapse_jump
3.29. compose_format
3.30. config_charset
3.31. confirmappend
3.32. confirmcreate
3.33. connect_timeout
3.34. content_type
3.35. copy
3.36. crypt_use_gpgme
3.37. crypt_use_pka
3.38. crypt_autopgp
3.39. crypt_autosmime
3.40. date_format
3.41. default_hook
3.42. delete
3.43. delete_untag
3.44. digest_collapse
3.45. display_filter
3.46. dotlock_program
3.47. dsn_notify
3.48. dsn_return
3.49. duplicate_threads
3.50. edit_headers
3.51. editor
3.52. encode_from
3.53. envelope_from_address
3.54. escape
3.55. fast_reply
3.56. fcc_attach
3.57. fcc_clear
3.58. folder
3.59. folder_format
3.60. followup_to
3.61. force_name
3.62. forward_decode
3.63. forward_edit
3.64. forward_format
3.65. forward_quote
3.66. from
3.67. gecos_mask
3.68. hdrs
3.69. header
3.70. help
3.71. hidden_host
3.72. hide_limited
3.73. hide_missing
3.74. hide_thread_subject
3.75. hide_top_limited
3.76. hide_top_missing
3.77. history
3.78. history_file
3.79. honor_followup_to
3.80. hostname
3.81. ignore_linear_white_space
3.82. ignore_list_reply_to
3.83. imap_authenticators
3.84. imap_check_subscribed
3.85. imap_delim_chars
3.86. imap_headers
3.87. imap_idle
3.88. imap_keepalive
3.89. imap_list_subscribed
3.90. imap_login
3.91. imap_pass
3.92. imap_passive
3.93. imap_peek
3.94. imap_pipeline_depth
3.95. imap_servernoise
3.96. imap_user
3.97. implicit_autoview
3.98. include
3.99. include_onlyfirst
3.100. indent_string
3.101. index_format
3.102. ispell
3.103. keep_flagged
3.104. locale
3.105. mail_check
3.106. mailcap_path
3.107. mailcap_sanitize
3.108. header_cache
3.109. maildir_header_cache_verify
3.110. header_cache_pagesize
3.111. header_cache_compress
3.112. maildir_trash
3.113. mark_old
3.114. markers
3.115. mask
3.116. mbox
3.117. mbox_type
3.118. metoo
3.119. menu_context
3.120. menu_move_off
3.121. menu_scroll
3.122. meta_key
3.123. mh_purge
3.124. mh_seq_flagged
3.125. mh_seq_replied
3.126. mh_seq_unseen
3.127. mime_forward
3.128. mime_forward_decode
3.129. mime_forward_rest
3.130. mix_entry_format
3.131. mixmaster
3.132. move
3.133. message_cachedir
3.134. message_cache_clean
3.135. message_format
3.136. narrow_tree
3.137. net_inc
3.138. pager
3.139. pager_context
3.140. pager_format
3.141. pager_index_lines
3.142. pager_stop
3.143. crypt_autosign
3.144. crypt_autoencrypt
3.145. pgp_ignore_subkeys
3.146. crypt_replyencrypt
3.147. crypt_replysign
3.148. crypt_replysignencrypted
3.149. crypt_timestamp
3.150. pgp_use_gpg_agent
3.151. crypt_verify_sig
3.152. smime_is_default
3.153. smime_ask_cert_label
3.154. smime_decrypt_use_default_key
3.155. pgp_entry_format
3.156. pgp_good_sign
3.157. pgp_check_exit
3.158. pgp_long_ids
3.159. pgp_retainable_sigs
3.160. pgp_autoinline
3.161. pgp_replyinline
3.162. pgp_show_unusable
3.163. pgp_sign_as
3.164. pgp_strict_enc
3.165. pgp_timeout
3.166. pgp_sort_keys
3.167. pgp_mime_auto
3.168. pgp_auto_decode
3.169. pgp_decode_command
3.170. pgp_getkeys_command
3.171. pgp_verify_command
3.172. pgp_decrypt_command
3.173. pgp_clearsign_command
3.174. pgp_sign_command
3.175. pgp_encrypt_sign_command
3.176. pgp_encrypt_only_command
3.177. pgp_import_command
3.178. pgp_export_command
3.179. pgp_verify_key_command
3.180. pgp_list_secring_command
3.181. pgp_list_pubring_command
3.182. forward_decrypt
3.183. smime_timeout
3.184. smime_encrypt_with
3.185. smime_keys
3.186. smime_ca_location
3.187. smime_certificates
3.188. smime_decrypt_command
3.189. smime_verify_command
3.190. smime_verify_opaque_command
3.191. smime_sign_command
3.192. smime_sign_opaque_command
3.193. smime_encrypt_command
3.194. smime_pk7out_command
3.195. smime_get_cert_command
3.196. smime_get_signer_cert_command
3.197. smime_import_cert_command
3.198. smime_get_cert_email_command
3.199. smime_default_key
3.200. ssl_client_cert
3.201. ssl_force_tls
3.202. ssl_starttls
3.203. certificate_file
3.204. ssl_usesystemcerts
3.205. entropy_file
3.206. ssl_use_sslv2
3.207. ssl_use_sslv3
3.208. ssl_use_tlsv1
3.209. ssl_min_dh_prime_bits
3.210. ssl_ca_certificates_file
3.211. pipe_split
3.212. pipe_decode
3.213. pipe_sep
3.214. pop_authenticators
3.215. pop_auth_try_all
3.216. pop_checkinterval
3.217. pop_delete
3.218. pop_host
3.219. pop_last
3.220. pop_reconnect
3.221. pop_user
3.222. pop_pass
3.223. post_indent_string
3.224. postpone
3.225. postponed
3.226. preconnect
3.227. print
3.228. print_command
3.229. print_decode
3.230. print_split
3.231. prompt_after
3.232. query_command
3.233. query_format
3.234. quit
3.235. quote_regexp
3.236. read_inc
3.237. read_only
3.238. realname
3.239. recall
3.240. record
3.241. reply_regexp
3.242. reply_self
3.243. reply_to
3.244. resolve
3.245. reverse_alias
3.246. reverse_name
3.247. reverse_realname
3.248. rfc2047_parameters
3.249. save_address
3.250. save_empty
3.251. save_history
3.252. save_name
3.253. score
3.254. score_threshold_delete
3.255. score_threshold_flag
3.256. score_threshold_read
3.257. send_charset
3.258. sendmail
3.259. sendmail_wait
3.260. shell
3.261. sig_dashes
3.262. sig_on_top
3.263. signature
3.264. simple_search
3.265. smart_wrap
3.266. smileys
3.267. sleep_time
3.268. smtp_authenticators
3.269. smtp_pass
3.270. smtp_url
3.271. sort
3.272. sort_alias
3.273. sort_aux
3.274. sort_browser
3.275. sort_re
3.276. spam_separator
3.277. spoolfile
3.278. status_chars
3.279. status_format
3.280. status_on_top
3.281. strict_threads
3.282. suspend
3.283. text_flowed
3.284. thread_received
3.285. thorough_search
3.286. tilde
3.287. time_inc
3.288. timeout
3.289. tmpdir
3.290. to_chars
3.291. tunnel
3.292. use_8bitmime
3.293. use_domain
3.294. use_envelope_from
3.295. use_from
3.296. use_idn
3.297. use_ipv6
3.298. user_agent
3.299. visual
3.300. wait_key
3.301. weed
3.302. wrap
3.303. wrap_search
3.304. wrapmargin
3.305. write_inc
3.306. write_bcc
4. Functions
4.1. generic menu
4.2. index menu
4.3. pager menu
4.4. alias menu
4.5. query menu
4.6. attach menu
4.7. compose menu
4.8. postpone menu
4.9. browser menu
4.10. pgp menu
4.11. smime menu
4.12. mix menu
4.13. editor menu
9. Miscellany
1. Acknowledgements
2. About this document

Chapter 1. Introduction

/mutt-1.5.19/doc/manual.html:217:

Table 2.4. Message status flags

FlagDescription
Dmessage is deleted (is marked for deletion)
dmessage has attachments marked for deletion
Kcontains a PGP public key
Nmessage is new
Omessage is old
Pmessage is PGP encrypted
rmessage has been replied to
Smessage is signed, and the signature is successfully verified
smessage is signed
!message is flagged
*message is tagged

Table 2.5. Message recipient flags

FlagDescription
+message is to you and you only
Tmessage is to you, but also to or cc'ed to others
Cmessage is cc'ed to you
Fmessage is from you
Lmessage is sent to a subscribed mailing list

4.2. The Pager

/mutt-1.5.19/doc/manual.html:419:you have specified a $signature, it /mutt-1.5.19/doc/manual.html:426:

Table 2.11. Most common compose menu keys

KeyFunctionDescription
a<attach-file>attach a file
A<attach-message>attach message(s) to the message
Esc k<attach-key>attach a PGP public key
d<edit-description>edit description on attachment
D<detach-file>detach a file
t<edit-to>edit the To field
Esc f<edit-from>edit the From field
r<edit-reply-to>edit the Reply-To field
c<edit-cc>edit the Cc field
b<edit-bcc>edit the Bcc field
y<send-message>send the message
s<edit-subject>edit the Subject
S<smime-menu>select S/MIME options
f<edit-fcc>specify an “Fcc” mailbox
p<pgp-menu>select PGP options
P<postpone-message>postpone this message until later
q<quit>quit (abort) sending the message
w<write-fcc>write the message to a folder
i<ispell>check spelling (if available on your system)
^F<forget-passphrase>wipe passphrase(s) from memory

/mutt-1.5.19/doc/manual.html:471:If you have told mutt to PGP or S/MIME encrypt a message, it will guide you /mutt-1.5.19/doc/manual.html:494:

Table 2.12. PGP key menu flags

FlagDescription
RThe key has been revoked and can't be used.
XThe key is expired and can't be used.
dYou have marked the key as disabled.
cThere are unknown critical self-signature packets.

/mutt-1.5.19/doc/manual.html:499:it's marked as a signature key in one of the user IDs, but may /mutt-1.5.19/doc/manual.html:895:The pgp menu is used to select the OpenPGP keys used to encrypt outgoing /mutt-1.5.19/doc/manual.html:898:The smime menu is used to select the OpenSSL certificates used to encrypt outgoing /mutt-1.5.19/doc/manual.html:1057:

  • attachment

  • bold (hiliting bold patterns in the body of messages)

  • error (error messages printed by Mutt)

  • hdrdefault (default color of the message header in the pager)

  • indicator (arrow or bar used to indicate the current item in a menu)

  • markers (the “+” markers at the beginning of wrapped lines in the pager)

  • message (informational messages)

  • normal

  • quoted (text matching $quote_regexp in the body of a message)

  • quoted1, quoted2, ..., quotedN (higher levels of quoting)

  • search (hiliting of words in the pager)

  • signature

  • status (mode lines used to display info about the mailbox or message)

  • tilde (the “˜” used to pad blank lines in the pager)

  • tree (thread tree drawn in the message index and attachment menu)

  • underline (hiliting underlined patterns in the body of messages)

/mutt-1.5.19/doc/manual.html:1481:Example: send-hook mutt "set mime_forward signature=''" /mutt-1.5.19/doc/manual.html:1484:$attribution, $signature and $locale /mutt-1.5.19/doc/manual.html:1517:When encrypting messages with PGP/GnuPG or OpenSSL, you may want to associate a certain /mutt-1.5.19/doc/manual.html:2991:## I've added x-pkcs7 to this, since it functions (for S/MIME) /mutt-1.5.19/doc/manual.html:2992:## analogously to PGP signature attachments. S/MIME isn't supported /mutt-1.5.19/doc/manual.html:3037:

Chapter 6. Optional features

1. General notes

1.1. Enabling/disabling features

/mutt-1.5.19/doc/manual.html:3047:OpenSSL, mutt -v would contain: /mutt-1.5.19/doc/manual.html:3049:-USE_SSL_OPENSSL +USE_SSL_GNUTLS

1.2. URL syntax

/mutt-1.5.19/doc/manual.html:3061:using SSL or TLS. If no explicit port is given, mutt will use the /mutt-1.5.19/doc/manual.html:3078:would make mutt attempt to connect using SSL or TLS on a different port /mutt-1.5.19/doc/manual.html:3079:to encrypt the communication. /mutt-1.5.19/doc/manual.html:3080:

2. SSL/TLS Support

/mutt-1.5.19/doc/manual.html:3082:compiled with support for SSL or TLS using either OpenSSL or GnuTLS ( /mutt-1.5.19/doc/manual.html:3084:--enable-ssl=... option for OpenSSL or /mutt-1.5.19/doc/manual.html:3086:attempt to encrypt communication with remote servers if these protocols /mutt-1.5.19/doc/manual.html:3121:{[username@]imapserver[:port][/ssl]}path/to/folder /mutt-1.5.19/doc/manual.html:3172:GSSAPI, CRAM-MD5, and LOGIN (there is a patch by Grant Edwards to add /mutt-1.5.19/doc/manual.html:3180:(including GSSAPI, CRAM-MD5, ANONYMOUS, and DIGEST-MD5) the most secure /mutt-1.5.19/doc/manual.html:3182:(including DIGEST-MD5 and possibly GSSAPI), your entire session will be /mutt-1.5.19/doc/manual.html:3188:in the following order: SASL, ANONYMOUS, GSSAPI, CRAM-MD5, LOGIN. /mutt-1.5.19/doc/manual.html:3219:using SSL or TLS) as well as SMTP authentication using SASL. The authentication mechanisms /mutt-1.5.19/doc/manual.html:3271:folders will be named by the MD5 checksums of their path. These database /mutt-1.5.19/doc/manual.html:3279:named md5, depending on your operating system. /mutt-1.5.19/doc/manual.html:3386:

Chapter 8. Reference

Table of Contents

1. Command line options
2. Configuration Commands
3. Configuration variables
3.1. abort_nosubject
3.2. abort_unmodified
3.3. alias_file
3.4. alias_format
3.5. allow_8bit
3.6. allow_ansi
3.7. arrow_cursor
3.8. ascii_chars
3.9. askbcc
3.10. askcc
3.11. assumed_charset
3.12. attach_charset
3.13. attach_format
3.14. attach_sep
3.15. attach_split
3.16. attribution
3.17. autoedit
3.18. auto_tag
3.19. beep
3.20. beep_new
3.21. bounce
3.22. bounce_delivered
3.23. braille_friendly
3.24. check_mbox_size
3.25. charset
3.26. check_new
3.27. collapse_unread
3.28. uncollapse_jump
3.29. compose_format
3.30. config_charset
3.31. confirmappend
3.32. confirmcreate
3.33. connect_timeout
3.34. content_type
3.35. copy
3.36. crypt_use_gpgme
3.37. crypt_use_pka
3.38. crypt_autopgp
3.39. crypt_autosmime
3.40. date_format
3.41. default_hook
3.42. delete
3.43. delete_untag
3.44. digest_collapse
3.45. display_filter
3.46. dotlock_program
3.47. dsn_notify
3.48. dsn_return
3.49. duplicate_threads
3.50. edit_headers
3.51. editor
3.52. encode_from
3.53. envelope_from_address
3.54. escape
3.55. fast_reply
3.56. fcc_attach
3.57. fcc_clear
3.58. folder
3.59. folder_format
3.60. followup_to
3.61. force_name
3.62. forward_decode
3.63. forward_edit
3.64. forward_format
3.65. forward_quote
3.66. from
3.67. gecos_mask
3.68. hdrs
3.69. header
3.70. help
3.71. hidden_host
3.72. hide_limited
3.73. hide_missing
3.74. hide_thread_subject
3.75. hide_top_limited
3.76. hide_top_missing
3.77. history
3.78. history_file
3.79. honor_followup_to
3.80. hostname
3.81. ignore_linear_white_space
3.82. ignore_list_reply_to
3.83. imap_authenticators
3.84. imap_check_subscribed
3.85. imap_delim_chars
3.86. imap_headers
3.87. imap_idle
3.88. imap_keepalive
3.89. imap_list_subscribed
3.90. imap_login
3.91. imap_pass
3.92. imap_passive
3.93. imap_peek
3.94. imap_pipeline_depth
3.95. imap_servernoise
3.96. imap_user
3.97. implicit_autoview
3.98. include
3.99. include_onlyfirst
3.100. indent_string
3.101. index_format
3.102. ispell
3.103. keep_flagged
3.104. locale
3.105. mail_check
3.106. mailcap_path
3.107. mailcap_sanitize
3.108. header_cache
3.109. maildir_header_cache_verify
3.110. header_cache_pagesize
3.111. header_cache_compress
3.112. maildir_trash
3.113. mark_old
3.114. markers
3.115. mask
3.116. mbox
3.117. mbox_type
3.118. metoo
3.119. menu_context
3.120. menu_move_off
3.121. menu_scroll
3.122. meta_key
3.123. mh_purge
3.124. mh_seq_flagged
3.125. mh_seq_replied
3.126. mh_seq_unseen
3.127. mime_forward
3.128. mime_forward_decode
3.129. mime_forward_rest
3.130. mix_entry_format
3.131. mixmaster
3.132. move
3.133. message_cachedir
3.134. message_cache_clean
3.135. message_format
3.136. narrow_tree
3.137. net_inc
3.138. pager
3.139. pager_context
3.140. pager_format
3.141. pager_index_lines
3.142. pager_stop
3.143. crypt_autosign
3.144. crypt_autoencrypt
3.145. pgp_ignore_subkeys
3.146. crypt_replyencrypt
3.147. crypt_replysign
3.148. crypt_replysignencrypted
3.149. crypt_timestamp
3.150. pgp_use_gpg_agent
3.151. crypt_verify_sig
3.152. smime_is_default
3.153. smime_ask_cert_label
3.154. smime_decrypt_use_default_key
3.155. pgp_entry_format
3.156. pgp_good_sign
3.157. pgp_check_exit
3.158. pgp_long_ids
3.159. pgp_retainable_sigs
3.160. pgp_autoinline
3.161. pgp_replyinline
3.162. pgp_show_unusable
3.163. pgp_sign_as
3.164. pgp_strict_enc
3.165. pgp_timeout
3.166. pgp_sort_keys
3.167. pgp_mime_auto
3.168. pgp_auto_decode
3.169. pgp_decode_command
3.170. pgp_getkeys_command
3.171. pgp_verify_command
3.172. pgp_decrypt_command
3.173. pgp_clearsign_command
3.174. pgp_sign_command
3.175. pgp_encrypt_sign_command
3.176. pgp_encrypt_only_command
3.177. pgp_import_command
3.178. pgp_export_command
3.179. pgp_verify_key_command
3.180. pgp_list_secring_command
3.181. pgp_list_pubring_command
3.182. forward_decrypt
3.183. smime_timeout
3.184. smime_encrypt_with
3.185. smime_keys
3.186. smime_ca_location
3.187. smime_certificates
3.188. smime_decrypt_command
3.189. smime_verify_command
3.190. smime_verify_opaque_command
3.191. smime_sign_command
3.192. smime_sign_opaque_command
3.193. smime_encrypt_command
3.194. smime_pk7out_command
3.195. smime_get_cert_command
3.196. smime_get_signer_cert_command
3.197. smime_import_cert_command
3.198. smime_get_cert_email_command
3.199. smime_default_key
3.200. ssl_client_cert
3.201. ssl_force_tls
3.202. ssl_starttls
3.203. certificate_file
3.204. ssl_usesystemcerts
3.205. entropy_file
3.206. ssl_use_sslv2
3.207. ssl_use_sslv3
3.208. ssl_use_tlsv1
3.209. ssl_min_dh_prime_bits
3.210. ssl_ca_certificates_file
3.211. pipe_split
3.212. pipe_decode
3.213. pipe_sep
3.214. pop_authenticators
3.215. pop_auth_try_all
3.216. pop_checkinterval
3.217. pop_delete
3.218. pop_host
3.219. pop_last
3.220. pop_reconnect
3.221. pop_user
3.222. pop_pass
3.223. post_indent_string
3.224. postpone
3.225. postponed
3.226. preconnect
3.227. print
3.228. print_command
3.229. print_decode
3.230. print_split
3.231. prompt_after
3.232. query_command
3.233. query_format
3.234. quit
3.235. quote_regexp
3.236. read_inc
3.237. read_only
3.238. realname
3.239. recall
3.240. record
3.241. reply_regexp
3.242. reply_self
3.243. reply_to
3.244. resolve
3.245. reverse_alias
3.246. reverse_name
3.247. reverse_realname
3.248. rfc2047_parameters
3.249. save_address
3.250. save_empty
3.251. save_history
3.252. save_name
3.253. score
3.254. score_threshold_delete
3.255. score_threshold_flag
3.256. score_threshold_read
3.257. send_charset
3.258. sendmail
3.259. sendmail_wait
3.260. shell
3.261. sig_dashes
3.262. sig_on_top
3.263. signature
3.264. simple_search
3.265. smart_wrap
3.266. smileys
3.267. sleep_time
3.268. smtp_authenticators
3.269. smtp_pass
3.270. smtp_url
3.271. sort
3.272. sort_alias
3.273. sort_aux
3.274. sort_browser
3.275. sort_re
3.276. spam_separator
3.277. spoolfile
3.278. status_chars
3.279. status_format
3.280. status_on_top
3.281. strict_threads
3.282. suspend
3.283. text_flowed
3.284. thread_received
3.285. thorough_search
3.286. tilde
3.287. time_inc
3.288. timeout
3.289. tmpdir
3.290. to_chars
3.291. tunnel
3.292. use_8bitmime
3.293. use_domain
3.294. use_envelope_from
3.295. use_from
3.296. use_idn
3.297. use_ipv6
3.298. user_agent
3.299. visual
3.300. wait_key
3.301. weed
3.302. wrap
3.303. wrap_search
3.304. wrapmargin
3.305. write_inc
3.306. write_bcc
4. Functions
4.1. generic menu
4.2. index menu
4.3. pager menu
4.4. alias menu
4.5. query menu
4.6. attach menu
4.7. compose menu
4.8. postpone menu
4.9. browser menu
4.10. pgp menu
4.11. smime menu
4.12. mix menu
4.13. editor menu

1. Command line options

/mutt-1.5.19/doc/manual.html:4007:S/MIME and PGP will be used instead of the classic code. Note that /mutt-1.5.19/doc/manual.html:4013:(see http://www.g10code.de/docs/pka-intro.de.pdf) during signature /mutt-1.5.19/doc/manual.html:4024:S/MIME encryption/signing for messages. See also $crypt_autoencrypt, /mutt-1.5.19/doc/manual.html:4358:side of an IMAP “AUTH=xxx” capability string, eg “digest-md5”, “gssapi” /mutt-1.5.19/doc/manual.html:4359:or “cram-md5”. This option is case-insensitive. If it's /mutt-1.5.19/doc/manual.html:4366:set imap_authenticators="gssapi:cram-md5:login" /mutt-1.5.19/doc/manual.html:4827:then OpenSSL is used instead to create S/MIME messages and settings can /mutt-1.5.19/doc/manual.html:4833:encrypt outgoing messages. This is probably only useful in /mutt-1.5.19/doc/manual.html:4837:then OpenSSL is used instead to create S/MIME messages and /mutt-1.5.19/doc/manual.html:4848:If set, automatically PGP or OpenSSL encrypt replies to messages which are /mutt-1.5.19/doc/manual.html:4853:If set, automatically PGP or OpenSSL sign replies to messages which are /mutt-1.5.19/doc/manual.html:4861:If set, automatically PGP or OpenSSL sign replies to messages /mutt-1.5.19/doc/manual.html:4871:PGP or S/MIME output, so spoofing such lines is more difficult. /mutt-1.5.19/doc/manual.html:4881:If yes, always attempt to verify PGP or S/MIME signatures. /mutt-1.5.19/doc/manual.html:4882:If ask-*, ask whether or not to verify the signature. /mutt-1.5.19/doc/manual.html:4888:operations. To override and to use OpenSSL instead this must be set. /mutt-1.5.19/doc/manual.html:4890:select the same application that was used to sign/encrypt the original /mutt-1.5.19/doc/manual.html:4892:(S/MIME only) /mutt-1.5.19/doc/manual.html:4898:(S/MIME only) /mutt-1.5.19/doc/manual.html:4899:

3.154. smime_decrypt_use_default_key

Type: boolean
/mutt-1.5.19/doc/manual.html:4904:(S/MIME only) /mutt-1.5.19/doc/manual.html:4924:If you assign a text to this variable, then a PGP signature is only /mutt-1.5.19/doc/manual.html:5033:If set, mutt will automatically attempt to decrypt traditional PGP /mutt-1.5.19/doc/manual.html:5049:

%s

Expands to the name of a file containing the signature part /mutt-1.5.19/doc/manual.html:5072:

3.172. pgp_decrypt_command

Type: string
/mutt-1.5.19/doc/manual.html:5074:This command is used to decrypt a PGP encrypted message. /mutt-1.5.19/doc/manual.html:5090:This command is used to create the detached PGP signature for a /mutt-1.5.19/doc/manual.html:5096:

3.175. pgp_encrypt_sign_command

Type: string
/mutt-1.5.19/doc/manual.html:5098:This command is used to both sign and encrypt a body part. /mutt-1.5.19/doc/manual.html:5103:

3.176. pgp_encrypt_only_command

Type: string
/mutt-1.5.19/doc/manual.html:5105:This command is used to encrypt a body part without signing it. /mutt-1.5.19/doc/manual.html:5164:

3.182. forward_decrypt

Type: boolean
/mutt-1.5.19/doc/manual.html:5175:(S/MIME only) /mutt-1.5.19/doc/manual.html:5176:

3.184. smime_encrypt_with

Type: string
/mutt-1.5.19/doc/manual.html:5179:Valid choices are “des”, “des3”, “rc2-40”, “rc2-64”, “rc2-128”. /mutt-1.5.19/doc/manual.html:5180:If unset, “3des” (TripleDES) is used. /mutt-1.5.19/doc/manual.html:5181:(S/MIME only) /mutt-1.5.19/doc/manual.html:5184:Since for S/MIME there is no pubring/secring as with PGP, mutt has to handle /mutt-1.5.19/doc/manual.html:5187:named as the hash-value retrieved from OpenSSL. There is an index file /mutt-1.5.19/doc/manual.html:5190:(S/MIME only) /mutt-1.5.19/doc/manual.html:5194:contains trusted certificates for use with OpenSSL. /mutt-1.5.19/doc/manual.html:5195:(S/MIME only) /mutt-1.5.19/doc/manual.html:5198:Since for S/MIME there is no pubring/secring as with PGP, mutt has to handle /mutt-1.5.19/doc/manual.html:5202:OpenSSL. There is an index file which contains mailbox-address /mutt-1.5.19/doc/manual.html:5205:(S/MIME only) /mutt-1.5.19/doc/manual.html:5206:

3.188. smime_decrypt_command

Type: string
/mutt-1.5.19/doc/manual.html:5208:This format string specifies a command which is used to decrypt /mutt-1.5.19/doc/manual.html:5211:The OpenSSL command formats have their own set of printf(3)-like sequences /mutt-1.5.19/doc/manual.html:5215:

%s

Expands to the name of a file containing the signature part /mutt-1.5.19/doc/manual.html:5227:(S/MIME only) /mutt-1.5.19/doc/manual.html:5230:This command is used to verify S/MIME signatures of type multipart/signed. /mutt-1.5.19/doc/manual.html:5232:This is a format string, see the $smime_decrypt_command command for /mutt-1.5.19/doc/manual.html:5234:(S/MIME only) /mutt-1.5.19/doc/manual.html:5237:This command is used to verify S/MIME signatures of type /mutt-1.5.19/doc/manual.html:5240:This is a format string, see the $smime_decrypt_command command for /mutt-1.5.19/doc/manual.html:5242:(S/MIME only) /mutt-1.5.19/doc/manual.html:5245:This command is used to created S/MIME signatures of type /mutt-1.5.19/doc/manual.html:5248:This is a format string, see the $smime_decrypt_command command for /mutt-1.5.19/doc/manual.html:5250:(S/MIME only) /mutt-1.5.19/doc/manual.html:5253:This command is used to created S/MIME signatures of type /mutt-1.5.19/doc/manual.html:5254:application/x-pkcs7-signature, which can only be handled by mail /mutt-1.5.19/doc/manual.html:5255:clients supporting the S/MIME extension. /mutt-1.5.19/doc/manual.html:5257:This is a format string, see the $smime_decrypt_command command for /mutt-1.5.19/doc/manual.html:5259:(S/MIME only) /mutt-1.5.19/doc/manual.html:5260:

3.193. smime_encrypt_command

Type: string
/mutt-1.5.19/doc/manual.html:5262:This command is used to create encrypted S/MIME messages. /mutt-1.5.19/doc/manual.html:5264:This is a format string, see the $smime_decrypt_command command for /mutt-1.5.19/doc/manual.html:5266:(S/MIME only) /mutt-1.5.19/doc/manual.html:5269:This command is used to extract PKCS7 structures of S/MIME signatures, /mutt-1.5.19/doc/manual.html:5272:This is a format string, see the $smime_decrypt_command command for /mutt-1.5.19/doc/manual.html:5274:(S/MIME only) /mutt-1.5.19/doc/manual.html:5279:This is a format string, see the $smime_decrypt_command command for /mutt-1.5.19/doc/manual.html:5281:(S/MIME only) /mutt-1.5.19/doc/manual.html:5284:This command is used to extract only the signers X509 certificate from a S/MIME /mutt-1.5.19/doc/manual.html:5285:signature, so that the certificate's owner may get compared to the /mutt-1.5.19/doc/manual.html:5288:This is a format string, see the $smime_decrypt_command command for /mutt-1.5.19/doc/manual.html:5290:(S/MIME only) /mutt-1.5.19/doc/manual.html:5295:This is a format string, see the $smime_decrypt_command command for /mutt-1.5.19/doc/manual.html:5297:(S/MIME only) /mutt-1.5.19/doc/manual.html:5304:This is a format string, see the $smime_decrypt_command command for /mutt-1.5.19/doc/manual.html:5306:(S/MIME only) /mutt-1.5.19/doc/manual.html:5310:keyid (the hash-value that OpenSSL generates) to work properly /mutt-1.5.19/doc/manual.html:5311:(S/MIME only) /mutt-1.5.19/doc/manual.html:5312:

3.200. ssl_client_cert

Type: path
/mutt-1.5.19/doc/manual.html:5316:

3.201. ssl_force_tls

Type: boolean
/mutt-1.5.19/doc/manual.html:5320:negotiate TLS even if the server does not advertise the capability, /mutt-1.5.19/doc/manual.html:5322:option supersedes $ssl_starttls. /mutt-1.5.19/doc/manual.html:5323:

3.202. ssl_starttls

Type: quadoption
/mutt-1.5.19/doc/manual.html:5345:

3.204. ssl_usesystemcerts

Type: boolean
/mutt-1.5.19/doc/manual.html:5352:The file which includes random data that is used to initialize SSL /mutt-1.5.19/doc/manual.html:5354:

3.206. ssl_use_sslv2

Type: boolean
/mutt-1.5.19/doc/manual.html:5357:SSL authentication process. /mutt-1.5.19/doc/manual.html:5358:

3.207. ssl_use_sslv3

Type: boolean
/mutt-1.5.19/doc/manual.html:5361:SSL authentication process. /mutt-1.5.19/doc/manual.html:5362:

3.208. ssl_use_tlsv1

Type: boolean
/mutt-1.5.19/doc/manual.html:5365:SSL authentication process. /mutt-1.5.19/doc/manual.html:5366:

3.209. ssl_min_dh_prime_bits

Type: number
/mutt-1.5.19/doc/manual.html:5369:for use in any Diffie-Hellman key exchange. A value of 0 will use /mutt-1.5.19/doc/manual.html:5371:

3.210. ssl_ca_certificates_file

Type: path
/mutt-1.5.19/doc/manual.html:5380:set ssl_ca_certificates_file=/etc/ssl/certs/ca-certificates.crt /mutt-1.5.19/doc/manual.html:5405:SASL mechanism, eg “digest-md5”, “gssapi” or “cram-md5”. /mutt-1.5.19/doc/manual.html:5413:set pop_authenticators="digest-md5:apop:user" /mutt-1.5.19/doc/manual.html:5785:$signature. It is strongly recommended that you not unset /mutt-1.5.19/doc/manual.html:5786:this variable unless your signature contains just your name. The /mutt-1.5.19/doc/manual.html:5788:detect your signature. For example, Mutt has the ability to highlight /mutt-1.5.19/doc/manual.html:5789:the signature in a different color in the builtin pager. /mutt-1.5.19/doc/manual.html:5792:If set, the signature will be included before any quoted or forwarded /mutt-1.5.19/doc/manual.html:5796:

3.263. signature

Type: path
/mutt-1.5.19/doc/manual.html:5797:Default: “˜/.signature

/mutt-1.5.19/doc/manual.html:5798:Specifies the filename of your signature, which is appended to all /mutt-1.5.19/doc/manual.html:5835:“digest-md5”, “gssapi” or “cram-md5”. /mutt-1.5.19/doc/manual.html:5843:set smtp_authenticators="digest-md5:cram-md5" /mutt-1.5.19/doc/manual.html:6238:

Table 8.2. Default generic function bindings

FunctionDefault keyDescription
<top-page>Hmove to the top of the page
<next-entry>jmove to the next entry
<previous-entry>kmove to the previous entry
<bottom-page>Lmove to the bottom of the page
<refresh>^Lclear and redraw the screen
<middle-page>Mmove to the middle of the page
<search-next>nsearch for next match
<exit>qexit this menu
<tag-entry>ttag the current entry
<next-page>zmove to the next page
<previous-page>Zmove to the previous page
<last-entry>*move to the last entry
<first-entry>=move to the first entry
<enter-command>:enter a muttrc command
<next-line>>scroll down one line
<previous-line><scroll up one line
<half-up>[scroll up 1/2 page
<half-down>]scroll down 1/2 page
<help>?this screen
<tag-prefix>;apply next function to tagged messages
<tag-prefix-cond> apply next function ONLY to tagged messages
<end-cond> end of conditional execution (noop)
<shell-escape>!invoke a command in a subshell
<select-entry><Return>select the current entry
<search>/search for a regular expression
<search-reverse>Esc /search backwards for a regular expression
<search-opposite> search for next match in opposite direction
<jump> jump to an index number
<current-top> move entry to top of screen
<current-middle> move entry to middle of screen
<current-bottom> move entry to bottom of screen
<what-key> display the keycode for a key press

4.2. index menu

Table 8.3. Default index function bindings

FunctionDefault keyDescription
<create-alias>acreate an alias from a message sender
<bounce-message>bremail a message to another user
<break-thread>#break the thread in two
<change-folder>copen a different folder
<change-folder-readonly>Esc copen a different folder in read only mode
<next-unread-mailbox> open next mailbox with new mail
<collapse-thread>Esc vcollapse/uncollapse current thread
<collapse-all>Esc Vcollapse/uncollapse all threads
<copy-message>Ccopy a message to a file/mailbox
<decode-copy>Esc Cmake decoded (text/plain) copy
<decode-save>Esc smake decoded copy (text/plain) and delete
<delete-message>ddelete the current entry
<delete-pattern>Ddelete messages matching a pattern
<delete-thread>^Ddelete all messages in thread
<delete-subthread>Esc ddelete all messages in subthread
<edit>eedit the raw message
<edit-type>^Eedit attachment content type
<forward-message>fforward a message with comments
<flag-message>Ftoggle a message's 'important' flag
<group-reply>greply to all recipients
<fetch-mail>Gretrieve mail from POP server
<imap-fetch-mail> force retrieval of mail from IMAP server
<display-toggle-weed>hdisplay message and toggle header weeding
<next-undeleted>jmove to the next undeleted message
<previous-undeleted>kmove to the previous undeleted message
<limit>lshow only messages matching a pattern
<link-threads>&link tagged message to the current one
<list-reply>Lreply to specified mailing list
<mail>mcompose a new mail message
<toggle-new>Ntoggle a message's 'new' flag
<toggle-write>%toggle whether the mailbox will be rewritten
<next-thread>^Njump to the next thread
<next-subthread>Esc njump to the next subthread
<query>Qquery external program for addresses
<quit>qsave changes to mailbox and quit
<reply>rreply to a message
<show-limit>Esc lshow currently active limit pattern
<sort-mailbox>osort messages
<sort-reverse>Osort messages in reverse order
<print-message>pprint the current entry
<previous-thread>^Pjump to previous thread
<previous-subthread>Esc pjump to previous subthread
<recall-message>Rrecall a postponed message
<read-thread>^Rmark the current thread as read
<read-subthread>Esc rmark the current subthread as read
<resend-message>Esc euse the current message as a template for a new one
<save-message>ssave message/attachment to a file
<tag-pattern>Ttag messages matching a pattern
<tag-subthread> tag the current subthread
<tag-thread>Esc ttag the current thread
<untag-pattern>^Tuntag messages matching a pattern
<undelete-message>uundelete the current entry
<undelete-pattern>Uundelete messages matching a pattern
<undelete-subthread>Esc uundelete all messages in subthread
<undelete-thread>^Uundelete all messages in thread
<view-attachments>vshow MIME attachments
<show-version>Vshow the Mutt version number and date
<set-flag>wset a status flag on a message
<clear-flag>Wclear a status flag from a message
<display-message><Return>display a message
<buffy-list>.list mailboxes with new mail
<sync-mailbox>$save changes to mailbox
<display-address>@display full address of sender
<pipe-message>|pipe message/attachment to a shell command
<next-new> jump to the next new message
<next-new-then-unread><Tab>jump to the next new or unread message
<previous-new> jump to the previous new message
<previous-new-then-unread>Esc <Tab>jump to the previous new or unread message
<next-unread> jump to the next unread message
<previous-unread> jump to the previous unread message
<parent-message>Pjump to parent message in thread
<extract-keys>^Kextract supported public keys
<forget-passphrase>^Fwipe passphrase(s) from memory
<check-traditional-pgp>Esc Pcheck for classic PGP
<mail-key>Esc kmail a PGP public key
<decrypt-copy> make decrypted copy
<decrypt-save> make decrypted copy and delete

4.3. pager menu

Table 8.4. Default pager function bindings

FunctionDefault keyDescription
<break-thread>#break the thread in two
<create-alias>acreate an alias from a message sender
<bounce-message>bremail a message to another user
<change-folder>copen a different folder
<change-folder-readonly>Esc copen a different folder in read only mode
<next-unread-mailbox> open next mailbox with new mail
<copy-message>Ccopy a message to a file/mailbox
<decode-copy>Esc Cmake decoded (text/plain) copy
<delete-message>ddelete the current entry
<delete-thread>^Ddelete all messages in thread
<delete-subthread>Esc ddelete all messages in subthread
<edit>eedit the raw message
<edit-type>^Eedit attachment content type
<forward-message>fforward a message with comments
<flag-message>Ftoggle a message's 'important' flag
<group-reply>greply to all recipients
<imap-fetch-mail> force retrieval of mail from IMAP server
<display-toggle-weed>hdisplay message and toggle header weeding
<next-undeleted>jmove to the next undeleted message
<next-entry>Jmove to the next entry
<previous-undeleted>kmove to the previous undeleted message
<previous-entry>Kmove to the previous entry
<link-threads>&link tagged message to the current one
<list-reply>Lreply to specified mailing list
<redraw-screen>^Lclear and redraw the screen
<mail>mcompose a new mail message
<mark-as-new>Ntoggle a message's 'new' flag
<search-next>nsearch for next match
<next-thread>^Njump to the next thread
<next-subthread>Esc njump to the next subthread
<print-message>pprint the current entry
<previous-thread>^Pjump to previous thread
<previous-subthread>Esc pjump to previous subthread
<quit>Qsave changes to mailbox and quit
<exit>qexit this menu
<reply>rreply to a message
<recall-message>Rrecall a postponed message
<read-thread>^Rmark the current thread as read
<read-subthread>Esc rmark the current subthread as read
<resend-message>Esc euse the current message as a template for a new one
<save-message>ssave message/attachment to a file
<skip-quoted>Sskip beyond quoted text
<decode-save>Esc smake decoded copy (text/plain) and delete
<tag-message>ttag the current entry
<toggle-quoted>Ttoggle display of quoted text
<undelete-message>uundelete the current entry
<undelete-subthread>Esc uundelete all messages in subthread
<undelete-thread>^Uundelete all messages in thread
<view-attachments>vshow MIME attachments
<show-version>Vshow the Mutt version number and date
<search-toggle>\\toggle search pattern coloring
<display-address>@display full address of sender
<next-new> jump to the next new message
<pipe-message>|pipe message/attachment to a shell command
<help>?this screen
<next-page><Space>move to the next page
<previous-page>-move to the previous page
<top>^jump to the top of the message
<sync-mailbox>$save changes to mailbox
<shell-escape>!invoke a command in a subshell
<enter-command>:enter a muttrc command
<buffy-list>.list mailboxes with new mail
<search>/search for a regular expression
<search-reverse>Esc /search backwards for a regular expression
<search-opposite> search for next match in opposite direction
<next-line><Return>scroll down one line
<jump> jump to an index number
<next-unread> jump to the next unread message
<previous-new> jump to the previous new message
<previous-unread> jump to the previous unread message
<half-up> scroll up 1/2 page
<half-down> scroll down 1/2 page
<previous-line> scroll up one line
<bottom> jump to the bottom of the message
<parent-message>Pjump to parent message in thread
<check-traditional-pgp>Esc Pcheck for classic PGP
<mail-key>Esc kmail a PGP public key
<extract-keys>^Kextract supported public keys
<forget-passphrase>^Fwipe passphrase(s) from memory
<decrypt-copy> make decrypted copy
<decrypt-save> make decrypted copy and delete
<what-key> display the keycode for a key press

4.4. alias menu

Table 8.5. Default alias function bindings

FunctionDefault keyDescription
<delete-entry>ddelete the current entry
<undelete-entry>uundelete the current entry

4.5. query menu

Table 8.6. Default query function bindings

FunctionDefault keyDescription
<create-alias>acreate an alias from a message sender
<mail>mcompose a new mail message
<query>Qquery external program for addresses
<query-append>Aappend new query results to current results

4.6. attach menu

Table 8.7. Default attach function bindings

FunctionDefault keyDescription
<bounce-message>bremail a message to another user
<display-toggle-weed>hdisplay message and toggle header weeding
<edit-type>^Eedit attachment content type
<print-entry>pprint the current entry
<save-entry>ssave message/attachment to a file
<pipe-entry>|pipe message/attachment to a shell command
<view-mailcap>mforce viewing of attachment using mailcap
<reply>rreply to a message
<resend-message>Esc euse the current message as a template for a new one
<group-reply>greply to all recipients
<list-reply>Lreply to specified mailing list
<forward-message>fforward a message with comments
<view-text>Tview attachment as text
<view-attach><Return>view attachment using mailcap entry if necessary
<delete-entry>ddelete the current entry
<undelete-entry>uundelete the current entry
<collapse-parts>vToggle display of subparts
<check-traditional-pgp>Esc Pcheck for classic PGP
<extract-keys>^Kextract supported public keys
<forget-passphrase>^Fwipe passphrase(s) from memory

4.7. compose menu

Table 8.8. Default compose function bindings

FunctionDefault keyDescription
<attach-file>aattach file(s) to this message
<attach-message>Aattach message(s) to this message
<edit-bcc>bedit the BCC list
<edit-cc>cedit the CC list
<copy-file>Csave message/attachment to a file
<detach-file>Ddelete the current entry
<toggle-disposition>^Dtoggle disposition between inline/attachment
<edit-description>dedit attachment description
<edit-message>eedit the message
<edit-headers>Eedit the message with headers
<edit-file>^X eedit the file to be attached
<edit-encoding>^Eedit attachment transfer-encoding
<edit-from>Esc fedit the from field
<edit-fcc>fenter a file to save a copy of this message in
<filter-entry>Ffilter attachment through a shell command
<get-attachment>Gget a temporary copy of an attachment
<display-toggle-weed>hdisplay message and toggle header weeding
<ispell>irun ispell on the message
<print-entry>lprint the current entry
<edit-mime>medit attachment using mailcap entry
<new-mime>ncompose new attachment using mailcap entry
<postpone-message>Psave this message to send later
<edit-reply-to>redit the Reply-To field
<rename-file>Rrename/move an attached file
<edit-subject>sedit the subject of this message
<edit-to>tedit the TO list
<edit-type>^Tedit attachment content type
<write-fcc>wwrite the message to a folder
<toggle-unlink>utoggle whether to delete file after sending it
<toggle-recode> toggle recoding of this attachment
<update-encoding>Uupdate an attachment's encoding info
<view-attach><Return>view attachment using mailcap entry if necessary
<send-message>ysend the message
<pipe-entry>|pipe message/attachment to a shell command
<attach-key>Esc kattach a PGP public key
<pgp-menu>pshow PGP options
<forget-passphrase>^Fwipe passphrase(s) from memory
<smime-menu>Sshow S/MIME options
<mix>Msend the message through a mixmaster remailer chain

4.8. postpone menu

Table 8.9. Default postpone function bindings

FunctionDefault keyDescription
<delete-entry>ddelete the current entry
<undelete-entry>uundelete the current entry

4.9. browser menu

Table 8.10. Default browser function bindings

FunctionDefault keyDescription
<change-dir>cchange directories
<display-filename>@display the currently selected file's name
<enter-mask>menter a file mask
<sort>osort messages
<sort-reverse>Osort messages in reverse order
<select-new>Nselect a new file in this directory
<check-new> check mailboxes for new mail
<toggle-mailboxes><Tab>toggle whether to browse mailboxes or all files
<view-file><Space>view file
<buffy-list>.list mailboxes with new mail
<create-mailbox>Ccreate a new mailbox (IMAP only)
<delete-mailbox>ddelete the current mailbox (IMAP only)
<rename-mailbox>rrename the current mailbox (IMAP only)
<subscribe>ssubscribe to current mailbox (IMAP only)
<unsubscribe>uunsubscribe from current mailbox (IMAP only)
<toggle-subscribed>Ttoggle view all/subscribed mailboxes (IMAP only)

4.10. pgp menu

Table 8.11. Default pgp function bindings

FunctionDefault keyDescription
<verify-key>cverify a PGP public key
<view-name>%view the key's user id

4.11. smime menu

Table 8.12. Default smime function bindings

FunctionDefault keyDescription
<verify-key>cverify a PGP public key
<view-name>%view the key's user id

4.12. mix menu

Table 8.13. Default mix function bindings

FunctionDefault keyDescription
<accept><Return>Accept the chain constructed
<append>aAppend a remailer to the chain
<insert>iInsert a remailer into the chain
<delete>dDelete a remailer from the chain
<chain-prev><Left>Select the previous element of the chain
<chain-next><Right>Select the next element of the chain

4.13. editor menu

Table 8.14. Default editor function bindings

FunctionDefault keyDescription
<bol>^Ajump to the beginning of the line
<backward-char>^Bmove the cursor one character to the left
<backward-word>Esc bmove the cursor to the beginning of the word
<capitalize-word>Esc ccapitalize the word
<downcase-word>Esc lconvert the word to lower case
<upcase-word>Esc uconvert the word to upper case
<delete-char>^Ddelete the char under the cursor
<eol>^Ejump to the end of the line
<forward-char>^Fmove the cursor one character to the right
<forward-word>Esc fmove the cursor to the end of the word
<backspace><Backspace>delete the char in front of the cursor
<kill-eol>^Kdelete chars from cursor to end of line
<kill-eow>Esc ddelete chars from the cursor to the end of the word
<kill-line>^Udelete all chars on the line
<quote-char>^Vquote the next typed key
<kill-word>^Wdelete the word in front of the cursor
<complete><Tab>complete filename or alias
<complete-query>^Tcomplete address with query
<buffy-cycle><Space>cycle among incoming mailboxes
<history-up> scroll up through the history list
<history-down> scroll down through the history list
<transpose-chars> transpose character under cursor with previous

Chapter 9. Miscellany

1. Acknowledgements

/mutt-1.5.19/doc/Makefile.am:42: README NEWS TODO README.SECURITY README.SSL /mutt-1.5.19/doc/configuration.html:281:The pgp menu is used to select the OpenPGP keys used to encrypt outgoing /mutt-1.5.19/doc/configuration.html:284:The smime menu is used to select the OpenSSL certificates used to encrypt outgoing /mutt-1.5.19/doc/configuration.html:443:

  • attachment

  • bold (hiliting bold patterns in the body of messages)

  • error (error messages printed by Mutt)

  • hdrdefault (default color of the message header in the pager)

  • indicator (arrow or bar used to indicate the current item in a menu)

  • markers (the “+” markers at the beginning of wrapped lines in the pager)

  • message (informational messages)

  • normal

  • quoted (text matching $quote_regexp in the body of a message)

  • quoted1, quoted2, ..., quotedN (higher levels of quoting)

  • search (hiliting of words in the pager)

  • signature

  • status (mode lines used to display info about the mailbox or message)

  • tilde (the “˜” used to pad blank lines in the pager)

  • tree (thread tree drawn in the message index and attachment menu)

  • underline (hiliting underlined patterns in the body of messages)

/mutt-1.5.19/doc/configuration.html:867:Example: send-hook mutt "set mime_forward signature=''" /mutt-1.5.19/doc/configuration.html:870:$attribution, $signature and $locale /mutt-1.5.19/doc/configuration.html:903:When encrypting messages with PGP/GnuPG or OpenSSL, you may want to associate a certain /mutt-1.5.19/doc/index.html:26:


Table of Contents

1. Introduction
1. Mutt Home Page
2. Mailing Lists
3. Software Distribution Sites
4. Mutt online resources
5. Contributing to Mutt
6. Typograhical conventions
7. Copyright
2. Getting Started
1. Core concepts
2. Moving Around in Menus
3. Editing Input Fields
3.1. Introduction
3.2. History
4. Reading Mail - The Index and Pager
4.1. The Message Index
4.2. The Pager
4.3. Threaded Mode
4.4. Miscellaneous Functions
5. Sending Mail
5.1. Introduction
5.2. Editing the message header
5.3. Sending cryptographically signed/encrypted messages
5.4. Sending anonymous messages via mixmaster
5.5. Sending format=flowed messages
6. Forwarding and Bouncing Mail
7. Postponing Mail
3. Configuration
1. Location of initialization files
2. Syntax of Initialization Files
3. Address groups
4. Defining/Using aliases
5. Changing the default key bindings
6. Defining aliases for character sets
7. Setting variables based upon mailbox
8. Keyboard macros
9. Using color and mono video attributes
10. Message header display
11. Alternative addresses
12. Mailing lists
13. Using Multiple spool mailboxes
14. Monitoring incoming mail
15. User defined headers
16. Specify default save mailbox
17. Specify default Fcc: mailbox when composing
18. Specify default save filename and default Fcc: mailbox at once
19. Change settings based upon message recipients
20. Change settings before formatting a message
21. Choosing the cryptographic key of the recipient
22. Adding key sequences to the keyboard buffer
23. Executing functions
24. Message Scoring
25. Spam detection
26. Setting and Querying Variables
26.1. Commands
26.2. User-defined variables
27. Reading initialization commands from another file
28. Removing hooks
29. Format Strings
29.1. Basic usage
29.2. Filters
4. Advanced Usage
1. Regular Expressions
2. Patterns: Searching, Limiting and Tagging
2.1. Pattern Modifier
2.2. Simple Patterns
2.3. Complex Patterns
2.4. Searching by Date
3. Using Tags
4. Using Hooks
4.1. Message Matching in Hooks
5. External Address Queries
6. Mailbox Formats
7. Mailbox Shortcuts
8. Handling Mailing Lists
9. Handling multiple folders
10. Editing threads
10.1. Linking threads
10.2. Breaking threads
11. Delivery Status Notification (DSN) Support
12. Start a WWW Browser on URLs
5. Mutt's MIME Support
1. Using MIME in Mutt
1.1. Viewing MIME messages in the pager
1.2. The Attachment Menu
1.3. The Compose Menu
2. MIME Type configuration with mime.types
3. MIME Viewer configuration with mailcap
3.1. The Basics of the mailcap file
3.2. Secure use of mailcap
3.3. Advanced mailcap Usage
3.4. Example mailcap files
4. MIME Autoview
5. MIME Multipart/Alternative
6. Attachment Searching and Counting
7. MIME Lookup
6. Optional features
1. General notes
1.1. Enabling/disabling features
1.2. URL syntax
2. SSL/TLS Support
3. POP3 Support
4. IMAP Support
4.1. The Folder Browser
4.2. Authentication
5. SMTP Support
6. Managing multiple accounts
7. Local caching
7.1. Header caching
7.2. Body caching
7.3. Maintenance
8. Exact address generation
7. Performance tuning
1. Reading and writing mailboxes
2. Reading messages from remote folders
3. Searching and limiting
8. Reference
1. Command line options
2. Configuration Commands
3. Configuration variables
3.1. abort_nosubject
3.2. abort_unmodified
3.3. alias_file
3.4. alias_format
3.5. allow_8bit
3.6. allow_ansi
3.7. arrow_cursor
3.8. ascii_chars
3.9. askbcc
3.10. askcc
3.11. assumed_charset
3.12. attach_charset
3.13. attach_format
3.14. attach_sep
3.15. attach_split
3.16. attribution
3.17. autoedit
3.18. auto_tag
3.19. beep
3.20. beep_new
3.21. bounce
3.22. bounce_delivered
3.23. braille_friendly
3.24. check_mbox_size
3.25. charset
3.26. check_new
3.27. collapse_unread
3.28. uncollapse_jump
3.29. compose_format
3.30. config_charset
3.31. confirmappend
3.32. confirmcreate
3.33. connect_timeout
3.34. content_type
3.35. copy
3.36. crypt_use_gpgme
3.37. crypt_use_pka
3.38. crypt_autopgp
3.39. crypt_autosmime
3.40. date_format
3.41. default_hook
3.42. delete
3.43. delete_untag
3.44. digest_collapse
3.45. display_filter
3.46. dotlock_program
3.47. dsn_notify
3.48. dsn_return
3.49. duplicate_threads
3.50. edit_headers
3.51. editor
3.52. encode_from
3.53. envelope_from_address
3.54. escape
3.55. fast_reply
3.56. fcc_attach
3.57. fcc_clear
3.58. folder
3.59. folder_format
3.60. followup_to
3.61. force_name
3.62. forward_decode
3.63. forward_edit
3.64. forward_format
3.65. forward_quote
3.66. from
3.67. gecos_mask
3.68. hdrs
3.69. header
3.70. help
3.71. hidden_host
3.72. hide_limited
3.73. hide_missing
3.74. hide_thread_subject
3.75. hide_top_limited
3.76. hide_top_missing
3.77. history
3.78. history_file
3.79. honor_followup_to
3.80. hostname
3.81. ignore_linear_white_space
3.82. ignore_list_reply_to
3.83. imap_authenticators
3.84. imap_check_subscribed
3.85. imap_delim_chars
3.86. imap_headers
3.87. imap_idle
3.88. imap_keepalive
3.89. imap_list_subscribed
3.90. imap_login
3.91. imap_pass
3.92. imap_passive
3.93. imap_peek
3.94. imap_pipeline_depth
3.95. imap_servernoise
3.96. imap_user
3.97. implicit_autoview
3.98. include
3.99. include_onlyfirst
3.100. indent_string
3.101. index_format
3.102. ispell
3.103. keep_flagged
3.104. locale
3.105. mail_check
3.106. mailcap_path
3.107. mailcap_sanitize
3.108. header_cache
3.109. maildir_header_cache_verify
3.110. header_cache_pagesize
3.111. header_cache_compress
3.112. maildir_trash
3.113. mark_old
3.114. markers
3.115. mask
3.116. mbox
3.117. mbox_type
3.118. metoo
3.119. menu_context
3.120. menu_move_off
3.121. menu_scroll
3.122. meta_key
3.123. mh_purge
3.124. mh_seq_flagged
3.125. mh_seq_replied
3.126. mh_seq_unseen
3.127. mime_forward
3.128. mime_forward_decode
3.129. mime_forward_rest
3.130. mix_entry_format
3.131. mixmaster
3.132. move
3.133. message_cachedir
3.134. message_cache_clean
3.135. message_format
3.136. narrow_tree
3.137. net_inc
3.138. pager
3.139. pager_context
3.140. pager_format
3.141. pager_index_lines
3.142. pager_stop
3.143. crypt_autosign
3.144. crypt_autoencrypt
3.145. pgp_ignore_subkeys
3.146. crypt_replyencrypt
3.147. crypt_replysign
3.148. crypt_replysignencrypted
3.149. crypt_timestamp
3.150. pgp_use_gpg_agent
3.151. crypt_verify_sig
3.152. smime_is_default
3.153. smime_ask_cert_label
3.154. smime_decrypt_use_default_key
3.155. pgp_entry_format
3.156. pgp_good_sign
3.157. pgp_check_exit
3.158. pgp_long_ids
3.159. pgp_retainable_sigs
3.160. pgp_autoinline
3.161. pgp_replyinline
3.162. pgp_show_unusable
3.163. pgp_sign_as
3.164. pgp_strict_enc
3.165. pgp_timeout
3.166. pgp_sort_keys
3.167. pgp_mime_auto
3.168. pgp_auto_decode
3.169. pgp_decode_command
3.170. pgp_getkeys_command
3.171. pgp_verify_command
3.172. pgp_decrypt_command
3.173. pgp_clearsign_command
3.174. pgp_sign_command
3.175. pgp_encrypt_sign_command
3.176. pgp_encrypt_only_command
3.177. pgp_import_command
3.178. pgp_export_command
3.179. pgp_verify_key_command
3.180. pgp_list_secring_command
3.181. pgp_list_pubring_command
3.182. forward_decrypt
3.183. smime_timeout
3.184. smime_encrypt_with
3.185. smime_keys
3.186. smime_ca_location
3.187. smime_certificates
3.188. smime_decrypt_command
3.189. smime_verify_command
3.190. smime_verify_opaque_command
3.191. smime_sign_command
3.192. smime_sign_opaque_command
3.193. smime_encrypt_command
3.194. smime_pk7out_command
3.195. smime_get_cert_command
3.196. smime_get_signer_cert_command
3.197. smime_import_cert_command
3.198. smime_get_cert_email_command
3.199. smime_default_key
3.200. ssl_client_cert
3.201. ssl_force_tls
3.202. ssl_starttls
3.203. certificate_file
3.204. ssl_usesystemcerts
3.205. entropy_file
3.206. ssl_use_sslv2
3.207. ssl_use_sslv3
3.208. ssl_use_tlsv1
3.209. ssl_min_dh_prime_bits
3.210. ssl_ca_certificates_file
3.211. pipe_split
3.212. pipe_decode
3.213. pipe_sep
3.214. pop_authenticators
3.215. pop_auth_try_all
3.216. pop_checkinterval
3.217. pop_delete
3.218. pop_host
3.219. pop_last
3.220. pop_reconnect
3.221. pop_user
3.222. pop_pass
3.223. post_indent_string
3.224. postpone
3.225. postponed
3.226. preconnect
3.227. print
3.228. print_command
3.229. print_decode
3.230. print_split
3.231. prompt_after
3.232. query_command
3.233. query_format
3.234. quit
3.235. quote_regexp
3.236. read_inc
3.237. read_only
3.238. realname
3.239. recall
3.240. record
3.241. reply_regexp
3.242. reply_self
3.243. reply_to
3.244. resolve
3.245. reverse_alias
3.246. reverse_name
3.247. reverse_realname
3.248. rfc2047_parameters
3.249. save_address
3.250. save_empty
3.251. save_history
3.252. save_name
3.253. score
3.254. score_threshold_delete
3.255. score_threshold_flag
3.256. score_threshold_read
3.257. send_charset
3.258. sendmail
3.259. sendmail_wait
3.260. shell
3.261. sig_dashes
3.262. sig_on_top
3.263. signature
3.264. simple_search
3.265. smart_wrap
3.266. smileys
3.267. sleep_time
3.268. smtp_authenticators
3.269. smtp_pass
3.270. smtp_url
3.271. sort
3.272. sort_alias
3.273. sort_aux
3.274. sort_browser
3.275. sort_re
3.276. spam_separator
3.277. spoolfile
3.278. status_chars
3.279. status_format
3.280. status_on_top
3.281. strict_threads
3.282. suspend
3.283. text_flowed
3.284. thread_received
3.285. thorough_search
3.286. tilde
3.287. time_inc
3.288. timeout
3.289. tmpdir
3.290. to_chars
3.291. tunnel
3.292. use_8bitmime
3.293. use_domain
3.294. use_envelope_from
3.295. use_from
3.296. use_idn
3.297. use_ipv6
3.298. user_agent
3.299. visual
3.300. wait_key
3.301. weed
3.302. wrap
3.303. wrap_search
3.304. wrapmargin
3.305. write_inc
3.306. write_bcc
4. Functions
4.1. generic menu
4.2. index menu
4.3. pager menu
4.4. alias menu
4.5. query menu
4.6. attach menu
4.7. compose menu
4.8. postpone menu
4.9. browser menu
4.10. pgp menu
4.11. smime menu
4.12. mix menu
4.13. editor menu
9. Miscellany
1. Acknowledgements
2. About this document
/mutt-1.5.19/doc/gettingstarted.html:132:

Table 2.4. Message status flags

FlagDescription
Dmessage is deleted (is marked for deletion)
dmessage has attachments marked for deletion
Kcontains a PGP public key
Nmessage is new
Omessage is old
Pmessage is PGP encrypted
rmessage has been replied to
Smessage is signed, and the signature is successfully verified
smessage is signed
!message is flagged
*message is tagged

Table 2.5. Message recipient flags

FlagDescription
+message is to you and you only
Tmessage is to you, but also to or cc'ed to others
Cmessage is cc'ed to you
Fmessage is from you
Lmessage is sent to a subscribed mailing list

4.2. The Pager

/mutt-1.5.19/doc/gettingstarted.html:334:you have specified a $signature, it /mutt-1.5.19/doc/gettingstarted.html:341:

Table 2.11. Most common compose menu keys

KeyFunctionDescription
a<attach-file>attach a file
A<attach-message>attach message(s) to the message
Esc k<attach-key>attach a PGP public key
d<edit-description>edit description on attachment
D<detach-file>detach a file
t<edit-to>edit the To field
Esc f<edit-from>edit the From field
r<edit-reply-to>edit the Reply-To field
c<edit-cc>edit the Cc field
b<edit-bcc>edit the Bcc field
y<send-message>send the message
s<edit-subject>edit the Subject
S<smime-menu>select S/MIME options
f<edit-fcc>specify an “Fcc” mailbox
p<pgp-menu>select PGP options
P<postpone-message>postpone this message until later
q<quit>quit (abort) sending the message
w<write-fcc>write the message to a folder
i<ispell>check spelling (if available on your system)
^F<forget-passphrase>wipe passphrase(s) from memory

/mutt-1.5.19/doc/gettingstarted.html:386:If you have told mutt to PGP or S/MIME encrypt a message, it will guide you /mutt-1.5.19/doc/gettingstarted.html:409:

Table 2.12. PGP key menu flags

FlagDescription
RThe key has been revoked and can't be used.
XThe key is expired and can't be used.
dYou have marked the key as disabled.
cThere are unknown critical self-signature packets.

/mutt-1.5.19/doc/gettingstarted.html:414:it's marked as a signature key in one of the user IDs, but may /mutt-1.5.19/doc/optionalfeatures.html:24:

Chapter 6. Optional features

1. General notes

1.1. Enabling/disabling features

/mutt-1.5.19/doc/optionalfeatures.html:34:OpenSSL, mutt -v would contain: /mutt-1.5.19/doc/optionalfeatures.html:36:-USE_SSL_OPENSSL +USE_SSL_GNUTLS

1.2. URL syntax

/mutt-1.5.19/doc/optionalfeatures.html:48:using SSL or TLS. If no explicit port is given, mutt will use the /mutt-1.5.19/doc/optionalfeatures.html:65:would make mutt attempt to connect using SSL or TLS on a different port /mutt-1.5.19/doc/optionalfeatures.html:66:to encrypt the communication. /mutt-1.5.19/doc/optionalfeatures.html:67:

2. SSL/TLS Support

/mutt-1.5.19/doc/optionalfeatures.html:69:compiled with support for SSL or TLS using either OpenSSL or GnuTLS ( /mutt-1.5.19/doc/optionalfeatures.html:71:--enable-ssl=... option for OpenSSL or /mutt-1.5.19/doc/optionalfeatures.html:73:attempt to encrypt communication with remote servers if these protocols /mutt-1.5.19/doc/optionalfeatures.html:108:{[username@]imapserver[:port][/ssl]}path/to/folder /mutt-1.5.19/doc/optionalfeatures.html:159:GSSAPI, CRAM-MD5, and LOGIN (there is a patch by Grant Edwards to add /mutt-1.5.19/doc/optionalfeatures.html:167:(including GSSAPI, CRAM-MD5, ANONYMOUS, and DIGEST-MD5) the most secure /mutt-1.5.19/doc/optionalfeatures.html:169:(including DIGEST-MD5 and possibly GSSAPI), your entire session will be /mutt-1.5.19/doc/optionalfeatures.html:175:in the following order: SASL, ANONYMOUS, GSSAPI, CRAM-MD5, LOGIN. /mutt-1.5.19/doc/optionalfeatures.html:206:using SSL or TLS) as well as SMTP authentication using SASL. The authentication mechanisms /mutt-1.5.19/doc/optionalfeatures.html:258:folders will be named by the MD5 checksums of their path. These database /mutt-1.5.19/doc/optionalfeatures.html:266:named md5, depending on your operating system. /mutt-1.5.19/doc/manual.xml.head:542:Smessage is signed, and the signature is successfully verified /mutt-1.5.19/doc/manual.xml.head:1036:you have specified a $signature, it /mutt-1.5.19/doc/manual.xml.head:1066:S<smime-menu>select S/MIME options /mutt-1.5.19/doc/manual.xml.head:1173:If you have told mutt to PGP or S/MIME encrypt a message, it will guide you /mutt-1.5.19/doc/manual.xml.head:1216:cThere are unknown critical self-signature packets. /mutt-1.5.19/doc/manual.xml.head:1226:it's marked as a signature key in one of the user IDs, but may /mutt-1.5.19/doc/manual.xml.head:1967:The pgp menu is used to select the OpenPGP keys used to encrypt outgoing /mutt-1.5.19/doc/manual.xml.head:1976:The smime menu is used to select the OpenSSL certificates used to encrypt outgoing /mutt-1.5.19/doc/manual.xml.head:2342:signaturestatus (mode lines used to display info about the mailbox or message) /mutt-1.5.19/doc/manual.xml.head:3211:Example: send-hook mutt "set mime_forward signature=''" /mutt-1.5.19/doc/manual.xml.head:3216:$attribution, $signature and $locale /mutt-1.5.19/doc/manual.xml.head:3289:When encrypting messages with PGP/GnuPG or OpenSSL, you may want to associate a certain /mutt-1.5.19/doc/manual.xml.head:6018:## I've added x-pkcs7 to this, since it functions (for S/MIME) /mutt-1.5.19/doc/manual.xml.head:6019:## analogously to PGP signature attachments. S/MIME isn't supported /mutt-1.5.19/doc/manual.xml.head:6105:OpenSSL, mutt -v would contain: /mutt-1.5.19/doc/manual.xml.head:6109:-USE_SSL_OPENSSL +USE_SSL_GNUTLS /mutt-1.5.19/doc/manual.xml.head:6132:using SSL or TLS. If no explicit port is given, mutt will use the /mutt-1.5.19/doc/manual.xml.head:6155:would make mutt attempt to connect using SSL or TLS on a different port /mutt-1.5.19/doc/manual.xml.head:6156:to encrypt the communication. /mutt-1.5.19/doc/manual.xml.head:6163: /mutt-1.5.19/doc/manual.xml.head:6164:SSL/TLS Support /mutt-1.5.19/doc/manual.xml.head:6168:compiled with support for SSL or TLS using either OpenSSL or GnuTLS ( /mutt-1.5.19/doc/manual.xml.head:6170:--enable-ssl=... option for OpenSSL or /mutt-1.5.19/doc/manual.xml.head:6172:attempt to encrypt communication with remote servers if these protocols /mutt-1.5.19/doc/manual.xml.head:6234:{[username@]imapserver[:port][/ssl]}path/to/folder /mutt-1.5.19/doc/manual.xml.head:6327:GSSAPI, CRAM-MD5, and LOGIN (there is a patch by Grant Edwards to add /mutt-1.5.19/doc/manual.xml.head:6337:(including GSSAPI, CRAM-MD5, ANONYMOUS, and DIGEST-MD5) the most secure /mutt-1.5.19/doc/manual.xml.head:6339:(including DIGEST-MD5 and possibly GSSAPI), your entire session will be /mutt-1.5.19/doc/manual.xml.head:6347:in the following order: SASL, ANONYMOUS, GSSAPI, CRAM-MD5, LOGIN. /mutt-1.5.19/doc/manual.xml.head:6411:using SSL or TLS) as well as SMTP authentication using SASL. The authentication mechanisms /mutt-1.5.19/doc/manual.xml.head:6495:folders will be named by the MD5 checksums of their path. These database /mutt-1.5.19/doc/manual.xml.head:6507:named md5, depending on your operating system. /mutt-1.5.19/hcache.c:47:#include "md5.h" /mutt-1.5.19/hcache.c:548: md5_buffer (folder, strlen (folder), &md5sum); /mutt-1.5.19/mutt_ssl.h:19:#ifndef _MUTT_SSL_H_ /mutt-1.5.19/mutt_ssl.h:20:#define _MUTT_SSL_H_ 1 /mutt-1.5.19/mutt_ssl.h:24:#if defined(USE_SSL) /mutt-1.5.19/mutt_ssl.h:25:int mutt_ssl_starttls (CONNECTION* conn); /mutt-1.5.19/mutt_ssl.h:26:int mutt_ssl_socket_setup (CONNECTION *conn); /mutt-1.5.19/mutt_ssl.h:29:#endif /* _MUTT_SSL_H_ */ /mutt-1.5.19/commands.c:78: if (cur->security & ENCRYPT) /mutt-1.5.19/commands.c:89: /* find out whether or not the verify signature */ /mutt-1.5.19/commands.c:90: if (query_quadoption (OPT_VERIFYSIG, _("Verify PGP signature?")) == M_YES) /mutt-1.5.19/commands.c:97: if (cmflags & M_CM_VERIFY || cur->security & ENCRYPT) /mutt-1.5.19/commands.c:189: mutt_message ( _("S/MIME signature successfully verified.")); /mutt-1.5.19/commands.c:191: mutt_error ( _("S/MIME certificate owner does not match sender.")); /mutt-1.5.19/commands.c:196: mutt_error ( _("S/MIME signature could NOT be verified.")); /mutt-1.5.19/commands.c:203: mutt_message (_("PGP signature successfully verified.")); /mutt-1.5.19/commands.c:207: mutt_message (_("PGP signature could NOT be verified.")); /mutt-1.5.19/commands.c:341: if (WithCrypto && decode && h->security & ENCRYPT) /mutt-1.5.19/commands.c:371: it makes the screen flicker on pgp and s/mime messages, /mutt-1.5.19/commands.c:382: if(h->security & ENCRYPT && !crypt_valid_passphrase(h->security)) /mutt-1.5.19/commands.c:407: if (Context->hdrs[Context->v2r[i]]->security & ENCRYPT && /mutt-1.5.19/commands.c:635:static void set_copy_flags (HEADER *hdr, int decode, int decrypt, int *cmflags, int *chflags) /mutt-1.5.19/commands.c:640: if (WithCrypto && !decode && decrypt && (hdr->security & ENCRYPT)) /mutt-1.5.19/commands.c:649: && mutt_is_application_pgp (hdr->content) & ENCRYPT) /mutt-1.5.19/commands.c:652: && mutt_is_application_smime(hdr->content) & ENCRYPT) /mutt-1.5.19/commands.c:664: if (!decrypt) /* If decode doesn't kick in for decrypt, */ /mutt-1.5.19/commands.c:677:int _mutt_save_message (HEADER *h, CONTEXT *ctx, int delete, int decode, int decrypt) /mutt-1.5.19/commands.c:682: set_copy_flags (h, decode, decrypt, &cmflags, &chflags); /mutt-1.5.19/commands.c:684: if (decode || decrypt) /mutt-1.5.19/commands.c:702: int decode, int decrypt, int *redraw) /mutt-1.5.19/commands.c:718: (decrypt ? (delete ? _("Decrypt-save%s to mailbox") : /mutt-1.5.19/commands.c:719: _("Decrypt-copy%s to mailbox")) : /mutt-1.5.19/commands.c:728: need_passphrase = h->security & ENCRYPT; /mutt-1.5.19/commands.c:754: need_passphrase = h->security & ENCRYPT; /mutt-1.5.19/commands.c:790: if (WithCrypto && need_passphrase && (decode || decrypt) /mutt-1.5.19/commands.c:798: !(decode || decrypt) && mx_is_imap (buf)) /mutt-1.5.19/commands.c:816: if (_mutt_save_message(h, &ctx, delete, decode, decrypt) != 0) /mutt-1.5.19/commands.c:830: &ctx, delete, decode, decrypt) != 0) /mutt-1.5.19/gnupgparse.c:69: * - signature class /mutt-1.5.19/gnupgparse.c:283: case 11: /* signature class */ /mutt-1.5.19/OPS.SMIME:1:OP_COMPOSE_SMIME_MENU "show S/MIME options" /mutt-1.5.19/pgp.c:22: * This file contains all of the PGP routines necessary to sign, encrypt, /mutt-1.5.19/pgp.c:23: * verify and decrypt PGP messages in either the new PGP/MIME format, or /mutt-1.5.19/pgp.c:142:/* Copy PGP output messages and look for signs of a good signature */ /mutt-1.5.19/pgp.c:184: * Copy a clearsigned message, and strip the signature and PGP's /mutt-1.5.19/pgp.c:222: if (mutt_strcmp (buf, "-----BEGIN PGP SIGNATURE-----\n") == 0) /mutt-1.5.19/pgp.c:250: int could_not_decrypt = 0; /mutt-1.5.19/pgp.c:331: && (mutt_strcmp ("-----END PGP SIGNATURE-----\n", buf) == 0 /mutt-1.5.19/pgp.c:405: could_not_decrypt = 1; /mutt-1.5.19/pgp.c:409: if (could_not_decrypt && !(s->flags & M_DISPLAY)) /mutt-1.5.19/pgp.c:411: mutt_error _("Could not decrypt PGP message"); /mutt-1.5.19/pgp.c:458: if (could_not_decrypt) /mutt-1.5.19/pgp.c:459: mutt_error _("Could not decrypt PGP message"); /mutt-1.5.19/pgp.c:770:BODY *pgp_decrypt_part (BODY *a, STATE *s, FILE *fpout, BODY *p) /mutt-1.5.19/pgp.c:806: if ((thepid = pgp_invoke_decrypt (&pgpin, &pgpout, NULL, -1, -1, /mutt-1.5.19/pgp.c:882:int pgp_decrypt_mime (FILE *fpin, FILE **fpout, BODY *b, BODY **cur) /mutt-1.5.19/pgp.c:906: *cur = pgp_decrypt_part (b, &s, *fpout, p); /mutt-1.5.19/pgp.c:950: if ((tattach = pgp_decrypt_part (a, s, fpout, p)) != NULL) /mutt-1.5.19/pgp.c:962: * multipart/encrypted, cache signature verification /mutt-1.5.19/pgp.c:982: mutt_error _("Could not decrypt PGP message"); /mutt-1.5.19/pgp.c:1047: * Read back the PGP signature. Also, change MESSAGE=>SIGNATURE as /mutt-1.5.19/pgp.c:1053: fputs ("-----BEGIN PGP SIGNATURE-----\n", fp); /mutt-1.5.19/pgp.c:1055: fputs ("-----END PGP SIGNATURE-----\n", fp); /mutt-1.5.19/pgp.c:1101: mutt_set_parameter ("protocol", "application/pgp-signature", &t->parameter); /mutt-1.5.19/pgp.c:1110: t->subtype = safe_strdup ("pgp-signature"); /mutt-1.5.19/pgp.c:1248:BODY *pgp_encrypt_message (BODY *a, char *keylist, int sign) /mutt-1.5.19/pgp.c:1294: if ((thepid = pgp_invoke_encrypt (&pgpin, NULL, NULL, -1, /mutt-1.5.19/pgp.c:1337: /* fatal error while trying to encrypt message */ /mutt-1.5.19/pgp.c:1430: if (flags & ENCRYPT) /mutt-1.5.19/pgp.c:1528: mutt_set_parameter ("x-action", flags & ENCRYPT ? "pgp-encrypted" : "pgp-signed", /mutt-1.5.19/pgp.c:1550: if (!(flags & ENCRYPT)) /mutt-1.5.19/pgp.c:1568: !((msg->security & APPLICATION_PGP) && (msg->security & (SIGN|ENCRYPT)))) /mutt-1.5.19/pgp.c:1578: msg->security |= ENCRYPT; /mutt-1.5.19/pgp.c:1584: msg->security &= ~ENCRYPT; /mutt-1.5.19/pgp.c:1612: msg->security |= (ENCRYPT | SIGN); /mutt-1.5.19/pgp.c:1616: if ((msg->security & (ENCRYPT | SIGN))) /mutt-1.5.19/pgp.c:1630: if (! (msg->security & (ENCRYPT | SIGN))) /mutt-1.5.19/Makefile.in:37: pgpewrap$(EXEEXT) mutt_md5$(EXEEXT) /mutt-1.5.19/Makefile.in:93:am_mutt_md5_OBJECTS = mutt_md5-md5.$(OBJEXT) /mutt-1.5.19/Makefile.in:94:mutt_md5_OBJECTS = $(am_mutt_md5_OBJECTS) /mutt-1.5.19/Makefile.in:95:mutt_md5_DEPENDENCIES = /mutt-1.5.19/Makefile.in:96:mutt_md5_LINK = $(CCLD) $(mutt_md5_CFLAGS) $(CFLAGS) $(AM_LDFLAGS) \ /mutt-1.5.19/Makefile.in:103: lib.$(OBJEXT) extlib.$(OBJEXT) sha1.$(OBJEXT) md5.$(OBJEXT) \ /mutt-1.5.19/Makefile.in:116: $(mutt_dotlock_SOURCES) $(mutt_md5_SOURCES) pgpewrap.c \ /mutt-1.5.19/Makefile.in:119: $(mutt_dotlock_SOURCES) $(mutt_md5_SOURCES) pgpewrap.c \ /mutt-1.5.19/Makefile.in:216:MUTT_MD5 = @MUTT_MD5@ /mutt-1.5.19/Makefile.in:322: crypt-mod-smime-gpgme.c dotlock.c gnupgparse.c hcache.c md5.c \ /mutt-1.5.19/Makefile.in:323: mutt_idna.c mutt_sasl.c mutt_socket.c mutt_ssl.c mutt_ssl_gnutls.c \ /mutt-1.5.19/Makefile.in:325: pgppacket.c pop.c pop_auth.c pop_lib.c remailer.c resize.c sha1.c \ /mutt-1.5.19/Makefile.in:333: mailbox.h mapping.h md5.h mime.h mutt.h mutt_curses.h mutt_menu.h \ /mutt-1.5.19/Makefile.in:334: mutt_regex.h mutt_sasl.h mutt_socket.h mutt_ssl.h mutt_tunnel.h \ /mutt-1.5.19/Makefile.in:336: rfc2231.h rfc822.h rfc3676.h sha1.h sort.h mime.types VERSION prepare \ /mutt-1.5.19/Makefile.in:339: README.SSL smime.h \ /mutt-1.5.19/Makefile.in:348:pgpring_SOURCES = pgppubring.c pgplib.c lib.c extlib.c sha1.c md5.c pgppacket.c ascii.c /mutt-1.5.19/Makefile.in:351:mutt_md5_SOURCES = md5.c /mutt-1.5.19/Makefile.in:352:mutt_md5_CFLAGS = -DMD5UTIL /mutt-1.5.19/Makefile.in:353:mutt_md5_LDADD = /mutt-1.5.19/Makefile.in:354:noinst_PROGRAMS = $(MUTT_MD5) /mutt-1.5.19/Makefile.in:452:mutt_md5$(EXEEXT): $(mutt_md5_OBJECTS) $(mutt_md5_DEPENDENCIES) /mutt-1.5.19/Makefile.in:453: @rm -f mutt_md5$(EXEEXT) /mutt-1.5.19/Makefile.in:454: $(mutt_md5_LINK) $(mutt_md5_OBJECTS) $(mutt_md5_LDADD) $(LIBS) /mutt-1.5.19/Makefile.in:545:@AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/md5.Po@am__quote@ /mutt-1.5.19/Makefile.in:550:@AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/mutt_md5-md5.Po@am__quote@ /mutt-1.5.19/Makefile.in:553:@AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/mutt_ssl.Po@am__quote@ /mutt-1.5.19/Makefile.in:554:@AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/mutt_ssl_gnutls.Po@am__quote@ /mutt-1.5.19/Makefile.in:587:@AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/sha1.Po@am__quote@ /mutt-1.5.19/Makefile.in:613:mutt_md5-md5.o: md5.c /mutt-1.5.19/Makefile.in:614:@am__fastdepCC_TRUE@ $(CC) $(DEFS) $(DEFAULT_INCLUDES) $(INCLUDES) $(AM_CPPFLAGS) $(CPPFLAGS) $(mutt_md5_CFLAGS) $(CFLAGS) -MT mutt_md5-md5.o -MD -MP -MF $(DEPDIR)/mutt_md5-md5.Tpo -c -o mutt_md5-md5.o `test -f 'md5.c' || echo '$(srcdir)/'`md5.c /mutt-1.5.19/Makefile.in:615:@am__fastdepCC_TRUE@ mv -f $(DEPDIR)/mutt_md5-md5.Tpo $(DEPDIR)/mutt_md5-md5.Po /mutt-1.5.19/Makefile.in:616:@AMDEP_TRUE@@am__fastdepCC_FALSE@ source='md5.c' object='mutt_md5-md5.o' libtool=no @AMDEPBACKSLASH@ /mutt-1.5.19/Makefile.in:618:@am__fastdepCC_FALSE@ $(CC) $(DEFS) $(DEFAULT_INCLUDES) $(INCLUDES) $(AM_CPPFLAGS) $(CPPFLAGS) $(mutt_md5_CFLAGS) $(CFLAGS) -c -o mutt_md5-md5.o `test -f 'md5.c' || echo '$(srcdir)/'`md5.c /mutt-1.5.19/Makefile.in:620:mutt_md5-md5.obj: md5.c /mutt-1.5.19/Makefile.in:621:@am__fastdepCC_TRUE@ $(CC) $(DEFS) $(DEFAULT_INCLUDES) $(INCLUDES) $(AM_CPPFLAGS) $(CPPFLAGS) $(mutt_md5_CFLAGS) $(CFLAGS) -MT mutt_md5-md5.obj -MD -MP -MF $(DEPDIR)/mutt_md5-md5.Tpo -c -o mutt_md5-md5.obj `if test -f 'md5.c'; then $(CYGPATH_W) 'md5.c'; else $(CYGPATH_W) '$(srcdir)/md5.c'; fi` /mutt-1.5.19/Makefile.in:622:@am__fastdepCC_TRUE@ mv -f $(DEPDIR)/mutt_md5-md5.Tpo $(DEPDIR)/mutt_md5-md5.Po /mutt-1.5.19/Makefile.in:623:@AMDEP_TRUE@@am__fastdepCC_FALSE@ source='md5.c' object='mutt_md5-md5.obj' libtool=no @AMDEPBACKSLASH@ /mutt-1.5.19/Makefile.in:625:@am__fastdepCC_FALSE@ $(CC) $(DEFS) $(DEFAULT_INCLUDES) $(INCLUDES) $(AM_CPPFLAGS) $(CPPFLAGS) $(mutt_md5_CFLAGS) $(CFLAGS) -c -o mutt_md5-md5.obj `if test -f 'md5.c'; then $(CYGPATH_W) 'md5.c'; else $(CYGPATH_W) '$(srcdir)/md5.c'; fi` /mutt-1.5.19/Makefile.in:1054:hcversion.h: $(srcdir)/mutt.h $(srcdir)/rfc822.h hcachever.sh $(MUTT_MD5) /mutt-1.5.19/pgp.h:32:BODY *pgp_decrypt_part (BODY *, STATE *, FILE *, BODY *); /mutt-1.5.19/pgp.h:42:int pgp_decrypt_mime (FILE *, FILE **, BODY *, BODY **); /mutt-1.5.19/pgp.h:70:pid_t pgp_invoke_decrypt (FILE **pgpin, FILE **pgpout, FILE **pgperr, /mutt-1.5.19/pgp.h:76:pid_t pgp_invoke_encrypt (FILE **pgpin, FILE **pgpout, FILE **pgperr, /mutt-1.5.19/pgp.h:100:BODY *pgp_encrypt_message (BODY *, char *, int); /mutt-1.5.19/crypt.c:55:/* print the current time to avoid spoofing of the signature output */ /mutt-1.5.19/crypt.c:195: && (!(flags & ENCRYPT) || option (OPTPGPRETAINABLESIG))) /mutt-1.5.19/crypt.c:213: if (msg->security & ENCRYPT) /mutt-1.5.19/crypt.c:239: if (!(pbody = crypt_pgp_encrypt_message (tmp_pgp_pbody, keylist, /mutt-1.5.19/crypt.c:243: /* did we perform a retainable signature? */ /mutt-1.5.19/crypt.c:248: /* get rid of the signature */ /mutt-1.5.19/crypt.c:255: /* destroy temporary signature envelope when doing retainable /mutt-1.5.19/crypt.c:291: && !(ascii_strcasecmp (p, "application/pgp-signature"))) /mutt-1.5.19/crypt.c:295: && !(ascii_strcasecmp (p, "application/x-pkcs7-signature"))) /mutt-1.5.19/crypt.c:298: && !(ascii_strcasecmp (p, "application/pkcs7-signature"))) /mutt-1.5.19/crypt.c:357: else if (p && !ascii_strncasecmp ("pgp-encrypt", p, 11)) /mutt-1.5.19/crypt.c:378: /* S/MIME MIME types don't need x- anymore, see RFC2311 */ /mutt-1.5.19/crypt.c:391: * Content-Description: S/MIME Encrypted Message /mutt-1.5.19/crypt.c:394: if (!ascii_strcasecmp (m->description, "S/MIME Encrypted Message")) /mutt-1.5.19/crypt.c:408: mutt_message (_("S/MIME messages with no hints on content are unsupported.")); /mutt-1.5.19/crypt.c:613: if (Context->hdrs[Context->v2r[i]]->security & ENCRYPT && /mutt-1.5.19/crypt.c:634: if (Context->hdrs[Context->v2r[i]]->security & ENCRYPT) /mutt-1.5.19/crypt.c:651: mutt_endwin (_("Trying to extract S/MIME certificates...\n")); /mutt-1.5.19/crypt.c:664: if (!(h->security & ENCRYPT && !crypt_valid_passphrase (h->security))) /mutt-1.5.19/crypt.c:678: if (h->security & ENCRYPT) /mutt-1.5.19/crypt.c:691: mutt_message (_("Trying to extract S/MIME certificates...\n")); /mutt-1.5.19/crypt.c:724: if (msg->security & ENCRYPT) /mutt-1.5.19/crypt.c:822: && !ascii_strcasecmp (protocol_minor, "pgp-signature")) /mutt-1.5.19/crypt.c:826: && !(ascii_strcasecmp (protocol_minor, "x-pkcs7-signature") /mutt-1.5.19/crypt.c:827: && ascii_strcasecmp (protocol_minor, "pkcs7-signature"))) /mutt-1.5.19/crypt.c:854: && !ascii_strcasecmp (signatures[i]->subtype, "pgp-signature")) /mutt-1.5.19/crypt.c:864: && (!ascii_strcasecmp(signatures[i]->subtype, "x-pkcs7-signature") /mutt-1.5.19/crypt.c:865: || !ascii_strcasecmp(signatures[i]->subtype, "pkcs7-signature"))) /mutt-1.5.19/recvattach.c:949: if (WithCrypto && ((hdr->security & ENCRYPT) || /mutt-1.5.19/recvattach.c:954: if ((hdr->security & ENCRYPT) && !crypt_valid_passphrase(hdr->security)) /mutt-1.5.19/recvattach.c:966: secured = ! crypt_smime_decrypt_mime (msg->fp, &fp, /mutt-1.5.19/recvattach.c:969: /* S/MIME nesting */ /mutt-1.5.19/recvattach.c:976: secured = !crypt_smime_decrypt_mime (_fp, &fp, _cur, &cur); /mutt-1.5.19/recvattach.c:988: secured = !crypt_pgp_decrypt_mime (msg->fp, &fp, hdr->content, &cur); /mutt-1.5.19/recvattach.c:996: mutt_error _("Can't decrypt encrypted message!"); /mutt-1.5.19/sha1.h:2: SHA-1 in C /mutt-1.5.19/sha1.h:9:#ifndef _SHA1_H /mutt-1.5.19/sha1.h:10:# define _SHA1_H /mutt-1.5.19/sha1.h:18:} SHA1_CTX; /mutt-1.5.19/sha1.h:21:void SHA1Init(SHA1_CTX* context); /mutt-1.5.19/sha1.h:22:void SHA1Update(SHA1_CTX* context, const unsigned char* data, uint32_t len); /mutt-1.5.19/sha1.h:23:void SHA1Final(unsigned char digest[20], SHA1_CTX* context); /mutt-1.5.19/sha1.h:25:# define SHA1_Transform SHA1Transform /mutt-1.5.19/sha1.h:26:# define SHA1_Init SHA1Init /mutt-1.5.19/sha1.h:27:# define SHA1_Update SHA1Update /mutt-1.5.19/sha1.h:28:# define SHA1_Final SHA1Final /mutt-1.5.19/sha1.h:30:# define SHA_DIGEST_LENGTH 20 /mutt-1.5.19/attach.c:427: if (WithCrypto && is_message && a->hdr && (a->hdr->security & ENCRYPT) && /mutt-1.5.19/init.c:35:#if defined(USE_SSL) /mutt-1.5.19/init.c:36:#include "mutt_ssl.h" /mutt-1.5.19/smime.h:32:int smime_decrypt_mime (FILE *, FILE **, BODY *, BODY **); /mutt-1.5.19/mutt_socket.c:28:#if defined(USE_SSL) /mutt-1.5.19/mutt_socket.c:29:# include "mutt_ssl.h" /mutt-1.5.19/mutt_socket.c:291: else if (account->flags & M_ACCT_SSL) /mutt-1.5.19/mutt_socket.c:293:#if defined(USE_SSL) /mutt-1.5.19/mutt_socket.c:294: if (mutt_ssl_socket_setup (conn) < 0) /mutt-1.5.19/mutt_socket.c:300: mutt_error _("SSL is unavailable."); /mutt-1.5.19/smtp.c:29:#ifdef USE_SSL /mutt-1.5.19/smtp.c:30:# include "mutt_ssl.h" /mutt-1.5.19/smtp.c:316: account->flags |= M_ACCT_SSL; /mutt-1.5.19/smtp.c:320: if (account->flags & M_ACCT_SSL) /mutt-1.5.19/smtp.c:349: /* if TLS or AUTH are requested, use EHLO */ /mutt-1.5.19/smtp.c:352:#ifdef USE_SSL /mutt-1.5.19/smtp.c:385:#ifdef USE_SSL /mutt-1.5.19/smtp.c:392: _("Secure connection with TLS?"))) == -1) /mutt-1.5.19/smtp.c:402: if (mutt_ssl_starttls (conn)) /mutt-1.5.19/smtp.c:404: mutt_error (_("Could not negotiate TLS connection")); /mutt-1.5.19/functions.h:167: { "decrypt-copy", OP_DECRYPT_COPY, NULL }, /mutt-1.5.19/functions.h:168: { "decrypt-save", OP_DECRYPT_SAVE, NULL }, /mutt-1.5.19/functions.h:264: { "decrypt-copy", OP_DECRYPT_COPY, NULL }, /mutt-1.5.19/functions.h:265: { "decrypt-save", OP_DECRYPT_SAVE, NULL }, /mutt-1.5.19/compose.c:120: mvaddstr (HDR_CRYPT, 0, " S/MIME: "); /mutt-1.5.19/compose.c:125: mvaddstr (HDR_CRYPT, 0, " S/MIME: "); /mutt-1.5.19/compose.c:131: if ((msg->security & (ENCRYPT | SIGN)) == (ENCRYPT | SIGN)) /mutt-1.5.19/compose.c:132: addstr (_("Sign, Encrypt")); /mutt-1.5.19/compose.c:133: else if (msg->security & ENCRYPT) /mutt-1.5.19/compose.c:134: addstr (_("Encrypt")); /mutt-1.5.19/compose.c:142: && (msg->security & (ENCRYPT | SIGN))) /mutt-1.5.19/compose.c:164: && (msg->security & ENCRYPT) /mutt-1.5.19/compose.c:167: mvprintw (HDR_CRYPTINFO, 40, "%s%s", _("Encrypt with: "), /mutt-1.5.19/compose.c:1224: if (mutt_yesorno (_("S/MIME already selected. Clear & continue ? "), /mutt-1.5.19/crypt-mod-pgp-gpgme.c:48:static int crypt_mod_pgp_decrypt_mime (FILE *a, FILE **b, BODY *c, BODY **d) /mutt-1.5.19/crypt-mod-pgp-gpgme.c:50: return pgp_gpgme_decrypt_mime (a, b, c, d); /mutt-1.5.19/crypt-mod-pgp-gpgme.c:93:static BODY *crypt_mod_pgp_encrypt_message (BODY *a, char *keylist, int sign) /mutt-1.5.19/crypt-mod-pgp-gpgme.c:95: return pgp_gpgme_encrypt_message (a, keylist, sign); /mutt-1.5.19/crypt-mod-pgp-gpgme.c:110: crypt_mod_pgp_decrypt_mime, /mutt-1.5.19/crypt-mod-pgp-gpgme.c:120: crypt_mod_pgp_encrypt_message, /mutt-1.5.19/globals.h:119:WHERE char *Signature; /mutt-1.5.19/globals.h:128:#if defined(USE_SSL) /mutt-1.5.19/globals.h:132:#ifdef USE_SSL_GNUTLS /mutt-1.5.19/mutt_crypt.h:34:#define ENCRYPT (1 << 0) /mutt-1.5.19/mutt_crypt.h:48:#define PGPENCRYPT (APPLICATION_PGP | ENCRYPT) /mutt-1.5.19/mutt_crypt.h:54:#define SMIMEENCRYPT (APPLICATION_SMIME | ENCRYPT) /mutt-1.5.19/mutt_crypt.h:170:/* Decrypt a PGP/MIME message. */ /mutt-1.5.19/mutt_crypt.h:171:int crypt_pgp_decrypt_mime (FILE *a, FILE **b, BODY *c, BODY **d); /mutt-1.5.19/mutt_crypt.h:207:BODY *crypt_pgp_encrypt_message (BODY *a, char *keylist, int sign); /mutt-1.5.19/mutt_crypt.h:232:/* Decrypt an S/MIME message. */ /mutt-1.5.19/mutt_crypt.h:233:int crypt_smime_decrypt_mime (FILE *a, FILE **b, BODY *c, BODY **d); /mutt-1.5.19/ChangeLog:111: * mutt_ssl_gnutls.c: Add SSL intermediate certificate support for /mutt-1.5.19/ChangeLog:114: * mutt_ssl.c: Simplify intermediate certificate handling. Return /mutt-1.5.19/ChangeLog:120: * globals.h, mutt_ssl.c: Add support for intermediate certificates to /mutt-1.5.19/ChangeLog:121: openssl code. Gnutls support is not included in this patch. /mutt-1.5.19/ChangeLog:267: init.c, menu.c, mutt_menu.h, mutt_ssl.c, mutt_ssl_gnutls.c, pager.c, /mutt-1.5.19/ChangeLog:342: * md5.c, md5.h: md5.h, md5.c: updated to latest version from gnulib. /mutt-1.5.19/ChangeLog:343: Buggy old md5.h causes problems with gcc 4.3 compiler. In md5.h /mutt-1.5.19/ChangeLog:344: __attribute__ is #define'd to no-op and causes mutt_md5 to enter /mutt-1.5.19/ChangeLog:349: * curs_lib.c, mutt_socket.c, mutt_ssl_gnutls.c, smtp.c: Suppress /mutt-1.5.19/ChangeLog:373: mutt_idna.c, mutt_ssl.c, mx.c, parse.c, recvattach.c, rfc822.c, /mutt-1.5.19/ChangeLog:559: * ChangeLog, mutt_ssl_gnutls.c: Make gnutls read function more robust /mutt-1.5.19/ChangeLog:634: * imap/util.c, mutt_sasl.c, mutt_ssl.c, mutt_ssl_gnutls.c: /mutt-1.5.19/ChangeLog:635: Properly set the SASL external auth name when using SSL client /mutt-1.5.19/ChangeLog:706: * mutt_ssl.c: Port certificate host checking from msmtp to /mutt-1.5.19/ChangeLog:860: * mutt_ssl.c: Verify hostname in (Open)SSL certificate validation /mutt-1.5.19/ChangeLog:864: struct sslsockdata) and validates the hostname even in case OpenSSL /mutt-1.5.19/ChangeLog:974: * mutt_ssl_gnutls.c: Extract CN from client certificate in gnutls. /mutt-1.5.19/ChangeLog:978: * UPDATING, globals.h, init.h, mutt_sasl.c, mutt_ssl_gnutls.c: /mutt-1.5.19/ChangeLog:979: Basic support for $ssl_client_cert when compiled with /mutt-1.5.19/ChangeLog:1000: * smime.c: Check S/MIME signing ID exists before attempting to use /mutt-1.5.19/ChangeLog:1072: * pgp.c: Call mutt_need_hard_redraw() in pgp_decrypt_part(). /mutt-1.5.19/ChangeLog:1150: removing libs for mutt_md5 /mutt-1.5.19/ChangeLog:1163: * Makefile.am: hcversion.h depends on new mutt_md5 tool /mutt-1.5.19/ChangeLog:1171: * crypt-gpgme.c: Fix GPGME S/MIME micalg generation, broken /mutt-1.5.19/ChangeLog:1180: md5.c: Build local md5 tool for hcachever.sh. Closes #3025. /mutt-1.5.19/ChangeLog:1269: * mutt_ssl_gnutls.c: Fix sending long commands when using gnutls. /mutt-1.5.19/ChangeLog:1409: * lib.c, md5.h: Check definition of ENOTSUP before use /mutt-1.5.19/ChangeLog:1721: * doc/manual.xml.head: Manual: Add short section on SSL/TLS support /mutt-1.5.19/ChangeLog:1830: * ChangeLog, configure.ac: The new MD5 code needs AC_C_BIGENDIAN on /mutt-1.5.19/ChangeLog:1871: * ChangeLog, mutt_ssl_gnutls.c: Only check whether GNUTLS error is /mutt-1.5.19/ChangeLog:1943: * imap/auth_cram.c: Update auth_cram for new MD5 code /mutt-1.5.19/ChangeLog:1946: * Makefile.am, configure.ac, hcache.c, md5.c, md5.h, md5c.c, /mutt-1.5.19/ChangeLog:1947: pgppubring.c, pop_auth.c: Replace RFC md5 implementation with GPL /mutt-1.5.19/ChangeLog:2041: signature verification instead of doing it by hand. This fixes /mutt-1.5.19/ChangeLog:2123: Use autoconf instead of "which" to discover MD5 tool /mutt-1.5.19/ChangeLog:2439: MD5 of structures on which it depends /mutt-1.5.19/ChangeLog:2650: * configure.ac: configure.ac: Make SSL tests for OpenSSL and gnutls /mutt-1.5.19/ChangeLog:2651: behave the same For both this now mentions SMTP as a possible SSL /mutt-1.5.19/ChangeLog:2653: POP/IMAP/SMTP into a warning as the OpenSSL part does. /mutt-1.5.19/ChangeLog:2664: mutt_ssl.c, mutt_ssl_gnutls.c, pgpkey.c, postpone.c, query.c, /mutt-1.5.19/ChangeLog:2691: when mutt is not configured with SSL support. /mutt-1.5.19/ChangeLog:2992: * configure.in: Make --enable-ssl without pop or imap a mere warning. /mutt-1.5.19/ChangeLog:3089: Makefile.am: PKA signature verification via GPGME, controlled /mutt-1.5.19/ChangeLog:3260: * pgpmicalg.c: RFC-2440bis adds support for the SHA-224 hash /mutt-1.5.19/ChangeLog:3759: * imap/message.c, imap/utf7.c, imap/util.c, mutt_ssl_gnutls.c, /mutt-1.5.19/ChangeLog:3812: * imap/imap.c, init.h, main.c, mutt.h, mutt_socket.c, mutt_ssl.c, /mutt-1.5.19/ChangeLog:3813: mutt_ssl.h, mutt_ssl_gnutls.c, pop_lib.c, buffy.c, configure.in, /mutt-1.5.19/ChangeLog:3815: when compiling with POP and GNUTLS, I noticed the SSL interfaces /mutt-1.5.19/ChangeLog:3816: for OpenSSL and GNUTLS internally are different which doesn't /mutt-1.5.19/ChangeLog:4177: * mutt_ssl.c, mutt_ssl_gnutls.c: Add conn_poll (using /mutt-1.5.19/ChangeLog:4178: raw_socket_poll) to SSL socket setup functions. /mutt-1.5.19/ChangeLog:4283: * smime.c: Fix S/MIME algorithm choice. /mutt-1.5.19/ChangeLog:4322: * smime.c: Add AES ciphers to S/MIME encryption options. Closes: /mutt-1.5.19/ChangeLog:4331: * smime.c: S/MIME key selection truncates the last character of /mutt-1.5.19/ChangeLog:4584: mutt_sasl.h, mutt_socket.c, mutt_socket.h, mutt_ssl.c, mutt_ssl.h, /mutt-1.5.19/ChangeLog:4585: mutt_ssl_gnutls.c, mutt_tunnel.c, mutt_tunnel.h, muttbug.sh.in, /mutt-1.5.19/ChangeLog:4623: mutt_sasl.h, mutt_socket.c, mutt_socket.h, mutt_ssl.c, mutt_ssl.h, /mutt-1.5.19/ChangeLog:4624: mutt_ssl_gnutls.c, mutt_tunnel.c, mutt_tunnel.h, muttbug.sh.in, /mutt-1.5.19/ChangeLog:4776: po/id.po, po/ca.po, po/cs.po: Correct some S/MIME po entries. /mutt-1.5.19/ChangeLog:4917: * pgp.c: Don't treat PGP inline signature verification errors /mutt-1.5.19/ChangeLog:4959: * cryptglue.c, mutt_sasl.c, smime.c: Fix some S/MIME spelling /mutt-1.5.19/ChangeLog:4964: * mutt_ssl_gnutls.c: Turn off input buffering for gnutls SSL /mutt-1.5.19/ChangeLog:4965: certificate menu, as we do in the openssl version. /mutt-1.5.19/ChangeLog:5125: pointless imap_force_ssl option with ssl_force_tls, which /mutt-1.5.19/ChangeLog:5154: * mutt_ssl.c: Don't double-free X509 certificates. This patch /mutt-1.5.19/ChangeLog:5160: mutt_ssl_nss.c from POTFILES.in. Also hack the makefiles to build /mutt-1.5.19/ChangeLog:5166: mutt_ssl.h, mutt_ssl_nss.c, pop_lib.c, configure.in: Put moribund /mutt-1.5.19/ChangeLog:5174: avoid confusing messages like 'decrypt failed; PGP signature /mutt-1.5.19/ChangeLog:5186: * pgp.c: Also forget passphrase when encrypt fails, if /mutt-1.5.19/ChangeLog:5206: * pgp.c: Automatically forget PGP passphrase on sign or decrypt /mutt-1.5.19/ChangeLog:5210: nothing. Superseded by signature verification. /mutt-1.5.19/ChangeLog:5212: * commands.c, pgp.c: Don't report PGP signature could not be /mutt-1.5.19/ChangeLog:5213: verified unless there really is a signature verification problem /mutt-1.5.19/ChangeLog:5228: * globals.h, mutt.h, mutt_ssl.c, muttlib.c: Cache SSL certificates /mutt-1.5.19/ChangeLog:5270: * mutt_ssl_gnutls.c: Tweak a poorly-worded error message in the /mutt-1.5.19/ChangeLog:5279: * crypt-gpgme.c: Fix mutt/2004; S/MIME user interface differences /mutt-1.5.19/ChangeLog:5299: * mutt_ssl_gnutls.c: Silence some harmless warnings. Also, /mutt-1.5.19/ChangeLog:5317: * crypt-gpgme.c, mutt_ssl_gnutls.c, po/POTFILES.in: Partial /mutt-1.5.19/ChangeLog:5353: * mutt_ssl.c: Don't offer to save expired or not-yet-valid /mutt-1.5.19/ChangeLog:5433: * recvattach.c, smime.c: Fix S/MIME segmentation fault. Bug /mutt-1.5.19/ChangeLog:5598: mutt_ssl.c, mutt_ssl_gnutls.c, mutt_ssl_nss.c, mutt_tunnel.c: /mutt-1.5.19/ChangeLog:5629: which fixes the problem of a failing openssl after interactively /mutt-1.5.19/ChangeLog:5779: * configure.in, m4/libgnutls.m4, mutt_ssl_gnutls.c: autoconf /mutt-1.5.19/ChangeLog:5783: * globals.h, init.h: Only enable ssl_client_cert for openssl /mutt-1.5.19/ChangeLog:5822: * pgp.c: Fix PGP clear signature handling. /mutt-1.5.19/ChangeLog:5833: send.c, sendlib.c, sha1.c, signal.c, smime.c, snprintf.c, /mutt-1.5.19/ChangeLog:5842: mutt.h, mutt_idna.c, mutt_sasl.c, mutt_socket.c, mutt_ssl.c, /mutt-1.5.19/ChangeLog:5843: mutt_ssl_gnutls.c, mutt_ssl_nss.c, mutt_tunnel.c, muttlib.c, /mutt-1.5.19/ChangeLog:5898: * mutt_ssl_gnutls.c: The attached mini-patch from David Mosberger /mutt-1.5.19/ChangeLog:5929: * pgp.c: Return an error in pgp_decrypt_part when the PGP output /mutt-1.5.19/ChangeLog:5950: * smime.c: Void the S/MIME