[git] GCRYPT - branch, master, updated. libgcrypt-1.7.3-79-g9b651fb

by NIIBE Yutaka cvs at cvs.gnupg.org
Fri Apr 28 02:37:37 CEST 2017


This is an automated email from the git hooks/post-receive script. It was
generated because a ref change was pushed to the repository containing
the project "The GNU crypto library".

The branch, master has been updated
       via  9b651fb632f3697e70685c9ee340ab0cb2274bdf (commit)
      from  719468e53133d3bdf12156c5bfdea2bf15f9f6f1 (commit)

Those revisions listed above that are new to this repository have
not appeared on any other notification email; so we list those
revisions in full, below.

- Log -----------------------------------------------------------------
commit 9b651fb632f3697e70685c9ee340ab0cb2274bdf
Author: NIIBE Yutaka <gniibe at fsij.org>
Date:   Fri Apr 28 09:27:00 2017 +0900

    Spelling fixes in docs and comments.
    
    --
    
    GnuPG-bug-id: 3120
    Reported-by: ka7 (klemens)
    Signed-off-by: NIIBE Yutaka <gniibe at fsij.org>

diff --git a/TODO b/TODO
index ffadc06..7aa4de1 100644
--- a/TODO
+++ b/TODO
@@ -18,7 +18,7 @@
 
 * Add attributes to the MPI functions.
 
-* cipher/pubkey.c and pubkey implementaions.
+* cipher/pubkey.c and pubkey implementations.
   Don't rely on the secure memory based wiping function but add an
   extra wiping.
   
diff --git a/acinclude.m4 b/acinclude.m4
index dcdadfd..fc208c5 100644
--- a/acinclude.m4
+++ b/acinclude.m4
@@ -29,7 +29,7 @@ define([GCRY_MSG_SHOW],
 
 dnl GCRY_MSG_WRAP(PREFIX, ALGOLIST)
 dnl Print a nicely formatted list of algorithms
-dnl with an approriate line wrap.
+dnl with an appropriate line wrap.
 dnl
 define([GCRY_MSG_WRAP],
   [
@@ -275,7 +275,7 @@ AC_CHECK_TOOL(AS, as, false)
 ])
 
 dnl LIST_MEMBER()
-dnl Check wether an element ist contained in a list.  Set `found' to
+dnl Check whether an element ist contained in a list.  Set `found' to
 dnl `1' if the element is found in the list, to `0' otherwise.
 AC_DEFUN([LIST_MEMBER],
 [
diff --git a/build-aux/texinfo.tex b/build-aux/texinfo.tex
index a181898..5a17f97 100644
--- a/build-aux/texinfo.tex
+++ b/build-aux/texinfo.tex
@@ -415,7 +415,7 @@
 \def\argremovecomment#1\comment#2\ArgTerm{\argremovec #1\c\ArgTerm}
 \def\argremovec#1\c#2\ArgTerm{\argcheckspaces#1\^^M\ArgTerm}
 
-% Each occurence of `\^^M' or `<space>\^^M' is replaced by a single space.
+% Each occurrence of `\^^M' or `<space>\^^M' is replaced by a single space.
 %
 % \argremovec might leave us with trailing space, e.g.,
 %    @end itemize  @c foo
@@ -440,7 +440,7 @@
 % to get _exactly_ the rest of the line, we had to prevent such situation.
 % We prepended an \empty token at the very beginning and we expand it now,
 % just before passing the control to \argtorun.
-% (Similarily, we have to think about #3 of \argcheckspacesY above: it is
+% (Similarly, we have to think about #3 of \argcheckspacesY above: it is
 % either the null string, or it ends with \^^M---thus there is no danger
 % that a pair of braces would be stripped.
 %
@@ -497,7 +497,7 @@
 % used to check whether the current environment is the one expected.
 %
 % Non-false conditionals (@iftex, @ifset) don't fit into this, so they
-% are not treated as enviroments; they don't open a group.  (The
+% are not treated as environments; they don't open a group.  (The
 % implementation of @end takes care not to call \endgroup in this
 % special case.)
 
