summaryrefslogtreecommitdiffstats
path: root/g10/encrypt.c
diff options
context:
space:
mode:
Diffstat (limited to 'g10/encrypt.c')
-rw-r--r--g10/encrypt.c6
1 files changed, 3 insertions, 3 deletions
diff --git a/g10/encrypt.c b/g10/encrypt.c
index 8ce6164ce..3fc10a7b8 100644
--- a/g10/encrypt.c
+++ b/g10/encrypt.c
@@ -68,7 +68,7 @@ encrypt_store (const char *filename)
}
-/* Create and setup a DEK structure and print approriate warnings.
+/* Create and setup a DEK structure and print appropriate warnings.
* PK_LIST gives the list of public keys. Always returns a DEK. The
* actual session needs to be added later. */
static DEK *
@@ -94,7 +94,7 @@ create_dek_with_warnings (pk_list_t pk_list)
/* In case 3DES has been selected, print a warning if any key
* does not have a preference for AES. This should help to
- * indentify why encrypting to several recipients falls back to
+ * identify why encrypting to several recipients falls back to
* 3DES. */
if (opt.verbose && dek->algo == CIPHER_ALGO_3DES)
warn_missing_aes_from_pklist (pk_list);
@@ -1128,7 +1128,7 @@ write_pubkey_enc (ctrl_t ctrl,
* the structure DEK and want to encode this session key in an
* integer value of n bits. pubkey_nbits gives us the number of
* bits we have to use. We then encode the session key in some
- * way and we get it back in the big intger value FRAME. Then
+ * way and we get it back in the big integer value FRAME. Then
* we use FRAME, the public key PK->PKEY and the algorithm
* number PK->PUBKEY_ALGO and pass it to pubkey_encrypt which
* returns the encrypted value in the array ENC->DATA. This