diff options
author | NIIBE Yutaka <gniibe@fsij.org> | 2017-04-28 03:06:33 +0200 |
---|---|---|
committer | NIIBE Yutaka <gniibe@fsij.org> | 2017-04-28 03:06:33 +0200 |
commit | 5c8fe5480964c282540c051b538e812851988422 (patch) | |
tree | 61da9fb34cfb67875bea2dc259741c0e9b8ca78f /sm | |
parent | g10: For signing, prefer available card key when no -u option. (diff) | |
download | gnupg2-5c8fe5480964c282540c051b538e812851988422.tar.xz gnupg2-5c8fe5480964c282540c051b538e812851988422.zip |
Spelling fixes in docs and comments.
--
In addition, fix trailing spaces in tests/inittests.
GnuPG-bug-id: 3121
Reported-by: ka7 (klemens)
Signed-off-by: NIIBE Yutaka <gniibe@fsij.org>
Diffstat (limited to 'sm')
-rw-r--r-- | sm/certlist.c | 4 | ||||
-rw-r--r-- | sm/import.c | 2 | ||||
-rw-r--r-- | sm/keylist.c | 2 | ||||
-rw-r--r-- | sm/misc.c | 2 | ||||
-rw-r--r-- | sm/qualified.c | 2 | ||||
-rw-r--r-- | sm/server.c | 2 | ||||
-rw-r--r-- | sm/sign.c | 2 |
7 files changed, 8 insertions, 8 deletions
diff --git a/sm/certlist.c b/sm/certlist.c index e493cda97..39ab03c5d 100644 --- a/sm/certlist.c +++ b/sm/certlist.c @@ -388,7 +388,7 @@ gpgsm_add_to_certlist (ctrl_t ctrl, const char *name, int secret, if (!dup_certs) gpgsm_add_cert_to_certlist (ctrl, cert, &dup_certs, 0); - /* We have to ignore ambigious names as long as + /* We have to ignore ambiguous names as long as there only fault is a bad key usage. This is required to support encryption and signing certificates of the same subject. @@ -532,7 +532,7 @@ gpgsm_find_cert (ctrl_t ctrl, } /* If we don't have the KEYID filter we need to check for - ambigious search results. Note, that it is somehwat + ambiguous search results. Note, that it is somehwat reasonable to assume that a specification of a KEYID won't lead to ambiguous names. */ if (!rc && !keyid) diff --git a/sm/import.c b/sm/import.c index c7b65ad14..8796cd206 100644 --- a/sm/import.c +++ b/sm/import.c @@ -814,7 +814,7 @@ parse_p12 (ctrl_t ctrl, ksba_reader_t reader, struct stats_s *stats) /* print_mpi (" q", sk.q); */ /* print_mpi (" u", sk.u); */ - /* Create an S-expresion from the parameters. */ + /* Create an S-expression from the parameters. */ err = gcry_sexp_build (&s_key, NULL, "(private-key(rsa(n%m)(e%m)(d%m)(p%m)(q%m)(u%m)))", sk.n, sk.e, sk.d, sk.p, sk.q, sk.u, NULL); diff --git a/sm/keylist.c b/sm/keylist.c index 1b1a261fd..13de45d9c 100644 --- a/sm/keylist.c +++ b/sm/keylist.c @@ -79,7 +79,7 @@ struct /* Do not print this extension in the list of extensions. This is set - for oids which are already available via ksba fucntions. */ + for oids which are already available via ksba functions. */ #define OID_FLAG_SKIP 1 /* The extension is a simple UTF8String and should be printed. */ #define OID_FLAG_UTF8 2 @@ -1,4 +1,4 @@ -/* misc.c - Miscellaneous fucntions +/* misc.c - Miscellaneous functions * Copyright (C) 2004, 2009, 2011 Free Software Foundation, Inc. * * This file is part of GnuPG. diff --git a/sm/qualified.c b/sm/qualified.c index 718141edc..564e77929 100644 --- a/sm/qualified.c +++ b/sm/qualified.c @@ -32,7 +32,7 @@ /* We open the file only once and keep the open file pointer as well as the name of the file here. Note that, a listname not equal to - NULL indicates that this module has been intialized and if the + NULL indicates that this module has been initialized and if the LISTFP is also NULL, no list of qualified signatures exists. */ static char *listname; static FILE *listfp; diff --git a/sm/server.c b/sm/server.c index 37d66e22c..64a3add9a 100644 --- a/sm/server.c +++ b/sm/server.c @@ -409,7 +409,7 @@ cmd_signer (assuan_context_t ctx, char *line) { gpgsm_status2 (ctrl, STATUS_INV_SGNR, get_inv_recpsgnr_code (rc), line, NULL); - /* For compatibiliy reasons we also issue the old code after the + /* For compatibility reasons we also issue the old code after the new one. */ gpgsm_status2 (ctrl, STATUS_INV_RECP, get_inv_recpsgnr_code (rc), line, NULL); @@ -391,7 +391,7 @@ gpgsm_sign (ctrl_t ctrl, certlist_t signerlist, goto leave; } - /* Although we don't check for ambigious specification we will + /* Although we don't check for ambiguous specification we will check that the signer's certificate is usable and valid. */ rc = gpgsm_cert_use_sign_p (cert); if (!rc) |