mirror of
git://git.gnupg.org/gnupg.git
synced 2025-07-02 22:46:30 +02:00
indent: Fix spelling
-- These are non-substantive corrections for minor spelling mistakes within the GnuPG codebase. With something like this applied to the codebase, and a judiciously tuned spellchecker integrated as part of a standard test suite, it should be possible to keep a uniform orthography within the project. GnuPG-bug-id: 7116
This commit is contained in:
parent
253a701ed7
commit
42b0e9558a
136 changed files with 233 additions and 233 deletions
|
@ -55,7 +55,7 @@ Noteworthy changes in version 1.0.1 (2007-08-16)
|
|||
Noteworthy changes in version 1.0.0 (2006-11-29)
|
||||
------------------------------------------------
|
||||
|
||||
* Bumbed the version number.
|
||||
* Bumped the version number.
|
||||
|
||||
* Removed included gettext. We now require the system to provide a
|
||||
suitable installation.
|
||||
|
@ -174,7 +174,7 @@ Noteworthy changes in version 0.5.4 (2004-04-29)
|
|||
------------------------------------------------
|
||||
|
||||
* New commands --ocsp-responder and --ocsp-signer to define a default
|
||||
OCSP reponder if a certificate does not contain an assigned OCSP
|
||||
OCSP responder if a certificate does not contain an assigned OCSP
|
||||
responder.
|
||||
|
||||
|
||||
|
|
|
@ -225,7 +225,7 @@ cert_compute_fpr (ksba_cert_t cert, unsigned char *digest)
|
|||
|
||||
|
||||
|
||||
/* Cleanup one slot. This releases all resourses but keeps the actual
|
||||
/* Cleanup one slot. This releases all resources but keeps the actual
|
||||
slot in the cache marked for reuse. */
|
||||
static void
|
||||
clean_cache_slot (cert_item_t ci)
|
||||
|
|
|
@ -1104,12 +1104,12 @@ main (int argc, char **argv)
|
|||
|
||||
socket_name = dirmngr_socket_name ();
|
||||
|
||||
/* The configuraton directories for use by gpgrt_argparser. */
|
||||
/* The configuration directories for use by gpgrt_argparser. */
|
||||
gpgrt_set_confdir (GPGRT_CONFDIR_SYS, gnupg_sysconfdir ());
|
||||
gpgrt_set_confdir (GPGRT_CONFDIR_USER, gnupg_homedir ());
|
||||
|
||||
/* We are re-using the struct, thus the reset flag. We OR the
|
||||
* flags so that the internal intialized flag won't be cleared. */
|
||||
* flags so that the internal initialized flag won't be cleared. */
|
||||
argc = orig_argc;
|
||||
argv = orig_argv;
|
||||
pargs.argc = &argc;
|
||||
|
@ -1748,7 +1748,7 @@ dirmngr_deinit_default_ctrl (ctrl_t ctrl)
|
|||
|
||||
The format of such a file is line oriented where empty lines and
|
||||
lines starting with a hash mark are ignored. All other lines are
|
||||
assumed to be colon seprated with these fields:
|
||||
assumed to be colon separated with these fields:
|
||||
|
||||
1. field: Hostname
|
||||
2. field: Portnumber
|
||||
|
|
|
@ -241,7 +241,7 @@ struct server_control_s
|
|||
int audit_events; /* Send audit events to client. */
|
||||
char *http_proxy; /* The used http_proxy or NULL. */
|
||||
|
||||
nvc_t rootdse; /* Container wit the rootDSE properties. */
|
||||
nvc_t rootdse; /* Container with the rootDSE properties. */
|
||||
|
||||
unsigned int timeout; /* Timeout for connect calls in ms. */
|
||||
|
||||
|
|
|
@ -9761,7 +9761,7 @@ struct dns_addrinfo *dns_ai_open(const char *host, const char *serv, enum dns_ty
|
|||
/*
|
||||
* FIXME: If an explicit A or AAAA record type conflicts with
|
||||
* .ai_family or with resconf.family (i.e. AAAA specified but
|
||||
* AF_INET6 not in interection of .ai_family and resconf.family),
|
||||
* AF_INET6 not in intersection of .ai_family and resconf.family),
|
||||
* then what?
|
||||
*/
|
||||
switch (ai->qtype) {
|
||||
|
|
|
@ -78,7 +78,7 @@ gnupg_http_tls_verify_cb (void *opaque,
|
|||
validate_flags = VALIDATE_FLAG_TLS;
|
||||
|
||||
/* If we are using the standard hkps:// pool use the dedicated root
|
||||
* certificate. Note that this differes from the GnuTLS
|
||||
* certificate. Note that this differs from the GnuTLS
|
||||
* implementation which uses this special certificate only if no
|
||||
* other certificates are configured. */
|
||||
/* Disabled for 2.3.2 to due problems with the standard hkps pool. */
|
||||
|
|
|
@ -295,7 +295,7 @@ struct http_session_s
|
|||
} verify;
|
||||
char *servername; /* Malloced server name. */
|
||||
|
||||
/* A callback function to log details of TLS certifciates. */
|
||||
/* A callback function to log details of TLS certificates. */
|
||||
void (*cert_log_cb) (http_session_t, gpg_error_t, const char *,
|
||||
const void **, size_t *);
|
||||
|
||||
|
@ -2018,7 +2018,7 @@ w32_get_proxy (const char *url)
|
|||
* If OVERRIDE_PROXY is not NULL and not empty, this proxy will be
|
||||
* used instead of any configured or dynamically determined proxy. If
|
||||
* the function runs into an error an error code is returned and NULL
|
||||
* is stored at R_PROXY. If the fucntion was successful and a proxy
|
||||
* is stored at R_PROXY. If the function was successful and a proxy
|
||||
* is to be used, information on the procy is stored at R_PROXY; if no
|
||||
* proxy shall be used R_PROXY is set to NULL. Caller should always
|
||||
* use release_proxy_info on the value stored at R_PROXY. */
|
||||
|
@ -2358,8 +2358,8 @@ run_gnutls_handshake (http_t hd, const char *server)
|
|||
#endif /*HTTP_USE_GNUTLS*/
|
||||
|
||||
|
||||
/* It INPUTSTRING is NULL get the intial token. If INPUTSTRING is not
|
||||
* NULL, decode the string and use this as input from teh server. On
|
||||
/* It INPUTSTRING is NULL get the initial token. If INPUTSTRING is not
|
||||
* NULL, decode the string and use this as input from the server. On
|
||||
* success the final output token is stored at PROXY->OUTTOKEN and
|
||||
* OUTTOKLEN. IF the authentication succeeded OUTTOKLEN is zero. */
|
||||
static gpg_error_t
|
||||
|
@ -2379,7 +2379,7 @@ proxy_get_token (proxy_info_t proxy, const char *inputstring)
|
|||
|
||||
if (inputstring)
|
||||
{
|
||||
/* The input is expected in the token parameter but the paremter
|
||||
/* The input is expected in the token parameter but the parameter
|
||||
* name is often forgotten. Thus we simply detect the parameter
|
||||
* name and skip it, assuming no other parameters are given. */
|
||||
if (!strncmp (inputstring, "token=", 6))
|
||||
|
@ -4424,8 +4424,8 @@ same_host_p (parsed_uri_t a, parsed_uri_t b)
|
|||
|
||||
/* Prepare a new URL for a HTTP redirect. INFO has flags controlling
|
||||
* the operation, STATUS_CODE is used for diagnostics, LOCATION is the
|
||||
* value of the "Location" header, and R_URL reveives the new URL on
|
||||
* success or NULL or error. Note that INFO->ORIG_URL is
|
||||
* value of the "Location" header, and R_URL receives the new URL on
|
||||
* success or NULL on error. Note that INFO->ORIG_URL is
|
||||
* required. */
|
||||
gpg_error_t
|
||||
http_prepare_redirect (http_redir_info_t *info, unsigned int status_code,
|
||||
|
@ -4596,7 +4596,7 @@ http_status2string (unsigned int status)
|
|||
}
|
||||
|
||||
|
||||
/* Fucntion called on SIGHUP to flush internal variables. */
|
||||
/* Function called on SIGHUP to flush internal variables. */
|
||||
void
|
||||
http_reinitialize (void)
|
||||
{
|
||||
|
|
|
@ -53,7 +53,7 @@
|
|||
#define SERVERINFO_PGPKEYV2 2 /* Needs "pgpKeyV2" instead of "pgpKey"*/
|
||||
#define SERVERINFO_SCHEMAV2 4 /* Version 2 of the Schema. */
|
||||
#define SERVERINFO_NTDS 8 /* Server is an Active Directory. */
|
||||
#define SERVERINFO_GENERIC 16 /* Connected in genric mode. */
|
||||
#define SERVERINFO_GENERIC 16 /* Connected in generic mode. */
|
||||
|
||||
|
||||
/* The page size requested from the server. */
|
||||
|
@ -1257,7 +1257,7 @@ return_all_attributes (LDAP *ld, LDAPMessage *msg, estream_t *fp)
|
|||
}
|
||||
|
||||
/* Always print the DN - note that by using only unbkown attributes
|
||||
* it is pissible to list just the DNs with out addiional
|
||||
* it is possible to list just the DNs with out additional
|
||||
* linefeeds. */
|
||||
es_fprintf (*fp, "Dn: %s\n", mydn? mydn : "[oops DN missing]");
|
||||
|
||||
|
@ -1307,7 +1307,7 @@ return_all_attributes (LDAP *ld, LDAPMessage *msg, estream_t *fp)
|
|||
len = values[idx]->bv_len;
|
||||
while (len && (s = memchr (val, '\n', len)))
|
||||
{
|
||||
s++; /* We als want to print the LF. */
|
||||
s++; /* We also want to print the LF. */
|
||||
if (es_fwrite (val, s - val, 1, *fp) != 1)
|
||||
goto fwrite_failed;
|
||||
len -= (s-val);
|
||||
|
@ -2361,7 +2361,7 @@ modlist_free (LDAPMod **modlist)
|
|||
LDAPMod *mod = *ml;
|
||||
char **ptr;
|
||||
|
||||
/* The list of values is a NULL termianted array of pointers.
|
||||
/* The list of values is a NULL terminated array of pointers.
|
||||
If the list is NULL, there are no values. */
|
||||
|
||||
if (mod->mod_values)
|
||||
|
@ -2460,7 +2460,7 @@ uncescape (char *str)
|
|||
/* Given one line from an info block (`gpg --list-{keys,sigs}
|
||||
--with-colons KEYID'), pull it apart and fill in the modlist with
|
||||
the relevant (for the LDAP schema) attributes. EXTRACT_STATE
|
||||
should initally be set to 0 by the caller. SCHEMAV2 is set if the
|
||||
should initially be set to 0 by the caller. SCHEMAV2 is set if the
|
||||
server supports the version 2 schema. */
|
||||
static void
|
||||
extract_attributes (LDAPMod ***modlist, int *extract_state,
|
||||
|
@ -2620,7 +2620,7 @@ extract_attributes (LDAPMod ***modlist, int *extract_state,
|
|||
|
||||
memset (&tm, 0, sizeof (tm));
|
||||
|
||||
/* parse_timestamp handles both seconds fromt he epoch and
|
||||
/* parse_timestamp handles both seconds from the epoch and
|
||||
ISO 8601 format. We also need to handle YYYY-MM-DD
|
||||
format (as generated by gpg1 --with-colons --list-key).
|
||||
Check that first and then if it fails, then try
|
||||
|
@ -2668,7 +2668,7 @@ extract_attributes (LDAPMod ***modlist, int *extract_state,
|
|||
|
||||
memset (&tm, 0, sizeof (tm));
|
||||
|
||||
/* parse_timestamp handles both seconds fromt he epoch and
|
||||
/* parse_timestamp handles both seconds from the epoch and
|
||||
ISO 8601 format. We also need to handle YYYY-MM-DD
|
||||
format (as generated by gpg1 --with-colons --list-key).
|
||||
Check that first and then if it fails, then try
|
||||
|
|
|
@ -220,7 +220,7 @@ ldap_to_gpg_err (LDAP *ld)
|
|||
* ^&SCOPE&(objectClasses=*)
|
||||
*
|
||||
* Give a scope and a filter. Note that R_SCOPE is only changed if a
|
||||
* STRING has scope parameter. Setting this initally to -1 allows to
|
||||
* STRING has scope parameter. Setting this initially to -1 allows to
|
||||
* detect this case.
|
||||
*/
|
||||
gpg_error_t
|
||||
|
|
|
@ -256,7 +256,7 @@ url_fetch_ldap (ctrl_t ctrl, const char *url, ksba_reader_t *reader)
|
|||
}
|
||||
|
||||
if (ludp->lud_scheme && !strcmp (ludp->lud_scheme, "ldaps"))
|
||||
tls_mode = 2; /* LDAP-over-TLS here becuase we get it from certs. */
|
||||
tls_mode = 2; /* LDAP-over-TLS here because we get it from certs. */
|
||||
else
|
||||
tls_mode = 0;
|
||||
|
||||
|
@ -524,7 +524,7 @@ make_one_filter (const char *pattern, char **r_result)
|
|||
if (*pattern)
|
||||
{
|
||||
/* We need just the BaseDN. This assumes that the Subject
|
||||
* is correcly stored in the DT. This is however not always
|
||||
* is correctly stored in the DT. This is however not always
|
||||
* the case and the actual DN is different from the
|
||||
* subject. In this case we won't find anything. */
|
||||
if (extfilt_need_escape (pattern)
|
||||
|
@ -606,7 +606,7 @@ make_one_filter (const char *pattern, char **r_result)
|
|||
/* Prepare an LDAP query to return the cACertificate attribute for DN.
|
||||
* All configured default servers are queried until one responds.
|
||||
* This function returns an error code or 0 and stored a newly
|
||||
* allocated contect object at CONTEXT on success. */
|
||||
* allocated context object at CONTEXT on success. */
|
||||
gpg_error_t
|
||||
start_cacert_fetch_ldap (ctrl_t ctrl, cert_fetch_context_t *r_context,
|
||||
const char *dn)
|
||||
|
@ -778,7 +778,7 @@ start_cert_fetch_ldap (ctrl_t ctrl, cert_fetch_context_t *r_context,
|
|||
if (argc >= DIM (argv) - 1)
|
||||
{
|
||||
/* Too many patterns. It does not make sense to allow an
|
||||
arbitrary number of patters because the length of the
|
||||
arbitrary number of patterns because the length of the
|
||||
command line is limited anyway. */
|
||||
err = gpg_error (GPG_ERR_RESOURCE_LIMIT);
|
||||
goto leave;
|
||||
|
|
|
@ -60,7 +60,7 @@ ldapserver_list_free (ldap_server_t servers)
|
|||
* Flags are:
|
||||
*
|
||||
* starttls := Use STARTTLS with a default port of 389
|
||||
* ldaptls := Tunnel LDAP trough a TLS tunnel with default port 636
|
||||
* ldaptls := Tunnel LDAP through a TLS tunnel with default port 636
|
||||
* plain := Switch to plain unsecured LDAP.
|
||||
* (The last of these 3 flags is the effective one)
|
||||
* ntds := Use Active Directory authentication
|
||||
|
|
|
@ -31,7 +31,7 @@
|
|||
#include "certcache.h"
|
||||
#include "ocsp.h"
|
||||
|
||||
/* The maximum size we allow as a response from an OCSP reponder. */
|
||||
/* The maximum size we allow as a response from an OCSP responder. */
|
||||
#define MAX_RESPONSE_SIZE 65536
|
||||
|
||||
|
||||
|
@ -526,7 +526,7 @@ check_signature_core (ctrl_t ctrl, ksba_cert_t cert, gcry_sexp_t s_sig,
|
|||
/* Check the signature of an OCSP response. OCSP is the context,
|
||||
S_SIG the signature value and MD the handle of the hash we used for
|
||||
the response. This function automagically finds the correct public
|
||||
key. If SIGNER_FPR_LIST is not NULL, the default OCSP reponder has been
|
||||
key. If SIGNER_FPR_LIST is not NULL, the default OCSP responder has been
|
||||
used and thus the certificate is one of those identified by
|
||||
the fingerprints. */
|
||||
static gpg_error_t
|
||||
|
@ -651,7 +651,7 @@ check_signature (ctrl_t ctrl,
|
|||
or directly through the CERT object is valid by running an OCSP
|
||||
transaction. With FORCE_DEFAULT_RESPONDER set only the configured
|
||||
default responder is used. If R_REVOKED_AT or R_REASON are not
|
||||
NULL and the certificat has been revoked the revocation time and
|
||||
NULL and the certificate has been revoked the revocation time and
|
||||
the reasons are stored there. */
|
||||
gpg_error_t
|
||||
ocsp_isvalid (ctrl_t ctrl, ksba_cert_t cert, const char *cert_fpr,
|
||||
|
@ -723,7 +723,7 @@ ocsp_isvalid (ctrl_t ctrl, ksba_cert_t cert, const char *cert_fpr,
|
|||
}
|
||||
|
||||
/* Figure out the OCSP responder to use.
|
||||
1. Try to get the reponder from the certificate.
|
||||
1. Try to get the responder from the certificate.
|
||||
We do only take http and https style URIs into account.
|
||||
2. If this fails use the default responder, if any.
|
||||
*/
|
||||
|
|
|
@ -932,7 +932,7 @@ proc_wkd_get (ctrl_t ctrl, assuan_context_t ctx, char *line)
|
|||
err = get_dns_srv (ctrl, domain, "openpgpkey", NULL, &srvs, &srvscount);
|
||||
if (err)
|
||||
{
|
||||
/* Ignore server failed becuase there are too many resolvers
|
||||
/* Ignore server failed because there are too many resolvers
|
||||
* which do not work as expected. */
|
||||
if (gpg_err_code (err) == GPG_ERR_SERVER_FAILED)
|
||||
err = 0; /*(srvcount is guaranteed to be 0)*/
|
||||
|
|
|
@ -291,7 +291,7 @@ main (int argc, char **argv)
|
|||
}
|
||||
if (argc)
|
||||
{
|
||||
fprintf (stderr, PGM ": no argumenst are expected\n");
|
||||
fprintf (stderr, PGM ": no arguments are expected\n");
|
||||
exit (1);
|
||||
}
|
||||
|
||||
|
|
|
@ -42,7 +42,7 @@ enum cert_usage_modes
|
|||
CERT_USAGE_MODE_VRFY, /* Usable for verification. */
|
||||
CERT_USAGE_MODE_DECR, /* Usable for decryption. */
|
||||
CERT_USAGE_MODE_CERT, /* Usable for cert signing. */
|
||||
CERT_USAGE_MODE_OCSP, /* Usable for OCSP respone signing. */
|
||||
CERT_USAGE_MODE_OCSP, /* Usable for OCSP response signing. */
|
||||
CERT_USAGE_MODE_CRL /* Usable for CRL signing. */
|
||||
};
|
||||
|
||||
|
@ -56,7 +56,7 @@ struct chain_item_s
|
|||
ksba_cert_t cert; /* The certificate. */
|
||||
unsigned char fpr[20]; /* Fingerprint of the certificate. */
|
||||
int is_self_signed; /* This certificate is self-signed. */
|
||||
int is_valid; /* The certifiate is valid except for revocations. */
|
||||
int is_valid; /* The certificate is valid except for revocations. */
|
||||
};
|
||||
typedef struct chain_item_s *chain_item_t;
|
||||
|
||||
|
@ -173,7 +173,7 @@ check_cert_policy (ksba_cert_t cert)
|
|||
if (err)
|
||||
return err;
|
||||
|
||||
/* STRING is a line delimited list of certifiate policies as stored
|
||||
/* STRING is a line delimited list of certificate policies as stored
|
||||
in the certificate. The line itself is colon delimited where the
|
||||
first field is the OID of the policy and the second field either
|
||||
N or C for normal or critical extension */
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue