mirror of
git://git.gnupg.org/gnupg.git
synced 2025-07-03 22:56:33 +02:00
all: fix spelling and typos
Signed-off-by: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
This commit is contained in:
parent
ef540d1af0
commit
54eb375ff1
77 changed files with 120 additions and 120 deletions
|
@ -474,7 +474,7 @@ isvalid_status_cb (void *opaque, const char *line)
|
|||
{
|
||||
parm->seen++;
|
||||
if (!*s || !unhexify_fpr (s, parm->fpr))
|
||||
parm->seen++; /* Bumb it to indicate an error. */
|
||||
parm->seen++; /* Bump it to indicate an error. */
|
||||
}
|
||||
return 0;
|
||||
}
|
||||
|
|
|
@ -669,7 +669,7 @@ find_up (ctrl_t ctrl, KEYDB_HANDLE kh,
|
|||
log_debug (" found via authid and sn+issuer\n");
|
||||
|
||||
/* In case of an error, try to get the certificate from the
|
||||
dirmngr. That is done by trying to put that certifcate
|
||||
dirmngr. That is done by trying to put that certificate
|
||||
into the ephemeral DB and let the code below do the
|
||||
actual retrieve. Thus there is no error checking.
|
||||
Skipped in find_next mode as usual. */
|
||||
|
@ -908,7 +908,7 @@ is_root_cert (ksba_cert_t cert, const char *issuerdn, const char *subjectdn)
|
|||
{
|
||||
if (gpg_err_code (err) == GPG_ERR_NO_DATA)
|
||||
return 1; /* Yes. Without a authorityKeyIdentifier this needs
|
||||
to be the Root certifcate (our trust anchor). */
|
||||
to be the Root certificate (our trust anchor). */
|
||||
log_error ("error getting authorityKeyIdentifier: %s\n",
|
||||
gpg_strerror (err));
|
||||
return 0; /* Well, it is broken anyway. Return No. */
|
||||
|
@ -1103,7 +1103,7 @@ check_validity_period (ksba_isotime_t current_time,
|
|||
}
|
||||
|
||||
/* This is a variant of check_validity_period used with the chain
|
||||
model. The dextra contraint here is that notBefore and notAfter
|
||||
model. The extra constraint here is that notBefore and notAfter
|
||||
must exists and if the additional argument CHECK_TIME is given this
|
||||
time is used to check the validity period of SUBJECT_CERT. */
|
||||
static gpg_error_t
|
||||
|
@ -1553,7 +1553,7 @@ do_validate_chain (ctrl_t ctrl, ksba_cert_t cert, ksba_isotime_t checktime_arg,
|
|||
if (rc)
|
||||
goto leave;
|
||||
|
||||
break; /* Okay: a self-signed certicate is an end-point. */
|
||||
break; /* Okay: a self-signed certificate is an end-point. */
|
||||
} /* End is_root. */
|
||||
|
||||
|
||||
|
|
|
@ -395,7 +395,7 @@ gpgsm_add_to_certlist (ctrl_t ctrl, const char *name, int secret,
|
|||
|
||||
Further we ignore them if they are due to an
|
||||
identical certificate (which may happen if a
|
||||
certificate is accidential duplicated in the
|
||||
certificate is accidentally duplicated in the
|
||||
keybox). */
|
||||
if (!keydb_get_cert (kh, &cert2))
|
||||
{
|
||||
|
@ -533,7 +533,7 @@ gpgsm_find_cert (ctrl_t ctrl,
|
|||
}
|
||||
|
||||
/* If we don't have the KEYID filter we need to check for
|
||||
ambiguous search results. Note, that it is somehwat
|
||||
ambiguous search results. Note, that it is somewhat
|
||||
reasonable to assume that a specification of a KEYID
|
||||
won't lead to ambiguous names. */
|
||||
if (!rc && !keyid)
|
||||
|
|
|
@ -86,7 +86,7 @@ store_mb_lines (membuf_t *mb, membuf_t *lines)
|
|||
}
|
||||
|
||||
|
||||
/* Chech whether we have a key for the key with HEXGRIP. Returns NULL
|
||||
/* Check whether we have a key for the key with HEXGRIP. Returns NULL
|
||||
if not or a string describing the type of the key (RSA, ELG, DSA,
|
||||
etc..). */
|
||||
static const char *
|
||||
|
|
|
@ -1571,7 +1571,7 @@ main ( int argc, char **argv)
|
|||
|
||||
set_debug ();
|
||||
|
||||
/* Although we always use gpgsm_exit, we better install a regualr
|
||||
/* Although we always use gpgsm_exit, we better install a regular
|
||||
exit handler so that at least the secure memory gets wiped
|
||||
out. */
|
||||
if (atexit (emergency_cleanup))
|
||||
|
|
|
@ -106,7 +106,7 @@ try_make_homedir (const char *fname)
|
|||
|
||||
|
||||
/* Handle the creation of a keybox if it does not yet exist. Take
|
||||
into acount that other processes might have the keybox already
|
||||
into account that other processes might have the keybox already
|
||||
locked. This lock check does not work if the directory itself is
|
||||
not yet available. If R_CREATED is not NULL it will be set to true
|
||||
if the function created a new keybox. */
|
||||
|
|
|
@ -853,7 +853,7 @@ parse_bag_encrypted_data (const unsigned char *buffer, size_t length,
|
|||
if (ti.class == ASNCONTEXT && ti.tag == 0 && ti.is_constructed && ti.ndef)
|
||||
{
|
||||
/* Mozilla exported certs now come with single byte chunks of
|
||||
octect strings. (Mozilla Firefox 1.0.4). Arghh. */
|
||||
octet strings. (Mozilla Firefox 1.0.4). Arghh. */
|
||||
where = "cram-rc2or3des-ciphertext";
|
||||
cram_buffer = cram_octet_string ( p, &n, &consumed);
|
||||
if (!cram_buffer)
|
||||
|
@ -1210,7 +1210,7 @@ parse_bag_data (const unsigned char *buffer, size_t length, int startoffset,
|
|||
if (ti.is_constructed && ti.ndef)
|
||||
{
|
||||
/* Mozilla exported certs now come with single byte chunks of
|
||||
octect strings. (Mozilla Firefox 1.0.4). Arghh. */
|
||||
octet strings. (Mozilla Firefox 1.0.4). Arghh. */
|
||||
where = "cram-data.outersegs";
|
||||
cram_buffer = cram_octet_string ( p, &n, &consumed);
|
||||
if (!cram_buffer)
|
||||
|
@ -1550,7 +1550,7 @@ p12_parse (const unsigned char *buffer, size_t length, const char *pw,
|
|||
if (ti.is_constructed && ti.ndef)
|
||||
{
|
||||
/* Mozilla exported certs now come with single byte chunks of
|
||||
octect strings. (Mozilla Firefox 1.0.4). Arghh. */
|
||||
octet strings. (Mozilla Firefox 1.0.4). Arghh. */
|
||||
where = "cram-bags";
|
||||
cram_buffer = cram_octet_string ( p, &n, NULL);
|
||||
if (!cram_buffer)
|
||||
|
|
|
@ -140,7 +140,7 @@ read_list (char *key, char *country, int *lnr)
|
|||
Returns: 0 if the certificate is included. GPG_ERR_NOT_FOUND if it
|
||||
is not in the list or any other error (e.g. if no list of
|
||||
qualified signatures is available. If COUNTRY has not been passed
|
||||
as NULL a string witha maximum length of 2 will be copied into it;
|
||||
as NULL a string with a maximum length of 2 will be copied into it;
|
||||
thus the caller needs to provide a buffer of length 3. */
|
||||
gpg_error_t
|
||||
gpgsm_is_in_qualified_list (ctrl_t ctrl, ksba_cert_t cert, char *country)
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue