1
0
mirror of git://git.gnupg.org/gnupg.git synced 2024-06-06 23:17:47 +02:00

* gpg.texi (OpenPGP Options): Update the personal-foo-preferences

documentation a bit.
This commit is contained in:
David Shaw 2007-04-15 05:01:22 +00:00
parent 6ae6e18d5f
commit 2be1afb5aa
2 changed files with 28 additions and 23 deletions

View File

@ -1,3 +1,8 @@
2007-04-15 David Shaw <dshaw@jabberwocky.com>
* gpg.texi (OpenPGP Options): Update the personal-foo-preferences
documentation a bit.
2007-04-10 Werner Koch <wk@g10code.com> 2007-04-10 Werner Koch <wk@g10code.com>
* gpg.texi (GPG Configuration Options): Document --batch, no-tty, * gpg.texi (GPG Configuration Options): Document --batch, no-tty,

View File

@ -1,5 +1,5 @@
@c Copyright (C) 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005 @c Copyright (C) 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006,
@c 2006 Free Software Foundation, Inc. @c 2007 Free Software Foundation, Inc.
@c This is part of the GnuPG manual. @c This is part of the GnuPG manual.
@c For copying conditions, see the file gnupg.texi. @c For copying conditions, see the file gnupg.texi.
@ -1866,31 +1866,31 @@ using this option, the encrypted message becomes vulnerable to a
message modification attack. message modification attack.
@item --personal-cipher-preferences @code{string} @item --personal-cipher-preferences @code{string}
Set the list of personal cipher preferences to @code{string}, this list Set the list of personal cipher preferences to @code{string}. Use
should be a string similar to the one printed by the command "pref" in @command{@gpgname --version} to get a list of available algorithms,
the edit menu. This allows the user to factor in their own preferred and use @code{none} to set no preference at all. This allows the user
algorithms when algorithms are chosen via recipient key preferences. to factor in their own preferred algorithms when algorithms are chosen
The most highly ranked cipher in this list is also used for the via recipient key preferences. The most highly ranked cipher in this
@option{--symmetric} encryption command. list is also used for the @option{--symmetric} encryption command.
@item --personal-digest-preferences @code{string} @item --personal-digest-preferences @code{string}
Set the list of personal digest preferences to @code{string}, this list Set the list of personal digest preferences to @code{string}. Use
should be a string similar to the one printed by the command "pref" in @command{@gpgname --version} to get a list of available algorithms,
the edit menu. This allows the user to factor in their own preferred and use @code{none} to set no preference at all. This allows the user
algorithms when algorithms are chosen via recipient key preferences. to factor in their own preferred algorithms when algorithms are chosen
The most highly ranked digest algorithm in this list is algo used when via recipient key preferences. The most highly ranked digest
signing without encryption (e.g. @option{--clearsign} or algorithm in this list is algo used when signing without encryption
@option{--sign}). The default value is SHA-1. (e.g. @option{--clearsign} or @option{--sign}). The default value is
SHA-1.
@item --personal-compress-preferences @code{string} @item --personal-compress-preferences @code{string}
Set the list of personal compression preferences to @code{string}, this Set the list of personal compression preferences to @code{string}.
list should be a string similar to the one printed by the command Use @command{@gpgname --version} to get a list of available
"pref" in the edit menu. This allows the user to factor in their own algorithms, and use @code{none} to set no preference at all. This
preferred algorithms when algorithms are chosen via recipient key allows the user to factor in their own preferred algorithms when
preferences. The most highly ranked algorithm in this list is also algorithms are chosen via recipient key preferences. The most highly
used when there are no recipient keys to consider (e.g. @option{--symmetric}). ranked compression algorithm in this list is algo used when there are
no recipient keys to consider (e.g. @option{--symmetric}).
@item --s2k-cipher-algo @code{name} @item --s2k-cipher-algo @code{name}
Use @code{name} as the cipher algorithm used to protect secret keys. Use @code{name} as the cipher algorithm used to protect secret keys.