Mercurial > libervia-backend
comparison doc/jp/encryption.rst @ 3054:92f8baec5e4f
doc (jp): typos (thanks tbart)
author | Goffi <goffi@goffi.org> |
---|---|
date | Fri, 11 Oct 2019 16:15:09 +0200 |
parents | 72583524cfd3 |
children |
comparison
equal
deleted
inserted
replaced
3053:8b36e5c3f28f | 3054:92f8baec5e4f |
---|---|
65 original session will be stopped and replaced by one with the new requested algorithm. You | 65 original session will be stopped and replaced by one with the new requested algorithm. You |
66 can change this behaviour by using ``--encrypt-noreplace``: in this case the command will | 66 can change this behaviour by using ``--encrypt-noreplace``: in this case the command will |
67 fail in case of conflict (e2e encryption is requested with a new algorithm while an e2e | 67 fail in case of conflict (e2e encryption is requested with a new algorithm while an e2e |
68 encryption session was already started with an other algorithm), and return a non-zero | 68 encryption session was already started with an other algorithm), and return a non-zero |
69 code. If an e2e encryption session was already started with the requested algorithm, the | 69 code. If an e2e encryption session was already started with the requested algorithm, the |
70 command will succeed in all cases an nothing will be changed. | 70 command will succeed in all cases and nothing will be changed. |
71 | 71 |
72 examples | 72 examples |
73 -------- | 73 -------- |
74 | 74 |
75 Start e2e encryption with Pierre, using the algorithm selected by SàT:: | 75 Start e2e encryption with Pierre, using the algorithm selected by SàT:: |
99 | 99 |
100 trust ui | 100 trust ui |
101 ======== | 101 ======== |
102 | 102 |
103 Run the user interface to handle trust with given entity and given algorithm. The user | 103 Run the user interface to handle trust with given entity and given algorithm. The user |
104 interface depends of the algorithm used, but it generally shows you the fingerprints | 104 interface depends on the algorithm used, but it generally shows you the fingerprints |
105 associated with your contact or contact devices, and asks you if you trust them or not. | 105 associated with your contact or contact devices, and asks you if you trust them or not. |
106 | 106 |
107 The only mandatory argument is the jid of your contact. | 107 The only mandatory argument is the jid of your contact. |
108 | 108 |
109 By default the currently active encryption session algorithm is used, but you may manage | 109 By default the currently active encryption session algorithm is used, but you may manage |
110 trust for an other algorithm by using ``-n NAME, --name NAME`` or ``-N NAMESPACE, | 110 trust for another algorithm by using ``-n NAME, --name NAME`` or ``-N NAMESPACE, |
111 --namespace NAMESPACE``. | 111 --namespace NAMESPACE``. |
112 | 112 |
113 .. note:: | 113 .. note:: |
114 | 114 |
115 Trusting a contact or a device means that you certify that this contact or device is | 115 Trusting a contact or a device means that you certify that this contact or device is |