mirror of
git://git.gnupg.org/gnupg.git
synced 2025-07-02 22:46:30 +02:00
Fix typos found using codespell.
* agent/cache.c: Fix typos. * agent/call-pinentry.c: Likewise. * agent/call-scd.c: Likewise. * agent/command-ssh.c: Likewise. * agent/command.c: Likewise. * agent/divert-scd.c: Likewise. * agent/findkey.c: Likewise. * agent/gpg-agent.c: Likewise. * agent/w32main.c: Likewise. * common/argparse.c: Likewise. * common/audit.c: Likewise. * common/audit.h: Likewise. * common/convert.c: Likewise. * common/dotlock.c: Likewise. * common/exechelp-posix.c: Likewise. * common/exechelp-w32.c: Likewise. * common/exechelp-w32ce.c: Likewise. * common/exechelp.h: Likewise. * common/helpfile.c: Likewise. * common/i18n.h: Likewise. * common/iobuf.c: Likewise. * common/iobuf.h: Likewise. * common/localename.c: Likewise. * common/logging.c: Likewise. * common/openpgp-oid.c: Likewise. * common/session-env.c: Likewise. * common/sexputil.c: Likewise. * common/sysutils.c: Likewise. * common/t-sexputil.c: Likewise. * common/ttyio.c: Likewise. * common/util.h: Likewise. * dirmngr/cdblib.c: Likewise. * dirmngr/certcache.c: Likewise. * dirmngr/crlcache.c: Likewise. * dirmngr/dirmngr-client.c: Likewise. * dirmngr/dirmngr.c: Likewise. * dirmngr/dirmngr_ldap.c: Likewise. * dirmngr/dns-stuff.c: Likewise. * dirmngr/http.c: Likewise. * dirmngr/ks-engine-hkp.c: Likewise. * dirmngr/ks-engine-ldap.c: Likewise. * dirmngr/ldap-wrapper.c: Likewise. * dirmngr/ldap.c: Likewise. * dirmngr/misc.c: Likewise. * dirmngr/ocsp.c: Likewise. * dirmngr/validate.c: Likewise. * g10/encrypt.c: Likewise. * g10/getkey.c: Likewise. * g10/gpg.c: Likewise. * g10/gpgv.c: Likewise. * g10/import.c: Likewise. * g10/keydb.c: Likewise. * g10/keydb.h: Likewise. * g10/keygen.c: Likewise. * g10/keyid.c: Likewise. * g10/keylist.c: Likewise. * g10/keyring.c: Likewise. * g10/mainproc.c: Likewise. * g10/misc.c: Likewise. * g10/options.h: Likewise. * g10/packet.h: Likewise. * g10/parse-packet.c: Likewise. * g10/pkclist.c: Likewise. * g10/pkglue.c: Likewise. * g10/plaintext.c: Likewise. * g10/server.c: Likewise. * g10/sig-check.c: Likewise. * g10/sqlite.c: Likewise. * g10/tdbio.c: Likewise. * g10/test-stubs.c: Likewise. * g10/tofu.c: Likewise. * g10/trust.c: Likewise. * g10/trustdb.c: Likewise. * g13/create.c: Likewise. * g13/mountinfo.c: Likewise. * kbx/keybox-blob.c: Likewise. * kbx/keybox-file.c: Likewise. * kbx/keybox-init.c: Likewise. * kbx/keybox-search-desc.h: Likewise. * kbx/keybox-search.c: Likewise. * kbx/keybox-update.c: Likewise. * scd/apdu.c: Likewise. * scd/app-openpgp.c: Likewise. * scd/app-p15.c: Likewise. * scd/app.c: Likewise. * scd/ccid-driver.c: Likewise. * scd/command.c: Likewise. * scd/iso7816.c: Likewise. * sm/base64.c: Likewise. * sm/call-agent.c: Likewise. * sm/call-dirmngr.c: Likewise. * sm/certchain.c: Likewise. * sm/gpgsm.c: Likewise. * sm/import.c: Likewise. * sm/keydb.c: Likewise. * sm/minip12.c: Likewise. * sm/qualified.c: Likewise. * sm/server.c: Likewise. * tools/gpg-check-pattern.c: Likewise. * tools/gpgconf-comp.c: Likewise. * tools/gpgkey2ssh.c: Likewise. * tools/gpgparsemail.c: Likewise. * tools/gpgtar.c: Likewise. * tools/rfc822parse.c: Likewise. * tools/symcryptrun.c: Likewise. Signed-off-by: Justus Winter <justus@g10code.com>
This commit is contained in:
parent
8e2bea22b0
commit
a9e0905342
105 changed files with 162 additions and 162 deletions
|
@ -540,7 +540,7 @@ base64_finish_write (struct writer_cb_parm_s *parm)
|
|||
|
||||
|
||||
/* Create a reader for the given file descriptor. Depending on the
|
||||
control information an input decoding is automagically choosen.
|
||||
control information an input decoding is automagically chosen.
|
||||
The function returns a Base64Context object which must be passed to
|
||||
the gpgme_destroy_reader function. The created KsbaReader object
|
||||
is also returned, but the caller must not call the
|
||||
|
@ -621,7 +621,7 @@ gpgsm_destroy_reader (Base64Context ctx)
|
|||
|
||||
/* Create a writer for the given STREAM. Depending on
|
||||
the control information an output encoding is automagically
|
||||
choosen. The function returns a Base64Context object which must be
|
||||
chosen. The function returns a Base64Context object which must be
|
||||
passed to the gpgme_destroy_writer function. The created
|
||||
KsbaWriter object is also returned, but the caller must not call
|
||||
the ksba_reader_release function on it. */
|
||||
|
|
|
@ -578,7 +578,7 @@ store_serialno (const char *line)
|
|||
}
|
||||
|
||||
|
||||
/* Callback for the gpgsm_agent_serialno fucntion. */
|
||||
/* Callback for the gpgsm_agent_serialno function. */
|
||||
static gpg_error_t
|
||||
scd_serialno_status_cb (void *opaque, const char *line)
|
||||
{
|
||||
|
@ -630,7 +630,7 @@ gpgsm_agent_scd_serialno (ctrl_t ctrl, char **r_serialno)
|
|||
|
||||
|
||||
|
||||
/* Callback for the gpgsm_agent_serialno fucntion. */
|
||||
/* Callback for the gpgsm_agent_serialno function. */
|
||||
static gpg_error_t
|
||||
scd_keypairinfo_status_cb (void *opaque, const char *line)
|
||||
{
|
||||
|
|
|
@ -239,7 +239,7 @@ start_dirmngr (ctrl_t ctrl)
|
|||
dirmngr_ctx_locked = 1;
|
||||
|
||||
err = start_dirmngr_ext (ctrl, &dirmngr_ctx);
|
||||
/* We do not check ERR but the existance of a context because the
|
||||
/* We do not check ERR but the existence of a context because the
|
||||
error might come from a failed command send to the dirmngr.
|
||||
Fixme: Why don't we close the drimngr context if we encountered
|
||||
an error in prepare_dirmngr? */
|
||||
|
|
|
@ -1784,7 +1784,7 @@ do_validate_chain (ctrl_t ctrl, ksba_cert_t cert, ksba_isotime_t checktime_arg,
|
|||
/* Note that it is possible for the last certificate in the
|
||||
chain (i.e. our target certificate) that it has not yet
|
||||
been stored in the keybox and thus the flag can't be set.
|
||||
We ignore this error becuase it will later be stored
|
||||
We ignore this error because it will later be stored
|
||||
anyway. */
|
||||
err = keydb_set_cert_flags (ci->cert, 1, KEYBOX_FLAG_BLOB, 0,
|
||||
KEYBOX_FLAG_BLOB_EPHEMERAL, 0);
|
||||
|
@ -2079,7 +2079,7 @@ get_regtp_ca_info (ctrl_t ctrl, ksba_cert_t cert, int *chainlen)
|
|||
until we have found the root. Because we are only interested in
|
||||
German Bundesnetzagentur (former RegTP) derived certificates 3
|
||||
levels are enough. (The German signature law demands a 3 tier
|
||||
hierachy; thus there is only one CA between the EE and the Root
|
||||
hierarchy; thus there is only one CA between the EE and the Root
|
||||
CA.) */
|
||||
memset (&array, 0, sizeof array);
|
||||
|
||||
|
|
|
@ -214,7 +214,7 @@ static ARGPARSE_OPTS opts[] = {
|
|||
ARGPARSE_c (aExport, "export", N_("export certificates")),
|
||||
|
||||
/* We use -raw and not -p1 for pkcs#1 secret key export so that it
|
||||
won't accidently be used in case -p12 was intended. */
|
||||
won't accidentally be used in case -p12 was intended. */
|
||||
ARGPARSE_c (aExportSecretKeyP12, "export-secret-key-p12", "@"),
|
||||
ARGPARSE_c (aExportSecretKeyP8, "export-secret-key-p8", "@"),
|
||||
ARGPARSE_c (aExportSecretKeyRaw, "export-secret-key-raw", "@"),
|
||||
|
@ -1487,7 +1487,7 @@ main ( int argc, char **argv)
|
|||
log_info (_("WARNING: program may create a core file!\n"));
|
||||
|
||||
/* if (opt.qualsig_approval && !opt.quiet) */
|
||||
/* log_info (_("This software has offically been approved to " */
|
||||
/* log_info (_("This software has officially been approved to " */
|
||||
/* "create and verify\n" */
|
||||
/* "qualified signatures according to German law.\n")); */
|
||||
|
||||
|
@ -1524,7 +1524,7 @@ main ( int argc, char **argv)
|
|||
|
||||
set_debug ();
|
||||
|
||||
/* Although we alwasy use gpgsm_exit, we better install a regualr
|
||||
/* Although we always use gpgsm_exit, we better install a regualr
|
||||
exit handler so that at least the secure memory gets wiped
|
||||
out. */
|
||||
if (atexit (emergency_cleanup))
|
||||
|
|
|
@ -747,7 +747,7 @@ parse_p12 (ctrl_t ctrl, ksba_reader_t reader, struct stats_s *stats)
|
|||
goto leave;
|
||||
}
|
||||
|
||||
/* GnuPG 2.0.4 accidently created binary P12 files with the string
|
||||
/* GnuPG 2.0.4 accidentally created binary P12 files with the string
|
||||
"The passphrase is %s encoded.\n\n" prepended to the ASN.1 data.
|
||||
We fix that here. */
|
||||
if (p12buflen > 29 && !memcmp (p12buffer, "The passphrase is ", 18))
|
||||
|
|
|
@ -478,7 +478,7 @@ keydb_get_resource_name (KEYDB_HANDLE hd)
|
|||
return s? s: "";
|
||||
}
|
||||
|
||||
/* Switch the handle into ephemeral mode and return the orginal value. */
|
||||
/* Switch the handle into ephemeral mode and return the original value. */
|
||||
int
|
||||
keydb_set_ephemeral (KEYDB_HANDLE hd, int yes)
|
||||
{
|
||||
|
|
|
@ -273,7 +273,7 @@ parse_tag (unsigned char const **buffer, size_t *size, struct tag_info *ti)
|
|||
-- two bytes in INPUT.
|
||||
|
||||
Create a new buffer with the content of that octet string. INPUT
|
||||
is the orginal buffer with a length as stored at LENGTH. Returns
|
||||
is the original buffer with a length as stored at LENGTH. Returns
|
||||
NULL on error or a new malloced buffer with the length of this new
|
||||
buffer stored at LENGTH and the number of bytes parsed from input
|
||||
are added to the value stored at INPUT_CONSUMED. INPUT_CONSUMED is
|
||||
|
@ -679,7 +679,7 @@ parse_bag_encrypted_data (const unsigned char *buffer, size_t length,
|
|||
unsigned char *plain = NULL;
|
||||
int bad_pass = 0;
|
||||
unsigned char *cram_buffer = NULL;
|
||||
size_t consumed = 0; /* Number of bytes consumed from the orginal buffer. */
|
||||
size_t consumed = 0; /* Number of bytes consumed from the original buffer. */
|
||||
int is_3des = 0;
|
||||
int is_pbes2 = 0;
|
||||
gcry_mpi_t *result = NULL;
|
||||
|
@ -1193,7 +1193,7 @@ parse_bag_data (const unsigned char *buffer, size_t length, int startoffset,
|
|||
gcry_mpi_t *result = NULL;
|
||||
int result_count, i;
|
||||
unsigned char *cram_buffer = NULL;
|
||||
size_t consumed = 0; /* Number of bytes consumed from the orginal buffer. */
|
||||
size_t consumed = 0; /* Number of bytes consumed from the original buffer. */
|
||||
int is_pbes2 = 0;
|
||||
|
||||
where = "start";
|
||||
|
|
|
@ -184,7 +184,7 @@ gpgsm_is_in_qualified_list (ctrl_t ctrl, ksba_cert_t cert, char *country)
|
|||
|
||||
/* We know that CERT is a qualified certificate. Ask the user for
|
||||
consent to actually create a signature using this certificate.
|
||||
Returns: 0 for yes, GPG_ERR_CANCEL for no or any otehr error
|
||||
Returns: 0 for yes, GPG_ERR_CANCEL for no or any other error
|
||||
code. */
|
||||
gpg_error_t
|
||||
gpgsm_qualified_consent (ctrl_t ctrl, ksba_cert_t cert)
|
||||
|
|
|
@ -425,7 +425,7 @@ static const char hlp_signer[] =
|
|||
"used, the signing will then not be done for this key. If the policy\n"
|
||||
"is not to sign at all if not all signer keys are valid, the client\n"
|
||||
"has to take care of this. All SIGNER commands are cumulative until\n"
|
||||
"a RESET but they are *not* reset by an SIGN command becuase it can\n"
|
||||
"a RESET but they are *not* reset by an SIGN command because it can\n"
|
||||
"be expected that set of signers are used for more than one sign\n"
|
||||
"operation.";
|
||||
static gpg_error_t
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue