aboutsummaryrefslogtreecommitdiffstats
path: root/g10/trustdb.c
diff options
context:
space:
mode:
Diffstat (limited to '')
-rw-r--r--g10/trustdb.c42
1 files changed, 21 insertions, 21 deletions
diff --git a/g10/trustdb.c b/g10/trustdb.c
index 321f7baa6..c7400c407 100644
--- a/g10/trustdb.c
+++ b/g10/trustdb.c
@@ -266,7 +266,7 @@ release_lid_table( LOCAL_ID_INFO *tbl )
/****************
* Add a new item to the table or return 1 if we already have this item
- * fixme: maybe its a good idea to take items from an unused item list.
+ * fixme: maybe it's a good idea to take items from an unused item list.
*/
static int
ins_lid_table_item( LOCAL_ID_INFO *tbl, ulong lid, unsigned flag )
@@ -677,7 +677,7 @@ search_record( PKT_public_cert *pkc, TRUSTREC *rec )
/****************
* If we do not have a local_id in a signature packet, find the owner of
- * the signature packet in our trustdb or insert him into the trustdb
+ * the signature packet in our trustdb or insert them into the trustdb
*/
static int
set_signature_packets_local_id( PKT_signature *sig )
@@ -728,7 +728,7 @@ keyid_from_local_id( ulong lid, u32 *keyid )
}
/****************
- * Walk throug the signatures of a public key.
+ * Walk through the signatures of a public key.
* The caller must provide a context structure, with all fields set
* to zero, but the local_id field set to the requested key;
* This function does not change this field. On return the context
@@ -823,7 +823,7 @@ walk_sigrecs( SIGREC_CONTEXT *c, int create )
/****************
- * Verify, that all our public keys are in the trustDB.
+ * Verify that all our public keys are in the trustDB.
*/
static int
verify_own_certs()
@@ -848,7 +848,7 @@ verify_own_certs()
if( DBG_TRUST )
log_debug("checking secret key %08lX\n", (ulong)keyid[1] );
- /* look wether we can access the public key of this secret key */
+ /* see whether we can access the public key of this secret key */
memset( pkc, 0, sizeof *pkc );
rc = get_pubkey( pkc, keyid );
if( rc ) {
@@ -944,7 +944,7 @@ do_list_sigs( ulong root, ulong pubkey, int depth,
else {
printf("%6u: %*s%08lX(%lu:%02x) ", *lineno, depth*4, "",
(ulong)keyid[1], sx.sig_id, sx.sig_flag );
- /* check wether we already checked this pubkey */
+ /* check whether we already checked this pubkey */
if( !qry_lid_table_flag( ultikey_table, sx.sig_id, NULL ) ) {
print_user_id("[ultimately trusted]", keyid);
++*lineno;
@@ -1023,7 +1023,7 @@ do_list_path( TRUST_INFO *stack, int depth, int max_depth,
/*printf("%2lu/%d: scrutinizig\n", stack[depth-1], depth);*/
if( depth >= max_depth || depth >= MAX_LIST_SIGS_DEPTH-1 ) {
- /*printf("%2lu/%d: to deeply nested\n", stack[depth-1], depth);*/
+ /*printf("%2lu/%d: too deeply nested\n", stack[depth-1], depth);*/
return 0;
}
memset( &sx, 0, sizeof sx );
@@ -1085,7 +1085,7 @@ do_list_path( TRUST_INFO *stack, int depth, int max_depth,
* Check all the sigs of the given keyblock and mark them
* as checked. Valid signatures which are duplicates are
* also marked [shall we check them at all?]
- * FIXME: what shall we do if we have duplicate signatures were only
+ * FIXME: what shall we do if we have duplicate signatures where only
* some of them are bad?
*/
static int
@@ -1204,9 +1204,9 @@ build_sigrecs( ulong pubkeyid )
/* the next function should always succeed, because
* we have already checked the signature, and for this
* it was necessary to have the pubkey. The only reason
- * this can fail are I/o errors of the trustdb or a
+ * this can fail are I/O errors of the trustdb or a
* remove operation on the pubkey database - which should
- * not disturb us, because we have to chace them anyway. */
+ * not disturb us, because we have to chance them anyway. */
rc = set_signature_packets_local_id( node->pkt->pkt.signature );
if( rc )
log_fatal("set_signature_packets_local_id failed: %s\n",
@@ -1339,7 +1339,7 @@ make_tsl( ulong pubkey_id, TRUST_SEG_LIST *ret_tslist )
* to assign a trustvalue to the first segment (which is the requested key)
* of each path.
*
- * FIXME: We have to do more thinks here. e.g. we should never increase
+ * FIXME: We have to do more thinking here. e.g. we should never increase
* the trust value.
*
* Do not do it for duplicates.
@@ -1355,7 +1355,7 @@ propagate_trust( TRUST_SEG_LIST tslist )
if( tsl->dup )
continue;
assert( tsl->nseg );
- /* the last segment is always a ultimately trusted one, so we can
+ /* the last segment is always an ultimately trusted one, so we can
* assign a fully trust to the next one */
i = tsl->nseg-1;
tsl->seg[i].trust = TRUST_ULTIMATE;
@@ -1409,7 +1409,7 @@ do_check( ulong pubkeyid, TRUSTREC *dr, unsigned *trustlevel )
tflags |= TRUST_FLAG_REVOKED;
if( !rc && !dr->r.dir.sigrec ) {
- /* See wether this is our own key */
+ /* See whether this is our own key */
if( !qry_lid_table_flag( ultikey_table, pubkeyid, NULL ) )
*trustlevel = tflags | TRUST_ULTIMATE;
return 0;
@@ -1439,7 +1439,7 @@ do_check( ulong pubkeyid, TRUSTREC *dr, unsigned *trustlevel )
}
}
- /* and look wether there is a trusted path.
+ /* and see whether there is a trusted path.
* We only have to look at the first segment, because
* propagate_trust has investigated all other segments */
marginal = fully = 0;
@@ -1478,9 +1478,9 @@ do_check( ulong pubkeyid, TRUSTREC *dr, unsigned *trustlevel )
}
-/*********************************************************
- **************** API Interface ************************
- *********************************************************/
+/***********************************************
+ **************** API ************************
+ ***********************************************/
/****************
* Perform some checks over the trustdb
@@ -1536,11 +1536,11 @@ init_trustdb( int level, const char *dbname )
* in ~/.gnupg/ here */
rc = verify_private_data();
if( !rc ) {
- /* verify, that our own certificates are in the trustDB
+ /* verify that our own certificates are in the trustDB
* or move them to the trustdb. */
rc = verify_own_certs();
- /* should we check wether there is no other ultimately trusted
+ /* should we check whether there is no other ultimately trusted
* key in the database? */
}
@@ -1769,7 +1769,7 @@ check_trust( PKT_public_cert *pkc, unsigned *r_trustlevel )
* 3) call this function as long as it does not return -1
* to indicate EOF. LID does contain the next key used to build the web
* 4) Always call this function a last time with LID set to NULL,
- * so that it can free it's context.
+ * so that it can free its context.
*/
int
enum_trust_web( void **context, ulong *lid )
@@ -1874,7 +1874,7 @@ query_trust_record( PKT_public_cert *pkc )
/****************
* Insert a trust record into the TrustDB
- * This function failes if this record already exists.
+ * This function fails if this record already exists.
*/
int
insert_trust_record( PKT_public_cert *pkc )