diff options
author | Daniel Kahn Gillmor <[email protected]> | 2024-05-12 22:09:23 +0000 |
---|---|---|
committer | Werner Koch <[email protected]> | 2024-05-31 10:28:32 +0000 |
commit | 42b0e9558a308dbc954ee60c3d346b5cabcd2fdb (patch) | |
tree | f073776758cd706a0cadf0bd64073d1669a8d691 /g10/encrypt.c | |
parent | g13: Adjust for changed gnupg_process_spawn. (diff) | |
download | gnupg-42b0e9558a308dbc954ee60c3d346b5cabcd2fdb.tar.gz gnupg-42b0e9558a308dbc954ee60c3d346b5cabcd2fdb.zip |
indent: Fix spelling
--
These are non-substantive corrections for minor spelling mistakes
within the GnuPG codebase.
With something like this applied to the codebase, and a judiciously
tuned spellchecker integrated as part of a standard test suite, it
should be possible to keep a uniform orthography within the project.
GnuPG-bug-id: 7116
Diffstat (limited to 'g10/encrypt.c')
-rw-r--r-- | g10/encrypt.c | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/g10/encrypt.c b/g10/encrypt.c index 8ce6164ce..3fc10a7b8 100644 --- a/g10/encrypt.c +++ b/g10/encrypt.c @@ -68,7 +68,7 @@ encrypt_store (const char *filename) } -/* Create and setup a DEK structure and print approriate warnings. +/* Create and setup a DEK structure and print appropriate warnings. * PK_LIST gives the list of public keys. Always returns a DEK. The * actual session needs to be added later. */ static DEK * @@ -94,7 +94,7 @@ create_dek_with_warnings (pk_list_t pk_list) /* In case 3DES has been selected, print a warning if any key * does not have a preference for AES. This should help to - * indentify why encrypting to several recipients falls back to + * identify why encrypting to several recipients falls back to * 3DES. */ if (opt.verbose && dek->algo == CIPHER_ALGO_3DES) warn_missing_aes_from_pklist (pk_list); @@ -1128,7 +1128,7 @@ write_pubkey_enc (ctrl_t ctrl, * the structure DEK and want to encode this session key in an * integer value of n bits. pubkey_nbits gives us the number of * bits we have to use. We then encode the session key in some - * way and we get it back in the big intger value FRAME. Then + * way and we get it back in the big integer value FRAME. Then * we use FRAME, the public key PK->PKEY and the algorithm * number PK->PUBKEY_ALGO and pass it to pubkey_encrypt which * returns the encrypted value in the array ENC->DATA. This |