Commits

simon  committed bbfb3f4

2004-08-31 Reiner Steib <Reiner.Steib@gmx.de>

* pgg.texi: Use @copying and @insertcopying.

2004-01-17 Jesper Harder <harder@ifa.au.dk>

* pgg.texi (User Commands, Backend methods): do.

2004-01-05 Simon Josefsson <jas@extundo.com>

* pgg.texi (Caching passphrase): Fix PGG passphrase caching
section.

2003-09-14 Jesper Harder <harder@ifa.au.dk>

* pgg.texi (Selecting an implementation, Caching passphrase)
(Initializing): Markup fix.

2003-05-17 Adrian Aichner <adrian@xemacs.org>

* pgg.texi (Prerequisites): Ruthless typo fixing.
* pgg.texi (Architecture): Ditto.
* pgg.texi (Backend methods): Ditto.

  • Participants
  • Parent commits 653bbec

Comments (0)

Files changed (2)

+2004-08-31  Reiner Steib  <Reiner.Steib@gmx.de>
+
+	* pgg.texi: Use @copying and @insertcopying.
+
+2004-01-17  Jesper Harder  <harder@ifa.au.dk>
+
+	* pgg.texi (User Commands, Backend methods): do.
+
+2004-01-05  Simon Josefsson  <jas@extundo.com>
+
+	* pgg.texi (Caching passphrase): Fix PGG passphrase caching
+	section.
+
+2003-09-14  Jesper Harder  <harder@ifa.au.dk>
+
+	* pgg.texi (Selecting an implementation, Caching passphrase)
+	(Initializing): Markup fix.
+
+2003-05-17  Adrian Aichner  <adrian@xemacs.org>
+
+	* pgg.texi (Prerequisites): Ruthless typo fixing.
+	* pgg.texi (Architecture): Ditto.
+	* pgg.texi (Backend methods): Ditto.
+
 2004-09-16  Simon Josefsson  <jas@extundo.com>
 
 	* Makefile (REQUIRES): Add ecrypto, for password.el.
 
 @set VERSION 0.1
 
+
+@copying
+This file describes the PGG.
+
+Copyright (C) 2003, 2004 Free Software Foundation, Inc.
+Copyright (C) 2001 Daiki Ueno.
+
+@quotation
+Permission is granted to copy, distribute and/or modify this document
+under the terms of the GNU Free Documentation License, Version 1.1 or
+any later version published by the Free Software Foundation; with no
+Invariant Sections, with no Front-Cover Texts, and with no Back-Cover
+Texts.  A copy of the license is included in the section entitled ``GNU
+Free Documentation License''.
+@end quotation
+@end copying
+
+@dircategory Emacs
 @direntry
 * PGG: (pgg).   Emacs interface to various PGP implementations.
 @end direntry
 
 @settitle PGG @value{VERSION}
 
-@ifinfo
-This file describes the PGG.
-
-Copyright (C) 2003 Free Software Foundation, Inc.
-Copyright (C) 2001 Daiki Ueno.
-
-Permission is granted to copy, distribute and/or modify this document
-under the terms of the GNU Free Documentation License, Version 1.1 or
-any later version published by the Free Software Foundation; with no
-Invariant Sections, with no Front-Cover Texts, and with no Back-Cover
-Texts.  A copy of the license is included in the section entitled "GNU
-Free Documentation License".
-@end ifinfo
-
-@tex
 
 @titlepage
 @title PGG
 @page
 
 @vskip 0pt plus 1filll
-Copyright @copyright{} 2001 Daiki Ueno.
-
-Permission is granted to copy, distribute and/or modify this document
-under the terms of the GNU Free Documentation License, Version 1.1 or
-any later version published by the Free Software Foundation; with no
-Invariant Sections, with no Front-Cover Texts, and with no Back-Cover
-Texts.  A copy of the license is included in the section entitled "GNU
-Free Documentation License".
+@insertcopying
 @end titlepage
 @page
 
-@end tex
-
 @node Top
 @top PGG
 This manual describes PGG.  PGG is an interface library between Emacs
 and that you are familiar with its basic functions.
 
