#set	pgp_autosign
#set	pgp_replysign
set	pgp_replyencrypt
set	pgp_replysignencrypted
#set	pgp_sign_as=0x25484EBB
#set	pgp_sign_micalg=pgp-sha1

#      whether to rely on gpg-agent(1) to handle passphrase prompts
#      (make sure to enable it if you use GnuPG 2)
set    pgp_use_gpg_agent=no

#	decode application/pgp
set	pgp_decode_command="gpg --status-fd=2 %?p?--passphrase-fd 0? -q --batch --output - --no-tty %f"

#	verify a pgp/mime signature
set	pgp_verify_command="gpg --status-fd=2 -q --batch --no-verbose -o - --no-tty --verify %s %f"

#	decrypt a pgp/mime attachment
set	pgp_decrypt_command="gpg --status-fd=2 %?p?--passphrase-fd 0? -q --batch --output - --no-tty %f"

# create a pgp/mime signed attachment
set	pgp_sign_command="gpg -q --batch --output - --no-tty %?p?--passphrase-fd 0? --armor --detach-sign --textmode %?a?-u %a? %f"

# create a application/pgp signed (old-style) message
set	pgp_clearsign_command="gpg -q --batch --output - --no-tty %?p?--passphrase-fd 0? --armor --textmode --clearsign %?a?-u %a? %f"

# create a pgp/mime encrypted attachment
set	pgp_encrypt_only_command="pgpewrap gpg -q --batch --output - --no-tty --encrypt --textmode --armor --always-trust -- -r %r -- %f"

# create a pgp/mime encrypted and signed attachment
set	pgp_encrypt_sign_command="pgpewrap gpg %?p?--passphrase-fd 0? -q --batch --output - --no-tty --encrypt --sign %?a?-u %a? --armor --always-trust -- -r %r -- %f"

# import a key into the public key ring
set	pgp_import_command="gpg -q --import -q %f"

# export a key from the public key ring
set	pgp_export_command="gpg -q --export --armor %r"

# verify a key
set	pgp_verify_key_command="gpg -q --batch --output - --no-tty --fingerprint --check-sigs %r"

# read in the public key ring
set	pgp_list_pubring_command="gpg -q --batch --output - --no-tty --with-colons --list-keys %r"

# read in the secret key ring
set	pgp_list_secring_command="gpg -q --batch --output - --no-tty --with-colons --list-secret-keys %r"

#	check the status file descriptor of decrypt/decode
set	pgp_check_gpg_decrypt_status_fd

#	check the status file descriptor of verify
set	pgp_good_sign="^\\[GNUPG:\\] GOODSIG"
