summaryrefslogtreecommitdiffstats
path: root/sm
diff options
context:
space:
mode:
authorNIIBE Yutaka <gniibe@fsij.org>2017-04-28 03:06:33 +0200
committerNIIBE Yutaka <gniibe@fsij.org>2017-04-28 03:06:33 +0200
commit5c8fe5480964c282540c051b538e812851988422 (patch)
tree61da9fb34cfb67875bea2dc259741c0e9b8ca78f /sm
parentg10: For signing, prefer available card key when no -u option. (diff)
downloadgnupg2-5c8fe5480964c282540c051b538e812851988422.tar.xz
gnupg2-5c8fe5480964c282540c051b538e812851988422.zip
Spelling fixes in docs and comments.
-- In addition, fix trailing spaces in tests/inittests. GnuPG-bug-id: 3121 Reported-by: ka7 (klemens) Signed-off-by: NIIBE Yutaka <gniibe@fsij.org>
Diffstat (limited to 'sm')
-rw-r--r--sm/certlist.c4
-rw-r--r--sm/import.c2
-rw-r--r--sm/keylist.c2
-rw-r--r--sm/misc.c2
-rw-r--r--sm/qualified.c2
-rw-r--r--sm/server.c2
-rw-r--r--sm/sign.c2
7 files changed, 8 insertions, 8 deletions
diff --git a/sm/certlist.c b/sm/certlist.c
index e493cda97..39ab03c5d 100644
--- a/sm/certlist.c
+++ b/sm/certlist.c
@@ -388,7 +388,7 @@ gpgsm_add_to_certlist (ctrl_t ctrl, const char *name, int secret,
if (!dup_certs)
gpgsm_add_cert_to_certlist (ctrl, cert, &dup_certs, 0);
- /* We have to ignore ambigious names as long as
+ /* We have to ignore ambiguous names as long as
there only fault is a bad key usage. This is
required to support encryption and signing
certificates of the same subject.
@@ -532,7 +532,7 @@ gpgsm_find_cert (ctrl_t ctrl,
}
/* If we don't have the KEYID filter we need to check for
- ambigious search results. Note, that it is somehwat
+ ambiguous search results. Note, that it is somehwat
reasonable to assume that a specification of a KEYID
won't lead to ambiguous names. */
if (!rc && !keyid)
diff --git a/sm/import.c b/sm/import.c
index c7b65ad14..8796cd206 100644
--- a/sm/import.c
+++ b/sm/import.c
@@ -814,7 +814,7 @@ parse_p12 (ctrl_t ctrl, ksba_reader_t reader, struct stats_s *stats)
/* print_mpi (" q", sk.q); */
/* print_mpi (" u", sk.u); */
- /* Create an S-expresion from the parameters. */
+ /* Create an S-expression from the parameters. */
err = gcry_sexp_build (&s_key, NULL,
"(private-key(rsa(n%m)(e%m)(d%m)(p%m)(q%m)(u%m)))",
sk.n, sk.e, sk.d, sk.p, sk.q, sk.u, NULL);
diff --git a/sm/keylist.c b/sm/keylist.c
index 1b1a261fd..13de45d9c 100644
--- a/sm/keylist.c
+++ b/sm/keylist.c
@@ -79,7 +79,7 @@ struct
/* Do not print this extension in the list of extensions. This is set
- for oids which are already available via ksba fucntions. */
+ for oids which are already available via ksba functions. */
#define OID_FLAG_SKIP 1
/* The extension is a simple UTF8String and should be printed. */
#define OID_FLAG_UTF8 2
diff --git a/sm/misc.c b/sm/misc.c
index 1e2465f84..6d047763b 100644
--- a/sm/misc.c
+++ b/sm/misc.c
@@ -1,4 +1,4 @@
-/* misc.c - Miscellaneous fucntions
+/* misc.c - Miscellaneous functions
* Copyright (C) 2004, 2009, 2011 Free Software Foundation, Inc.
*
* This file is part of GnuPG.
diff --git a/sm/qualified.c b/sm/qualified.c
index 718141edc..564e77929 100644
--- a/sm/qualified.c
+++ b/sm/qualified.c
@@ -32,7 +32,7 @@
/* We open the file only once and keep the open file pointer as well
as the name of the file here. Note that, a listname not equal to
- NULL indicates that this module has been intialized and if the
+ NULL indicates that this module has been initialized and if the
LISTFP is also NULL, no list of qualified signatures exists. */
static char *listname;
static FILE *listfp;
diff --git a/sm/server.c b/sm/server.c
index 37d66e22c..64a3add9a 100644
--- a/sm/server.c
+++ b/sm/server.c
@@ -409,7 +409,7 @@ cmd_signer (assuan_context_t ctx, char *line)
{
gpgsm_status2 (ctrl, STATUS_INV_SGNR,
get_inv_recpsgnr_code (rc), line, NULL);
- /* For compatibiliy reasons we also issue the old code after the
+ /* For compatibility reasons we also issue the old code after the
new one. */
gpgsm_status2 (ctrl, STATUS_INV_RECP,
get_inv_recpsgnr_code (rc), line, NULL);
diff --git a/sm/sign.c b/sm/sign.c
index a153b511f..e65562d54 100644
--- a/sm/sign.c
+++ b/sm/sign.c
@@ -391,7 +391,7 @@ gpgsm_sign (ctrl_t ctrl, certlist_t signerlist,
goto leave;
}
- /* Although we don't check for ambigious specification we will
+ /* Although we don't check for ambiguous specification we will
check that the signer's certificate is usable and valid. */
rc = gpgsm_cert_use_sign_p (cert);
if (!rc)