summaryrefslogtreecommitdiffstats
path: root/g10
diff options
context:
space:
mode:
authorNIIBE Yutaka <gniibe@fsij.org>2017-04-28 03:06:33 +0200
committerNIIBE Yutaka <gniibe@fsij.org>2017-04-28 03:06:33 +0200
commit5c8fe5480964c282540c051b538e812851988422 (patch)
tree61da9fb34cfb67875bea2dc259741c0e9b8ca78f /g10
parentg10: For signing, prefer available card key when no -u option. (diff)
downloadgnupg2-5c8fe5480964c282540c051b538e812851988422.tar.xz
gnupg2-5c8fe5480964c282540c051b538e812851988422.zip
Spelling fixes in docs and comments.
-- In addition, fix trailing spaces in tests/inittests. GnuPG-bug-id: 3121 Reported-by: ka7 (klemens) Signed-off-by: NIIBE Yutaka <gniibe@fsij.org>
Diffstat (limited to 'g10')
-rw-r--r--g10/call-agent.c2
-rw-r--r--g10/getkey.c4
-rw-r--r--g10/gpg.c2
-rw-r--r--g10/import.c4
-rw-r--r--g10/keydb.h4
-rw-r--r--g10/keyedit.c8
-rw-r--r--g10/keylist.c2
-rw-r--r--g10/openfile.c2
-rw-r--r--g10/packet.h2
-rw-r--r--g10/seskey.c4
-rw-r--r--g10/tdbio.c2
-rw-r--r--g10/tofu.c4
-rw-r--r--g10/trustdb.c2
-rw-r--r--g10/verify.c2
14 files changed, 22 insertions, 22 deletions
diff --git a/g10/call-agent.c b/g10/call-agent.c
index 0ba978774..be8c33d74 100644
--- a/g10/call-agent.c
+++ b/g10/call-agent.c
@@ -758,7 +758,7 @@ agent_keytocard (const char *hexgrip, int keyno, int force,
/* Call the agent to retrieve a data object. This function returns
the data in the same structure as used by the learn command. It is
- allowed to update such a structure using this commmand. */
+ allowed to update such a structure using this command. */
int
agent_scd_getattr (const char *name, struct agent_card_info_s *info)
{
diff --git a/g10/getkey.c b/g10/getkey.c
index 75b8564f3..d8c81c937 100644
--- a/g10/getkey.c
+++ b/g10/getkey.c
@@ -368,7 +368,7 @@ cache_user_id (KBNODE keyblock)
/* Disable and drop the public key cache (which is filled by
cache_public_key and get_pubkey). Note: there is currently no way
- to reenable this cache. */
+ to re-enable this cache. */
void
getkey_disable_caches ()
{
@@ -413,7 +413,7 @@ pubkeys_free (pubkey_t keys)
}
}
-/* Returns all keys that match the search specfication SEARCH_TERMS.
+/* Returns all keys that match the search specification SEARCH_TERMS.
This function also checks for and warns about duplicate entries in
the keydb, which can occur if the user has configured multiple
diff --git a/g10/gpg.c b/g10/gpg.c
index d193cb21d..ecddb20d0 100644
--- a/g10/gpg.c
+++ b/g10/gpg.c
@@ -2110,7 +2110,7 @@ parse_compliance_option (const char *string)
-/* Helper to set compliance related options. This is a separte
+/* Helper to set compliance related options. This is a separate
* function so that it can also be used by the --compliance option
* parser. */
static void
diff --git a/g10/import.c b/g10/import.c
index ba1c44a43..a942c2e5f 100644
--- a/g10/import.c
+++ b/g10/import.c
@@ -755,7 +755,7 @@ valid_keyblock_packet (int pkttype)
/****************
* Read the next keyblock from stream A.
* Meta data (ring trust packets) are only considered of WITH_META is set.
- * PENDING_PKT should be initialzed to NULL and not changed by the caller.
+ * PENDING_PKT should be initialized to NULL and not changed by the caller.
* Return: 0 = okay, -1 no more blocks or another errorcode.
* The int at at R_V3KEY counts the number of unsupported v3
* keyblocks.
@@ -2681,7 +2681,7 @@ chk_self_sigs (ctrl_t ctrl, kbnode_t keyblock, u32 *keyid, int *non_self)
/* Delete all parts which are invalid and those signatures whose
- * public key algorithm is not available in this implemenation; but
+ * public key algorithm is not available in this implementation; but
* consider RSA as valid, because parse/build_packets knows about it.
*
* Returns: True if at least one valid user-id is left over.
diff --git a/g10/keydb.h b/g10/keydb.h
index 7f427382d..1da93a777 100644
--- a/g10/keydb.h
+++ b/g10/keydb.h
@@ -109,7 +109,7 @@ struct pubkey_find_info {
};
-/* Helper type for preference fucntions. */
+/* Helper type for preference functions. */
union pref_hint
{
int digest_length;
@@ -301,7 +301,7 @@ void pubkey_free (pubkey_t key);
/* Free a list of public keys. */
void pubkeys_free (pubkey_t keys);
-/* Returns all keys that match the search specfication SEARCH_TERMS.
+/* Returns all keys that match the search specification SEARCH_TERMS.
The returned keys should be freed using pubkeys_free. */
gpg_error_t
get_pubkeys (ctrl_t ctrl,
diff --git a/g10/keyedit.c b/g10/keyedit.c
index a7a5f7209..ba08d88c3 100644
--- a/g10/keyedit.c
+++ b/g10/keyedit.c
@@ -1593,7 +1593,7 @@ sign_uids (ctrl_t ctrl, estream_t fp,
continue;
/* Now we can sign the user ids. */
- reloop: /* (Must use this, because we are modifing the list.) */
+ reloop: /* (Must use this, because we are modifying the list.) */
primary_pk = NULL;
for (node = keyblock; node; node = node->next)
{
@@ -4104,7 +4104,7 @@ show_key_with_all_names (ctrl_t ctrl, estream_t fp,
&& pk->seckey_info->is_protected
&& pk->seckey_info->s2k.mode == 1002)
{
- /* FIXME: Check wether this code path is still used. */
+ /* FIXME: Check whether this code path is still used. */
tty_fprintf (fp, "%*s%s", opt.legacy_list_mode? 21:5, "",
_("card-no: "));
if (pk->seckey_info->ivlen == 16
@@ -6361,7 +6361,7 @@ menu_revsig (ctrl_t ctrl, kbnode_t keyblock)
}
/* now we can sign the user ids */
-reloop: /* (must use this, because we are modifing the list) */
+reloop: /* (must use this, because we are modifying the list) */
primary_pk = keyblock->pkt->pkt.public_key;
for (node = keyblock; node; node = node->next)
{
@@ -6641,7 +6641,7 @@ menu_revsubkey (ctrl_t ctrl, kbnode_t pub_keyblock)
if (!reason)
return 0; /* User decided to cancel. */
- reloop: /* (better this way because we are modifing the keyring) */
+ reloop: /* (better this way because we are modifying the keyring) */
mainpk = pub_keyblock->pkt->pkt.public_key;
for (node = pub_keyblock; node; node = node->next)
{
diff --git a/g10/keylist.c b/g10/keylist.c
index c75856f5f..e2b8fef05 100644
--- a/g10/keylist.c
+++ b/g10/keylist.c
@@ -596,7 +596,7 @@ list_one (ctrl_t ctrl, strlist_t names, int secret, int mark_secret)
listctx.check_sigs = 1;
/* fixme: using the bynames function has the disadvantage that we
- * don't know wether one of the names given was not found. OTOH,
+ * don't know whether one of the names given was not found. OTOH,
* this function has the advantage to list the names in the
* sequence as defined by the keyDB and does not duplicate
* outputs. A solution could be do test whether all given have
diff --git a/g10/openfile.c b/g10/openfile.c
index 2257107ad..80d86cf45 100644
--- a/g10/openfile.c
+++ b/g10/openfile.c
@@ -127,7 +127,7 @@ make_outfile_name (const char *iname)
/* Ask for an output filename; use the given one as default. Return
NULL if no file has been given or if it is not possible to ask the
- user. NAME is the template len which might conatin enbedded Nuls.
+ user. NAME is the template len which might contain enbedded Nuls.
NAMELEN is its actual length.
*/
char *
diff --git a/g10/packet.h b/g10/packet.h
index 3cb1e3b48..a10495c3f 100644
--- a/g10/packet.h
+++ b/g10/packet.h
@@ -492,7 +492,7 @@ typedef struct {
* implementation defined. GnuPG uses this to cache signature
* verification status and since 2.1.18 also to convey information
* about the origin of a key. Note that this packet is not part
- * struct packet_struct becuase we use it only local in the packet
+ * struct packet_struct because we use it only local in the packet
* parser and builder. */
typedef struct {
unsigned int trustval;
diff --git a/g10/seskey.c b/g10/seskey.c
index 861793858..15490179d 100644
--- a/g10/seskey.c
+++ b/g10/seskey.c
@@ -1,4 +1,4 @@
-/* seskey.c - make sesssion keys etc.
+/* seskey.c - make session keys etc.
* Copyright (C) 1998, 1999, 2000, 2001, 2002, 2003, 2004,
* 2006, 2009, 2010 Free Software Foundation, Inc.
*
@@ -311,7 +311,7 @@ encode_md_value (PKT_public_key *pk, gcry_md_hd_t md, int hash_algo)
/* ECDSA 521 is special has it is larger than the largest hash
- we have (SHA-512). Thus we chnage the size for further
+ we have (SHA-512). Thus we change the size for further
processing to 512. */
if (pk->pubkey_algo == PUBKEY_ALGO_ECDSA && qbits > 512)
qbits = 512;
diff --git a/g10/tdbio.c b/g10/tdbio.c
index c780789f7..7572b9aeb 100644
--- a/g10/tdbio.c
+++ b/g10/tdbio.c
@@ -1707,7 +1707,7 @@ tdbio_delete_record (ctrl_t ctrl, ulong recnum)
if (rc)
return rc;
- /* Now we can chnage it to a free record. */
+ /* Now we can change it to a free record. */
rc = tdbio_read_record (0, &vr, RECTYPE_VER);
if (rc)
log_fatal (_("%s: error reading version record: %s\n"),
diff --git a/g10/tofu.c b/g10/tofu.c
index 7bef27b19..1437a50b9 100644
--- a/g10/tofu.c
+++ b/g10/tofu.c
@@ -1941,7 +1941,7 @@ ask_about_binding (ctrl_t ctrl,
/* I think showing the large message once is sufficient. If we
* would move it right before the cpr_get many lines will scroll
* away and the user might not realize that he merely entered a
- * wrong choise (because he does not see that either). As a small
+ * wrong choice (because he does not see that either). As a small
* benefit we allow C-L to redisplay everything. */
tty_printf ("%s", prompt);
@@ -2239,7 +2239,7 @@ build_conflict_set (ctrl_t ctrl, tofu_dbs_t dbs,
if (!die)
{
/*err = gpg_error_from_syserror ();*/
- xoutofcore (); /* Fixme: Let the fucntion return an error. */
+ xoutofcore (); /* Fixme: Let the function return an error. */
}
for (i = 0; i < conflict_set_count; i ++)
diff --git a/g10/trustdb.c b/g10/trustdb.c
index f8a0bc9b3..e2c3bdaa9 100644
--- a/g10/trustdb.c
+++ b/g10/trustdb.c
@@ -1512,7 +1512,7 @@ sanitize_regexp(const char *old)
/* There are basically two commonly-used regexps here. GPG and most
versions of PGP use "<[^>]+[@.]example\.com>$" and PGP (9)
- command line uses "example.com" (i.e. whatever the user specfies,
+ command line uses "example.com" (i.e. whatever the user specifies,
and we can't expect users know to use "\." instead of "."). So
here are the rules: we're allowed to start with "<[^>]+[@.]" and
end with ">$" or start and end with nothing. In between, the
diff --git a/g10/verify.c b/g10/verify.c
index 4399f7111..caeb1a244 100644
--- a/g10/verify.c
+++ b/g10/verify.c
@@ -60,7 +60,7 @@ verify_signatures (ctrl_t ctrl, int nfiles, char **files )
/* Decide whether we should handle a detached or a normal signature,
* which is needed so that the code later can hash the correct data and
* not have a normal signature act as detached signature and ignoring the
- * indended signed material from the 2nd file or stdin.
+ * intended signed material from the 2nd file or stdin.
* 1. gpg <file - normal
* 2. gpg file - normal (or detached)
* 3. gpg file <file2 - detached