mirror of
git://git.gnupg.org/gnupg.git
synced 2025-07-02 22:46:30 +02:00
all: fix spelling and typos
Signed-off-by: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
This commit is contained in:
parent
ef540d1af0
commit
54eb375ff1
77 changed files with 120 additions and 120 deletions
|
@ -19,7 +19,7 @@
|
|||
length, meaning that corresponding hash table is empty.
|
||||
|
||||
Right after toc section, data section follows without any
|
||||
alingment. It consists of series of records, each is a key length,
|
||||
alignment. It consists of series of records, each is a key length,
|
||||
value (data) length, key and value. Again, key and value length
|
||||
are 4-byte unsigned integers. Each next record follows previous
|
||||
without any special alignment.
|
||||
|
@ -52,7 +52,7 @@
|
|||
beginning of a table). When hash value in question is found in
|
||||
hash table, look to key of corresponding record, comparing it with
|
||||
key in question. If them of the same length and equals to each
|
||||
other, then record is found, overwise, repeat with next hash table
|
||||
other, then record is found, otherwise, repeat with next hash table
|
||||
slot. Note that there may be several records with the same key.
|
||||
*/
|
||||
|
||||
|
@ -245,7 +245,7 @@ cdb_find(struct cdb *cdbp, const void *key, cdbi_t klen)
|
|||
pos = cdb_unpack(htp); /* htab position */
|
||||
if (n > (cdbp->cdb_fsize >> 3) /* overflow of httodo ? */
|
||||
|| pos > cdbp->cdb_fsize /* htab start within file ? */
|
||||
|| httodo > cdbp->cdb_fsize - pos) /* entrie htab within file ? */
|
||||
|| httodo > cdbp->cdb_fsize - pos) /* htab entry within file ? */
|
||||
{
|
||||
gpg_err_set_errno (EPROTO);
|
||||
return -1;
|
||||
|
|
|
@ -1782,7 +1782,7 @@ crl_parse_insert (ctrl_t ctrl, ksba_crl_t crl,
|
|||
ksba_sexp_t keyid;
|
||||
|
||||
/* We need to look for the issuer only after having read
|
||||
all items. The issuer itselfs comes before the items
|
||||
all items. The issuer itself comes before the items
|
||||
but the optional authorityKeyIdentifier comes after the
|
||||
items. */
|
||||
err = ksba_crl_get_issuer (crl, &crlissuer);
|
||||
|
@ -1907,7 +1907,7 @@ get_crl_number (ksba_crl_t crl)
|
|||
|
||||
|
||||
/* Return the authorityKeyIdentifier or NULL if it is not available.
|
||||
The issuer name may consists of several parts - they are delimted by
|
||||
The issuer name may consists of several parts - they are delimited by
|
||||
0x01. */
|
||||
static char *
|
||||
get_auth_key_id (ksba_crl_t crl, char **serialno)
|
||||
|
|
|
@ -338,7 +338,7 @@ static int active_connections;
|
|||
* thread to run background network tasks. */
|
||||
static int network_activity_seen;
|
||||
|
||||
/* A list of filenames registred with --hkp-cacert. */
|
||||
/* A list of filenames registered with --hkp-cacert. */
|
||||
static strlist_t hkp_cacert_filenames;
|
||||
|
||||
|
||||
|
@ -411,7 +411,7 @@ my_strusage( int level )
|
|||
|
||||
/* Callback from libksba to hash a provided buffer. Our current
|
||||
implementation does only allow SHA-1 for hashing. This may be
|
||||
extended by mapping the name, testing for algorithm availibility
|
||||
extended by mapping the name, testing for algorithm availability
|
||||
and adjust the length checks accordingly. */
|
||||
static gpg_error_t
|
||||
my_ksba_hash_buffer (void *arg, const char *oid,
|
||||
|
@ -520,7 +520,7 @@ set_tor_mode (void)
|
|||
{
|
||||
