diff options
author | Eli Zaretskii <eliz@gnu.org> | 2019-09-30 21:59:58 +0300 |
---|---|---|
committer | Eli Zaretskii <eliz@gnu.org> | 2019-09-30 21:59:58 +0300 |
commit | 9e9bd502ad8ec4e8156f823b048c0b3366ed16b4 (patch) | |
tree | 700ee8a3c6831c11e051b05ce75e0203135b8476 /src | |
parent | 5746202c182a9c69c732beb29b8507a6e6364799 (diff) | |
download | emacs-9e9bd502ad8ec4e8156f823b048c0b3366ed16b4.tar.gz |
Fix quoting in gnutls.c comments and strings
* src/gnutls.c (gnutls_make_error, emacs_gnutls_global_init)
(Fgnutls_symmetric_encrypt, Fgnutls_symmetric_decrypt)
(Fgnutls_hash_mac, Fgnutls_hash_digest): Fix quoting in doc
strings and comments.
Diffstat (limited to 'src')
-rw-r--r-- | src/gnutls.c | 28 |
1 files changed, 13 insertions, 15 deletions
diff --git a/src/gnutls.c b/src/gnutls.c index d43534b5ae1..5f412b50042 100644 --- a/src/gnutls.c +++ b/src/gnutls.c @@ -894,7 +894,7 @@ emacs_gnutls_handle_error (gnutls_session_t session, int err) } /* convert an integer error to a Lisp_Object; it will be either a - known symbol like `gnutls_e_interrupted' and `gnutls_e_again' or + known symbol like 'gnutls_e_interrupted' and 'gnutls_e_again' or simply the integer value of the error. GNUTLS_E_SUCCESS is mapped to Qt. */ static Lisp_Object @@ -1529,7 +1529,7 @@ returned as the :certificate entry. */) } /* Initialize global GnuTLS state to defaults. - Call `gnutls-global-deinit' when GnuTLS usage is no longer needed. + Call 'gnutls-global-deinit' when GnuTLS usage is no longer needed. Return zero on success. */ Lisp_Object emacs_gnutls_global_init (void) @@ -1560,7 +1560,7 @@ gnutls_ip_address_p (char *string) # if 0 /* Deinitialize global GnuTLS state. - See also `gnutls-global-init'. */ + See also 'gnutls-global-init'. */ static Lisp_Object emacs_gnutls_global_deinit (void) { @@ -2470,11 +2470,10 @@ The KEY can be specified as a buffer or string or in other ways (see Info node `(elisp)Format of GnuTLS Cryptography Inputs'). The KEY will be wiped after use if it's a string. -The IV and INPUT and the optional AEAD_AUTH can be specified as a -buffer or string or in other ways (see Info node `(elisp)Format of -GnuTLS Cryptography Inputs'). +The IV and INPUT and the optional AEAD_AUTH can also be specified as a +buffer or string or in other ways. -The alist of symmetric ciphers can be obtained with `gnutls-ciphers`. +The alist of symmetric ciphers can be obtained with `gnutls-ciphers'. The CIPHER may be a string or symbol matching a key in that alist, or a plist with the :cipher-id numeric property, or the number itself. @@ -2497,11 +2496,10 @@ The KEY can be specified as a buffer or string or in other ways (see Info node `(elisp)Format of GnuTLS Cryptography Inputs'). The KEY will be wiped after use if it's a string. -The IV and INPUT and the optional AEAD_AUTH can be specified as a -buffer or string or in other ways (see Info node `(elisp)Format of -GnuTLS Cryptography Inputs'). +The IV and INPUT and the optional AEAD_AUTH can also be specified as a +buffer or string or in other ways. -The alist of symmetric ciphers can be obtained with `gnutls-ciphers`. +The alist of symmetric ciphers can be obtained with `gnutls-ciphers'. The CIPHER may be a string or symbol matching a key in that alist, or a plist with the `:cipher-id' numeric property, or the number itself. @@ -2592,10 +2590,10 @@ The KEY can be specified as a buffer or string or in other ways (see Info node `(elisp)Format of GnuTLS Cryptography Inputs'). The KEY will be wiped after use if it's a string. -The INPUT can be specified as a buffer or string or in other -ways (see Info node `(elisp)Format of GnuTLS Cryptography Inputs'). +The INPUT can also be specified as a buffer or string or in other +ways. -The alist of MAC algorithms can be obtained with `gnutls-macs`. The +The alist of MAC algorithms can be obtained with `gnutls-macs'. The HASH-METHOD may be a string or symbol matching a key in that alist, or a plist with the `:mac-algorithm-id' numeric property, or the number itself. */) @@ -2690,7 +2688,7 @@ Return nil on error. The INPUT can be specified as a buffer or string or in other ways (see Info node `(elisp)Format of GnuTLS Cryptography Inputs'). -The alist of digest algorithms can be obtained with `gnutls-digests`. +The alist of digest algorithms can be obtained with `gnutls-digests'. The DIGEST-METHOD may be a string or symbol matching a key in that alist, or a plist with the `:digest-algorithm-id' numeric property, or the number itself. */) |