aboutsummaryrefslogtreecommitdiffstats
path: root/g10
diff options
context:
space:
mode:
Diffstat (limited to 'g10')
-rw-r--r--g10/OPTIONS6
-rw-r--r--g10/armor.c34
-rw-r--r--g10/build-packet.c2
-rw-r--r--g10/cipher.c2
-rw-r--r--g10/compress.c2
-rw-r--r--g10/decrypt.c4
-rw-r--r--g10/encode.c4
-rw-r--r--g10/export.c6
-rw-r--r--g10/free-packet.c4
-rw-r--r--g10/g10.c23
-rw-r--r--g10/getkey.c8
-rw-r--r--g10/gpgd.c4
-rw-r--r--g10/import.c44
-rw-r--r--g10/kbnode.c12
-rw-r--r--g10/keydb.h6
-rw-r--r--g10/keygen.c14
-rw-r--r--g10/mainproc.c12
-rw-r--r--g10/mdfilter.c2
-rw-r--r--g10/openfile.c2
-rw-r--r--g10/packet.h6
-rw-r--r--g10/parse-packet.c17
-rw-r--r--g10/pkclist.c22
-rw-r--r--g10/revoke.c8
-rw-r--r--g10/ringedit.c18
-rw-r--r--g10/seckey-cert.c6
-rw-r--r--g10/seskey.c6
-rw-r--r--g10/sig-check.c4
-rw-r--r--g10/sign.c2
-rw-r--r--g10/trustdb.c42
-rw-r--r--g10/trustdb.h2
-rw-r--r--g10/verify.c4
31 files changed, 169 insertions, 159 deletions
diff --git a/g10/OPTIONS b/g10/OPTIONS
index 9620c99f5..28d179940 100644
--- a/g10/OPTIONS
+++ b/g10/OPTIONS
@@ -1,8 +1,8 @@
# This is a sample option file
#
# Unless you you specify which option file to use with the
-# commandline option "--options filename", gpg uses per
-# default the file ~/.gnupg/options.
+# commandline option "--options filename", gpg uses the
+# file ~/.gnupg/options by default.
#
# An option file can contain all long options which are
# available in GNUPG. If the first non white space character of
@@ -17,7 +17,7 @@
#-----------------------------------------------
#------------------- Commands ------------------
#-----------------------------------------------
-# With some expections, those cannot be combined
+# With some expections, these cannot be combined
gen-prime
# Generate a prime.
diff --git a/g10/armor.c b/g10/armor.c
index 9fd175fbf..6d39dd9d1 100644
--- a/g10/armor.c
+++ b/g10/armor.c
@@ -80,7 +80,7 @@ typedef enum {
/* if we encounter this armor string with this index, go
- * into a mode, which fakes packets and wait for the next armor */
+ * into a mode which fakes packets and wait for the next armor */
#define BEGIN_SIGNED_MSG_IDX 3
static char *head_strings[] = {
"BEGIN PGP MESSAGE",
@@ -136,7 +136,7 @@ initialize(void)
}
/****************
- * Check wether this is a armored file or not
+ * Check whether this is an armored file or not
* See also parse-packet.c for details on this code
* Returns: True if it seems to be armored
*/
@@ -167,7 +167,7 @@ is_armored( byte *buf )
/****************
- * Try to check wether the iobuf is armored
+ * Try to check whether the iobuf is armored
* Returns true if this may be the case; the caller should use the
* filter to do further processing.
*/
@@ -179,7 +179,7 @@ use_armor_filter( IOBUF a )
n = iobuf_peek(a, buf, 1 );
if( n == -1 )
- return 0; /* EOF, doesn't matter wether armored or not */
+ return 0; /* EOF, doesn't matter whether armored or not */
if( !n )
return 1; /* can't check it: try armored */
return is_armored(buf);
@@ -197,11 +197,11 @@ invalid_armor(void)
/****************
- * check wether the armor header is valid on a signed message.
+ * check whether the armor header is valid on a signed message.
* this is for security reasons: the header lines are not included in the
* hash and by using some creative formatting rules, Mallory could fake
* any text at the beginning of a document; assuming it is read with
- * a simple viewer. We do only allow the Hash Header.
+ * a simple viewer. We only allow the Hash Header.
*/
static int
parse_hash_header( const char *line )
@@ -268,7 +268,7 @@ find_header( fhdr_state_t state, byte *buf, size_t *r_buflen,
do {
switch( state ) {
case fhdrHASArmor:
- /* read at least the first byte to check wether it is armored
+ /* read at least the first byte to check whether it is armored
* or not */
c = 0;
for(n=0; n < 28 && (c=iobuf_get2(a)) != -1 && c != '\n'; )
@@ -382,8 +382,8 @@ find_header( fhdr_state_t state, byte *buf, size_t *r_buflen,
state = fhdrCHECKDashEscaped3;
}
else {
- /* fixme: we should check wether this line continues
- * it is poosible that we have only read ws until here
+ /* fixme: we should check whether this line continues
+ * it is possible that we have only read ws until here
* and more stuff is to come */
state = fhdrEOF;
}
@@ -425,7 +425,7 @@ find_header( fhdr_state_t state, byte *buf, size_t *r_buflen,
case fhdrEMPTYClearsig:
case fhdrREADClearsig:
/* we are at the start of a line: read a clearsig into the buffer
- * we have to look for a the header line or dashed escaped text*/
+ * we have to look for a header line or dashed escaped text*/
n = 0;
c = 0;
while( n < buflen && (c=iobuf_get2(a)) != -1 && c != '\n' )
@@ -508,11 +508,11 @@ find_header( fhdr_state_t state, byte *buf, size_t *r_buflen,
break;
case fhdrTESTSpaces: {
- /* but must check wether the rest of the line
- * does only contain white spaces; this is problematic
- * since we may have to restore the stuffs. simply
+ /* but must check whether the rest of the line
+ * only contains white spaces; this is problematic
+ * since we may have to restore the stuff. simply
* counting spaces is not enough, because it may be a
- * mix of different white space chacters */
+ * mix of different white space characters */
IOBUF b = iobuf_temp();
while( (c=iobuf_get2(a)) != -1 && c != '\n' ) {
iobuf_put(b,c);
@@ -589,7 +589,7 @@ find_header( fhdr_state_t state, byte *buf, size_t *r_buflen,
}
-/* figure out wether the data is armored or not */
+/* figure out whether the data is armored or not */
static int
check_input( armor_filter_context_t *afx, IOBUF a )
{
@@ -844,7 +844,7 @@ radix64_read( armor_filter_context_t *afx, IOBUF a, size_t *retn,
/****************
- * The filter is used to handle the armor stuff
+ * This filter is used to handle the armor stuff
*/
int
armor_filter( void *opaque, int control,
@@ -906,7 +906,7 @@ armor_filter( void *opaque, int control,
* is easy to construct the packets */
/* first a onepass signature packet */
- buf[0] = 0x90; /* old packet forma, type 4, 1 length byte */
+ buf[0] = 0x90; /* old packet format, type 4, 1 length byte */
buf[1] = 13; /* length */
buf[2] = 3; /* version */
buf[3] = 0x01; /* sigclass 0x01 (data in canonical text mode)*/
diff --git a/g10/build-packet.c b/g10/build-packet.c
index d1934e8c4..583752eb3 100644
--- a/g10/build-packet.c
+++ b/g10/build-packet.c
@@ -542,7 +542,7 @@ write_header( IOBUF out, int ctb, u32 len )
/****************
* if HDRLEN is > 0, try to build a header of this length.
- * we need this, so hat we can hash packets without reading them again.
+ * we need this, so that we can hash packets without reading them again.
*/
static int
write_header2( IOBUF out, int ctb, u32 len, int hdrlen, int blkmode )
diff --git a/g10/cipher.c b/g10/cipher.c
index 3fe4e9ea4..c6a43c6b4 100644
--- a/g10/cipher.c
+++ b/g10/cipher.c
@@ -37,7 +37,7 @@
/****************
- * This filter is used to en/de-cipher data with a conventinal algorithm
+ * This filter is used to en/de-cipher data with a conventional algorithm
*/
int
cipher_filter( void *opaque, int control,
diff --git a/g10/compress.c b/g10/compress.c
index 75e24b584..8f547dffa 100644
--- a/g10/compress.c
+++ b/g10/compress.c
@@ -102,7 +102,7 @@ init_uncompress( compress_filter_context_t *zfx, z_stream *zs )
/****************
* PGP uses a windowsize of 13 bits. Using a negative value for
* it forces zlib not to expect a zlib header. This is a
- * undocumented feature, Peter Gutmann told me about.
+ * undocumented feature Peter Gutmann told me about.
*/
if( (rc = zfx->pgpmode? inflateInit2( zs, -13)
: inflateInit( zs )) != Z_OK ) {
diff --git a/g10/decrypt.c b/g10/decrypt.c
index 1a457f2df..cb1cccd4c 100644
--- a/g10/decrypt.c
+++ b/g10/decrypt.c
@@ -39,9 +39,9 @@
/****************
* Assume that the input is an encrypted message and decrypt
- * (and if signed, verify the signature) it.
+ * (and if signed, verify the signature on) it.
* This command differs from the default operation, as it never
- * write to the filename which is included in the file and that it
+ * writes to the filename which is included in the file and it
* rejects files which don't begin with an encrypted message.
*/
diff --git a/g10/encode.c b/g10/encode.c
index b73938070..4852f6e60 100644
--- a/g10/encode.c
+++ b/g10/encode.c
@@ -42,7 +42,7 @@ static int write_pubkey_enc_from_list( PKC_LIST pkc_list, DEK *dek, IOBUF out );
/****************
- * Encode FILENAME only with the symmetric cipher. Take input from
+ * Encode FILENAME with only the symmetric cipher. Take input from
* stdin if FILENAME is NULL.
*/
int
@@ -52,7 +52,7 @@ encode_symmetric( const char *filename )
}
/****************
- * Encode FILENAME as literal data packet only. Take input from
+ * Encode FILENAME as a literal data packet only. Take input from
* stdin if FILENAME is NULL.
*/
int
diff --git a/g10/export.c b/g10/export.c
index 844098355..87708f08d 100644
--- a/g10/export.c
+++ b/g10/export.c
@@ -35,9 +35,9 @@
/****************
- * Export the public keys (to standard out or --outout).
+ * Export the public keys (to standard out or --output).
* Depending on opt.armor the output is armored.
- * If USERS is NULL, the complete ring wil. be exported.
+ * If USERS is NULL, the complete ring will be exported.
*/
int
export_pubkeys( STRLIST users )
@@ -80,7 +80,7 @@ export_pubkeys( STRLIST users )
all = 2;
}
- /* use the correct sequence. strlist_last,prev do work correct with
+ /* use the correct sequence. strlist_last,prev do work correctly with
* NULL pointers :-) */
for( sl=strlist_last(users); sl || all ; sl=strlist_prev( users, sl )) {
if( all ) { /* get the next user */
diff --git a/g10/free-packet.c b/g10/free-packet.c
index 8a484eb25..09971c4cf 100644
--- a/g10/free-packet.c
+++ b/g10/free-packet.c
@@ -65,7 +65,7 @@ free_seckey_enc( PKT_signature *sig )
/****************
* Return the digest algorithm from the signature packet.
- * We need this function because the digeste algo depends on the
+ * We need this function because the digest algo depends on the
* used pubkey algorithm.
*/
int
@@ -215,7 +215,7 @@ void
free_compressed( PKT_compressed *zd )
{
if( zd->buf ) { /* have to skip some bytes */
- /* don't have any informations about the length, so
+ /* don't have any information about the length, so
* we assume this is the last packet */
while( iobuf_get(zd->buf) != -1 )
;
diff --git a/g10/g10.c b/g10/g10.c
index b6aee3e67..5fe88c852 100644
--- a/g10/g10.c
+++ b/g10/g10.c
@@ -116,8 +116,12 @@ static ARGPARSE_OPTS opts[] = {
{ 536, "marginals-needed", 1, N_("(default is 3)")},
#ifdef IS_G10
{ 527, "cipher-algo", 2 , N_("select default cipher algorithm")},
- { 528, "pubkey-algo", 2 , N_("select default puplic key algorithm")},
+ { 528, "pubkey-algo", 2 , N_("select default public key algorithm")},
{ 529, "digest-algo", 2 , N_("select default message digest algorithm")},
+ #else /* some dummies */
+ { 527, "cipher-algo", 2 , "\r"},
+ { 528, "pubkey-algo", 2 , "\r"},
+ { 529, "digest-algo", 2 , "\r"},
#endif
#ifdef IS_G10
@@ -412,7 +416,7 @@ main( int argc, char **argv )
#endif
}
- /* check wether we have a config file on the commandline */
+ /* check whether we have a config file on the commandline */
orig_argc = argc;
orig_argv = argv;
pargs.argc = &argc;
@@ -509,7 +513,12 @@ main( int argc, char **argv )
case 540: secmem_set_flags( secmem_get_flags() | 1 ); break;
case 542: set_cmd( &cmd, aGenRevoke); break;
case 550: set_cmd( &cmd, aVerify); break;
- #endif /* IS_G10 */
+ #else
+ case 527:
+ case 528:
+ case 529:
+ break;
+ #endif /* !IS_G10 */
#ifdef IS_G10MAINT
case 513: set_cmd( &cmd, aPrimegen); break;
@@ -632,9 +641,9 @@ main( int argc, char **argv )
else {
fname = NULL;
if( get_passphrase_fd() == 0 ) {
- /* reading data and passphrase form stdin:
+ /* reading data and passphrase from stdin:
* we assume the first line is the passphrase, so
- * we better should read it now.
+ * we should read it now.
*
* We should do it here, but for now it is not needed.
* Anyway, this password scheme is not quite good
@@ -804,7 +813,7 @@ main( int argc, char **argv )
#ifdef IS_G10
case aKeygen: /* generate a key (interactive) */
if( argc )
- wrong_args(_("--gen-key"));
+ wrong_args("--gen-key");
generate_keypair();
break;
#endif
@@ -932,7 +941,7 @@ main( int argc, char **argv )
case aListPackets:
opt.list_packets=1;
default:
- /* fixme: g10maint should to regular maintenace tasks here */
+ /* fixme: g10maint should do regular maintenace tasks here */
if( argc > 1 )
wrong_args(_("[filename]"));
if( !(a = iobuf_open(fname)) )
diff --git a/g10/getkey.c b/g10/getkey.c
index 966bc5d69..a1dc25239 100644
--- a/g10/getkey.c
+++ b/g10/getkey.c
@@ -148,7 +148,7 @@ add_secret_keyring( const char *name )
sl->next = secret_keyrings;
secret_keyrings = sl;
- /* fixme: We should remove much out of this mpdule and
+ /* fixme: We should remove much out of this module and
* combine it with the keyblock stuff from ringedit.c
* For now we will simple add the filename as keyblock resource
*/
@@ -239,7 +239,7 @@ get_pubkey( PKT_public_cert *pkc, u32 *keyid )
int rc = 0;
pkc_cache_entry_t ce;
- /* lets see wether we checked the keyid already */
+ /* let's see whether we checked the keyid already */
for( kl = unknown_keyids; kl; kl = kl->next )
if( kl->keyid[0] == keyid[0] && kl->keyid[1] == keyid[1] )
return G10ERR_NO_PUBKEY; /* already checked and not found */
@@ -307,7 +307,7 @@ hextobyte( const byte *s )
/****************
- * Try to get the pubkey by the userid. This functions looks for the
+ * Try to get the pubkey by the userid. This function looks for the
* first pubkey certificate which has the given name in a user_id.
* if pkc has the pubkey algo set, the function will only return
* a pubkey with that algo.
@@ -499,7 +499,7 @@ get_seckey( PKT_secret_cert *skc, u32 *keyid )
}
/****************
- * Check wether the secret key is available
+ * Check whether the secret key is available
* Returns: 0 := key is available
* G10ERR_NO_SECKEY := not availabe
*/
diff --git a/g10/gpgd.c b/g10/gpgd.c
index cb6adada0..bc80721d3 100644
--- a/g10/gpgd.c
+++ b/g10/gpgd.c
@@ -153,7 +153,7 @@ main( int argc, char **argv )
opt.compress = -1; /* defaults to standard compress level */
opt.batch = 1;
- /* check wether we have a config file on the commandline */
+ /* check whether we have a config file on the commandline */
orig_argc = argc;
orig_argv = argv;
pargs.argc = &argc;
@@ -290,7 +290,7 @@ become_daemon()
log_fatal("chdir to root failed: %s\n", strerror(errno) );
umask(0);
- /* do not let possible childs become zombies */
+ /* do not let possible children become zombies */
signal(SIGCHLD, SIG_IGN);
if( opt.verbose )
log_info("now running as daemon\n");
diff --git a/g10/import.c b/g10/import.c
index 874fa8520..4cb911f51 100644
--- a/g10/import.c
+++ b/g10/import.c
@@ -52,9 +52,9 @@ static int merge_sigs( KBNODE dst, KBNODE src, int *n_sigs,
/****************
* Import the public keys from the given filename. Input may be armored.
- * This function rejects alls keys which are not valid self signed on at
+ * This function rejects all keys which are not validly self signed on at
* least one userid. Only user ids which are self signed will be imported.
- * Other signatures are not not checked.
+ * Other signatures are not checked.
*
* Actually this functtion does a merge. It works like this:
*
@@ -62,23 +62,23 @@ static int merge_sigs( KBNODE dst, KBNODE src, int *n_sigs,
* - check self-signatures and remove all userids and their signatures
* without/invalid self-signatures.
* - reject the keyblock, if we have no valid userid.
- * - See wether we have this key already in one of our pubrings.
+ * - See whether we have this key already in one of our pubrings.
* If not, simply add it to the default keyring.
* - Compare the key and the self-signatures of the new and the one in
- * our keyring. If they are differen something weird is going on;
+ * our keyring. If they are different something weird is going on;
* ask what to do.
- * - See wether we have only non-self-signature on one user id; if not
+ * - See whether we have only non-self-signature on one user id; if not
* ask the user what to do.
* - compare the signatures: If we already have this signature, check
* that they compare okay; if not, issue a warning and ask the user.
- * (consider to look at the timestamp and use the newest?)
+ * (consider looking at the timestamp and use the newest?)
* - Simply add the signature. Can't verify here because we may not have
- * the signatures public key yet; verification is done when putting it
+ * the signature's public key yet; verification is done when putting it
* into the trustdb, which is done automagically as soon as this pubkey
* is used.
* - Proceed with next signature.
*
- * Key revocation certificates have a special handling.
+ * Key revocation certificates have special handling.
*
*/
int
@@ -241,7 +241,7 @@ import_one( const char *fname, KBNODE keyblock )
u32 keyid[2];
int rc = 0;
- /* get the key and print some infos about it */
+ /* get the key and print some info about it */
node = find_kbnode( keyblock, PKT_PUBLIC_CERT );
if( !node ) {
log_error("%s: Oops; public key not found anymore!\n", fname);
@@ -316,7 +316,7 @@ import_one( const char *fname, KBNODE keyblock )
goto leave;
}
- /* See wether we have only non-self-signature on one user id; if not
+ /* See whether we have only non-self-signature on one user id; if not
* ask the user what to do. <--- fixme */
/* now read the original keyblock */
@@ -377,7 +377,7 @@ import_one( const char *fname, KBNODE keyblock )
/****************
- * Import a revocation certificate, this is a single signature packet.
+ * Import a revocation certificate; this is a single signature packet.
*/
static int
import_revoke_cert( const char *fname, KBNODE node )
@@ -436,7 +436,7 @@ import_revoke_cert( const char *fname, KBNODE node )
}
- /* check wether we already have this */
+ /* check whether we already have this */
for(onode=keyblock->next; onode; onode=onode->next ) {
if( onode->pkt->pkttype == PKT_USER_ID )
break;
@@ -476,7 +476,7 @@ import_revoke_cert( const char *fname, KBNODE node )
/****************
- * loop over the keyblock an check all self signatures.
+ * loop over the keyblock and check all self signatures.
* Mark all user-ids with a self-signature by setting flag bit 0.
* Mark all user-ids with an invalid self-signature by setting bit 1.
*/
@@ -515,8 +515,8 @@ chk_self_sigs( const char *fname, KBNODE keyblock,
}
/****************
- * delete all parts which are invalidand those signatures whos
- * public key algorithm is not availabe in this implemenation;
+ * delete all parts which are invalid and those signatures whose
+ * public key algorithm is not available in this implemenation;
* but consider RSA as valid, because parse/build_packets knows
* about it.
* returns: true if at least one valid user-id is left over.
@@ -583,10 +583,10 @@ delete_inv_parts( const char *fname, KBNODE keyblock, u32 *keyid )
*
* o compare the signatures: If we already have this signature, check
* that they compare okay; if not, issue a warning and ask the user.
- * FIXME: add the check, that we don't have duplicate signatures and the
- * warning in cases that the old/new signatures don't match.
+ * FIXME: add the check that we don't have duplicate signatures and the
+ * warning in cases where the old/new signatures don't match.
* o Simply add the signature. Can't verify here because we may not have
- * the signatures public key yet; verification is done when putting it
+ * the signature's public key yet; verification is done when putting it
* into the trustdb, which is done automagically as soon as this pubkey
* is used.
* Note: We indicate newly inserted packets with flag bit 0
@@ -604,7 +604,7 @@ merge_blocks( const char *fname, KBNODE keyblock_orig, KBNODE keyblock,
break;
else if( node->pkt->pkttype == PKT_SIGNATURE
&& node->pkt->pkt.signature->sig_class == 0x20 ) {
- /* check wether we already have this */
+ /* check whether we already have this */
found = 0;
for(onode=keyblock_orig->next; onode; onode=onode->next ) {
if( onode->pkt->pkttype == PKT_USER_ID )
@@ -742,9 +742,9 @@ merge_sigs( KBNODE dst, KBNODE src, int *n_sigs,
if( found ) { /* we already have this signature */
/* Hmmm: should we compare the timestamp etc?
- * but then we have first to see wether this signature is valid
- * - or - simply add it in such a case and let trustdb logic
- * decide wether to remove the old one
+ * but then we have first to see whether this signature is valid
+ * - or simply add it in such a case and let trustdb logic
+ * decide whether to remove the old one
*/
continue;
}
diff --git a/g10/kbnode.c b/g10/kbnode.c
index 3780eb24a..d50d0578c 100644
--- a/g10/kbnode.c
+++ b/g10/kbnode.c
@@ -70,8 +70,8 @@ release_kbnode( KBNODE n )
/****************
- * Delete NODE from ROOT, ROOT must exist!
- * Note: This does only work with walk_kbnode!!
+ * Delete NODE from ROOT. ROOT must exist!
+ * Note: This only works with walk_kbnode!!
*/
void
delete_kbnode( KBNODE node )
@@ -81,7 +81,7 @@ delete_kbnode( KBNODE node )
/****************
- * Append NODE to ROOT, ROOT must exist!
+ * Append NODE to ROOT. ROOT must exist!
*/
void
add_kbnode( KBNODE root, KBNODE node )
@@ -178,7 +178,7 @@ find_kbnode( KBNODE node, int pkttype )
/****************
- * Walk through a list of kbnodes. This functions returns
+ * Walk through a list of kbnodes. This function returns
* the next kbnode for each call; before using the function the first
* time, the caller must set CONTEXT to NULL (This has simply the effect
* to start with ROOT).
@@ -213,9 +213,9 @@ clear_kbnode_flags( KBNODE n )
/****************
* Commit changes made to the kblist at ROOT. Note that ROOT my change,
- * and it is therefor passed by reference.
+ * and it is therefore passed by reference.
* The function has the effect of removing all nodes marked as deleted.
- * returns true, if any node has been changed
+ * returns true if any node has been changed
*/
int
commit_kbnode( KBNODE *root )
diff --git a/g10/keydb.h b/g10/keydb.h
index 6618894a1..d1a7e4571 100644
--- a/g10/keydb.h
+++ b/g10/keydb.h
@@ -28,7 +28,7 @@
/****************
- * A Keyblock are all packets which form an entire certificate;
+ * A Keyblock is all packets which form an entire certificate;
* i.e. the public key, certificate, trust packets, user ids,
* signatures, and subkey.
*
@@ -44,7 +44,7 @@ struct kbnode_struct {
};
/****************
- * A data structre to hold informations about the external position
+ * A data structre to hold information about the external position
* of a keyblock.
*/
struct keyblock_pos_struct {
@@ -73,7 +73,7 @@ struct skc_list {
int mark;
};
-/* structure to collect all informations which can be used to
+/* structure to collect all information which can be used to
* identify a public key */
typedef struct pubkey_find_info *PUBKEY_FIND_INFO;
struct pubkey_find_info {
diff --git a/g10/keygen.c b/g10/keygen.c
index 003d54bbb..a4addfc25 100644
--- a/g10/keygen.c
+++ b/g10/keygen.c
@@ -147,8 +147,8 @@ gen_elg(unsigned nbits, KBNODE pub_root, KBNODE sec_root, DEK *dek,
pkt->pkt.public_cert = pkc;
add_kbnode(pub_root, new_kbnode( pkt ));
- /* don't know wether it make sense to have the factors, so for now
- * we store them in the secret keyring (but they are of secret) */
+ /* don't know whether it makes sense to have the factors, so for now
+ * we store them in the secret keyring (but they are secret) */
pkt = m_alloc_clear(sizeof *pkt);
pkt->pkttype = PKT_SECRET_CERT;
pkt->pkt.secret_cert = skc;
@@ -338,7 +338,7 @@ generate_keypair()
nbits = *answer? atoi(answer): 1024;
m_free(answer);
if( algo == PUBKEY_ALGO_DSA && (nbits < 512 || nbits > 1024) )
- tty_printf(_("DSA does only allow keysizes from 512 to 1024\n"));
+ tty_printf(_("DSA only allows keysizes from 512 to 1024\n"));
else if( nbits < 768 )
tty_printf(_("keysize too small; 768 is smallest value allowed.\n"));
else if( nbits > 2048 ) {
@@ -495,7 +495,7 @@ generate_keypair()
tty_printf(_("You selected this USER-ID:\n \"%s\"\n\n"), uid);
- /* fixme: add a warning if this the user-id already exists */
+ /* fixme: add a warning if this user-id already exists */
for(;;) {
answer = tty_get(_("Edit (N)ame, (C)omment, (E)mail or (O)kay? "));
tty_kill_prompt();
@@ -539,8 +539,8 @@ generate_keypair()
if( rc == -1 ) {
m_free(dek); dek = NULL;
tty_printf(_(
- "You don't what a passphrase - this is probably a *bad* idea!\n"
- "I will do it anyway. You can change your passphrase at anytime,\n"
+ "You don't want a passphrase - this is probably a *bad* idea!\n"
+ "I will do it anyway. You can change your passphrase at any time,\n"
"using this program with the option \"--change-passphrase\"\n\n"));
break;
}
@@ -558,7 +558,7 @@ generate_keypair()
}
- /* now check wether we a are allowed to write to the keyrings */
+ /* now check whether we are allowed to write to the keyrings */
pub_fname = make_filename(opt.homedir, "pubring.gpg", NULL );
sec_fname = make_filename(opt.homedir, "secring.gpg", NULL );
if( opt.verbose ) {
diff --git a/g10/mainproc.c b/g10/mainproc.c
index d8b4310a1..7b82b8165 100644
--- a/g10/mainproc.c
+++ b/g10/mainproc.c
@@ -47,7 +47,7 @@ typedef struct {
PKT_user_id *last_user_id;
md_filter_context_t mfx;
int sigs_only; /* process only signatures and reject all other stuff */
- int encrypt_only; /* process onyl encrytion messages */
+ int encrypt_only; /* process only encrytion messages */
STRLIST signed_data;
DEK *dek;
int last_was_pubkey_enc;
@@ -123,12 +123,12 @@ add_signature( CTX c, PACKET *pkt )
KBNODE node;
if( pkt->pkttype == PKT_SIGNATURE && !c->list ) {
- /* This is the first signature for a following datafile.
- * G10 does not write such packets, instead it always uses
+ /* This is the first signature for the following datafile.
+ * G10 does not write such packets; instead it always uses
* onepass-sig packets. The drawback of PGP's method
- * of prepending the signtaure to the data is,
+ * of prepending the signature to the data is
* that it is not possible to make a signature from data read
- * from stdin. (Anyway, G10 is able to read these stuff) */
+ * from stdin. (G10 is able to read PGP stuff anyway.) */
node = new_kbnode( pkt );
c->list = node;
return 1;
@@ -222,7 +222,7 @@ proc_plaintext( CTX c, PACKET *pkt )
free_md_filter_context( &c->mfx );
/* fixme: take the digest algo(s) to use from the
* onepass_sig packet (if we have these)
- * And look at the sigclass to check wether we should use the
+ * And look at the sigclass to check whether we should use the
* textmode filter (sigclass 0x01)
*/
c->mfx.md = md_open( DIGEST_ALGO_RMD160, 0);
diff --git a/g10/mdfilter.c b/g10/mdfilter.c
index 2b3864455..a18636e8b 100644
--- a/g10/mdfilter.c
+++ b/g10/mdfilter.c
@@ -34,7 +34,7 @@
/****************
- * The filter is used to collect a message digest
+ * This filter is used to collect a message digest
*/
int
md_filter( void *opaque, int control,
diff --git a/g10/openfile.c b/g10/openfile.c
index f51ee433d..be2702b55 100644
--- a/g10/openfile.c
+++ b/g10/openfile.c
@@ -33,7 +33,7 @@
/****************
- * Check wether FNAME exists and ask if it's okay to overwrite an
+ * Check whether FNAME exists and ask if it's okay to overwrite an
* existing one.
* Returns: -1 : Do not overwrite
* 0 : it's okay to overwrite or the file does not exist
diff --git a/g10/packet.h b/g10/packet.h
index 8b1e3c4c0..2393964c2 100644
--- a/g10/packet.h
+++ b/g10/packet.h
@@ -124,12 +124,12 @@ typedef struct {
byte hdrbytes; /* number of header bytes */
byte version;
byte pubkey_algo; /* algorithm used for public key scheme */
- byte is_protected; /* The secret infos are protected and must */
- /* be decrypteded before use, the protected */
+ byte is_protected; /* The secret info is protected and must */
+ /* be decrypted before use, the protected */
/* MPIs are simply (void*) pointers to memory */
/* and should never be passed to a mpi_xxx() */
struct {
- byte algo; /* cipher used to protect the secret informations*/
+ byte algo; /* cipher used to protect the secret information*/
byte s2k;
byte hash;
byte salt[8];
diff --git a/g10/parse-packet.c b/g10/parse-packet.c
index b199ef21d..fb2d74c3a 100644
--- a/g10/parse-packet.c
+++ b/g10/parse-packet.c
@@ -33,8 +33,8 @@
#include "filter.h"
#include "options.h"
-static mpi_print_mode = 0;
-static list_mode = 0;
+static int mpi_print_mode = 0;
+static int list_mode = 0;
static int parse( IOBUF inp, PACKET *pkt, int reqtype,
ulong *retpos, int *skip, IOBUF out, int do_skip );
@@ -122,7 +122,7 @@ parse_packet( IOBUF inp, PACKET *pkt )
}
/****************
- * Like parse packet, but do only return packets of the given type.
+ * Like parse packet, but only return packets of the given type.
*/
int
search_packet( IOBUF inp, PACKET *pkt, int pkttype, ulong *retpos )
@@ -151,7 +151,7 @@ copy_all_packets( IOBUF inp, IOBUF out )
/****************
* Copy some packets from INP to OUT, thereby removing unused spaces.
- * Stop after at offset STOPoff (i.e. don't copy the packet at this offset)
+ * Stop at offset STOPoff (i.e. don't copy packets at this or later offsets)
*/
int
copy_some_packets( IOBUF inp, IOBUF out, ulong stopoff )
@@ -629,7 +629,7 @@ parse_signature( IOBUF inp, int pkttype, unsigned long pktlen,
sig->digest_start[0] = iobuf_get_noeof(inp); pktlen--;
sig->digest_start[1] = iobuf_get_noeof(inp); pktlen--;
- if( is_v4 ) { /*extract required informations */
+ if( is_v4 ) { /*extract required information */
const byte *p;
p = parse_subpkt( sig->hashed_data, 2 );
if( !p )
@@ -926,7 +926,7 @@ parse_certificate( IOBUF inp, int pkttype, unsigned long pktlen,
/* It does not make sense to read it into secure memory.
* If the user is so careless, not to protect his secret key,
* we can assume, that he operates an open system :=(.
- * So we put the key into secure memory when we unprotect him. */
+ * So we put the key into secure memory when we unprotect it. */
n = pktlen; cert->d.elg.x = mpi_read(inp, &n, 0 ); pktlen -=n;
cert->csum = read_16(inp); pktlen -= 2;
@@ -1056,7 +1056,7 @@ parse_certificate( IOBUF inp, int pkttype, unsigned long pktlen,
/* It does not make sense to read it into secure memory.
* If the user is so careless, not to protect his secret key,
* we can assume, that he operates an open system :=(.
- * So we put the key into secure memory when we unprotect him. */
+ * So we put the key into secure memory when we unprotect it. */
n = pktlen; cert->d.dsa.x = mpi_read(inp, &n, 0 ); pktlen -=n;
cert->csum = read_16(inp); pktlen -= 2;
@@ -1288,11 +1288,12 @@ parse_encrypted( IOBUF inp, int pkttype, unsigned long pktlen, PACKET *pkt )
skip_rest(inp, pktlen);
goto leave;
}
- if( list_mode )
+ if( list_mode ) {
if( pktlen )
printf(":encrypted data packet:\n\tlength: %lu\n", pktlen-10);
else
printf(":encrypted data packet:\n\tlength: unknown\n");
+ }
ed->buf = inp;
pktlen = 0;
diff --git a/g10/pkclist.c b/g10/pkclist.c
index 8de95c3ab..3e6e78d59 100644
--- a/g10/pkclist.c
+++ b/g10/pkclist.c
@@ -36,7 +36,7 @@
#include "i18n.h"
/****************
- * Returns true if a ownertrust has changed.
+ * Returns true if an ownertrust has changed.
*/
static int
query_ownertrust( ulong lid )
@@ -70,14 +70,14 @@ query_ownertrust( ulong lid )
tty_print_string( p, n ),
m_free(p);
tty_printf(_("\"\n\n"
-"Please decide in how far do you trust this user to\n"
-"correctly sign other users keys (looking at his passport,\n"
-"checking the fingerprints from different sources ...)?\n\n"
+"Please decide how far you trust this user to correctly\n"
+"verify other users' keys (by looking at passports,\n"
+"checking fingerprints from different sources...)?\n\n"
" 1 = Don't know\n"
" 2 = I do NOT trust\n"
" 3 = I trust marginally\n"
" 4 = I trust fully\n"
-" s = please show me more informations\n\n") );
+" s = please show me more information\n\n") );
for(;;) {
p = tty_get(_("Your decision? "));
@@ -129,7 +129,7 @@ add_ownertrust( PKT_public_cert *pkc )
int any=0;
tty_printf(
-_("Could not find a valid trust path to the key. Lets see, wether we\n"
+_("Could not find a valid trust path to the key. Let's see whether we\n"
"can assign some missing owner trust values.\n\n"));
rc = query_trust_record( pkc );
@@ -160,7 +160,7 @@ _("Could not find a valid trust path to the key. Lets see, wether we\n"
}
/****************
- * Check wether we can trust this pkc which has a trustlevel of TRUSTLEVEL
+ * Check whether we can trust this pkc which has a trustlevel of TRUSTLEVEL
* Returns: true if we trust.
*/
static int
@@ -215,7 +215,7 @@ do_we_trust( PKT_public_cert *pkc, int trustlevel )
if( rc )
log_fatal("trust check after add_ownertrust failed: %s\n",
g10_errstr(rc) );
- /* fixme: this is recursive; we better should unroll it */
+ /* fixme: this is recursive; we should unroll it */
return do_we_trust( pkc, trustlevel );
}
}
@@ -226,7 +226,7 @@ do_we_trust( PKT_public_cert *pkc, int trustlevel )
return 0; /* no */
case TRUST_MARGINAL:
- log_info("I'm not sure wether this keys really belongs to the owner\n"
+ log_info("I'm not sure whether this key really belongs to the owner\n"
"but I proceed anyway\n");
return 1; /* yes */
@@ -252,7 +252,7 @@ do_we_trust( PKT_public_cert *pkc, int trustlevel )
/****************
- * wrapper arounf do_we_trust, so we can ask wether to use the
+ * wrapper around do_we_trust, so we can ask whether to use the
* key anyway.
*/
static int
@@ -264,7 +264,7 @@ do_we_trust_pre( PKT_public_cert *pkc, int trustlevel )
char *answer;
tty_printf(_(
-"It is NOT certain, that the key belongs to his owner.\n"
+"It is NOT certain that the key belongs to its owner.\n"
"If you *really* know what you are doing, you may answer\n"
"the next question with yes\n\n") );
diff --git a/g10/revoke.c b/g10/revoke.c
index c98bcc336..ca511bcc2 100644
--- a/g10/revoke.c
+++ b/g10/revoke.c
@@ -176,11 +176,11 @@ gen_revoke( const char *uname )
/* and issue a usage notice */
tty_printf("Revocation certificate created.\n\n"
-"Please move it to a media, which you can hide away; if Mallory gets\n"
+"Please move it to a medium which you can hide away; if Mallory gets\n"
"access to this certificate he can use it to make your key unusable.\n"
-"It is clever to print this certificate and store it away, just in the case\n"
-"your media gets unreadable. But have some caution: The printer system of\n"
-"your machine might store the data and make it availabe to others!\n");
+"It is smart to print this certificate and store it away, just in case\n"
+"your media become unreadable. But have some caution: The print system of\n"
+"your machine might store the data and make it available to others!\n");
diff --git a/g10/ringedit.c b/g10/ringedit.c
index 3193b0012..a7797a358 100644
--- a/g10/ringedit.c
+++ b/g10/ringedit.c
@@ -98,7 +98,7 @@ check_pos( KBPOS *kbpos )
****************************************************************/
/****************
- * Register a resource (which currently may ionly be a keyring file).
+ * Register a resource (which currently may only be a keyring file).
*/
int
add_keyblock_resource( const char *filename, int force, int secret )
@@ -165,12 +165,12 @@ get_keyblock_handle( const char *filename, int secret, KBPOS *kbpos )
/****************
- * Search a keyblock which starts with the given packet and put all
- * informations into KBPOS, which can be used later to access this key block.
+ * Search a keyblock which starts with the given packet and puts all
+ * information into KBPOS, which can be used later to access this key block.
* This function looks into all registered keyblock sources.
* PACKET must be a packet with either a secret_cert or a public_cert
*
- * This function is intended to check wether a given certificate
+ * This function is intended to check whether a given certificate
* is already in a keyring or to prepare it for editing.
*
* Returns: 0 if found, -1 if not found or an errorcode.
@@ -276,7 +276,7 @@ find_secret_keyblock_byname( KBPOS *kbpos, const char *username )
/****************
* Lock the keyblock; wait until it's available
* This function may change the internal data in kbpos, in cases
- * when the to be locked keyblock has been modified.
+ * when the keyblock to be locked has been modified.
* fixme: remove this function and add an option to search()?
*/
int
@@ -310,7 +310,7 @@ read_keyblock( KBPOS *kbpos, KBNODE *ret_root )
/****************
- * This functions can be used to read trough a complete keyring.
+ * This functions can be used to read through a complete keyring.
* Mode is: 0 = open
* 1 = read
* 2 = close
@@ -410,7 +410,7 @@ insert_keyblock( KBPOS *kbpos, KBNODE root )
/****************
* Delete the keyblock described by KBPOS.
* The current code simply changes the keyblock in the keyring
- * to packet of type 0 with the correct length. To help detecting errors,
+ * to packet of type 0 with the correct length. To help detect errors,
* zero bytes are written.
*/
int
@@ -671,7 +671,7 @@ keyring_enum( KBPOS *kbpos, KBNODE *ret_root, int skipsigs )
break;
default:
- /* skip pakets at the begin of a keyring, until we find
+ /* skip pakets at the beginning of a keyring, until we find
* a start packet; issue a warning if it is not a comment */
if( !root && pkt->pkttype != PKT_COMMENT )
log_info("keyring_enum: skipped packet of type %d\n",
@@ -703,7 +703,7 @@ keyring_enum( KBPOS *kbpos, KBNODE *ret_root, int skipsigs )
/****************
- * Peromf insert/delete/update operation.
+ * Perform insert/delete/update operation.
* mode 1 = insert
* 2 = delete
* 3 = update
diff --git a/g10/seckey-cert.c b/g10/seckey-cert.c
index 942303fa9..7dc84140b 100644
--- a/g10/seckey-cert.c
+++ b/g10/seckey-cert.c
@@ -105,7 +105,7 @@ do_check( PKT_secret_cert *cert )
default: BUG();
}
cipher_close( cipher_hd );
- /* now let's see wether we have used the right passphrase */
+ /* now let's see whether we have used the right passphrase */
if( csum != cert->csum ) {
if( cert->pubkey_algo == PUBKEY_ALGO_ELGAMAL ) {
/* very bad kludge to work around an early bug */
@@ -205,7 +205,7 @@ do_check( PKT_secret_cert *cert )
/****************
* Check the secret key certificate
- * Ask up to 3 time for a correct passphrase
+ * Ask up to 3 times for a correct passphrase
*/
int
check_secret_key( PKT_secret_cert *cert )
@@ -230,7 +230,7 @@ check_secret_key( PKT_secret_cert *cert )
}
/****************
- * check wether the secret key is protected.
+ * check whether the secret key is protected.
* Returns: 0 not protected, -1 on error or the protection algorithm
*/
int
diff --git a/g10/seskey.c b/g10/seskey.c
index 4ce8fe03b..0dcec8d9d 100644
--- a/g10/seskey.c
+++ b/g10/seskey.c
@@ -66,8 +66,8 @@ encode_session_key( DEK *dek, unsigned nbits )
u16 csum;
MPI a;
- /* the current limitation is, that we can only use a session key
- * which length is a multiple of BITS_PER_MPI_LIMB
+ /* the current limitation is that we can only use a session key
+ * whose length is a multiple of BITS_PER_MPI_LIMB
* I think we can live with that.
*/
if( dek->keylen + 7 > nframe || !nframe )
@@ -79,7 +79,7 @@ encode_session_key( DEK *dek, unsigned nbits )
* 0 2 RND(n bytes) 0 A DEK(k bytes) CSUM(2 bytes)
*
* (But how can we store the leading 0 - the external representaion
- * of MPIs don't allow leading zeroes =:-)
+ * of MPIs doesn't allow leading zeroes =:-)
*
* RND are non-zero random bytes.
* A is the cipher algorithm
diff --git a/g10/sig-check.c b/g10/sig-check.c
index d366267e7..ecefcf596 100644
--- a/g10/sig-check.c
+++ b/g10/sig-check.c
@@ -235,9 +235,9 @@ do_check( PKT_public_cert *pkc, PKT_signature *sig, MD_HANDLE digest )
/****************
- * check the signature pointed to by NODE. This is a key signatures.
+ * check the signature pointed to by NODE. This is a key signature.
* If the function detects a self-signature, it uses the PKC from
- * NODE and does not read the any public key.
+ * NODE and does not read any public key.
*/
int
check_key_signature( KBNODE root, KBNODE node, int *is_selfsig )
diff --git a/g10/sign.c b/g10/sign.c
index 0fffc5f0b..8867916c7 100644
--- a/g10/sign.c
+++ b/g10/sign.c
@@ -55,7 +55,7 @@ complete_sig( PKT_signature *sig, PKT_secret_cert *skc, MD_HANDLE md )
else
BUG();
- /* fixme: should we check wether the signature is okay?
+ /* fixme: should we check whether the signature is okay?
* maybe by using an option */
return rc;
diff --git a/g10/trustdb.c b/g10/trustdb.c
index 321f7baa6..c7400c407 100644
--- a/g10/trustdb.c
+++ b/g10/trustdb.c
@@ -266,7 +266,7 @@ release_lid_table( LOCAL_ID_INFO *tbl )
/****************
* Add a new item to the table or return 1 if we already have this item
- * fixme: maybe its a good idea to take items from an unused item list.
+ * fixme: maybe it's a good idea to take items from an unused item list.
*/
static int
ins_lid_table_item( LOCAL_ID_INFO *tbl, ulong lid, unsigned flag )
@@ -677,7 +677,7 @@ search_record( PKT_public_cert *pkc, TRUSTREC *rec )
/****************
* If we do not have a local_id in a signature packet, find the owner of
- * the signature packet in our trustdb or insert him into the trustdb
+ * the signature packet in our trustdb or insert them into the trustdb
*/
static int
set_signature_packets_local_id( PKT_signature *sig )
@@ -728,7 +728,7 @@ keyid_from_local_id( ulong lid, u32 *keyid )
}
/****************
- * Walk throug the signatures of a public key.
+ * Walk through the signatures of a public key.
* The caller must provide a context structure, with all fields set
* to zero, but the local_id field set to the requested key;
* This function does not change this field. On return the context
@@ -823,7 +823,7 @@ walk_sigrecs( SIGREC_CONTEXT *c, int create )
/****************
- * Verify, that all our public keys are in the trustDB.
+ * Verify that all our public keys are in the trustDB.
*/
static int
verify_own_certs()
@@ -848,7 +848,7 @@ verify_own_certs()
if( DBG_TRUST )
log_debug("checking secret key %08lX\n", (ulong)keyid[1] );
- /* look wether we can access the public key of this secret key */
+ /* see whether we can access the public key of this secret key */
memset( pkc, 0, sizeof *pkc );
rc = get_pubkey( pkc, keyid );
if( rc ) {
@@ -944,7 +944,7 @@ do_list_sigs( ulong root, ulong pubkey, int depth,
else {
printf("%6u: %*s%08lX(%lu:%02x) ", *lineno, depth*4, "",
(ulong)keyid[1], sx.sig_id, sx.sig_flag );
- /* check wether we already checked this pubkey */
+ /* check whether we already checked this pubkey */
if( !qry_lid_table_flag( ultikey_table, sx.sig_id, NULL ) ) {
print_user_id("[ultimately trusted]", keyid);
++*lineno;
@@ -1023,7 +1023,7 @@ do_list_path( TRUST_INFO *stack, int depth, int max_depth,
/*printf("%2lu/%d: scrutinizig\n", stack[depth-1], depth);*/
if( depth >= max_depth || depth >= MAX_LIST_SIGS_DEPTH-1 ) {
- /*printf("%2lu/%d: to deeply nested\n", stack[depth-1], depth);*/
+ /*printf("%2lu/%d: too deeply nested\n", stack[depth-1], depth);*/
return 0;
}
memset( &sx, 0, sizeof sx );
@@ -1085,7 +1085,7 @@ do_list_path( TRUST_INFO *stack, int depth, int max_depth,
* Check all the sigs of the given keyblock and mark them
* as checked. Valid signatures which are duplicates are
* also marked [shall we check them at all?]
- * FIXME: what shall we do if we have duplicate signatures were only
+ * FIXME: what shall we do if we have duplicate signatures where only
* some of them are bad?
*/
static int
@@ -1204,9 +1204,9 @@ build_sigrecs( ulong pubkeyid )
/* the next function should always succeed, because
* we have already checked the signature, and for this
* it was necessary to have the pubkey. The only reason
- * this can fail are I/o errors of the trustdb or a
+ * this can fail are I/O errors of the trustdb or a
* remove operation on the pubkey database - which should
- * not disturb us, because we have to chace them anyway. */
+ * not disturb us, because we have to chance them anyway. */
rc = set_signature_packets_local_id( node->pkt->pkt.signature );
if( rc )
log_fatal("set_signature_packets_local_id failed: %s\n",
@@ -1339,7 +1339,7 @@ make_tsl( ulong pubkey_id, TRUST_SEG_LIST *ret_tslist )
* to assign a trustvalue to the first segment (which is the requested key)
* of each path.
*
- * FIXME: We have to do more thinks here. e.g. we should never increase
+ * FIXME: We have to do more thinking here. e.g. we should never increase
* the trust value.
*
* Do not do it for duplicates.
@@ -1355,7 +1355,7 @@ propagate_trust( TRUST_SEG_LIST tslist )
if( tsl->dup )
continue;
assert( tsl->nseg );
- /* the last segment is always a ultimately trusted one, so we can
+ /* the last segment is always an ultimately trusted one, so we can
* assign a fully trust to the next one */
i = tsl->nseg-1;
tsl->seg[i].trust = TRUST_ULTIMATE;
@@ -1409,7 +1409,7 @@ do_check( ulong pubkeyid, TRUSTREC *dr, unsigned *trustlevel )
tflags |= TRUST_FLAG_REVOKED;
if( !rc && !dr->r.dir.sigrec ) {
- /* See wether this is our own key */
+ /* See whether this is our own key */
if( !qry_lid_table_flag( ultikey_table, pubkeyid, NULL ) )
*trustlevel = tflags | TRUST_ULTIMATE;
return 0;
@@ -1439,7 +1439,7 @@ do_check( ulong pubkeyid, TRUSTREC *dr, unsigned *trustlevel )
}
}
- /* and look wether there is a trusted path.
+ /* and see whether there is a trusted path.
* We only have to look at the first segment, because
* propagate_trust has investigated all other segments */
marginal = fully = 0;
@@ -1478,9 +1478,9 @@ do_check( ulong pubkeyid, TRUSTREC *dr, unsigned *trustlevel )
}
-/*********************************************************
- **************** API Interface ************************
- *********************************************************/
+/***********************************************
+ **************** API ************************
+ ***********************************************/
/****************
* Perform some checks over the trustdb
@@ -1536,11 +1536,11 @@ init_trustdb( int level, const char *dbname )
* in ~/.gnupg/ here */
rc = verify_private_data();
if( !rc ) {
- /* verify, that our own certificates are in the trustDB
+ /* verify that our own certificates are in the trustDB
* or move them to the trustdb. */
rc = verify_own_certs();
- /* should we check wether there is no other ultimately trusted
+ /* should we check whether there is no other ultimately trusted
* key in the database? */
}
@@ -1769,7 +1769,7 @@ check_trust( PKT_public_cert *pkc, unsigned *r_trustlevel )
* 3) call this function as long as it does not return -1
* to indicate EOF. LID does contain the next key used to build the web
* 4) Always call this function a last time with LID set to NULL,
- * so that it can free it's context.
+ * so that it can free its context.
*/
int
enum_trust_web( void **context, ulong *lid )
@@ -1874,7 +1874,7 @@ query_trust_record( PKT_public_cert *pkc )
/****************
* Insert a trust record into the TrustDB
- * This function failes if this record already exists.
+ * This function fails if this record already exists.
*/
int
insert_trust_record( PKT_public_cert *pkc )
diff --git a/g10/trustdb.h b/g10/trustdb.h
index 3c81b2b2b..7ffcd4426 100644
--- a/g10/trustdb.h
+++ b/g10/trustdb.h
@@ -26,7 +26,7 @@
#define TRUST_MASK 15
#define TRUST_UNKNOWN 0 /* not yet calculated */
#define TRUST_EXPIRED 1 /* calculation may be invalid */
-#define TRUST_UNDEFINED 2 /* not enough informations for calculation */
+#define TRUST_UNDEFINED 2 /* not enough information for calculation */
#define TRUST_NEVER 3 /* never trust this pubkey */
#define TRUST_MARGINAL 4 /* marginally trusted */
#define TRUST_FULLY 5 /* fully trusted */
diff --git a/g10/verify.c b/g10/verify.c
index 3398c2ed4..7a2f73130 100644
--- a/g10/verify.c
+++ b/g10/verify.c
@@ -41,9 +41,9 @@
/****************
* Assume that the input is a signature and verify it without
- * generating any output. With no arguments, the sigature packet
+ * generating any output. With no arguments, the signature packet
* is read from stdin (it may be a detached signature when not
- * used in batch mode). If only a sigfile is given, is maybe a complete
+ * used in batch mode). If only a sigfile is given, it may be a complete
* signature or a detached signature in which case the signed stuff
* is expected from stdin. With more than 1 argument, the first should
* be a detached signature and the remaining files are the signed stuff.