diff options
author | NIIBE Yutaka <[email protected]> | 2017-04-28 01:06:33 +0000 |
---|---|---|
committer | NIIBE Yutaka <[email protected]> | 2017-04-28 01:06:33 +0000 |
commit | 5c8fe5480964c282540c051b538e812851988422 (patch) | |
tree | 61da9fb34cfb67875bea2dc259741c0e9b8ca78f /agent | |
parent | g10: For signing, prefer available card key when no -u option. (diff) | |
download | gnupg-5c8fe5480964c282540c051b538e812851988422.tar.gz gnupg-5c8fe5480964c282540c051b538e812851988422.zip |
Spelling fixes in docs and comments.
--
In addition, fix trailing spaces in tests/inittests.
GnuPG-bug-id: 3121
Reported-by: ka7 (klemens)
Signed-off-by: NIIBE Yutaka <[email protected]>
Diffstat (limited to '')
-rw-r--r-- | agent/call-pinentry.c | 6 | ||||
-rw-r--r-- | agent/call-scd.c | 4 | ||||
-rw-r--r-- | agent/command-ssh.c | 4 | ||||
-rw-r--r-- | agent/findkey.c | 2 | ||||
-rw-r--r-- | agent/pkdecrypt.c | 2 | ||||
-rw-r--r-- | agent/pksign.c | 2 | ||||
-rw-r--r-- | agent/trustlist.c | 2 |
7 files changed, 11 insertions, 11 deletions
diff --git a/agent/call-pinentry.c b/agent/call-pinentry.c index 6524cb1b6..1ff405951 100644 --- a/agent/call-pinentry.c +++ b/agent/call-pinentry.c @@ -114,7 +114,7 @@ initialize_module_call_pinentry (void) -/* This function may be called to print infromation pertaining to the +/* This function may be called to print information pertaining to the current state of this module to the log. */ void agent_query_dump_state (void) @@ -318,7 +318,7 @@ start_pinentry (ctrl_t ctrl) log_error ("error flushing pending output: %s\n", strerror (errno)); /* At least Windows XP fails here with EBADF. According to docs and Wine an fflush(NULL) is the same as _flushall. However - the Wine implementaion does not flush stdin,stdout and stderr + the Wine implementation does not flush stdin,stdout and stderr - see above. Let's try to ignore the error. */ #ifndef HAVE_W32_SYSTEM return unlock_pinentry (tmperr); @@ -911,7 +911,7 @@ pinentry_status_cb (void *opaque, const char *line) } -/* Build a SETDESC command line. This is a dedicated funcion so that +/* Build a SETDESC command line. This is a dedicated function so that * it can remove control characters which are not supported by the * current Pinentry. */ static void diff --git a/agent/call-scd.c b/agent/call-scd.c index 09ec4fd49..cf61a3546 100644 --- a/agent/call-scd.c +++ b/agent/call-scd.c @@ -145,7 +145,7 @@ initialize_module_call_scd (void) } -/* This function may be called to print infromation pertaining to the +/* This function may be called to print information pertaining to the current state of this module to the log. */ void agent_scd_dump_state (void) @@ -306,7 +306,7 @@ start_scd (ctrl_t ctrl) log_error ("error flushing pending output: %s\n", strerror (errno)); /* At least Windows XP fails here with EBADF. According to docs and Wine an fflush(NULL) is the same as _flushall. However - the Wime implementaion does not flush stdin,stdout and stderr + the Wime implementation does not flush stdin,stdout and stderr - see above. Lets try to ignore the error. */ #ifndef HAVE_W32_SYSTEM goto leave; diff --git a/agent/command-ssh.c b/agent/command-ssh.c index fdde0fbfd..57e2e425b 100644 --- a/agent/command-ssh.c +++ b/agent/command-ssh.c @@ -2112,7 +2112,7 @@ ssh_receive_key (estream_t stream, gcry_sexp_t *key_new, int secret, * string private_key * * Note that the private key is the concatenation of the private - * key with the public key. Thus theres are 64 bytes; however + * key with the public key. Thus there's are 64 bytes; however * we only want the real 32 byte private key - Libgcrypt expects * this. */ @@ -3650,7 +3650,7 @@ start_command_handler_ssh (ctrl_t ctrl, gnupg_fd_t sock_client) /* Main processing loop. */ while ( !ssh_request_process (ctrl, stream_sock) ) { - /* Check wether we have reached EOF before trying to read + /* Check whether we have reached EOF before trying to read another request. */ int c; diff --git a/agent/findkey.c b/agent/findkey.c index f3c8ca986..b24d8f181 100644 --- a/agent/findkey.c +++ b/agent/findkey.c @@ -1264,7 +1264,7 @@ agent_public_key_from_file (ctrl_t ctrl, /* FIXME: The following thing is pretty ugly code; we should investigate how to make it cleaner. Probably code to handle canonical S-expressions in a memory buffer is better suited for - such a task. After all that is what we do in protect.c. Neeed + such a task. After all that is what we do in protect.c. Need to find common patterns and write a straightformward API to use them. */ assert (sizeof (size_t) <= sizeof (void*)); diff --git a/agent/pkdecrypt.c b/agent/pkdecrypt.c index f1023b433..46697bae1 100644 --- a/agent/pkdecrypt.c +++ b/agent/pkdecrypt.c @@ -1,4 +1,4 @@ -/* pkdecrypt.c - public key decryption (well, acually using a secret key) +/* pkdecrypt.c - public key decryption (well, actually using a secret key) * Copyright (C) 2001, 2003 Free Software Foundation, Inc. * * This file is part of GnuPG. diff --git a/agent/pksign.c b/agent/pksign.c index f0b10e6e0..8faf4a483 100644 --- a/agent/pksign.c +++ b/agent/pksign.c @@ -190,7 +190,7 @@ do_encode_dsa (const byte *md, size_t mdlen, int pkalgo, gcry_sexp_t pkey, } /* ECDSA 521 is special has it is larger than the largest hash - we have (SHA-512). Thus we chnage the size for further + we have (SHA-512). Thus we change the size for further processing to 512. */ if (pkalgo == GCRY_PK_ECDSA && qbits > 512) qbits = 512; diff --git a/agent/trustlist.c b/agent/trustlist.c index 5554485d6..af177b2e2 100644 --- a/agent/trustlist.c +++ b/agent/trustlist.c @@ -612,7 +612,7 @@ agent_marktrusted (ctrl_t ctrl, const char *name, const char *fpr, int flag) /* Check whether we are at all allowed to modify the trustlist. This is useful so that the trustlist may be a symlink to a global - trustlist with only admin priviliges to modify it. Of course + trustlist with only admin privileges to modify it. Of course this is not a secure way of denying access, but it avoids the usual clicking on an Okay button most users are used to. */ fname = make_filename_try (gnupg_homedir (), "trustlist.txt", NULL); |