aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorStefan Kangas2021-04-24 10:47:50 +0200
committerStefan Kangas2021-04-24 10:49:40 +0200
commitae81b9503ac4af7d4e57ee81f3b953142d6fb015 (patch)
tree564df9dfb53eeaacf7175a7e2984a5386f6af10f
parent72ac4461676c49b7c580c40c2df10e02411fd320 (diff)
downloademacs-ae81b9503ac4af7d4e57ee81f3b953142d6fb015.tar.gz
emacs-ae81b9503ac4af7d4e57ee81f3b953142d6fb015.zip
* lisp/rot13.el: Improve documentation. (Bug#47970)
-rw-r--r--lisp/rot13.el29
1 files changed, 19 insertions, 10 deletions
diff --git a/lisp/rot13.el b/lisp/rot13.el
index dfcf4adc179..4e4e60fea3f 100644
--- a/lisp/rot13.el
+++ b/lisp/rot13.el
@@ -3,6 +3,7 @@
3;; Copyright (C) 1988, 2001-2021 Free Software Foundation, Inc. 3;; Copyright (C) 1988, 2001-2021 Free Software Foundation, Inc.
4 4
5;; Author: Howard Gayle 5;; Author: Howard Gayle
6;; Simon Josefsson
6;; Maintainer: emacs-devel@gnu.org 7;; Maintainer: emacs-devel@gnu.org
7 8
8;; This file is part of GNU Emacs. 9;; This file is part of GNU Emacs.
@@ -22,18 +23,26 @@
22 23
23;;; Commentary: 24;;; Commentary:
24 25
25;; The entry point, `rot13-other-window', performs a Caesar cipher 26;; "ROT13 ('rotate by 13 places') is a simple letter substitution
26;; encrypt/decrypt on the current buffer and displays the result in another 27;; cipher that replaces a letter with the 13th letter after it in
27;; window. ROT13 encryption is sometimes used on USENET as a read-at-your- 28;; the alphabet. ROT13 is a special case of the Caesar cipher
28;; own-risk wrapper for material some might consider offensive, such as 29;; which was developed in ancient Rome.
29;; ethnic humor.
30;; 30;;
31;; Written by Howard Gayle. 31;; Because there are 26 letters (2×13) in the basic Latin
32;; This hack is mainly to show off the char table stuff. 32;; alphabet, ROT13 is its own inverse; that is, to undo ROT13, the
33;; same algorithm is applied, so the same action can be used for
34;; encoding and decoding. The algorithm provides virtually no
35;; cryptographic security, and is often cited as a canonical
36;; example of weak encryption.
33;; 37;;
34;; New entry points, `rot13', `rot13-string', and `rot13-region' that 38;; ROT13 is used in online forums as a means of hiding spoilers,
35;; performs Caesar cipher encrypt/decrypt on buffers and strings, was 39;; punchlines, puzzle solutions, and offensive materials from the
36;; added by Simon Josefsson. 40;; casual glance." - Wikipedia article on ROT13
41;;
42;; The entry points, `rot13', `rot13-string', and `rot13-region' performs ROT13
43;; encoding/decoding on buffers and strings. The entry point
44;; `rot13-other-window' performs a ROT13 encoding/decoding on the current
45;; buffer and displays the result in another window.
37 46
38;;; Code: 47;;; Code:
39 48