diff options
author | Nikos Mavrogiannopoulos <nmav@gnutls.org> | 2012-06-05 19:50:38 +0200 |
---|---|---|
committer | Nikos Mavrogiannopoulos <nmav@gnutls.org> | 2012-06-05 19:50:38 +0200 |
commit | 1c6b44cf6751212b7e9cabf0e625f583bbed0132 (patch) | |
tree | 5b8e3e7021153cea7f3f912449bb022b9d06965b | |
parent | 398220fa033091b34ddb80723f379ffe701fc052 (diff) | |
download | gnutls-1c6b44cf6751212b7e9cabf0e625f583bbed0132.tar.gz |
do not use @euro{}
-rw-r--r-- | doc/cha-cert-auth.texi | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/doc/cha-cert-auth.texi b/doc/cha-cert-auth.texi index 9f13182b39..7f91033d7b 100644 --- a/doc/cha-cert-auth.texi +++ b/doc/cha-cert-auth.texi @@ -426,8 +426,8 @@ used to preprocess the input to the signature algorithm. This works as long as it is difficult enough to generate two different messages with the same hash algorithm output. In that case the same signature could be used as a proof for both messages. Nobody wants to sign an innocent -message of donating 1 @euro{} to Greenpeace and find out that he -donated 1.000.000 @euro{} to Bad Inc. +message of donating 1 euro to Greenpeace and find out that he +donated 1.000.000 euros to Bad Inc. For a hash algorithm to be called cryptographic the following three requirements must hold: |