+2001-02-06 21:00:00 ShengHuo ZHU <zsh@cs.rochester.edu>
+
+ * gnus-group.el (gnus-group-listing-limit): New.
+ (gnus-group-prepare-flat-list-dead): Use old trick to speed up.
+
+ * gnus-topic.el (gnus-group-prepare-topics): Use gnus-killed-hashtb.
+
2001-02-06 18:00:00 ShengHuo ZHU <zsh@cs.rochester.edu>
* message.el (message-newline-and-reformat): Special case for
:type '(choice (string :tag "Prompt string")
(const :tag "Empty" nil)))
+(defvar gnus-group-listing-limit 1000
+ "*A limit of the number of groups when listing.
+If the number of groups is larger than the limit, list them in a
+simple manner.")
+
;;; Internal variables
(defvar gnus-group-sort-alist-function 'gnus-group-sort-flat
;; suggested by Jack Vinson <vinson@unagi.cis.upenn.edu>. It does
;; this by ignoring the group format specification altogether.
(let (group)
- (while groups
- (setq group (pop groups))
- (when (gnus-group-prepare-logic
- group
- (or (not regexp)
- (and (stringp regexp) (string-match regexp group))
- (and (functionp regexp) (funcall regexp group))))
-;;; (gnus-add-text-properties
-;;; (point) (prog1 (1+ (point))
-;;; (insert " " mark " *: "
-;;; (gnus-group-name-decode group
-;;; (gnus-group-name-charset
-;;; nil group))
-;;; "\n"))
-;;; (list 'gnus-group (gnus-intern-safe group gnus-active-hashtb)
-;;; 'gnus-unread t
-;;; 'gnus-level level))
- (gnus-group-insert-group-line
- group level nil
- (let ((active (gnus-active group)))
- (if active
- (if (zerop (cdr active))
- 0
- (- (1+ (cdr active)) (car active)))
- nil))
- (gnus-method-simplify (gnus-find-method-for-group group)))))))
+ (if (> (length groups) gnus-group-listing-limit)
+ (while groups
+ (setq group (pop groups))
+ (when (gnus-group-prepare-logic
+ group
+ (or (not regexp)
+ (and (stringp regexp) (string-match regexp group))
+ (and (functionp regexp) (funcall regexp group))))
+ (gnus-add-text-properties
+ (point) (prog1 (1+ (point))
+ (insert " " mark " *: "
+ (gnus-group-name-decode group
+ (gnus-group-name-charset
+ nil group))
+ "\n"))
+ (list 'gnus-group (gnus-intern-safe group gnus-active-hashtb)
+ 'gnus-unread t
+ 'gnus-level level))))
+ (while groups
+ (setq group (pop groups))
+ (when (gnus-group-prepare-logic
+ group
+ (or (not regexp)
+ (and (stringp regexp) (string-match regexp group))
+ (and (functionp regexp) (funcall regexp group))))
+ (gnus-group-insert-group-line
+ group level nil
+ (let ((active (gnus-active group)))
+ (if active
+ (if (zerop (cdr active))
+ 0
+ (- (1+ (cdr active)) (car active)))
+ nil))
+ (gnus-method-simplify (gnus-find-method-for-group group))))))))
(defun gnus-group-update-group-line ()
"Update the current line in the group buffer."
(and (>= level gnus-level-killed)
(<= lowest gnus-level-killed)))
(gnus-group-prepare-flat-list-dead
- (gnus-union
- (and not-in-list
- (gnus-delete-if (lambda (group)
- (< (gnus-group-level group) gnus-level-killed))
- not-in-list))
- (setq gnus-killed-list (sort gnus-killed-list 'string<)))
- gnus-level-killed ?K
- regexp))
+ (setq gnus-killed-list (sort gnus-killed-list 'string<))
+ gnus-level-killed ?K regexp)
+ (when not-in-list
+ (unless gnus-killed-hashtb
+ (gnus-make-hashtable-from-killed))
+ (gnus-group-prepare-flat-list-dead
+ (gnus-delete-if (lambda (group)
+ (or (gnus-gethash group gnus-newsrc-hashtb)
+ (gnus-gethash group gnus-killed-hashtb)))
+ not-in-list)
+ gnus-level-killed ?K regexp)))
;; Use topics.
