diff options
author | NIIBE Yutaka <gniibe@fsij.org> | 2017-04-28 03:06:33 +0200 |
---|---|---|
committer | NIIBE Yutaka <gniibe@fsij.org> | 2017-04-28 03:06:33 +0200 |
commit | 5c8fe5480964c282540c051b538e812851988422 (patch) | |
tree | 61da9fb34cfb67875bea2dc259741c0e9b8ca78f /g10 | |
parent | g10: For signing, prefer available card key when no -u option. (diff) | |
download | gnupg2-5c8fe5480964c282540c051b538e812851988422.tar.xz gnupg2-5c8fe5480964c282540c051b538e812851988422.zip |
Spelling fixes in docs and comments.
--
In addition, fix trailing spaces in tests/inittests.
GnuPG-bug-id: 3121
Reported-by: ka7 (klemens)
Signed-off-by: NIIBE Yutaka <gniibe@fsij.org>
Diffstat (limited to 'g10')
-rw-r--r-- | g10/call-agent.c | 2 | ||||
-rw-r--r-- | g10/getkey.c | 4 | ||||
-rw-r--r-- | g10/gpg.c | 2 | ||||
-rw-r--r-- | g10/import.c | 4 | ||||
-rw-r--r-- | g10/keydb.h | 4 | ||||
-rw-r--r-- | g10/keyedit.c | 8 | ||||
-rw-r--r-- | g10/keylist.c | 2 | ||||
-rw-r--r-- | g10/openfile.c | 2 | ||||
-rw-r--r-- | g10/packet.h | 2 | ||||
-rw-r--r-- | g10/seskey.c | 4 | ||||
-rw-r--r-- | g10/tdbio.c | 2 | ||||
-rw-r--r-- | g10/tofu.c | 4 | ||||
-rw-r--r-- | g10/trustdb.c | 2 | ||||
-rw-r--r-- | g10/verify.c | 2 |
14 files changed, 22 insertions, 22 deletions
diff --git a/g10/call-agent.c b/g10/call-agent.c index 0ba978774..be8c33d74 100644 --- a/g10/call-agent.c +++ b/g10/call-agent.c @@ -758,7 +758,7 @@ agent_keytocard (const char *hexgrip, int keyno, int force, /* Call the agent to retrieve a data object. This function returns the data in the same structure as used by the learn command. It is - allowed to update such a structure using this commmand. */ + allowed to update such a structure using this command. */ int agent_scd_getattr (const char *name, struct agent_card_info_s *info) { diff --git a/g10/getkey.c b/g10/getkey.c index 75b8564f3..d8c81c937 100644 --- a/g10/getkey.c +++ b/g10/getkey.c @@ -368,7 +368,7 @@ cache_user_id (KBNODE keyblock) /* Disable and drop the public key cache (which is filled by cache_public_key and get_pubkey). Note: there is currently no way - to reenable this cache. */ + to re-enable this cache. */ void getkey_disable_caches () { @@ -413,7 +413,7 @@ pubkeys_free (pubkey_t keys) } } -/* Returns all keys that match the search specfication SEARCH_TERMS. +/* Returns all keys that match the search specification SEARCH_TERMS. This function also checks for and warns about duplicate entries in the keydb, which can occur if the user has configured multiple @@ -2110,7 +2110,7 @@ parse_compliance_option (const char *string) -/* Helper to set compliance related options. This is a separte +/* Helper to set compliance related options. This is a separate * function so that it can also be used by the --compliance option * parser. */ static void diff --git a/g10/import.c b/g10/import.c index ba1c44a43..a942c2e5f 100644 --- a/g10/import.c +++ b/g10/import.c @@ -755,7 +755,7 @@ valid_keyblock_packet (int pkttype) /**************** * Read the next keyblock from stream A. * Meta data (ring trust packets) are only considered of WITH_META is set. - * PENDING_PKT should be initialzed to NULL and not changed by the caller. + * PENDING_PKT should be initialized to NULL and not changed by the caller. * Return: 0 = okay, -1 no more blocks or another errorcode. * The int at at R_V3KEY counts the number of unsupported v3 * keyblocks. @@ -2681,7 +2681,7 @@ chk_self_sigs (ctrl_t ctrl, kbnode_t keyblock, u32 *keyid, int *non_self) /* Delete all parts which are invalid and those signatures whose - * public key algorithm is not available in this implemenation; but + * public key algorithm is not available in this implementation; but * consider RSA as valid, because parse/build_packets knows about it. * * Returns: True if at least one valid user-id is left over. diff --git a/g10/keydb.h b/g10/keydb.h index 7f427382d..1da93a777 100644 --- a/g10/keydb.h +++ b/g10/keydb.h @@ -109,7 +109,7 @@ struct pubkey_find_info { }; -/* Helper type for preference fucntions. */ +/* Helper type for preference functions. */ union pref_hint { int digest_length; @@ -301,7 +301,7 @@ void pubkey_free (pubkey_t key); /* Free a list of public keys. */ void pubkeys_free (pubkey_t keys); -/* Returns all keys that match the search specfication SEARCH_TERMS. +/* Returns all keys that match the search specification SEARCH_TERMS. The returned keys should be freed using pubkeys_free. */ gpg_error_t get_pubkeys (ctrl_t ctrl, diff --git a/g10/keyedit.c b/g10/keyedit.c index a7a5f7209..ba08d88c3 100644 --- a/g10/keyedit.c +++ b/g10/keyedit.c @@ -1593,7 +1593,7 @@ sign_uids (ctrl_t ctrl, estream_t fp, continue; /* Now we can sign the user ids. */ - reloop: /* (Must use this, because we are modifing the list.) */ + reloop: /* (Must use this, because we are modifying the list.) */ primary_pk = NULL; for (node = keyblock; node; node = node->next) { @@ -4104,7 +4104,7 @@ show_key_with_all_names (ctrl_t ctrl, estream_t fp, && pk->seckey_info->is_protected && pk->seckey_info->s2k.mode == 1002) { - /* FIXME: Check wether this code path is still used. */ + /* FIXME: Check whether this code path is still used. */ tty_fprintf (fp, "%*s%s", opt.legacy_list_mode? 21:5, "", _("card-no: ")); if (pk->seckey_info->ivlen == 16 @@ -6361,7 +6361,7 @@ menu_revsig (ctrl_t ctrl, kbnode_t keyblock) } /* now we can sign the user ids */ -reloop: /* (must use this, because we are modifing the list) */ +reloop: /* (must use this, because we are modifying the list) */ primary_pk = keyblock->pkt->pkt.public_key; for (node = keyblock; node; node = node->next) { @@ -6641,7 +6641,7 @@ menu_revsubkey (ctrl_t ctrl, kbnode_t pub_keyblock) if (!reason) return 0; /* User decided to cancel. */ - reloop: /* (better this way because we are modifing the keyring) */ + reloop: /* (better this way because we are modifying the keyring) */ mainpk = pub_keyblock->pkt->pkt.public_key; for (node = pub_keyblock; node; node = node->next) { diff --git a/g10/keylist.c b/g10/keylist.c index c75856f5f..e2b8fef05 100644 --- a/g10/keylist.c +++ b/g10/keylist.c @@ -596,7 +596,7 @@ list_one (ctrl_t ctrl, strlist_t names, int secret, int mark_secret) listctx.check_sigs = 1; /* fixme: using the bynames function has the disadvantage that we - * don't know wether one of the names given was not found. OTOH, + * don't know whether one of the names given was not found. OTOH, * this function has the advantage to list the names in the * sequence as defined by the keyDB and does not duplicate * outputs. A solution could be do test whether all given have diff --git a/g10/openfile.c b/g10/openfile.c index 2257107ad..80d86cf45 100644 --- a/g10/openfile.c +++ b/g10/openfile.c @@ -127,7 +127,7 @@ make_outfile_name (const char *iname) /* Ask for an output filename; use the given one as default. Return NULL if no file has been given or if it is not possible to ask the - user. NAME is the template len which might conatin enbedded Nuls. + user. NAME is the template len which might contain enbedded Nuls. NAMELEN is its actual length. */ char * diff --git a/g10/packet.h b/g10/packet.h index 3cb1e3b48..a10495c3f 100644 --- a/g10/packet.h +++ b/g10/packet.h @@ -492,7 +492,7 @@ typedef struct { * implementation defined. GnuPG uses this to cache signature * verification status and since 2.1.18 also to convey information * about the origin of a key. Note that this packet is not part - * struct packet_struct becuase we use it only local in the packet + * struct packet_struct because we use it only local in the packet * parser and builder. */ typedef struct { unsigned int trustval; diff --git a/g10/seskey.c b/g10/seskey.c index 861793858..15490179d 100644 --- a/g10/seskey.c +++ b/g10/seskey.c @@ -1,4 +1,4 @@ -/* seskey.c - make sesssion keys etc. +/* seskey.c - make session keys etc. * Copyright (C) 1998, 1999, 2000, 2001, 2002, 2003, 2004, * 2006, 2009, 2010 Free Software Foundation, Inc. * @@ -311,7 +311,7 @@ encode_md_value (PKT_public_key *pk, gcry_md_hd_t md, int hash_algo) /* ECDSA 521 is special has it is larger than the largest hash - we have (SHA-512). Thus we chnage the size for further + we have (SHA-512). Thus we change the size for further processing to 512. */ if (pk->pubkey_algo == PUBKEY_ALGO_ECDSA && qbits > 512) qbits = 512; diff --git a/g10/tdbio.c b/g10/tdbio.c index c780789f7..7572b9aeb 100644 --- a/g10/tdbio.c +++ b/g10/tdbio.c @@ -1707,7 +1707,7 @@ tdbio_delete_record (ctrl_t ctrl, ulong recnum) if (rc) return rc; - /* Now we can chnage it to a free record. */ + /* Now we can change it to a free record. */ rc = tdbio_read_record (0, &vr, RECTYPE_VER); if (rc) log_fatal (_("%s: error reading version record: %s\n"), diff --git a/g10/tofu.c b/g10/tofu.c index 7bef27b19..1437a50b9 100644 --- a/g10/tofu.c +++ b/g10/tofu.c @@ -1941,7 +1941,7 @@ ask_about_binding (ctrl_t ctrl, /* I think showing the large message once is sufficient. If we * would move it right before the cpr_get many lines will scroll * away and the user might not realize that he merely entered a - * wrong choise (because he does not see that either). As a small + * wrong choice (because he does not see that either). As a small * benefit we allow C-L to redisplay everything. */ tty_printf ("%s", prompt); @@ -2239,7 +2239,7 @@ build_conflict_set (ctrl_t ctrl, tofu_dbs_t dbs, if (!die) { /*err = gpg_error_from_syserror ();*/ - xoutofcore (); /* Fixme: Let the fucntion return an error. */ + xoutofcore (); /* Fixme: Let the function return an error. */ } for (i = 0; i < conflict_set_count; i ++) diff --git a/g10/trustdb.c b/g10/trustdb.c index f8a0bc9b3..e2c3bdaa9 100644 --- a/g10/trustdb.c +++ b/g10/trustdb.c @@ -1512,7 +1512,7 @@ sanitize_regexp(const char *old) /* There are basically two commonly-used regexps here. GPG and most versions of PGP use "<[^>]+[@.]example\.com>$" and PGP (9) - command line uses "example.com" (i.e. whatever the user specfies, + command line uses "example.com" (i.e. whatever the user specifies, and we can't expect users know to use "\." instead of "."). So here are the rules: we're allowed to start with "<[^>]+[@.]" and end with ">$" or start and end with nothing. In between, the diff --git a/g10/verify.c b/g10/verify.c index 4399f7111..caeb1a244 100644 --- a/g10/verify.c +++ b/g10/verify.c @@ -60,7 +60,7 @@ verify_signatures (ctrl_t ctrl, int nfiles, char **files ) /* Decide whether we should handle a detached or a normal signature, * which is needed so that the code later can hash the correct data and * not have a normal signature act as detached signature and ignoring the - * indended signed material from the 2nd file or stdin. + * intended signed material from the 2nd file or stdin. * 1. gpg <file - normal * 2. gpg file - normal (or detached) * 3. gpg file <file2 - detached |