doc: Minor code comment fixes.

--
This commit is contained in:
Werner Koch 2020-06-08 15:22:28 +02:00
parent e2e5736842
commit c1c607a51c
No known key found for this signature in database
GPG Key ID: E3FDFF218E45B72B
6 changed files with 10 additions and 6 deletions

View File

@ -324,7 +324,7 @@ get_pubkey_for_sig (ctrl_t ctrl, PKT_public_key *pk, PKT_signature *sig,
return 0;
}
/* First try the new ISSUER_FPR info. */
/* First try the ISSUER_FPR info. */
fpr = issuer_fpr_raw (sig, &fprlen);
if (fpr && !get_pubkey_byfprint (ctrl, pk, NULL, fpr, fprlen))
return 0;
@ -533,7 +533,7 @@ get_pubkeyblock_for_sig (ctrl_t ctrl, PKT_signature *sig)
size_t fprlen;
kbnode_t keyblock;
/* First try the new ISSUER_FPR info. */
/* First try the ISSUER_FPR info. */
fpr = issuer_fpr_raw (sig, &fprlen);
if (fpr && !get_pubkey_byfprint (ctrl, NULL, &keyblock, fpr, fprlen))
return keyblock;

View File

@ -1976,7 +1976,7 @@ check_sig_and_print (CTX c, kbnode_t node)
log_error(_("can't handle this ambiguous signature data\n"));
return 0;
}
}
} /* End checking signature packet composition. */
if (sig->signers_uid)
write_status_buffer (STATUS_NEWSIG,

View File

@ -318,6 +318,9 @@ typedef struct
unsigned int ks_modify:1;
unsigned int compacted:1;
unsigned int primary:2; /* 2 if set via the primary flag, 1 if calculated */
/* Note that this flag is set in a
* keyblock at max for one User ID and for
* one User Attribute per keyblock. */
unsigned int revoked:1;
unsigned int expired:1;
} flags;

View File

@ -249,7 +249,7 @@ passphrase_clear_cache (const char *cacheid)
* Returns NULL if the user canceled the passphrase entry and if
* CANCELED is not NULL, sets it to true.
*
* If CREATE is true a new passphrase sll be created. If NOCACHE is
* If CREATE is true a new passphrase will be created. If NOCACHE is
* true the symmetric key caching will not be used. */
DEK *
passphrase_to_dek (int cipher_algo, STRING2KEY *s2k,

View File

@ -103,7 +103,8 @@ check_signature (ctrl_t ctrl, PKT_signature *sig, gcry_md_hd_t digest)
* v5 signatures. They may be NULL to use the default.
*
* If FORCED_PK is not NULL this public key is used to verify the
* signature and no other public key is looked up.
* signature and no other public key is looked up. This is used to
* verify against a key included in the signature.
*
* If R_EXPIREDATE is not NULL, R_EXPIREDATE is set to the key's
* expiry.

View File

@ -204,7 +204,7 @@ mk_notation_policy_etc (ctrl_t ctrl, PKT_signature *sig,
/*
* Put the Key Block subpakcet into SIG for key PKSK. Returns an
* Put the Key Block subpacket into SIG for key PKSK. Returns an
* error code on failure.
*/
static gpg_error_t