diff options
Diffstat (limited to 'g10')
-rw-r--r-- | g10/armor.c | 2 | ||||
-rw-r--r-- | g10/build-packet.c | 2 | ||||
-rw-r--r-- | g10/call-agent.c | 2 | ||||
-rw-r--r-- | g10/card-util.c | 2 | ||||
-rw-r--r-- | g10/compress.c | 2 | ||||
-rw-r--r-- | g10/encrypt.c | 6 | ||||
-rw-r--r-- | g10/export.c | 2 | ||||
-rw-r--r-- | g10/getkey.c | 2 | ||||
-rw-r--r-- | g10/import.c | 2 | ||||
-rw-r--r-- | g10/keydb.c | 2 | ||||
-rw-r--r-- | g10/keyedit.c | 4 | ||||
-rw-r--r-- | g10/keygen.c | 2 | ||||
-rw-r--r-- | g10/keyid.c | 2 | ||||
-rw-r--r-- | g10/keyring.c | 2 | ||||
-rw-r--r-- | g10/mainproc.c | 4 | ||||
-rw-r--r-- | g10/misc.c | 2 | ||||
-rw-r--r-- | g10/pkclist.c | 2 | ||||
-rw-r--r-- | g10/pubkey-enc.c | 2 | ||||
-rw-r--r-- | g10/revoke.c | 2 | ||||
-rw-r--r-- | g10/rmd160.c | 2 | ||||
-rw-r--r-- | g10/tofu.c | 2 | ||||
-rw-r--r-- | g10/trust.c | 2 | ||||
-rw-r--r-- | g10/trustdb.c | 2 |
23 files changed, 27 insertions, 27 deletions
diff --git a/g10/armor.c b/g10/armor.c index 58d8e01b1..6b7c3f7ab 100644 --- a/g10/armor.c +++ b/g10/armor.c @@ -1294,7 +1294,7 @@ armor_filter( void *opaque, int control, c = bintoasc[radbuf[2]&077]; iobuf_put(a, c); iobuf_writestr(a,afx->eol); - /* and the the trailer */ + /* and the trailer */ if( afx->what >= DIM(tail_strings) ) log_bug("afx->what=%d", afx->what); iobuf_writestr(a, "-----"); diff --git a/g10/build-packet.c b/g10/build-packet.c index ad46a0270..489fadd85 100644 --- a/g10/build-packet.c +++ b/g10/build-packet.c @@ -621,7 +621,7 @@ calc_plaintext( PKT_plaintext *pt ) is assumed to have been enabled on OUT. On success, partial block mode is disabled. - If PT->BUF is NULL, the the caller must write out the data. In + If PT->BUF is NULL, the caller must write out the data. In this case, if PT->LEN was 0, then partial body length mode was enabled and the caller must disable it by calling iobuf_set_partial_body_length_mode (out, 0). */ diff --git a/g10/call-agent.c b/g10/call-agent.c index 335e12a01..7c30bdbff 100644 --- a/g10/call-agent.c +++ b/g10/call-agent.c @@ -340,7 +340,7 @@ unescape_status_string (const unsigned char *s) } -/* Take a 20 byte hexencoded string and put it into the the provided +/* Take a 20 byte hexencoded string and put it into the provided 20 byte buffer FPR in binary format. */ static int unhexify_fpr (const char *hexstr, unsigned char *fpr) diff --git a/g10/card-util.c b/g10/card-util.c index e35857220..969f6c919 100644 --- a/g10/card-util.c +++ b/g10/card-util.c @@ -72,7 +72,7 @@ write_sc_op_status (gpg_error_t err) } -/* Change the PIN of a an OpenPGP card. This is an interactive +/* Change the PIN of an OpenPGP card. This is an interactive function. */ void change_pin (int unblock_v2, int allow_admin) diff --git a/g10/compress.c b/g10/compress.c index fbc8097d7..a14d107ed 100644 --- a/g10/compress.c +++ b/g10/compress.c @@ -182,7 +182,7 @@ do_uncompress( compress_filter_context_t *zfx, z_stream *zs, nread = iobuf_read( a, zfx->inbuf + n, count ); if( nread == -1 ) nread = 0; n += nread; - /* Algo 1 has no zlib header which requires us to to give + /* Algo 1 has no zlib header which requires us to give * inflate an extra dummy byte to read. To be on the safe * side we allow for up to 4 ff bytes. */ if( nread < count && zfx->algo == 1 && zfx->algo1hack < 4) { diff --git a/g10/encrypt.c b/g10/encrypt.c index 5268946c3..6130ba013 100644 --- a/g10/encrypt.c +++ b/g10/encrypt.c @@ -319,7 +319,7 @@ encrypt_simple (const char *filename, int mode, int use_seskey) && !overflow && opt.verbose) log_info(_("WARNING: '%s' is an empty file\n"), filename ); /* We can't encode the length of very large files because - OpenPGP uses only 32 bit for file sizes. So if the the + OpenPGP uses only 32 bit for file sizes. So if the size of a file is larger than 2^32 minus some bytes for packet headers, we switch to partial length encoding. */ if ( tmpsize < (IOBUF_FILELENGTH_LIMIT - 65536) ) @@ -461,7 +461,7 @@ write_symkey_enc (STRING2KEY *symkey_s2k, DEK *symkey_dek, DEK *dek, * The caller may provide a checked list of public keys in * PROVIDED_PKS; if not the function builds a list of keys on its own. * - * Note that FILEFD is currently only used by cmd_encrypt in the the + * Note that FILEFD is currently only used by cmd_encrypt in the * not yet finished server.c. */ int @@ -659,7 +659,7 @@ encrypt_crypt (ctrl_t ctrl, int filefd, const char *filename, && !overflow && opt.verbose) log_info(_("WARNING: '%s' is an empty file\n"), filename ); /* We can't encode the length of very large files because - OpenPGP uses only 32 bit for file sizes. So if the the size + OpenPGP uses only 32 bit for file sizes. So if the size of a file is larger than 2^32 minus some bytes for packet headers, we switch to partial length encoding. */ if (tmpsize < (IOBUF_FILELENGTH_LIMIT - 65536) ) diff --git a/g10/export.c b/g10/export.c index 86681264d..025b9361a 100644 --- a/g10/export.c +++ b/g10/export.c @@ -1022,7 +1022,7 @@ transfer_format_to_openpgp (gcry_sexp_t s_pgp, PKT_public_key *pk) err = gpg_error (GPG_ERR_UNKNOWN_CURVE); goto leave; } - /* Put the curve's OID into into the MPI array. This requires + /* Put the curve's OID into the MPI array. This requires that we shift Q and D. For ECDH also insert the KDF parms. */ if (is_ecdh) { diff --git a/g10/getkey.c b/g10/getkey.c index e39de28ae..163ab8014 100644 --- a/g10/getkey.c +++ b/g10/getkey.c @@ -1143,7 +1143,7 @@ key_byname (GETKEY_CTX *retctx, strlist_t namelist, /* Find a public key identified by NAME. * - * If name appears to be a valid valid RFC822 mailbox (i.e., email + * If name appears to be a valid RFC822 mailbox (i.e., email * address) and auto key lookup is enabled (no_akl == 0), then the * specified auto key lookup methods (--auto-key-lookup) are used to * import the key into the local keyring. Otherwise, just the local diff --git a/g10/import.c b/g10/import.c index b6c04dcfc..45ec07a49 100644 --- a/g10/import.c +++ b/g10/import.c @@ -76,7 +76,7 @@ struct import_stats_s #define NODE_FLAG_A 8 -/* A an object and a global instance to store selectors created from +/* An object and a global instance to store selectors created from * --import-filter keep-uid=EXPR. * --import-filter drop-sig=EXPR. * diff --git a/g10/keydb.c b/g10/keydb.c index aab90e380..4c5149da2 100644 --- a/g10/keydb.c +++ b/g10/keydb.c @@ -1092,7 +1092,7 @@ unlock_all (KEYDB_HANDLE hd) * keydb_get_keyblock (hd, ...); // -> Result 1. * * Note: it is only possible to save a single save state at a time. - * In other words, the the save stack only has room for a single + * In other words, the save stack only has room for a single * instance of the state. */ void keydb_push_found_state (KEYDB_HANDLE hd) diff --git a/g10/keyedit.c b/g10/keyedit.c index 1456d2867..ab66d0163 100644 --- a/g10/keyedit.c +++ b/g10/keyedit.c @@ -1080,7 +1080,7 @@ trustsig_prompt (byte * trust_value, byte * trust_depth, char **regexp) /* - * Loop over all LOCUSR and and sign the uids after asking. If no + * Loop over all LOCUSR and sign the uids after asking. If no * user id is marked, all user ids will be signed; if some user_ids * are marked only those will be signed. If QUICK is true the * function won't ask the user and use sensible defaults. @@ -5186,7 +5186,7 @@ change_primary_uid_cb (PKT_signature * sig, void *opaque) * Set the primary uid flag for the selected UID. We will also reset * all other primary uid flags. For this to work with have to update * all the signature timestamps. If we would do this with the current - * time, we lose quite a lot of information, so we use a a kludge to + * time, we lose quite a lot of information, so we use a kludge to * do this: Just increment the timestamp by one second which is * sufficient to updated a signature during import. */ diff --git a/g10/keygen.c b/g10/keygen.c index e2bdfc144..844d38d3a 100644 --- a/g10/keygen.c +++ b/g10/keygen.c @@ -1786,7 +1786,7 @@ ask_key_flags (int algo, int subkey, unsigned int current) else if (!subkey && *s == 'c') { /* Accept 'c' for the primary key because USAGE_CERT - will will be set anyway. This is for folks who + will be set anyway. This is for folks who want to experiment with a cert-only primary key. */ current |= PUBKEY_USAGE_CERT; } diff --git a/g10/keyid.c b/g10/keyid.c index dd098fd19..6e8d97fa2 100644 --- a/g10/keyid.c +++ b/g10/keyid.c @@ -202,7 +202,7 @@ hash_public_key (gcry_md_hd_t md, PKT_public_key *pk) } gcry_md_putc ( md, 0x99 ); /* ctb */ - /* What does it mean if n is greater than than 0xFFFF ? */ + /* What does it mean if n is greater than 0xFFFF ? */ gcry_md_putc ( md, n >> 8 ); /* 2 byte length header */ gcry_md_putc ( md, n ); gcry_md_putc ( md, pk->version ); diff --git a/g10/keyring.c b/g10/keyring.c index 328290ed8..9b7b5fd74 100644 --- a/g10/keyring.c +++ b/g10/keyring.c @@ -777,7 +777,7 @@ prepare_search (KEYRING_HANDLE hd) /* A map of the all characters valid used for word_match() - * Valid characters are in in this table converted to uppercase. + * Valid characters are in this table converted to uppercase. * because the upper 128 bytes have special meaning, we assume * that they are all valid. * Note: We must use numerical values here in case that this program diff --git a/g10/mainproc.c b/g10/mainproc.c index ac2ab03c9..8e2989187 100644 --- a/g10/mainproc.c +++ b/g10/mainproc.c @@ -78,7 +78,7 @@ struct mainproc_context signature. */ struct { - /* A file descriptor of the the signed data. Only used if not -1. */ + /* A file descriptor of the signed data. Only used if not -1. */ int data_fd; /* A list of filenames with the data files or NULL. This is only used if DATA_FD is -1. */ @@ -1997,7 +1997,7 @@ check_sig_and_print (CTX c, kbnode_t node) log_assert (mainpk); - /* In case we did not found a valid valid textual userid above + /* In case we did not found a valid textual userid above we print the first user id packet or a "[?]" instead along with the "Good|Expired|Bad signature" line. */ if (!count) diff --git a/g10/misc.c b/g10/misc.c index 4b9ad990b..ac0000943 100644 --- a/g10/misc.c +++ b/g10/misc.c @@ -522,7 +522,7 @@ openpgp_cipher_blocklen (cipher_algo_t algo) block length. This is so that the packet parsing code works even for unknown algorithms (for which we assume 8 due to tradition). - NOTE: If you change the the returned blocklen above 16, check + NOTE: If you change the returned blocklen above 16, check the callers because they may use a fixed size buffer of that size. */ switch (algo) diff --git a/g10/pkclist.c b/g10/pkclist.c index 288affc13..4991d20ba 100644 --- a/g10/pkclist.c +++ b/g10/pkclist.c @@ -818,7 +818,7 @@ expand_group (strlist_t input) * success the new key is added to PK_LIST_ADDR. NAME is the user id * of the key. USE the requested usage and a set MARK_HIDDEN will * mark the key in the updated list as a hidden recipient. If - * FROM_FILE is true, NAME is is not a user ID but the name of a file + * FROM_FILE is true, NAME is not a user ID but the name of a file * holding a key. */ gpg_error_t find_and_check_key (ctrl_t ctrl, const char *name, unsigned int use, diff --git a/g10/pubkey-enc.c b/g10/pubkey-enc.c index 117744fb4..de98d99c9 100644 --- a/g10/pubkey-enc.c +++ b/g10/pubkey-enc.c @@ -211,7 +211,7 @@ get_it (PKT_pubkey_enc *enc, DEK *dek, PKT_public_key *sk, u32 *keyid) /* Now get the DEK (data encryption key) from the frame * - * Old versions encode the DEK in in this format (msb is left): + * Old versions encode the DEK in this format (msb is left): * * 0 1 DEK(16 bytes) CSUM(2 bytes) 0 RND(n bytes) 2 * diff --git a/g10/revoke.c b/g10/revoke.c index 591b641d3..3a2b068fc 100644 --- a/g10/revoke.c +++ b/g10/revoke.c @@ -442,7 +442,7 @@ gen_desig_revoke (ctrl_t ctrl, const char *uname, strlist_t locusr) to stdout or the filename given by --output. REASON describes the revocation reason. PSK is the public primary key - we expect that a corresponding secret key is available. KEYBLOCK is the entire - KEYBLOCK which is used in PGP mode to write a a minimal key and not + KEYBLOCK which is used in PGP mode to write a minimal key and not just the naked revocation signature; it may be NULL. If LEADINTEXT is not NULL, it is written right before the (armored) output.*/ static int diff --git a/g10/rmd160.c b/g10/rmd160.c index 7c77ca591..cf2779641 100644 --- a/g10/rmd160.c +++ b/g10/rmd160.c @@ -17,7 +17,7 @@ * along with this program; if not, see <https://www.gnu.org/licenses/>. */ -/* For historic reasons gpg uses RIPE-MD160 to to identify names in +/* For historic reasons gpg uses RIPE-MD160 to identify names in the trustdb. It would be better to change that to SHA-1, to take advantage of a SHA-1 hardware operation provided by some CPUs. This would break trustdb compatibility and thus we don't want to do diff --git a/g10/tofu.c b/g10/tofu.c index 449e921b6..8c41ad701 100644 --- a/g10/tofu.c +++ b/g10/tofu.c @@ -2949,7 +2949,7 @@ write_stats_status (estream_t fp, * * POLICY is the key's policy (as returned by get_policy). * - * Returns 0 if if ONLY_STATUS_FD is set. Otherwise, returns whether + * Returns 0 if ONLY_STATUS_FD is set. Otherwise, returns whether * the caller should call show_warning after iterating over all user * ids. */ diff --git a/g10/trust.c b/g10/trust.c index 888b4ca53..b1fa3d652 100644 --- a/g10/trust.c +++ b/g10/trust.c @@ -186,7 +186,7 @@ get_ownertrust (PKT_public_key *pk) /* * Same as get_ownertrust but this takes the minimum ownertrust value - * into into account, and will bump up the value as needed. + * into account, and will bump up the value as needed. */ static int get_ownertrust_with_min (PKT_public_key *pk) diff --git a/g10/trustdb.c b/g10/trustdb.c index 75714ab6e..103f83ec9 100644 --- a/g10/trustdb.c +++ b/g10/trustdb.c @@ -222,7 +222,7 @@ tdb_register_trusted_key( const char *string ) /* * Helper to add a key to the global list of ultimately trusted keys. - * Retruns: true = inserted, false = already in in list. + * Retruns: true = inserted, false = already in list. */ static int add_utk (u32 *kid) |