@@ -520,7 +520,7 @@
   \fi
 }
 
-% Evironment mismatch, #1 expected:
+% Environment mismatch, #1 expected:
 \def\badenverr{%
   \errhelp = \EMsimple
   \errmessage{This command can appear only \inenvironment\temp,
@@ -7034,7 +7034,7 @@ end
 % In case a @footnote appears in a vbox, save the footnote text and create
 % the real \insert just after the vbox finished.  Otherwise, the insertion
 % would be lost.
-% Similarily, if a @footnote appears inside an alignment, save the footnote
+% Similarly, if a @footnote appears inside an alignment, save the footnote
 % text to a box and make the \insert when a row of the table is finished.
 % And the same can be done for other insert classes.  --kasal, 16nov03.
 
diff --git a/cipher/cipher-internal.h b/cipher/cipher-internal.h
index ea9c33d..b748125 100644
--- a/cipher/cipher-internal.h
+++ b/cipher/cipher-internal.h
@@ -124,7 +124,7 @@ struct gcry_cipher_handle
   /* A structure with function pointers for bulk operations.  Due to
      limitations of the module system (we don't want to change the
      API) we need to keep these function pointers here.  The cipher
-     open function intializes them and the actual encryption routines
+     open function initializes them and the actual encryption routines
      use them if they are not NULL.  */
   struct {
     void (*cfb_enc)(void *context, unsigned char *iv,
diff --git a/cipher/cipher.c b/cipher/cipher.c
index 124700e..9812738 100644
--- a/cipher/cipher.c
+++ b/cipher/cipher.c
@@ -1006,7 +1006,7 @@ _gcry_cipher_encrypt (gcry_cipher_hd_t h, void *out, size_t outsize,
 /****************
  * Decrypt INBUF to OUTBUF with the mode selected at open.
  * inbuf and outbuf may overlap or be the same.
- * Depending on the mode some some contraints apply to INBUFLEN.
+ * Depending on the mode some some constraints apply to INBUFLEN.
  */
 static gcry_err_code_t
 cipher_decrypt (gcry_cipher_hd_t c, byte *outbuf, size_t outbuflen,
diff --git a/cipher/ecc-misc.c b/cipher/ecc-misc.c
index 8f7b8c4..41debe4 100644
--- a/cipher/ecc-misc.c
+++ b/cipher/ecc-misc.c
@@ -333,7 +333,7 @@ _gcry_ecc_mont_decodepoint (gcry_mpi_t pk, mpi_ec_t ctx, mpi_point_t result)
        * 0x40 for x-only coordinate.
        *
        * For data with older implementation (non-released development
-       * version), it is possibe to have the 0x40 as a part of data.
+       * version), it is possible to have the 0x40 as a part of data.
        * Besides, when data was parsed as MPI, we might have 0x00
        * prefix.
        *
diff --git a/cipher/primegen.c b/cipher/primegen.c
index cccda84..c7977d1 100644
--- a/cipher/primegen.c
+++ b/cipher/primegen.c
@@ -1301,7 +1301,7 @@ find_x931_prime (const gcry_mpi_t pfirst)
   mpi_set_bit (prime, 0);
 
   /* We use 64 Rabin-Miller rounds which is better and thus
-     sufficient.  We do not have a Lucas test implementaion thus we
+     sufficient.  We do not have a Lucas test implementation thus we
      can't do it in the X9.31 preferred way of running a few
      Rabin-Miller followed by one Lucas test.  */
   while ( !check_prime (prime, val_2, 64, NULL, NULL) )
diff --git a/cipher/rsa-common.c b/cipher/rsa-common.c
index 7b56237..29b7bc8 100644
--- a/cipher/rsa-common.c
+++ b/cipher/rsa-common.c
@@ -233,7 +233,7 @@ _gcry_rsa_pkcs1_decode_for_enc (unsigned char **r_result, size_t *r_resultlen,
 }
 
 
-/* Encode {VALUE,VALUELEN} for an NBITS keys and hash algorith ALGO
+/* Encode {VALUE,VALUELEN} for an NBITS keys and hash algorithm ALGO
    using the pkcs#1 block type 1 padding.  On success the result is
    stored as a new MPI at R_RESULT.  On error the value at R_RESULT is
    undefined.
diff --git a/cipher/rsa.c b/cipher/rsa.c
index b6c7374..895ee04 100644
--- a/cipher/rsa.c
+++ b/cipher/rsa.c
@@ -710,7 +710,7 @@ generate_x931 (RSA_secret_key *sk, unsigned int nbits, unsigned long e_value,
   if (e_value < 3)
     return GPG_ERR_INV_VALUE;
 
