if test x"$enable_gpgme" = xyes; then
AC_MSG_RESULT(yes)
- AM_PATH_GPGME(1.0.0, AC_DEFINE(CRYPT_BACKEND_GPGME, 1,
+ AM_PATH_GPGME(1.2.0, AC_DEFINE(CRYPT_BACKEND_GPGME, 1,
[Defined, if GPGME support is enabled]),
[gpgme_found=no])
if test x"$gpgme_found" = xno; then
- AC_MSG_ERROR([*** GPGME not found ***])
+ AC_MSG_ERROR([*** GPGME not found or version is older than 1.2 ***])
else
- AM_PATH_GPGME(1.1.1, AC_DEFINE(HAVE_GPGME_PKA_TRUST, 1,
- [Define if GPGME supports PKA]))
- #needed to get GPGME_LIBS and al correctly
- AM_PATH_GPGME(1.0.0, AC_DEFINE(CRYPT_BACKEND_GPGME, 1,
- [Define if you use GPGME to support OpenPGP]))
- dnl AC_CHECK_FUNCS([gpgme_op_export_keys])
- saved_LIBS="$LIBS"
- LIBS="$LIBS $GPGME_LIBS"
- AC_CHECK_FUNCS([gpgme_op_export_keys])
- LIBS="$saved_LIBS"
MUTT_LIB_OBJECTS="$MUTT_LIB_OBJECTS crypt-gpgme.o crypt-mod-pgp-gpgme.o crypt-mod-smime-gpgme.o"
fi
else
state_puts ("\n", s);
}
-#ifdef HAVE_GPGME_PKA_TRUST
-
if (option (OPTCRYPTUSEPKA))
{
if (sig->pka_trust == 1 && sig->pka_address)
}
}
-#endif
-
return severe;
}
return find_keys (adrlist, APPLICATION_SMIME, oppenc_mode);
}
-#ifdef HAVE_GPGME_OP_EXPORT_KEYS
BODY *pgp_gpgme_make_key_attachment (char *tempf)
{
crypt_key_t *key = NULL;
return att;
}
-#endif
/*
* Implementation of `init'.
crypt_mod_pgp_sign_message,
crypt_mod_pgp_verify_one,
crypt_mod_pgp_send_menu,
- NULL,
+ NULL, /* (set_sender) */
crypt_mod_pgp_encrypt_message,
crypt_mod_pgp_make_key_attachment,
return pgp_gpgme_encrypt_message (a, keylist, sign);
}
-#ifdef HAVE_GPGME_OP_EXPORT_KEYS
static BODY *crypt_mod_pgp_make_key_attachment (char *tempf)
{
return pgp_gpgme_make_key_attachment (tempf);
}
-#endif
static void crypt_mod_pgp_set_sender (const char *sender)
{
/* PGP specific. */
crypt_mod_pgp_encrypt_message,
-#ifdef HAVE_GPGME_OP_EXPORT_KEYS
crypt_mod_pgp_make_key_attachment,
-#else
- NULL,
-#endif
crypt_mod_pgp_check_traditional,
NULL, /* pgp_traditional_encryptsign */
NULL, /* pgp_invoke_getkeys */