(prog1
+2001-02-06 19:00:00 ShengHuo ZHU <zsh@cs.rochester.edu>
+
+ * gnus.texi (Using GPG): Key binding.
+
+ * message.texi (Security): Ditto.
+
2001-02-06 18:00:00 ShengHuo ZHU <zsh@cs.rochester.edu>
* gnus.texi (Top): Add Using GPG.
(setq gpg-command-default-alist (quote ((gpg . "gpg") (gpg-2comp . "gpg"))))
@end lisp
-To sign or encrypt your message you may choose to use the MML Security menu or
-@kbd{M-m s p} to sign your message using PGP/MIME, @kbd{M-m s s} to sign your
-message using S/MIME. There's also @kbd{M-m c p} to encrypt your message with
-PGP/MIME and @kbd{M-m c s} to encrypt using S/MIME.
+To sign or encrypt your message you may choose to use the MML Security
+menu or @kbd{C-c C-m s p} to sign your message using PGP/MIME, @kbd{C-c
+C-m s s} to sign your message using S/MIME. There's also @kbd{C-c C-m c
+p} to encrypt your message with PGP/MIME and @kbd{C-c C-m c s} to
+encrypt using S/MIME.
Gnus will ask for your passphrase and then it will send your message, if
you've typed it correctly.
\e$B$-\e(B @sc{imap} \e$B%/%i%$%"%s%H$G%a!<%k%\%C%/%9$r=|$-!"$$$/$D$+$N5-;v$K4{\e(B
\e$BFI\e(B (\e$B$b$7$/$O!"\e(BSEEN) \e$B$N0u$rIU$1$k$J$i!"\e(B@samp{nil} \e$B$K@_Dj$7$?$$$+$b$7$l$^\e(B
\e$B$;$s!#$=$&$9$l$P!"%a!<%k%\%C%/%9$NA4$F$N5-;v$O0u$NG!2?$K4X$o$i$:<hF@$5$l\e(B
-\e$B$^$9!#=R8l$N40A4$J0lMw$O!"\e(BRFC2060 \e.A\eN'6.4.4 \e$B$rFI$s$G$/$@$5$$!#\e(B
+\e$B$^$9!#=R8l$N40A4$J0lMw$O!"\e(BRFC2060 \eN'6.4.4 \e$B$rFI$s$G$/$@$5$$!#\e(B
@item :fetchflag
\e$B%5!<%P!<$G!"<hF@$7$?5-;v$K0u$rIU$1$kJ}K!!#=i4|CM$N\e(B @samp{\Deleted} \e$B$O$=\e(B
\e$B$l$i$K>C5n$N0u$rIU$1$^$9$,!"B>$K\e(B @samp{\Seen} \e$B$G$OC1$K4{FI$N0u$rIU$1$^$9!#\e(B
-\e$B$3$l$i$O:G$b$"$j$=$&$JFs$D$NA*Br$G$9$,!"B>$N0u$b\e(B RFC2060 \e.A\eN'2.3.2 \e$B$GDj5A$5\e(B
+\e$B$3$l$i$O:G$b$"$j$=$&$JFs$D$NA*Br$G$9$,!"B>$N0u$b\e(B RFC2060 \eN'2.3.2 \e$B$GDj5A$5\e(B
\e$B$l$F$$$^$9!#\e(B
@item :dontexpunge
@item !