-  /* Our implementaion requires E to be odd.  */
+  /* Our implementation requires E to be odd.  */
   if (!(e_value & 1))
     return GPG_ERR_INV_VALUE;
 
diff --git a/compat/clock.c b/compat/clock.c
index 7f250f3..2a2c205 100644
--- a/compat/clock.c
+++ b/compat/clock.c
@@ -23,7 +23,7 @@ clock_t
 _gcry_clock (void)
 {
   assert (CLOCKS_PER_SEC == 1000);
-#warning Replace by a correct implementaion.
+#warning Replace by a correct implementation.
   /* It seems that GetProcessTimes is available in the kernel but
      without a declaration.  If that fails we would need to walk over
      all threads and tally up the GetThreadTimes.  */
diff --git a/configure.ac b/configure.ac
index 2609b41..7ea0b6a 100644
--- a/configure.ac
+++ b/configure.ac
@@ -339,7 +339,7 @@ AC_ARG_ENABLE(endian-check,
 if test x"$endiancheck" = xyes ; then
   AC_C_BIGENDIAN
 else
-  AC_DEFINE(DISABLED_ENDIAN_CHECK,1,[configure did not test for endianess])
+  AC_DEFINE(DISABLED_ENDIAN_CHECK,1,[configure did not test for endianness])
 fi
 
 AC_CHECK_SIZEOF(unsigned short, 2)
@@ -1736,7 +1736,7 @@ AC_REPLACE_FUNCS([getpid clock])
 
 
 #
-# Check wether it is necessary to link against libdl.
+# Check whether it is necessary to link against libdl.
 #
 DL_LIBS=""
 if test "$use_hmac_binary_check" = yes ; then
diff --git a/doc/gcrypt.texi b/doc/gcrypt.texi
index 4cdf75d..464c673 100644
--- a/doc/gcrypt.texi
+++ b/doc/gcrypt.texi
@@ -95,7 +95,7 @@ section entitled ``GNU General Public License''.
 * Prime numbers::                How to use the Prime number related functions.
 * Utilities::                    Utility functions.
 * Tools::                        Utility tools.
-* Configuration::                Configuration files and evironment variables.
+* Configuration::                Configuration files and environment variables.
 * Architecture::                 How Libgcrypt works internally.
 
 Appendices
@@ -5391,7 +5391,7 @@ Print version of the program and exit.
 @c ****************  Environment Variables  *****************
 @c **********************************************************
 @node Configuration
- at chapter Configuration files and evironment variables
+ at chapter Configuration files and environment variables
 
 This chapter describes which files and environment variables can be
 used to change the behaviour of Libgcrypt.
@@ -5869,7 +5869,7 @@ to mix in enough data from the gather modules before returning the
 actual random output.  Process fork detection and protection is
 implemented.
 
- at c FIXME:  The design and implementaion needs a more verbose description.
+ at c FIXME:  The design and implementation needs a more verbose description.
 
 The implementation of the nonce generator (for
 @code{gcry_create_nonce}) is a straightforward repeated hash design: A
diff --git a/mpi/alpha/README b/mpi/alpha/README
index 55c0a29..00addfd 100644
--- a/mpi/alpha/README
+++ b/mpi/alpha/README
@@ -5,7 +5,7 @@ RELEVANT OPTIMIZATION ISSUES
 EV4
 
 1. This chip has very limited store bandwidth.  The on-chip L1 cache is
-write-through, and a cache line is transfered from the store buffer to the
+write-through, and a cache line is transferred from the store buffer to the
 off-chip L2 in as much 15 cycles on most systems.  This delay hurts
 mpn_add_n, mpn_sub_n, mpn_lshift, and mpn_rshift.
 
@@ -20,7 +20,7 @@ EV5
 
 1. The memory bandwidth of this chip seems excellent, both for loads and
 stores.  Even when the working set is larger than the on-chip L1 and L2
-caches, the perfromance remain almost unaffected.
+caches, the performance remain almost unaffected.
 
 2. mulq has a measured latency of 13 cycles and an issue rate of 1 each 8th
 cycle.  umulh has a measured latency of 15 cycles and an issue rate of 1
diff --git a/mpi/ec.c b/mpi/ec.c
index 26dd947..016af00 100644
--- a/mpi/ec.c
+++ b/mpi/ec.c
@@ -35,7 +35,7 @@
 #define point_free(a)  _gcry_mpi_point_free_parts ((a))
 
 
-/* Print a point using the log fucntions.  If CTX is not NULL affine
+/* Print a point using the log functions.  If CTX is not NULL affine
    coordinates will be printed.  */
 void
 _gcry_mpi_point_log (const char *name, mpi_point_t point, mpi_ec_t ctx)
diff --git a/mpi/mips3/README b/mpi/mips3/README
index e94b2c7..4ba4546 100644
--- a/mpi/mips3/README
+++ b/mpi/mips3/README
@@ -9,7 +9,7 @@ RELEVANT OPTIMIZATION ISSUES
 
    On the R4600, branches takes a single cycle
 
-   On the R8000, branches often take no noticable cycles, as they are
+   On the R8000, branches often take no noticeable cycles, as they are
    executed in a separate function unit..
 
