summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorJustus Winter <justus@g10code.com>2015-11-16 12:18:47 +0100
committerJustus Winter <justus@g10code.com>2015-11-17 11:17:52 +0100
commit0e395944b70c7a92a6437f6bcc14f287c19ce9de (patch)
treefb78af690002b53f017cf1ea122e9f096e828f54
parent89fa74d6b3e58cd4fcd6e0939a35e46cbaca2ea0 (diff)
downloadlibgcrypt-0e395944b70c7a92a6437f6bcc14f287c19ce9de.tar.gz
Fix typos found using codespell
* cipher/cipher-ocb.c: Fix typos. * cipher/des.c: Likewise. * cipher/dsa-common.c: Likewise. * cipher/ecc.c: Likewise. * cipher/pubkey.c: Likewise. * cipher/rsa-common.c: Likewise. * cipher/scrypt.c: Likewise. * random/random-csprng.c: Likewise. * random/random-fips.c: Likewise. * random/rndw32.c: Likewise. * src/cipher-proto.h: Likewise. * src/context.c: Likewise. * src/fips.c: Likewise. * src/gcrypt.h.in: Likewise. * src/global.c: Likewise. * src/sexp.c: Likewise. * tests/mpitests.c: Likewise. * tests/t-lock.c: Likewise. Signed-off-by: Justus Winter <justus@g10code.com>
-rw-r--r--cipher/cipher-ocb.c2
-rw-r--r--cipher/des.c4
-rw-r--r--cipher/dsa-common.c2
-rw-r--r--cipher/ecc.c2
-rw-r--r--cipher/pubkey.c4
-rw-r--r--cipher/rsa-common.c4
-rw-r--r--cipher/scrypt.c2
-rw-r--r--random/random-csprng.c6
-rw-r--r--random/random-fips.c4
-rw-r--r--random/rndw32.c2
-rw-r--r--src/cipher-proto.h2
-rw-r--r--src/context.c2
-rw-r--r--src/fips.c4
-rw-r--r--src/gcrypt.h.in4
-rw-r--r--src/global.c4
-rw-r--r--src/sexp.c2
-rw-r--r--tests/mpitests.c2
-rw-r--r--tests/t-lock.c4
18 files changed, 28 insertions, 28 deletions
diff --git a/cipher/cipher-ocb.c b/cipher/cipher-ocb.c
index a3a2c9bb..6db1db33 100644
--- a/cipher/cipher-ocb.c
+++ b/cipher/cipher-ocb.c
@@ -307,7 +307,7 @@ _gcry_cipher_ocb_authenticate (gcry_cipher_hd_t c, const unsigned char *abuf,
c->spec->encrypt (&c->context.c, l_tmp, l_tmp);
buf_xor_1 (c->u_mode.ocb.aad_sum, l_tmp, OCB_BLOCK_LEN);
- /* Mark AAD as finalized to avoid accidently calling this
+ /* Mark AAD as finalized to avoid accidentally calling this
function again after a non-full block has been processed. */
c->u_mode.ocb.aad_finalized = 1;
}
diff --git a/cipher/des.c b/cipher/des.c
index be62763e..5c99f50d 100644
--- a/cipher/des.c
+++ b/cipher/des.c
@@ -49,7 +49,7 @@
* encrypt or decrypt data in 64bit blocks in Electronic Codebook Mode.
*
* (In the examples below the slashes at the beginning and ending of comments
- * are omited.)
+ * are omitted.)
*
* DES Example
* -----------
@@ -68,7 +68,7 @@
* * Encrypt the plaintext *
* des_ecb_encrypt(context, plaintext, ciphertext);
*
- * * To recover the orginal plaintext from ciphertext use: *
+ * * To recover the original plaintext from ciphertext use: *
* des_ecb_decrypt(context, ciphertext, recoverd);
*
*
diff --git a/cipher/dsa-common.c b/cipher/dsa-common.c
index a5e42a21..6f2c2f9e 100644
--- a/cipher/dsa-common.c
+++ b/cipher/dsa-common.c
@@ -319,7 +319,7 @@ _gcry_dsa_gen_rfc6979_k (gcry_mpi_t *r_k,
/* The caller may have requested that we introduce some extra loops.
This is for example useful if the caller wants another value for
- K because the last returned one yielded an R of 0. Becuase this
+ K because the last returned one yielded an R of 0. Because this
is very unlikely we implement it in a straightforward way. */
if (extraloops)
{
diff --git a/cipher/ecc.c b/cipher/ecc.c
index 4958fbba..bd3e7549 100644
--- a/cipher/ecc.c
+++ b/cipher/ecc.c
@@ -30,7 +30,7 @@
Ramiro Moreno Chiral
Mikael Mylnikov (mmr)
For use in Libgcrypt the code has been heavily modified and cleaned
- up. In fact there is not much left of the orginally code except for
+ up. In fact there is not much left of the originally code except for
some variable names and the text book implementaion of the sign and
verification algorithms. The arithmetic functions have entirely
been rewritten and moved to mpi/ec.c.
diff --git a/cipher/pubkey.c b/cipher/pubkey.c
index e3842c09..b321a899 100644
--- a/cipher/pubkey.c
+++ b/cipher/pubkey.c
@@ -114,7 +114,7 @@ spec_from_name (const char *name)
* set the function will only succeed if a private key has been given.
* On success the spec is stored at R_SPEC. On error NULL is stored
* at R_SPEC and an error code returned. If R_PARMS is not NULL and
- * the fucntion returns success, the parameter list below
+ * the function returns success, the parameter list below
* "private-key" or "public-key" is stored there and the caller must
* call gcry_sexp_release on it.
*/
@@ -945,7 +945,7 @@ _gcry_pk_selftest (int algo, int extended, selftest_report_func_t report)
else
{
ec = GPG_ERR_PUBKEY_ALGO;
- /* Fixme: We need to change the report fucntion to allow passing
+ /* Fixme: We need to change the report function to allow passing
of an encryption mode (e.g. pkcs1, ecdsa, or ecdh). */
if (report)
report ("pubkey", algo, "module",
diff --git a/cipher/rsa-common.c b/cipher/rsa-common.c
index b2601423..7b562371 100644
--- a/cipher/rsa-common.c
+++ b/cipher/rsa-common.c
@@ -46,7 +46,7 @@ octet_string_from_mpi (unsigned char **r_frame, void *space,
/* Encode {VALUE,VALUELEN} for an NBITS keys using the pkcs#1 block
- type 2 padding. On sucess the result is stored as a new MPI at
+ type 2 padding. On success the result is stored as a new MPI at
R_RESULT. On error the value at R_RESULT is undefined.
If {RANDOM_OVERRIDE, RANDOM_OVERRIDE_LEN} is given it is used as
@@ -675,7 +675,7 @@ _gcry_rsa_oaep_decode (unsigned char **r_result, size_t *r_resultlen,
}
db = seed + hlen;
- /* To avoid choosen ciphertext attacks from now on we make sure to
+ /* To avoid chosen ciphertext attacks from now on we make sure to
run all code even in the error case; this avoids possible timing
attacks as described by Manger. */
diff --git a/cipher/scrypt.c b/cipher/scrypt.c
index 3c21c2af..a05b5bfd 100644
--- a/cipher/scrypt.c
+++ b/cipher/scrypt.c
@@ -246,7 +246,7 @@ _gcry_kdf_scrypt (const unsigned char *passwd, size_t passwdlen,
unsigned long iterations,
size_t dkLen, unsigned char *DK)
{
- u64 N = subalgo; /* CPU/memory cost paramter. */
+ u64 N = subalgo; /* CPU/memory cost parameter. */
u32 r; /* Block size. */
u32 p = iterations; /* Parallelization parameter. */
diff --git a/random/random-csprng.c b/random/random-csprng.c
index da50fda7..dbebe98f 100644
--- a/random/random-csprng.c
+++ b/random/random-csprng.c
@@ -1234,7 +1234,7 @@ do_fast_random_poll (void)
# endif /*!RUSAGE_SELF*/
#endif /*HAVE_GETRUSAGE*/
- /* Time and clock are availabe on all systems - so we better do it
+ /* Time and clock are available on all systems - so we better do it
just in case one of the above functions didn't work. */
{
time_t x = time(NULL);
@@ -1275,12 +1275,12 @@ _gcry_rngcsprng_fast_poll (void)
static void
-read_random_source (enum random_origins orgin, size_t length, int level )
+read_random_source (enum random_origins origin, size_t length, int level)
{
if ( !slow_gather_fnc )
log_fatal ("Slow entropy gathering module not yet initialized\n");
- if ( slow_gather_fnc (add_randomness, orgin, length, level) < 0)
+ if (slow_gather_fnc (add_randomness, origin, length, level) < 0)
log_fatal ("No way to gather entropy for the RNG\n");
}
diff --git a/random/random-fips.c b/random/random-fips.c
index 0a763628..3a641b25 100644
--- a/random/random-fips.c
+++ b/random/random-fips.c
@@ -104,7 +104,7 @@ static size_t entropy_collect_buffer_size; /* Allocated length. */
/* This random context type is used to track properties of one random
generator. Thee context are usually allocated in secure memory so
that the seed value is well protected. There are a couble of guard
- fields to help detecting applications accidently overwriting parts
+ fields to help detecting applications accidentally overwriting parts
of the memory. */
struct rng_context
{
@@ -315,7 +315,7 @@ x931_get_dt (unsigned char *buffer, size_t length, rng_context_t rng_ctx)
if (gettimeofday (&tv, NULL))
log_fatal ("gettimeofday() failed: %s\n", strerror (errno));
- /* The microseconds part is always less than 1 millon (0x0f4240).
+ /* The microseconds part is always less than 1 million (0x0f4240).
Thus we don't care about the MSB and in addition shift it to
the left by 4 bits. */
usec = tv.tv_usec;
diff --git a/random/rndw32.c b/random/rndw32.c
index 1325b18b..1c0fc3d3 100644
--- a/random/rndw32.c
+++ b/random/rndw32.c
@@ -955,7 +955,7 @@ _gcry_rndw32_gather_random_fast (void (*add)(const void*, size_t,
However, the kernel appears to synchronise the TSCs across CPUs at
boot time (it resets the TSC as part of its system init), so this
shouldn't really be a problem. Under WinCE it's completely platform-
- dependant, if there's no hardware performance counter available, it
+ dependent, if there's no hardware performance counter available, it
uses the 1ms system timer.
Another feature of the TSC (although it doesn't really affect us here)
diff --git a/src/cipher-proto.h b/src/cipher-proto.h
index 3bca9c71..d1ddc5dd 100644
--- a/src/cipher-proto.h
+++ b/src/cipher-proto.h
@@ -92,7 +92,7 @@ typedef const char *(*pk_get_curve_t)(gcry_sexp_t keyparms, int iterator,
typedef gcry_sexp_t (*pk_get_curve_param_t)(const char *name);
-/* Module specification structure for public key algoritms. */
+/* Module specification structure for public key algorithms. */
typedef struct gcry_pk_spec
{
int algo;
diff --git a/src/context.c b/src/context.c
index 94e5be9e..f77878bc 100644
--- a/src/context.c
+++ b/src/context.c
@@ -47,7 +47,7 @@ struct gcry_context
/* Allocate a fresh generic context of contect TYPE and allocate
LENGTH extra bytes for private use of the type handler. DEINIT is a
- fucntion used called to deinitialize the private part; it may be
+ function used called to deinitialize the private part; it may be
NULL if de-initialization is not required. Returns NULL and sets
ERRNO if memory allocation failed. */
gcry_ctx_t
diff --git a/src/fips.c b/src/fips.c
index 7939abd7..edcbeacb 100644
--- a/src/fips.c
+++ b/src/fips.c
@@ -102,7 +102,7 @@ _gcry_initialize_fips_mode (int force)
static int done;
gpg_error_t err;
- /* Make sure we are not accidently called twice. */
+ /* Make sure we are not accidentally called twice. */
if (done)
{
if ( fips_mode () )
@@ -377,7 +377,7 @@ _gcry_fips_is_operational (void)
(GCRYCTL_INITIALIZATION_FINISHED) where the latter will
run the selftests. The drawback of these on-demand
self-tests are a small chance that self-tests are
- performed by severeal threads; that is no problem because
+ performed by several threads; that is no problem because
our FSM make sure that we won't oversee any error. */
unlock_fsm ();
_gcry_fips_run_selftests (0);
diff --git a/src/gcrypt.h.in b/src/gcrypt.h.in
index 5ddeee3e..93b1f43f 100644
--- a/src/gcrypt.h.in
+++ b/src/gcrypt.h.in
@@ -583,7 +583,7 @@ gcry_error_t gcry_mpi_print (enum gcry_mpi_format format,
size_t *nwritten,
const gcry_mpi_t a);
-/* Convert the big integer A int the external representation described
+/* Convert the big integer A into the external representation described
by FORMAT and store it in a newly allocated buffer which address
will be put into BUFFER. NWRITTEN receives the actual lengths of the
external representation. */
@@ -1598,7 +1598,7 @@ gcry_error_t gcry_prime_generate (gcry_mpi_t *prime,
/* Find a generator for PRIME where the factorization of (prime-1) is
in the NULL terminated array FACTORS. Return the generator as a
newly allocated MPI in R_G. If START_G is not NULL, use this as
- teh start for the search. */
+ the start for the search. */
gcry_error_t gcry_prime_group_generator (gcry_mpi_t *r_g,
gcry_mpi_t prime,
gcry_mpi_t *factors,
diff --git a/src/global.c b/src/global.c
index 22903930..889de4c4 100644
--- a/src/global.c
+++ b/src/global.c
@@ -305,7 +305,7 @@ print_config ( int (*fnc)(FILE *fp, const char *format, ...), FILE *fp)
fnc (fp, "%s:", s);
fnc (fp, "\n");
/* We use y/n instead of 1/0 for the simple reason that Emacsen's
- compile error parser would accidently flag that line when printed
+ compile error parser would accidentally flag that line when printed
during "make check" as an error. */
fnc (fp, "fips-mode:%c:%c:\n",
fips_mode ()? 'y':'n',
@@ -867,7 +867,7 @@ _gcry_free (void *p)
return;
/* In case ERRNO is set we better save it so that the free machinery
- may not accidently change ERRNO. We restore it only if it was
+ may not accidentally change ERRNO. We restore it only if it was
already set to comply with the usual C semantic for ERRNO. */
save_errno = errno;
if (free_func)
diff --git a/src/sexp.c b/src/sexp.c
index f1bbffa7..d063962c 100644
--- a/src/sexp.c
+++ b/src/sexp.c
@@ -53,7 +53,7 @@
data) is required as well. The close_tag finishes the list and
would actually be sufficient. For fail-safe reasons a final stop
tag is always the last byte in a buffer; it has a value of 0 so
- that string function accidently applied to an S-expression will
+ that string function accidentally applied to an S-expression will
never access unallocated data. We do not support display hints and
thus don't need to represent them. A list may have more an
arbitrary number of data elements but at least one is required.
diff --git a/tests/mpitests.c b/tests/mpitests.c
index d75aca90..e6f8525c 100644
--- a/tests/mpitests.c
+++ b/tests/mpitests.c
@@ -426,7 +426,7 @@ test_mul (void)
/* What we test here is that we don't overwrite our args and that
- using thne same mpi for several args works. */
+ using the same mpi for several args works. */
static int
test_powm (void)
{
diff --git a/tests/t-lock.c b/tests/t-lock.c
index 22b67ef5..815f63b9 100644
--- a/tests/t-lock.c
+++ b/tests/t-lock.c
@@ -229,7 +229,7 @@ init_accounts (void)
}
-/* Check that the sum of all accounts matches the intial sum. */
+/* Check that the sum of all accounts matches the initial sum. */
static void
check_accounts (void)
{
@@ -261,7 +261,7 @@ get_rand (int high)
}
-/* Pick a random account. Note that this fucntion is not
+/* Pick a random account. Note that this function is not
thread-safe. */
static int
pick_account (void)