comparison doc/jp/encryption.rst @ 3054:92f8baec5e4f

doc (jp): typos (thanks tbart)
author Goffi <goffi@goffi.org>
date Fri, 11 Oct 2019 16:15:09 +0200
parents 72583524cfd3
children
comparison
equal deleted inserted replaced
3053:8b36e5c3f28f 3054:92f8baec5e4f
65 original session will be stopped and replaced by one with the new requested algorithm. You 65 original session will be stopped and replaced by one with the new requested algorithm. You
66 can change this behaviour by using ``--encrypt-noreplace``: in this case the command will 66 can change this behaviour by using ``--encrypt-noreplace``: in this case the command will
67 fail in case of conflict (e2e encryption is requested with a new algorithm while an e2e 67 fail in case of conflict (e2e encryption is requested with a new algorithm while an e2e
68 encryption session was already started with an other algorithm), and return a non-zero 68 encryption session was already started with an other algorithm), and return a non-zero
69 code. If an e2e encryption session was already started with the requested algorithm, the 69 code. If an e2e encryption session was already started with the requested algorithm, the
70 command will succeed in all cases an nothing will be changed. 70 command will succeed in all cases and nothing will be changed.
71 71
72 examples 72 examples
73 -------- 73 --------
74 74
75 Start e2e encryption with Pierre, using the algorithm selected by SàT:: 75 Start e2e encryption with Pierre, using the algorithm selected by SàT::
99 99
100 trust ui 100 trust ui
101 ======== 101 ========
102 102
103 Run the user interface to handle trust with given entity and given algorithm. The user 103 Run the user interface to handle trust with given entity and given algorithm. The user
104 interface depends of the algorithm used, but it generally shows you the fingerprints 104 interface depends on the algorithm used, but it generally shows you the fingerprints
105 associated with your contact or contact devices, and asks you if you trust them or not. 105 associated with your contact or contact devices, and asks you if you trust them or not.
106 106
107 The only mandatory argument is the jid of your contact. 107 The only mandatory argument is the jid of your contact.
108 108
109 By default the currently active encryption session algorithm is used, but you may manage 109 By default the currently active encryption session algorithm is used, but you may manage
110 trust for an other algorithm by using ``-n NAME, --name NAME`` or ``-N NAMESPACE, 110 trust for another algorithm by using ``-n NAME, --name NAME`` or ``-N NAMESPACE,
111 --namespace NAMESPACE``. 111 --namespace NAMESPACE``.
112 112
113 .. note:: 113 .. note::
114 114
115 Trusting a contact or a device means that you certify that this contact or device is 115 Trusting a contact or a device means that you certify that this contact or device is