From 3e686ef013dbe016ee09a9ea4fbeca33cc67d853 Mon Sep 17 00:00:00 2001 From: Nikos Mavrogiannopoulos Date: Sun, 10 Jun 2012 12:55:02 +0200 Subject: do not use @euro --- doc/cha-cert-auth.texi | 4 ++-- doc/signatures.texi | 4 ++-- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/doc/cha-cert-auth.texi b/doc/cha-cert-auth.texi index 19f4b9ef2e..2065badd87 100644 --- a/doc/cha-cert-auth.texi +++ b/doc/cha-cert-auth.texi @@ -578,8 +578,8 @@ used to preprocess the input to the signature algorithm. This works as long as it is difficult enough to generate two different messages with the same hash algorithm output. In that case the same signature could be used as a proof for both messages. Nobody wants to sign an innocent -message of donating 1 @euro{} to Greenpeace and find out that he -donated 1.000.000 @euro{} to Bad Inc. +message of donating 1 euro to Greenpeace and find out that he +donated 1.000.000 euros to Bad Inc. For a hash algorithm to be called cryptographic the following three requirements must hold: diff --git a/doc/signatures.texi b/doc/signatures.texi index 32e1013155..1b7c667863 100644 --- a/doc/signatures.texi +++ b/doc/signatures.texi @@ -11,8 +11,8 @@ used to preprocess the input to the signature algorithm. This works as long as it is difficult enough to generate two different messages with the same hash algorithm output. In that case the same signature could be used as a proof for both messages. Nobody wants to sign an innocent -message of donating 1 @euro{} to Greenpeace and find out that he -donated 1.000.000 @euro{} to Bad Inc. +message of donating 1 euro to Greenpeace and find out that he +donated 1.000.000 euros to Bad Inc. For a hash algorithm to be called cryptographic the following three requirements must hold -- cgit v1.2.1