mirror of
git://git.gnupg.org/gnupg.git
synced 2025-04-13 22:21:09 +02:00
* gpg.texi (OpenPGP Options): Update the personal-foo-preferences
documentation a bit.
This commit is contained in:
parent
6ae6e18d5f
commit
2be1afb5aa
@ -1,3 +1,8 @@
|
|||||||
|
2007-04-15 David Shaw <dshaw@jabberwocky.com>
|
||||||
|
|
||||||
|
* gpg.texi (OpenPGP Options): Update the personal-foo-preferences
|
||||||
|
documentation a bit.
|
||||||
|
|
||||||
2007-04-10 Werner Koch <wk@g10code.com>
|
2007-04-10 Werner Koch <wk@g10code.com>
|
||||||
|
|
||||||
* gpg.texi (GPG Configuration Options): Document --batch, no-tty,
|
* gpg.texi (GPG Configuration Options): Document --batch, no-tty,
|
||||||
|
46
doc/gpg.texi
46
doc/gpg.texi
@ -1,5 +1,5 @@
|
|||||||
@c Copyright (C) 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005
|
@c Copyright (C) 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006,
|
||||||
@c 2006 Free Software Foundation, Inc.
|
@c 2007 Free Software Foundation, Inc.
|
||||||
@c This is part of the GnuPG manual.
|
@c This is part of the GnuPG manual.
|
||||||
@c For copying conditions, see the file gnupg.texi.
|
@c For copying conditions, see the file gnupg.texi.
|
||||||
|
|
||||||
@ -1866,31 +1866,31 @@ using this option, the encrypted message becomes vulnerable to a
|
|||||||
message modification attack.
|
message modification attack.
|
||||||
|
|
||||||
@item --personal-cipher-preferences @code{string}
|
@item --personal-cipher-preferences @code{string}
|
||||||
Set the list of personal cipher preferences to @code{string}, this list
|
Set the list of personal cipher preferences to @code{string}. Use
|
||||||
should be a string similar to the one printed by the command "pref" in
|
@command{@gpgname --version} to get a list of available algorithms,
|
||||||
the edit menu. This allows the user to factor in their own preferred
|
and use @code{none} to set no preference at all. This allows the user
|
||||||
algorithms when algorithms are chosen via recipient key preferences.
|
to factor in their own preferred algorithms when algorithms are chosen
|
||||||
The most highly ranked cipher in this list is also used for the
|
via recipient key preferences. The most highly ranked cipher in this
|
||||||
@option{--symmetric} encryption command.
|
list is also used for the @option{--symmetric} encryption command.
|
||||||
|
|
||||||
@item --personal-digest-preferences @code{string}
|
@item --personal-digest-preferences @code{string}
|
||||||
Set the list of personal digest preferences to @code{string}, this list
|
Set the list of personal digest preferences to @code{string}. Use
|
||||||
should be a string similar to the one printed by the command "pref" in
|
@command{@gpgname --version} to get a list of available algorithms,
|
||||||
the edit menu. This allows the user to factor in their own preferred
|
and use @code{none} to set no preference at all. This allows the user
|
||||||
algorithms when algorithms are chosen via recipient key preferences.
|
to factor in their own preferred algorithms when algorithms are chosen
|
||||||
The most highly ranked digest algorithm in this list is algo used when
|
via recipient key preferences. The most highly ranked digest
|
||||||
signing without encryption (e.g. @option{--clearsign} or
|
algorithm in this list is algo used when signing without encryption
|
||||||
@option{--sign}). The default value is SHA-1.
|
(e.g. @option{--clearsign} or @option{--sign}). The default value is
|
||||||
|
SHA-1.
|
||||||
|
|
||||||
@item --personal-compress-preferences @code{string}
|
@item --personal-compress-preferences @code{string}
|
||||||
Set the list of personal compression preferences to @code{string}, this
|
Set the list of personal compression preferences to @code{string}.
|
||||||
list should be a string similar to the one printed by the command
|
Use @command{@gpgname --version} to get a list of available
|
||||||
"pref" in the edit menu. This allows the user to factor in their own
|
algorithms, and use @code{none} to set no preference at all. This
|
||||||
preferred algorithms when algorithms are chosen via recipient key
|
allows the user to factor in their own preferred algorithms when
|
||||||
preferences. The most highly ranked algorithm in this list is also
|
algorithms are chosen via recipient key preferences. The most highly
|
||||||
used when there are no recipient keys to consider (e.g. @option{--symmetric}).
|
ranked compression algorithm in this list is algo used when there are
|
||||||
|
no recipient keys to consider (e.g. @option{--symmetric}).
|
||||||
|
|
||||||
|
|
||||||
@item --s2k-cipher-algo @code{name}
|
@item --s2k-cipher-algo @code{name}
|
||||||
Use @code{name} as the cipher algorithm used to protect secret keys.
|
Use @code{name} as the cipher algorithm used to protect secret keys.
|
||||||
|
Loading…
x
Reference in New Issue
Block a user