summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorNikos Mavrogiannopoulos <nmav@gnutls.org>2012-06-10 12:55:02 +0200
committerNikos Mavrogiannopoulos <nmav@gnutls.org>2012-06-10 12:55:02 +0200
commit3e686ef013dbe016ee09a9ea4fbeca33cc67d853 (patch)
tree28d9a0281c68cbef1e3c1bc60b732963fd58845f
parent870013fd4ebbdad40f9235b8237a6a9010d97549 (diff)
downloadgnutls_2_12_20.tar.gz
do not use @eurognutls_2_12_20
-rw-r--r--doc/cha-cert-auth.texi4
-rw-r--r--doc/signatures.texi4
2 files changed, 4 insertions, 4 deletions
diff --git a/doc/cha-cert-auth.texi b/doc/cha-cert-auth.texi
index 19f4b9ef2e..2065badd87 100644
--- a/doc/cha-cert-auth.texi
+++ b/doc/cha-cert-auth.texi
@@ -578,8 +578,8 @@ used to preprocess the input to the signature algorithm. This works as
long as it is difficult enough to generate two different messages with
the same hash algorithm output. In that case the same signature could
be used as a proof for both messages. Nobody wants to sign an innocent
-message of donating 1 @euro{} to Greenpeace and find out that he
-donated 1.000.000 @euro{} to Bad Inc.
+message of donating 1 euro to Greenpeace and find out that he
+donated 1.000.000 euros to Bad Inc.
For a hash algorithm to be called cryptographic the following three
requirements must hold:
diff --git a/doc/signatures.texi b/doc/signatures.texi
index 32e1013155..1b7c667863 100644
--- a/doc/signatures.texi
+++ b/doc/signatures.texi
@@ -11,8 +11,8 @@ used to preprocess the input to the signature algorithm. This works as
long as it is difficult enough to generate two different messages with
the same hash algorithm output. In that case the same signature could
be used as a proof for both messages. Nobody wants to sign an innocent
-message of donating 1 @euro{} to Greenpeace and find out that he
-donated 1.000.000 @euro{} to Bad Inc.
+message of donating 1 euro to Greenpeace and find out that he
+donated 1.000.000 euros to Bad Inc.
For a hash algorithm to be called cryptographic the following three
requirements must hold