Can't install GPG GPA in FreeBSD: GTK install fails if using X Windows

Bernhard Reiter bernhard@intevation.de
Wed Jun 13 11:28:01 2001


--3uo+9/B/ebqu+fSQ
Content-Type: multipart/mixed; boundary="BOKacYhQ+x31HxR3"
Content-Disposition: inline


--BOKacYhQ+x31HxR3
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

On Tue, Jun 12, 2001 at 08:51:36PM +1200, Craig Carey wrote:


> Getting Mutt to allow Gpg to encrypt the contents of an
> outgoing e-mail message is not obvious. Can some documentation
> on that be put online?.
In the new mutt variants I remember having an example .muttrc which actually deals with this, called gpg.rc. I have attached the relevant part of a working .muttrc. Bernhard --=20 Professional Service around Free Software (intevation.net) = =20 The FreeGIS Project (freegis.org) Association for a Free Informational Infrastructure (ffii.org) FSF Europe (fsfeurope.org) --BOKacYhQ+x31HxR3 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: attachment; filename=".muttrc" Content-Transfer-Encoding: quoted-printable #decode attachments and encrypted mail, before applying search pattern set thorough_search=3Dyes # The number of seconds after which a cached passphrase will expire if # not used. set pgp_timeout=3D1200 # set pgp_default_version=3Dgpg set pgp_autosign=3Dyes set pgp_replyencrypt=3Dyes set pgp_sign_micalg=3Dpgp-sha1 ########################################################################### # Verschl=FCsselung mit gpg, neue mutt Version 1.2.2 ########################################################################### # Aus der Beispiel gpg.rc Datei von mutt v1.2.2I # $Id: gpg.rc,v 1.5.2.1 2000/05/23 08:15:02 roessler Exp $ # # %p The empty string when no passphrase is needed, # the string "PGPPASSFD=3D0" if one is needed. # # This is mostly used in conditional % sequences. # # %f Most PGP commands operate on a single file or a file # containing a message. %f expands to this file's name. # # %s When verifying signatures, there is another temporary file # containing the detached signature. %s expands to this # file's name. # # %a In "signing" contexts, this expands to the value of the # configuration variable $pgp_sign_as. You probably need to # use this within a conditional % sequence. # # %r In many contexts, mutt passes key IDs to pgp. %r expands to # a list of key IDs. # decode application/pgp set pgp_decode_command=3D"gpg %?p?--passphrase-fd 0? --no-verbose --batch -= -output - %f" # verify a pgp/mime signature set pgp_verify_command=3D"gpg --no-verbose --batch --output - --verify %s %= f" # decrypt a pgp/mime attachment set pgp_decrypt_command=3D"gpg --passphrase-fd 0 --no-verbose --batch --out= put - %f" # create a pgp/mime signed attachment # set pgp_sign_command=3D"gpg-2comp --no-verbose --batch --output - --passp= hrase-fd 0 --armor --detach-sign --textmode %?a?-u %a? %f" set pgp_sign_command=3D"gpg --no-verbose --batch --output - --passphrase-fd= 0 --armor --detach-sign --textmode %?a?-u %a? %f" # create a application/pgp signed (old-style) message # set pgp_clearsign_command=3D"gpg-2comp --no-verbose --batch --output - --= passphrase-fd 0 --armor --textmode --clearsign %?a?-u %a? %f" set pgp_clearsign_command=3D"gpg --no-verbose --batch --output - --passphra= se-fd 0 --armor --textmode --clearsign %?a?-u %a? %f" # create a pgp/mime encrypted attachment # set pgp_encrypt_only_command=3D"pgpewrap gpg-2comp -v --batch --output - = --encrypt --textmode --armor --always-trust -- -r %r -- %f" set pgp_encrypt_only_command=3D"pgpewrap gpg -v --batch --output - --encryp= t --textmode --armor --always-trust -- -r %r -- %f" # create a pgp/mime encrypted and signed attachment # set pgp_encrypt_sign_command=3D"pgpewrap gpg-2comp --passphrase-fd 0 -v -= -batch --output - --encrypt --sign %?a?-u %a? --armor --always-trust -- -r = %r -- %f" set pgp_encrypt_sign_command=3D"pgpewrap gpg --passphrase-fd 0 -v --batch -= -output - --encrypt --sign %?a?-u %a? --armor --always-trust -- -r %r -- %f" # import a key into the public key ring set pgp_import_command=3D"gpg --no-verbose --import -v %f" # export a key from the public key ring set pgp_export_command=3D"gpg --no-verbose --export --armor %r" # verify a key set pgp_verify_key_command=3D"gpg --no-verbose --batch --fingerprint --chec= k-sigs %r" # read in the public key ring set pgp_list_pubring_command=3D"gpg --no-verbose --batch --with-colons --li= st-keys %r" # read in the secret key ring set pgp_list_secring_command=3D"gpg --no-verbose --batch --with-colons --li= st-secret-keys %r" # receive key from keyserver: #set pgp_getkeys_command=3D"wrap.sh -g %r" set pgp_getkeys_command=3D"" --BOKacYhQ+x31HxR3-- --3uo+9/B/ebqu+fSQ Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.4 (GNU/Linux) Comment: Weitere Infos: siehe http://www.gnupg.org iEYEARECAAYFAjsnMa4ACgkQh9ag3dpKERbKUACeNd2r8yJLxIW0leOs6MRs4m7k rkwAoIw/fO9EXAjPuKZUKNMKMsplToD4 =ibJW -----END PGP SIGNATURE----- --3uo+9/B/ebqu+fSQ--