[git] GCRYPT - branch, master, updated. libgcrypt-1.6.0-281-g0e39594

by Justus Winter cvs at cvs.gnupg.org
Tue Nov 17 11:20:22 CET 2015


This is an automated email from the git hooks/post-receive script. It was
generated because a ref change was pushed to the repository containing
the project "The GNU crypto library".

The branch, master has been updated
       via  0e395944b70c7a92a6437f6bcc14f287c19ce9de (commit)
      from  89fa74d6b3e58cd4fcd6e0939a35e46cbaca2ea0 (commit)

Those revisions listed above that are new to this repository have
not appeared on any other notification email; so we list those
revisions in full, below.

- Log -----------------------------------------------------------------
commit 0e395944b70c7a92a6437f6bcc14f287c19ce9de
Author: Justus Winter <justus at g10code.com>
Date:   Mon Nov 16 12:18:47 2015 +0100

    Fix typos found using codespell
    
    * cipher/cipher-ocb.c: Fix typos.
    * cipher/des.c: Likewise.
    * cipher/dsa-common.c: Likewise.
    * cipher/ecc.c: Likewise.
    * cipher/pubkey.c: Likewise.
    * cipher/rsa-common.c: Likewise.
    * cipher/scrypt.c: Likewise.
    * random/random-csprng.c: Likewise.
    * random/random-fips.c: Likewise.
    * random/rndw32.c: Likewise.
    * src/cipher-proto.h: Likewise.
    * src/context.c: Likewise.
    * src/fips.c: Likewise.
    * src/gcrypt.h.in: Likewise.
    * src/global.c: Likewise.
    * src/sexp.c: Likewise.
    * tests/mpitests.c: Likewise.
    * tests/t-lock.c: Likewise.
    
    Signed-off-by: Justus Winter <justus at g10code.com>

diff --git a/cipher/cipher-ocb.c b/cipher/cipher-ocb.c
index a3a2c9b..6db1db3 100644
--- a/cipher/cipher-ocb.c
+++ b/cipher/cipher-ocb.c
@@ -307,7 +307,7 @@ _gcry_cipher_ocb_authenticate (gcry_cipher_hd_t c, const unsigned char *abuf,
       c->spec->encrypt (&c->context.c, l_tmp, l_tmp);
       buf_xor_1 (c->u_mode.ocb.aad_sum, l_tmp, OCB_BLOCK_LEN);
 
-      /* Mark AAD as finalized to avoid accidently calling this
+      /* Mark AAD as finalized to avoid accidentally calling this
          function again after a non-full block has been processed.  */
       c->u_mode.ocb.aad_finalized = 1;
     }
diff --git a/cipher/des.c b/cipher/des.c
index be62763..5c99f50 100644
--- a/cipher/des.c
+++ b/cipher/des.c
@@ -49,7 +49,7 @@
  * encrypt or decrypt data in 64bit blocks in Electronic Codebook Mode.
  *
  * (In the examples below the slashes at the beginning and ending of comments
- * are omited.)
+ * are omitted.)
  *
  * DES Example
  * -----------
@@ -68,7 +68,7 @@
  *     * Encrypt the plaintext *
  *     des_ecb_encrypt(context, plaintext, ciphertext);
  *
- *     * To recover the orginal plaintext from ciphertext use: *
+ *     * To recover the original plaintext from ciphertext use: *
  *     des_ecb_decrypt(context, ciphertext, recoverd);
  *
  *
diff --git a/cipher/dsa-common.c b/cipher/dsa-common.c
index a5e42a2..6f2c2f9 100644
--- a/cipher/dsa-common.c
+++ b/cipher/dsa-common.c
@@ -319,7 +319,7 @@ _gcry_dsa_gen_rfc6979_k (gcry_mpi_t *r_k,
 
   /* The caller may have requested that we introduce some extra loops.
      This is for example useful if the caller wants another value for
-     K because the last returned one yielded an R of 0.  Becuase this
+     K because the last returned one yielded an R of 0.  Because this
      is very unlikely we implement it in a straightforward way.  */
   if (extraloops)
     {
diff --git a/cipher/ecc.c b/cipher/ecc.c
index 4958fbb..bd3e754 100644
--- a/cipher/ecc.c
+++ b/cipher/ecc.c
@@ -30,7 +30,7 @@
       Ramiro Moreno Chiral
       Mikael Mylnikov (mmr)
   For use in Libgcrypt the code has been heavily modified and cleaned
-  up. In fact there is not much left of the orginally code except for
+  up. In fact there is not much left of the originally code except for
   some variable names and the text book implementaion of the sign and
   verification algorithms.  The arithmetic functions have entirely
   been rewritten and moved to mpi/ec.c.
diff --git a/cipher/pubkey.c b/cipher/pubkey.c
index e3842c0..b321a89 100644
--- a/cipher/pubkey.c
+++ b/cipher/pubkey.c
@@ -114,7 +114,7 @@ spec_from_name (const char *name)
  * set the function will only succeed if a private key has been given.
  * On success the spec is stored at R_SPEC.  On error NULL is stored
  * at R_SPEC and an error code returned.  If R_PARMS is not NULL and
- * the fucntion returns success, the parameter list below
+ * the function returns success, the parameter list below
  * "private-key" or "public-key" is stored there and the caller must
  * call gcry_sexp_release on it.
  */
@@ -945,7 +945,7 @@ _gcry_pk_selftest (int algo, int extended, selftest_report_func_t report)
   else
     {
       ec = GPG_ERR_PUBKEY_ALGO;
-      /* Fixme: We need to change the report fucntion to allow passing
+      /* Fixme: We need to change the report function to allow passing
          of an encryption mode (e.g. pkcs1, ecdsa, or ecdh).  */
       if (report)
         report ("pubkey", algo, "module",
diff --git a/cipher/rsa-common.c b/cipher/rsa-common.c
index b260142..7b56237 100644
--- a/cipher/rsa-common.c
+++ b/cipher/rsa-common.c
@@ -46,7 +46,7 @@ octet_string_from_mpi (unsigned char **r_frame, void *space,
 
 
 /* Encode {VALUE,VALUELEN} for an NBITS keys using the pkcs#1 block
-   type 2 padding.  On sucess the result is stored as a new MPI at
+   type 2 padding.  On success the result is stored as a new MPI at
    R_RESULT.  On error the value at R_RESULT is undefined.
 
    If {RANDOM_OVERRIDE, RANDOM_OVERRIDE_LEN} is given it is used as
@@ -675,7 +675,7 @@ _gcry_rsa_oaep_decode (unsigned char **r_result, size_t *r_resultlen,
     }
   db = seed + hlen;
 
-  /* To avoid choosen ciphertext attacks from now on we make sure to
+  /* To avoid chosen ciphertext attacks from now on we make sure to
      run all code even in the error case; this avoids possible timing
      attacks as described by Manger.  */
 
diff --git a/cipher/scrypt.c b/cipher/scrypt.c
index 3c21c2a..a05b5bf 100644
--- a/cipher/scrypt.c
+++ b/cipher/scrypt.c
@@ -246,7 +246,7 @@ _gcry_kdf_scrypt (const unsigned char *passwd, size_t passwdlen,
                   unsigned long iterations,
                   size_t dkLen, unsigned char *DK)
 {
-  u64 N = subalgo;    /* CPU/memory cost paramter.  */
+  u64 N = subalgo;    /* CPU/memory cost parameter.  */
   u32 r;              /* Block size.  */
   u32 p = iterations; /* Parallelization parameter.  */
 
diff --git a/random/random-csprng.c b/random/random-csprng.c
index da50fda..dbebe98 100644
--- a/random/random-csprng.c
+++ b/random/random-csprng.c
@@ -1234,7 +1234,7 @@ do_fast_random_poll (void)
 # endif /*!RUSAGE_SELF*/
 #endif /*HAVE_GETRUSAGE*/
 
-  /* Time and clock are availabe on all systems - so we better do it
+  /* Time and clock are available on all systems - so we better do it
      just in case one of the above functions didn't work.  */
   {
     time_t x = time(NULL);
@@ -1275,12 +1275,12 @@ _gcry_rngcsprng_fast_poll (void)
 
 
 static void
-read_random_source (enum random_origins orgin, size_t length, int level )
+read_random_source (enum random_origins origin, size_t length, int level)
 {
   if ( !slow_gather_fnc )
     log_fatal ("Slow entropy gathering module not yet initialized\n");
 
-  if ( slow_gather_fnc (add_randomness, orgin, length, level) < 0)
+  if (slow_gather_fnc (add_randomness, origin, length, level) < 0)
     log_fatal ("No way to gather entropy for the RNG\n");
 }
 
diff --git a/random/random-fips.c b/random/random-fips.c
index 0a76362..3a641b2 100644
--- a/random/random-fips.c
+++ b/random/random-fips.c
@@ -104,7 +104,7 @@ static size_t entropy_collect_buffer_size;     /* Allocated length.  */
 /* This random context type is used to track properties of one random
    generator. Thee context are usually allocated in secure memory so
    that the seed value is well protected.  There are a couble of guard
-   fields to help detecting applications accidently overwriting parts
+   fields to help detecting applications accidentally overwriting parts
    of the memory. */
 struct rng_context
 {
@@ -315,7 +315,7 @@ x931_get_dt (unsigned char *buffer, size_t length, rng_context_t rng_ctx)
     if (gettimeofday (&tv, NULL))
       log_fatal ("gettimeofday() failed: %s\n", strerror (errno));
 
-    /* The microseconds part is always less than 1 millon (0x0f4240).
+    /* The microseconds part is always less than 1 million (0x0f4240).
        Thus we don't care about the MSB and in addition shift it to
        the left by 4 bits.  */
     usec = tv.tv_usec;
diff --git a/random/rndw32.c b/random/rndw32.c
index 1325b18..1c0fc3d 100644
--- a/random/rndw32.c
+++ b/random/rndw32.c
@@ -955,7 +955,7 @@ _gcry_rndw32_gather_random_fast (void (*add)(const void*, size_t,
      However, the kernel appears to synchronise the TSCs across CPUs at
      boot time (it resets the TSC as part of its system init), so this
      shouldn't really be a problem.  Under WinCE it's completely platform-
-     dependant, if there's no hardware performance counter available, it
+     dependent, if there's no hardware performance counter available, it
      uses the 1ms system timer.
 
      Another feature of the TSC (although it doesn't really affect us here)
diff --git a/src/cipher-proto.h b/src/cipher-proto.h
index 3bca9c7..d1ddc5d 100644
--- a/src/cipher-proto.h
+++ b/src/cipher-proto.h
@@ -92,7 +92,7 @@ typedef const char *(*pk_get_curve_t)(gcry_sexp_t keyparms, int iterator,
 typedef gcry_sexp_t (*pk_get_curve_param_t)(const char *name);
 
 
-/* Module specification structure for public key algoritms.  */
+/* Module specification structure for public key algorithms.  */
 typedef struct gcry_pk_spec
 {
   int algo;
diff --git a/src/context.c b/src/context.c
index 94e5be9..f77878b 100644
--- a/src/context.c
+++ b/src/context.c
@@ -47,7 +47,7 @@ struct gcry_context
 
 /* Allocate a fresh generic context of contect TYPE and allocate
    LENGTH extra bytes for private use of the type handler. DEINIT is a
-   fucntion used called to deinitialize the private part; it may be
+   function used called to deinitialize the private part; it may be
    NULL if de-initialization is not required.  Returns NULL and sets
    ERRNO if memory allocation failed.  */
 gcry_ctx_t
diff --git a/src/fips.c b/src/fips.c
index 7939abd..edcbeac 100644
--- a/src/fips.c
+++ b/src/fips.c
@@ -102,7 +102,7 @@ _gcry_initialize_fips_mode (int force)
   static int done;
   gpg_error_t err;
 
-  /* Make sure we are not accidently called twice.  */
+  /* Make sure we are not accidentally called twice.  */
   if (done)
     {
       if ( fips_mode () )
@@ -377,7 +377,7 @@ _gcry_fips_is_operational (void)
              (GCRYCTL_INITIALIZATION_FINISHED) where the latter will
              run the selftests.  The drawback of these on-demand
              self-tests are a small chance that self-tests are
-             performed by severeal threads; that is no problem because
+             performed by several threads; that is no problem because
              our FSM make sure that we won't oversee any error. */
           unlock_fsm ();
           _gcry_fips_run_selftests (0);
diff --git a/src/gcrypt.h.in b/src/gcrypt.h.in
index 5ddeee3..93b1f43 100644
--- a/src/gcrypt.h.in
+++ b/src/gcrypt.h.in
@@ -583,7 +583,7 @@ gcry_error_t gcry_mpi_print (enum gcry_mpi_format format,
                              size_t *nwritten,
                              const gcry_mpi_t a);
 
-/* Convert the big integer A int the external representation described
+/* Convert the big integer A into the external representation described
    by FORMAT and store it in a newly allocated buffer which address
    will be put into BUFFER.  NWRITTEN receives the actual lengths of the
    external representation. */
@@ -1598,7 +1598,7 @@ gcry_error_t gcry_prime_generate (gcry_mpi_t *prime,
 /* Find a generator for PRIME where the factorization of (prime-1) is
    in the NULL terminated array FACTORS. Return the generator as a
    newly allocated MPI in R_G.  If START_G is not NULL, use this as
-   teh start for the search. */
+   the start for the search. */
 gcry_error_t gcry_prime_group_generator (gcry_mpi_t *r_g,
                                          gcry_mpi_t prime,
                                          gcry_mpi_t *factors,
diff --git a/src/global.c b/src/global.c
index 2290393..889de4c 100644
--- a/src/global.c
+++ b/src/global.c
@@ -305,7 +305,7 @@ print_config ( int (*fnc)(FILE *fp, const char *format, ...), FILE *fp)
       fnc (fp, "%s:", s);
   fnc (fp, "\n");
   /* We use y/n instead of 1/0 for the simple reason that Emacsen's
-     compile error parser would accidently flag that line when printed
+     compile error parser would accidentally flag that line when printed
      during "make check" as an error.  */
   fnc (fp, "fips-mode:%c:%c:\n",
        fips_mode ()? 'y':'n',
@@ -867,7 +867,7 @@ _gcry_free (void *p)
     return;
 
   /* In case ERRNO is set we better save it so that the free machinery
-     may not accidently change ERRNO.  We restore it only if it was
+     may not accidentally change ERRNO.  We restore it only if it was
      already set to comply with the usual C semantic for ERRNO.  */
   save_errno = errno;
   if (free_func)
diff --git a/src/sexp.c b/src/sexp.c
index f1bbffa..d063962 100644
--- a/src/sexp.c
+++ b/src/sexp.c
@@ -53,7 +53,7 @@
    data) is required as well.  The close_tag finishes the list and
    would actually be sufficient.  For fail-safe reasons a final stop
    tag is always the last byte in a buffer; it has a value of 0 so
-   that string function accidently applied to an S-expression will
+   that string function accidentally applied to an S-expression will
    never access unallocated data.  We do not support display hints and
    thus don't need to represent them.  A list may have more an
    arbitrary number of data elements but at least one is required.
diff --git a/tests/mpitests.c b/tests/mpitests.c
index d75aca9..e6f8525 100644
--- a/tests/mpitests.c
+++ b/tests/mpitests.c
@@ -426,7 +426,7 @@ test_mul (void)
 
 
 /* What we test here is that we don't overwrite our args and that
-   using thne same mpi for several args works.  */
+   using the same mpi for several args works.  */
 static int
 test_powm (void)
 {
diff --git a/tests/t-lock.c b/tests/t-lock.c
index 22b67ef..815f63b 100644
--- a/tests/t-lock.c
+++ b/tests/t-lock.c
@@ -229,7 +229,7 @@ init_accounts (void)
 }
 
 
-/* Check that the sum of all accounts matches the intial sum.  */
+/* Check that the sum of all accounts matches the initial sum.  */
 static void
 check_accounts (void)
 {
@@ -261,7 +261,7 @@ get_rand (int high)
 }
 
 
-/* Pick a random account.  Note that this fucntion is not
+/* Pick a random account.  Note that this function is not
    thread-safe. */
 static int
 pick_account (void)

-----------------------------------------------------------------------

Summary of changes:
 cipher/cipher-ocb.c    | 2 +-
 cipher/des.c           | 4 ++--
 cipher/dsa-common.c    | 2 +-
 cipher/ecc.c           | 2 +-
 cipher/pubkey.c        | 4 ++--
 cipher/rsa-common.c    | 4 ++--
 cipher/scrypt.c        | 2 +-
 random/random-csprng.c | 6 +++---
 random/random-fips.c   | 4 ++--
 random/rndw32.c        | 2 +-
 src/cipher-proto.h     | 2 +-
 src/context.c          | 2 +-
 src/fips.c             | 4 ++--
 src/gcrypt.h.in        | 4 ++--
 src/global.c           | 4 ++--
 src/sexp.c             | 2 +-
 tests/mpitests.c       | 2 +-
 tests/t-lock.c         | 4 ++--
 18 files changed, 28 insertions(+), 28 deletions(-)


hooks/post-receive
-- 
The GNU crypto library
http://git.gnupg.org


_______________________________________________
Gnupg-commits mailing list
Gnupg-commits at gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-commits




More information about the Gcrypt-devel mailing list