-At this time you can use various cryptographic commands. The behavior
-of these commands relies on a fashion of invocation because these
-commands are also intended to be used as library functions. For
-example, in case you don't have the signer's public key, the function
-`pgg-verify-region' fails immediately, but if the function had been
-called interactively, it would ask you to retrieve the signer's public
-key from the server.
+At this time you can use some cryptographic commands. The behavior of
+these commands relies on a fashion of invocation because they are also
+intended to be used as library functions. In case you don't have the
+signer's public key, for example, the function @code{pgg-verify-region}
+fails immediately, but if the function had been called interactively, it
+would ask you to retrieve the signer's public key from the server.