summaryrefslogtreecommitdiffstats
path: root/Doc/lib/librotor.tex
diff options
context:
space:
mode:
authorFred Drake <fdrake@acm.org>1998-02-13 06:58:54 (GMT)
committerFred Drake <fdrake@acm.org>1998-02-13 06:58:54 (GMT)
commit1947991c2f85db781fb3fcdc9e3bcfe2905e58e2 (patch)
tree260789493c7151408f009eaa84a7815ce4d28246 /Doc/lib/librotor.tex
parentdc8af0acc1fbeec89e43f1ea43bf1a4d016f4fc6 (diff)
downloadcpython-1947991c2f85db781fb3fcdc9e3bcfe2905e58e2.zip
cpython-1947991c2f85db781fb3fcdc9e3bcfe2905e58e2.tar.gz
cpython-1947991c2f85db781fb3fcdc9e3bcfe2905e58e2.tar.bz2
Remove all \bcode / \ecode cruft; this is no longer needed. See previous
checkin of myformat.sty. Change "\renewcommand{\indexsubitem}{(...)}" to "\setindexsubitem{(...)}" everywhere. Some other minor nits that I happened to come across.
Diffstat (limited to 'Doc/lib/librotor.tex')
-rw-r--r--Doc/lib/librotor.tex8
1 files changed, 4 insertions, 4 deletions
diff --git a/Doc/lib/librotor.tex b/Doc/lib/librotor.tex
index 4999c81..d2a8460 100644
--- a/Doc/lib/librotor.tex
+++ b/Doc/lib/librotor.tex
@@ -24,7 +24,7 @@ order.
The available functions in this module are:
-\renewcommand{\indexsubitem}{(in module rotor)}
+\setindexsubitem{(in module rotor)}
\begin{funcdesc}{newrotor}{key\optional{\, numrotors}}
Return a rotor object. \var{key} is a string containing the encryption key
for the object; it can contain arbitrary binary data. The key will be used
@@ -35,7 +35,7 @@ if it is omitted, a default value of 6 will be used.
Rotor objects have the following methods:
-\renewcommand{\indexsubitem}{(rotor method)}
+\setindexsubitem{(rotor method)}
\begin{funcdesc}{setkey}{key}
Sets the rotor's key to \var{key}.
\end{funcdesc}
@@ -63,7 +63,7 @@ string containing the ciphertext.
\end{funcdesc}
An example usage:
-\bcode\begin{verbatim}
+\begin{verbatim}
>>> import rotor
>>> rt = rotor.newrotor('key', 12)
>>> rt.encrypt('bar')
@@ -79,7 +79,7 @@ An example usage:
>>> rt.decrypt('\357\375$')
'l(\315'
>>> del rt
-\end{verbatim}\ecode
+\end{verbatim}
%
The module's code is not an exact simulation of the original Enigma device;
it implements the rotor encryption scheme differently from the original. The