if (dirmngr_use_tor ())
|
||||
{
|
||||
/* Enable Tor mode and when called again force a new curcuit
|
||||
/* Enable Tor mode and when called again force a new circuit
|
||||
* (e.g. on SIGHUP). */
|
||||
enable_dns_tormode (1);
|
||||
if (assuan_sock_set_flag (ASSUAN_INVALID_FD, "tor-mode", 1))
|
||||
|
@ -752,7 +752,7 @@ parse_rereadable_options (ARGPARSE_ARGS *pargs, int reread)
|
|||
}
|
||||
|
||||
|
||||
/* This fucntion is called after option parsing to adjust some values
|
||||
/* This function is called after option parsing to adjust some values
|
||||
* and call option setup functions. */
|
||||
static void
|
||||
post_option_parsing (void)
|
||||
|
|
|
@ -417,9 +417,9 @@ set_timeout (my_opt_t myopt)
|
|||
sec_attr.nLength = sizeof sec_attr;
|
||||
sec_attr.bInheritHandle = FALSE;
|
||||
|
||||
/* Create a manual resetable timer. */
|
||||
/* Create a manual resettable timer. */
|
||||
timer = CreateWaitableTimer (NULL, TRUE, NULL);
|
||||
/* Intially set the timer. */
|
||||
/* Initially set the timer. */
|
||||
SetWaitableTimer (timer, &due_time, 0, NULL, NULL, 0);
|
||||
|
||||
if (CreateThread (&sec_attr, 0, alarm_thread, timer, 0, &tid))
|
||||
|
|
|
@ -151,7 +151,7 @@ static char tor_socks_password[20];
|
|||
|
||||
|
||||
#ifdef USE_LIBDNS
|
||||
/* Libdns gobal data. */
|
||||
/* Libdns global data. */
|
||||
struct libdns_s
|
||||
{
|
||||
struct dns_resolv_conf *resolv_conf;
|
||||
|
|
|
@ -1832,7 +1832,7 @@ static void dns_p_free(struct dns_packet *P) {
|
|||
} /* dns_p_free() */
|
||||
|
||||
|
||||
/* convience routine to free any existing packet before storing new packet */
|
||||
/* convenience routine to free any existing packet before storing new packet */
|
||||
static struct dns_packet *dns_p_setptr(struct dns_packet **dst, struct dns_packet *src) {
|
||||
dns_p_free(*dst);
|
||||
|
||||
|
@ -7634,7 +7634,7 @@ retry:
|
|||
goto udp_connect_retry;
|
||||
} else if (error == ECONNREFUSED)
|
||||
/* Error for previous socket operation may
|
||||
be reserverd asynchronously. */
|
||||
be reserverd(?) asynchronously. */
|
||||
goto udp_connect_retry;
|
||||
|
||||
if (error)
|
||||
|
|
|
@ -55,7 +55,7 @@ gnupg_http_tls_verify_cb (void *opaque,
|
|||
log_assert (ctrl && ctrl->magic == SERVER_CONTROL_MAGIC);
|
||||
log_assert (!ntbtls_check_context (tls));
|
||||
|
||||
/* Get the peer's certs fron ntbtls. */
|
||||
/* Get the peer's certs from ntbtls. */
|
||||
for (idx = 0;
|
||||
(cert = ntbtls_x509_get_peer_cert (tls, idx)); idx++)
|
||||
{
|
||||
|
|
|
@ -88,7 +88,7 @@ ks_action_help (ctrl_t ctrl, const char *url)
|
|||
return err;
|
||||
}
|
||||
|
||||
/* Call all engines to give them a chance to print a help sting. */
|
||||
/* Call all engines to give them a chance to print a help string. */
|
||||
err = ks_hkp_help (ctrl, parsed_uri);
|
||||
if (!err)
|
||||
err = ks_http_help (ctrl, parsed_uri);
|
||||
|
|
|
@ -1381,7 +1381,7 @@ handle_send_request_error (ctrl_t ctrl, gpg_error_t err, const char *request,
|
|||
int retry = 0;
|
||||
|
||||
/* Fixme: Should we disable all hosts of a protocol family if a
|
||||
* request for an address of that familiy returned ENETDOWN? */
|
||||
* request for an address of that family returned ENETDOWN? */
|
||||
|
||||
switch (gpg_err_code (err))
|
||||
{
|
||||
|
|
|
@ -388,7 +388,7 @@ parse_one_pattern (const char *pattern)
|
|||
}
|
||||
|
||||
/* Take the string STRING and escape it according to the URL rules.