 2. The R4000 and R4400 have a load latency of 4 cycles.
diff --git a/random/random-drbg.c b/random/random-drbg.c
index baaa65a..7f66997 100644
--- a/random/random-drbg.c
+++ b/random/random-drbg.c
@@ -2433,7 +2433,7 @@ drbg_healthcheck_sanity (struct gcry_drbg_test_vector *test)
     goto outbuf;
   max_addtllen = drbg_max_addtl ();
   max_request_bytes = drbg_max_request_bytes ();
-  /* overflow addtllen with additonal info string */
+  /* overflow addtllen with additional info string */
   drbg_string_fill (&addtl, test->addtla, (max_addtllen + 1));
   len = drbg_generate (drbg, buf, test->expectedlen, &addtl);
   if (len)
diff --git a/random/rndhw.c b/random/rndhw.c
index e3a7861..2829382 100644
--- a/random/rndhw.c
+++ b/random/rndhw.c
@@ -61,7 +61,7 @@ poll_padlock (void (*add)(const void*, size_t, enum random_origins),
 
   /* Peter Gutmann's cryptlib tests again whether the RNG is enabled
      but we don't do so.  We would have to do this also for our AES
-     implementaion and that is definitely too time consuming.  There
+     implementation and that is definitely too time consuming.  There
      would be a race condition anyway.  Thus we assume that the OS
      does not change the Padlock initialization while a user process
      is running.  */
diff --git a/random/rndunix.c b/random/rndunix.c
index e7238f4..fcb45b7 100644
--- a/random/rndunix.c
+++ b/random/rndunix.c
@@ -319,7 +319,7 @@ static struct RI {
     {	"/usr/bin/lpstat", "-t", SC(0.1), NULL, 0, 0, 0, 1 },
     {	"/usr/ucb/lpstat", "-t", SC(0.1), NULL, 0, 0, 0, 0 },
     {	"/usr/bin/tcpdump", "-c 5 -efvvx", SC(1), NULL, 0, 0, 0, 0 },
-    /* This is very environment-dependant.  If network traffic is low, it'll
+    /* This is very environment-dependent.  If network traffic is low, it'll
      * probably time out before delivering 5 packets, which is OK because
      * it'll probably be fixed stuff like ARP anyway */
     {	"/usr/sbin/advfsstat", "-b usr_domain",
diff --git a/random/rndw32.c b/random/rndw32.c
index 8c507ac..1dec5a7 100644
--- a/random/rndw32.c
+++ b/random/rndw32.c
@@ -184,7 +184,7 @@ typedef struct
   double ssHigh;                  /* Highest readout */
   long ssCount;                   /* Total number of readout */
   char sspadding2[4];             /* Padding of 4 bytes */
-  long double ssTotal;            /* Total amout of all readouts */
+  long double ssTotal;            /* Total amount of all readouts */
   char sspadding3[6];             /* Padding of 6 bytes */
   double ssAlarm1;                /* Temp & fan: high alarm; voltage: % off */
   double ssAlarm2;                /* Temp: low alarm */
@@ -221,7 +221,7 @@ typedef struct
 
 
 
-/* One time intialized handles and function pointers.  We use dynamic
+/* One time initialized handles and function pointers.  We use dynamic
    loading of the DLLs to do without them in case libgcrypt does not
    need any random.  */
 static HANDLE hNetAPI32;
@@ -246,7 +246,7 @@ static int system_rng_available; /* Whether a system RNG is available.  */
 static HCRYPTPROV hRNGProv;      /* Handle to Intel RNG CSP. */
 
 /* The debug flag.  Debugging is enabled if the value of the envvar
- * GCRY_RNDW32_DBG is a postive number.*/
+ * GCRY_RNDW32_DBG is a positive number.*/
 static int debug_me;
 
 static int system_is_w2000;     /* True if running on W2000.  */
diff --git a/src/gcrypt.h.in b/src/gcrypt.h.in
index 5727abb..8e49967 100644
--- a/src/gcrypt.h.in
+++ b/src/gcrypt.h.in
@@ -391,7 +391,7 @@ gcry_error_t gcry_sexp_build_array (gcry_sexp_t *retsexp, size_t *erroff,
 /* Release the S-expression object SEXP */
 void gcry_sexp_release (gcry_sexp_t sexp);
 
