mirror of
git://git.gnupg.org/gnupg.git
synced 2025-07-02 22:46:30 +02:00
all: fix spelling and typos
Signed-off-by: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
This commit is contained in:
parent
ef540d1af0
commit
54eb375ff1
77 changed files with 120 additions and 120 deletions
|
@ -2751,7 +2751,7 @@ data_hash (unsigned char *data, size_t data_n,
|
|||
allow the use of signature algorithms that implement the hashing
|
||||
internally (e.g. Ed25519). On success the created signature is
|
||||
stored in ssh format at R_SIG and it's size at R_SIGLEN; the caller
|
||||
must use es_free to releaase this memory. */
|
||||
must use es_free to release this memory. */
|
||||
static gpg_error_t
|
||||
data_sign (ctrl_t ctrl, ssh_key_type_spec_t *spec,
|
||||
const void *hash, size_t hashlen,
|
||||
|
|
|
@ -195,7 +195,7 @@ has_percent0A_suffix (const char *string)
|
|||
string with the passphrase, the buffer may optionally be padded
|
||||
with arbitrary characters.
|
||||
|
||||
If DESC_TEXT is not NULL it can be used as further informtion shown
|
||||
If DESC_TEXT is not NULL it can be used as further information shown
|
||||
atop of the INFO message.
|
||||
|
||||
INFO gets displayed as part of a generic string. However if the
|
||||
|
|
|
@ -851,7 +851,7 @@ parse_rereadable_options (ARGPARSE_ARGS *pargs, int reread)
|
|||
|
||||
case oLogFile:
|
||||
if (!reread)
|
||||
return 0; /* not handeld */
|
||||
return 0; /* not handled */
|
||||
if (!current_logfile || !pargs->r.ret_str
|
||||
|| strcmp (current_logfile, pargs->r.ret_str))
|
||||
{
|
||||
|
@ -1768,7 +1768,7 @@ main (int argc, char **argv )
|
|||
|
||||
/* Unless we are running with a program given on the command
|
||||
* line we can assume that the inotify things works and thus
|
||||
* we can avoid tye regular stat calls. */
|
||||
* we can avoid the regular stat calls. */
|
||||
if (!argc)
|
||||
reliable_homedir_inotify = 1;
|
||||
}
|
||||
|
@ -2108,7 +2108,7 @@ get_agent_scd_notify_event (void)
|
|||
GetCurrentProcess(), &h2,
|
||||
EVENT_MODIFY_STATE|SYNCHRONIZE, TRUE, 0))
|
||||
{
|
||||
log_error ("setting syncronize for scd notify event failed: %s\n",
|
||||
log_error ("setting synchronize for scd notify event failed: %s\n",
|
||||
w32_strerror (-1) );
|
||||
CloseHandle (h);
|
||||
}
|
||||
|
|
|
@ -40,7 +40,7 @@ struct keypair_info_s
|
|||
char hexgrip[1]; /* The keygrip (i.e. a hash over the public key
|
||||
parameters) formatted as a hex string.
|
||||
Allocated somewhat large to also act as
|
||||
memeory for the above ID field. */
|
||||
memory for the above ID field. */
|
||||
};
|
||||
typedef struct keypair_info_s *KEYPAIR_INFO;
|
||||
|
||||
|
|
|
@ -1109,7 +1109,7 @@ agent_unprotect (ctrl_t ctrl,
|
|||
if (!protect_info[infidx].algo)
|
||||
return gpg_error (GPG_ERR_UNSUPPORTED_ALGORITHM);
|
||||
|
||||
/* See wether we have a protected-at timestamp. */
|
||||
/* See whether we have a protected-at timestamp. */
|
||||
protect_list = s; /* Save for later. */
|
||||
if (protected_at)
|
||||
{
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue