aboutsummaryrefslogtreecommitdiffstats
path: root/g10/keyedit.c
diff options
context:
space:
mode:
authorDavid Shaw <[email protected]>2005-01-28 00:50:10 +0000
committerDavid Shaw <[email protected]>2005-01-28 00:50:10 +0000
commitdf42d339d9042916d9d23f63cbb76a97d0062ab5 (patch)
tree733c619f6bcc431025f06dc1090cc70074f3b8ee /g10/keyedit.c
parent* keygen.c (generate_subkeypair): Detect primary key on-card and (diff)
downloadgnupg-df42d339d9042916d9d23f63cbb76a97d0062ab5.tar.gz
gnupg-df42d339d9042916d9d23f63cbb76a97d0062ab5.zip
* keyid.c (keyid_from_sk, keyid_from_pk): Use 0xFFFFFFFFFFFFFFFF
instead of 0x0000000000000000 for the invalid key ID since all-zeroes is reserved for the anonymous recipient. * keyedit.c (change_passphrase), keygen.c (generate_subkeypair): Fix a string ;)
Diffstat (limited to '')
-rw-r--r--g10/keyedit.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/g10/keyedit.c b/g10/keyedit.c
index 84fc6d4cc..39e7fbda6 100644
--- a/g10/keyedit.c
+++ b/g10/keyedit.c
@@ -1110,7 +1110,7 @@ change_passphrase( KBNODE keyblock )
no_primary_secrets = 1;
}
else if( sk->protect.s2k.mode == 1002 ) {
- tty_printf(_("Secret parts of primary key are store on-card.\n"));
+ tty_printf(_("Secret parts of primary key are stored on-card.\n"));
no_primary_secrets = 1;
}
else {