On 13 April 1999 at 8:42, Hal DeVore <[EMAIL PROTECTED]> wrote:
> As was rightly
> pointed out such things really should go in to the underlying nmh
> code so they are accessible "from the command line".

Hal, I hope you can encourage other exmh hackers to think that way if
you notice that they "forget."  nmh is just about the last MUA that's
so programmable; let's not lose that!

> So.  The question is:  how could such a thing be "hooked in" to 
> nmh?

The commands that do aliasing are ali, whom, and send.  I haven't
checked the source code, but I'd bet there's one underlying function
that does the dirty work.  That seems like the right place to me.

Jerry
-- 
Jerry Peek, [EMAIL PROTECTED], http://www.jpeek.com/~jpeek/

Reply via email to