diff options
author | Daniel Kahn Gillmor <[email protected]> | 2024-05-12 22:09:23 +0000 |
---|---|---|
committer | Werner Koch <[email protected]> | 2024-05-31 10:28:32 +0000 |
commit | 42b0e9558a308dbc954ee60c3d346b5cabcd2fdb (patch) | |
tree | f073776758cd706a0cadf0bd64073d1669a8d691 /dirmngr | |
parent | g13: Adjust for changed gnupg_process_spawn. (diff) | |
download | gnupg-42b0e9558a308dbc954ee60c3d346b5cabcd2fdb.tar.gz gnupg-42b0e9558a308dbc954ee60c3d346b5cabcd2fdb.zip |
indent: Fix spelling
--
These are non-substantive corrections for minor spelling mistakes
within the GnuPG codebase.
With something like this applied to the codebase, and a judiciously
tuned spellchecker integrated as part of a standard test suite, it
should be possible to keep a uniform orthography within the project.
GnuPG-bug-id: 7116
Diffstat (limited to 'dirmngr')
-rw-r--r-- | dirmngr/ONEWS | 4 | ||||
-rw-r--r-- | dirmngr/certcache.c | 2 | ||||
-rw-r--r-- | dirmngr/dirmngr.c | 6 | ||||
-rw-r--r-- | dirmngr/dirmngr.h | 2 | ||||
-rw-r--r-- | dirmngr/dns.c | 2 | ||||
-rw-r--r-- | dirmngr/http-ntbtls.c | 2 | ||||
-rw-r--r-- | dirmngr/http.c | 16 | ||||
-rw-r--r-- | dirmngr/ks-engine-ldap.c | 14 | ||||
-rw-r--r-- | dirmngr/ldap-misc.c | 2 | ||||
-rw-r--r-- | dirmngr/ldap.c | 8 | ||||
-rw-r--r-- | dirmngr/ldapserver.c | 2 | ||||
-rw-r--r-- | dirmngr/ocsp.c | 8 | ||||
-rw-r--r-- | dirmngr/server.c | 2 | ||||
-rw-r--r-- | dirmngr/t-ldap-parse-uri.c | 2 | ||||
-rw-r--r-- | dirmngr/validate.c | 6 |
15 files changed, 39 insertions, 39 deletions
diff --git a/dirmngr/ONEWS b/dirmngr/ONEWS index cb2050748..154d8e0bf 100644 --- a/dirmngr/ONEWS +++ b/dirmngr/ONEWS @@ -55,7 +55,7 @@ Noteworthy changes in version 1.0.1 (2007-08-16) Noteworthy changes in version 1.0.0 (2006-11-29) ------------------------------------------------ - * Bumbed the version number. + * Bumped the version number. * Removed included gettext. We now require the system to provide a suitable installation. @@ -174,7 +174,7 @@ Noteworthy changes in version 0.5.4 (2004-04-29) ------------------------------------------------ * New commands --ocsp-responder and --ocsp-signer to define a default - OCSP reponder if a certificate does not contain an assigned OCSP + OCSP responder if a certificate does not contain an assigned OCSP responder. diff --git a/dirmngr/certcache.c b/dirmngr/certcache.c index b7b5b3d15..07a47a525 100644 --- a/dirmngr/certcache.c +++ b/dirmngr/certcache.c @@ -225,7 +225,7 @@ cert_compute_fpr (ksba_cert_t cert, unsigned char *digest) -/* Cleanup one slot. This releases all resourses but keeps the actual +/* Cleanup one slot. This releases all resources but keeps the actual slot in the cache marked for reuse. */ static void clean_cache_slot (cert_item_t ci) diff --git a/dirmngr/dirmngr.c b/dirmngr/dirmngr.c index d58a27372..5a2a45bc1 100644 --- a/dirmngr/dirmngr.c +++ b/dirmngr/dirmngr.c @@ -1104,12 +1104,12 @@ main (int argc, char **argv) socket_name = dirmngr_socket_name (); - /* The configuraton directories for use by gpgrt_argparser. */ + /* The configuration directories for use by gpgrt_argparser. */ gpgrt_set_confdir (GPGRT_CONFDIR_SYS, gnupg_sysconfdir ()); gpgrt_set_confdir (GPGRT_CONFDIR_USER, gnupg_homedir ()); /* We are re-using the struct, thus the reset flag. We OR the - * flags so that the internal intialized flag won't be cleared. */ + * flags so that the internal initialized flag won't be cleared. */ argc = orig_argc; argv = orig_argv; pargs.argc = &argc; @@ -1748,7 +1748,7 @@ dirmngr_deinit_default_ctrl (ctrl_t ctrl) The format of such a file is line oriented where empty lines and lines starting with a hash mark are ignored. All other lines are - assumed to be colon seprated with these fields: + assumed to be colon separated with these fields: 1. field: Hostname 2. field: Portnumber diff --git a/dirmngr/dirmngr.h b/dirmngr/dirmngr.h index 50c97f140..ace40e6d5 100644 --- a/dirmngr/dirmngr.h +++ b/dirmngr/dirmngr.h @@ -241,7 +241,7 @@ struct server_control_s int audit_events; /* Send audit events to client. */ char *http_proxy; /* The used http_proxy or NULL. */ - nvc_t rootdse; /* Container wit the rootDSE properties. */ + nvc_t rootdse; /* Container with the rootDSE properties. */ unsigned int timeout; /* Timeout for connect calls in ms. */ diff --git a/dirmngr/dns.c b/dirmngr/dns.c index e0eb33244..f023e7395 100644 --- a/dirmngr/dns.c +++ b/dirmngr/dns.c @@ -9761,7 +9761,7 @@ struct dns_addrinfo *dns_ai_open(const char *host, const char *serv, enum dns_ty /* * FIXME: If an explicit A or AAAA record type conflicts with * .ai_family or with resconf.family (i.e. AAAA specified but - * AF_INET6 not in interection of .ai_family and resconf.family), + * AF_INET6 not in intersection of .ai_family and resconf.family), * then what? */ switch (ai->qtype) { diff --git a/dirmngr/http-ntbtls.c b/dirmngr/http-ntbtls.c index 2191acb60..c251f57ef 100644 --- a/dirmngr/http-ntbtls.c +++ b/dirmngr/http-ntbtls.c @@ -78,7 +78,7 @@ gnupg_http_tls_verify_cb (void *opaque, validate_flags = VALIDATE_FLAG_TLS; /* If we are using the standard hkps:// pool use the dedicated root - * certificate. Note that this differes from the GnuTLS + * certificate. Note that this differs from the GnuTLS * implementation which uses this special certificate only if no * other certificates are configured. */ /* Disabled for 2.3.2 to due problems with the standard hkps pool. */ diff --git a/dirmngr/http.c b/dirmngr/http.c index 6ae9029be..5723a13f2 100644 --- a/dirmngr/http.c +++ b/dirmngr/http.c @@ -295,7 +295,7 @@ struct http_session_s } verify; char *servername; /* Malloced server name. */ - /* A callback function to log details of TLS certifciates. */ + /* A callback function to log details of TLS certificates. */ void (*cert_log_cb) (http_session_t, gpg_error_t, const char *, const void **, size_t *); @@ -2018,7 +2018,7 @@ w32_get_proxy (const char *url) * If OVERRIDE_PROXY is not NULL and not empty, this proxy will be * used instead of any configured or dynamically determined proxy. If * the function runs into an error an error code is returned and NULL - * is stored at R_PROXY. If the fucntion was successful and a proxy + * is stored at R_PROXY. If the function was successful and a proxy * is to be used, information on the procy is stored at R_PROXY; if no * proxy shall be used R_PROXY is set to NULL. Caller should always * use release_proxy_info on the value stored at R_PROXY. */ @@ -2358,8 +2358,8 @@ run_gnutls_handshake (http_t hd, const char *server) #endif /*HTTP_USE_GNUTLS*/ -/* It INPUTSTRING is NULL get the intial token. If INPUTSTRING is not - * NULL, decode the string and use this as input from teh server. On +/* It INPUTSTRING is NULL get the initial token. If INPUTSTRING is not + * NULL, decode the string and use this as input from the server. On * success the final output token is stored at PROXY->OUTTOKEN and * OUTTOKLEN. IF the authentication succeeded OUTTOKLEN is zero. */ static gpg_error_t @@ -2379,7 +2379,7 @@ proxy_get_token (proxy_info_t proxy, const char *inputstring) if (inputstring) { - /* The input is expected in the token parameter but the paremter + /* The input is expected in the token parameter but the parameter * name is often forgotten. Thus we simply detect the parameter * name and skip it, assuming no other parameters are given. */ if (!strncmp (inputstring, "token=", 6)) @@ -4424,8 +4424,8 @@ same_host_p (parsed_uri_t a, parsed_uri_t b) /* Prepare a new URL for a HTTP redirect. INFO has flags controlling * the operation, STATUS_CODE is used for diagnostics, LOCATION is the - * value of the "Location" header, and R_URL reveives the new URL on - * success or NULL or error. Note that INFO->ORIG_URL is + * value of the "Location" header, and R_URL receives the new URL on + * success or NULL on error. Note that INFO->ORIG_URL is * required. */ gpg_error_t http_prepare_redirect (http_redir_info_t *info, unsigned int status_code, @@ -4596,7 +4596,7 @@ http_status2string (unsigned int status) } -/* Fucntion called on SIGHUP to flush internal variables. */ +/* Function called on SIGHUP to flush internal variables. */ void http_reinitialize (void) { diff --git a/dirmngr/ks-engine-ldap.c b/dirmngr/ks-engine-ldap.c index 688972a89..c2c57d819 100644 --- a/dirmngr/ks-engine-ldap.c +++ b/dirmngr/ks-engine-ldap.c @@ -53,7 +53,7 @@ #define SERVERINFO_PGPKEYV2 2 /* Needs "pgpKeyV2" instead of "pgpKey"*/ #define SERVERINFO_SCHEMAV2 4 /* Version 2 of the Schema. */ #define SERVERINFO_NTDS 8 /* Server is an Active Directory. */ -#define SERVERINFO_GENERIC 16 /* Connected in genric mode. */ +#define SERVERINFO_GENERIC 16 /* Connected in generic mode. */ /* The page size requested from the server. */ @@ -1257,7 +1257,7 @@ return_all_attributes (LDAP *ld, LDAPMessage *msg, estream_t *fp) } /* Always print the DN - note that by using only unbkown attributes - * it is pissible to list just the DNs with out addiional + * it is possible to list just the DNs with out additional * linefeeds. */ es_fprintf (*fp, "Dn: %s\n", mydn? mydn : "[oops DN missing]"); @@ -1307,7 +1307,7 @@ return_all_attributes (LDAP *ld, LDAPMessage *msg, estream_t *fp) len = values[idx]->bv_len; while (len && (s = memchr (val, '\n', len))) { - s++; /* We als want to print the LF. */ + s++; /* We also want to print the LF. */ if (es_fwrite (val, s - val, 1, *fp) != 1) goto fwrite_failed; len -= (s-val); @@ -2361,7 +2361,7 @@ modlist_free (LDAPMod **modlist) LDAPMod *mod = *ml; char **ptr; - /* The list of values is a NULL termianted array of pointers. + /* The list of values is a NULL terminated array of pointers. If the list is NULL, there are no values. */ if (mod->mod_values) @@ -2460,7 +2460,7 @@ uncescape (char *str) /* Given one line from an info block (`gpg --list-{keys,sigs} --with-colons KEYID'), pull it apart and fill in the modlist with the relevant (for the LDAP schema) attributes. EXTRACT_STATE - should initally be set to 0 by the caller. SCHEMAV2 is set if the + should initially be set to 0 by the caller. SCHEMAV2 is set if the server supports the version 2 schema. */ static void extract_attributes (LDAPMod ***modlist, int *extract_state, @@ -2620,7 +2620,7 @@ extract_attributes (LDAPMod ***modlist, int *extract_state, memset (&tm, 0, sizeof (tm)); - /* parse_timestamp handles both seconds fromt he epoch and + /* parse_timestamp handles both seconds from the epoch and ISO 8601 format. We also need to handle YYYY-MM-DD format (as generated by gpg1 --with-colons --list-key). Check that first and then if it fails, then try @@ -2668,7 +2668,7 @@ extract_attributes (LDAPMod ***modlist, int *extract_state, memset (&tm, 0, sizeof (tm)); - /* parse_timestamp handles both seconds fromt he epoch and + /* parse_timestamp handles both seconds from the epoch and ISO 8601 format. We also need to handle YYYY-MM-DD format (as generated by gpg1 --with-colons --list-key). Check that first and then if it fails, then try diff --git a/dirmngr/ldap-misc.c b/dirmngr/ldap-misc.c index c3a659d5c..a3aef0e62 100644 --- a/dirmngr/ldap-misc.c +++ b/dirmngr/ldap-misc.c @@ -220,7 +220,7 @@ ldap_to_gpg_err (LDAP *ld) * ^&SCOPE&(objectClasses=*) * * Give a scope and a filter. Note that R_SCOPE is only changed if a - * STRING has scope parameter. Setting this initally to -1 allows to + * STRING has scope parameter. Setting this initially to -1 allows to * detect this case. */ gpg_error_t diff --git a/dirmngr/ldap.c b/dirmngr/ldap.c index b80012d03..c1ea04979 100644 --- a/dirmngr/ldap.c +++ b/dirmngr/ldap.c @@ -256,7 +256,7 @@ url_fetch_ldap (ctrl_t ctrl, const char *url, ksba_reader_t *reader) } if (ludp->lud_scheme && !strcmp (ludp->lud_scheme, "ldaps")) - tls_mode = 2; /* LDAP-over-TLS here becuase we get it from certs. */ + tls_mode = 2; /* LDAP-over-TLS here because we get it from certs. */ else tls_mode = 0; @@ -524,7 +524,7 @@ make_one_filter (const char *pattern, char **r_result) if (*pattern) { /* We need just the BaseDN. This assumes that the Subject - * is correcly stored in the DT. This is however not always + * is correctly stored in the DT. This is however not always * the case and the actual DN is different from the * subject. In this case we won't find anything. */ if (extfilt_need_escape (pattern) @@ -606,7 +606,7 @@ make_one_filter (const char *pattern, char **r_result) /* Prepare an LDAP query to return the cACertificate attribute for DN. * All configured default servers are queried until one responds. * This function returns an error code or 0 and stored a newly - * allocated contect object at CONTEXT on success. */ + * allocated context object at CONTEXT on success. */ gpg_error_t start_cacert_fetch_ldap (ctrl_t ctrl, cert_fetch_context_t *r_context, const char *dn) @@ -778,7 +778,7 @@ start_cert_fetch_ldap (ctrl_t ctrl, cert_fetch_context_t *r_context, if (argc >= DIM (argv) - 1) { /* Too many patterns. It does not make sense to allow an - arbitrary number of patters because the length of the + arbitrary number of patterns because the length of the command line is limited anyway. */ err = gpg_error (GPG_ERR_RESOURCE_LIMIT); goto leave; diff --git a/dirmngr/ldapserver.c b/dirmngr/ldapserver.c index ed38c7101..8cd193f86 100644 --- a/dirmngr/ldapserver.c +++ b/dirmngr/ldapserver.c @@ -60,7 +60,7 @@ ldapserver_list_free (ldap_server_t servers) * Flags are: * * starttls := Use STARTTLS with a default port of 389 - * ldaptls := Tunnel LDAP trough a TLS tunnel with default port 636 + * ldaptls := Tunnel LDAP through a TLS tunnel with default port 636 * plain := Switch to plain unsecured LDAP. * (The last of these 3 flags is the effective one) * ntds := Use Active Directory authentication diff --git a/dirmngr/ocsp.c b/dirmngr/ocsp.c index ad7ed962a..7de8b10e4 100644 --- a/dirmngr/ocsp.c +++ b/dirmngr/ocsp.c @@ -31,7 +31,7 @@ #include "certcache.h" #include "ocsp.h" -/* The maximum size we allow as a response from an OCSP reponder. */ +/* The maximum size we allow as a response from an OCSP responder. */ #define MAX_RESPONSE_SIZE 65536 @@ -526,7 +526,7 @@ check_signature_core (ctrl_t ctrl, ksba_cert_t cert, gcry_sexp_t s_sig, /* Check the signature of an OCSP response. OCSP is the context, S_SIG the signature value and MD the handle of the hash we used for the response. This function automagically finds the correct public - key. If SIGNER_FPR_LIST is not NULL, the default OCSP reponder has been + key. If SIGNER_FPR_LIST is not NULL, the default OCSP responder has been used and thus the certificate is one of those identified by the fingerprints. */ static gpg_error_t @@ -651,7 +651,7 @@ check_signature (ctrl_t ctrl, or directly through the CERT object is valid by running an OCSP transaction. With FORCE_DEFAULT_RESPONDER set only the configured default responder is used. If R_REVOKED_AT or R_REASON are not - NULL and the certificat has been revoked the revocation time and + NULL and the certificate has been revoked the revocation time and the reasons are stored there. */ gpg_error_t ocsp_isvalid (ctrl_t ctrl, ksba_cert_t cert, const char *cert_fpr, @@ -723,7 +723,7 @@ ocsp_isvalid (ctrl_t ctrl, ksba_cert_t cert, const char *cert_fpr, } /* Figure out the OCSP responder to use. - 1. Try to get the reponder from the certificate. + 1. Try to get the responder from the certificate. We do only take http and https style URIs into account. 2. If this fails use the default responder, if any. */ diff --git a/dirmngr/server.c b/dirmngr/server.c index 32c85d07b..710317e5e 100644 --- a/dirmngr/server.c +++ b/dirmngr/server.c @@ -932,7 +932,7 @@ proc_wkd_get (ctrl_t ctrl, assuan_context_t ctx, char *line) err = get_dns_srv (ctrl, domain, "openpgpkey", NULL, &srvs, &srvscount); if (err) { - /* Ignore server failed becuase there are too many resolvers + /* Ignore server failed because there are too many resolvers * which do not work as expected. */ if (gpg_err_code (err) == GPG_ERR_SERVER_FAILED) err = 0; /*(srvcount is guaranteed to be 0)*/ diff --git a/dirmngr/t-ldap-parse-uri.c b/dirmngr/t-ldap-parse-uri.c index 984e1412f..e46bbee83 100644 --- a/dirmngr/t-ldap-parse-uri.c +++ b/dirmngr/t-ldap-parse-uri.c @@ -291,7 +291,7 @@ main (int argc, char **argv) } if (argc) { - fprintf (stderr, PGM ": no argumenst are expected\n"); + fprintf (stderr, PGM ": no arguments are expected\n"); exit (1); } diff --git a/dirmngr/validate.c b/dirmngr/validate.c index 02db3c270..94a468b38 100644 --- a/dirmngr/validate.c +++ b/dirmngr/validate.c @@ -42,7 +42,7 @@ enum cert_usage_modes CERT_USAGE_MODE_VRFY, /* Usable for verification. */ CERT_USAGE_MODE_DECR, /* Usable for decryption. */ CERT_USAGE_MODE_CERT, /* Usable for cert signing. */ - CERT_USAGE_MODE_OCSP, /* Usable for OCSP respone signing. */ + CERT_USAGE_MODE_OCSP, /* Usable for OCSP response signing. */ CERT_USAGE_MODE_CRL /* Usable for CRL signing. */ }; @@ -56,7 +56,7 @@ struct chain_item_s ksba_cert_t cert; /* The certificate. */ unsigned char fpr[20]; /* Fingerprint of the certificate. */ int is_self_signed; /* This certificate is self-signed. */ - int is_valid; /* The certifiate is valid except for revocations. */ + int is_valid; /* The certificate is valid except for revocations. */ }; typedef struct chain_item_s *chain_item_t; @@ -173,7 +173,7 @@ check_cert_policy (ksba_cert_t cert) if (err) return err; - /* STRING is a line delimited list of certifiate policies as stored + /* STRING is a line delimited list of certificate policies as stored in the certificate. The line itself is colon delimited where the first field is the OID of the policy and the second field either N or C for normal or critical extension */ |