aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorJustus Winter <[email protected]>2017-06-06 12:48:01 +0000
committerJustus Winter <[email protected]>2017-06-06 14:08:45 +0000
commit216f0804c1452c777c0252c36f56e279d18632a2 (patch)
tree462fe1e629d9647102240b1441b93cd52b0f6753
parentgpg: Report compliance with CO_DE_VS. (diff)
downloadgnupg-216f0804c1452c777c0252c36f56e279d18632a2.tar.gz
gnupg-216f0804c1452c777c0252c36f56e279d18632a2.zip
common,g10: Fix typos.
-- Signed-off-by: Justus Winter <[email protected]>
Diffstat (limited to '')
-rw-r--r--common/compliance.c6
-rw-r--r--g10/sign.c2
2 files changed, 4 insertions, 4 deletions
diff --git a/common/compliance.c b/common/compliance.c
index 80134d6b6..14ba0970d 100644
--- a/common/compliance.c
+++ b/common/compliance.c
@@ -36,7 +36,7 @@
#include "compliance.h"
/* Return true if ALGO with a key of KEYLENGTH is compliant to the
- * give COMPLIANCE mode. If KEY is not NULL, various bits of
+ * given COMPLIANCE mode. If KEY is not NULL, various bits of
* information will be extracted from it. If CURVENAME is not NULL, it
* is assumed to be the already computed. ALGO may be either an
* OpenPGP-style pubkey_algo_t, or a gcrypt-style enum gcry_pk_algos,
@@ -139,7 +139,7 @@ gnupg_pk_is_compliant (enum gnupg_compliance_mode compliance, int algo,
}
-/* Return true if CIPHER is compliant to the give COMPLIANCE mode. */
+/* Return true if CIPHER is compliant to the given COMPLIANCE mode. */
int
gnupg_cipher_is_compliant (enum gnupg_compliance_mode compliance, cipher_algo_t cipher)
{
@@ -166,7 +166,7 @@ gnupg_cipher_is_compliant (enum gnupg_compliance_mode compliance, cipher_algo_t
}
-/* Return true if DIGEST is compliant to the give COMPLIANCE mode. */
+/* Return true if DIGEST is compliant to the given COMPLIANCE mode. */
int
gnupg_digest_is_compliant (enum gnupg_compliance_mode compliance, digest_algo_t digest)
{
diff --git a/g10/sign.c b/g10/sign.c
index af1a7b64f..6b55fffa0 100644
--- a/g10/sign.c
+++ b/g10/sign.c
@@ -251,7 +251,7 @@ hash_sigversion_to_magic (gcry_md_hd_t md, const PKT_signature *sig)
/* Perform the sign operation. If CACHE_NONCE is given the agent is
- advised to use that cached passphrase fro the key. */
+ advised to use that cached passphrase for the key. */
static int
do_sign (ctrl_t ctrl, PKT_public_key *pksk, PKT_signature *sig,
gcry_md_hd_t md, int mdalgo, const char *cache_nonce)