102 { NULL, NULL, 0, -1, -1, NULL }
111 {
"crypt_confirm_hook",
DT_BOOL,
true, 0, NULL,
112 "Prompt the user to confirm keys before use"
114 {
"crypt_opportunistic_encrypt",
DT_BOOL,
false, 0, NULL,
115 "Enable encryption when the recipient's key is available"
117 {
"crypt_opportunistic_encrypt_strong_keys",
DT_BOOL,
false, 0, NULL,
118 "Enable encryption only when strong a key is available"
120 {
"crypt_protected_headers_read",
DT_BOOL,
true, 0, NULL,
121 "Display protected headers (Memory Hole) in the pager"
123 {
"crypt_protected_headers_subject",
DT_STRING,
IP "...", 0, NULL,
124 "Use this as the subject for encrypted emails"
126 {
"crypt_protected_headers_weed",
DT_BOOL,
false, 0, NULL,
127 "Controls whether NeoMutt will weed protected header fields"
129 {
"crypt_protected_headers_write",
DT_BOOL,
true, 0, NULL,
130 "Generate protected header (Memory Hole) for signed and encrypted emails"
132 {
"crypt_encryption_info",
DT_BOOL,
true, 0, NULL,
133 "Add an informative block with details about the encryption"
135 {
"crypt_timestamp",
DT_BOOL,
true, 0, NULL,
136 "Add a timestamp to PGP or SMIME output to prevent spoofing"
138 {
"envelope_from_address",
DT_ADDRESS, 0, 0, NULL,
139 "Manually set the sender for outgoing messages"
141 {
"pgp_auto_inline",
DT_BOOL,
false, 0, NULL,
142 "Use old-style inline PGP messages (not recommended)"
144 {
"pgp_default_key",
DT_STRING, 0, 0, NULL,
145 "Default key to use for PGP operations"
148 "printf-like format string for the PGP key selection menu"
150 {
"pgp_ignore_subkeys",
DT_BOOL,
true, 0, NULL,
151 "Only use the principal PGP key"
153 {
"pgp_long_ids",
DT_BOOL,
true, 0, NULL,
154 "Display long PGP key IDs to the user"
157 "Prompt the user to use MIME if inline PGP fails"
159 {
"pgp_retainable_sigs",
DT_BOOL,
false, 0, NULL,
160 "Create nested multipart/signed or encrypted messages"
162 {
"pgp_self_encrypt",
DT_BOOL,
true, 0, NULL,
163 "Encrypted messages will also be encrypted to $pgp_default_key too"
165 {
"pgp_show_unusable",
DT_BOOL,
true, 0, NULL,
166 "Show non-usable keys in the key selection"
169 "Use this alternative key for signing messages"
172 "Sort order for PGP keys"
174 {
"pgp_strict_enc",
DT_BOOL,
true, 0, NULL,
175 "Encode PGP signed messages with quoted-printable (don't unset)"
177 {
"smime_default_key",
DT_STRING, 0, 0, NULL,
178 "Default key for SMIME operations"
180 {
"smime_encrypt_with",
DT_STRING,
IP "aes256", 0, NULL,
181 "Algorithm for encryption"
183 {
"smime_self_encrypt",
DT_BOOL,
true, 0, NULL,
184 "Encrypted messages will also be encrypt to $smime_default_key too"
186 {
"smime_sign_as",
DT_STRING, 0, 0, NULL,
187 "Use this alternative key for signing messages"
189 {
"smime_is_default",
DT_BOOL,
false, 0, NULL,
190 "Use SMIME rather than PGP by default"
192 {
"pgp_auto_decode",
DT_BOOL,
false, 0, NULL,
193 "Automatically decrypt PGP messages"
196 "Verify PGP or SMIME signatures"
198 {
"crypt_protected_headers_save",
DT_BOOL,
false, 0, NULL,
199 "Save the cleartext Subject with the headers"
202 {
"crypt_confirmhook",
DT_SYNONYM,
IP "crypt_confirm_hook",
IP "2021-02-11" },
203 {
"pgp_autoinline",
DT_SYNONYM,
IP "pgp_auto_inline",
IP "2021-02-11" },
204 {
"pgp_create_traditional",
DT_SYNONYM,
IP "pgp_auto_inline",
IP "2004-04-12" },
205 {
"pgp_self_encrypt_as",
DT_SYNONYM,
IP "pgp_default_key",
IP "2018-01-11" },
206 {
"pgp_verify_sig",
DT_SYNONYM,
IP "crypt_verify_sig",
IP "2002-01-24" },
207 {
"smime_self_encrypt_as",
DT_SYNONYM,
IP "smime_default_key",
IP "2018-01-11" },
216#if defined(CRYPT_BACKEND_GPGME)
223 "Use GPGME crypto backend"
225 {
"crypt_use_pka",
DT_BOOL,
false, 0, NULL,
226 "Use GPGME to use PKA (lookup PGP keys using DNS)"
233#if defined(CRYPT_BACKEND_CLASSIC_PGP)
259 { NULL, NULL, 0, -1, -1, NULL }
264#if defined(CRYPT_BACKEND_CLASSIC_SMIME)
290 { NULL, NULL, 0, -1, -1, NULL }
295#if defined(CRYPT_BACKEND_CLASSIC_PGP)
301 {
"pgp_check_exit",
DT_BOOL,
true, 0, NULL,
302 "Check the exit code of PGP subprocess"
304 {
"pgp_check_gpg_decrypt_status_fd",
DT_BOOL,
true, 0, NULL,
305 "File descriptor used for status info"
308 "(pgp) External command to inline-sign a message"
311 "(pgp) External command to decode a PGP attachment"
314 "(pgp) External command to decrypt a PGP message"
316 {
"pgp_decryption_okay",
DT_REGEX, 0, 0, NULL,
317 "Text indicating a successful decryption"
320 "(pgp) External command to encrypt, but not sign a message"
323 "(pgp) External command to encrypt and sign a message"
326 "(pgp) External command to export a public key from the user's keyring"
329 "(pgp) External command to download a key for an email address"
331 {
"pgp_good_sign",
DT_REGEX, 0, 0, NULL,
332 "Text indicating a good signature"
335 "(pgp) External command to import a key into the user's keyring"
338 "(pgp) External command to list the public keys in a user's keyring"
341 "(pgp) External command to list the private keys in a user's keyring"
344 "(pgp) External command to create a detached PGP signature"
347 "Time in seconds to cache a passphrase"
349 {
"pgp_use_gpg_agent",
DT_BOOL,
true, 0, NULL,
350 "Use a PGP agent for caching passwords"
353 "(pgp) External command to verify PGP signatures"
356 "(pgp) External command to verify key information"
358 {
"pgp_clearsign_command",
DT_SYNONYM,
IP "pgp_clear_sign_command",
IP "2021-02-11" },
359 {
"pgp_getkeys_command",
DT_SYNONYM,
IP "pgp_get_keys_command",
IP "2021-02-11" },
365#if defined(CRYPT_BACKEND_CLASSIC_SMIME)
371 {
"smime_ask_cert_label",
DT_BOOL,
true, 0, NULL,
372 "Prompt the user for a label for SMIME certificates"
375 "File containing trusted certificates"
378 "File containing user's public certificates"
381 "(smime) External command to decrypt an SMIME message"
383 {
"smime_decrypt_use_default_key",
DT_BOOL,
true, 0, NULL,
384 "Use the default key for decryption"
387 "(smime) External command to encrypt a message"
390 "(smime) External command to extract a certificate from a message"
393 "(smime) External command to get a certificate for an email"
396 "(smime) External command to extract a certificate from an email"
399 "(smime) External command to import a certificate"
402 "File containing user's private certificates"
405 "(smime) External command to extract a public certificate"
408 "(smime) External command to sign a message"
410 {
"smime_sign_digest_alg",
DT_STRING,
IP "sha256", 0, NULL,
414 "Time in seconds to cache a passphrase"
417 "(smime) External command to verify a signed message"
420 "(smime) External command to verify a signature"
434#if defined(CRYPT_BACKEND_GPGME)
438#if defined(CRYPT_BACKEND_CLASSIC_PGP)
442#if defined(CRYPT_BACKEND_CLASSIC_SMIME)
Convenience wrapper for the config headers.
bool cs_register_variables(const struct ConfigSet *cs, struct ConfigDef vars[])
Register a set of config items.
@ E_TYPE_STRING
Data is a string.
@ E_TYPE_NUMBER
Data is numeric.
uint8_t ExpandoParserFlags
Flags for expando_parse(), e.g. EP_CONDITIONAL.
#define EP_CONDITIONAL
Expando is being used as a condition.
@ ED_PGP_CMD
Pgp Command ED_PGC_ ExpandoDataPgpCmd.
@ ED_SMIME_CMD
Smime Command ED_SMI_ ExpandoDataSmimeCmd.
@ ED_PGP
Pgp ED_PGP_ ExpandoDataPgp.
@ ED_GLOBAL
Global ED_GLO_ ExpandoDataGlobal.
@ ED_PGP_KEY
Pgp_Key ED_PGK_ ExpandoDataPgpKey.
bool config_init_ncrypt(struct ConfigSet *cs)
Register ncrypt config variables - Implements module_init_config_t -.
struct ExpandoNode * node_padding_parse(const char *str, int did, int uid, ExpandoParserFlags flags, const char **parsed_until, struct ExpandoParseError *err)
Parse a Padding Expando - Implements ExpandoDefinition::parse() -.
struct ExpandoNode * node_conddate_parse(const char *str, int did, int uid, const char **parsed_until, struct ExpandoParseError *err)
Parse a CondDate format string - Implements ExpandoDefinition::parse() -.
struct ExpandoNode * parse_pgp_date(const char *str, int did, int uid, ExpandoParserFlags flags, const char **parsed_until, struct ExpandoParseError *err)
Parse a Date Expando - Implements ExpandoDefinition::parse() -.
Convenience wrapper for the library headers.
static const struct ExpandoDefinition SmimeCommandFormatDef[]
Expando definitions.
static struct ConfigDef NcryptVarsPgp[]
PGP Config definitions for the encryption library.
static const struct ExpandoDefinition PgpEntryFormatDef[]
Expando definitions.
static struct ConfigDef NcryptVarsSmime[]
SMIME Config definitions for the encryption library.
static const struct Mapping SortKeyMethods[]
Sort methods for encryption keys.
static struct ConfigDef NcryptVars[]
Config definitions for the encryption library.
static const struct ExpandoDefinition PgpCommandFormatDef[]
Expando definitions.
static struct ConfigDef NcryptVarsGpgme[]
GPGME Config definitions for the encryption library.
@ ED_PGP_NUMBER
PgpEntry.num.
@ ED_PGP_USER_ID
PgpUid.addr.
@ ED_PGP_TRUST
PgpUid, TrustFlags.
struct ExpandoNode * node_expando_parse_enclosure(const char *str, int did, int uid, char terminator, const char **parsed_until, struct ExpandoParseError *err)
Parse an enclosed Expando.
PGP sign, encrypt, check routines.
@ ED_PGC_KEY_IDS
PgpCommandContext.ids.
@ ED_PGC_FILE_SIGNATURE
PgpCommandContext.sig_fname.
@ ED_PGC_NEED_PASS
PgpCommandContext.need_passphrase.
@ ED_PGC_SIGN_AS
PgpCommandContext.signas.
@ ED_PGC_FILE_MESSAGE
PgpCommandContext.fname.
Misc PGP helper routines.
@ ED_PGK_KEY_CAPABILITIES
PgpKeyInfo.flags, pgp_key_abilities()
@ ED_PGK_KEY_FINGERPRINT
PgpKeyInfo.fingerprint.
@ ED_PGK_PKEY_LENGTH
pgp_principal_key(), PgpKeyInfo.keylen
@ ED_PGK_PKEY_ALGORITHM
pgp_principal_key(), PgpKeyInfo.algorithm
@ ED_PGK_DATE
PgpKeyInfo.gen_time.
@ ED_PGK_PKEY_FINGERPRINT
pgp_principal_key(), PgpKeyInfo.fingerprint
@ ED_PGK_KEY_ID
PgpKeyInfo, pgp_this_keyid()
@ ED_PGK_PROTOCOL
PgpKeyInfo.
@ ED_PGK_PKEY_CAPABILITIES
pgp_principal_key(), PgpKeyInfo.flags, pgp_key_abilities()
@ ED_PGK_KEY_FLAGS
PgpKeyInfo.kflags, pgp_flags()
@ ED_PGK_PKEY_ID
pgp_principal_key(), PgpKeyInfo, pgp_this_keyid()
@ ED_PGK_KEY_ALGORITHM
PgpKeyInfo.algorithm.
@ ED_PGK_KEY_LENGTH
PgpKeyInfo.keylen.
@ ED_PGK_PKEY_FLAGS
pgp_principal_key(), PgpKeyInfo.kflags, pgp_flags()
@ MUTT_ASKYES
Ask the user, defaulting to 'Yes'.
@ MUTT_YES
User answered 'Yes', or assume 'Yes'.
@ ED_SMI_MESSAGE_FILE
SmimeCommandContext.fname.
@ ED_SMI_ALGORITHM
SmimeCommandContext.cryptalg.
@ ED_SMI_SIGNATURE_FILE
SmimeCommandContext.sig_fname.
@ ED_SMI_DIGEST_ALGORITHM
SmimeCommandContext.digestalg.
@ ED_SMI_CERTIFICATE_IDS
SmimeCommandContext.certificates.
@ ED_SMI_KEY
SmimeCommandContext.key.
@ ED_SMI_INTERMEDIATE_IDS
SmimeCommandContext.intermediates.
@ SORT_TRUST
Sort by encryption key's trust level.
@ SORT_KEYID
Sort by the encryption key's ID.
@ SORT_DATE
Sort by the date the email was sent.
@ SORT_ADDRESS
Sort by email address.
Container for lots of config items.
Definition of a format string.
int uid
Unique ID, e.g. ED_EMA_SIZE.
int did
Domain ID, e.g. ED_EMAIL.
Buffer for parsing errors.
Mapping between user-readable string and a constant.
#define D_INTERNAL_DEPRECATED
Config item shouldn't be used any more.
#define D_STRING_COMMAND
A command.
#define D_PATH_DIR
Path is a directory.
#define D_PATH_FILE
Path is a file.
@ DT_QUAD
quad-option (no/yes/ask-no/ask-yes)
@ DT_SYNONYM
synonym for another variable
@ DT_ADDRESS
e-mail address
@ DT_REGEX
regular expressions
@ DT_PATH
a path to a file/directory
#define D_SORT_REVERSE
Sort flag for -reverse prefix.
#define D_NOT_EMPTY
Empty strings are not allowed.
#define D_INTEGER_NOT_NEGATIVE
Negative numbers are not allowed.
#define D_ON_STARTUP
May only be set at startup.
@ ED_GLO_PADDING_EOL
Padding to end-of-line.
@ ED_GLO_CERTIFICATE_PATH
Path of Smime certificates.
@ ED_GLO_PADDING_HARD
Hard Padding.
@ ED_GLO_PADDING_SOFT
Soft Padding.