|
||||
Retun a newly allocated string. */
|
||||
Return a newly allocated string. */
|
||||
static char *
|
||||
escape4url (const char *string)
|
||||
{
|
||||
|
|
|
@ -637,7 +637,7 @@ armor_data (char **r_string, const void *data, size_t datalen)
|
|||
}
|
||||
|
||||
|
||||
/* Copy all data from IN to OUT. OUT may be NULL to use this fucntion
|
||||
/* Copy all data from IN to OUT. OUT may be NULL to use this function
|
||||
* as a dummy reader. */
|
||||
gpg_error_t
|
||||
copy_stream (estream_t in, estream_t out)
|
||||
|
|
|
@ -343,7 +343,7 @@ validate_responder_cert (ctrl_t ctrl, ksba_cert_t cert,
|
|||
|
||||
Note, that in theory we could simply ask the client via an
|
||||
inquire to validate a certificate but this might involve
|
||||
calling DirMngr again recursivly - we can't do that as of now
|
||||
calling DirMngr again recursively - we can't do that as of now
|
||||
(neither DirMngr nor gpgsm have the ability for concurrent
|
||||
access to DirMngr. */
|
||||
|
||||
|
@ -391,7 +391,7 @@ check_signature_core (ctrl_t ctrl, ksba_cert_t cert, gcry_sexp_t s_sig,
|
|||
}
|
||||
|
||||
|
||||
/* Check the signature of an OCSP repsonse. OCSP is the context,
|
||||
/* Check the signature of an OCSP response. OCSP is the context,
|
||||
S_SIG the signature value and MD the handle of the hash we used for
|
||||
the response. This function automagically finds the correct public
|
||||
key. If SIGNER_FPR_LIST is not NULL, the default OCSP reponder has been
|
||||
|
@ -788,7 +788,7 @@ ocsp_isvalid (ctrl_t ctrl, ksba_cert_t cert, const char *cert_fpr,
|
|||
err = gpg_error (GPG_ERR_TIME_CONFLICT);
|
||||
}
|
||||
|
||||
/* Check that we are not beyound NEXT_UPDATE (plus some extra time). */
|
||||
/* Check that we are not beyond NEXT_UPDATE (plus some extra time). */
|
||||
if (*next_update)
|
||||
{
|
||||
gnupg_copy_time (tmp_time, next_update);
|
||||
|
|
|
@ -137,7 +137,7 @@ my_http_tls_verify_cb (void *opaque,
|
|||
(void)session;
|
||||
(void)http_flags;
|
||||
|
||||
/* Get the peer's certs fron ntbtls. */
|
||||
/* Get the peer's certs from ntbtls. */
|
||||
for (idx = 0;
|
||||
(cert = ntbtls_x509_get_peer_cert (tls_context, idx)); idx++)
|
||||
{
|
||||
|
|
|
@ -116,7 +116,7 @@ workqueue_add_task (wqtask_t func, const char *args, unsigned int session_id,
|
|||
|
||||
|
||||
/* Run the task described by ITEM. ITEM must have been detached from
|
||||
* the workqueue; its ownership is transferred to this fucntion. */
|
||||
* the workqueue; its ownership is transferred to this function. */
|
||||
static void
|
||||
run_a_task (ctrl_t ctrl, wqitem_t item)
|
||||
{
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue