From 663e5ed0737465e79a9c877f18d93bddfd05a7a4 Mon Sep 17 00:00:00 2001 From: Justus Winter Date: Mon, 29 May 2017 15:23:36 +0200 Subject: [PATCH] gpg: Fix typos. -- Signed-off-by: Justus Winter --- g10/cpr.c | 2 +- g10/mainproc.c | 4 ++-- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/g10/cpr.c b/g10/cpr.c index 339107184..154872013 100644 --- a/g10/cpr.c +++ b/g10/cpr.c @@ -73,7 +73,7 @@ status_currently_allowed (int no) return 1; /* Yes. */ /* We allow some statis anyway, so that import statistics are - correct and to avoid problems if the retriebval subsystem will + correct and to avoid problems if the retrieval subsystem will prompt the user. */ switch (no) { diff --git a/g10/mainproc.c b/g10/mainproc.c index 950f214b9..9500081d5 100644 --- a/g10/mainproc.c +++ b/g10/mainproc.c @@ -845,7 +845,7 @@ proc_compressed (CTX c, PACKET *pkt) /* * Check the signature. If R_PK is not NULL a copy of the public key - * used to verify the signature will be stored tehre, or NULL if not + * used to verify the signature will be stored there, or NULL if not * found. Returns: 0 = valid signature or an error code */ static int @@ -1925,7 +1925,7 @@ check_sig_and_print (CTX c, kbnode_t node) statno = STATUS_GOODSIG; /* FIXME: We should have the public key in PK and thus the - * keyboock has already been fetched. Thus we could use the + * keyblock has already been fetched. Thus we could use the * fingerprint or PK itself to lookup the entire keyblock. That * would best be done with a cache. */ keyblock = get_pubkeyblock (c->ctrl, sig->keyid);