Next: , Previous: , Up: Commands   [Contents][Index]

3.2 Cryptographic Operations on Regions

Command: epa-decrypt-region start end

Decrypt the current region between start and end. It replaces the region with the decrypted text.

Command: epa-decrypt-armor-in-region start end

Decrypt OpenPGP armors in the current region between start and end. The difference from epa-decrypt-region is that epa-decrypt-armor-in-region searches armors in the region and applies epa-decrypt-region to each of them. That is, this command does not alter the original text around armors.

Command: epa-verify-region start end

Verify the current region between start and end. It sends the verification result to the minibuffer or a popup window. It replaces the region with the signed text.

Command: epa-verify-cleartext-in-region

Verify OpenPGP cleartext blocks in the current region between start and end. The difference from epa-verify-region is that epa-verify-cleartext-in-region searches OpenPGP cleartext blocks in the region and applies epa-verify-region to each of them. That is, this command does not alter the original text around OpenPGP cleartext blocks.

Command: epa-sign-region start end signers type

Sign the current region between start and end. By default, it creates a cleartext signature. If a prefix argument is given, it will let you select signing keys, and then a signature type.

Command: epa-encrypt-region start end recipients sign signers

Encrypt the current region between start and end. It will let you select recipients. If a prefix argument is given, it will also ask you whether or not to sign the text before encryption and if you answered yes, it will let you select the signing keys.

Variable: epa-keys-select-method

This variable controls the method used for key selection in epa-select-keys. The default value buffer pops up a special buffer where you can select the keys. If the value is minibuffer, epa-select-keys will instead prompt for the keys in the minibuffer, where you should type the keys separated by commas.

Next: Cryptographic Operations on Files, Previous: Key Management, Up: Commands   [Contents][Index]