@itemx not
-@itemx \e.A\eN,
+@itemx \eN,
\e$B$3$NO@M}:nMQ;R$OC10l$N0z?t$N$_$r$H$j$^$9!#$=$l$O$=$N0z?t$NCM$NO@M}H]Dj$r\e(B
\e$BJV$7$^$9!#\e(B
\e$B2<$5$$!#\e(B
@item
-Fran\e.A\eNgois Pinard---\e$BB?$/$N!"B?$/$N6=L#?<$/40A4$J%P%0%l%]!<%H$H\e(B autoconf \e$B$N\e(B
+Fran\eNgois Pinard---\e$BB?$/$N!"B?$/$N6=L#?<$/40A4$J%P%0%l%]!<%H$H\e(B autoconf \e$B$N\e(B
\e$B%5%]!<%H!#\e(B
@end itemize
Christopher Davis,
Andrew Eskilsson,
Kai Grossjohann,
-David K\e.A\eNegedal,
+David K\eNegedal,
Richard Pieri,
Fabrice Popineau,
Daniel Quinlan,
Richard Hoskins,
Brad Howes,
Miguel de Icaza,
-Fran\e.A\eNgois Felix Ingrand,
+Fran\eNgois Felix Ingrand,
Tatsuya Ichikawa, @c ?
Ishikawa Ichiro, @c Ishikawa
Lee Iverson,
@end example
@item
- tanken var at n\e.A\eNer du bruker `gnus-startup-file' som prefix (FOO) til \eNe lete
-opp en fil FOO-SERVER, FOO-SERVER.el, FOO-SERVER.eld, kan du la den v\e.A\eNfre en
+ tanken var at n\eNer du bruker `gnus-startup-file' som prefix (FOO) til \eNe lete
+opp en fil FOO-SERVER, FOO-SERVER.el, FOO-SERVER.eld, kan du la den v\eNfre en
liste hvor du bruker hvert element i listen som FOO, istedet. da kunne man
hatt forskjellige serveres startup-filer forskjellige steder.
for sci? first the sci.something? then sci.somethingelse?...
@item
-Ja, det burde v\e.A\eNfre en m\eNete \eNe si slikt. Kanskje en ny variabel?
-`gnus-use-few-score-files'? S\e.A\eNe kunne score-regler legges til den
+Ja, det burde v\eNfre en m\eNete \eNe si slikt. Kanskje en ny variabel?
+`gnus-use-few-score-files'? S\eNe kunne score-regler legges til den
"mest" lokale score-fila. F. eks. ville no-gruppene betjenes av
"no.all.SCORE", osv.
@item
gnus-article-hide-pgp
-Selv ville jeg nok ha valgt \e.A\eNe slette den dersom teksten matcher
+Selv ville jeg nok ha valgt \eNe slette den dersom teksten matcher
@example
"\\(This\s+\\)?[^ ]+ has been automatically signed by"
@end example
(setq gpg-command-default-alist (quote ((gpg . "gpg") (gpg-2comp . "gpg"))))
@end lisp
-To sign or encrypt your message you may choose to use the MML Security menu or
-@kbd{M-m s p} to sign your message using PGP/MIME, @kbd{M-m s s} to sign your
-message using S/MIME. There's also @kbd{M-m c p} to encrypt your message with
-PGP/MIME and @kbd{M-m c s} to encrypt using S/MIME.
+To sign or encrypt your message you may choose to use the MML Security
+menu or @kbd{C-c C-m s p} to sign your message using PGP/MIME, @kbd{C-c
+C-m s s} to sign your message using S/MIME. There's also @kbd{C-c C-m c
+p} to encrypt your message with PGP/MIME and @kbd{C-c C-m c s} to
+encrypt using S/MIME.
Gnus will ask for your passphrase and then it will send your message, if
you've typed it correctly.
@c Using the MML language, Message is able to create digitally signed and
@c digitally encrypted messages. Message (or rather MML) currently support
@c PGP/MIME and S/MIME. Instructing MML to perform security operations on
-@c a MIME part is done using the @code{M-m s} key map for signing and the
-@c @code{M-m c} key map for encryption, as follows.
+@c a MIME part is done using the @code{C-c C-m s} key map for signing and the
+@c @code{C-c C-m c} key map for encryption, as follows.
@c @table @kbd
-@c @item M-m s s
-@c @kindex M-m s s
+@c @item C-c C-m s s
+@c @kindex C-c C-m s s
@c @findex mml-secure-sign-smime
@c Digitally sign current MIME part using S/MIME.
