@ifinfo
This file describes the PGG.
-Copyright (C) 2000 Daiki Ueno.
+Copyright (C) 2001 Daiki Ueno.
Permission is granted to copy, distribute and/or modify this document
under the terms of the GNU Free Documentation License, Version 1.1 or
@page
@vskip 0pt plus 1filll
-Copyright @copyright{} 2000 Daiki Ueno.
+Copyright @copyright{} 2001 Daiki Ueno.
Permission is granted to copy, distribute and/or modify this document
under the terms of the GNU Free Documentation License, Version 1.1 or
@menu
* Overview:: What PGG is.
-* Prerequisites::
-* How to use:: Calling PGP from your applications.
+* Prerequisites:: Complicated stuff you may have to do.
+* How to use:: Getting started quickly.
* Architecture::
* Parsing OpenPGP packets::
* Function Index::
This document assumes that you have already obtained and installed them
and that you are familiar with its basic functions.
-By default, PGG assumes to use GnuPG, but Pretty Good Privacy version 2
-or version 5 are also supported. If you are new to such a system, I
-recomend that you should look over the `GNU Privacy Handbook (GPH)',
-which is available at @uref{http://www.gnupg.org/gph/}.
+By default, PGG assumes that GnuPG is usable, but Pretty Good Privacy
+version 2 or version 5 are also supported. If you are new to such a
+system, I recomend that you should look over the GNU Privacy Handbook
+(GPH) which is available at @uref{http://www.gnupg.org/gph/}.
@node How to use
@chapter How to use
of these commands relies on a fashion of invocation because these
commands are also intended to be used as library functions. For
example, in case you don't have the signer's public key, the function
-`pgg-verify-region' fails immediately, but if the function had been
+@code{pgg-verify-region} fails immediately, but if the function had been
called interactively, it would ask you to retrieve the signer's public
key from the server.