Next: Selecting an implementation, Up: How to use [Contents][Index]
At this time you can use some cryptographic commands. The
behavior of these commands relies on a fashion of invocation
because they are also intended to be used as library functions.
In case you don’t have the signer’s public key, for
example, the function pgg-verify-region fails
immediately, but if the function had been called interactively,
it would ask you to retrieve the signer’s public key from
the server.
Encrypt the current region between start and end for recipients. When the function were called interactively, you would be asked about the recipients.
If encryption is successful, it replaces the current region contents (in the accessible portion) with the resulting data.
If optional argument sign is
non-nil, the function is request to do a
combined sign and encrypt. This currently is confirmed to
work with GnuPG, but might not work with PGP or PGP5.
If optional passphrase is nil, the
passphrase will be obtained from the passphrase cache or
user.
Encrypt the current region between start and end using a symmetric cipher. After invocation you are asked for a passphrase.
If optional passphrase is nil, the
passphrase will be obtained from the passphrase cache or
user.
symmetric-cipher encryption is currently only implemented for GnuPG.
Decrypt the current region between start and end. If decryption is successful, it replaces the current region contents (in the accessible portion) with the resulting data.
If optional passphrase is nil, the
passphrase will be obtained from the passphrase cache or
user.
Make the signature from text between start and
end. If the optional third argument
cleartext is non-nil, or the function
is called interactively, it does not create a detached
signature. In such a case, it replaces the current region
contents (in the accessible portion) with the resulting
data.
If optional passphrase is nil, the
passphrase will be obtained from the passphrase cache or
user.
Verify the current region between start and
end. If the optional third argument
signature is non-nil, it is treated
as the detached signature file of the current region.
If the optional 4th argument fetch is
non-nil, or the function is called
interactively, we attempt to fetch the signer’s public
key from the key server.
Retrieve the user’s public key and insert it as ASCII-armored format.
Collect public keys in the current region between start and end, and add them into the user’s keyring.
Next: Selecting an implementation, Up: How to use [Contents][Index]