emacs-diffs
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Emacs-diffs] Changes to pgg.texi


From: Glenn Morris
Subject: [Emacs-diffs] Changes to pgg.texi
Date: Thu, 06 Sep 2007 04:39:23 +0000

CVSROOT:        /sources/emacs
Module name:    emacs
Changes by:     Glenn Morris <gm>       07/09/06 04:39:23

Index: pgg.texi
===================================================================
RCS file: pgg.texi
diff -N pgg.texi
--- pgg.texi    15 Apr 2007 20:57:15 -0000      1.21
+++ /dev/null   1 Jan 1970 00:00:00 -0000
@@ -1,498 +0,0 @@
-\input texinfo                  @c -*-texinfo-*-
-
address@hidden ../info/pgg
-
address@hidden VERSION 0.1
-
-
address@hidden
-This file describes PGG, an Emacs interface to various PGP implementations.
-
-Copyright @copyright{} 2001, 2003, 2004, 2005, 2006, 2007  Free Software
-Foundation, Inc.
-
address@hidden
-Permission is granted to copy, distribute and/or modify this document
-under the terms of the GNU Free Documentation License, Version 1.2 or
-any later version published by the Free Software Foundation; with no
-Invariant Sections, with no Front-Cover Texts, and with no Back-Cover
-Texts.  A copy of the license is included in the section entitled ``GNU
-Free Documentation License.''
address@hidden quotation
address@hidden copying
-
address@hidden Emacs
address@hidden
-* PGG: (pgg).   Emacs interface to various PGP implementations.
address@hidden direntry
-
address@hidden PGG @value{VERSION}
-
-
address@hidden
address@hidden PGG
-
address@hidden by Daiki Ueno
address@hidden
-
address@hidden 0pt plus 1filll
address@hidden
address@hidden titlepage
address@hidden
-
address@hidden Top
address@hidden PGG
-This manual describes PGG.  PGG is an interface library between Emacs
-and various tools for secure communication.  PGG also provides a simple
-user interface to encrypt, decrypt, sign, and verify MIME messages.
-
address@hidden
-* Overview::                    What PGG is.
-* Prerequisites::               Complicated stuff you may have to do.
-* How to use::                  Getting started quickly.
-* Architecture::                
-* Parsing OpenPGP packets::     
-* GNU Free Documentation License:: The license for this documentation.
-* Function Index::              
-* Variable Index::              
address@hidden menu
-
address@hidden Overview
address@hidden Overview
-
-PGG is an interface library between Emacs and various tools for secure
-communication.  Even though Mailcrypt has similar feature, it does not
-deal with detached PGP messages, normally used in PGP/MIME
-infrastructure.  This was the main reason why I wrote the new library.
-
-PGP/MIME is an application of MIME Object Security Services (RFC1848).
-The standard is documented in RFC2015.
-
address@hidden Prerequisites
address@hidden Prerequisites
-
-PGG requires at least one implementation of privacy guard system.
-This document assumes that you have already obtained and installed them
-and that you are familiar with its basic functions.
-
-By default, PGG uses GnuPG.  If you are new to such a system, I
-recommend that you should look over the GNU Privacy Handbook (GPH)
-which is available at @uref{http://www.gnupg.org/documentation/}.
-
-When using GnuPG, we recommend the use of the @code{gpg-agent}
-program, which is distributed with versions 2.0 and later of GnuPG.
-This is a daemon to manage private keys independently from any
-protocol, and provides the most secure way to input and cache your
-passphrases (@pxref{Caching passphrase}).  By default, PGG will
-attempt to use @code{gpg-agent} if it is running.  @xref{Invoking
-GPG-AGENT,,,gnupg,Using the GNU Privacy Guard}.
-
-PGG also supports Pretty Good Privacy version 2 or version 5.
-
address@hidden How to use
address@hidden How to use
-
-The toplevel interface of this library is quite simple, and only
-intended to use with public-key cryptographic operation.
-
-To use PGG, evaluate following expression at the beginning of your
-application program.
-
address@hidden
-(require 'pgg)
address@hidden lisp
-
-If you want to check existence of pgg.el at runtime, instead you can
-list autoload setting for desired functions as follows.
-
address@hidden
-(autoload 'pgg-encrypt-region "pgg"
-  "Encrypt the current region." t)
-(autoload 'pgg-encrypt-symmetric-region "pgg"
-  "Encrypt the current region with symmetric algorithm." t)
-(autoload 'pgg-decrypt-region "pgg"
-  "Decrypt the current region." t)
-(autoload 'pgg-sign-region "pgg"
-  "Sign the current region." t)
-(autoload 'pgg-verify-region "pgg"
-  "Verify the current region." t)
-(autoload 'pgg-insert-key "pgg"
-  "Insert the ASCII armored public key." t)
-(autoload 'pgg-snarf-keys-region "pgg"
-  "Import public keys in the current region." t)
address@hidden lisp
-
address@hidden
-* User Commands::               
-* Selecting an implementation::  
-* Caching passphrase::          
-* Default user identity::      
address@hidden menu
-
address@hidden User Commands
address@hidden User Commands
-
-At this time you can use some cryptographic commands.  The behavior of
-these commands relies on a fashion of invocation because they are also
-intended to be used as library functions.  In case you don't have the
-signer's public key, for example, the function @code{pgg-verify-region}
-fails immediately, but if the function had been called interactively, it
-would ask you to retrieve the signer's public key from the server.
-
address@hidden Command pgg-encrypt-region start end recipients &optional sign 
passphrase
-Encrypt the current region between @var{start} and @var{end} for
address@hidden  When the function were called interactively, you
-would be asked about the recipients.
-
-If encryption is successful, it replaces the current region contents (in
-the accessible portion) with the resulting data.
-
-If optional argument @var{sign} is address@hidden, the function is
-request to do a combined sign and encrypt.  This currently is
-confirmed to work with GnuPG, but might not work with PGP or PGP5.
-
-If optional @var{passphrase} is @code{nil}, the passphrase will be
-obtained from the passphrase cache or user.
address@hidden deffn
-
address@hidden Command pgg-encrypt-symmetric-region &optional start end 
passphrase
-Encrypt the current region between @var{start} and @var{end} using a
-symmetric cipher.  After invocation you are asked for a passphrase.
-
-If optional @var{passphrase} is @code{nil}, the passphrase will be
-obtained from the passphrase cache or user.
-
-symmetric-cipher encryption is currently only implemented for GnuPG.
address@hidden deffn
-
address@hidden Command pgg-decrypt-region start end &optional passphrase
-Decrypt the current region between @var{start} and @var{end}.  If
-decryption is successful, it replaces the current region contents (in
-the accessible portion) with the resulting data.
-
-If optional @var{passphrase} is @code{nil}, the passphrase will be
-obtained from the passphrase cache or user.
address@hidden deffn
-
address@hidden Command pgg-sign-region start end &optional cleartext passphrase
-Make the signature from text between @var{start} and @var{end}.  If the
-optional third argument @var{cleartext} is address@hidden, or the
-function is called interactively, it does not create a detached
-signature.  In such a case, it replaces the current region contents (in
-the accessible portion) with the resulting data.
-
-If optional @var{passphrase} is @code{nil}, the passphrase will be
-obtained from the passphrase cache or user.
address@hidden deffn
-
address@hidden Command pgg-verify-region start end &optional signature fetch
-Verify the current region between @var{start} and @var{end}.  If the
-optional third argument @var{signature} is address@hidden, it is treated
-as the detached signature file of the current region.
-
-If the optional 4th argument @var{fetch} is address@hidden, or the
-function is called interactively, we attempt to fetch the signer's
-public key from the key server.
address@hidden deffn
-
address@hidden Command pgg-insert-key
-Retrieve the user's public key and insert it as ASCII-armored format.
address@hidden deffn
-
address@hidden Command pgg-snarf-keys-region start end
-Collect public keys in the current region between @var{start} and
address@hidden, and add them into the user's keyring.
address@hidden deffn
-
address@hidden Selecting an implementation
address@hidden Selecting an implementation
-
-Since PGP has a long history and there are a number of PGP
-implementations available today, the function which each one has differs
-considerably.  For example, if you are using GnuPG, you know you can
-select cipher algorithm from 3DES, CAST5, BLOWFISH, and so on, but on
-the other hand the version 2 of PGP only supports IDEA.
-
-Which implementation is used is controlled by the @code{pgg-scheme}
-variable.  If it is @code{nil} (the default), the value of the
address@hidden variable will be used instead.
-
address@hidden pgg-scheme
-Force specify the scheme of PGP implementation.  The value can be set to
address@hidden, @code{pgp}, and @code{pgp5}.  The default is @code{nil}.
address@hidden defvar
-
address@hidden pgg-default-scheme
-The default scheme of PGP implementation.  The value should be one of
address@hidden, @code{pgp}, and @code{pgp5}.  The default is @code{gpg}.
address@hidden defvar
-
address@hidden Caching passphrase
address@hidden Caching passphrase
-
-When using GnuPG (gpg) as the PGP scheme, we recommend using a program
-called @code{gpg-agent} for entering and caching
address@hidden, @code{gpg-agent} does not cache
-passphrases but private keys.  On the other hand, from a user's point
-of view, this technical difference isn't visible.}.
-
address@hidden pgg-gpg-use-agent
-If address@hidden, attempt to use @code{gpg-agent} whenever possible.
-The default is @code{t}.  If @code{gpg-agent} is not running, or GnuPG
-is not the current PGP scheme, PGG's own passphrase-caching mechanism
-is used (see below).
address@hidden defvar
-
-To use @code{gpg-agent} with PGG, you must first ensure that
address@hidden is running.  For example, if you are running in the X
-Window System, you can do this by putting the following line in your
address@hidden file:
-
address@hidden
-eval "$(gpg-agent --daemon)"
address@hidden smallexample
-
-For more details on invoking @code{gpg-agent}, @xref{Invoking
-GPG-AGENT,,,gnupg,Using the GNU Privacy Guard}.
-
-Whenever you perform a PGG operation that requires a GnuPG passphrase,
-GnuPG will contact @code{gpg-agent}, which prompts you for the
-passphrase.  Furthermore, @code{gpg-agent} ``caches'' the result, so
-that subsequent uses will not require you to enter the passphrase
-again.  (This cache usually expires after a certain time has passed;
-you can change this using the @code{--default-cache-ttl} option when
-invoking @code{gpg-agent}.)
-
-If you are running in a X Window System environment, @code{gpg-agent}
-prompts for a passphrase by opening a graphical window.  However, if
-you are running Emacs on a text terminal, @code{gpg-agent} has trouble
-receiving input from the terminal, since it is being sent to Emacs.
-One workaround for this problem is to run @code{gpg-agent} on a
-different terminal from Emacs, with the @code{--keep-tty} option; this
-tells @code{gpg-agent} use its own terminal to prompt for passphrases.
-
-When @code{gpg-agent} is not being used, PGG prompts for a passphrase
-through Emacs.  It also has its own passphrase caching mechanism,
-which is controlled by the variable @code{pgg-cache-passphrase} (see
-below).
-
-There is a security risk in handling passphrases through PGG rather
-than @code{gpg-agent}.  When you enter your passphrase into an Emacs
-prompt, it is temporarily stored as a cleartext string in the memory
-of the Emacs executable.  If the executable memory is swapped to disk,
-the root user can, in theory, extract the passphrase from the
-swapfile.  Furthermore, the swapfile containing the cleartext
-passphrase might remain on the disk after the system is discarded or
-stolen.  @code{gpg-agent} avoids this problem by using certain tricks,
-such as memory locking, which have not been implemented in Emacs.
-
address@hidden pgg-cache-passphrase
-If address@hidden, store passphrases.  The default value of this
-variable is @code{t}.  If you are worried about security issues,
-however, you could stop the caching of passphrases by setting this
-variable to @code{nil}.
address@hidden defvar
-
address@hidden pgg-passphrase-cache-expiry
-Elapsed time for expiration in seconds.
address@hidden defvar
-
-If your passphrase contains non-ASCII characters, you might need to
-specify the coding system to be used to encode your passphrases, since
-GnuPG treats them as a byte sequence, not as a character sequence.
-
address@hidden pgg-passphrase-coding-system
-Coding system used to encode passphrase.
address@hidden defvar
-
address@hidden Default user identity
address@hidden Default user identity
-
-The PGP implementation is usually able to select the proper key to use
-for signing and decryption, but if you have more than one key, you may
-need to specify the key id to use.
-
address@hidden pgg-default-user-id
-User ID of your default identity.  It defaults to the value returned
-by @samp{(user-login-name)}.  You can customize this variable.
address@hidden defvar
-
address@hidden pgg-gpg-user-id
-User ID of the GnuPG default identity.  It defaults to @samp{nil}.
-This overrides @samp{pgg-default-user-id}.  You can customize this
-variable.
address@hidden defvar
-
address@hidden pgg-pgp-user-id
-User ID of the PGP 2.x/6.x default identity.  It defaults to
address@hidden  This overrides @samp{pgg-default-user-id}.  You can
-customize this variable.
address@hidden defvar
-
address@hidden pgg-pgp5-user-id
-User ID of the PGP 5.x default identity.  It defaults to @samp{nil}.
-This overrides @samp{pgg-default-user-id}.  You can customize this
-variable.
address@hidden defvar
-
address@hidden Architecture
address@hidden Architecture
-
-PGG introduces the notion of a "scheme of PGP implementation" (used
-interchangeably with "scheme" in this document).  This term refers to a
-singleton object wrapped with the luna object system.
-
-Since PGG was designed for accessing and developing PGP functionality,
-the architecture had to be designed not just for interoperability but
-also for extensiblity.  In this chapter we explore the architecture
-while finding out how to write the PGG backend.
-
address@hidden
-* Initializing::                
-* Backend methods::             
-* Getting output::              
address@hidden menu
-
address@hidden Initializing
address@hidden Initializing
-
-A scheme must be initialized before it is used.
-It had better guarantee to keep only one instance of a scheme.
-
-The following code is snipped out of @file{pgg-gpg.el}.  Once an
-instance of @code{pgg-gpg} scheme is initialized, it's stored to the
-variable @code{pgg-scheme-gpg-instance} and will be reused from now on.
