diff options
author | Werner Koch <wk@gnupg.org> | 2003-07-01 10:34:45 +0200 |
---|---|---|
committer | Werner Koch <wk@gnupg.org> | 2003-07-01 10:34:45 +0200 |
commit | 39046ea7ec221efa9db946230ddc9fb3e65d19ab (patch) | |
tree | aa251dc190129aef89d82597f7ffb53ba6486fc9 /g10/packet.h | |
parent | Key generation and signing using the OpenPGP card does rudimentary work. (diff) | |
download | gnupg2-39046ea7ec221efa9db946230ddc9fb3e65d19ab.tar.xz gnupg2-39046ea7ec221efa9db946230ddc9fb3e65d19ab.zip |
* app-openpgp.c (store_fpr): Fixed fingerprint calculation.
* keygen.c (gen_card_key): Obviously we should use the creation
date received from SCDAEMON, so that the fingerprints will match.
* sign.c (do_sign): Pass the serialno to the sign code.
* keyid.c (serialno_and_fpr_from_sk): New.
Diffstat (limited to 'g10/packet.h')
-rw-r--r-- | g10/packet.h | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/g10/packet.h b/g10/packet.h index 81851373d..dc5b1583a 100644 --- a/g10/packet.h +++ b/g10/packet.h @@ -193,7 +193,7 @@ typedef struct { * Note about the pkey/skey elements: We assume that the secret keys * has the same elemts as the public key at the begin of the array, so * that npkey < nskey and it is possible to compare the secret and - * public keys by comparing the first npkey elements of pkey againts skey. + * public keys by comparing the first npkey elements of pkey against skey. */ typedef struct { u32 timestamp; /* key made */ |