-@c @item M-m s p
-@c @kindex M-m s p
+@item C-c C-m s p
+@kindex C-c C-m s p
@c @findex mml-secure-sign-pgp
@c Digitally sign current MIME part using PGP/MIME.
-@c @item M-m c s
-@c @kindex M-m c s
+@item C-c C-m c s
+@kindex C-c C-m c s
@c @findex mml-secure-encrypt-smime
@c Digitally encrypt current MIME part using S/MIME.
-@c @item M-m c p
-@c @kindex M-m c p
+@item C-c C-m c p
+@kindex C-c C-m c p
@c @findex mml-secure-encrypt-pgpmime
@c Digitally encrypt current MIME part using PGP/MIME.
@c information is sent, you may want to have some way to ensure that your
@c mail is actually signed or encrypted. After invoking the above
@c sign/encrypt commands, it is possible to preview the raw article by
-@c using @code{C-u M-m P} (@code{mml-preview}). Then you can verify that
+@c using @code{C-u C-m P} (@code{mml-preview}). Then you can verify that
@c your long rant about what your ex-significant other or whomever actually
@c did with that funny looking person at that strange party the other
@c night, actually will be sent encrypted.
@c To be able to send encrypted mail, a personal certificate is not
@c required. Message (MML) need a certificate for the person to whom you
@c wish to communicate with though. You're asked for this when you type
-@c @code{M-m c s}. Currently there are two ways to retrieve this
+@c @code{C-c C-m c s}. Currently there are two ways to retrieve this
@c certificate, from a local file or from DNS. If you chose a local file,
@c it need to contain a X.509 certificate in PEM format. If you chose DNS,
@c you're asked for the domain name where the certificate is stored, the
Using the MML language, Message is able to create digitally signed and
digitally encrypted messages. Message (or rather MML) currently support
PGP/MIME and S/MIME. Instructing MML to perform security operations on
-a MIME part is done using the @code{M-m s} key map for signing and the
-@code{M-m c} key map for encryption, as follows.
+a MIME part is done using the @code{C-c C-m s} key map for signing and the
+@code{C-c C-m c} key map for encryption, as follows.
@table @kbd
-@item M-m s s
-@kindex M-m s s
+@item C-c C-m s s
+@kindex C-c C-m s s
@findex mml-secure-sign-smime
Digitally sign current MIME part using S/MIME.
-@item M-m s p
-@kindex M-m s p
+@item C-c C-m s p
+@kindex C-c C-m s p
@findex mml-secure-sign-pgp
Digitally sign current MIME part using PGP/MIME.
-@item M-m c s
-@kindex M-m c s
+@item C-c C-m c s
+@kindex C-c C-m c s
@findex mml-secure-encrypt-smime
Digitally encrypt current MIME part using S/MIME.
-@item M-m c p
-@kindex M-m c p
+@item C-c C-m c p
+@kindex C-c C-m c p
@findex mml-secure-encrypt-pgpmime
Digitally encrypt current MIME part using PGP/MIME.
information is sent, you may want to have some way to ensure that your
mail is actually signed or encrypted. After invoking the above
sign/encrypt commands, it is possible to preview the raw article by
-using @code{C-u M-m P} (@code{mml-preview}). Then you can verify that
+using @code{C-u C-m P} (@code{mml-preview}). Then you can verify that
your long rant about what your ex-significant other or whomever actually
did with that funny looking person at that strange party the other
night, actually will be sent encrypted.
To be able to send encrypted mail, a personal certificate is not
required. Message (MML) need a certificate for the person to whom you
wish to communicate with though. You're asked for this when you type
-@code{M-m c s}. Currently there are two ways to retrieve this
+@code{C-c C-m c s}. Currently there are two ways to retrieve this
certificate, from a local file or from DNS. If you chose a local file,
it need to contain a X.509 certificate in PEM format. If you chose DNS,
you're asked for the domain name where the certificate is stored, the