At this time you can use some cryptographic commands. The
behavior of these commands relies on a fashion of invocation
because they are also intended to be used as library functions.
In case you don't have the signer's public key, for example, the
function pgg-verify-region fails immediately, but if
the function had been called interactively, it would ask you to
retrieve the signer's public key from the server.
Encrypt the current region between start and end for recipients. When the function were called interactively, you would be asked about the recipients.
If encryption is successful, it replaces the current region contents (in the accessible portion) with the resulting data.
If optional argument sign is non-
nil, the function is request to do a combined sign and encrypt. This currently is confirmed to work with GnuPG, but might not work with PGP or PGP5.If optional passphrase is
nil, the passphrase will be obtained from the passphrase cache or user.
Encrypt the current region between start and end using a symmetric cipher. After invocation you are asked for a passphrase.
If optional passphrase is
nil, the passphrase will be obtained from the passphrase cache or user.symmetric-cipher encryption is currently only implemented for GnuPG.
Decrypt the current region between start and end. If decryption is successful, it replaces the current region contents (in the accessible portion) with the resulting data.
If optional passphrase is
nil, the passphrase will be obtained from the passphrase cache or user.
Make the signature from text between start and end. If the optional third argument cleartext is non-
nil, or the function is called interactively, it does not create a detached signature. In such a case, it replaces the current region contents (in the accessible portion) with the resulting data.If optional passphrase is
nil, the passphrase will be obtained from the passphrase cache or user.
Verify the current region between start and end. If the optional third argument signature is non-
nil, it is treated as the detached signature file of the current region.If the optional 4th argument fetch is non-
nil, or the function is called interactively, we attempt to fetch the signer's public key from the key server.