-
address@hidden
-(defvar pgg-scheme-gpg-instance nil)
-
-(defun pgg-make-scheme-gpg ()
-  (or pgg-scheme-gpg-instance
-      (setq pgg-scheme-gpg-instance
-           (luna-make-entity 'pgg-scheme-gpg))))
address@hidden lisp
-
-The name of the function must follow the
address@hidden follows the backend name.
-
address@hidden Backend methods
address@hidden Backend methods
-
-In each backend, these methods must be present.  The output of these
-methods is stored in special buffers (@ref{Getting output}), so that
-these methods must tell the status of the execution.
-
address@hidden Method pgg-scheme-lookup-key scheme string &optional type
-Return keys associated with @var{string}.  If the optional third
-argument @var{type} is address@hidden, it searches from the secret
-keyrings.
address@hidden deffn
-
address@hidden Method pgg-scheme-encrypt-region scheme start end recipients 
&optional sign passphrase
-Encrypt the current region between @var{start} and @var{end} for
address@hidden  If @var{sign} is address@hidden, do a combined sign
-and encrypt.  If encryption is successful, it returns @code{t},
-otherwise @code{nil}.
address@hidden deffn
-
address@hidden Method pgg-scheme-encrypt-symmetric-region scheme start end 
&optional passphrase
-Encrypt the current region between @var{start} and @var{end} using a
-symmetric cipher and a passphrases.  If encryption is successful, it
-returns @code{t}, otherwise @code{nil}.  This function is currently only
-implemented for GnuPG.
address@hidden deffn
-
address@hidden Method pgg-scheme-decrypt-region scheme start end &optional 
passphrase
-Decrypt the current region between @var{start} and @var{end}.  If
-decryption is successful, it returns @code{t}, otherwise @code{nil}.
address@hidden deffn
-
address@hidden Method pgg-scheme-sign-region scheme start end &optional 
cleartext passphrase
-Make the signature from text between @var{start} and @var{end}.  If the
-optional third argument @var{cleartext} is address@hidden, it does not
-create a detached signature.  If signing is successful, it returns
address@hidden, otherwise @code{nil}.
address@hidden deffn
-
address@hidden Method pgg-scheme-verify-region scheme start end &optional 
signature
-Verify the current region between @var{start} and @var{end}.  If the
-optional third argument @var{signature} is address@hidden, it is treated
-as the detached signature of the current region.  If the signature is
-successfully verified, it returns @code{t}, otherwise @code{nil}.
address@hidden deffn
-
address@hidden Method pgg-scheme-insert-key scheme
-Retrieve the user's public key and insert it as ASCII-armored format.
-On success, it returns @code{t}, otherwise @code{nil}.
address@hidden deffn
-
address@hidden Method pgg-scheme-snarf-keys-region scheme start end
-Collect public keys in the current region between @var{start} and
address@hidden, and add them into the user's keyring.
-On success, it returns @code{t}, otherwise @code{nil}.
address@hidden deffn
-
address@hidden Getting output
address@hidden Getting output
-
-The output of the backend methods (@ref{Backend methods}) is stored in
-special buffers, so that these methods must tell the status of the
-execution.
-
address@hidden pgg-errors-buffer
-The standard error output of the execution of the PGP command is stored
-here.
address@hidden defvar
-
address@hidden pgg-output-buffer
-The standard output of the execution of the PGP command is stored here.
address@hidden defvar
-
address@hidden pgg-status-buffer
-The rest of status information of the execution of the PGP command is
-stored here.
address@hidden defvar
-
address@hidden Parsing OpenPGP packets
address@hidden Parsing OpenPGP packets
-
-The format of OpenPGP messages is maintained in order to publish all
-necessary information needed to develop interoperable applications.
-The standard is documented in RFC 2440.
-
-PGG has its own parser for the OpenPGP packets.
-
address@hidden pgg-parse-armor string
-List the sequence of packets in @var{string}.
address@hidden defun
-
address@hidden pgg-parse-armor-region start end
-List the sequence of packets in the current region between @var{start}
-and @var{end}.
address@hidden defun
-
address@hidden pgg-ignore-packet-checksum
-If address@hidden, don't check the checksum of the packets.
address@hidden defvar
-
address@hidden GNU Free Documentation License
address@hidden GNU Free Documentation License
address@hidden doclicense.texi
-
address@hidden Function Index
address@hidden Function Index
address@hidden fn
-
address@hidden Variable Index
address@hidden Variable Index
address@hidden vr
-
address@hidden
address@hidden
address@hidden
-
address@hidden End:
-
address@hidden
-   arch-tag: 0c205838-34b9-41a5-b9d7-49ae57ccac85
address@hidden ignore




reply via email to

[Prev in Thread] Current Thread [Next in Thread]