#define KEYFLAG_ABILITIES (KEYFLAG_CANSIGN|KEYFLAG_CANENCRYPT|KEYFLAG_PREFER_ENCRYPTION|KEYFLAG_PREFER_SIGNING)
-/*-- new API --*/
-
-void crypt_invoke_import(FILE *stream, int smime);
int crypt_send_menu(HEADER *msg, int *redraw, int smime);
-int crypt_verify_one(BODY *, STATE *s, FILE *fp, int smime);
-
-
-/*-- crypt.c --*/
-
int mutt_protect (HEADER *, char *);
int mutt_signed_handler (BODY *, STATE *);
int mutt_parse_crypt_hdr (char *, int);
-void convert_to_7bit (BODY *);
/* Check out the type of encryption used and set the cached status
values if there are any. */
/* Generate a PGP public key attachment. */
BODY *crypt_pgp_make_key_attachment (char *tempf);
-/* Create a new body with a PGP signed message from A. */
-BODY *crypt_pgp_sign_message (BODY * a);
-
-/* Warning: A is no longer freed in this routine, you need to free it
- later. This is necessary for $fcc_attach. */
-BODY *crypt_pgp_encrypt_message (BODY * a, char *keylist, int sign);
-
/* fixme: needs documentation */
void crypt_pgp_extract_keys_from_attachment_list (FILE * fp, int tag,
BODY * top);
/* Check that the sender matches. */
int crypt_smime_verify_sender (HEADER * h);
-/* fixme: Needs documentation. */
-BODY *crypt_smime_sign_message (BODY * a);
-
-/* fixme: needs documentation. */
-BODY *crypt_smime_build_smime_entity (BODY * a, char *certlist);
-
#endif /*MUTT_CRYPT_H */