summaryrefslogtreecommitdiff
path: root/src/mint-lib
diff options
context:
space:
mode:
authorChristian Grothoff <christian@grothoff.org>2015-08-09 15:40:16 +0200
committerChristian Grothoff <christian@grothoff.org>2015-08-09 15:40:16 +0200
commitc6f88ebd61ba69cddf71b1b70a1952c61f1112b4 (patch)
treec3ba4dfa0dd58574abc0e1ce41984d67bdeaa0da /src/mint-lib
parent2ff3a5462cef04d8968d8f9cdaee486db99115f7 (diff)
downloadexchange-c6f88ebd61ba69cddf71b1b70a1952c61f1112b4.tar.gz
exchange-c6f88ebd61ba69cddf71b1b70a1952c61f1112b4.tar.bz2
exchange-c6f88ebd61ba69cddf71b1b70a1952c61f1112b4.zip
doxygen-fixes
Diffstat (limited to 'src/mint-lib')
-rw-r--r--src/mint-lib/mint_api_deposit.c2
-rw-r--r--src/mint-lib/mint_api_refresh.c10
2 files changed, 6 insertions, 6 deletions
diff --git a/src/mint-lib/mint_api_deposit.c b/src/mint-lib/mint_api_deposit.c
index 4484f1cd1..3da9d0ae4 100644
--- a/src/mint-lib/mint_api_deposit.c
+++ b/src/mint-lib/mint_api_deposit.c
@@ -358,7 +358,7 @@ verify_signatures (const struct TALER_MINT_DenomPublicKey *dki,
*
* @param mint the mint handle; the mint must be ready to operate
* @param amount the amount to be deposited
- * @param wire the merchant’s account details, in a format supported by the mint
+ * @param wire_details the merchant’s account details, in a format supported by the mint
* @param h_contract hash of the contact of the merchant with the customer (further details are never disclosed to the mint)
* @param coin_pub coin’s public key
* @param denom_pub denomination key with which the coin is signed
diff --git a/src/mint-lib/mint_api_refresh.c b/src/mint-lib/mint_api_refresh.c
index 535262653..d8391ac4a 100644
--- a/src/mint-lib/mint_api_refresh.c
+++ b/src/mint-lib/mint_api_refresh.c
@@ -820,11 +820,11 @@ setup_fresh_coin (struct FreshCoin *fc,
* no money is lost in case of hardware failures, is operation does
* not actually initiate the request. Instead, it generates a buffer
* which the caller must store before proceeding with the actual call
- * to #TALER_MINT_refresh_execute() that will generate the request.
+ * to #TALER_MINT_refresh_melt() that will generate the request.
*
* This function does verify that the given request data is internally
- * consistent. However, the @a melts_sigs are only verified if @a
- * check_sigs is set to #GNUNET_YES, as this may be relatively
+ * consistent. However, the @a melts_sigs are only verified if
+ * @a check_sigs is set to #GNUNET_YES, as this may be relatively
* expensive and should be redundant.
*
* Aside from some non-trivial cryptographic operations that might
@@ -845,11 +845,11 @@ setup_fresh_coin (struct FreshCoin *fc,
* @param check_sigs verify the validity of the signatures of @a melt_sigs
* @param fresh_pks_len length of the @a pks array
* @param fresh_pks array of @a pks_len denominations of fresh coins to create
- * @param[OUT] res_size set to the size of the return value, or 0 on error
+ * @param[out] res_size set to the size of the return value, or 0 on error
* @return NULL
* if the inputs are invalid (i.e. denomination key not with this mint).
* Otherwise, pointer to a buffer of @a res_size to store persistently
- * before proceeding to #TALER_MINT_refresh_execute().
+ * before proceeding to #TALER_MINT_refresh_melt().
* Non-null results should be freed using #GNUNET_free().
*/
char *