1
0
mirror of git://git.gnupg.org/gnupg.git synced 2024-05-31 22:18:03 +02:00

common,g10: Fix typos.

--
Signed-off-by: Justus Winter <justus@g10code.com>
This commit is contained in:
Justus Winter 2017-06-06 14:48:01 +02:00
parent be8ca88526
commit 216f0804c1
No known key found for this signature in database
GPG Key ID: DD1A52F9DA8C9020
2 changed files with 4 additions and 4 deletions

View File

@ -36,7 +36,7 @@
#include "compliance.h" #include "compliance.h"
/* Return true if ALGO with a key of KEYLENGTH is compliant to the /* Return true if ALGO with a key of KEYLENGTH is compliant to the
* give COMPLIANCE mode. If KEY is not NULL, various bits of * given COMPLIANCE mode. If KEY is not NULL, various bits of
* information will be extracted from it. If CURVENAME is not NULL, it * information will be extracted from it. If CURVENAME is not NULL, it
* is assumed to be the already computed. ALGO may be either an * is assumed to be the already computed. ALGO may be either an
* OpenPGP-style pubkey_algo_t, or a gcrypt-style enum gcry_pk_algos, * OpenPGP-style pubkey_algo_t, or a gcrypt-style enum gcry_pk_algos,
@ -139,7 +139,7 @@ gnupg_pk_is_compliant (enum gnupg_compliance_mode compliance, int algo,
} }
/* Return true if CIPHER is compliant to the give COMPLIANCE mode. */ /* Return true if CIPHER is compliant to the given COMPLIANCE mode. */
int int
gnupg_cipher_is_compliant (enum gnupg_compliance_mode compliance, cipher_algo_t cipher) gnupg_cipher_is_compliant (enum gnupg_compliance_mode compliance, cipher_algo_t cipher)
{ {
@ -166,7 +166,7 @@ gnupg_cipher_is_compliant (enum gnupg_compliance_mode compliance, cipher_algo_t
} }
/* Return true if DIGEST is compliant to the give COMPLIANCE mode. */ /* Return true if DIGEST is compliant to the given COMPLIANCE mode. */
int int
gnupg_digest_is_compliant (enum gnupg_compliance_mode compliance, digest_algo_t digest) gnupg_digest_is_compliant (enum gnupg_compliance_mode compliance, digest_algo_t digest)
{ {

View File

@ -251,7 +251,7 @@ hash_sigversion_to_magic (gcry_md_hd_t md, const PKT_signature *sig)
/* Perform the sign operation. If CACHE_NONCE is given the agent is /* Perform the sign operation. If CACHE_NONCE is given the agent is
advised to use that cached passphrase fro the key. */ advised to use that cached passphrase for the key. */
static int static int
do_sign (ctrl_t ctrl, PKT_public_key *pksk, PKT_signature *sig, do_sign (ctrl_t ctrl, PKT_public_key *pksk, PKT_signature *sig,
gcry_md_hd_t md, int mdalgo, const char *cache_nonce) gcry_md_hd_t md, int mdalgo, const char *cache_nonce)