summaryrefslogtreecommitdiff
path: root/cipher
diff options
context:
space:
mode:
authorJustus Winter <justus@g10code.com>2015-11-16 12:18:47 +0100
committerJustus Winter <justus@g10code.com>2015-11-17 11:17:52 +0100
commit0e395944b70c7a92a6437f6bcc14f287c19ce9de (patch)
treefb78af690002b53f017cf1ea122e9f096e828f54 /cipher
parent89fa74d6b3e58cd4fcd6e0939a35e46cbaca2ea0 (diff)
downloadlibgcrypt-0e395944b70c7a92a6437f6bcc14f287c19ce9de.tar.gz
Fix typos found using codespell
* cipher/cipher-ocb.c: Fix typos. * cipher/des.c: Likewise. * cipher/dsa-common.c: Likewise. * cipher/ecc.c: Likewise. * cipher/pubkey.c: Likewise. * cipher/rsa-common.c: Likewise. * cipher/scrypt.c: Likewise. * random/random-csprng.c: Likewise. * random/random-fips.c: Likewise. * random/rndw32.c: Likewise. * src/cipher-proto.h: Likewise. * src/context.c: Likewise. * src/fips.c: Likewise. * src/gcrypt.h.in: Likewise. * src/global.c: Likewise. * src/sexp.c: Likewise. * tests/mpitests.c: Likewise. * tests/t-lock.c: Likewise. Signed-off-by: Justus Winter <justus@g10code.com>
Diffstat (limited to 'cipher')
-rw-r--r--cipher/cipher-ocb.c2
-rw-r--r--cipher/des.c4
-rw-r--r--cipher/dsa-common.c2
-rw-r--r--cipher/ecc.c2
-rw-r--r--cipher/pubkey.c4
-rw-r--r--cipher/rsa-common.c4
-rw-r--r--cipher/scrypt.c2
7 files changed, 10 insertions, 10 deletions
diff --git a/cipher/cipher-ocb.c b/cipher/cipher-ocb.c
index a3a2c9bb..6db1db33 100644
--- a/cipher/cipher-ocb.c
+++ b/cipher/cipher-ocb.c
@@ -307,7 +307,7 @@ _gcry_cipher_ocb_authenticate (gcry_cipher_hd_t c, const unsigned char *abuf,
c->spec->encrypt (&c->context.c, l_tmp, l_tmp);
buf_xor_1 (c->u_mode.ocb.aad_sum, l_tmp, OCB_BLOCK_LEN);
- /* Mark AAD as finalized to avoid accidently calling this
+ /* Mark AAD as finalized to avoid accidentally calling this
function again after a non-full block has been processed. */
c->u_mode.ocb.aad_finalized = 1;
}
diff --git a/cipher/des.c b/cipher/des.c
index be62763e..5c99f50d 100644
--- a/cipher/des.c
+++ b/cipher/des.c
@@ -49,7 +49,7 @@
* encrypt or decrypt data in 64bit blocks in Electronic Codebook Mode.
*
* (In the examples below the slashes at the beginning and ending of comments
- * are omited.)
+ * are omitted.)
*
* DES Example
* -----------
@@ -68,7 +68,7 @@
* * Encrypt the plaintext *
* des_ecb_encrypt(context, plaintext, ciphertext);
*
- * * To recover the orginal plaintext from ciphertext use: *
+ * * To recover the original plaintext from ciphertext use: *
* des_ecb_decrypt(context, ciphertext, recoverd);
*
*
diff --git a/cipher/dsa-common.c b/cipher/dsa-common.c
index a5e42a21..6f2c2f9e 100644
--- a/cipher/dsa-common.c
+++ b/cipher/dsa-common.c
@@ -319,7 +319,7 @@ _gcry_dsa_gen_rfc6979_k (gcry_mpi_t *r_k,
/* The caller may have requested that we introduce some extra loops.
This is for example useful if the caller wants another value for
- K because the last returned one yielded an R of 0. Becuase this
+ K because the last returned one yielded an R of 0. Because this
is very unlikely we implement it in a straightforward way. */
if (extraloops)
{
diff --git a/cipher/ecc.c b/cipher/ecc.c
index 4958fbba..bd3e7549 100644
--- a/cipher/ecc.c
+++ b/cipher/ecc.c
@@ -30,7 +30,7 @@
Ramiro Moreno Chiral
Mikael Mylnikov (mmr)
For use in Libgcrypt the code has been heavily modified and cleaned
- up. In fact there is not much left of the orginally code except for
+ up. In fact there is not much left of the originally code except for
some variable names and the text book implementaion of the sign and
verification algorithms. The arithmetic functions have entirely
been rewritten and moved to mpi/ec.c.
diff --git a/cipher/pubkey.c b/cipher/pubkey.c
index e3842c09..b321a899 100644
--- a/cipher/pubkey.c
+++ b/cipher/pubkey.c
@@ -114,7 +114,7 @@ spec_from_name (const char *name)
* set the function will only succeed if a private key has been given.
* On success the spec is stored at R_SPEC. On error NULL is stored
* at R_SPEC and an error code returned. If R_PARMS is not NULL and
- * the fucntion returns success, the parameter list below
+ * the function returns success, the parameter list below
* "private-key" or "public-key" is stored there and the caller must
* call gcry_sexp_release on it.
*/
@@ -945,7 +945,7 @@ _gcry_pk_selftest (int algo, int extended, selftest_report_func_t report)
else
{
ec = GPG_ERR_PUBKEY_ALGO;
- /* Fixme: We need to change the report fucntion to allow passing
+ /* Fixme: We need to change the report function to allow passing
of an encryption mode (e.g. pkcs1, ecdsa, or ecdh). */
if (report)
report ("pubkey", algo, "module",
diff --git a/cipher/rsa-common.c b/cipher/rsa-common.c
index b2601423..7b562371 100644
--- a/cipher/rsa-common.c
+++ b/cipher/rsa-common.c
@@ -46,7 +46,7 @@ octet_string_from_mpi (unsigned char **r_frame, void *space,
/* Encode {VALUE,VALUELEN} for an NBITS keys using the pkcs#1 block
- type 2 padding. On sucess the result is stored as a new MPI at
+ type 2 padding. On success the result is stored as a new MPI at
R_RESULT. On error the value at R_RESULT is undefined.
If {RANDOM_OVERRIDE, RANDOM_OVERRIDE_LEN} is given it is used as
@@ -675,7 +675,7 @@ _gcry_rsa_oaep_decode (unsigned char **r_result, size_t *r_resultlen,
}
db = seed + hlen;
- /* To avoid choosen ciphertext attacks from now on we make sure to
+ /* To avoid chosen ciphertext attacks from now on we make sure to
run all code even in the error case; this avoids possible timing
attacks as described by Manger. */
diff --git a/cipher/scrypt.c b/cipher/scrypt.c
index 3c21c2af..a05b5bfd 100644
--- a/cipher/scrypt.c
+++ b/cipher/scrypt.c
@@ -246,7 +246,7 @@ _gcry_kdf_scrypt (const unsigned char *passwd, size_t passwdlen,
unsigned long iterations,
size_t dkLen, unsigned char *DK)
{
- u64 N = subalgo; /* CPU/memory cost paramter. */
+ u64 N = subalgo; /* CPU/memory cost parameter. */
u32 r; /* Block size. */
u32 p = iterations; /* Parallelization parameter. */