summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorNikos Mavrogiannopoulos <nmav@gnutls.org>2012-06-05 19:50:38 +0200
committerNikos Mavrogiannopoulos <nmav@gnutls.org>2012-06-05 19:50:38 +0200
commit1c6b44cf6751212b7e9cabf0e625f583bbed0132 (patch)
tree5b8e3e7021153cea7f3f912449bb022b9d06965b
parent398220fa033091b34ddb80723f379ffe701fc052 (diff)
downloadgnutls-1c6b44cf6751212b7e9cabf0e625f583bbed0132.tar.gz
do not use @euro{}
-rw-r--r--doc/cha-cert-auth.texi4
1 files changed, 2 insertions, 2 deletions
diff --git a/doc/cha-cert-auth.texi b/doc/cha-cert-auth.texi
index 9f13182b39..7f91033d7b 100644
--- a/doc/cha-cert-auth.texi
+++ b/doc/cha-cert-auth.texi
@@ -426,8 +426,8 @@ used to preprocess the input to the signature algorithm. This works as
long as it is difficult enough to generate two different messages with
the same hash algorithm output. In that case the same signature could
be used as a proof for both messages. Nobody wants to sign an innocent
-message of donating 1 @euro{} to Greenpeace and find out that he
-donated 1.000.000 @euro{} to Bad Inc.
+message of donating 1 euro to Greenpeace and find out that he
+donated 1.000.000 euros to Bad Inc.
For a hash algorithm to be called cryptographic the following three
requirements must hold: