X-Git-Url: http://git.chise.org/gitweb/?a=blobdiff_plain;f=pgg-ja.texi;h=6546736a6940a4827948a8b28bba7c15d2f10e59;hb=150d672f22f6506fb498ec0429a20a063fc2caf1;hp=b81b38f86e9e02d07b9bec5cb27552d642f65b59;hpb=3521dedd76dc03b7820522bfbb259033d75223cc;p=elisp%2Fgnus-doc-ja.git diff --git a/pgg-ja.texi b/pgg-ja.texi index b81b38f..6546736 100644 --- a/pgg-ja.texi +++ b/pgg-ja.texi @@ -1,40 +1,50 @@ \input texinfo @c -*-texinfo-*- @setfilename pgg-ja +@settitle PGG @value{VERSION} +@iftex +@firstparagraphindent insert +@end iftex @set VERSION 0.1 - @copying -This file describes the PGG. +$B$3$N%U%!%$%k$OMM!9$J(B PGP $B$Nr7o$N2<$GJ#@=!"G[I[!"$"$k$$$OJQ99$9(B -$B$k$3$H$r5v2D$7$^$9!#JQ99IT2DItJ,!"I=I=;f%F%-%9%H$*$h$SN"I=;f%F%-%9%H$O;X(B -$BDj$7$^$;$s!#$3$NMxMQ5vBz7@Ls=q$NJ#O$K4^$^$l$F$$$^$9!#(B +$BBh(B 1.3 $BHG$^$?$O$=$l0J9_$NHG$,Dj$a$k>r7o$N2<$GJ#@=!"G[I[!"$"$k$$$OJQ99$9(B +$B$k$3$H$r5v2D$7$^$9!#JQ99IT2DItJ,$O;XDj$7$^$;$s!#!H(BA GNU Manual$B!I$OI=I=;f(B +$B%F%-%9%H!"0J2<$N(B (a) $B$ON"I=;f%F%-%9%H$G$9!#$3$NMxMQ5vBz7@Ls=q$NJ#O$K4^$^$l$F$$$^$9!#(B + +(a) The FSF's Back-Cover Text is: ``You have the freedom to copy and +modify this GNU manual. Buying copies from the FSF supports it in +developing GNU and promoting software freedom.'' + +(a) FSF $B$NN"I=;f%F%-%9%H(B:$B!V$"$J$?$K$O$3$N(B GNU Manual $B$rJ#@=$7$?$jJQ99$9(B +$B$k<+M3$,$"$j$^$9!#(BFSF $B$+$i$NJ#!"8!>Z$N$?$a$NC1=c$J%f!<%6%$%s%?%U%'!<%9$bDs6!$7$^(B -$B$9!#(B + +PGG $B$O!"0BA4$JDL?.$N$?$a$NMM!9$J%D!<%k$H(B Emacs $B$NCg$r$H8!>Z$N$?$a(B +$B$NC1=c$J%f!<%6!<%$%s%?%U%'!<%9$bDs6!$7$^$9!#(B + +@ifnottex +@insertcopying +@end ifnottex @menu * Overview:: PGG $B$H$O(B @@ -59,53 +74,64 @@ Emacs $B$NCg$roMQ$$$i$l$k(B detached PGP $B%a%C%;!<%8$roMQ$$$i$l$kJ,N%$5$l$?(B PGP $B%a%C%;!<%8$rr7o(B + +PGG $B$r;H$&$?$a$K$O!">/$J$/$H$b0l$D$N%W%i%$%P%7!/$J$/$H$b(B1$B$D$N%W%i%$%P%7!Dj$7$^$9!#(B +$B%G%#%U%)%k%H$G$O(B PGG $B$O(B GnuPG $B$r;H$$$^$9!#$=$N$h$&$J%7%9%F%`$K47$l$F$$$J(B +$B$$$N$G$"$l$P!"(B@uref{http://www.gnupg.org/documentation/} $B$K$"$k(B GNU +Privacy Handbook (GPH) $B$KL\$rDL$9$3$H$r4+$a$^$9!#(B -$B%G%#%U%)%k%H$G$O!"(BPGG $B$O(B GnuPG $B$r;H$$$^$9!#$7$+$7!"(BPGP (Pretty Good -Privacy) $B$N%P!<%8%g%s(B2$B$^$?$O(B5$B$b%5%]!<%H$7$^$9!#$b$7!"$"$J$?$,$3$N$h$&$J(B -$B%7%9%F%`$K47$l$F$$$J$$$N$G$"$l$P!"(BGNU Privacy Handbook (GPH) $B$r@h$KFI$^(B -$B$l$k$3$H$r$*A&$a$7$^$9!#(BGPH $B$O!"(B@uref{http://www.gnupg.org/gph/} $B$G8+$k(B -$B$3$H$,$G$-$^$9!#(B +GnuPG $B$r;H$&>l9g$K$O(B @code{gpg-agent} $B$NMxMQ$r?d>)$7$^$9!#$=$l$O%P!<%8%g(B +$B%s(B 2.0 $B0J9_$N(B GnuPG $B$H$H$b$KG[I[$5$l$F$$$^$9!#$3$l$O!"$I$s$J%W%m%H%3%k$r(B +$B;H$&$+$H$OL54X78$KHkL)80$r4IM}$9$k%G!<%b%s$G!"%Q%9%U%l!<%:$rF~NO$7$F%-%c%C(B +$B%7%e$9$k$?$a$N:G$b0BA4$Jl9g!"(BPGG $B$O%G%#%U%)%k%H$G(B @code{gpg-agent} $B$r;H$*$&$H(B +$B$7$^$9!#(B@xref{Invoking GPG-AGENT,,,gnupg,Using the GNU Privacy Guard}. + +PGG $B$O(B Pretty Good Privacy $B%P!<%8%g%s(B 2 $B$^$?$O%P!<%8%g%s(B 5 $B$b%5%]!<%H$7(B +$B$^$9!#(B @node How to use -@chapter How to use +@chapter $B;H$$J}(B -$B$3$N%i%$%V%i%j$N:G>e0L%$%s%?%U%'!<%9$O$H$F$bC1=c$G!"8x3+80$K$h$k0E9f$NA`(B -$B:n$N$_$rA[Dj$7$F$$$^$9!#(B +$B$3$N%i%$%V%i%j!<$N:G>e0L%$%s%?%U%'!<%9$O$H$F$bC1=c$G!"8x3+80$K$h$k0E9f$N(B +$BA`:n$N$_$rA[Dj$7$F$$$^$9!#(B -PGG $B$r;H$&$?$a$K$O!"$"$J$?$N%"%W%j%1!<%7%g%s%W%m%0%i%`$NKAF,$G2A$7$^$9!#(B +PGG $B$r;H$&$?$a$K$O!"%"%W%j%1!<%7%g%s%W%m%0%i%`$NKAF,$G2A$7(B +$B$F$/$@$5$$!#(B @lisp (require 'pgg) @end lisp -$B$"$J$?$,(B pgg.el $B$NB8:_$r3NG'$7$?$$$J$i!">e5-$NJ}K!$G$O$J$/0J2<$N$h$&$K!"(B -$BI,MW$J5!G=$K$D$$$F(B autoload $B$N%j%9%H$r@_Dj$9$k$3$H$b$G$-$^$9!#(B +$Be5-$NJ}K!$G$O$J$/0J2<$N$h$&$K!"(B +$BI,MW$J5!G=$N(B autoload $B$r@_Dj$9$k$3$H$b$G$-$^$9!#(B @lisp (autoload 'pgg-encrypt-region "pgg" "Encrypt the current region." t) +(autoload 'pgg-encrypt-symmetric-region "pgg" + "Encrypt the current region with symmetric algorithm." t) (autoload 'pgg-decrypt-region "pgg" "Decrypt the current region." t) (autoload 'pgg-sign-region "pgg" @@ -122,145 +148,227 @@ PGG $B$r;H$&$?$a$K$O!"$"$J$?$N%"%W%j%1!<%7%g%s%W%m%0%i%`$NKAF,$Gl9g$K$O!"%5!<%P!<$+$i8x3+80$r%@%&%s%m!<%I$9$k(B +$B$+$I$&$+$r$"$J$?$K?R$M$^$9!#(B + +@deffn Command pgg-encrypt-region start end recipients &optional sign passphrase +@var{start} $B$H(B @var{end} $B$N4V$NNN0h$r(B @var{recipients} $B08$KAw$k$b$N$H$7(B +$B$F0E9f2=$7$^$9!#BPOCE*$K8F$V$H!"l9g$K$O!"%5!<%P$+$i8x3+80$r%@%&%s%m!<(B -$B%I$9$k$+$I$&$+!"$"$J$?$K3NG'$7$^$9!#(B +$B%*%W%7%g%s0z?t(B @var{sign} $B$,(B @code{nil} $B$G$J$+$C$?$i!"=pL>$H0E9f2=$rF1;~(B +$B$K9T$J$$$^$9!#8=:_$3$N5!G=$O(B GnuPG $B$GF0:n$9$k$3$H$,3NG'$5$l$F$$$^$9$,!"(B +PGP $B$d(B PGP5 $B$G$OF0:n$7$J$$$+$b$7$l$^$;$s!#(B -@deffn Command pgg-encrypt-region start end recipients &optional sign -@var{recipients}$B08$N%a%C%;!<%8$K$D$$$F!"(B@var{start}$B$H(B@var{end}$B$N4V$G;XDj(B -$B$5$l$?8=:_$NHO0O$r0E9f2=$7$^$9!#BPOCE*$K8F$P$l$k$H!"$H0E9f2=$,F1;~$K(B -$B9T$o$l$^$9!#8=:_!"$3$N5!G=$O(B GnuPG $B$G$@$1F0:n$7$^$9!#(B +$B6&DL800E9f$K$h$k0E9f2=$O!"8=:_(B GnuPG $B$@$1$G$7$^$9!#(B3$BHVL\$N%*%W%7%g%s0z?t(B -@var{cleartext} $B$,(B non-@code{nil} $B$G$"$k$+!"$"$k$$$OBPOCE*$K8F$P$l$?>l9g!"(B -detached signature $B$O:n$i$l$^$;$s!#$=$N$h$&$J>l9g!"8=:_$NHO0O$NFbMF$,(B($B2D(B -$BG=$JItJ,$K$D$$$F(B)$B=pL>$5$l$?7k2L$KCV$-49$($i$l$^$9!#(B +@deffn Command pgg-sign-region start end &optional cleartext passphrase +@var{start} $B$H(B @var{end} $B$N4V$N%F%-%9%H$K=pL>$7$^$9!#;0HVL\$N%*%W%7%g%s(B +$B0z?t(B @var{cleartext} $B$,(B @code{nil} $B$G$O$J$$$+!"$"$k$$$OBPOCE*$K8F$P$l$?(B +$B>l9g!"J,N%$5$l$?=pL>$r:n$j$^$;$s!#$=$N$h$&$J>l9g$K$O!"8=:_$NNN0h$NFbMF$r(B +$B=pL>$7$?%G!<%?$GCV$-49$($^$9!#(B + +$B%*%W%7%g%s0z?t(B @var{passphrase} $B$,(B @code{nil} $B$@$C$?$i!"%Q%9%U%l!<%:$N(B +$B%-%c%C%7%e$+$i$+!"$^$?$O%f!<%6!<$KF~NO$7$F$b$i$&$3$H$K$h$C$F%Q%9%U%l!<%:(B +$B$rF@$^$9!#(B @end deffn @deffn Command pgg-verify-region start end &optional signature fetch -@var{start}$B$H(B@var{end}$B$N4V$NHO0O$r8!::$7$^$9!#(B3$BHVL\$N%*%W%7%g%s0z?t(B -@var{signature} $B$,(B non-@code{nil} $B$G$"$k$+!"$"$k$$$OBPOCE*$K8F$P$l$?>l9g!"(B -detached signature $B$H$7$F$r8!>Z$7$^$9!#;0HVL\$N%*%W(B +$B%7%g%s0z?t(B @var{signature} $B$,(B @code{nil} $B$G$J$+$C$?$i!"$=$N0z?t$O8=:_$N(B +$BNN0h$NJ,N%$5$l$?=pL>$N%U%!%$%k$H$7$Fl9g!"8x3+80$r%5!<%P$+$il9g!"8x3+80$r%5!<%P!<$+$i$l$,(B +$B;}$C$F$$$k8D!9$N5!G=$,$:$$$V$s0[$J$C$F$$$k$3$H$,$"$j$^$9!#Nc$((B +$B$P(B GnuPG $B$r;H$C$F$$$k$N$J$i$P!"0E9f%"%k%4%j%:%`$H$7$F(B 3DES $B$d(B CAST5$B!"(B +BLOWFISH $B$J$I$rA*$V$3$H$,$G$-$^$9$,!"(BPGP $B$N%P!<%8%g%s(B 2 $B$O(B IDEA $B$7$+%5%]!<(B +$B%H$7$F$$$^$;$s!#(B + +$B$I$N)$7$^$9!#(B + +@defvar pgg-gpg-use-agent +@code{nil} $B$G$J$$CM$G$O!"2DG=$J>l9g$O>o$K$$$D$G$b(B @code{gpg-agent} $B$r;H(B +$B$*$&$H$7$^$9!#%G%#%U%#%U%)%k%H$O(B @code{t} $B$G$9!#(B@code{gpg-agent} $B$,2TF/(B +$B$7$F$$$J$$$+!"$^$?$O(B GnuPG $B$,8=:_$N(B PGP $Bl9g$O!"(B +PGG $B<+?H$,;}$C$F$$$k%Q%9%U%l!<%:$r%-%c%C%7%e$9$k;EAH$_$,;H$o$l$^$9(B ($B2<5-(B +$B;2>H(B)$B!#(B +@end defvar -PGG uses a simple passphrase caching mechanism, which is enabled by -default. +PGG $B$G(B @code{gpg-agent}$B$r;H$&$K$O!"Bh0l$K(B @code{gpg-agent} $B$,3N\$7$$$3$H$O!"(B@xref{Invoking +GPG-AGENT,,,gnupg,Using the GNU Privacy Guard}. + +GnuPG $B$N%Q%9%U%l!<%:$rI,MW$H$9$k(B PGG $B$N5!G=$ro$3$N%-%c%C%7%e$O0lDj;~4V7P2a8e$K4|8B@Z$l>C5n$5$l$^$9!#$3$l$rJQ99$9(B +$B$k$K$O!"(B@code{gpg-agent} $B$r5/F0$9$k$H$-$K(B @code{--default-cache-ttl} $B%*(B +$B%W%7%g%s$r;H$C$F$/$@$5$$!#(B) + +X Window System $B$N4D6-$G$O(B @code{gpg-agent} $B$O%Q%9%U%l!<%:$NF~NO$rMW5a$9(B +$B$k$?$a$K%0%i%U%#%C%/$J%&%#%s%I%&$r3+$-$^$9!#$7$+$7J8;zCl9g$O!"(B@code{gpg-agent} $B$OCe$GLdBj$,$"$j(B +$B$^$9!#$=$l$,(B Emacs $B$KAw$i$l$F$7$^$&$+$i$G$9!#$3$NLdBj$KBP=h$9$k$?$a$N;C(B +$BDjE*$JBP:v$N$R$H$D$O!"(B@code{gpg-agent} $B$r(B @code{--keep-tty} $B%*%W%7%g%s$H(B +$B$H$b$K(B Emacs $B$H$OJL$NCl9g!"(BPGG $B$O(B Emacs $B$r2p$7$F%Q%9%U%l!<%:$NF~NO(B +$B$rMW5a$7$^$9!#$3$l$K$O%Q%9%U%l!<%:$r%-%c%C%7%e$9$k;EAH$_$,$"$j!"$=$l$OJQ(B +$B?t(B @code{pgg-cache-passphrase} $B$G@)8f$5$l$^$9(B ($B2<5-;2>H(B)$B!#(B + +@code{gpg-agent} $B$G$O$J$/(B PGG $B$G%Q%9%U%l!<%:$r07$&>l9g$K$O0BA4>e$N%j%9%/(B +$B$,$"$j$^$9!#(BEmacs $B$NMW5a$K=>$C$F%Q%9%U%l!<%:$rF~NO$9$k$H!"$=$l$O0l;~E*(B +$B$K(B Emacs $B$,e(B root $B%f!<%6!<$O%Q(B +$B%9%U%l!<%:$r(B swap $B%U%!%$%k$+$iCj=P$9$k$3$H$,$G$-$^$9!#$=$N>e!"$=$N%7%9%F(B +$B%`$,GQ4~$5$l$?$jEpFq$K2q$C$?8e$b!"$=$N(B cleartext $B$N%Q%9%U%l!<%:$,4^$^$l(B +$B$F$$$k(B swap $B%U%!%$%k$O%G%#%9%/$K;D$C$F$$$k$+$b$7$l$J$$$N$G$9!#(B +@code{gpg-agent} $B$O%a%b%j!<$r(B lock $B$9$k$h$&$J:v$r$b$C$F!"$3$NLdBj$r2sHr(B +$B$7$F$$$^$9!#$=$l$O(B Emacs $B$K$Ol9g$O!"$=$l$r%(%s%3!<%I$9$k$?$a(B +$B$N(B coding system $B$r;XDj$9$kI,MW$,$"$j$^$9!#(BGnuPG $B$O%Q%9%U%l!<%:$rJ8;zNs(B +$B$H$7$F$G$O$J$/!"%P%$%HNs$H$7$F07$&$+$i$G$9!#(B + +@defvar pgg-passphrase-coding-system +$B%Q%9%U%l!<%:$r%(%s%3!<%I$9$k$?$a$N(B coding system $B$G$9!#(B @end defvar @node Default user identity -@section Default user identity +@section $B%G%#%U%)%k%H$N%f!<%6!<(B ID -The PGP implementation is usually able to select the proper key to use -for signing and decryption, but if you have more than one key, you may -need to specify the key id to use. +$BDL>o(B PGP $B$Ne$N80$r;}$C$F$$$k>l9g!"MQ$$$k80$N(B id $B$r;XDj$9$kI,MW$,(B +$B$"$j$^$9!#(B @defvar pgg-default-user-id -User ID of your default identity. It defaults to the value returned -by @samp{(user-login-name)}. You can customize this variable. +$B%G%#%U%)%k%H$N%f!<%6!<(B ID $B$G$9!#;XDj$7$J$$>l9g(B +$B$O(B @samp{(user-login-name)} $B$NLa$jCM$,%G%#%U%)%k%H$K$J$j$^$9!#$3$NJQ?t$O(B +$B%+%9%?%^%$%:2DG=$G$9!#(B @end defvar @defvar pgg-gpg-user-id -User ID of the GnuPG default identity. It defaults to @samp{nil}. -This overrides @samp{pgg-default-user-id}. You can customize this -variable. +GnuPG $B$G;H$&%G%#%U%)%k%H$N%f!<%6!<(B ID $B$G$9!#%G%#%U%)%k%H$O(B @samp{nil} $B$G(B +$B$9!#(B@code{nil} $B$G$O$J$$CM$K$9$k$H!"(B@samp{pgg-default-user-id} $B$h$jM%@h$7(B +$B$F;H$o$l$^$9!#%+%9%?%^%$%:2DG=$G$9!#(B @end defvar @defvar pgg-pgp-user-id -User ID of the PGP 2.x/6.x default identity. It defaults to -@samp{nil}. This overrides @samp{pgg-default-user-id}. You can -customize this variable. +PGP 2.x/6.x $B$G;H$&%G%#%U%)%k%H$N%f!<%6!<(B ID $B$G$9!#%G%#%U%)%k%H(B +$B$O(B @samp{nil} $B$G$9!#(B@code{nil} $B$G$O$J$$CM$K$9$k$H!"(B +@samp{pgg-default-user-id} $B$h$jM%@h$7$F;H$o$l$^$9!#%+%9%?%^%$%:2DG=$G$9!#(B @end defvar @defvar pgg-pgp5-user-id -User ID of the PGP 5.x default identity. It defaults to @samp{nil}. -This overrides @samp{pgg-default-user-id}. You can customize this -variable. +PGP 5.x $B$G;H$&%G%#%U%)%k%H$N%f!<%6(B ID $B$G$9!#%G%#%U%)%k%H$O(B @samp{nil} $B$G(B +$B$9!#(B@code{nil} $B$G$O$J$$CM$K$9$k$H!"(B@samp{pgg-default-user-id} $B$h$jM%@h$7(B +$B$F;H$o$l$^$9!#%+%9%?%^%$%:2DG=$G$9!#(B @end defvar @node Architecture -@chapter Architecture +@chapter $B9=@.(B -PGG introduces the notion of a "scheme of PGP implementation" (used -interchangeably with "scheme" in this document). This term refers to a -singleton object wrapped with the luna object system. +PGG $B$O!V(BPGP $BO$G$O!"(BPGG $B$N%P%C%/%(%s%I$r$I$N$h$&$K5-=R$9$k$+$rC5$7$J$,$i!"(BPGG $B$,$I(B +$B$N$h$&$K$D$/$i$l$F$$$k$+$rC58!$7$F$_$^$7$g$&!#(B @menu * Initializing:: @@ -269,14 +377,14 @@ while finding out how to write the PGG back end. @end menu @node Initializing -@section Initializing +@section $B=i4|2=(B -A scheme must be initialized before it is used. -It had better guarantee to keep only one instance of a scheme. +$B%9%-!<%`$O!";H$&A0$K=i4|2=$5$l$J$1$l$P$J$j$^$;$s!#$?$@0l$D$N%9%-!<%`$r;H(B +$B$&$3$H$rJ]>Z$9$k$N$,NI$$$G$7$g$&!#(B -The following code is snipped out of @file{pgg-gpg.el}. Once an -instance of @code{pgg-gpg} scheme is initialized, it's stored to the -variable @code{pgg-scheme-gpg-instance} and will be reused from now on. +$B0J2<$N%3!<%I$O(B @file{pgg-gpg.el} $B$+$i$NH4$-=q$-$G$9!#$"(B +$B$k(B @code{pgg-gpg} $B$N%9%-!<%`$,$$$C$?$s=i4|2=$5$l$k$H!"$=$l(B +$B$O(B @code{pgg-scheme-gpg-instance} $BJQ?t$KJ]B8$5$l!"0J8e!":FMxMQ$5$l$^$9!#(B @lisp (defvar pgg-scheme-gpg-instance nil) @@ -284,115 +392,124 @@ variable @code{pgg-scheme-gpg-instance} and will be reused from now on. (defun pgg-make-scheme-gpg () (or pgg-scheme-gpg-instance (setq pgg-scheme-gpg-instance - (luna-make-entity 'pgg-scheme-gpg)))) + (luna-make-entity 'pgg-scheme-gpg)))) @end lisp -The name of the function must follow the -regulation---@code{pgg-make-scheme-} follows the back end name. +$B4X?t$NL>A0$O(B @code{pgg-make-scheme-} $B$N8e$m$K%P%C%/%(%s%IL>$rIU2C$7$?$b(B +$B$N$K$7$J$1$l$P$J$j$^$;$s!#(B @node Back end methods -@section Back end methods +@section $B%P%C%/%(%s%I$N%a%=%C%I(B -In each back end, these methods must be present. The output of these -methods is stored in special buffers (@ref{Getting output}), so that -these methods must tell the status of the execution. +$B3F%P%C%/%(%s%I$K$O!"$3$l$i$N%a%=%C%I$,B8:_$7$J$1$l$P$J$j$^$;$s!#%a%=%C%I(B +$B$N$H0E9f2=$rF1;~$K9T$J$$$^$9!#0E9f2=$K@.8y$9$k$H(B @code{t} $B$r!"<:GT$9$k(B +$B$H(B @code{nil} $B$rJV$7$^$9!#(B @end deffn -@deffn Method pgg-scheme-encrypt-region scheme start end recipients &optional sign -Encrypt the current region between @var{start} and @var{end} for -@var{recipients}. If @var{sign} is non-@code{nil}, do a combined sign -and encrypt. If encryption is successful, it returns @code{t}, -otherwise @code{nil}. +@deffn Method pgg-scheme-encrypt-symmetric-region scheme start end &optional passphrase +$B8=:_$N(B @var{start} $B$H(B @var{end} $B$N4V$NNN0h$r!"6&DL800E9f(B (symmetric +cipher) $B$H%Q%9%U%l!<%:$G0E9f2=$7$^$9!#0E9f2=$K@.8y$9$k$H(B @code{t} $B$rJV$7!"(B +$B$=$&$G$J$1$l$P(B @code{nil} $B$rJV$7$^$9!#$3$N5!G=$O8=:_(B GnuPG $B$@$1$G$7$^$9!#;0HVL\$N%*%W%7%g%s(B +$B0z?t(B @var{cleartext} $B$,(B @code{nil} $B$G$O$J$$>l9g!"J,N%$5$l$?=pL>$r:n$j$^(B +$B$;$s!#=pL>$K@.8y$9$k$H(B @code{t} $B$r!"<:GT$9$k$H(B @code{nil} $B$rJV$7$^$9!#(B @end deffn @deffn Method pgg-scheme-verify-region scheme start end &optional signature -Verify the current region between @var{start} and @var{end}. If the -optional third argument @var{signature} is non-@code{nil}, it is treated -as the detached signature of the current region. If the signature is -successfully verified, it returns @code{t}, otherwise @code{nil}. +@var{start} $B$H(B @var{end} $B$N4V$NNN0h$K$"$k=pL>$r8!>Z$7$^$9!#;0HVL\$N%*%W(B +$B%7%g%s0z?t(B @var{signature} $B$,(B @code{nil} $B$G$J$+$C$?$i!"$=$N0z?t$O8=:_$N(B +$BNN0h$NJ,N%$5$l$?=pL>$N%U%!%$%k$H$7$F$,@5$7$/8!>Z$5$l(B +$B$?>l9g$O(B @code{t} $B$r!"<:GT$9$k$H(B @code{nil} $B$rJV$7$^$9!#(B @end deffn @deffn Method pgg-scheme-insert-key scheme -Retrieve the user's public key and insert it as ASCII-armored format. -On success, it returns @code{t}, otherwise @code{nil}. +$B%f!<%6!<$N8x3+80$r$N7k2L$N>pJs$O!"$3$N%P%C%U%!!<$K3JG<$5$l$^$9!#(B @end defvar @node Parsing OpenPGP packets -@chapter Parsing OpenPGP packets +@chapter OpenPGP $B%Q%1%C%H$N2r@O(B -The format of OpenPGP messages is maintained in order to publish all -necessary information needed to develop interoperable applications. -The standard is documented in RFC 2440. +OpenPGP $B$N%a%C%;!<%8$N%U%)!<%^%C%H$O!"Aj8_1?MQ$G$-$k%"%W%j%1!<%7%g%s3+H/(B +$B$KI,MW$J$9$Y$F$N>pJs$r=PNO$9$k$h$&$K0];}$5$l$F$$$^$9!#$=$NI8=`(B +$B$O(B RFC2440 $B$K5-:\$5$l$F$$$^$9!#(B -PGG has its own parser for the OpenPGP packets. +PGG $B$O(B OpenPGP $B%Q%1%C%H$KBP1~$7$?FH<+$N%a%C%;!<%82r@O$r9T$J$$$^$9!#(B @defun pgg-parse-armor string -List the sequence of packets in @var{string}. +@var{string} $BFb$N%Q%1%C%H$NJB$S$r(B @code{list} $B$N7A<0$GJV$7$^$9!#(B @end defun @defun pgg-parse-armor-region start end -List the sequence of packets in the current region between @var{start} -and @var{end}. +@var{start} $B$H(B @var{end} $B$N4V$NNN0h$K$"$k%Q%1%C%H$NJB$S$r(B @code{list} $B$N(B +$B7A<0$GJV$7$^$9!#(B @end defun @defvar pgg-ignore-packet-checksum -If non-@code{nil}, don't check the checksum of the packets. +@code{nil} $B$G$J$+$C$?$i!"%Q%1%C%H$N%A%'%C%/%5%`$r8!>Z$7$^$;$s!#(B @end defvar +@node GNU Free Documentation License +@chapter GNU $B%U%j!