 By default, PGG uses GnuPG, but Pretty Good Privacy version 2 or version
-5 are also supported.  If you are new to such a system, I recomend that
+5 are also supported.  If you are new to such a system, I recommend that
 you should look over the GNU Privacy Handbook (GPH) which is available
 at @uref{http://www.gnupg.org/gph/}.
 
 If encryption is successful, it replaces the current region contents (in
 the accessible portion) with the resulting data.
 
-If optional argument @var{sign} is non-nil, the function is request to
-do a combined sign and encrypt.  This currently only work with GnuPG.
+If optional argument @var{sign} is non-@code{nil}, the function is
+request to do a combined sign and encrypt.  This currently only work
+with GnuPG.
 @end deffn
 
 @deffn Command pgg-decrypt-region start end
 select cipher algorithm from 3DES, CAST5, BLOWFISH, and so on, but on
 the other hand the version 2 of PGP only supports IDEA.
 
-By default, if the variable @var{pgg-scheme} is not set, PGG searches the
+By default, if the variable @code{pgg-scheme} is not set, PGG searches the
 registered scheme for an implementation of the requested service
 associated with the named algorithm.  If there are no match, PGG uses
-@var{pgg-default-scheme}.  In other words, there are two options to
+@code{pgg-default-scheme}.  In other words, there are two options to
 control which command is used to process the incoming PGP armors.  One
 is for encrypting and signing, the other is for decrypting and
 verifying.
 @node Caching passphrase
 @section Caching passphrase
 
-PGG provides a simple passphrase caching mechanism.  If you want to
-arrange the interaction, set the variable @var{pgg-read-passphrase}.
+PGG uses a simple passphrase caching mechanism, which is enabled by
+default.
 
 @defvar pgg-cache-passphrase
 If non-@code{nil}, store passphrases.  The default value of this
 singleton object wrapped with the luna object system.
 
 Since PGG was designed for accessing and developing PGP functionality,
-the architecture had to be designed not just for interoperablity but
+the architecture had to be designed not just for interoperability but
 also for extensiblity.  In this chapter we explore the architecture
 while finding out how to write the PGG backend.
 
 
 The following code is snipped out of @file{pgg-gpg.el}.  Once an
 instance of @code{pgg-gpg} scheme is initialized, it's stored to the
-variable @var{pgg-scheme-gpg-instance} and will be reused from now on.
+variable @code{pgg-scheme-gpg-instance} and will be reused from now on.
 
 @lisp
 (defvar pgg-scheme-gpg-instance nil)
 
 @deffn Method pgg-scheme-encrypt-region scheme start end recipients &optional sign
 Encrypt the current region between @var{start} and @var{end} for
-@var{recipients}.  If @var{sign} is non-nil, do a combined sign and
-encrypt.  If encryption is successful, it returns @code{t}, otherwise
-@code{nil}.
+@var{recipients}.  If @var{sign} is non-@code{nil}, do a combined sign
+and encrypt.  If encryption is successful, it returns @code{t},
+otherwise @code{nil}.
 @end deffn
 
 @deffn Method pgg-scheme-decrypt-region scheme start end
 Verify the current region between @var{start} and @var{end}.  If the
 optional third argument @var{signature} is non-@code{nil}, it is treated
 as the detached signature of the current region.  If the signature is
-successflly verified, it returns @code{t}, otherwise @code{nil}.
+successfully verified, it returns @code{t}, otherwise @code{nil}.
 @end deffn
 
 @deffn Method pgg-scheme-insert-key scheme
 @bye
 
 @c End:
+
+@ignore
+   arch-tag: 0c205838-34b9-41a5-b9d7-49ae57ccac85
+@end ignore