summaryrefslogtreecommitdiff
path: root/doc
diff options
context:
space:
mode:
authorNikos Mavrogiannopoulos <nmav@gnutls.org>2012-06-05 19:50:46 +0200
committerNikos Mavrogiannopoulos <nmav@gnutls.org>2012-06-05 19:50:46 +0200
commitfbdc688c7b13a591df3fcfcab8a2cee4901f6f89 (patch)
tree824bd5f657e45083b1b8de7afea325df49835b3a /doc
parent75ed5f82a8b6a5f697c06feb1254152bb8b1f0ff (diff)
downloadgnutls-fbdc688c7b13a591df3fcfcab8a2cee4901f6f89.tar.gz
do not use @euro{}
Diffstat (limited to 'doc')
-rw-r--r--doc/cha-cert-auth.texi4
-rwxr-xr-xdoc/scripts/mytexi2latex3
2 files changed, 3 insertions, 4 deletions
diff --git a/doc/cha-cert-auth.texi b/doc/cha-cert-auth.texi
index 8c00ece198..8aad126c5d 100644
--- a/doc/cha-cert-auth.texi
+++ b/doc/cha-cert-auth.texi
@@ -430,8 +430,8 @@ used to preprocess the input to the signature algorithm. This works as
long as it is difficult enough to generate two different messages with
the same hash algorithm output. In that case the same signature could
be used as a proof for both messages. Nobody wants to sign an innocent
-message of donating 1 @euro{} to Greenpeace and find out that he
-donated 1.000.000 @euro{} to Bad Inc.
+message of donating 1 euro to Greenpeace and find out that he
+donated 1.000.000 euros to Bad Inc.
For a hash algorithm to be called cryptographic the following three
requirements must hold:
diff --git a/doc/scripts/mytexi2latex b/doc/scripts/mytexi2latex
index 114e337f88..5681f9e9b8 100755
--- a/doc/scripts/mytexi2latex
+++ b/doc/scripts/mytexi2latex
@@ -365,8 +365,7 @@ multitable:
$line =~ s/\@cindex (.+)/\\index{$1}/g;
$line =~ s/\@pindex (.+)/\\index{$1}/g;
$line =~ s/\@url\{($underscorematch+)\}/\\url{$1}/g;
- #$line =~ s/\@euro/\\euro/g;
- $line =~ s/\s*\@euro\{\}/\~\\textgreek\{\\euro\}/g;
+ #$line =~ s/\s*\@euro\{\}/\~\\textgreek\{\\euro\}/g;
$line =~ s/\@page/\\newpage/g;
$line =~ s/\@file\{($spacematch+)\}/\\file{$1}/g;
$line =~ s/\@code\{/\\code{/g;