diff options
author | Werner Koch <[email protected]> | 2018-07-05 07:42:06 +0000 |
---|---|---|
committer | Werner Koch <[email protected]> | 2018-07-05 07:42:06 +0000 |
commit | 9ea9b9db7e1b3e6a84104a2be48d492f12c6316c (patch) | |
tree | 9b7f3d59837366af4f8b3fc6e5d40a409943eada | |
parent | gpg: Ignore too large user ids during import. (diff) | |
download | gnupg-9ea9b9db7e1b3e6a84104a2be48d492f12c6316c.tar.gz gnupg-9ea9b9db7e1b3e6a84104a2be48d492f12c6316c.zip |
doc: Typo fix in a comment.
--
-rw-r--r-- | g10/keygen.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/g10/keygen.c b/g10/keygen.c index 9e9cead07..fbead107b 100644 --- a/g10/keygen.c +++ b/g10/keygen.c @@ -3293,7 +3293,7 @@ parse_key_parameter_string (const char *string, int part, * part consider this to be the subkey algo. In case a * SUGGESTED_USE has been given and the usage of the secondary * part does not match SUGGESTED_USE try again using the primary - * part. Noet thar when falling back to the primary key we need + * part. Note that when falling back to the primary key we need * to force clearing the cert usage. */ if (secondary) { |