passphrase before prompting /mutt-1.5.19/ChangeLog:5964: * Makefile.am: Include mutt_ssl_gnutls.c with the distribution. /mutt-1.5.19/ChangeLog:5969: mutt.h, mutt_sasl.c, mutt_socket.c, mutt_ssl.h, mutt_ssl_gnutls.c, /mutt-1.5.19/ChangeLog:5992: * pgp.c: Improved good signature check. /mutt-1.5.19/ChangeLog:6115: lib.c, lib.h, mutt_ssl.c, muttlib.c, recvcmd.c, url.c: /mutt-1.5.19/ChangeLog:6137: * recvattach.c: Remove *two* layers of S/MIME from messages /mutt-1.5.19/ChangeLog:6147: * globals.h, init.h, mutt_sasl.c, mutt_ssl.c: Here's a patch /mutt-1.5.19/ChangeLog:6148: to allow mutt to use SSL client certificates to authenticate /mutt-1.5.19/ChangeLog:6149: itself. To use, set ssl_client_cert to the path to your /mutt-1.5.19/ChangeLog:6199: (ENCRYPT, SIGN, whatever) but APPLICATION_PGP is missing. /mutt-1.5.19/ChangeLog:6203: * imap/imap.c: If STARTTLS fails to complete the SSL handshake, /mutt-1.5.19/ChangeLog:6217: * compose.c: Only print "Encrypt with" field in case the used /mutt-1.5.19/ChangeLog:6218: S/MIME modules supports this feature. /mutt-1.5.19/ChangeLog:6241: * pgp.c, smime.c: Fix the PGP and S/MIME menus. Complaints /mutt-1.5.19/ChangeLog:6245: * Makefile.am, crypthash.h, md5.h, sha1.h: Fix uint32_t /mutt-1.5.19/ChangeLog:6393: * smime.c: Change S/MIME send menu behavior to xor instead of or, /mutt-1.5.19/ChangeLog:6789: * crypt.c: pkcs7-signature wasn't recognized properly in one /mutt-1.5.19/ChangeLog:7007: * smime.c: Fix verification bug when messages are S/MIME signed /mutt-1.5.19/ChangeLog:7040: * mutt_ssl.c: Fix a segmentation fault which occurs /mutt-1.5.19/ChangeLog:7114: that my mutt hung when I tried SASL DIGEST-MD5 authentication /mutt-1.5.19/ChangeLog:7123: mutt_ssl.c: This patch redoes yesterday's unbuffered input /mutt-1.5.19/ChangeLog:7125: down the call stack. It also made it much easier to have the SSL /mutt-1.5.19/ChangeLog:7228: Such a message results, for example, from a decrypt-save if the /mutt-1.5.19/ChangeLog:7241: in mutt, a key of type 1 (RSA) can both encrypt & sign. This is /mutt-1.5.19/ChangeLog:7245: when their RSA encrypt-only or sign-only key is listed for both /mutt-1.5.19/ChangeLog:7259: part of a group. (E.g., The Tea Party: alias1, alias2, alias3;) /mutt-1.5.19/ChangeLog:7276: (well bit = encrypt) are ignored as a result. I've only tested /mutt-1.5.19/ChangeLog:7283: * init.h, mutt.h, send.c: Fix the PGP / S/MIME selection mess /mutt-1.5.19/ChangeLog:7288: PGP- and S/MIME enabled, but you only use, say S/MIME.) /mutt-1.5.19/ChangeLog:7303: * send.c: Try to fix a PGP / S/MIME-related problem. Found by /mutt-1.5.19/ChangeLog:7567: * pgpmicalg.c: 3156 defined several micalg values (pgp-md5, /mutt-1.5.19/ChangeLog:7568: pgp-sha1, etc.) Since then, three more hashes have been assigned /mutt-1.5.19/ChangeLog:7670: don't ask for the passphrase. * pgp.c (pgp_decrypt_part, /mutt-1.5.19/ChangeLog:7672: pgp_encrypt_message) (pgp_traditional_encryptsign): /mutt-1.5.19/ChangeLog:7733: (ENCRYPT,SIGN,GOODSIGN, BADSIGN): Move to crypt.h. /mutt-1.5.19/ChangeLog:7911: call openssl with the full path. /mutt-1.5.19/ChangeLog:8115: mbox.c, menu.c, mh.c, mutt_ssl.c, mutt_ssl_nss.c, muttlib.c, /mutt-1.5.19/ChangeLog:8129: * send.c: Try to fix another obscure error in S/MIME auto-signing /mutt-1.5.19/ChangeLog:8186: translations will need an update of the S/MIME key translations. /mutt-1.5.19/ChangeLog:8380: * send.c: Another S/MIME ifdef misses and causes compilation /mutt-1.5.19/ChangeLog:8427: despite a possible S/MIME default. /mutt-1.5.19/mutt_ssl.c:23:#include /mutt-1.5.19/mutt_ssl.c:24:#include /mutt-1.5.19/mutt_ssl.c:25:#include /mutt-1.5.19/mutt_ssl.c:26:#include /mutt-1.5.19/mutt_ssl.c:27:#include /mutt-1.5.19/mutt_ssl.c:37:#include "mutt_ssl.h" /mutt-1.5.19/mutt_ssl.c:40:#if OPENSSL_VERSION_NUMBER >= 0x00904000L /mutt-1.5.19/mutt_ssl.c:46:/* Just in case OpenSSL doesn't define DEVRANDOM */ /mutt-1.5.19/mutt_ssl.c:51:/* This is ugly, but as RAND_status came in on OpenSSL version 0.9.5 /mutt-1.5.19/mutt_ssl.c:59:/* OpenSSL fills the entropy pool from /dev/urandom if it exists */ /mutt-1.5.19/mutt_ssl.c:69: SSL_CTX *ctx; /mutt-1.5.19/mutt_ssl.c:70: SSL *ssl; /mutt-1.5.19/mutt_ssl.c:76:static int ssl_init (void); /mutt-1.5.19/mutt_ssl.c:78:static int ssl_socket_read (CONNECTION* conn, char* buf, size_t len); /mutt-1.5.19/mutt_ssl.c:79:static int ssl_socket_write (CONNECTION* conn, const char* buf, size_t len); /mutt-1.5.19/mutt_ssl.c:80:static int ssl_socket_open (CONNECTION * conn); /mutt-1.5.19/mutt_ssl.c:81:static int ssl_socket_close (CONNECTION * conn); /mutt-1.5.19/mutt_ssl.c:82:static int tls_close (CONNECTION* conn); /mutt-1.5.19/mutt_ssl.c:83:static int ssl_cache_trusted_cert (X509 *cert); /mutt-1.5.19/mutt_ssl.c:84:static int ssl_check_certificate (CONNECTION *conn, sslsockdata * data); /mutt-1.5.19/mutt_ssl.c:86:static void ssl_get_client_cert(sslsockdata *ssldata, CONNECTION *conn); /mutt-1.5.19/mutt_ssl.c:87:static int ssl_passwd_cb(char *buf, int size, int rwflag, void *userdata); /mutt-1.5.19/mutt_ssl.c:88:static int ssl_negotiate (CONNECTION *conn, sslsockdata*); /mutt-1.5.19/mutt_ssl.c:90:/* mutt_ssl_starttls: Negotiate TLS over an already opened connection. /mutt-1.5.19/mutt_ssl.c:91: * TODO: Merge this code better with ssl_socket_open. */ /mutt-1.5.19/mutt_ssl.c:92:int mutt_ssl_starttls (CONNECTION* conn) /mutt-1.5.19/mutt_ssl.c:97: if (ssl_init()) /mutt-1.5.19/mutt_ssl.c:101: /* the ssl_use_xxx protocol options don't apply. We must use TLS in TLS. */ /mutt-1.5.19/mutt_ssl.c:102: if (! (ssldata->ctx = SSL_CTX_new (TLSv1_client_method ()))) /mutt-1.5.19/mutt_ssl.c:104: dprint (1, (debugfile, "mutt_ssl_starttls: Error allocating SSL_CTX\n")); /mutt-1.5.19/mutt_ssl.c:108: ssl_get_client_cert(ssldata, conn); /mutt-1.5.19/mutt_ssl.c:110: if (! (ssldata->ssl = SSL_new (ssldata->ctx))) /mutt-1.5.19/mutt_ssl.c:112: dprint (1, (debugfile, "mutt_ssl_starttls: Error allocating SSL\n")); /mutt-1.5.19/mutt_ssl.c:116: if (SSL_set_fd (ssldata->ssl, conn->fd) != 1) /mutt-1.5.19/mutt_ssl.c:118: dprint (1, (debugfile, "mutt_ssl_starttls: Error setting fd\n")); /mutt-1.5.19/mutt_ssl.c:119: goto bail_ssl; /mutt-1.5.19/mutt_ssl.c:122: if (ssl_negotiate (conn, ssldata)) /mutt-1.5.19/mutt_ssl.c:123: goto bail_ssl; /mutt-1.5.19/mutt_ssl.c:125: /* hmm. watch out if we're starting TLS over any method other than raw. */ /mutt-1.5.19/mutt_ssl.c:127: conn->conn_read = ssl_socket_read; /mutt-1.5.19/mutt_ssl.c:128: conn->conn_write = ssl_socket_write; /mutt-1.5.19/mutt_ssl.c:129: conn->conn_close = tls_close; /mutt-1.5.19/mutt_ssl.c:131: conn->ssf = SSL_CIPHER_get_bits (SSL_get_current_cipher (ssldata->ssl), /mutt-1.5.19/mutt_ssl.c:136: bail_ssl: /mutt-1.5.19/mutt_ssl.c:137: FREE (&ssldata->ssl); /mutt-1.5.19/mutt_ssl.c:147: * OpenSSL library needs to be fed with sufficient entropy. On systems /mutt-1.5.19/mutt_ssl.c:151: * Even though only OpenSSL 0.9.5 and later will complain about the /mutt-1.5.19/mutt_ssl.c:154: * otherwise I could have simply #ifdef'd the whole ssl_init funcion) /mutt-1.5.19/mutt_ssl.c:156:static int ssl_init (void) /mutt-1.5.19/mutt_ssl.c:190: * itself might clobber the last SSL error. */ /mutt-1.5.19/mutt_ssl.c:191: SSL_load_error_strings(); /mutt-1.5.19/mutt_ssl.c:192: SSL_library_init(); /mutt-1.5.19/mutt_ssl.c:232:static int ssl_socket_open_err (CONNECTION *conn) /mutt-1.5.19/mutt_ssl.c:234: mutt_error (_("SSL disabled due the lack of entropy")); /mutt-1.5.19/mutt_ssl.c:240:int mutt_ssl_socket_setup (CONNECTION * conn) /mutt-1.5.19/mutt_ssl.c:242: if (ssl_init() < 0) /mutt-1.5.19/mutt_ssl.c:244: conn->conn_open = ssl_socket_open_err; /mutt-1.5.19/mutt_ssl.c:248: conn->conn_open = ssl_socket_open; /mutt-1.5.19/mutt_ssl.c:249: conn->conn_read = ssl_socket_read; /mutt-1.5.19/mutt_ssl.c:250: conn->conn_write = ssl_socket_write; /mutt-1.5.19/mutt_ssl.c:251: conn->conn_close = ssl_socket_close; /mutt-1.5.19/mutt_ssl.c:257:static int ssl_socket_read (CONNECTION* conn, char* buf, size_t len) /mutt-1.5.19/mutt_ssl.c:260: return SSL_read (data->ssl, buf, len); /mutt-1.5.19/mutt_ssl.c:263:static int ssl_socket_write (CONNECTION* conn, const char* buf, size_t len) /mutt-1.5.19/mutt_ssl.c:266: return SSL_write (data->ssl, buf, len); /mutt-1.5.19/mutt_ssl.c:269:static int ssl_socket_open (CONNECTION * conn) /mutt-1.5.19/mutt_ssl.c:280: data->ctx = SSL_CTX_new (SSLv23_client_method ()); /mutt-1.5.19/mutt_ssl.c:282: /* disable SSL protocols as needed */ /mutt-1.5.19/mutt_ssl.c:285: SSL_CTX_set_options(data->ctx, SSL_OP_NO_TLSv1); /mutt-1.5.19/mutt_ssl.c:289: SSL_CTX_set_options(data->ctx, SSL_OP_NO_SSLv2); /mutt-1.5.19/mutt_ssl.c:293: SSL_CTX_set_options(data->ctx, SSL_OP_NO_SSLv3); /mutt-1.5.19/mutt_ssl.c:296: ssl_get_client_cert(data, conn); /mutt-1.5.19/mutt_ssl.c:298: data->ssl = SSL_new (data->ctx); /mutt-1.5.19/mutt_ssl.c:299: SSL_set_fd (data->ssl, conn->fd); /mutt-1.5.19/mutt_ssl.c:301: if (ssl_negotiate(conn, data)) /mutt-1.5.19/mutt_ssl.c:307: conn->ssf = SSL_CIPHER_get_bits (SSL_get_current_cipher (data->ssl), /mutt-1.5.19/mutt_ssl.c:313:/* ssl_negotiate: After SSL state has been initialised, attempt to negotiate /mutt-1.5.19/mutt_ssl.c:314: * SSL over the wire, including certificate checks. */ /mutt-1.5.19/mutt_ssl.c:315:static int ssl_negotiate (CONNECTION *conn, sslsockdata* ssldata) /mutt-1.5.19/mutt_ssl.c:320:#if OPENSSL_VERSION_NUMBER >= 0x00906000L /mutt-1.5.19/mutt_ssl.c:323: SSL_set_mode (ssldata->ssl, SSL_MODE_AUTO_RETRY); /mutt-1.5.19/mutt_ssl.c:326: if ((err = SSL_connect (ssldata->ssl)) != 1) /mutt-1.5.19/mutt_ssl.c:328: switch (SSL_get_error (ssldata->ssl, err)) /mutt-1.5.19/mutt_ssl.c:330: case SSL_ERROR_SYSCALL: /mutt-1.5.19/mutt_ssl.c:333: case SSL_ERROR_SSL: /mutt-1.5.19/mutt_ssl.c:340: mutt_error (_("SSL failed: %s"), errmsg); /mutt-1.5.19/mutt_ssl.c:346: ssldata->cert = SSL_get_peer_certificate (ssldata->ssl); /mutt-1.5.19/mutt_ssl.c:354: if (!ssl_check_certificate (conn, ssldata)) /mutt-1.5.19/mutt_ssl.c:357: mutt_message (_("SSL connection using %s (%s)"), /mutt-1.5.19/mutt_ssl.c:358: SSL_get_cipher_version (ssldata->ssl), SSL_get_cipher_name (ssldata->ssl)); /mutt-1.5.19/mutt_ssl.c:364:static int ssl_socket_close (CONNECTION * conn) /mutt-1.5.19/mutt_ssl.c:369: SSL_shutdown (data->ssl); /mutt-1.5.19/mutt_ssl.c:376: SSL_free (data->ssl); /mutt-1.5.19/mutt_ssl.c:377: SSL_CTX_free (data->ctx); /mutt-1.5.19/mutt_ssl.c:384:static int tls_close (CONNECTION* conn) /mutt-1.5.19/mutt_ssl.c:388: rc = ssl_socket_close (conn); /mutt-1.5.19/mutt_ssl.c:424: if (!X509_digest (cert, EVP_md5 (), md, &n)) /mutt-1.5.19/mutt_ssl.c:524: if (!X509_digest (cert, EVP_sha1(), md, &mdlen) || peermdlen != mdlen) /mutt-1.5.19/mutt_ssl.c:540: if (!X509_digest (peercert, EVP_sha1(), peermd, &peermdlen) /mutt-1.5.19/mutt_ssl.c:585: if (!X509_digest (peercert, EVP_sha1(), peermd, &peermdlen)) /mutt-1.5.19/mutt_ssl.c:604:/* port to mutt from msmtp's tls.c */ /mutt-1.5.19/mutt_ssl.c:641:/* port to mutt from msmtp's tls.c */ /mutt-1.5.19/mutt_ssl.c:731:static int ssl_cache_trusted_cert (X509 *c) /mutt-1.5.19/mutt_ssl.c:740:static int ssl_check_preauth (X509 *cert, CONNECTION *conn) /mutt-1.5.19/mutt_ssl.c:747: dprint (2, (debugfile, "ssl_check_preauth: using cached certificate\n")); /mutt-1.5.19/mutt_ssl.c:758: dprint (2, (debugfile, "ssl_check_preauth: hostname check passed\n")); /mutt-1.5.19/mutt_ssl.c:762: dprint (2, (debugfile, "ssl_check_preauth: signer check passed\n")); /mutt-1.5.19/mutt_ssl.c:769: dprint (2, (debugfile, "ssl_check_preauth: digest check passed\n")); /mutt-1.5.19/mutt_ssl.c:776:static int ssl_check_certificate (CONNECTION *conn, sslsockdata *data) /mutt-1.5.19/mutt_ssl.c:782: if ((preauthrc = ssl_check_preauth (data->cert, conn)) > 0) /mutt-1.5.19/mutt_ssl.c:785: chain = SSL_get_peer_cert_chain (data->ssl); /mutt-1.5.19/mutt_ssl.c:795: dprint (2, (debugfile, "ssl chain: already cached: %s\n", cert->name)); /mutt-1.5.19/mutt_ssl.c:800: dprint (2, (debugfile, "ssl chain: checked by signer: %s\n", cert->name)); /mutt-1.5.19/mutt_ssl.c:801: ssl_cache_trusted_cert (cert); /mutt-1.5.19/mutt_ssl.c:806: dprint (2, (debugfile, "ssl chain: trusted with file: %s\n", cert->name)); /mutt-1.5.19/mutt_ssl.c:807: ssl_cache_trusted_cert (cert); /mutt-1.5.19/mutt_ssl.c:812: dprint (2, (debugfile, "ssl chain: check failed: %s\n", cert->name)); /mutt-1.5.19/mutt_ssl.c:881: _("SSL Certificate check (certificate %d of %d in chain)"), /mutt-1.5.19/mutt_ssl.c:935: ssl_cache_trusted_cert (cert); /mutt-1.5.19/mutt_ssl.c:941: dprint (2, (debugfile, "ssl interactive_check_cert: done=%d\n", done)); /mutt-1.5.19/mutt_ssl.c:945:static void ssl_get_client_cert(sslsockdata *ssldata, CONNECTION *conn) /mutt-1.5.19/mutt_ssl.c:950: SSL_CTX_set_default_passwd_cb_userdata(ssldata->ctx, &conn->account); /mutt-1.5.19/mutt_ssl.c:951: SSL_CTX_set_default_passwd_cb(ssldata->ctx, ssl_passwd_cb); /mutt-1.5.19/mutt_ssl.c:952: SSL_CTX_use_certificate_file(ssldata->ctx, SslClientCert, SSL_FILETYPE_PEM); /mutt-1.5.19/mutt_ssl.c:953: SSL_CTX_use_PrivateKey_file(ssldata->ctx, SslClientCert, SSL_FILETYPE_PEM); /mutt-1.5.19/mutt_ssl.c:960:static int ssl_passwd_cb(char *buf, int size, int rwflag, void *userdata) /mutt-1.5.19/mutt_ssl.c:967: dprint (2, (debugfile, "ssl_passwd_cb: getting password for %s@%s:%u\n", /mutt-1.5.19/contrib/sample.muttrc-tlr:179:ignore DomainKey-Signature mail-followup-to /mutt-1.5.19/contrib/sample.muttrc-tlr:215:set forward_decrypt # Decrypt messages when forwarding. /mutt-1.5.19/contrib/sample.muttrc-tlr:225:set pgp_replyencrypt # Encrypt when replying to encrypted messages. /mutt-1.5.19/contrib/sample.muttrc-tlr:248:set signature=~/.signature # Silly signature /mutt-1.5.19/contrib/sample.muttrc-tlr:249:set sig_dashes # Add dashes above my signature /mutt-1.5.19/contrib/sample.muttrc:86:#set signature="~/.signature" # file which contains my signature /mutt-1.5.19/contrib/sample.muttrc:136:color signature red default /mutt-1.5.19/contrib/sample.muttrc:234:#send-hook mutt- 'set signature=~/.sigmutt; my_hdr From: Mutt User ' /mutt-1.5.19/contrib/pgp2.rc:10:# the +encrypttoself command line parameter to the pgp_encrypt_only_command /mutt-1.5.19/contrib/pgp2.rc:11:# and pgp_encrypt_sign_command variables. /mutt-1.5.19/contrib/pgp2.rc:17:# verify a pgp/mime signature /mutt-1.5.19/contrib/pgp2.rc:20:# decrypt a pgp/mime attachment /mutt-1.5.19/contrib/pgp2.rc:21:set pgp_decrypt_command="PGPPASSFD=0; export PGPPASSFD; cat - %f | pgp +language=mutt +verbose=0 +batchmode -f" /mutt-1.5.19/contrib/pgp2.rc:27:set pgp_encrypt_only_command="pgp +language=mutt +verbose=0 +batchmode -aeft %r < %f" /mutt-1.5.19/contrib/pgp2.rc:30:set pgp_encrypt_sign_command="PGPPASSFD=0; export PGPPASSFD; cat - %f | pgp +language=mutt +verbose=0 +batchmode -aefts %?a?-u %a? %r" /mutt-1.5.19/contrib/pgp2.rc:47:# pattern for good signature /mutt-1.5.19/contrib/pgp2.rc:48:set pgp_good_sign="Good signature" /mutt-1.5.19/contrib/Makefile.in:123:MUTT_MD5 = @MUTT_MD5@ /mutt-1.5.19/contrib/pgp6.rc:11:# verify a pgp/mime signature /mutt-1.5.19/contrib/pgp6.rc:14:# decrypt a pgp/mime attachment /mutt-1.5.19/contrib/pgp6.rc:15:set pgp_decrypt_command="PGPPASSFD=0; export PGPPASSFD; cat - %f | pgp6 +compatible +verbose=0 +batchmode -f" /mutt-1.5.19/contrib/pgp6.rc:21:set pgp_encrypt_only_command="pgp6 +compatible +verbose=0 +encrypttoself +batchmode -aeft %r < %f" /mutt-1.5.19/contrib/pgp6.rc:24:set pgp_encrypt_sign_command="PGPPASSFD=0; export PGPPASSFD; cat - %f | pgp6 +compatible +verbose=0 +encrypttoself +batchmode +clearsig=off -aefts %?a? -u %a? %r" /mutt-1.5.19/contrib/gpg.rc:19:# containing the detached signature. %s expands to this /mutt-1.5.19/contrib/gpg.rc:36:# verify a pgp/mime signature /mutt-1.5.19/contrib/gpg.rc:39:# decrypt a pgp/mime attachment /mutt-1.5.19/contrib/gpg.rc:40:set pgp_decrypt_command="gpg --status-fd=2 %?p?--passphrase-fd 0? --no-verbose --quiet --batch --output - %f" /mutt-1.5.19/contrib/gpg.rc:51:# set pgp_encrypt_only_command="pgpewrap gpg-2comp -v --batch --output - --encrypt --textmode --armor --always-trust -- -r %r -- %f" /mutt-1.5.19/contrib/gpg.rc:52:set pgp_encrypt_only_command="pgpewrap gpg --batch --quiet --no-verbose --output - --encrypt --textmode --armor --always-trust -- -r %r -- %f" /mutt-1.5.19/contrib/gpg.rc:55:# set pgp_encrypt_sign_command="pgpewrap gpg-2comp %?p?--passphrase-fd 0? -v --batch --output - --encrypt --sign %?a?-u %a? --armor --always-trust -- -r %r -- %f" /mutt-1.5.19/contrib/gpg.rc:56:set pgp_encrypt_sign_command="pgpewrap gpg %?p?--passphrase-fd 0? --batch --quiet --no-verbose --textmode --output - --encrypt --sign %?a?-u %a? --armor --always-trust -- -r %r -- %f" /mutt-1.5.19/contrib/gpg.rc:76:# pattern for good signature - may need to be adapted to locale! /mutt-1.5.19/contrib/gpg.rc:78:# set pgp_good_sign="^gpgv?: Good signature from " /mutt-1.5.19/contrib/gpg.rc:81:# set pgp_good_sign="`gettext -d gnupg -s 'Good signature from "' | tr -d '"'`" /mutt-1.5.19/contrib/smime_keys_test.pl:29:run 'openssl genrsa -out user.key 1024'; /mutt-1.5.19/contrib/smime_keys_test.pl:32:run 'openssl req -new -key user.key -out newreq.pem', "\n\nx\n\nx\nx\nuser\@smime.mutt\n\nx\n"; /mutt-1.5.19/contrib/smime_keys_test.pl:46:run 'openssl req -new -x509 -keyout demoCA/private/cakey.pem -out demoCA/cacert.pem -days 7300 -nodes', /mutt-1.5.19/contrib/smime_keys_test.pl:53:run 'openssl ca -batch -startdate 000101000000Z -enddate 200101000000Z -days 7300 ' . /mutt-1.5.19/contrib/smime_keys_test.pl:59:run 'openssl pkcs12 -export -inkey user.key -in newcert.pem -out cert.p12 -CAfile demoCA/cacert.pem -chain', "pass1\n" x 2; /mutt-1.5.19/contrib/smime_keys_test.pl:102:run "openssl smime -sign -signer certificates/$keyid -inkey user.key -in /etc/passwd -certfile certificates/37adefc3.0 > signed"; /mutt-1.5.19/contrib/smime_keys_test.pl:106:run 'openssl smime -verify -out /dev/null -in signed -CAfile ca-bundle.crt'; /mutt-1.5.19/contrib/language50.txt:8:pgpe Encrypt (including Encrypt/Sign)\n\ /mutt-1.5.19/contrib/language50.txt:10:pgpv Verify/Decrypt\n\ /mutt-1.5.19/contrib/language50.txt:26:us=You need a passphrase to encrypt the file\n /mutt-1.5.19/contrib/language50.txt:148:[PRIVATE_KEY_NEEDED_FOR_SIGNATURE] /mutt-1.5.19/contrib/language50.txt:149:us=A private key is required to make a signature.\n /mutt-1.5.19/contrib/language50.txt:172:us="File to check signature against [%s]: " /mutt-1.5.19/contrib/language50.txt:175:[GOOD_SIGNATURE] /mutt-1.5.19/contrib/language50.txt:176:us="Good signature made %s by key:\n" /mutt-1.5.19/contrib/language50.txt:179:[BAD_SIGNATURE] /mutt-1.5.19/contrib/language50.txt:180:us="BAD signature made %s by key:\n" /mutt-1.5.19/contrib/language50.txt:183:[ERROR_SIGNATURE] /mutt-1.5.19/contrib/language50.txt:184:us="Error %s checking signature: %s\n" /mutt-1.5.19/contrib/language50.txt:187:[UNKNOWN_SIGNATURE] /mutt-1.5.19/contrib/language50.txt:188:us="Signature by unknown keyid: " /mutt-1.5.19/contrib/language50.txt:244:[NEED_PASSPHRASE_TO_DECRYPT_KEY] /mutt-1.5.19/contrib/language50.txt:245:us="Need a pass phrase to decrypt private key:\n" /mutt-1.5.19/contrib/language50.txt:268:[CANNOT_DECRYPT] /mutt-1.5.19/contrib/language50.txt:269:us="Cannot decrypt message. It can only be decrypted by:\n" /mutt-1.5.19/contrib/language50.txt:329:us="Signature grossly oversized: %lu bytes long" /mutt-1.5.19/contrib/language50.txt:434:by a trusted signature, it is not known with a high\n\ /mutt-1.5.19/contrib/language50.txt:478:A signature made by this key should not be trusted.\n" /mutt-1.5.19/contrib/language50.txt:569:us="Please select a user ID with a signature %s:\n" /mutt-1.5.19/contrib/language50.txt:575:us="Please select a key with a signature %s:" /mutt-1.5.19/contrib/language50.txt:580:[PLEASE_SELECT_A_SIGNATURE] /mutt-1.5.19/contrib/language50.txt:581:us="Please select a signature %s:" /mutt-1.5.19/contrib/language50.txt:740:[SIGNATURE_FRAGMENT] /mutt-1.5.19/contrib/language50.txt:741:us="signature" /mutt-1.5.19/contrib/language50.txt:778:us="Key signature certificate added.\n" /mutt-1.5.19/contrib/language50.txt:787:us="That signature has already been revoked.\n\ /mutt-1.5.19/contrib/language50.txt:791:us="Signature revocation cancelled.\n" /mutt-1.5.19/contrib/language50.txt:798:us="Do you want to revoke this signature [y/N]? " /mutt-1.5.19/contrib/language50.txt:803:[UNABLE_TO_GENERATE_REVOCATION_SIGNATURE] /mutt-1.5.19/contrib/language50.txt:804:us="Unable to generate revocation signature\n" /mutt-1.5.19/contrib/language50.txt:874:[RSA_AND_DH_RECIPS] /mutt-1.5.19/contrib/language50.txt:875:us="WARNING: You are encrypting to both RSA and Diffie-Hellman keys.\n\ /mutt-1.5.19/contrib/language50.txt:876:If the RSA user is still using PGP version 2.6.3 or earlier; 4.0; or 4.5,\n\ /mutt-1.5.19/contrib/language50.txt:877:she will not be able to decrypt this message.\n" /mutt-1.5.19/contrib/language50.txt:900:us="Message Recovery Key (MRK) found. Will also encrypt this message\n\ /mutt-1.5.19/contrib/language50.txt:957:us="Error while processing signature\n" /mutt-1.5.19/contrib/language50.txt:960:us="Cannot add signature\n" /mutt-1.5.19/contrib/language50.txt:962:[PGPERR_CANNOT_DECRYPT] /mutt-1.5.19/contrib/language50.txt:963:us="Cannot decrypt message\n" /mutt-1.5.19/contrib/language50.txt:993:us="Can't find key to decrypt session key\n" /mutt-1.5.19/contrib/language50.txt:996:us="Can't decrypt this session key\n" /mutt-1.5.19/contrib/language50.txt:1002:us="Unknown signature type\n" /mutt-1.5.19/contrib/language50.txt:1005:us="Signature too short\n" /mutt-1.5.19/contrib/language50.txt:1008:us="Signature too long\n" /mutt-1.5.19/contrib/language50.txt:1011:us="Signature version unknown\n" /mutt-1.5.19/contrib/language50.txt:1014:us="Signature algorithm unknown\n" /mutt-1.5.19/contrib/language50.txt:1017:us="Wrong number of bits in signature\n" /mutt-1.5.19/contrib/language50.txt:1023:us="Invalid Extra Data for Signature\n" /mutt-1.5.19/contrib/language50.txt:1056:us="Interrupted encrypt/decrypt\n" /mutt-1.5.19/contrib/language50.txt:1067:[PGPERR_RSA_CORRUPT] /mutt-1.5.19/contrib/language50.txt:1068:us="Corrupt data decrypting RSA block\n" /mutt-1.5.19/contrib/language50.txt:1083:us="Invalid annotation to signature\n" /mutt-1.5.19/contrib/language50.txt:1173:us="Signature by subkey\n" /mutt-1.5.19/contrib/language50.txt:1224:us="Duplicate signature (in same keyring)\n" /mutt-1.5.19/contrib/language50.txt:1244:[PGPERR_KEY_NO_RSA_ENCRYPT] /mutt-1.5.19/contrib/language50.txt:1245:us="No RSA Encryption/Signature support\n" /mutt-1.5.19/contrib/language50.txt:1247:[PGPERR_KEY_NO_RSA_DECRYPT] /mutt-1.5.19/contrib/language50.txt:1248:us="No RSA Decryption/Verification support\n" /mutt-1.5.19/contrib/language50.txt:1250:[PGPERR_KEY_NO_RSA] /mutt-1.5.19/contrib/language50.txt:1251:us="No RSA key support\n" /mutt-1.5.19/contrib/language50.txt:1272:us="RSA public modulus is even\n" /mutt-1.5.19/contrib/language50.txt:1275:us="RSA public exponent is even\n" /mutt-1.5.19/contrib/language50.txt:1284:us="Signature packet has trailing junk\n" /mutt-1.5.19/contrib/language50.txt:1287:us="Signature truncated\n" /mutt-1.5.19/contrib/language50.txt:1290:us="Signature integer mis-formatted\n" /mutt-1.5.19/contrib/language50.txt:1293:us="Signature algorithm unknown\n" /mutt-1.5.19/contrib/language50.txt:1296:us="Bad signature extra material (not 5)\n" /mutt-1.5.19/contrib/language50.txt:1299:us="Signature version unknown\n" /mutt-1.5.19/contrib/ca-bundle.crt:10:## with an Apache+mod_ssl webserver for SSL client authentication. /mutt-1.5.19/contrib/ca-bundle.crt:18:MD5 Fingerprint: 82:12:F7:89:E1:0B:91:60:A4:B6:22:9F:94:68:11:92 /mutt-1.5.19/contrib/ca-bundle.crt:49: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:57: RSA Public Key: (2048 bit) /mutt-1.5.19/contrib/ca-bundle.crt:86: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:105:MD5 Fingerprint: A8:ED:DE:EB:93:88:66:D8:2F:C3:BD:1D:BE:45:BE:4D /mutt-1.5.19/contrib/ca-bundle.crt:131: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:132: Issuer: C=US, O=Digital Signature Trust Co., OU=DST (ANX Network) CA /mutt-1.5.19/contrib/ca-bundle.crt:136: Subject: C=US, O=Digital Signature Trust Co., OU=DST (ANX Network) CA /mutt-1.5.19/contrib/ca-bundle.crt:139: RSA Public Key: (1024 bit) /mutt-1.5.19/contrib/ca-bundle.crt:153: SSL CA, S/MIME CA, Object Signing CA /mutt-1.5.19/contrib/ca-bundle.crt:155: DirName:/C=US/O=Digital Signature Trust Co./OU=DST (ANX Network) CA/CN=CRL1 /mutt-1.5.19/contrib/ca-bundle.crt:171: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:183:MD5 Fingerprint: 1C:D5:8E:82:BE:70:55:8E:39:61:DF:AD:51:DB:6B:A0 /mutt-1.5.19/contrib/ca-bundle.crt:205: Signature Algorithm: md5WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:213: RSA Public Key: (1024 bit) /mutt-1.5.19/contrib/ca-bundle.crt:225: Signature Algorithm: md5WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:237:MD5 Fingerprint: 63:1B:66:93:8C:F3:66:CB:3C:79:57:DC:05:49:EA:DB /mutt-1.5.19/contrib/ca-bundle.crt:267: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:275: RSA Public Key: (2048 bit) /mutt-1.5.19/contrib/ca-bundle.crt:306: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:325:MD5 Fingerprint: 8A:02:F8:DF:B8:E1:84:9F:5A:C2:60:24:65:D1:73:FB /mutt-1.5.19/contrib/ca-bundle.crt:350: Signature Algorithm: md5WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:358: RSA Public Key: (1024 bit) /mutt-1.5.19/contrib/ca-bundle.crt:372: SSL CA, S/MIME CA, Object Signing CA /mutt-1.5.19/contrib/ca-bundle.crt:373: Signature Algorithm: md5WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:385:MD5 Fingerprint: 3D:5E:82:C6:D9:AD:D9:8B:93:6B:0C:10:B9:49:0A:B1 /mutt-1.5.19/contrib/ca-bundle.crt:409: Signature Algorithm: md5WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:417: RSA Public Key: (1024 bit) /mutt-1.5.19/contrib/ca-bundle.crt:431: SSL Client, S/MIME /mutt-1.5.19/contrib/ca-bundle.crt:432: Signature Algorithm: md5WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:444:MD5 Fingerprint: 77:DE:04:94:77:D0:0C:5F:A7:B1:F4:30:18:87:FB:55 /mutt-1.5.19/contrib/ca-bundle.crt:466: Signature Algorithm: md5WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:474: RSA Public Key: (1024 bit) /mutt-1.5.19/contrib/ca-bundle.crt:493: Signature Algorithm: md5WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:503:Digital Signature Trust Co. Global CA 1 /mutt-1.5.19/contrib/ca-bundle.crt:505:MD5 Fingerprint: 25:7A:BA:83:2E:B6:A2:0B:DA:FE:F5:02:0F:08:D7:AD /mutt-1.5.19/contrib/ca-bundle.crt:530: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:531: Issuer: C=US, O=Digital Signature Trust Co., OU=DSTCA E1 /mutt-1.5.19/contrib/ca-bundle.crt:535: Subject: C=US, O=Digital Signature Trust Co., OU=DSTCA E1 /mutt-1.5.19/contrib/ca-bundle.crt:538: RSA Public Key: (1024 bit) /mutt-1.5.19/contrib/ca-bundle.crt:552: SSL CA, S/MIME CA, Object Signing CA /mutt-1.5.19/contrib/ca-bundle.crt:554: DirName:/C=US/O=Digital Signature Trust Co./OU=DSTCA E1/CN=CRL1 /mutt-1.5.19/contrib/ca-bundle.crt:570: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:580:Digital Signature Trust Co. Global CA 2 /mutt-1.5.19/contrib/ca-bundle.crt:582:MD5 Fingerprint: 6C:C9:A7:6E:47:F1:0C:E3:53:3B:78:4C:4D:C2:6A:C5 /mutt-1.5.19/contrib/ca-bundle.crt:612: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:613: Issuer: C=us, ST=Utah, L=Salt Lake City, O=Digital Signature Trust Co., OU=DSTCA X1, CN=DST RootCA X1/Email=ca@digsigtrust.com /mutt-1.5.19/contrib/ca-bundle.crt:617: Subject: C=us, ST=Utah, L=Salt Lake City, O=Digital Signature Trust Co., OU=DSTCA X1, CN=DST RootCA X1/Email=ca@digsigtrust.com /mutt-1.5.19/contrib/ca-bundle.crt:620: RSA Public Key: (2048 bit) /mutt-1.5.19/contrib/ca-bundle.crt:641: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:658:Digital Signature Trust Co. Global CA 3 /mutt-1.5.19/contrib/ca-bundle.crt:660:MD5 Fingerprint: 93:C2:8E:11:7B:D4:F3:03:19:BD:28:75:13:4A:45:4A /mutt-1.5.19/contrib/ca-bundle.crt:685: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:686: Issuer: C=US, O=Digital Signature Trust Co., OU=DSTCA E2 /mutt-1.5.19/contrib/ca-bundle.crt:690: Subject: C=US, O=Digital Signature Trust Co., OU=DSTCA E2 /mutt-1.5.19/contrib/ca-bundle.crt:693: RSA Public Key: (1024 bit) /mutt-1.5.19/contrib/ca-bundle.crt:707: SSL CA, S/MIME CA, Object Signing CA /mutt-1.5.19/contrib/ca-bundle.crt:709: DirName:/C=US/O=Digital Signature Trust Co./OU=DSTCA E2/CN=CRL1 /mutt-1.5.19/contrib/ca-bundle.crt:725: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:735:Digital Signature Trust Co. Global CA 4 /mutt-1.5.19/contrib/ca-bundle.crt:737:MD5 Fingerprint: CD:3B:3D:62:5B:09:B8:09:36:87:9E:12:2F:71:64:BA /mutt-1.5.19/contrib/ca-bundle.crt:767: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:768: Issuer: C=us, ST=Utah, L=Salt Lake City, O=Digital Signature Trust Co., OU=DSTCA X2, CN=DST RootCA X2/Email=ca@digsigtrust.com /mutt-1.5.19/contrib/ca-bundle.crt:772: Subject: C=us, ST=Utah, L=Salt Lake City, O=Digital Signature Trust Co., OU=DSTCA X2, CN=DST RootCA X2/Email=ca@digsigtrust.com /mutt-1.5.19/contrib/ca-bundle.crt:775: RSA Public Key: (2048 bit) /mutt-1.5.19/contrib/ca-bundle.crt:796: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:815:MD5 Fingerprint: B4:65:22:0A:7C:AD:DF:41:B7:D5:44:D5:AD:FA:9A:75 /mutt-1.5.19/contrib/ca-bundle.crt:841: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:842: Issuer: C=US, O=Digital Signature Trust Co., OU=DST-Entrust GTI CA /mutt-1.5.19/contrib/ca-bundle.crt:846: Subject: C=US, O=Digital Signature Trust Co., OU=DST-Entrust GTI CA /mutt-1.5.19/contrib/ca-bundle.crt:849: RSA Public Key: (1024 bit) /mutt-1.5.19/contrib/ca-bundle.crt:863: SSL CA, S/MIME CA, Object Signing CA /mutt-1.5.19/contrib/ca-bundle.crt:865: DirName:/C=US/O=Digital Signature Trust Co./OU=DST-Entrust GTI CA/CN=CRL1 /mutt-1.5.19/contrib/ca-bundle.crt:881: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:893:MD5 Fingerprint: BA:21:EA:20:D6:DD:DB:8F:C1:57:8B:40:AD:A1:FC:FC /mutt-1.5.19/contrib/ca-bundle.crt:925: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:933: RSA Public Key: (2048 bit) /mutt-1.5.19/contrib/ca-bundle.crt:956: SSL CA, S/MIME CA, Object Signing CA /mutt-1.5.19/contrib/ca-bundle.crt:964: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:983:MD5 Fingerprint: 0C:41:2F:13:5B:A0:54:F5:96:66:2D:7E:CD:0E:03:F4 /mutt-1.5.19/contrib/ca-bundle.crt:1018: Signature Algorithm: md5WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:1026: RSA Public Key: (1024 bit) /mutt-1.5.19/contrib/ca-bundle.crt:1040: SSL CA, S/MIME CA, Object Signing CA /mutt-1.5.19/contrib/ca-bundle.crt:1059: Signature Algorithm: md5WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:1071:MD5 Fingerprint: DF:F2:80:73:CC:F1:E6:61:73:FC:F5:42:E9:C5:7C:EE /mutt-1.5.19/contrib/ca-bundle.crt:1105: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:1113: RSA Public Key: (1024 bit) /mutt-1.5.19/contrib/ca-bundle.crt:1127: SSL CA, S/MIME CA, Object Signing CA /mutt-1.5.19/contrib/ca-bundle.crt:1146: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:1158:MD5 Fingerprint: A9:E9:A8:9D:0E:73:E3:B1:2F:37:0D:E8:48:3F:86:ED /mutt-1.5.19/contrib/ca-bundle.crt:1183: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:1191: RSA Public Key: (1024 bit) /mutt-1.5.19/contrib/ca-bundle.crt:1220: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:1232:MD5 Fingerprint: 67:CB:9D:C0:13:24:8A:82:9B:B2:17:1E:D1:1B:EC:D4 /mutt-1.5.19/contrib/ca-bundle.crt:1257: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:1265: RSA Public Key: (1024 bit) /mutt-1.5.19/contrib/ca-bundle.crt:1294: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:1306:MD5 Fingerprint: CA:3D:D3:68:F1:03:5C:D0:32:FA:B8:2B:59:E8:5A:DB /mutt-1.5.19/contrib/ca-bundle.crt:1327: Signature Algorithm: md5WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:1335: RSA Public Key: (1024 bit) /mutt-1.5.19/contrib/ca-bundle.crt:1347: Signature Algorithm: md5WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:1359:MD5 Fingerprint: DE:AB:FF:43:2A:65:37:06:9B:28:B5:7A:E8:84:D3:8E /mutt-1.5.19/contrib/ca-bundle.crt:1379: Signature Algorithm: md5WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:1387: RSA Public Key: (1024 bit) /mutt-1.5.19/contrib/ca-bundle.crt:1399: Signature Algorithm: md5WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:1411:MD5 Fingerprint: DD:0D:0D:B4:78:4B:7D:CE:30:0A:A6:35:C6:AB:4C:88 /mutt-1.5.19/contrib/ca-bundle.crt:1431: Signature Algorithm: md5WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:1439: RSA Public Key: (1024 bit) /mutt-1.5.19/contrib/ca-bundle.crt:1451: Signature Algorithm: md5WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:1463:MD5 Fingerprint: BA:ED:17:57:9A:4B:FF:7C:F9:C9:1F:A2:CD:1A:D6:87 /mutt-1.5.19/contrib/ca-bundle.crt:1484: Signature Algorithm: md5WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:1492: RSA Public Key: (1024 bit) /mutt-1.5.19/contrib/ca-bundle.crt:1504: Signature Algorithm: md5WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:1516:MD5 Fingerprint: DB:81:96:57:AE:64:61:EF:77:A7:83:C4:51:24:3C:87 /mutt-1.5.19/contrib/ca-bundle.crt:1537: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:1545: RSA Public Key: (1024 bit) /mutt-1.5.19/contrib/ca-bundle.crt:1557: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:1569:MD5 Fingerprint: 33:43:02:B1:B9:E0:73:B1:B1:20:CA:CB:C7:84:03:50 /mutt-1.5.19/contrib/ca-bundle.crt:1595: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:1603: RSA Public Key: (2048 bit) /mutt-1.5.19/contrib/ca-bundle.crt:1624: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:1643:MD5 Fingerprint: 7D:6C:86:E4:FC:4D:D1:0B:00:BA:22:BB:4E:7C:6A:8E /mutt-1.5.19/contrib/ca-bundle.crt:1671: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:1679: RSA Public Key: (2048 bit) /mutt-1.5.19/contrib/ca-bundle.crt:1710: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:1729:MD5 Fingerprint: C4:D7:F0:B2:A3:C5:7D:61:67:F0:04:CD:43:D3:BA:58 /mutt-1.5.19/contrib/ca-bundle.crt:1748: Signature Algorithm: md5WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:1756: RSA Public Key: (1024 bit) /mutt-1.5.19/contrib/ca-bundle.crt:1768: Signature Algorithm: md5WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:1780:MD5 Fingerprint: 3C:75:CD:4C:BD:A9:D0:8A:79:4F:50:16:37:84:F4:2B /mutt-1.5.19/contrib/ca-bundle.crt:1809: Signature Algorithm: md5WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:1817: RSA Public Key: (2048 bit) /mutt-1.5.19/contrib/ca-bundle.crt:1848: Signature Algorithm: md5WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:1867:MD5 Fingerprint: 5C:AC:59:01:A4:86:53:CB:10:66:B5:D6:D6:71:FF:01 /mutt-1.5.19/contrib/ca-bundle.crt:1896: Signature Algorithm: md5WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:1904: RSA Public Key: (2048 bit) /mutt-1.5.19/contrib/ca-bundle.crt:1935: Signature Algorithm: md5WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:1954:MD5 Fingerprint: A9:A9:42:59:7E:BE:5A:94:E4:2C:C6:8B:1C:2A:44:B6 /mutt-1.5.19/contrib/ca-bundle.crt:1983: Signature Algorithm: md5WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:1991: RSA Public Key: (2048 bit) /mutt-1.5.19/contrib/ca-bundle.crt:2022: Signature Algorithm: md5WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:2041:MD5 Fingerprint: 98:12:A3:4B:95:A9:96:64:94:E7:50:8C:3E:E1:83:5A /mutt-1.5.19/contrib/ca-bundle.crt:2070: Signature Algorithm: md5WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:2078: RSA Public Key: (2048 bit) /mutt-1.5.19/contrib/ca-bundle.crt:2109: Signature Algorithm: md5WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:2128:MD5 Fingerprint: AB:BF:EA:E3:6B:29:A6:CC:A6:78:35:99:EF:AD:2B:80 /mutt-1.5.19/contrib/ca-bundle.crt:2156: Signature Algorithm: md5WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:2164: RSA Public Key: (2048 bit) /mutt-1.5.19/contrib/ca-bundle.crt:2192: Signature Algorithm: md5WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:2211:MD5 Fingerprint: AD:8E:0F:9E:01:6B:A0:C5:74:D5:0C:D3:68:65:4F:1E /mutt-1.5.19/contrib/ca-bundle.crt:2242: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:2243: Issuer: C=us, ST=Utah, L=Salt Lake City, O=Digital Signature Trust Co., OU=National Retail Federation, CN=DST (NRF) RootCA/Email=ca@digsigtrust.com /mutt-1.5.19/contrib/ca-bundle.crt:2247: Subject: C=us, ST=Utah, L=Salt Lake City, O=Digital Signature Trust Co., OU=National Retail Federation, CN=DST (NRF) RootCA/Email=ca@digsigtrust.com /mutt-1.5.19/contrib/ca-bundle.crt:2250: RSA Public Key: (2048 bit) /mutt-1.5.19/contrib/ca-bundle.crt:2271: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:2290:MD5 Fingerprint: 35:85:49:8E:6E:57:FE:BD:97:F1:C9:46:23:3A:B6:7D /mutt-1.5.19/contrib/ca-bundle.crt:2321: Signature Algorithm: md5WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:2329: RSA Public Key: (1024 bit) /mutt-1.5.19/contrib/ca-bundle.crt:2353: SSL CA, S/MIME CA, Object Signing CA /mutt-1.5.19/contrib/ca-bundle.crt:2354: Signature Algorithm: md5WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:2366:MD5 Fingerprint: 64:3F:F8:3E:52:14:4A:59:BA:93:56:04:0B:23:02:D1 /mutt-1.5.19/contrib/ca-bundle.crt:2397: Signature Algorithm: md5WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:2405: RSA Public Key: (1024 bit) /mutt-1.5.19/contrib/ca-bundle.crt:2429: SSL CA, S/MIME CA, Object Signing CA /mutt-1.5.19/contrib/ca-bundle.crt:2430: Signature Algorithm: md5WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:2442:MD5 Fingerprint: E1:E9:96:53:77:E1:F0:38:A0:02:AB:94:C6:95:7B:FC /mutt-1.5.19/contrib/ca-bundle.crt:2473: Signature Algorithm: md5WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:2481: RSA Public Key: (1024 bit) /mutt-1.5.19/contrib/ca-bundle.crt:2505: SSL CA, S/MIME CA, Object Signing CA /mutt-1.5.19/contrib/ca-bundle.crt:2506: Signature Algorithm: md5WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:2518:MD5 Fingerprint: 62:AB:B6:15:4A:B4:B0:16:77:FF:AE:CF:16:16:2B:8C /mutt-1.5.19/contrib/ca-bundle.crt:2549: Signature Algorithm: md5WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:2557: RSA Public Key: (1024 bit) /mutt-1.5.19/contrib/ca-bundle.crt:2581: SSL CA, S/MIME CA, Object Signing CA /mutt-1.5.19/contrib/ca-bundle.crt:2582: Signature Algorithm: md5WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:2594:MD5 Fingerprint: BF:AF:EC:C4:DA:F9:30:F9:CA:35:CA:25:E4:3F:8D:89 /mutt-1.5.19/contrib/ca-bundle.crt:2625: Signature Algorithm: md5WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:2633: RSA Public Key: (1024 bit) /mutt-1.5.19/contrib/ca-bundle.crt:2657: SSL CA, S/MIME CA, Object Signing CA /mutt-1.5.19/contrib/ca-bundle.crt:2658: Signature Algorithm: md5WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:2670:MD5 Fingerprint: E6:0B:D2:C9:CA:2D:88:DB:1A:71:0E:4B:78:EB:02:41 /mutt-1.5.19/contrib/ca-bundle.crt:2695: Signature Algorithm: md5WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:2703: RSA Public Key: (1024 bit) /mutt-1.5.19/contrib/ca-bundle.crt:2718: Signature Algorithm: md5WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:2730:MD5 Fingerprint: 1E:74:C3:86:3C:0C:35:C5:3E:C2:7F:EF:3C:AA:3C:D9 /mutt-1.5.19/contrib/ca-bundle.crt:2756: Signature Algorithm: md5WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:2764: RSA Public Key: (1024 bit) /mutt-1.5.19/contrib/ca-bundle.crt:2779: Signature Algorithm: md5WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:2791:MD5 Fingerprint: 3A:B2:DE:22:9A:20:93:49:F9:ED:C8:D2:8A:E7:68:0D /mutt-1.5.19/contrib/ca-bundle.crt:2816: Signature Algorithm: md5WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:2824: RSA Public Key: (1024 bit) /mutt-1.5.19/contrib/ca-bundle.crt:2839: Signature Algorithm: md5WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:2851:MD5 Fingerprint: 06:9F:69:79:16:66:90:02:1B:8C:8C:A2:C3:07:6F:3A /mutt-1.5.19/contrib/ca-bundle.crt:2876: Signature Algorithm: md5WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:2884: RSA Public Key: (1024 bit) /mutt-1.5.19/contrib/ca-bundle.crt:2899: Signature Algorithm: md5WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:2911:MD5 Fingerprint: C5:70:C4:A2:ED:53:78:0C:C8:10:53:81:64:CB:D0:1D /mutt-1.5.19/contrib/ca-bundle.crt:2936: Signature Algorithm: md5WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:2944: RSA Public Key: (1024 bit) /mutt-1.5.19/contrib/ca-bundle.crt:2959: Signature Algorithm: md5WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:2971:MD5 Fingerprint: 17:AF:71:16:52:7B:73:65:22:05:29:28:84:71:9D:13 /mutt-1.5.19/contrib/ca-bundle.crt:3071: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:3079: RSA Public Key: (16384 bit) /mutt-1.5.19/contrib/ca-bundle.crt:3219: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:3337:MD5 Fingerprint: 78:A5:FB:10:4B:E4:63:2E:D2:6B:FB:F2:B6:C2:4B:8E /mutt-1.5.19/contrib/ca-bundle.crt:3368: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:3369: Issuer: C=us, ST=Utah, L=Salt Lake City, O=Digital Signature Trust Co., OU=United Parcel Service, CN=DST (UPS) RootCA/Email=ca@digsigtrust.com /mutt-1.5.19/contrib/ca-bundle.crt:3373: Subject: C=us, ST=Utah, L=Salt Lake City, O=Digital Signature Trust Co., OU=United Parcel Service, CN=DST (UPS) RootCA/Email=ca@digsigtrust.com /mutt-1.5.19/contrib/ca-bundle.crt:3376: RSA Public Key: (2048 bit) /mutt-1.5.19/contrib/ca-bundle.crt:3397: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:3416:MD5 Fingerprint: 65:58:AB:15:AD:57:6C:1E:A8:A7:B5:69:AC:BF:FF:EB /mutt-1.5.19/contrib/ca-bundle.crt:3440: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:3448: RSA Public Key: (1024 bit) /mutt-1.5.19/contrib/ca-bundle.crt:3460: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:3472:MD5 Fingerprint: A9:23:75:9B:BA:49:36:6E:31:C2:DB:F2:E7:66:BA:87 /mutt-1.5.19/contrib/ca-bundle.crt:3496: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:3504: RSA Public Key: (1024 bit) /mutt-1.5.19/contrib/ca-bundle.crt:3516: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:3528:MD5 Fingerprint: A2:6F:53:B7:EE:40:DB:4A:68:E7:FA:18:D9:10:4B:72 /mutt-1.5.19/contrib/ca-bundle.crt:3552: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:3560: RSA Public Key: (1024 bit) /mutt-1.5.19/contrib/ca-bundle.crt:3572: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:3584:MD5 Fingerprint: 1B:D1:AD:17:8B:7F:22:13:24:F5:26:E2:5D:4E:B9:10 /mutt-1.5.19/contrib/ca-bundle.crt:3605: Signature Algorithm: md2WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:3613: RSA Public Key: (1024 bit) /mutt-1.5.19/contrib/ca-bundle.crt:3625: Signature Algorithm: md2WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:3637:MD5 Fingerprint: 97:60:E8:57:5F:D3:50:47:E5:43:0C:94:36:8A:B0:62 /mutt-1.5.19/contrib/ca-bundle.crt:3659: Signature Algorithm: md2WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:3667: RSA Public Key: (1024 bit) /mutt-1.5.19/contrib/ca-bundle.crt:3679: Signature Algorithm: md2WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:3691:MD5 Fingerprint: F2:7D:E9:54:E4:A3:22:0D:76:9F:E7:0B:BB:B3:24:2B /mutt-1.5.19/contrib/ca-bundle.crt:3717: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:3725: RSA Public Key: (1024 bit) /mutt-1.5.19/contrib/ca-bundle.crt:3737: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:3749:MD5 Fingerprint: B1:47:BC:18:57:D1:18:A0:78:2D:EC:71:E8:2A:95:73 /mutt-1.5.19/contrib/ca-bundle.crt:3780: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:3788: RSA Public Key: (2048 bit) /mutt-1.5.19/contrib/ca-bundle.crt:3809: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:3828:MD5 Fingerprint: B3:9C:25:B1:C3:2E:32:53:80:15:30:9D:4D:02:77:3E /mutt-1.5.19/contrib/ca-bundle.crt:3849: Signature Algorithm: md2WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:3857: RSA Public Key: (1024 bit) /mutt-1.5.19/contrib/ca-bundle.crt:3869: Signature Algorithm: md2WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:3881:MD5 Fingerprint: 2D:BB:E5:25:D3:D1:65:82:3A:B7:0E:FA:E6:EB:E2:E1 /mutt-1.5.19/contrib/ca-bundle.crt:3907: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:3915: RSA Public Key: (1024 bit) /mutt-1.5.19/contrib/ca-bundle.crt:3927: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:3939:MD5 Fingerprint: F8:BE:C4:63:22:C9:A8:46:74:8B:B8:1D:1E:4A:2B:F6 /mutt-1.5.19/contrib/ca-bundle.crt:3970: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:3978: RSA Public Key: (2048 bit) /mutt-1.5.19/contrib/ca-bundle.crt:3999: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:4018:MD5 Fingerprint: 10:FC:63:5D:F6:26:3E:0D:F3:25:BE:5F:79:CD:67:67 /mutt-1.5.19/contrib/ca-bundle.crt:4039: Signature Algorithm: md2WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:4047: RSA Public Key: (1024 bit) /mutt-1.5.19/contrib/ca-bundle.crt:4059: Signature Algorithm: md2WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:4071:MD5 Fingerprint: A2:33:9B:4C:74:78:73:D4:6C:E7:C1:F3:8D:CB:5C:E9 /mutt-1.5.19/contrib/ca-bundle.crt:4097: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:4105: RSA Public Key: (1024 bit) /mutt-1.5.19/contrib/ca-bundle.crt:4117: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:4129:MD5 Fingerprint: CD:68:B6:A7:C7:C4:CE:75:E0:1D:4F:57:44:61:92:09 /mutt-1.5.19/contrib/ca-bundle.crt:4160: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:4168: RSA Public Key: (2048 bit) /mutt-1.5.19/contrib/ca-bundle.crt:4189: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:4208:MD5 Fingerprint: 26:6D:2C:19:98:B6:70:68:38:50:54:19:EC:90:34:60 /mutt-1.5.19/contrib/ca-bundle.crt:4234: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:4242: RSA Public Key: (1024 bit) /mutt-1.5.19/contrib/ca-bundle.crt:4254: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:4266:MD5 Fingerprint: DB:C8:F2:27:2E:B1:EA:6A:29:23:5D:FE:56:3E:33:DF /mutt-1.5.19/contrib/ca-bundle.crt:4297: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:4305: RSA Public Key: (2048 bit) /mutt-1.5.19/contrib/ca-bundle.crt:4326: Signature Algorithm: sha1WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:4343:Verisign/RSA Commercial CA /mutt-1.5.19/contrib/ca-bundle.crt:4345:MD5 Fingerprint: 5A:0B:DD:42:9E:B2:B4:62:97:32:7F:7F:0A:AA:9A:39 /mutt-1.5.19/contrib/ca-bundle.crt:4366: Signature Algorithm: md2WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:4367: Issuer: C=US, O=RSA Data Security, Inc., OU=Commercial Certification Authority /mutt-1.5.19/contrib/ca-bundle.crt:4371: Subject: C=US, O=RSA Data Security, Inc., OU=Commercial Certification Authority /mutt-1.5.19/contrib/ca-bundle.crt:4374: RSA Public Key: (1000 bit) /mutt-1.5.19/contrib/ca-bundle.crt:4386: Signature Algorithm: md2WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:4395:Verisign/RSA Secure Server CA /mutt-1.5.19/contrib/ca-bundle.crt:4397:MD5 Fingerprint: 74:7B:82:03:43:F0:00:9E:6B:B3:EC:47:BF:85:A5:93 /mutt-1.5.19/contrib/ca-bundle.crt:4418: Signature Algorithm: md2WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:4419: Issuer: C=US, O=RSA Data Security, Inc., OU=Secure Server Certification Authority /mutt-1.5.19/contrib/ca-bundle.crt:4423: Subject: C=US, O=RSA Data Security, Inc., OU=Secure Server Certification Authority /mutt-1.5.19/contrib/ca-bundle.crt:4426: RSA Public Key: (1000 bit) /mutt-1.5.19/contrib/ca-bundle.crt:4438: Signature Algorithm: md2WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:4449:MD5 Fingerprint=BD:D4:F5:1A:7D:70:46:50:DB:6F:4D:68:41:83:99:93 /mutt-1.5.19/contrib/ca-bundle.crt:4499: Signature Algorithm: md5WithRSAEncryption /mutt-1.5.19/contrib/ca-bundle.crt:4507: RSA Public Key: (4096 bit) /mutt-1.5.19/contrib/ca-bundle.crt:4555:Die Nutzung dieses Zertifikates wird von den Allgemeinen Geschftsbedingungen (AGB) / Zertifizierungsrichtlinien des WEB.DE TrustCenters geregelt. /mutt-1.5.19/contrib/ca-bundle.crt:4567: SSL CA, S/MIME CA, Object Signing CA /mutt-1.5.19/contrib/ca-bundle.crt:4570: Signature Algorithm: md5WithRSAEncryption /mutt-1.5.19/contrib/language.txt:12:# Marc Aurel <4-tea-2@bong.saar.de>) /mutt-1.5.19/contrib/language.txt:30:"\nClear signature file: %s\n" /mutt-1.5.19/contrib/language.txt:33:fr: "\nFichier de signature en clair: %s\n" /mutt-1.5.19/contrib/language.txt:233:"This could mean that this signature is a forgery.\n" /mutt-1.5.19/contrib/language.txt:236:fr: "Ceci peut signifier que cette signature est un faux.\n" /mutt-1.5.19/contrib/language.txt:255:signature fiable. Il n'est donc pas reconnu avec un haut degr de confiance\n\ /mutt-1.5.19/contrib/language.txt:256:que cette signature appartient effectivement : \"%s\".\n" /mutt-1.5.19/contrib/language.txt:321:de: "\nVorbereitung des zuflligen IDEA-Schlssels..." /mutt-1.5.19/contrib/language.txt:324:muttde: "\nVorbereitung des zuflligen IDEA-Schlssels..." /mutt-1.5.19/contrib/language.txt:353:"\n\007Can't create signature file '%s'\n" /mutt-1.5.19/contrib/language.txt:356:fr: "\n\007Cration du fichier de signature '%s' impossible\n" /mutt-1.5.19/contrib/language.txt:357:mutt: "\nCan't create signature file '%s'\n" /mutt-1.5.19/contrib/language.txt:361:de: "\n\007FEHLER beim ffnen des Schlsselbunds '%s'.\n" /mutt-1.5.19/contrib/language.txt:365:muttde: "\nFEHLER beim ffnen des Schlsselbunds '%s'.\n" /mutt-1.5.19/contrib/language.txt:374:de: "\n\007Dateifehler bei der Aktualisierung des Schlsselbunds.\n" /mutt-1.5.19/contrib/language.txt:380:muttde: "\nDateifehler bei der Aktualisierung des Schlsselbunds.\n" /mutt-1.5.19/contrib/language.txt:383:de: "\nDie Urkunde zum Zurckziehen des Schlssels wurde erzeugt.\n" /mutt-1.5.19/contrib/language.txt:386:muttde: "\nDie Urkunde zum Zurckziehen des Schlssels wurde erzeugt.\n" /mutt-1.5.19/contrib/language.txt:416:"\nKey signature certificate added.\n" /mutt-1.5.19/contrib/language.txt:419:fr: "\nCertificat de signature de cl ajout.\n" /mutt-1.5.19/contrib/language.txt:424:Thus, a signature made with this key cannot be checked on this keyring.\n" /mutt-1.5.19/contrib/language.txt:434:en consequence, une signature faite avec cette clef ne peut etre verifiee.\n" /mutt-1.5.19/contrib/language.txt:453:"\nFile '%s' has signature, but with no text." /mutt-1.5.19/contrib/language.txt:456:fr: "\nLe fichier '%s' une signature, mais pas de texte." /mutt-1.5.19/contrib/language.txt:467:"\nPlease enter filename of material that signature applies to: " /mutt-1.5.19/contrib/language.txt:473:"File signature applies to?" /mutt-1.5.19/contrib/language.txt:498:"\nWARNING: Can't find the right public key-- can't check signature \ /mutt-1.5.19/contrib/language.txt:505:vrifier l'integrit de la signature.\n" /mutt-1.5.19/contrib/language.txt:511:Can't check signature integrity.\n" /mutt-1.5.19/contrib/language.txt:520:de PGP. Incapable de vrifier la signature.\n" /mutt-1.5.19/contrib/language.txt:523:Can't check signature integrity.\n" /mutt-1.5.19/contrib/language.txt:528:"\a\nMalformed or obsolete signature. Can't check signature \ /mutt-1.5.19/contrib/language.txt:536:"\a\nSigning key is too large. Can't check signature integrity.\n" /mutt-1.5.19/contrib/language.txt:545:"\n\007Error: RSA-decrypted block is corrupted.\n\ /mutt-1.5.19/contrib/language.txt:546:This may be caused either by corrupted data or by using the wrong RSA key.\n\ /mutt-1.5.19/contrib/language.txt:548:de: "\n\007FEHLER: Die mit RSA entschlsselten Daten sind fehlerhaft.\n\ /mutt-1.5.19/contrib/language.txt:549:Ursache: beschdigte Daten oder ein falscher RSA-Schlssel.\n" /mutt-1.5.19/contrib/language.txt:550:es: "\n\007Error: El bloque desencriptado RSA est daado.\n\ /mutt-1.5.19/contrib/language.txt:551:Puede deberse a un problema en los datos o a una clave RSA equivocada.\n" /mutt-1.5.19/contrib/language.txt:552:fr: "\n\007Erreur: le block dechiffr par RSA est endommag.\n\ /mutt-1.5.19/contrib/language.txt:553:Ceci est peut tre caus par des donnes endommages our par\n\ /mutt-1.5.19/contrib/language.txt:554:l'utilisation d'une mauvaise cl RSA.\n" /mutt-1.5.19/contrib/language.txt:555:mutt: "\nError: RSA-decrypted block is corrupted.\n\ /mutt-1.5.19/contrib/language.txt:556:This may be caused either by corrupted data or by using the wrong RSA key.\n\ /mutt-1.5.19/contrib/language.txt:558:muttde: "\nFEHLER: Die mit RSA entschlsselten Daten sind fehlerhaft.\n\ /mutt-1.5.19/contrib/language.txt:559:Ursache: beschdigte Daten oder ein falscher RSA-Schlssel.\n" /mutt-1.5.19/contrib/language.txt:561:"WARNING: Bad signature, doesn't match file contents!" /mutt-1.5.19/contrib/language.txt:565:fr: "ATTENTION: Mauvaise signature, ne correspond pas au contenu!" /mutt-1.5.19/contrib/language.txt:568:"\nBad signature from user \"%s\".\n" /mutt-1.5.19/contrib/language.txt:571:fr: "\nMauvaise signature de l'utilisateur \"%s\".\n" /mutt-1.5.19/contrib/language.txt:574:"Signature made %s using %d-bit key, key ID %s\n" /mutt-1.5.19/contrib/language.txt:577:fr: "Signature faite %s en utilisant un clef de %d bits. Id de la clef:%s\n" /mutt-1.5.19/contrib/language.txt:586:"\nGood signature from user \"%s\".\n" /mutt-1.5.19/contrib/language.txt:589:fr: "\nBonne signature de l'utilisateur \"%s\".\n" /mutt-1.5.19/contrib/language.txt:596:fr: "\nLa signature et le texte sont spars. Fichier de sortie non produit." /mutt-1.5.19/contrib/language.txt:610:fr: "\n\007Le fichier de signature '%s' existe dj. A craser (o/N)? " /mutt-1.5.19/contrib/language.txt:614:"\nWriting signature certificate to '%s'\n" /mutt-1.5.19/contrib/language.txt:617:fr: "\nEcriture du certificat de signature dans '%s'\n" /mutt-1.5.19/contrib/language.txt:620:"\n\007Error: Badly-formed or corrupted signature certificate.\n" /mutt-1.5.19/contrib/language.txt:623:fr: "\n\007Erreur: certificat de signature mal form ou endommag\n" /mutt-1.5.19/contrib/language.txt:624:mutt: "\nError: Badly-formed or corrupted signature certificate.\n" /mutt-1.5.19/contrib/language.txt:627:"File \"%s\" does not have a properly-formed signature.\n" /mutt-1.5.19/contrib/language.txt:630:fr: "Le fichier \"%s\" n'a pas une signature correctement forme.\n" /mutt-1.5.19/contrib/language.txt:659:"\nYou need a pass phrase to encrypt the file. " /mutt-1.5.19/contrib/language.txt:666:This user will not be able to decrypt this message.\n" /mutt-1.5.19/contrib/language.txt:675:This user will not be able to decrypt this message.\n" /mutt-1.5.19/contrib/language.txt:693:"\n\007Error: RSA block is possibly malformed. Old format, maybe?\n" /mutt-1.5.19/contrib/language.txt:694:de: "\n\007FEHLER: RSA-Block mglicherweise fehlerhaft. Vielleicht altes Format?\n" /mutt-1.5.19/contrib/language.txt:695:es: "\n\007Error: El bloque RSA est mal formado.\n\ /mutt-1.5.19/contrib/language.txt:697:fr: "\n\007Erreur: Block RSA malform, vieux format ???" /mutt-1.5.19/contrib/language.txt:698:mutt: "\nError: RSA block is possibly malformed. Old format, maybe?\n" /mutt-1.5.19/contrib/language.txt:699:muttde: "\nFEHLER: RSA-Block mglicherweise fehlerhaft. Vielleicht altes Format?\n" /mutt-1.5.19/contrib/language.txt:713:"\n\007You do not have the secret key needed to decrypt this file.\n" /mutt-1.5.19/contrib/language.txt:719:mutt: "\nYou do not have the secret key needed to decrypt this file.\n" /mutt-1.5.19/contrib/language.txt:729:"\nYou need a pass phrase to decrypt this file. " /mutt-1.5.19/contrib/language.txt:749:de: "Entpacken des Klartextes..." /mutt-1.5.19/contrib/language.txt:752:muttde: "Entpacken des Klartextes..." /mutt-1.5.19/contrib/language.txt:793:de: "Krzung des Dateinamens '%s' " /mutt-1.5.19/contrib/language.txt:796:muttde: "Krzung des Dateinamens '%s' " /mutt-1.5.19/contrib/language.txt:868:"Replacing signature from keyID %s on userid \"%s\"\n" /mutt-1.5.19/contrib/language.txt:873:fr: "Remplacement la signature de keyID %s de l'utilisateur '%s'\n" /mutt-1.5.19/contrib/language.txt:877:"Verifying signature from %s\n" /mutt-1.5.19/contrib/language.txt:880:fr: "Vrification de la signature de %s\n" /mutt-1.5.19/contrib/language.txt:889:"Replacing signature from %s\n" /mutt-1.5.19/contrib/language.txt:892:fr: "Remplacement de la signature de %s" /mutt-1.5.19/contrib/language.txt:901:"New signature from keyID %s on userid \"%s\"\n" /mutt-1.5.19/contrib/language.txt:904:fr: "Nouvelle signature de la cl %s sur l'utilisateur \"%s\"\n" /mutt-1.5.19/contrib/language.txt:907:"New signature from %s\n" /mutt-1.5.19/contrib/language.txt:910:fr: "\nNouvelle signature de %s\n" /mutt-1.5.19/contrib/language.txt:956:de: "\nFEHLER beim Anlegen des Schlsselbunds '%s'.\n" /mutt-1.5.19/contrib/language.txt:959:muttde: "\nFEHLER beim Anlegen des Schlsselbunds '%s'.\n" /mutt-1.5.19/contrib/language.txt:964:fr: "\nRecherche des nouvelles cls...\n" /mutt-1.5.19/contrib/language.txt:968:de: "\n\007FEHLER beim Lesen des Schlssels aus Datei '%s'.\n" /mutt-1.5.19/contrib/language.txt:972:muttde: "\nFEHLER beim Lesen des Schlssels aus Datei '%s'.\n" /mutt-1.5.19/contrib/language.txt:1018:fr: "\n\007Le fichier contient des cls dupliques: impossible\n\ /mutt-1.5.19/contrib/language.txt:1072:fr: "\nUne ou plusieurs des nouvelles cls ne sont pas compltement\ /mutt-1.5.19/contrib/language.txt:1150:de: "\nFEHLER beim ffnen des privaten Schlsselbunds '%s'.\n" /mutt-1.5.19/contrib/language.txt:1153:muttde: "\nFEHLER beim ffnen des privaten Schlsselbunds '%s'.\n" /mutt-1.5.19/contrib/language.txt:1158:fr: "\nPasse 1: Recherche des cls \"de confiance ultime\"...\n" /mutt-1.5.19/contrib/language.txt:1161:"\nPass 2: Tracing signature chains...\n" /mutt-1.5.19/contrib/language.txt:1164:fr: "\nPasse 2: Vrification des chaines de signatures...\n" /mutt-1.5.19/contrib/language.txt:1170:fr: "Le fichier de cls contient des cls dupliques: %s\n" /mutt-1.5.19/contrib/language.txt:1212:pour accorder un certificat l'une au l'autre des autres clefs.\n" /mutt-1.5.19/contrib/language.txt:1235:n'apparrat pas dans le trousseau des clefs secrtes. \n\ /mutt-1.5.19/contrib/language.txt:1243:de: "\n\007FEHLER beim Lesen des privaten Schlsselbunds.\n" /mutt-1.5.19/contrib/language.txt:1247:muttde: "\nFEHLER beim Lesen des privaten Schlsselbunds.\n" /mutt-1.5.19/contrib/language.txt:1277:apparait egalement dans le repertoire des clefs secretes." /mutt-1.5.19/contrib/language.txt:1544:de: "Dateiname des privaten Schlssels: " /mutt-1.5.19/contrib/language.txt:1547:muttde: "Dateiname des privaten Schlssels: " /mutt-1.5.19/contrib/language.txt:1550:de: "Dateiname des ffentlichen Schlssels: " /mutt-1.5.19/contrib/language.txt:1553:muttde: "Dateiname des ffentlichen Schlssels: " /mutt-1.5.19/contrib/language.txt:1555:"\nYou need a pass phrase to unlock your RSA secret key. " /mutt-1.5.19/contrib/language.txt:1556:de: "\nDu brauchst ein Mantra, um Deinen privaten RSA-Schlssel zu benutzen." /mutt-1.5.19/contrib/language.txt:1557:es: "\nSe necesita la contrasea para abrir la clave secreta RSA. " /mutt-1.5.19/contrib/language.txt:1558:fr: "\nVous devez avoir un mot de passe pour utiliser votre cl secrte RSA." /mutt-1.5.19/contrib/language.txt:1559:muttde: "\nDu brauchst ein Mantra, um Deinen privaten RSA-Schlssel zu benutzen." /mutt-1.5.19/contrib/language.txt:1567:"\nAdvisory warning: This RSA secret key is not protected by a \ /mutt-1.5.19/contrib/language.txt:1570:es: "\nAdvertencia: Esta clave secreta RSA no tiene contrasea.\n" /mutt-1.5.19/contrib/language.txt:1571:fr: "\nAttention: cette cl secrte RSA n'est pas protge par un mot \ /mutt-1.5.19/contrib/language.txt:1589:de: "Fingerabdruck des Schlssels:" /mutt-1.5.19/contrib/language.txt:1592:muttde: "Fingerabdruck des Schlssels:" /mutt-1.5.19/contrib/language.txt:1621:fr: "\nVrification des signatures...\n" /mutt-1.5.19/contrib/language.txt:1642:"(Malformed or obsolete signature format)" /mutt-1.5.19/contrib/language.txt:1645:fr: "(Signature malformee ou obsolete)" /mutt-1.5.19/contrib/language.txt:1649:de: "(unbek. Algorithmus des ffentl. Schlssels)" /mutt-1.5.19/contrib/language.txt:1652:muttde: "(unbek. Algorithmus des ffentl. Schlssels)" /mutt-1.5.19/contrib/language.txt:1660:"(Unknown signature packet version)" /mutt-1.5.19/contrib/language.txt:1661:de: "(unbekannte Version des Unterschriftsblocks)" /mutt-1.5.19/contrib/language.txt:1663:fr: "Version de paquet de signature inconnue" /mutt-1.5.19/contrib/language.txt:1664:muttde: "(unbekannte Version des Unterschriftsblocks)" /mutt-1.5.19/contrib/language.txt:1666:"(Malformed signature)" /mutt-1.5.19/contrib/language.txt:1669:fr: "(Signature deforme)" /mutt-1.5.19/contrib/language.txt:1672:"(Corrupted signature packet)" /mutt-1.5.19/contrib/language.txt:1675:fr: "(Signature corrompue)" /mutt-1.5.19/contrib/language.txt:1678:"\007**** BAD SIGNATURE! ****" /mutt-1.5.19/contrib/language.txt:1681:fr: "\007**** MAUVAISE SIGNATURE! ****" /mutt-1.5.19/contrib/language.txt:1682:mutt: "**** BAD SIGNATURE! ****" /mutt-1.5.19/contrib/language.txt:1695:fr: "\nSuppression des signatures de l'utilisateur '%s'\n\ /mutt-1.5.19/contrib/language.txt:1712:"\nKey has %d signature(s):\n" /mutt-1.5.19/contrib/language.txt:1715:fr: "\nLa cl a %d signature(s):\n" /mutt-1.5.19/contrib/language.txt:1724:"Remove this signature (y/N)? " /mutt-1.5.19/contrib/language.txt:1727:fr: "Suppression de cette signature (o/N)? " /mutt-1.5.19/contrib/language.txt:1733:fr: "\nPas de supression de signature de cl.\n" /mutt-1.5.19/contrib/language.txt:1736:"\n%d key signature(s) removed.\n" /mutt-1.5.19/contrib/language.txt:1739:fr: "\n%d signature(s) de cl supprime(s).\n" /mutt-1.5.19/contrib/language.txt:1851:de: "\nFEHLER beim ffnen des ffentlichen Schlsselbunds '%s'.\n" /mutt-1.5.19/contrib/language.txt:1854:muttde: "\nFEHLER beim ffnen des ffentlichen Schlsselbunds '%s'.\n" /mutt-1.5.19/contrib/language.txt:1871:de: "\nKein privater Schlssel vorhanden. Die 'Vertrauens-Einstellungen' des\n\ /mutt-1.5.19/contrib/language.txt:1878:muttde: "\nKein privater Schlssel vorhanden. Die 'Vertrauens-Einstellungen' des\n\ /mutt-1.5.19/contrib/language.txt:1932:de: "\n\007FEHLER beim Aktualisieren des privaten Schlsselbunds.\n" /mutt-1.5.19/contrib/language.txt:1936:muttde: "\nFEHLER beim Aktualisieren des privaten Schlsselbunds.\n" /mutt-1.5.19/contrib/language.txt:1945:de: "\n\007FEHLER beim Aktualisieren des ffentlichen Schlsselbunds.\n" /mutt-1.5.19/contrib/language.txt:1949:muttde: "\nFEHLER beim Aktualisieren des ffentlichen Schlsselbunds.\n" /mutt-1.5.19/contrib/language.txt:1974:fr: "Vous ne pouvez inactiver des cls que sur votre fichier de cls\ /mutt-1.5.19/contrib/language.txt:1993:"Pick your RSA key size:\n\ /mutt-1.5.19/contrib/language.txt:1998:de: "Whle die Lnge Deines RSA-Schlssels aus:\ /mutt-1.5.19/contrib/language.txt:2002:\nAuswahl (1, 2, 3 oder die Lnge des Schlssels in Bits (384...8192)): " /mutt-1.5.19/contrib/language.txt:2003:es: "Elija un tamao de clave RSA:\n\ /mutt-1.5.19/contrib/language.txt:2008:fr: "Choisissez la taille de votre clef RSA:\n\ /mutt-1.5.19/contrib/language.txt:2013:muttde: "Whle die Lnge Deines RSA-Schlssels aus:\ /mutt-1.5.19/contrib/language.txt:2017:\nAuswahl (1, 2, 3 oder die Lnge des Schlssels in Bits (384...8192)): " /mutt-1.5.19/contrib/language.txt:2019:"Generating an RSA key with a %d-bit modulus.\n" /mutt-1.5.19/contrib/language.txt:2020:de: "Erzeugung eines RSA-Schlssels mit einem %d-Bit-Modulus.\n" /mutt-1.5.19/contrib/language.txt:2021:es: "Generando una clave RSA con mdulo de %d bits.\n" /mutt-1.5.19/contrib/language.txt:2022:fr: "Generation d'une cl RSA avec un module de %d bits.\n" /mutt-1.5.19/contrib/language.txt:2023:muttde: "Erzeugung eines RSA-Schlssels mit einem %d-Bit-Modulus.\n" /mutt-1.5.19/contrib/language.txt:2057:"Generating RSA key-pair with UserID \"%s\".\n" /mutt-1.5.19/contrib/language.txt:2058:de: "Erzeugung eines RSA-Schlsselpaares mit der\nBenutzer-ID \"%s\".\n" /mutt-1.5.19/contrib/language.txt:2059:es: "Generando el par de claves RSA con identificador \"%s\".\n" /mutt-1.5.19/contrib/language.txt:2060:fr: "Gnration d'une paire de clefs RSA de l'utilisateur '%s'.\n" /mutt-1.5.19/contrib/language.txt:2061:muttde: "Erzeugung eines RSA-Schlsselpaares mit der\nBenutzer-ID \"%s\".\n" /mutt-1.5.19/contrib/language.txt:2063:"\nYou need a pass phrase to protect your RSA secret key.\n\ /mutt-1.5.19/contrib/language.txt:2066:de: "\nDu brauchst ein Mantra, um Deinen privaten RSA-Schlssel zu schtzen.\n\ /mutt-1.5.19/contrib/language.txt:2069:es: "\nNecesitas una contrasea para proteger tu clave secreta RSA.\n\ /mutt-1.5.19/contrib/language.txt:2072:fr: "\nVous devez avoir un mot de passe pour protger votre cl RSA \n\ /mutt-1.5.19/contrib/language.txt:2076:muttde: "\nDu brauchst ein Mantra, um Deinen privaten RSA-Schlssel zu schtzen.\n\ /mutt-1.5.19/contrib/language.txt:2112:de: "\n\007Die Erzeugung des Schlssels ist beendet.\n" /mutt-1.5.19/contrib/language.txt:2116:muttde: "\nDie Erzeugung des Schlssels ist beendet.\n" /mutt-1.5.19/contrib/language.txt:2200:gouvernement des tats-Unis" /mutt-1.5.19/contrib/language.txt:2289:\n Marc Aurel <4-tea-2@bong.saar.de> vom 19.01.1994)\n" /mutt-1.5.19/contrib/language.txt:2296:\n Marc Aurel <4-tea-2@bong.saar.de> vom 19.01.1994)\n" /mutt-1.5.19/contrib/language.txt:2359:"\nA secret key is required to make a signature. " /mutt-1.5.19/contrib/language.txt:2362:fr: "\nUne cl secrte est ncessaire pour faire une signature. " /mutt-1.5.19/contrib/language.txt:2382:fr: "\007Erreur de signature\n" /mutt-1.5.19/contrib/language.txt:2383:mutt: "Signature error\n" /mutt-1.5.19/contrib/language.txt:2386:"\n\nRecipients' public key(s) will be used to encrypt. " /mutt-1.5.19/contrib/language.txt:2394:de: "\nZur Auswahl des Empfnger-Schlssels wird eine Benutzer-ID bentigt." /mutt-1.5.19/contrib/language.txt:2399:muttde: "\nZur Auswahl des Empfnger-Schlssels wird eine Benutzer-ID bentigt." /mutt-1.5.19/contrib/language.txt:2402:de: "\nBenutzer-ID des Empfngers: " /mutt-1.5.19/contrib/language.txt:2405:muttde: "\nBenutzer-ID des Empfngers: " /mutt-1.5.19/contrib/language.txt:2423:fr: "\nFichier de signature: %s\n" /mutt-1.5.19/contrib/language.txt:2452:"\nThis file has a signature, which will be left in place.\n" /mutt-1.5.19/contrib/language.txt:2455:fr: "\nCe fichier a une signature, qui sera garde.\n" /mutt-1.5.19/contrib/language.txt:2458:"\nFile has signature. Public key is required to check signature.\n" /mutt-1.5.19/contrib/language.txt:2491:"\007\nError: '%s' is not a ciphertext, signature, or key file.\n" /mutt-1.5.19/contrib/language.txt:2497:mutt: "\nError: '%s' is not a ciphertext, signature, or key file.\n" /mutt-1.5.19/contrib/language.txt:2535:de: "\nDateiname des Klartextes: %s" /mutt-1.5.19/contrib/language.txt:2538:muttde: "\nDateiname des Klartextes: %s" /mutt-1.5.19/contrib/language.txt:2552:"\n\007Output file '%s' may contain more ciphertext or signature." /mutt-1.5.19/contrib/language.txt:2558:ou signature." /mutt-1.5.19/contrib/language.txt:2559:mutt: "\nOutput file '%s' may contain more ciphertext or signature." /mutt-1.5.19/contrib/language.txt:2588:Bitte lege eine Kopie beider Teile des Benutzerhandbuches (Dateien PGPDOC1.TXT\n\ /mutt-1.5.19/contrib/language.txt:2609:fr: "et leur(s) sous-repertoire(s). Veuillez placer une copie des\n\ /mutt-1.5.19/contrib/language.txt:2618:PGP ne fonctionnera pas sans la presence des deux documents constituant le /mutt-1.5.19/contrib/language.txt:2623:Bitte lege eine Kopie beider Teile des Benutzerhandbuches (Dateien PGPDOC1.TXT\n\ /mutt-1.5.19/contrib/language.txt:2634:de: "\n\007FEHLER bei der Erzeugung des Schlssels.\n" /mutt-1.5.19/contrib/language.txt:2638:muttde: "\nFEHLER bei der Erzeugung des Schlssels.\n" /mutt-1.5.19/contrib/language.txt:2641:de: "\n\007FEHLER bei der berprfung des Schlsselbunds.\n" /mutt-1.5.19/contrib/language.txt:2645:muttde: "\nFEHLER bei der berprfung des Schlsselbunds.\n" /mutt-1.5.19/contrib/language.txt:2661:de: "\nZur Auswahl des zu unterschreibenden Schlssels wird\n\ /mutt-1.5.19/contrib/language.txt:2667:muttde: "\nZur Auswahl des zu unterschreibenden Schlssels wird\n\ /mutt-1.5.19/contrib/language.txt:2671:de: "\nBenutzer-ID des ffentlichen Schlssels: " /mutt-1.5.19/contrib/language.txt:2674:muttde: "\nBenutzer-ID des ffentlichen Schlssels: " /mutt-1.5.19/contrib/language.txt:2676:"\007Key signature error. " /mutt-1.5.19/contrib/language.txt:2677:de: "\n\007FEHLER beim Unterschreiben des Schlssels.\n" /mutt-1.5.19/contrib/language.txt:2679:fr: "\007Erreur dans la signature de cl. " /mutt-1.5.19/contrib/language.txt:2680:mutt: "Key signature error. " /mutt-1.5.19/contrib/language.txt:2681:muttde: "\nFEHLER beim Unterschreiben des Schlssels.\n" /mutt-1.5.19/contrib/language.txt:2685:de: "\nZur Auswahl des zurckzuziehenden oder zu sperrenden Schlssels wird\n\ /mutt-1.5.19/contrib/language.txt:2691:muttde: "\nZur Auswahl des zurckzuziehenden oder zu sperrenden Schlssels wird\n\ /mutt-1.5.19/contrib/language.txt:2701:de: "\nZur Auswahl des zu bearbeitenden Schlssels wird eine Benutzer-ID bentigt." /mutt-1.5.19/contrib/language.txt:2706:muttde: "\nZur Auswahl des zu bearbeitenden Schlssels wird eine Benutzer-ID bentigt." /mutt-1.5.19/contrib/language.txt:2709:de: "\nBenutzer-ID des Schlssels: " /mutt-1.5.19/contrib/language.txt:2712:muttde: "\nBenutzer-ID des Schlssels: " /mutt-1.5.19/contrib/language.txt:2715:de: "\n\007FEHLER beim Bearbeiten des Schlsselbunds.\n" /mutt-1.5.19/contrib/language.txt:2719:muttde: "\nFEHLER beim Bearbeiten des Schlsselbunds.\n" /mutt-1.5.19/contrib/language.txt:2729:de: "\nZur Auswahl des zu extrahierenden Schlssels wird eine Benutzer-ID bentigt." /mutt-1.5.19/contrib/language.txt:2734:muttde: "\nZur Auswahl des zu extrahierenden Schlssels wird eine Benutzer-ID bentigt." /mutt-1.5.19/contrib/language.txt:2745:de: "\nZur Auswahl des Schlssels, von dem Beglaubigungen entfernt werden sollen,\n\ /mutt-1.5.19/contrib/language.txt:2751:pour laquelle vous voulez supprimer des signatures de certification. " /mutt-1.5.19/contrib/language.txt:2752:muttde: "\nZur Auswahl des Schlssels, von dem Beglaubigungen entfernt werden sollen,\n\ /mutt-1.5.19/contrib/language.txt:2756:de: "\nZur Auswahl des zu lschenden Schlssels wird eine Benutzer-ID bentigt." /mutt-1.5.19/contrib/language.txt:2761:muttde: "\nZur Auswahl des zu lschenden Schlssels wird eine Benutzer-ID bentigt." /mutt-1.5.19/contrib/language.txt:2763:"\007Key signature remove error. " /mutt-1.5.19/contrib/language.txt:2766:fr: "\007Erreur dans la suppression de signature d'une cl. " /mutt-1.5.19/contrib/language.txt:2767:mutt: "Key signature remove error. " /mutt-1.5.19/contrib/language.txt:2778:de: "\n\007FEHLER beim Anzeigen des Schlsselbunds.\n" /mutt-1.5.19/contrib/language.txt:2782:muttde: "\nFEHLER beim Anzeigen des Schlsselbunds.\n" /mutt-1.5.19/contrib/language.txt:2799:\nTo encrypt a plaintext file with recipent's public key, type:\ /mutt-1.5.19/contrib/language.txt:2803:\nTo sign a plaintext file with your secret key, and then encrypt it\ /mutt-1.5.19/contrib/language.txt:2806:\nTo encrypt with conventional encryption only:\ /mutt-1.5.19/contrib/language.txt:2808:\nTo decrypt or check a signature for a ciphertext (.pgp) file:\ /mutt-1.5.19/contrib/language.txt:2814:\nVerschlsseln eines Textes mit dem ffentlichen Schlssel des Empfngers:\ /mutt-1.5.19/contrib/language.txt:2815:\n pgp -e {Text} {Benutzer-ID des Empfngers} (Ergebnis: {Text}.pgp)\ /mutt-1.5.19/contrib/language.txt:2819:\nVerschlsseln mit dem ffentlichen Schlssel des Empfngers:\ /mutt-1.5.19/contrib/language.txt:2820:\n pgp -es {Text} {Benutzer-ID des Empfngers} [weitere Benutzer-IDs]\ /mutt-1.5.19/contrib/language.txt:2855:\nPour dchiffrer ou vrifier une signature pour un fichier chiffr (.pgp):\ /mutt-1.5.19/contrib/language.txt:2863:\nVerschlsseln eines Textes mit dem ffentlichen Schlssel des Empfngers:\ /mutt-1.5.19/contrib/language.txt:2864:\n pgp -e {Text} {Benutzer-ID des Empfngers} (Ergebnis: {Text}.pgp)\ /mutt-1.5.19/contrib/language.txt:2868:\nVerschlsseln mit dem ffentlichen Schlssel des Empfngers:\ /mutt-1.5.19/contrib/language.txt:2869:\n pgp -es {Text} {Benutzer-ID des Empfngers} [weitere Benutzer-IDs]\ /mutt-1.5.19/contrib/language.txt:2910:\nAnzeigen des Inhaltes des ffentlichen Schlsselbunds:\ /mutt-1.5.19/contrib/language.txt:2938:fr: "Fonctions de gestion des cls:\ /mutt-1.5.19/contrib/language.txt:2968:\nAnzeigen des Inhaltes des ffentlichen Schlsselbunds:\ /mutt-1.5.19/contrib/language.txt:3008:Uses the RSAREF(tm) Toolkit, which is copyright RSA Data Security, Inc.\n\ /mutt-1.5.19/contrib/language.txt:3010:de: "Benutzt das RSAREF(tm) Toolkit, (c) RSA Data Security, Inc.\n\ /mutt-1.5.19/contrib/language.txt:3013:Utiliza RSAREF(tm), copyright de RSA Data Security, Inc.\n\ /mutt-1.5.19/contrib/language.txt:3015:fr: "Ce logiciel utilise RSAREF(tm) Toolkit, Copyright RSA Data Security, Inc\n\ /mutt-1.5.19/contrib/language.txt:3017:muttde: "Benutzt das RSAREF(tm) Toolkit, (c) RSA Data Security, Inc.\n\ /mutt-1.5.19/contrib/language.txt:3048:fr: "\nERREUR: fin innopine des donnes d'entre compresses.\n" /mutt-1.5.19/contrib/language.txt:3103:"Key is a SIGNature only key.\n" /mutt-1.5.19/contrib/language.txt:3111:"SIGNature only\n" /mutt-1.5.19/contrib/language.txt:3151:"\nKey signature certificate revoked.\n" /mutt-1.5.19/contrib/language.txt:3166:"Signature was made after the key ID %s was expired.\n" /mutt-1.5.19/contrib/language.txt:3170:"Signature was made before the key ID %s was valid.\n" /mutt-1.5.19/contrib/language.txt:3174:"Signature was made using the ENCR key ID %s.\n" /mutt-1.5.19/contrib/language.txt:3251:de: "\n\nSORGFLTIG LESEN: Wie hast Du die Identitt des Nutzers geprft ?\n\ /mutt-1.5.19/contrib/language.txt:3253: 1) Keine berprfung des wirklichen Namens des Nutzers.\n\ /mutt-1.5.19/contrib/language.txt:3256:muttde: "\n\nSORGFLTIG LESEN: Wie hast Du die Identitt des Nutzers geprft ?\n\ /mutt-1.5.19/contrib/language.txt:3258: 1) Keine berprfung des wirklichen Namens des Nutzers.\n\ /mutt-1.5.19/contrib/colors.default:7:color signature red white /mutt-1.5.19/contrib/colors.linux:7:color signature blue black /mutt-1.5.19/contrib/smime.rc:3:## compiled in S/MIME support /mutt-1.5.19/contrib/smime.rc:5:# If you compiled mutt with support for both PGP and S/MIME, PGP /mutt-1.5.19/contrib/smime.rc:28:# Uncommen to make mutt ask what key to use when trying to decrypt a message. /mutt-1.5.19/contrib/smime.rc:30:# unset smime_decrypt_use_default_key /mutt-1.5.19/contrib/smime.rc:42:# First generate a PKCS#7 structure from the message. /mutt-1.5.19/contrib/smime.rc:43:set smime_pk7out_command="openssl smime -verify -in %f -noverify -pk7out" /mutt-1.5.19/contrib/smime.rc:45:# Extract the included certificate(s) from a PKCS#7 structure. /mutt-1.5.19/contrib/smime.rc:46:set smime_get_cert_command="openssl pkcs7 -print_certs -in %f" /mutt-1.5.19/contrib/smime.rc:48:# Extract the signer's certificate only from a S/MIME signature (sender verification) /mutt-1.5.19/contrib/smime.rc:49:set smime_get_signer_cert_command="openssl smime -verify -in %f -noverify -signer %c -out /dev/null" /mutt-1.5.19/contrib/smime.rc:52:set smime_get_cert_email_command="openssl x509 -in %f -noout -email" /mutt-1.5.19/contrib/smime.rc:62:# valid choices are rc2-40, rc2-64, rc2-128, des, des3 /mutt-1.5.19/contrib/smime.rc:63:set smime_encrypt_with="des3" /mutt-1.5.19/contrib/smime.rc:65:# Encrypt a message. Input file is a MIME entity. /mutt-1.5.19/contrib/smime.rc:66:set smime_encrypt_command="openssl smime -encrypt -%a -outform DER -in %f %c" /mutt-1.5.19/contrib/smime.rc:69:set smime_sign_command="openssl smime -sign -signer %c -inkey %k -passin stdin -in %f -certfile %i -outform DER" /mutt-1.5.19/contrib/smime.rc:75:# Decrypt a message. Output is a MIME entity. /mutt-1.5.19/contrib/smime.rc:76:set smime_decrypt_command="openssl smime -decrypt -passin stdin -inform DER -in %f -inkey %k -recip %c" /mutt-1.5.19/contrib/smime.rc:78:# Verify a signature of type multipart/signed /mutt-1.5.19/contrib/smime.rc:79:set smime_verify_command="openssl smime -verify -inform DER -in %s %C -content %f" /mutt-1.5.19/contrib/smime.rc:81:# Verify a signature of type application/x-pkcs7-mime /mutt-1.5.19/contrib/smime.rc:83:openssl smime -verify -inform DER -in %s %C || \ /mutt-1.5.19/contrib/smime.rc:84:openssl smime -verify -inform DER -in %s -noverify 2>/dev/null" /mutt-1.5.19/contrib/smime.rc:92:# set smime_sign_command="openssl smime -sign -signer %c -inkey %k -passin stdin -in %f -outform DER" /mutt-1.5.19/contrib/smime.rc:94:# In order to verify the signature only and skip checking the certificate chain: /mutt-1.5.19/contrib/smime.rc:96:# set smime_verify_command="openssl smime -verify -inform DER -in %s -content %f -noverify" /mutt-1.5.19/contrib/smime.rc:97:# set smime_verify_opaque_command="openssl smime -verify -inform DER -in %s -noverify" /mutt-1.5.19/contrib/pgp5.rc:11:# verify a pgp/mime signature /mutt-1.5.19/contrib/pgp5.rc:14:# string that the verify command outputs if the signature is good /mutt-1.5.19/contrib/pgp5.rc:15:set pgp_good_sign = "Good signature" /mutt-1.5.19/contrib/pgp5.rc:17:# decrypt a pgp/mime attachment /mutt-1.5.19/contrib/pgp5.rc:18:set pgp_decrypt_command="PGPPASSFD=0; export PGPPASSFD; cat - %f | pgpv +language=mutt +verbose=0 +batchmode --OutputInformationFD=2 -f" /mutt-1.5.19/contrib/pgp5.rc:24:set pgp_encrypt_only_command="pgpewrap pgpe +language=mutt +verbose=0 +batchmode +nobatchinvalidkeys=off -aft -- -r %r < %f" /mutt-1.5.19/contrib/pgp5.rc:27:set pgp_encrypt_sign_command="PGPPASSFD=0; export PGPPASSFD; cat - %f | pgpewrap pgpe +language=mutt +verbose=0 +batchmode +nobatchinvalidkeys=off -afts %?a? -u %a? -- -r %r" /mutt-1.5.19/init.h:435: ** S/MIME and PGP will be used instead of the classic code. Note that /mutt-1.5.19/init.h:443: ** (see http://www.g10code.de/docs/pka-intro.de.pdf) during signature /mutt-1.5.19/init.h:458: ** S/MIME encryption/signing for messages. See also $$crypt_autoencrypt, /mutt-1.5.19/init.h:897: ** side of an IMAP ``AUTH=xxx'' capability string, eg ``digest-md5'', ``gssapi'' /mutt-1.5.19/init.h:898: ** or ``cram-md5''. This option is case-insensitive. If it's /mutt-1.5.19/init.h:904: ** set imap_authenticators="gssapi:cram-md5:login" /mutt-1.5.19/init.h:1510: ** then OpenSSL is used instead to create S/MIME messages and settings can /mutt-1.5.19/init.h:1519: ** encrypt outgoing messages. This is probably only useful in /mutt-1.5.19/init.h:1523: ** then OpenSSL is used instead to create S/MIME messages and /mutt-1.5.19/init.h:1539: ** If \fIset\fP, automatically PGP or OpenSSL encrypt replies to messages which are /mutt-1.5.19/init.h:1547: ** If \fIset\fP, automatically PGP or OpenSSL sign replies to messages which are /mutt-1.5.19/init.h:1558: ** If \fIset\fP, automatically PGP or OpenSSL sign replies to messages /mutt-1.5.19/init.h:1570: ** PGP or S/MIME output, so spoofing such lines is more difficult. /mutt-1.5.19/init.h:1585: ** If \fI``yes''\fP, always attempt to verify PGP or S/MIME signatures. /mutt-1.5.19/init.h:1586: ** If \fI``ask-*''\fP, ask whether or not to verify the signature. /mutt-1.5.19/init.h:1594: ** operations. To override and to use OpenSSL instead this must be \fIset\fP. /mutt-1.5.19/init.h:1596: ** select the same application that was used to sign/encrypt the original /mutt-1.5.19/init.h:1598: ** (S/MIME only) /mutt-1.5.19/init.h:1606: ** (S/MIME only) /mutt-1.5.19/init.h:1608: { "smime_decrypt_use_default_key", DT_BOOL, R_NONE, OPTSDEFAULTDECRYPTKEY, 1 }, /mutt-1.5.19/init.h:1614: ** (S/MIME only) /mutt-1.5.19/init.h:1639: ** If you assign a text to this variable, then a PGP signature is only /mutt-1.5.19/init.h:1776: ** If \fIset\fP, mutt will automatically attempt to decrypt traditional PGP /mutt-1.5.19/init.h:1797: ** .dt %s .dd Expands to the name of a file containing the signature part /mutt-1.5.19/init.h:1826: { "pgp_decrypt_command", DT_STR, R_NONE, UL &PgpDecryptCommand, 0}, /mutt-1.5.19/init.h:1829: ** This command is used to decrypt a PGP encrypted message. /mutt-1.5.19/init.h:1849: ** This command is used to create the detached PGP signature for a /mutt-1.5.19/init.h:1856: { "pgp_encrypt_sign_command", DT_STR, R_NONE, UL &PgpEncryptSignCommand, 0}, /mutt-1.5.19/init.h:1859: ** This command is used to both sign and encrypt a body part. /mutt-1.5.19/init.h:1865: { "pgp_encrypt_only_command", DT_STR, R_NONE, UL &PgpEncryptOnlyCommand, 0}, /mutt-1.5.19/init.h:1868: ** This command is used to encrypt a body part without signing it. /mutt-1.5.19/init.h:1936: { "forward_decrypt", DT_BOOL, R_NONE, OPTFORWDECRYPT, 1 }, /mutt-1.5.19/init.h:1945: { "forw_decrypt", DT_SYN, R_NONE, UL "forward_decrypt", 0 }, /mutt-1.5.19/init.h:1953: ** (S/MIME only) /mutt-1.5.19/init.h:1955: { "smime_encrypt_with", DT_STR, R_NONE, UL &SmimeCryptAlg, 0 }, /mutt-1.5.19/init.h:1959: ** Valid choices are ``des'', ``des3'', ``rc2-40'', ``rc2-64'', ``rc2-128''. /mutt-1.5.19/init.h:1960: ** If \fIunset\fP, ``3des'' (TripleDES) is used. /mutt-1.5.19/init.h:1961: ** (S/MIME only) /mutt-1.5.19/init.h:1966: ** Since for S/MIME there is no pubring/secring as with PGP, mutt has to handle /mutt-1.5.19/init.h:1969: ** named as the hash-value retrieved from OpenSSL. There is an index file /mutt-1.5.19/init.h:1972: ** (S/MIME only) /mutt-1.5.19/init.h:1978: ** contains trusted certificates for use with OpenSSL. /mutt-1.5.19/init.h:1979: ** (S/MIME only) /mutt-1.5.19/init.h:1984: ** Since for S/MIME there is no pubring/secring as with PGP, mutt has to handle /mutt-1.5.19/init.h:1988: ** OpenSSL. There is an index file which contains mailbox-address /mutt-1.5.19/init.h:1991: ** (S/MIME only) /mutt-1.5.19/init.h:1993: { "smime_decrypt_command", DT_STR, R_NONE, UL &SmimeDecryptCommand, 0}, /mutt-1.5.19/init.h:1996: ** This format string specifies a command which is used to decrypt /mutt-1.5.19/init.h:1999: ** The OpenSSL command formats have their own set of \fCprintf(3)\fP-like sequences /mutt-1.5.19/init.h:2003: ** .dt %s .dd Expands to the name of a file containing the signature part /mutt-1.5.19/init.h:2016: ** (S/MIME only) /mutt-1.5.19/init.h:2021: ** This command is used to verify S/MIME signatures of type \fCmultipart/signed\fP. /mutt-1.5.19/init.h:2023: ** This is a format string, see the $$smime_decrypt_command command for /mutt-1.5.19/init.h:2025: ** (S/MIME only) /mutt-1.5.19/init.h:2030: ** This command is used to verify S/MIME signatures of type /mutt-1.5.19/init.h:2033: ** This is a format string, see the $$smime_decrypt_command command for /mutt-1.5.19/init.h:2035: ** (S/MIME only) /mutt-1.5.19/init.h:2040: ** This command is used to created S/MIME signatures of type /mutt-1.5.19/init.h:2043: ** This is a format string, see the $$smime_decrypt_command command for /mutt-1.5.19/init.h:2045: ** (S/MIME only) /mutt-1.5.19/init.h:2050: ** This command is used to created S/MIME signatures of type /mutt-1.5.19/init.h:2051: ** \fCapplication/x-pkcs7-signature\fP, which can only be handled by mail /mutt-1.5.19/init.h:2052: ** clients supporting the S/MIME extension. /mutt-1.5.19/init.h:2054: ** This is a format string, see the $$smime_decrypt_command command for /mutt-1.5.19/init.h:2056: ** (S/MIME only) /mutt-1.5.19/init.h:2058: { "smime_encrypt_command", DT_STR, R_NONE, UL &SmimeEncryptCommand, 0}, /mutt-1.5.19/init.h:2061: ** This command is used to create encrypted S/MIME messages. /mutt-1.5.19/init.h:2063: ** This is a format string, see the $$smime_decrypt_command command for /mutt-1.5.19/init.h:2065: ** (S/MIME only) /mutt-1.5.19/init.h:2070: ** This command is used to extract PKCS7 structures of S/MIME signatures, /mutt-1.5.19/init.h:2073: ** This is a format string, see the $$smime_decrypt_command command for /mutt-1.5.19/init.h:2075: ** (S/MIME only) /mutt-1.5.19/init.h:2082: ** This is a format string, see the $$smime_decrypt_command command for /mutt-1.5.19/init.h:2084: ** (S/MIME only) /mutt-1.5.19/init.h:2089: ** This command is used to extract only the signers X509 certificate from a S/MIME /mutt-1.5.19/init.h:2090: ** signature, so that the certificate's owner may get compared to the /mutt-1.5.19/init.h:2093: ** This is a format string, see the $$smime_decrypt_command command for /mutt-1.5.19/init.h:2095: ** (S/MIME only) /mutt-1.5.19/init.h:2102: ** This is a format string, see the $$smime_decrypt_command command for /mutt-1.5.19/init.h:2104: ** (S/MIME only) /mutt-1.5.19/init.h:2113: ** This is a format string, see the $$smime_decrypt_command command for /mutt-1.5.19/init.h:2115: ** (S/MIME only) /mutt-1.5.19/init.h:2122: ** keyid (the hash-value that OpenSSL generates) to work properly /mutt-1.5.19/init.h:2123: ** (S/MIME only) /mutt-1.5.19/init.h:2125:#if defined(USE_SSL) /mutt-1.5.19/init.h:2126: { "ssl_client_cert", DT_PATH, R_NONE, UL &SslClientCert, 0 }, /mutt-1.5.19/init.h:2132: { "ssl_force_tls", DT_BOOL, R_NONE, OPTSSLFORCETLS, 0 }, /mutt-1.5.19/init.h:2137: ** negotiate TLS even if the server does not advertise the capability, /mutt-1.5.19/init.h:2139: ** option supersedes $$ssl_starttls. /mutt-1.5.19/init.h:2141: { "ssl_starttls", DT_QUAD, R_NONE, OPT_SSLSTARTTLS, M_YES }, /mutt-1.5.19/init.h:2166:# ifdef USE_SSL_OPENSSL /mutt-1.5.19/init.h:2167: { "ssl_usesystemcerts", DT_BOOL, R_NONE, OPTSSLSYSTEMCERTS, 1 }, /mutt-1.5.19/init.h:2177: ** The file which includes random data that is used to initialize SSL /mutt-1.5.19/init.h:2180: { "ssl_use_sslv2", DT_BOOL, R_NONE, OPTSSLV2, 1 }, /mutt-1.5.19/init.h:2184: ** SSL authentication process. /mutt-1.5.19/init.h:2186:# endif /* defined USE_SSL_OPENSSL */ /mutt-1.5.19/init.h:2187: { "ssl_use_sslv3", DT_BOOL, R_NONE, OPTSSLV3, 1 }, /mutt-1.5.19/init.h:2191: ** SSL authentication process. /mutt-1.5.19/init.h:2193: { "ssl_use_tlsv1", DT_BOOL, R_NONE, OPTTLSV1, 1 }, /mutt-1.5.19/init.h:2197: ** SSL authentication process. /mutt-1.5.19/init.h:2199:# ifdef USE_SSL_GNUTLS /mutt-1.5.19/init.h:2200: { "ssl_min_dh_prime_bits", DT_NUM, R_NONE, UL &SslDHPrimeBits, 0 }, /mutt-1.5.19/init.h:2204: ** for use in any Diffie-Hellman key exchange. A value of 0 will use /mutt-1.5.19/init.h:2207: { "ssl_ca_certificates_file", DT_PATH, R_NONE, UL &SslCACertFile, 0 }, /mutt-1.5.19/init.h:2216: ** set ssl_ca_certificates_file=/etc/ssl/certs/ca-certificates.crt /mutt-1.5.19/init.h:2219:# endif /* USE_SSL_GNUTLS */ /mutt-1.5.19/init.h:2220:#endif /* defined(USE_SSL) */ /mutt-1.5.19/init.h:2252: ** SASL mechanism, eg ``digest-md5'', ``gssapi'' or ``cram-md5''. /mutt-1.5.19/init.h:2259: ** set pop_authenticators="digest-md5:apop:user" /mutt-1.5.19/init.h:2732: ** $$signature. It is \fBstrongly\fP recommended that you not \fIunset\fP /mutt-1.5.19/init.h:2733: ** this variable unless your signature contains just your name. The /mutt-1.5.19/init.h:2735: ** detect your signature. For example, Mutt has the ability to highlight /mutt-1.5.19/init.h:2736: ** the signature in a different color in the builtin pager. /mutt-1.5.19/init.h:2741: ** If \fIset\fP, the signature will be included before any quoted or forwarded /mutt-1.5.19/init.h:2746: { "signature", DT_PATH, R_NONE, UL &Signature, UL "~/.signature" }, /mutt-1.5.19/init.h:2749: ** Specifies the filename of your signature, which is appended to all /mutt-1.5.19/init.h:2798: ** ``digest-md5'', ``gssapi'' or ``cram-md5''. /mutt-1.5.19/init.h:2805: ** set smtp_authenticators="digest-md5:cram-md5" /mutt-1.5.19/mutt_curses.h:113: MT_COLOR_SIGNATURE, /mutt-1.5.19/account.c:106: if (account->flags & M_ACCT_SSL) /mutt-1.5.19/account.c:116: if (account->flags & M_ACCT_SSL) /mutt-1.5.19/account.c:126: if (account->flags & M_ACCT_SSL) /mutt-1.5.19/OPS.CRYPT:1:OP_DECRYPT_SAVE "make decrypted copy and delete" /mutt-1.5.19/OPS.CRYPT:2:OP_DECRYPT_COPY "make decrypted copy" /mutt-1.5.19/account.h:40:#define M_ACCT_SSL (1<<4) /mutt-1.5.19/smime.c:111: if (mutt_get_password (_("Enter S/MIME passphrase:"), SmimePass, sizeof (SmimePass)) == 0) /mutt-1.5.19/smime.c:124: * The OpenSSL interface /mutt-1.5.19/smime.c:194: { /* detached signature */ /mutt-1.5.19/smime.c:392: snprintf(title, sizeof(title), _("S/MIME certificates matching \"%s\"."), /mutt-1.5.19/smime.c:504: certfile is a hash value generated by openssl. /mutt-1.5.19/smime.c:505: Note that this was done according to the OpenSSL /mutt-1.5.19/smime.c:850: mutt_message (_("Error: unable to create OpenSSL subprocess!")); /mutt-1.5.19/smime.c:878: mutt_any_key_to_continue (_("Error: unable to create OpenSSL subprocess!")); /mutt-1.5.19/smime.c:935: /* Step 1: Convert the signature to a PKCS#7 structure, as we can't /mutt-1.5.19/smime.c:943: mutt_any_key_to_continue (_("Error: unable to create OpenSSL subprocess!")); /mutt-1.5.19/smime.c:980: /* Step 2: Extract the certificates from a PKCS#7 structure. /mutt-1.5.19/smime.c:987: mutt_any_key_to_continue (_("Error: unable to create OpenSSL subprocess!")); /mutt-1.5.19/smime.c:1052: mutt_any_key_to_continue (_("Error: unable to create OpenSSL subprocess!")); /mutt-1.5.19/smime.c:1127: mutt_message (_("Error: unable to create OpenSSL subprocess!")); /mutt-1.5.19/smime.c:1168: if(h->security & ENCRYPT) /mutt-1.5.19/smime.c:1223: * Creating S/MIME - bodies. /mutt-1.5.19/smime.c:1230:pid_t smime_invoke_encrypt (FILE **smimein, FILE **smimeout, FILE **smimeerr, /mutt-1.5.19/smime.c:1314: smime_invoke_encrypt (&smimein, NULL, NULL, -1, /mutt-1.5.19/smime.c:1350: /* fatal error while trying to encrypt message */ /mutt-1.5.19/smime.c:1351: if (!err) mutt_any_key_to_continue _("No output from OpenSSL.."); /mutt-1.5.19/smime.c:1361: t->encoding = ENCBASE64; /* The output of OpenSSL SHOULD be binary */ /mutt-1.5.19/smime.c:1396: intermediates = SmimeDefaultKey; /* so openssl won't complain in any case */ /mutt-1.5.19/smime.c:1438: mutt_perror _("Can't open OpenSSL subprocess!"); /mutt-1.5.19/smime.c:1451: /* check for errors from OpenSSL */ /mutt-1.5.19/smime.c:1476: mutt_any_key_to_continue _("No output from OpenSSL..."); /mutt-1.5.19/smime.c:1490: mutt_set_parameter ("micalg", "sha1", &t->parameter); /mutt-1.5.19/smime.c:1491: mutt_set_parameter ("protocol", "application/x-pkcs7-signature", /mutt-1.5.19/smime.c:1500: t->subtype = safe_strdup ("x-pkcs7-signature"); /mutt-1.5.19/smime.c:1518: * Handling S/MIME - bodies. /mutt-1.5.19/smime.c:1538:pid_t smime_invoke_decrypt (FILE **smimein, FILE **smimeout, FILE **smimeerr, /mutt-1.5.19/smime.c:1608: crypt_current_time (s, "OpenSSL"); /mutt-1.5.19/smime.c:1641: state_attach_puts (_("[-- End of OpenSSL output --]\n\n"), s); /mutt-1.5.19/smime.c:1718: if ((type & ENCRYPT) && /mutt-1.5.19/smime.c:1719: (thepid = smime_invoke_decrypt (&smimein, NULL, NULL, -1, /mutt-1.5.19/smime.c:1725: state_attach_puts (_("[-- Error: unable to create OpenSSL subprocess! --]\n"), s); /mutt-1.5.19/smime.c:1736: state_attach_puts (_("[-- Error: unable to create OpenSSL subprocess! --]\n"), s); /mutt-1.5.19/smime.c:1741: if (type & ENCRYPT) /mutt-1.5.19/smime.c:1764: crypt_current_time (s, "OpenSSL"); /mutt-1.5.19/smime.c:1766: state_attach_puts (_("[-- End of OpenSSL output --]\n\n"), s); /mutt-1.5.19/smime.c:1769: if (type & ENCRYPT) /mutt-1.5.19/smime.c:1770: state_attach_puts (_("[-- The following data is S/MIME" /mutt-1.5.19/smime.c:1773: state_attach_puts (_("[-- The following data is S/MIME signed --]\n"), s); /mutt-1.5.19/smime.c:1836: if (type & ENCRYPT) /mutt-1.5.19/smime.c:1837: state_attach_puts (_("\n[-- End of S/MIME encrypted data. --]\n"), s); /mutt-1.5.19/smime.c:1839: state_attach_puts (_("\n[-- End of S/MIME signed data. --]\n"), s); /mutt-1.5.19/smime.c:1869:int smime_decrypt_mime (FILE *fpin, FILE **fpout, BODY *b, BODY **cur) /mutt-1.5.19/smime.c:1950: switch (mutt_multi_choice (_("S/MIME (e)ncrypt, (s)ign, encrypt (w)ith, sign (a)s, (b)oth, or (c)lear? "), /mutt-1.5.19/smime.c:1954: msg->security |= ENCRYPT; /mutt-1.5.19/smime.c:1958: case 3: /* encrypt (w)ith */ /mutt-1.5.19/smime.c:1962: msg->security |= ENCRYPT; /mutt-1.5.19/smime.c:1967: " 1: DES, 2: RC2, 3: AES," /mutt-1.5.19/smime.c:1972: switch (choice = mutt_multi_choice (_("1: DES, 2: Triple-DES "), /mutt-1.5.19/smime.c:1976: mutt_str_replace (&SmimeCryptAlg, "des"); /mutt-1.5.19/smime.c:1979: mutt_str_replace (&SmimeCryptAlg, "des3"); /mutt-1.5.19/smime.c:1985: switch (choice = mutt_multi_choice (_("1: RC2-40, 2: RC2-64, 3: RC2-128 "), /mutt-1.5.19/smime.c:1989: mutt_str_replace (&SmimeCryptAlg, "rc2-40"); /mutt-1.5.19/smime.c:1992: mutt_str_replace (&SmimeCryptAlg, "rc2-64"); /mutt-1.5.19/smime.c:1995: mutt_str_replace (&SmimeCryptAlg, "rc2-128"); /mutt-1.5.19/smime.c:2040: msg->security &= ~ENCRYPT; /mutt-1.5.19/smime.c:2063: msg->security |= (ENCRYPT | SIGN); /mutt-1.5.19/crypt-mod-smime-gpgme.c:48:static int crypt_mod_smime_decrypt_mime (FILE *a, FILE **b, BODY *c, BODY **d) /mutt-1.5.19/crypt-mod-smime-gpgme.c:50: return smime_gpgme_decrypt_mime (a, b, c, d); /mutt-1.5.19/crypt-mod-smime-gpgme.c:94: crypt_mod_smime_decrypt_mime, /mutt-1.5.19/crypt-mod-smime-gpgme.c:103: NULL, /* pgp_encrypt_message */ /mutt-1.5.19/curs_main.c:1384: case OP_DECRYPT_COPY: /mutt-1.5.19/curs_main.c:1385: case OP_DECRYPT_SAVE: /mutt-1.5.19/curs_main.c:1396: (op == OP_DECRYPT_SAVE) || /mutt-1.5.19/curs_main.c:1399: (op == OP_DECRYPT_SAVE) || (op == OP_DECRYPT_COPY) || /mutt-1.5.19/curs_main.c:1402: (op == OP_SAVE || op == OP_DECODE_SAVE || op == OP_DECRYPT_SAVE) /mutt-1.5.19/NEWS:25:- STARTTLS support. If $ssl_starttls is set (the default), mutt /mutt-1.5.19/NEWS:112: MIC algorithm was used for a particular signature. /mutt-1.5.19/NEWS:114:- If $pgp_good_sign is set, then a PGP signature is only considered /mutt-1.5.19/NEWS:118: produces when it encounters a good signature. /mutt-1.5.19/NEWS:129:- $sig_on_top. Include the signature before any quoted or forwarded /mutt-1.5.19/pgplib.c:43: return "RSA"; /mutt-1.5.19/pgplib.c:45: return "RSA"; /mutt-1.5.19/pgplib.c:47: return "RSA"; /mutt-1.5.19/pgplib.c:51: return "DSA"; /mutt-1.5.19/pgplib.c:70: return "MD5"; /mutt-1.5.19/pgplib.c:72: return "SHA1"; /mutt-1.5.19/pgplib.c:115: * 2 = encrypt only /mutt-1.5.19/configure:731:USE_SSL_TRUE /mutt-1.5.19/configure:732:USE_SSL_FALSE /mutt-1.5.19/configure:735:MUTT_MD5 /mutt-1.5.19/configure:14346:# Check whether --with-ssl was given. /mutt-1.5.19/configure:14347:if test "${with_ssl+set}" = set; then /mutt-1.5.19/configure:14352:echo "$as_me: WARNING: SSL support is only useful with POP, IMAP or SMTP support" >&2;} /mutt-1.5.19/configure:14493:{ echo "$as_me:$LINENO: checking for SSL_new in -lssl" >&5 /mutt-1.5.19/configure:14494:echo $ECHO_N "checking for SSL_new in -lssl... $ECHO_C" >&6; } /mutt-1.5.19/configure:14495:if test "${ac_cv_lib_ssl_SSL_new+set}" = set; then /mutt-1.5.19/configure:14513:char SSL_new (); /mutt-1.5.19/configure:14517:return SSL_new (); /mutt-1.5.19/configure:14545: ac_cv_lib_ssl_SSL_new=no /mutt-1.5.19/configure:14552:{ echo "$as_me:$LINENO: result: $ac_cv_lib_ssl_SSL_new" >&5 /mutt-1.5.19/configure:14553:echo "${ECHO_T}$ac_cv_lib_ssl_SSL_new" >&6; } /mutt-1.5.19/configure:14554:if test $ac_cv_lib_ssl_SSL_new = yes; then /mutt-1.5.19/configure:14563:echo "$as_me: error: Unable to find SSL library" >&2;} /mutt-1.5.19/configure:14667:#define USE_SSL 1 /mutt-1.5.19/configure:14672:#define USE_SSL_OPENSSL 1 /mutt-1.5.19/configure:14693:if test "$gnutls_prefix" != "no" && test x"$need_ssl" != xyes /mutt-1.5.19/configure:14698:echo "$as_me: WARNING: SSL support is only useful with POP, IMAP or SMTP support" >&2;} /mutt-1.5.19/configure:14873:for ac_header in gnutls/openssl.h /mutt-1.5.19/configure:15017:#define USE_SSL 1 /mutt-1.5.19/configure:15022:#define USE_SSL_GNUTLS 1 /mutt-1.5.19/configure:15124: if test x$need_ssl = xyes; then /mutt-1.5.19/configure:16177:if test "$need_md5" = "yes" /mutt-1.5.19/configure:20568:if test -z "${USE_SSL_TRUE}" && test -z "${USE_SSL_FALSE}"; then /mutt-1.5.19/configure:20571:echo "$as_me: error: conditional \"USE_SSL\" was never defined. /mutt-1.5.19/configure:21281:USE_SSL_TRUE!$USE_SSL_TRUE$ac_delim /mutt-1.5.19/configure:21282:USE_SSL_FALSE!$USE_SSL_FALSE$ac_delim /mutt-1.5.19/configure:21285:MUTT_MD5!$MUTT_MD5$ac_delim /mutt-1.5.19/pattern.c:70: { 'G', M_CRYPT_ENCRYPT, 0, NULL }, /mutt-1.5.19/pattern.c:179: if (WithCrypto && (h->security & ENCRYPT) /mutt-1.5.19/pattern.c:1182: case M_CRYPT_ENCRYPT: /mutt-1.5.19/pattern.c:1185: return (pat->not ^ ((h->security & ENCRYPT) ? 1 : 0)); /mutt-1.5.19/pgpinvoke.c:216:pid_t pgp_invoke_decrypt (FILE **pgpin, FILE **pgpout, FILE **pgperr, /mutt-1.5.19/pgpinvoke.c:233:pid_t pgp_invoke_encrypt (FILE **pgpin, FILE **pgpout, FILE **pgperr, /mutt-1.5.19/pgpinvoke.c:251: if (flags & ENCRYPT) /mutt-1.5.19/UPDATING:9: + support for SSL certificate chains /mutt-1.5.19/UPDATING:15: + $ssl_client_cert available with gnutls as well as openssl /mutt-1.5.19/UPDATING:47: + $crypt_use_pka (use GPGME PKA signature verification) /mutt-1.5.19/UPDATING:96: ! $imap_force_ssl has been replaced without synonym by $ssl_force_tls /mutt-1.5.19/UPDATING:120: + SSL support via GNUTLS /mutt-1.5.19/UPDATING:123: + $ssl_client_cert /mutt-1.5.19/UPDATING:190: + S/MIME support Binární soubor /home/mitr/hash/grep-many/source/mutt-1.5.19/po/es.gmo odpovídá Binární soubor /home/mitr/hash/grep-many/source/mutt-1.5.19/po/da.gmo odpovídá /mutt-1.5.19/po/mutt.pot:48:#: mutt_ssl.c:899 mutt_ssl_gnutls.c:805 pager.c:1578 pgpkey.c:522 /mutt-1.5.19/po/mutt.pot:337:#. find out whether or not the verify signature /mutt-1.5.19/po/mutt.pot:339:msgid "Verify PGP signature?" /mutt-1.5.19/po/mutt.pot:355:msgid "S/MIME signature successfully verified." /mutt-1.5.19/po/mutt.pot:359:msgid "S/MIME certificate owner does not match sender." /mutt-1.5.19/po/mutt.pot:367:msgid "S/MIME signature could NOT be verified." /mutt-1.5.19/po/mutt.pot:371:msgid "PGP signature successfully verified." /mutt-1.5.19/po/mutt.pot:375:msgid "PGP signature could NOT be verified." /mutt-1.5.19/po/mutt.pot:493:msgid "Decrypt-save%s to mailbox" /mutt-1.5.19/po/mutt.pot:498:msgid "Decrypt-copy%s to mailbox" /mutt-1.5.19/po/mutt.pot:564:msgid "Sign, Encrypt" /mutt-1.5.19/po/mutt.pot:568:msgid "Encrypt" /mutt-1.5.19/po/mutt.pot:596:msgid "Encrypt with: " /mutt-1.5.19/po/mutt.pot:721:msgid "S/MIME already selected. Clear & continue ? " /mutt-1.5.19/po/mutt.pot:780:msgid "error setting PKA signature notation: %s\n" /mutt-1.5.19/po/mutt.pot:798:msgid "Warning: The key used to create the signature expired at: " /mutt-1.5.19/po/mutt.pot:806:msgid "Warning: The signature expired at: " /mutt-1.5.19/po/mutt.pot:870:#. signature, so we display what a PGP user expects: The name, /mutt-1.5.19/po/mutt.pot:874:msgid "Good signature from:" /mutt-1.5.19/po/mutt.pot:878:msgid "*BAD* signature from:" /mutt-1.5.19/po/mutt.pot:882:msgid "Problem signature from:" /mutt-1.5.19/po/mutt.pot:893:msgid "[-- Begin signature information --]\n" /mutt-1.5.19/po/mutt.pot:903:msgid "*** Begin Notation (signature by: %s) ***\n" /mutt-1.5.19/po/mutt.pot:912:"[-- End signature information --]\n" /mutt-1.5.19/po/mutt.pot:1003:"[-- The following data is S/MIME signed --]\n" /mutt-1.5.19/po/mutt.pot:1009:"[-- The following data is S/MIME encrypted --]\n" /mutt-1.5.19/po/mutt.pot:1014:msgid "[-- End of S/MIME signed data --]\n" /mutt-1.5.19/po/mutt.pot:1018:msgid "[-- End of S/MIME encrypted data --]\n" /mutt-1.5.19/po/mutt.pot:1151:#: crypt-gpgme.c:3824 mutt_ssl.c:897 mutt_ssl_gnutls.c:803 pgpkey.c:515 /mutt-1.5.19/po/mutt.pot:1167:msgid "PGP and S/MIME keys matching" /mutt-1.5.19/po/mutt.pot:1175:msgid "S/MIME keys matching" /mutt-1.5.19/po/mutt.pot:1239:msgid "S/MIME (e)ncrypt, (s)ign, sign (a)s, (b)oth, (p)gp or (c)lear?" /mutt-1.5.19/po/mutt.pot:1299:msgid "S/MIME messages with no hints on content are unsupported." /mutt-1.5.19/po/mutt.pot:1307:msgid "Trying to extract S/MIME certificates...\n" /mutt-1.5.19/po/mutt.pot:1354:msgid "Invoking S/MIME..." /mutt-1.5.19/po/mutt.pot:1370:#: curs_lib.c:495 mutt_socket.c:577 mutt_ssl.c:337 /mutt-1.5.19/po/mutt.pot:1927:msgid "Authenticating (CRAM-MD5)..." /mutt-1.5.19/po/mutt.pot:1931:msgid "CRAM-MD5 authentication failed." /mutt-1.5.19/po/mutt.pot:2022:msgid "Secure connection with TLS?" /mutt-1.5.19/po/mutt.pot:2026:msgid "Could not negotiate TLS connection" /mutt-1.5.19/po/mutt.pot:2721:msgid "SSL is unavailable." /mutt-1.5.19/po/mutt.pot:2758:#: mutt_ssl.c:183 /mutt-1.5.19/po/mutt.pot:2762:#: mutt_ssl.c:207 /mutt-1.5.19/po/mutt.pot:2767:#: mutt_ssl.c:215 /mutt-1.5.19/po/mutt.pot:2772:#: mutt_ssl.c:234 /mutt-1.5.19/po/mutt.pot:2773:msgid "SSL disabled due the lack of entropy" /mutt-1.5.19/po/mutt.pot:2776:#: mutt_ssl.c:331 /mutt-1.5.19/po/mutt.pot:2780:#: mutt_ssl.c:340 /mutt-1.5.19/po/mutt.pot:2782:msgid "SSL failed: %s" /mutt-1.5.19/po/mutt.pot:2785:#: mutt_ssl.c:349 mutt_ssl_gnutls.c:880 mutt_ssl_gnutls.c:889 /mutt-1.5.19/po/mutt.pot:2786:#: mutt_ssl_gnutls.c:912 /mutt-1.5.19/po/mutt.pot:2790:#: mutt_ssl.c:357 /mutt-1.5.19/po/mutt.pot:2792:msgid "SSL connection using %s (%s)" /mutt-1.5.19/po/mutt.pot:2795:#: mutt_ssl.c:401 /mutt-1.5.19/po/mutt.pot:2799:#: mutt_ssl.c:426 mutt_ssl_gnutls.c:457 /mutt-1.5.19/po/mutt.pot:2804:#: mutt_ssl.c:444 mutt_ssl_gnutls.c:480 /mutt-1.5.19/po/mutt.pot:2808:#: mutt_ssl.c:570 /mutt-1.5.19/po/mutt.pot:2812:#: mutt_ssl.c:577 /mutt-1.5.19/po/mutt.pot:2816:#: mutt_ssl.c:696 /mutt-1.5.19/po/mutt.pot:2820:#: mutt_ssl.c:708 /mutt-1.5.19/po/mutt.pot:2824:#: mutt_ssl.c:717 /mutt-1.5.19/po/mutt.pot:2829:#: mutt_ssl.c:754 /mutt-1.5.19/po/mutt.pot:2834:#: mutt_ssl.c:845 mutt_ssl_gnutls.c:664 /mutt-1.5.19/po/mutt.pot:2838:#: mutt_ssl.c:858 mutt_ssl_gnutls.c:703 /mutt-1.5.19/po/mutt.pot:2842:#: mutt_ssl.c:869 mutt_ssl_gnutls.c:742 /mutt-1.5.19/po/mutt.pot:2847:#: mutt_ssl.c:870 mutt_ssl_gnutls.c:745 /mutt-1.5.19/po/mutt.pot:2852:#: mutt_ssl.c:872 mutt_ssl_gnutls.c:749 /mutt-1.5.19/po/mutt.pot:2857:#: mutt_ssl.c:878 /mutt-1.5.19/po/mutt.pot:2862:#: mutt_ssl.c:881 mutt_ssl_gnutls.c:786 /mutt-1.5.19/po/mutt.pot:2864:msgid "SSL Certificate check (certificate %d of %d in chain)" /mutt-1.5.19/po/mutt.pot:2867:#: mutt_ssl.c:887 mutt_ssl_gnutls.c:793 /mutt-1.5.19/po/mutt.pot:2871:#: mutt_ssl.c:888 mutt_ssl_gnutls.c:794 /mutt-1.5.19/po/mutt.pot:2875:#: mutt_ssl.c:892 mutt_ssl_gnutls.c:798 /mutt-1.5.19/po/mutt.pot:2879:#: mutt_ssl.c:893 mutt_ssl_gnutls.c:799 /mutt-1.5.19/po/mutt.pot:2883:#: mutt_ssl.c:924 mutt_ssl_gnutls.c:848 /mutt-1.5.19/po/mutt.pot:2887:#: mutt_ssl.c:929 mutt_ssl_gnutls.c:853 /mutt-1.5.19/po/mutt.pot:2891:#: mutt_ssl_gnutls.c:96 mutt_ssl_gnutls.c:123 /mutt-1.5.19/po/mutt.pot:2892:msgid "Error: no TLS socket open" /mutt-1.5.19/po/mutt.pot:2895:#: mutt_ssl_gnutls.c:276 /mutt-1.5.19/po/mutt.pot:2896:msgid "All available protocols for TLS/SSL connection disabled" /mutt-1.5.19/po/mutt.pot:2899:#: mutt_ssl_gnutls.c:340 /mutt-1.5.19/po/mutt.pot:2901:msgid "SSL/TLS connection using %s (%s/%s/%s)" /mutt-1.5.19/po/mutt.pot:2904:#: mutt_ssl_gnutls.c:567 /mutt-1.5.19/po/mutt.pot:2908:#: mutt_ssl_gnutls.c:574 /mutt-1.5.19/po/mutt.pot:2912:#: mutt_ssl_gnutls.c:754 /mutt-1.5.19/po/mutt.pot:2914:msgid "SHA1 Fingerprint: %s" /mutt-1.5.19/po/mutt.pot:2917:#: mutt_ssl_gnutls.c:757 /mutt-1.5.19/po/mutt.pot:2919:msgid "MD5 Fingerprint: %s" /mutt-1.5.19/po/mutt.pot:2922:#: mutt_ssl_gnutls.c:762 /mutt-1.5.19/po/mutt.pot:2926:#: mutt_ssl_gnutls.c:767 /mutt-1.5.19/po/mutt.pot:2930:#: mutt_ssl_gnutls.c:772 /mutt-1.5.19/po/mutt.pot:2934:#: mutt_ssl_gnutls.c:777 /mutt-1.5.19/po/mutt.pot:2938:#: mutt_ssl_gnutls.c:782 /mutt-1.5.19/po/mutt.pot:2942:#: mutt_ssl_gnutls.c:895 /mutt-1.5.19/po/mutt.pot:2947:#: mutt_ssl_gnutls.c:904 /mutt-1.5.19/po/mutt.pot:3267:msgid "Could not decrypt PGP message" /mutt-1.5.19/po/mutt.pot:3465:msgid "Illegal S/MIME header" /mutt-1.5.19/po/mutt.pot:3558:msgid "Can't decrypt encrypted message!" /mutt-1.5.19/po/mutt.pot:3867:msgid "Enter S/MIME passphrase:" /mutt-1.5.19/po/mutt.pot:3904:msgid "S/MIME certificates matching \"%s\"." /mutt-1.5.19/po/mutt.pot:3933:msgid "Error: unable to create OpenSSL subprocess!" /mutt-1.5.19/po/mutt.pot:3944:#. fatal error while trying to encrypt message /mutt-1.5.19/po/mutt.pot:3946:msgid "No output from OpenSSL.." /mutt-1.5.19/po/mutt.pot:3958:msgid "Can't open OpenSSL subprocess!" /mutt-1.5.19/po/mutt.pot:3962:msgid "No output from OpenSSL..." /mutt-1.5.19/po/mutt.pot:3967:"[-- End of OpenSSL output --]\n" /mutt-1.5.19/po/mutt.pot:3972:msgid "[-- Error: unable to create OpenSSL subprocess! --]\n" /mutt-1.5.19/po/mutt.pot:3976:msgid "[-- The following data is S/MIME encrypted --]\n" /mutt-1.5.19/po/mutt.pot:3980:msgid "[-- The following data is S/MIME signed --]\n" /mutt-1.5.19/po/mutt.pot:3986:"[-- End of S/MIME encrypted data. --]\n" /mutt-1.5.19/po/mutt.pot:3992:"[-- End of S/MIME signed data. --]\n" /mutt-1.5.19/po/mutt.pot:3997:"S/MIME (e)ncrypt, (s)ign, encrypt (w)ith, sign (a)s, (b)oth, or (c)lear? " /mutt-1.5.19/po/mutt.pot:4006:msgid "Choose algorithm family: 1: DES, 2: RC2, 3: AES, or (c)lear? " /mutt-1.5.19/po/mutt.pot:4014:msgid "1: DES, 2: Triple-DES " /mutt-1.5.19/po/mutt.pot:4022:msgid "1: RC2-40, 2: RC2-64, 3: RC2-128 " /mutt-1.5.19/po/mutt.pot:4890:msgid "show S/MIME options" Binární soubor /home/mitr/hash/grep-many/source/mutt-1.5.19/po/sk.gmo odpovídá Binární soubor /home/mitr/hash/grep-many/source/mutt-1.5.19/po/nl.gmo odpovídá Binární soubor /home/mitr/hash/grep-many/source/mutt-1.5.19/po/cs.gmo odpovídá Binární soubor /home/mitr/hash/grep-many/source/mutt-1.5.19/po/it.gmo odpovídá Binární soubor /home/mitr/hash/grep-many/source/mutt-1.5.19/po/gl.gmo odpovídá Binární soubor /home/mitr/hash/grep-many/source/mutt-1.5.19/po/et.gmo odpovídá Binární soubor /home/mitr/hash/grep-many/source/mutt-1.5.19/po/fr.gmo odpovídá Binární soubor /home/mitr/hash/grep-many/source/mutt-1.5.19/po/de.gmo odpovídá Binární soubor /home/mitr/hash/grep-many/source/mutt-1.5.19/po/el.gmo odpovídá Binární soubor /home/mitr/hash/grep-many/source/mutt-1.5.19/po/tr.gmo odpovídá Binární soubor /home/mitr/hash/grep-many/source/mutt-1.5.19/po/uk.gmo odpovídá Binární soubor /home/mitr/hash/grep-many/source/mutt-1.5.19/po/zh_CN.gmo odpovídá Binární soubor /home/mitr/hash/grep-many/source/mutt-1.5.19/po/ja.gmo odpovídá Binární soubor /home/mitr/hash/grep-many/source/mutt-1.5.19/po/lt.gmo odpovídá Binární soubor /home/mitr/hash/grep-many/source/mutt-1.5.19/po/bg.gmo odpovídá Binární soubor /home/mitr/hash/grep-many/source/mutt-1.5.19/po/hu.gmo odpovídá Binární soubor /home/mitr/hash/grep-many/source/mutt-1.5.19/po/pl.gmo odpovídá Binární soubor /home/mitr/hash/grep-many/source/mutt-1.5.19/po/pt_BR.gmo odpovídá Binární soubor /home/mitr/hash/grep-many/source/mutt-1.5.19/po/ga.gmo odpovídá Binární soubor /home/mitr/hash/grep-many/source/mutt-1.5.19/po/ca.gmo odpovídá Binární soubor /home/mitr/hash/grep-many/source/mutt-1.5.19/po/eo.gmo odpovídá Binární soubor /home/mitr/hash/grep-many/source/mutt-1.5.19/po/eu.gmo odpovídá Binární soubor /home/mitr/hash/grep-many/source/mutt-1.5.19/po/id.gmo odpovídá Binární soubor /home/mitr/hash/grep-many/source/mutt-1.5.19/po/sv.gmo odpovídá Binární soubor /home/mitr/hash/grep-many/source/mutt-1.5.19/po/ru.gmo odpovídá Binární soubor /home/mitr/hash/grep-many/source/mutt-1.5.19/po/zh_TW.gmo odpovídá Binární soubor /home/mitr/hash/grep-many/source/mutt-1.5.19/po/ko.gmo odpovídá /mutt-1.5.19/po/POTFILES.in:44:mutt_ssl.c /mutt-1.5.19/po/POTFILES.in:45:mutt_ssl_gnutls.c /mutt-1.5.19/mutt_ssl_gnutls.c:25:#ifdef HAVE_GNUTLS_OPENSSL_H /mutt-1.5.19/mutt_ssl_gnutls.c:26:#include /mutt-1.5.19/mutt_ssl_gnutls.c:33:#include "mutt_ssl.h" /mutt-1.5.19/mutt_ssl_gnutls.c:44:static int tls_socket_read (CONNECTION* conn, char* buf, size_t len); /mutt-1.5.19/mutt_ssl_gnutls.c:45:static int tls_socket_write (CONNECTION* conn, const char* buf, size_t len); /mutt-1.5.19/mutt_ssl_gnutls.c:46:static int tls_socket_open (CONNECTION* conn); /mutt-1.5.19/mutt_ssl_gnutls.c:47:static int tls_socket_close (CONNECTION* conn); /mutt-1.5.19/mutt_ssl_gnutls.c:48:static int tls_starttls_close (CONNECTION* conn); /mutt-1.5.19/mutt_ssl_gnutls.c:50:static int tls_init (void); /mutt-1.5.19/mutt_ssl_gnutls.c:51:static int tls_negotiate (CONNECTION* conn); /mutt-1.5.19/mutt_ssl_gnutls.c:52:static int tls_check_certificate (CONNECTION* conn); /mutt-1.5.19/mutt_ssl_gnutls.c:55:static int tls_init (void) /mutt-1.5.19/mutt_ssl_gnutls.c:75:int mutt_ssl_socket_setup (CONNECTION* conn) /mutt-1.5.19/mutt_ssl_gnutls.c:77: if (tls_init() < 0) /mutt-1.5.19/mutt_ssl_gnutls.c:80: conn->conn_open = tls_socket_open; /mutt-1.5.19/mutt_ssl_gnutls.c:81: conn->conn_read = tls_socket_read; /mutt-1.5.19/mutt_ssl_gnutls.c:82: conn->conn_write = tls_socket_write; /mutt-1.5.19/mutt_ssl_gnutls.c:83: conn->conn_close = tls_socket_close; /mutt-1.5.19/mutt_ssl_gnutls.c:89:static int tls_socket_read (CONNECTION* conn, char* buf, size_t len) /mutt-1.5.19/mutt_ssl_gnutls.c:96: mutt_error (_("Error: no TLS socket open")); /mutt-1.5.19/mutt_ssl_gnutls.c:105: mutt_error ("tls_socket_read (%s)", gnutls_strerror (ret)); /mutt-1.5.19/mutt_ssl_gnutls.c:115:static int tls_socket_write (CONNECTION* conn, const char* buf, size_t len) /mutt-1.5.19/mutt_ssl_gnutls.c:123: mutt_error (_("Error: no TLS socket open")); /mutt-1.5.19/mutt_ssl_gnutls.c:135: mutt_error ("tls_socket_write (%s)", gnutls_strerror (ret)); /mutt-1.5.19/mutt_ssl_gnutls.c:147:static int tls_socket_open (CONNECTION* conn) /mutt-1.5.19/mutt_ssl_gnutls.c:152: if (tls_negotiate (conn) < 0) /mutt-1.5.19/mutt_ssl_gnutls.c:154: tls_socket_close (conn); /mutt-1.5.19/mutt_ssl_gnutls.c:161:int mutt_ssl_starttls (CONNECTION* conn) /mutt-1.5.19/mutt_ssl_gnutls.c:163: if (tls_init() < 0) /mutt-1.5.19/mutt_ssl_gnutls.c:166: if (tls_negotiate (conn) < 0) /mutt-1.5.19/mutt_ssl_gnutls.c:169: conn->conn_read = tls_socket_read; /mutt-1.5.19/mutt_ssl_gnutls.c:170: conn->conn_write = tls_socket_write; /mutt-1.5.19/mutt_ssl_gnutls.c:171: conn->conn_close = tls_starttls_close; /mutt-1.5.19/mutt_ssl_gnutls.c:176:static void tls_get_client_cert (CONNECTION* conn) /mutt-1.5.19/mutt_ssl_gnutls.c:233:/* tls_negotiate: After TLS state has been initialised, attempt to negotiate /mutt-1.5.19/mutt_ssl_gnutls.c:234: * TLS over the wire, including certificate checks. */ /mutt-1.5.19/mutt_ssl_gnutls.c:235:static int tls_negotiate (CONNECTION * conn) /mutt-1.5.19/mutt_ssl_gnutls.c:273: /* disable TLS/SSL protocols as needed */ /mutt-1.5.19/mutt_ssl_gnutls.c:276: mutt_error (_("All available protocols for TLS/SSL connection disabled")); /mutt-1.5.19/mutt_ssl_gnutls.c:330: if (!tls_check_certificate(conn)) /mutt-1.5.19/mutt_ssl_gnutls.c:337: tls_get_client_cert (conn); /mutt-1.5.19/mutt_ssl_gnutls.c:340: mutt_message (_("SSL/TLS connection using %s (%s/%s/%s)"), /mutt-1.5.19/mutt_ssl_gnutls.c:357:static int tls_socket_close (CONNECTION* conn) /mutt-1.5.19/mutt_ssl_gnutls.c:372:static int tls_starttls_close (CONNECTION* conn) /mutt-1.5.19/mutt_ssl_gnutls.c:376: rc = tls_socket_close (conn); /mutt-1.5.19/mutt_ssl_gnutls.c:387:static int tls_compare_certificates (const gnutls_datum *peercert) /mutt-1.5.19/mutt_ssl_gnutls.c:446:static void tls_fingerprint (gnutls_digest_algorithm algo, /mutt-1.5.19/mutt_ssl_gnutls.c:471:static char *tls_make_date (time_t t, char *s, size_t len) /mutt-1.5.19/mutt_ssl_gnutls.c:485:static int tls_check_stored_hostname (const gnutls_datum *cert, /mutt-1.5.19/mutt_ssl_gnutls.c:506: tls_fingerprint (GNUTLS_DIG_MD5, buf, sizeof (buf), cert); /mutt-1.5.19/mutt_ssl_gnutls.c:535:static int tls_check_one_certificate (const gnutls_datum_t *certdata, /mutt-1.5.19/mutt_ssl_gnutls.c:588: !tls_check_stored_hostname (certdata, hostname)) /mutt-1.5.19/mutt_ssl_gnutls.c:593: if (tls_compare_certificates (certdata)) /mutt-1.5.19/mutt_ssl_gnutls.c:746: tls_make_date (t, datestr, 30)); /mutt-1.5.19/mutt_ssl_gnutls.c:750: tls_make_date (t, datestr, 30)); /mutt-1.5.19/mutt_ssl_gnutls.c:753: tls_fingerprint (GNUTLS_DIG_SHA, fpbuf, sizeof (fpbuf), certdata); /mutt-1.5.19/mutt_ssl_gnutls.c:754: snprintf (menu->dialog[row++], SHORT_STRING, _("SHA1 Fingerprint: %s"), fpbuf); /mutt-1.5.19/mutt_ssl_gnutls.c:756: tls_fingerprint (GNUTLS_DIG_MD5, fpbuf, sizeof (fpbuf), certdata); /mutt-1.5.19/mutt_ssl_gnutls.c:757: snprintf (menu->dialog[row++], SHORT_STRING, _("MD5 Fingerprint: %s"), fpbuf); /mutt-1.5.19/mutt_ssl_gnutls.c:786: _("SSL Certificate check (certificate %d of %d in chain)"), /mutt-1.5.19/mutt_ssl_gnutls.c:869:static int tls_check_certificate (CONNECTION* conn) /mutt-1.5.19/mutt_ssl_gnutls.c:919: rc = tls_check_one_certificate (&cert_list[i], certstat, conn->account.host, /mutt-1.5.19/config.h.in:11:/* Define if you want clasic S/MIME support. */ /mutt-1.5.19/config.h.in:129:/* Define to 1 if you have the header file. */ /mutt-1.5.19/config.h.in:130:#undef HAVE_GNUTLS_OPENSSL_H /mutt-1.5.19/config.h.in:228:/* Define to 1 if you have the `ssl' library (-lssl). */ /mutt-1.5.19/config.h.in:566:/* Define if you want support for SSL. */ /mutt-1.5.19/config.h.in:567:#undef USE_SSL /mutt-1.5.19/config.h.in:569:/* Define if you want support for SSL via GNUTLS. */ /mutt-1.5.19/config.h.in:570:#undef USE_SSL_GNUTLS /mutt-1.5.19/config.h.in:572:/* Define if you want support for SSL via OpenSSL. */ /mutt-1.5.19/config.h.in:573:#undef USE_SSL_OPENSSL /mutt-1.5.19/smime_keys.pl:56:my $opensslbin = "/usr/bin/openssl"; /mutt-1.5.19/smime_keys.pl:360: print "$tab$purpose[0] (displays S/MIME options only)\n"; /mutt-1.5.19/md5.h:1:/* Declaration of functions and data types used for MD5 sum computing /mutt-1.5.19/md5.h:23:#ifndef _MD5_H /mutt-1.5.19/md5.h:24:#define _MD5_H 1 /mutt-1.5.19/md5.h:56:# define __md5_buffer md5_buffer /mutt-1.5.19/md5.h:57:# define __md5_finish_ctx md5_finish_ctx /mutt-1.5.19/md5.h:58:# define __md5_init_ctx md5_init_ctx /mutt-1.5.19/md5.h:59:# define __md5_process_block md5_process_block /mutt-1.5.19/md5.h:60:# define __md5_process_bytes md5_process_bytes /mutt-1.5.19/md5.h:61:# define __md5_read_ctx md5_read_ctx /mutt-1.5.19/md5.h:62:# define __md5_stream md5_stream /mutt-1.5.19/md5.h:65:typedef uint32_t md5_uint32; /mutt-1.5.19/md5.h:68:struct md5_ctx /mutt-1.5.19/md5.h:70: md5_uint32 A; /mutt-1.5.19/md5.h:71: md5_uint32 B; /mutt-1.5.19/md5.h:72: md5_uint32 C; /mutt-1.5.19/md5.h:73: md5_uint32 D; /mutt-1.5.19/md5.h:75: md5_uint32 total[2]; /mutt-1.5.19/md5.h:76: md5_uint32 buflen; /mutt-1.5.19/md5.h:77: md5_uint32 buffer[32]; /mutt-1.5.19/md5.h:82: * the functions `md5_stream' and `md5_buffer'. /mutt-1.5.19/md5.h:87:extern void __md5_init_ctx (struct md5_ctx *ctx) __THROW; /mutt-1.5.19/md5.h:93:extern void __md5_process_block (const void *buffer, size_t len, /mutt-1.5.19/md5.h:94: struct md5_ctx *ctx) __THROW; /mutt-1.5.19/md5.h:100:extern void __md5_process_bytes (const void *buffer, size_t len, /mutt-1.5.19/md5.h:101: struct md5_ctx *ctx) __THROW; /mutt-1.5.19/md5.h:107:extern void *__md5_finish_ctx (struct md5_ctx *ctx, void *resbuf) __THROW; /mutt-1.5.19/md5.h:113:extern void *__md5_read_ctx (const struct md5_ctx *ctx, void *resbuf) __THROW; /mutt-1.5.19/md5.h:116:/* Compute MD5 message digest for bytes read from STREAM. The /mutt-1.5.19/md5.h:119:extern int __md5_stream (FILE *stream, void *resblock) __THROW; /mutt-1.5.19/md5.h:121:/* Compute MD5 message digest for LEN bytes beginning at BUFFER. The /mutt-1.5.19/md5.h:125:extern void *__md5_buffer (const char *buffer, size_t len, /mutt-1.5.19/md5.h:128:#endif /* md5.h */ /mutt-1.5.19/copy.c:602: && (flags & M_CM_DECODE_CRYPT) && (hdr->security & ENCRYPT)) /mutt-1.5.19/copy.c:611: if (crypt_pgp_decrypt_mime (fpin, &fp, hdr->content, &cur)) /mutt-1.5.19/copy.c:620: if (crypt_smime_decrypt_mime (fpin, &fp, hdr->content, &cur)) /mutt-1.5.19/m4/Makefile.in:122:MUTT_MD5 = @MUTT_MD5@ /mutt-1.5.19/m4/libgnutls.m4:108: dnl some openssl compatibility code was moved in gnutls 1.2 /mutt-1.5.19/m4/libgnutls.m4:109: AC_CHECK_HEADERS([gnutls/openssl.h]) /mutt-1.5.19/m4/gssapi.m4:61: dnl -lk5crypto, which collides with OpenSSL. One way of dealing /mutt-1.5.19/m4/gssapi.m4:63: dnl and from openssl's libcrypto into the same directory, then /mutt-1.5.19/md5.c:1:/* md5.c - Functions to compute MD5 message digest of files or memory blocks /mutt-1.5.19/md5.c:2: according to the definition of MD5 in RFC 1321 from April 1992. /mutt-1.5.19/md5.c:27:#include "md5.h" /mutt-1.5.19/md5.c:41:/* We need to keep the namespace clean so define the MD5 function /mutt-1.5.19/md5.c:43:# define md5_init_ctx __md5_init_ctx /mutt-1.5.19/md5.c:44:# define md5_process_block __md5_process_block /mutt-1.5.19/md5.c:45:# define md5_process_bytes __md5_process_bytes /mutt-1.5.19/md5.c:46:# define md5_finish_ctx __md5_finish_ctx /mutt-1.5.19/md5.c:47:# define md5_read_ctx __md5_read_ctx /mutt-1.5.19/md5.c:48:# define md5_stream __md5_stream /mutt-1.5.19/md5.c:49:# define md5_buffer __md5_buffer /mutt-1.5.19/md5.c:72:md5_init_ctx (struct md5_ctx *ctx) /mutt-1.5.19/md5.c:85: * (md5_uint32 *) cp = v */ /mutt-1.5.19/md5.c:87:set_uint32 (char *cp, md5_uint32 v) /mutt-1.5.19/md5.c:95:md5_read_ctx (const struct md5_ctx *ctx, void *resbuf) /mutt-1.5.19/md5.c:109:md5_finish_ctx (struct md5_ctx *ctx, void *resbuf) /mutt-1.5.19/md5.c:112: md5_uint32 bytes = ctx->buflen; /mutt-1.5.19/md5.c:127: md5_process_block (ctx->buffer, size * 4, ctx); /mutt-1.5.19/md5.c:129: return md5_read_ctx (ctx, resbuf); /mutt-1.5.19/md5.c:132:/* Compute MD5 message digest for bytes read from STREAM. The /mutt-1.5.19/md5.c:136:md5_stream (FILE *stream, void *resblock) /mutt-1.5.19/md5.c:138: struct md5_ctx ctx; /mutt-1.5.19/md5.c:143: md5_init_ctx (&ctx); /mutt-1.5.19/md5.c:184: md5_process_block (buffer, BLOCKSIZE, &ctx); /mutt-1.5.19/md5.c:191: md5_process_bytes (buffer, sum, &ctx); /mutt-1.5.19/md5.c:194: md5_finish_ctx (&ctx, resblock); /mutt-1.5.19/md5.c:198:/* Compute MD5 message digest for LEN bytes beginning at BUFFER. The /mutt-1.5.19/md5.c:203:md5_buffer (const char *buffer, size_t len, void *resblock) /mutt-1.5.19/md5.c:205: struct md5_ctx ctx; /mutt-1.5.19/md5.c:208: md5_init_ctx (&ctx); /mutt-1.5.19/md5.c:211: md5_process_bytes (buffer, len, &ctx); /mutt-1.5.19/md5.c:214: return md5_finish_ctx (&ctx, resblock); /mutt-1.5.19/md5.c:219:md5_process_bytes (const void *buffer, size_t len, struct md5_ctx *ctx) /mutt-1.5.19/md5.c:233: md5_process_block (ctx->buffer, ctx->buflen & ~63, ctx); /mutt-1.5.19/md5.c:251:# define UNALIGNED_P(p) (((size_t) p) % alignof (md5_uint32) != 0) /mutt-1.5.19/md5.c:255: md5_process_block (memcpy (ctx->buffer, buffer, 64), 64, ctx); /mutt-1.5.19/md5.c:262: md5_process_block (buffer, len & ~63, ctx); /mutt-1.5.19/md5.c:277: md5_process_block (ctx->buffer, 64, ctx); /mutt-1.5.19/md5.c:286:/* These are the four functions used in the four steps of the MD5 algorithm /mutt-1.5.19/md5.c:299:md5_process_block (const void *buffer, size_t len, struct md5_ctx *ctx) /mutt-1.5.19/md5.c:301: md5_uint32 correct_words[16]; /mutt-1.5.19/md5.c:302: const md5_uint32 *words = buffer; /mutt-1.5.19/md5.c:303: size_t nwords = len / sizeof (md5_uint32); /mutt-1.5.19/md5.c:304: const md5_uint32 *endp = words + nwords; /mutt-1.5.19/md5.c:305: md5_uint32 A = ctx->A; /mutt-1.5.19/md5.c:306: md5_uint32 B = ctx->B; /mutt-1.5.19/md5.c:307: md5_uint32 C = ctx->C; /mutt-1.5.19/md5.c:308: md5_uint32 D = ctx->D; /mutt-1.5.19/md5.c:321: md5_uint32 *cwp = correct_words; /mutt-1.5.19/md5.c:322: md5_uint32 A_save = A; /mutt-1.5.19/md5.c:323: md5_uint32 B_save = B; /mutt-1.5.19/md5.c:324: md5_uint32 C_save = C; /mutt-1.5.19/md5.c:325: md5_uint32 D_save = D; /mutt-1.5.19/md5.c:458:/* local md5 equivalent for header cache versioning */ /mutt-1.5.19/md5.c:464: if ((rc = md5_stream(stdin, r))) /mutt-1.5.19/README.SSL:1:IMAP/SSL in mutt /mutt-1.5.19/README.SSL:6:If you want to have SSL support in mutt, you need to install OpenSSL /mutt-1.5.19/README.SSL:7:(http://www.openssl.org) libraries and headers before compiling. /mutt-1.5.19/README.SSL:8:OpenSSL versions 0.9.3 through 0.9.6a have been tested. /mutt-1.5.19/README.SSL:10:For SSL support to be enabled, you need to run the ``configure'' /mutt-1.5.19/README.SSL:11:script with ``--enable-imap --with-ssl[=PFX]'' parameters. If the /mutt-1.5.19/README.SSL:12:OpenSSL headers and libraries are not in the default system search /mutt-1.5.19/README.SSL:16:PFX/include/openssl. /mutt-1.5.19/README.SSL:21:IMAP/SSL folders can be accessed just like normal IMAP folders, but you /mutt-1.5.19/README.SSL:22:will also have to add '/ssl' before the closing curly brace. Or you can /mutt-1.5.19/README.SSL:26: mailboxes {localhost/ssl}inbox /mutt-1.5.19/README.SSL:27: mailboxes {localhost:994/ssl}inbox /mutt-1.5.19/README.SSL:33:to find a source of random data to initialize SSL library with. Should /mutt-1.5.19/README.SSL:40:calculating the MD5-sum from the output and saving it in a file. /mutt-1.5.19/README.SSL:46:The files Mutt will try to use to initialize SSL library with are files /mutt-1.5.19/README.SSL:48:OpenSSL is version 0.9.5 or later, the previous files can also be EGD /mutt-1.5.19/README.SSL:78:system-wide, depends on the OpenSSL installation. Use of system-wide /mutt-1.5.19/README.SSL:79:certificates can be disabled by unsetting $ssl_usesystemcerts variable. /mutt-1.5.19/README.SSL:93:is likely that your IMAP server does not support one of the SSL protocols. /mutt-1.5.19/README.SSL:96: openssl s_client -host -port -verify -debug -no_tls1 /mutt-1.5.19/README.SSL:97: openssl s_client -host -port -verify -debug -no_ssl2 /mutt-1.5.19/README.SSL:98: openssl s_client -host -port -verify -debug -no_ssl3 /mutt-1.5.19/README.SSL:102:protocols to know. The variables for the protocols are ssl_use_tlsv1, /mutt-1.5.19/README.SSL:103:ssl_use_sslv2, and ssl_use_sslv3. /mutt-1.5.19/crypt-mod.h:34:typedef int (*crypt_func_decrypt_mime_t) (FILE *a, FILE **b, /mutt-1.5.19/crypt-mod.h:49:typedef BODY *(*crypt_func_pgp_encrypt_message_t) (BODY *a, char *keylist, /mutt-1.5.19/crypt-mod.h:81: crypt_func_decrypt_mime_t decrypt_mime; /mutt-1.5.19/crypt-mod.h:91: crypt_func_pgp_encrypt_message_t pgp_encrypt_message; /mutt-1.5.19/crypt-mod.h:100: /* S/MIME specific functions. */ /mutt-1.5.19/imap/Makefile.in:151:MUTT_MD5 = @MUTT_MD5@ /mutt-1.5.19/imap/util.c:188: ImapsPort = IMAP_SSL_PORT; /mutt-1.5.19/imap/util.c:210: mx->account.flags |= M_ACCT_SSL; /mutt-1.5.19/imap/util.c:248: if (!ascii_strncmp (tmp, "ssl", 3)) /mutt-1.5.19/imap/util.c:249: mx->account.flags |= M_ACCT_SSL; /mutt-1.5.19/imap/util.c:260: if ((mx->account.flags & M_ACCT_SSL) && !(mx->account.flags & M_ACCT_PORT)) /mutt-1.5.19/imap/auth.h:45:imap_auth_res_t imap_auth_cram_md5 (IMAP_DATA* idata, const char* method); /mutt-1.5.19/imap/auth.c:40: /* SASL includes CRAM-MD5 (and GSSAPI, but that's not enabled by default) */ /mutt-1.5.19/imap/auth.c:42: { imap_auth_cram_md5, "cram-md5" }, /mutt-1.5.19/imap/README:24:IMAP, including SSL/TLS, native CRAM-MD5 and GSSAPI routines, and a SASL /mutt-1.5.19/imap/imap.c:35:#if defined(USE_SSL) /mutt-1.5.19/imap/imap.c:36:# include "mutt_ssl.h" /mutt-1.5.19/imap/imap.c:424:#if defined(USE_SSL) /mutt-1.5.19/imap/imap.c:434: _("Secure connection with TLS?"))) == -1) /mutt-1.5.19/imap/imap.c:441: if (mutt_ssl_starttls (idata->conn)) /mutt-1.5.19/imap/imap.c:443: mutt_error (_("Could not negotiate TLS connection")); /mutt-1.5.19/imap/imap.c:449: /* RFC 2595 demands we recheck CAPABILITY after TLS completes. */ /mutt-1.5.19/imap/imap.c:480:#if defined(USE_SSL) /mutt-1.5.19/imap/command.c:62: "AUTH=CRAM-MD5", /mutt-1.5.19/imap/imap_private.h:33:#define IMAP_SSL_PORT 993 /mutt-1.5.19/imap/imap_private.h:107: ACRAM_MD5, /* RFC 2195: CRAM-MD5 authentication */ /mutt-1.5.19/imap/auth_anon.c:29:/* this is basically a stripped-down version of the cram-md5 method. */ /mutt-1.5.19/imap/auth_cram.c:28:#include "md5.h" /mutt-1.5.19/imap/auth_cram.c:30:#define MD5_BLOCK_LEN 64 /mutt-1.5.19/imap/auth_cram.c:31:#define MD5_DIGEST_LEN 16 /mutt-1.5.19/imap/auth_cram.c:34:static void hmac_md5 (const char* password, char* challenge, /mutt-1.5.19/imap/auth_cram.c:37:/* imap_auth_cram_md5: AUTH=CRAM-MD5 support. */ /mutt-1.5.19/imap/auth_cram.c:38:imap_auth_res_t imap_auth_cram_md5 (IMAP_DATA* idata, const char* method) /mutt-1.5.19/imap/auth_cram.c:41: unsigned char hmac_response[MD5_DIGEST_LEN]; /mutt-1.5.19/imap/auth_cram.c:45: if (!mutt_bit_isset (idata->capabilities, ACRAM_MD5)) /mutt-1.5.19/imap/auth_cram.c:48: mutt_message _("Authenticating (CRAM-MD5)..."); /mutt-1.5.19/imap/auth_cram.c:56: imap_cmd_start (idata, "AUTHENTICATE CRAM-MD5"); /mutt-1.5.19/imap/auth_cram.c:85: * computed by applying the keyed MD5 algorithm from [KEYED-MD5] where the /mutt-1.5.19/imap/auth_cram.c:94: hmac_md5 (idata->conn->account.pass, obuf, hmac_response); /mutt-1.5.19/imap/auth_cram.c:99: hmac_response[0], hmac_response[1], hmac_response[2], hmac_response[3], /mutt-1.5.19/imap/auth_cram.c:100: hmac_response[4], hmac_response[5], hmac_response[6], hmac_response[7], /mutt-1.5.19/imap/auth_cram.c:101: hmac_response[8], hmac_response[9], hmac_response[10], hmac_response[11], /mutt-1.5.19/imap/auth_cram.c:102: hmac_response[12], hmac_response[13], hmac_response[14], hmac_response[15]); /mutt-1.5.19/imap/auth_cram.c:128: mutt_error _("CRAM-MD5 authentication failed."); /mutt-1.5.19/imap/auth_cram.c:133:/* hmac_md5: produce CRAM-MD5 challenge response. */ /mutt-1.5.19/imap/auth_cram.c:134:static void hmac_md5 (const char* password, char* challenge, /mutt-1.5.19/imap/auth_cram.c:137: struct md5_ctx ctx; /mutt-1.5.19/imap/auth_cram.c:138: unsigned char ipad[MD5_BLOCK_LEN], opad[MD5_BLOCK_LEN]; /mutt-1.5.19/imap/auth_cram.c:139: unsigned char secret[MD5_BLOCK_LEN+1]; /mutt-1.5.19/imap/auth_cram.c:140: unsigned char hash_passwd[MD5_DIGEST_LEN]; /mutt-1.5.19/imap/auth_cram.c:147: /* passwords longer than MD5_BLOCK_LEN bytes are substituted with their MD5 /mutt-1.5.19/imap/auth_cram.c:149: if (secret_len > MD5_BLOCK_LEN) /mutt-1.5.19/imap/auth_cram.c:151: md5_buffer (password, secret_len, hash_passwd); /mutt-1.5.19/imap/auth_cram.c:152: strfcpy ((char*) secret, (char*) hash_passwd, MD5_DIGEST_LEN); /mutt-1.5.19/imap/auth_cram.c:153: secret_len = MD5_DIGEST_LEN; /mutt-1.5.19/imap/auth_cram.c:163: for (i = 0; i < MD5_BLOCK_LEN; i++) /mutt-1.5.19/imap/auth_cram.c:170: md5_init_ctx (&ctx); /mutt-1.5.19/imap/auth_cram.c:171: md5_process_bytes (ipad, MD5_BLOCK_LEN, &ctx); /mutt-1.5.19/imap/auth_cram.c:172: md5_process_bytes (challenge, chal_len, &ctx); /mutt-1.5.19/imap/auth_cram.c:173: md5_finish_ctx (&ctx, response); /mutt-1.5.19/imap/auth_cram.c:176: md5_init_ctx (&ctx); /mutt-1.5.19/imap/auth_cram.c:177: md5_process_bytes (opad, MD5_BLOCK_LEN, &ctx); /mutt-1.5.19/imap/auth_cram.c:178: md5_process_bytes (response, MD5_DIGEST_LEN, &ctx); /mutt-1.5.19/imap/auth_cram.c:179: md5_finish_ctx (&ctx, response); /mutt-1.5.19/crypt-mod-pgp-classic.c:40:static int crypt_mod_pgp_decrypt_mime (FILE *a, FILE **b, BODY *c, BODY **d) /mutt-1.5.19/crypt-mod-pgp-classic.c:42: return pgp_decrypt_mime (a, b, c, d); /mutt-1.5.19/crypt-mod-pgp-classic.c:69:static BODY *crypt_mod_pgp_encrypt_message (BODY *a, char *keylist, int sign) /mutt-1.5.19/crypt-mod-pgp-classic.c:71: return pgp_encrypt_message (a, keylist, sign); /mutt-1.5.19/crypt-mod-pgp-classic.c:115: crypt_mod_pgp_decrypt_mime, /mutt-1.5.19/crypt-mod-pgp-classic.c:124: crypt_mod_pgp_encrypt_message, /mutt-1.5.19/cryptglue.c:112: mutt_message _("Invoking S/MIME..."); /mutt-1.5.19/cryptglue.c:140:/* Decrypt a PGP/MIME message. */ /mutt-1.5.19/cryptglue.c:141:int crypt_pgp_decrypt_mime (FILE *a, FILE **b, BODY *c, BODY **d) /mutt-1.5.19/cryptglue.c:143: if (CRYPT_MOD_CALL_CHECK (PGP, decrypt_mime)) /mutt-1.5.19/cryptglue.c:144: return (CRYPT_MOD_CALL (PGP, decrypt_mime)) (a, b, c, d); /mutt-1.5.19/cryptglue.c:222:BODY *crypt_pgp_encrypt_message (BODY *a, char *keylist, int sign) /mutt-1.5.19/cryptglue.c:224: if (CRYPT_MOD_CALL_CHECK (PGP, pgp_encrypt_message)) /mutt-1.5.19/cryptglue.c:225: return (CRYPT_MOD_CALL (PGP, pgp_encrypt_message)) (a, keylist, sign); /mutt-1.5.19/cryptglue.c:274: S/MIME /mutt-1.5.19/cryptglue.c:294:/* Decrypt am S/MIME message. */ /mutt-1.5.19/cryptglue.c:295:int crypt_smime_decrypt_mime (FILE *a, FILE **b, BODY *c, BODY **d) /mutt-1.5.19/cryptglue.c:297: if (CRYPT_MOD_CALL_CHECK (SMIME, decrypt_mime)) /mutt-1.5.19/cryptglue.c:298: return (CRYPT_MOD_CALL (SMIME, decrypt_mime)) (a, b, c, d); /mutt-1.5.19/Makefile.am:5:EXTRA_PROGRAMS = mutt_dotlock pgpring pgpewrap mutt_md5 /mutt-1.5.19/Makefile.am:52: crypt-mod-smime-gpgme.c dotlock.c gnupgparse.c hcache.c md5.c \ /mutt-1.5.19/Makefile.am:53: mutt_idna.c mutt_sasl.c mutt_socket.c mutt_ssl.c mutt_ssl_gnutls.c \ /mutt-1.5.19/Makefile.am:55: pgppacket.c pop.c pop_auth.c pop_lib.c remailer.c resize.c sha1.c \ /mutt-1.5.19/Makefile.am:63: mailbox.h mapping.h md5.h mime.h mutt.h mutt_curses.h mutt_menu.h \ /mutt-1.5.19/Makefile.am:64: mutt_regex.h mutt_sasl.h mutt_socket.h mutt_ssl.h mutt_tunnel.h \ /mutt-1.5.19/Makefile.am:66: rfc2231.h rfc822.h rfc3676.h sha1.h sort.h mime.types VERSION prepare \ /mutt-1.5.19/Makefile.am:69: README.SSL smime.h \ /mutt-1.5.19/Makefile.am:80:pgpring_SOURCES = pgppubring.c pgplib.c lib.c extlib.c sha1.c md5.c pgppacket.c ascii.c /mutt-1.5.19/Makefile.am:84:mutt_md5_SOURCES = md5.c /mutt-1.5.19/Makefile.am:85:mutt_md5_CFLAGS = -DMD5UTIL /mutt-1.5.19/Makefile.am:86:mutt_md5_LDADD = /mutt-1.5.19/Makefile.am:88:noinst_PROGRAMS = $(MUTT_MD5) /mutt-1.5.19/Makefile.am:123:hcversion.h: $(srcdir)/mutt.h $(srcdir)/rfc822.h hcachever.sh $(MUTT_MD5) /mutt-1.5.19/crypt-gpgme.c:124:static gpgme_key_t signature_key = NULL; /mutt-1.5.19/crypt-gpgme.c:697: mutt_error (_("error setting PKA signature notation: %s\n"), /mutt-1.5.19/crypt-gpgme.c:705:/* Encrypt the gpgme data object PLAINTEXT to the recipients in RSET /mutt-1.5.19/crypt-gpgme.c:710:static char *encrypt_gpgme_object (gpgme_data_t plaintext, gpgme_key_t *rset, /mutt-1.5.19/crypt-gpgme.c:744: err = gpgme_op_encrypt_sign (ctx, rset, GPGME_ENCRYPT_ALWAYS_TRUST, /mutt-1.5.19/crypt-gpgme.c:748: err = gpgme_op_encrypt (ctx, rset, GPGME_ENCRYPT_ALWAYS_TRUST, /mutt-1.5.19/crypt-gpgme.c:821:/* Sign the MESSAGE in body A either using OpenPGP or S/MIME when /mutt-1.5.19/crypt-gpgme.c:831: gpgme_data_t message, signature; /mutt-1.5.19/crypt-gpgme.c:838: signature = create_gpgme_data (); /mutt-1.5.19/crypt-gpgme.c:846: gpgme_data_release (signature); /mutt-1.5.19/crypt-gpgme.c:856: gpgme_data_release (signature); /mutt-1.5.19/crypt-gpgme.c:863: err = gpgme_op_sign (ctx, message, signature, GPGME_SIG_MODE_DETACH ); /mutt-1.5.19/crypt-gpgme.c:868: gpgme_data_release (signature); /mutt-1.5.19/crypt-gpgme.c:874: sigfile = data_object_to_tempfile (signature, NULL); /mutt-1.5.19/crypt-gpgme.c:875: gpgme_data_release (signature); /mutt-1.5.19/crypt-gpgme.c:891: use_smime? "application/pkcs7-signature" /mutt-1.5.19/crypt-gpgme.c:892: : "application/pgp-signature", /mutt-1.5.19/crypt-gpgme.c:895: for S/MIME so we assume sha-1 in this case. */ /mutt-1.5.19/crypt-gpgme.c:899: mutt_set_parameter ("micalg", "sha1", &t->parameter); /mutt-1.5.19/crypt-gpgme.c:910: t->subtype = safe_strdup ("pkcs7-signature"); /mutt-1.5.19/crypt-gpgme.c:919: t->subtype = safe_strdup ("pgp-signature"); /mutt-1.5.19/crypt-gpgme.c:942: * Implementation of `encrypt_message'. /mutt-1.5.19/crypt-gpgme.c:945:/* Encrypt the mail body A to all keys given as space separated keyids /mutt-1.5.19/crypt-gpgme.c:947:BODY *pgp_gpgme_encrypt_message (BODY *a, char *keylist, int sign) /mutt-1.5.19/crypt-gpgme.c:967: outfile = encrypt_gpgme_object (plaintext, rset, 0, sign); /mutt-1.5.19/crypt-gpgme.c:1006:/* Encrypt the mail body A to all keys given as space separated /mutt-1.5.19/crypt-gpgme.c:1007: fingerprints in KEYLIST and return the S/MIME encrypted body. */ /mutt-1.5.19/crypt-gpgme.c:1026: outfile = encrypt_gpgme_object (plaintext, rset, 1, 0); /mutt-1.5.19/crypt-gpgme.c:1037: t->encoding = ENCBASE64; /* The output of OpenSSL SHOULD be binary */ /mutt-1.5.19/crypt-gpgme.c:1054:/* Display the common attributes of the signature summary SUM. /mutt-1.5.19/crypt-gpgme.c:1059: STATE *s, gpgme_signature_t sig) /mutt-1.5.19/crypt-gpgme.c:1075: "signature expired at: "), s); /mutt-1.5.19/crypt-gpgme.c:1087: gpgme_signature_t sig; /mutt-1.5.19/crypt-gpgme.c:1096: state_attach_puts (_("Warning: The signature expired at: "), s); /mutt-1.5.19/crypt-gpgme.c:1124: gpgme_signature_t sig; /mutt-1.5.19/crypt-gpgme.c:1231:/* Show the valididy of a key used for one signature. */ /mutt-1.5.19/crypt-gpgme.c:1235: gpgme_signature_t sig = NULL; /mutt-1.5.19/crypt-gpgme.c:1268:static void print_smime_keyinfo (const char* msg, gpgme_signature_t sig, /mutt-1.5.19/crypt-gpgme.c:1302:/* Show information about one signature. This fucntion is called with /mutt-1.5.19/crypt-gpgme.c:1305: call/signature. /mutt-1.5.19/crypt-gpgme.c:1307: Return values are: 0 for normal procession, 1 for a bad signature, /mutt-1.5.19/crypt-gpgme.c:1308: 2 for a signature with a warning or -1 for no more signature. */ /mutt-1.5.19/crypt-gpgme.c:1316: gpgme_signature_t sig; /mutt-1.5.19/crypt-gpgme.c:1330: return -1; /* Signature not found. */ /mutt-1.5.19/crypt-gpgme.c:1332: if (signature_key) /mutt-1.5.19/crypt-gpgme.c:1334: gpgme_key_release (signature_key); /mutt-1.5.19/crypt-gpgme.c:1335: signature_key = NULL; /mutt-1.5.19/crypt-gpgme.c:1348: if (! signature_key) /mutt-1.5.19/crypt-gpgme.c:1349: signature_key = key; /mutt-1.5.19/crypt-gpgme.c:1369: print_smime_keyinfo (_("Good signature from:"), sig, key, s); /mutt-1.5.19/crypt-gpgme.c:1376: print_smime_keyinfo (_("*BAD* signature from:"), sig, key, s); /mutt-1.5.19/crypt-gpgme.c:1381: signature, so we display what a PGP user expects: The name, /mutt-1.5.19/crypt-gpgme.c:1384: print_smime_keyinfo (_("Good signature from:"), sig, key, s); /mutt-1.5.19/crypt-gpgme.c:1392: print_smime_keyinfo (_("Problem signature from:"), sig, key, s); /mutt-1.5.19/crypt-gpgme.c:1400: if (key != signature_key) /mutt-1.5.19/crypt-gpgme.c:1408: assume S/MIME (surprise!) */ /mutt-1.5.19/crypt-gpgme.c:1416: gpgme_data_t signature, message; /mutt-1.5.19/crypt-gpgme.c:1418: signature = file_to_data_object (s->fpin, sigbdy->offset, sigbdy->length); /mutt-1.5.19/crypt-gpgme.c:1419: if (!signature) /mutt-1.5.19/crypt-gpgme.c:1423: auto-detect plain base-64 encoding which is used by S/MIME. */ /mutt-1.5.19/crypt-gpgme.c:1425: gpgme_data_set_encoding (signature, GPGME_DATA_ENCODING_BASE64); /mutt-1.5.19/crypt-gpgme.c:1430: gpgme_data_release (signature); /mutt-1.5.19/crypt-gpgme.c:1439: state_attach_puts (_("[-- Begin signature information --]\n"), s); /mutt-1.5.19/crypt-gpgme.c:1441: err = gpgme_op_verify (ctx, signature, message, NULL); /mutt-1.5.19/crypt-gpgme.c:1457: if (signature_key) /mutt-1.5.19/crypt-gpgme.c:1459: gpgme_key_release (signature_key); /mutt-1.5.19/crypt-gpgme.c:1460: signature_key = NULL; /mutt-1.5.19/crypt-gpgme.c:1478: gpgme_signature_t signature; /mutt-1.5.19/crypt-gpgme.c:1484: for (signature = result->signatures; signature; /mutt-1.5.19/crypt-gpgme.c:1485: signature = signature->next) /mutt-1.5.19/crypt-gpgme.c:1488: for (notation = signature->notations; notation; /mutt-1.5.19/crypt-gpgme.c:1497: _("*** Begin Notation (signature by: %s) ***\n"), /mutt-1.5.19/crypt-gpgme.c:1498: signature->fpr); /mutt-1.5.19/crypt-gpgme.c:1500: for (notation = signature->notations; notation; /mutt-1.5.19/crypt-gpgme.c:1527: state_attach_puts (_("[-- End signature information --]\n\n"), s); /mutt-1.5.19/crypt-gpgme.c:1544: * Implementation of `decrypt_part'. /mutt-1.5.19/crypt-gpgme.c:1547:/* Decrypt a PGP or SMIME message (depending on the boolean flag /mutt-1.5.19/crypt-gpgme.c:1551: encrypted and signed message, for S/MIME it returns true when it is /mutt-1.5.19/crypt-gpgme.c:1553:static BODY *decrypt_part (BODY *a, STATE *s, FILE *fpout, int is_smime, /mutt-1.5.19/crypt-gpgme.c:1577: /* Do the decryption or the verification in case of the S/MIME hack. */ /mutt-1.5.19/crypt-gpgme.c:1581: err = gpgme_op_decrypt_verify (ctx, ciphertext, plaintext); /mutt-1.5.19/crypt-gpgme.c:1594: err = gpgme_op_decrypt (ctx, ciphertext, plaintext); /mutt-1.5.19/crypt-gpgme.c:1606: gpgme_decrypt_result_t result; /mutt-1.5.19/crypt-gpgme.c:1608: result = gpgme_op_decrypt_result (ctx); /mutt-1.5.19/crypt-gpgme.c:1651: *r_is_signed = -1; /* A signature exists. */ /mutt-1.5.19/crypt-gpgme.c:1654: state_attach_puts (_("[-- Begin signature " /mutt-1.5.19/crypt-gpgme.c:1664: *r_is_signed = anywarn? 2:1; /* Good signature. */ /mutt-1.5.19/crypt-gpgme.c:1667: state_attach_puts (_("[-- End signature " /mutt-1.5.19/crypt-gpgme.c:1692:/* Decrypt a PGP/MIME message in FPIN and B and return a new body and /mutt-1.5.19/crypt-gpgme.c:1694:int pgp_gpgme_decrypt_mime (FILE *fpin, FILE **fpout, BODY *b, BODY **cur) /mutt-1.5.19/crypt-gpgme.c:1722: *cur = decrypt_part (b, &s, *fpout, 0, &is_signed); /mutt-1.5.19/crypt-gpgme.c:1731:/* Decrypt a S/MIME message in FPIN and B and return a new body and /mutt-1.5.19/crypt-gpgme.c:1733:int smime_gpgme_decrypt_mime (FILE *fpin, FILE **fpout, BODY *b, BODY **cur) /mutt-1.5.19/crypt-gpgme.c:1785: *cur = decrypt_part (b, &s, *fpout, 1, &is_signed); /mutt-1.5.19/crypt-gpgme.c:1795: /* Assume that this is a opaque signed s/mime message. This is /mutt-1.5.19/crypt-gpgme.c:1797: arbitrary encoded S/MIME messages: Only the outer part may be /mutt-1.5.19/crypt-gpgme.c:1800: need to decrypt them all the time. Inner parts of an /mutt-1.5.19/crypt-gpgme.c:1802: never be a need to decrypt again. This needs a partial /mutt-1.5.19/crypt-gpgme.c:1840: tmp_b = decrypt_part (bb, &s, *fpout, 1, &is_signed); /mutt-1.5.19/crypt-gpgme.c:2091: Copy a clearsigned message, and strip the signature and PGP's /mutt-1.5.19/crypt-gpgme.c:2133: if (!mutt_strcmp (buf, "-----BEGIN PGP SIGNATURE-----\n")) /mutt-1.5.19/crypt-gpgme.c:2245: err = gpgme_op_decrypt_verify (ctx, armored_data, plaintext); /mutt-1.5.19/crypt-gpgme.c:2248: /* Decrypt verify can't handle signed only messages. */ /mutt-1.5.19/crypt-gpgme.c:2290: state_attach_puts (_("[-- Begin signature " /mutt-1.5.19/crypt-gpgme.c:2305: state_attach_puts (_("[-- End signature " /mutt-1.5.19/crypt-gpgme.c:2441: tattach = decrypt_part (a, s, fpout, 0, &is_signed); /mutt-1.5.19/crypt-gpgme.c:2461: * multipart/encrypted, cache signature verification /mutt-1.5.19/crypt-gpgme.c:2507: tattach = decrypt_part (a, s, fpout, 1, &is_signed); /mutt-1.5.19/crypt-gpgme.c:2514: _("[-- The following data is S/MIME signed --]\n\n"): /mutt-1.5.19/crypt-gpgme.c:2515: _("[-- The following data is S/MIME encrypted --]\n\n"), /mutt-1.5.19/crypt-gpgme.c:2527: * multipart/encrypted, cache signature verification /mutt-1.5.19/crypt-gpgme.c:2545: _("[-- End of S/MIME signed data --]\n"): /mutt-1.5.19/crypt-gpgme.c:2546: _("[-- End of S/MIME encrypted data --]\n"), /mutt-1.5.19/crypt-gpgme.c:3124: for S/MIME's DNs. USERID is a string as returned by the gpgme key /mutt-1.5.19/crypt-gpgme.c:3162: KEY_CAP_CAN_ENCRYPT, /mutt-1.5.19/crypt-gpgme.c:3176: case KEY_CAP_CAN_ENCRYPT: /mutt-1.5.19/crypt-gpgme.c:3177: if (! (ret = key->can_encrypt)) /mutt-1.5.19/crypt-gpgme.c:3179: if ((ret = subkey->can_encrypt)) /mutt-1.5.19/crypt-gpgme.c:3279: if (key_check_cap (key, KEY_CAP_CAN_ENCRYPT)) /mutt-1.5.19/crypt-gpgme.c:3422: if (subkey->can_encrypt) /mutt-1.5.19/crypt-gpgme.c:3644: if (key_check_cap (key, KEY_CAP_CAN_ENCRYPT)) /mutt-1.5.19/crypt-gpgme.c:3657: case GPGME_PK_RSA: /mutt-1.5.19/crypt-gpgme.c:3664: case GPGME_PK_DSA: /mutt-1.5.19/crypt-gpgme.c:3707: if (key_check_cap (key, KEY_CAP_CAN_ENCRYPT)) /mutt-1.5.19/crypt-gpgme.c:3845: ts = _("PGP and S/MIME keys matching"); /mutt-1.5.19/crypt-gpgme.c:3849: ts = _("S/MIME keys matching"); /mutt-1.5.19/crypt-gpgme.c:4154: encrypt) and APP the type of the requested key; ether S/MIME or /mutt-1.5.19/crypt-gpgme.c:4393: _("S/MIME (e)ncrypt, (s)ign, sign (a)s, (b)oth, (p)gp or (c)lear?"), /mutt-1.5.19/crypt-gpgme.c:4491: if (signature_key) /mutt-1.5.19/crypt-gpgme.c:4493: gpgme_key_t key = signature_key; /mutt-1.5.19/crypt-gpgme.c:4516: if (signature_key) /mutt-1.5.19/crypt-gpgme.c:4518: gpgme_key_release (signature_key); /mutt-1.5.19/crypt-gpgme.c:4519: signature_key = NULL; /mutt-1.5.19/configure.ac:164: AC_DEFINE(CRYPT_BACKEND_CLASSIC_SMIME, 1, [Define if you want clasic S/MIME support.]) /mutt-1.5.19/configure.ac:574: need_md5="yes" /mutt-1.5.19/configure.ac:585: need_md5="yes" /mutt-1.5.19/configure.ac:651:AC_ARG_WITH(ssl, AC_HELP_STRING([--with-ssl@<:@=PFX@:>@], [Compile in SSL support for POP/IMAP/SMTP using OpenSSL]), /mutt-1.5.19/configure.ac:652:[ if test "$with_ssl" != "no" /mutt-1.5.19/configure.ac:655: AC_MSG_WARN([SSL support is only useful with POP, IMAP or SMTP support]) /mutt-1.5.19/configure.ac:657: if test "$with_ssl" != "yes" /mutt-1.5.19/configure.ac:668: AC_CHECK_LIB(ssl, SSL_new,, /mutt-1.5.19/configure.ac:669: AC_MSG_ERROR([Unable to find SSL library]), [$crypto_libs]) /mutt-1.5.19/configure.ac:674: AC_DEFINE(USE_SSL,1,[ Define if you want support for SSL. ]) /mutt-1.5.19/configure.ac:675: AC_DEFINE(USE_SSL_OPENSSL,1,[ Define if you want support for SSL via OpenSSL. ]) /mutt-1.5.19/configure.ac:678: MUTT_LIB_OBJECTS="$MUTT_LIB_OBJECTS mutt_ssl.o" /mutt-1.5.19/configure.ac:679: need_ssl=yes /mutt-1.5.19/configure.ac:684:AC_ARG_WITH([gnutls], AC_HELP_STRING([--with-gnutls@<:@=PFX@:>@], [Compile in SSL support for POP/IMAP/SMTP using gnutls]), /mutt-1.5.19/configure.ac:686:if test "$gnutls_prefix" != "no" && test x"$need_ssl" != xyes /mutt-1.5.19/configure.ac:690: AC_MSG_WARN([SSL support is only useful with POP, IMAP or SMTP support]) /mutt-1.5.19/configure.ac:697: AC_DEFINE(USE_SSL,1,[ Define if you want support for SSL. ]) /mutt-1.5.19/configure.ac:698: AC_DEFINE(USE_SSL_GNUTLS,1,[ Define if you want support for SSL via GNUTLS. ]) /mutt-1.5.19/configure.ac:700: MUTT_LIB_OBJECTS="$MUTT_LIB_OBJECTS mutt_ssl_gnutls.o" /mutt-1.5.19/configure.ac:701: need_ssl=yes], /mutt-1.5.19/configure.ac:707:AM_CONDITIONAL(USE_SSL, test x$need_ssl = xyes) /mutt-1.5.19/configure.ac:837: need_md5="yes" /mutt-1.5.19/configure.ac:1020:if test "$need_md5" = "yes" /mutt-1.5.19/configure.ac:1022: MUTT_LIB_OBJECTS="$MUTT_LIB_OBJECTS md5.o" /mutt-1.5.19/configure.ac:1023: MUTT_MD5="mutt_md5" /mutt-1.5.19/configure.ac:1025:AC_SUBST(MUTT_MD5) /mutt-1.5.19/hcachever.sh.in:84:MD5TEXT=`echo "$TEXT" | ./mutt_md5` /mutt-1.5.19/pgppacket.h:32: PT_SIG, /* Signature Packet */ /mutt-1.5.19/pgppacket.h:34: PT_OPS, /* One-Pass Signature Packet */ /mutt-1.5.19/crypt-mod-smime-classic.c:40:static int crypt_mod_smime_decrypt_mime (FILE *a, FILE **b, BODY *c, BODY **d) /mutt-1.5.19/crypt-mod-smime-classic.c:42: return smime_decrypt_mime (a, b, c, d); /mutt-1.5.19/crypt-mod-smime-classic.c:96: crypt_mod_smime_decrypt_mime, /mutt-1.5.19/crypt-mod-smime-classic.c:105: NULL, /* pgp_encrypt_message */ /mutt-1.5.19/sha1.c:2: SHA-1 in C /mutt-1.5.19/sha1.c:26:#include "sha1.h" /mutt-1.5.19/sha1.c:42:/* (R0+R1), R2, R3, R4 are the different operations used in SHA1 */ /mutt-1.5.19/sha1.c:113:void SHA1Init(SHA1_CTX* context) /mutt-1.5.19/sha1.c:115: /* SHA1 initialization constants */ /mutt-1.5.19/sha1.c:127:void SHA1Update(SHA1_CTX* context, const unsigned char* data, uint32_t len) /mutt-1.5.19/sha1.c:152:void SHA1Final(unsigned char digest[20], SHA1_CTX* context) /mutt-1.5.19/pgpmicalg.c:20:/* This module peeks at a PGP signature and figures out the hash /mutt-1.5.19/pgpmicalg.c:45: { 1, "pgp-md5" }, /mutt-1.5.19/pgpmicalg.c:46: { 2, "pgp-sha1" }, /mutt-1.5.19/pgpmicalg.c:47: { 3, "pgp-ripemd160" }, /mutt-1.5.19/pgpmicalg.c:140: /* is signature? */ /mutt-1.5.19/pgpmicalg.c:149: /* version 3 signature */ /mutt-1.5.19/pgpmicalg.c:152: /* version 4 signature */ /mutt-1.5.19/pgpmicalg.c:156: dprint (1, (debugfile, "pgp_mic_from_packet: Bad signature packet.\n")); /mutt-1.5.19/rfc3676.c:208: /* test for signature separator */ /mutt-1.5.19/rfc3676.c:212: * signature separator */ /mutt-1.5.19/pgppubring.c:54:#include "sha1.h" /mutt-1.5.19/pgppubring.c:55:#include "md5.h" /mutt-1.5.19/pgppubring.c:60:#define MD5_DIGEST_LENGTH 16 /mutt-1.5.19/pgppubring.c:164: struct md5_ctx ctx; /mutt-1.5.19/pgppubring.c:167: md5_init_ctx (&ctx); /mutt-1.5.19/pgppubring.c:173: md5_process_bytes (buff, size, &ctx); /mutt-1.5.19/pgppubring.c:181: md5_process_bytes (buff, size, &ctx); /mutt-1.5.19/pgppubring.c:183: md5_finish_ctx (&ctx, digest); /mutt-1.5.19/pgppubring.c:190: unsigned char digest[MD5_DIGEST_LENGTH]; /mutt-1.5.19/pgppubring.c:224: p->fp_len = MD5_DIGEST_LENGTH; /mutt-1.5.19/pgppubring.c:226: memcpy (p->fingerprint, digest, MD5_DIGEST_LENGTH); /mutt-1.5.19/pgppubring.c:229: memset (p->fingerprint, 0, MD5_DIGEST_LENGTH); /mutt-1.5.19/pgppubring.c:267: SHA1_CTX context; /mutt-1.5.19/pgppubring.c:269: SHA1_Init (&context); /mutt-1.5.19/pgppubring.c:277: SHA1_Update (&context, &dummy, 1); /mutt-1.5.19/pgppubring.c:279: SHA1_Update (&context, &dummy, 1); /mutt-1.5.19/pgppubring.c:281: SHA1_Update (&context, &dummy, 1); /mutt-1.5.19/pgppubring.c:282: SHA1_Update (&context, buff + 1, l - 1); /mutt-1.5.19/pgppubring.c:283: SHA1_Final (digest, &context); /mutt-1.5.19/pgppubring.c:308: unsigned char digest[SHA_DIGEST_LENGTH]; /mutt-1.5.19/pgppubring.c:345: p->fp_len = SHA_DIGEST_LENGTH; /mutt-1.5.19/pgppubring.c:349: for (id = 0, i = SHA_DIGEST_LENGTH - 8 + k * 4; /mutt-1.5.19/pgppubring.c:350: i < SHA_DIGEST_LENGTH + (k - 1) * 4; i++) /mutt-1.5.19/pgppubring.c:658: pgp_sig_t *signature = safe_calloc (sizeof (pgp_sig_t), 1); /mutt-1.5.19/pgppubring.c:659: *lsig = signature; /mutt-1.5.19/pgppubring.c:660: lsig = &signature->next; /mutt-1.5.19/pgppubring.c:662: pgp_parse_sig (buff, l, p, signature); /mutt-1.5.19/send.c:52:static void append_signature (FILE *f) /mutt-1.5.19/send.c:57: if (Signature && (tmpfp = mutt_open_read (Signature, &thepid))) /mutt-1.5.19/send.c:370: if (WithCrypto && (cur->security & ENCRYPT) && option (OPTFORWDECODE)) /mutt-1.5.19/send.c:422: if (WithCrypto && (cur->security & ENCRYPT)) /mutt-1.5.19/send.c:1309: append_signature (tempfp); /mutt-1.5.19/send.c:1317: append_signature (tempfp); /mutt-1.5.19/send.c:1329: msg->security |= ENCRYPT; /mutt-1.5.19/send.c:1330: if (option (OPTCRYPTREPLYENCRYPT) && cur && (cur->security & ENCRYPT)) /mutt-1.5.19/send.c:1331: msg->security |= ENCRYPT; /mutt-1.5.19/send.c:1334: if (option (OPTCRYPTREPLYSIGNENCRYPTED) && cur && (cur->security & ENCRYPT)) /mutt-1.5.19/send.c:1336: if (WithCrypto & APPLICATION_PGP && (msg->security & (ENCRYPT | SIGN))) /mutt-1.5.19/send.c:1382: /* No permissible mechanisms found. Don't sign or encrypt. */ /mutt-1.5.19/send.c:1676: if(!(msg->security & ENCRYPT) && (msg->security & SIGN)) /mutt-1.5.19/send.c:1678: /* save initial signature and attachments */ /mutt-1.5.19/send.c:1724: /* cleanup the second signature structures */ /mutt-1.5.19/send.c:1732: /* restore old signature and attachments */ /mutt-1.5.19/send.c:1756: else if ((msg->security & ENCRYPT) || /mutt-1.5.19/send.c:1783: if (WithCrypto && (msg->security & ENCRYPT)) /mutt-1.5.19/pop_lib.c:27:#if defined(USE_SSL) /mutt-1.5.19/pop_lib.c:28:# include "mutt_ssl.h" /mutt-1.5.19/pop_lib.c:54: acct->flags |= M_ACCT_SSL; /mutt-1.5.19/pop_lib.c:55: acct->port = POP_SSL_PORT; /mutt-1.5.19/pop_lib.c:277:#if defined(USE_SSL) /mutt-1.5.19/pop_lib.c:286: _("Secure connection with TLS?")); /mutt-1.5.19/pop_lib.c:304: else if (mutt_ssl_starttls (pop_data->conn)) /mutt-1.5.19/pop_lib.c:306: mutt_error (_("Could not negotiate TLS connection")); /mutt-1.5.19/INSTALL:99: and may be able to encrypt your session with it - you should use /mutt-1.5.19/INSTALL:102:--with-ssl[=PFX] /mutt-1.5.19/INSTALL:103: enable SSL support with IMAP and POP. SSL support requires you to /mutt-1.5.19/INSTALL:104: have OpenSSL headers and libraries properly installed before /mutt-1.5.19/INSTALL:105: compiling. If the OpenSSL headers and libraries are not in the /mutt-1.5.19/INSTALL:109: PFX/include/openssl. /mutt-1.5.19/INSTALL:115: mutt. SASL may also be able to encrypt your mail session even if /mutt-1.5.19/INSTALL:116: SSL is not available. /mutt-1.5.19/pop.h:28:#define POP_SSL_PORT 995 /mutt-1.5.19/pager.c:147: if (info[n].type != MT_COLOR_SIGNATURE) /mutt-1.5.19/pager.c:752: lineInfo[n].type = MT_COLOR_SIGNATURE; /mutt-1.5.19/pager.c:765: lineInfo[i++].type = MT_COLOR_SIGNATURE; /mutt-1.5.19/pager.c:769: lineInfo[n].type = MT_COLOR_SIGNATURE; /mutt-1.5.19/pager.c:2495: case OP_DECRYPT_SAVE: /mutt-1.5.19/pager.c:2512: case OP_DECRYPT_COPY: /mutt-1.5.19/pager.c:2513: if (!WithCrypto && ch == OP_DECRYPT_COPY) /mutt-1.5.19/pager.c:2520: (ch == OP_DECRYPT_SAVE) || /mutt-1.5.19/pager.c:2523: (ch == OP_DECRYPT_SAVE) || (ch == OP_DECRYPT_COPY) || /mutt-1.5.19/pager.c:2526: || ch == OP_DECRYPT_SAVE /mutt-1.5.19/pop_auth.c:25:#include "md5.h" /mutt-1.5.19/pop_auth.c:177: struct md5_ctx ctx; /mutt-1.5.19/pop_auth.c:196: md5_init_ctx (&ctx); /mutt-1.5.19/pop_auth.c:197: md5_process_bytes (pop_data->timestamp, strlen (pop_data->timestamp), &ctx); /mutt-1.5.19/pop_auth.c:198: md5_process_bytes (pop_data->conn->account.pass, /mutt-1.5.19/pop_auth.c:200: md5_finish_ctx (&ctx, digest); /mutt-1.5.19/mutt.h:222: M_CRYPT_ENCRYPT, /mutt-1.5.19/mutt.h:235:#ifdef USE_SSL_OPENSSL /mutt-1.5.19/mutt.h:236: M_NEW_SSL_SOCKET, /mutt-1.5.19/mutt.h:276:#if defined(USE_SSL) /mutt-1.5.19/mutt.h:365:#if defined(USE_SSL) /mutt-1.5.19/mutt.h:366:# ifndef USE_SSL_GNUTLS /mutt-1.5.19/mutt.h:369:# endif /* USE_SSL_GNUTLS */ /mutt-1.5.19/mutt.h:373:#endif /* defined(USE_SSL) */ /mutt-1.5.19/mutt.h:666: S/MIME signed-data correctly, /mutt-1.5.19/mutt.h:677: unsigned int goodsig : 1; /* good cryptographic signature */ /mutt-1.5.19/mutt.h:678: unsigned int warnsig : 1; /* maybe good signature */ /mutt-1.5.19/mutt.h:679: unsigned int badsig : 1; /* bad cryptographic signature (needed to check encrypted s/mime-signatures) */ /mutt-1.5.19/mutt.h:908:#define M_VERIFY (1<<1) /* perform signature verification */ /mutt-1.5.19/copy.h:31:#define M_CM_DECODE_SMIME (1<<10) /* used for decoding S/MIME messages */ /mutt-1.5.19/copy.h:34:#define M_CM_VERIFY (1<<11) /* do signature verification */ /mutt-1.5.19/main.c:271:#ifdef USE_SSL_OPENSSL /mutt-1.5.19/main.c:272: "+USE_SSL_OPENSSL " /mutt-1.5.19/main.c:274: "-USE_SSL_OPENSSL " /mutt-1.5.19/main.c:277:#ifdef USE_SSL_GNUTLS /mutt-1.5.19/main.c:278: "+USE_SSL_GNUTLS " /mutt-1.5.19/main.c:280: "-USE_SSL_GNUTLS "