-/* Calculate the length of an canonized S-expresion in BUFFER and
+/* Calculate the length of an canonized S-expression in BUFFER and
    check for a valid encoding. */
 size_t gcry_sexp_canon_len (const unsigned char *buffer, size_t length,
                             size_t *erroff, gcry_error_t *errcode);
@@ -1669,7 +1669,7 @@ gcry_error_t gcry_prime_group_generator (gcry_mpi_t *r_g,
 void gcry_prime_release_factors (gcry_mpi_t *factors);
 
 
-/* Check wether the number X is prime.  */
+/* Check whether the number X is prime.  */
 gcry_error_t gcry_prime_check (gcry_mpi_t x, unsigned int flags);
 
 
diff --git a/src/global.c b/src/global.c
index 25815dd..0796a94 100644
--- a/src/global.c
+++ b/src/global.c
@@ -581,7 +581,7 @@ _gcry_vcontrol (enum gcry_ctl_cmds cmd, va_list arg_ptr)
       _gcry_set_preferred_rng_type (0);
       if (!any_init_done)
         {
-          /* Not yet intialized at all.  Set a flag so that we are put
+          /* Not yet initialized at all.  Set a flag so that we are put
              into fips mode during initialization.  */
           force_fips_mode = 1;
         }
diff --git a/src/secmem.c b/src/secmem.c
index 55424f2..8eb6630 100644
--- a/src/secmem.c
+++ b/src/secmem.c
@@ -91,7 +91,7 @@ typedef struct pooldesc_s
 static pooldesc_t mainpool;
 
 
-/* A couple of flags whith some beeing set early. */
+/* A couple of flags whith some being set early. */
 static int disable_secmem;
 static int show_warning;
 static int not_locked;
diff --git a/tests/basic.c b/tests/basic.c
index 342bf73..89b7917 100644
--- a/tests/basic.c
+++ b/tests/basic.c
@@ -5549,7 +5549,7 @@ check_stream_cipher_large_block (void)
 
 
 
-/* Check that our bulk encryption fucntions work properly.  */
+/* Check that our bulk encryption functions work properly.  */
 static void
 check_bulk_cipher_modes (void)
 {
diff --git a/tests/bench-slope.c b/tests/bench-slope.c
index 6d93ad2..75e6e43 100644
--- a/tests/bench-slope.c
+++ b/tests/bench-slope.c
@@ -1345,7 +1345,7 @@ cipher_bench_one (int algo, struct bench_cipher_mode *pmode)
   if (mode.mode == GCRY_CIPHER_MODE_XTS && blklen != GCRY_XTS_BLOCK_LEN)
     return;
 
-  /* Our OCB implementaion has restrictions for block-size.  */
+  /* Our OCB implementation has restrictions for block-size.  */
   if (mode.mode == GCRY_CIPHER_MODE_OCB && blklen != GCRY_OCB_BLOCK_LEN)
     return;
 
diff --git a/tests/cavs_driver.pl b/tests/cavs_driver.pl
index b95e9b1..bc93feb 100755
--- a/tests/cavs_driver.pl
+++ b/tests/cavs_driver.pl
@@ -1381,7 +1381,7 @@ sub rsa_siggen($$$) {
 
 # RSA SigVer test
 # $1: Message to be verified in hex form
-# $2: Hash algoritm
+# $2: Hash algorithm
 # $3: Signature of message in hex form
 # $4: n of the RSA key in hex in hex form
 # $5: e of the RSA key in hex in hex form
diff --git a/tests/hashtest.c b/tests/hashtest.c
index d79d104..2ecbc1f 100644
--- a/tests/hashtest.c
+++ b/tests/hashtest.c
@@ -1,4 +1,4 @@
-/* hashtest.c - Check the hash fucntions
+/* hashtest.c - Check the hash functions
  * Copyright (C) 2013 g10 Code GmbH
  *
  * This file is part of Libgcrypt.
diff --git a/tests/t-lock.c b/tests/t-lock.c
index 679a5f1..7e5732e 100644
--- a/tests/t-lock.c
+++ b/tests/t-lock.c
@@ -213,7 +213,7 @@ check_nonce_lock (void)
 }
 
 
-/* Initialze all accounts.  */
+/* Initialize all accounts.  */
 static void
 init_accounts (void)
 {

-----------------------------------------------------------------------

Summary of changes:
 TODO                     |  2 +-
 acinclude.m4             |  4 ++--
 build-aux/texinfo.tex    | 10 +++++-----
 cipher/cipher-internal.h |  2 +-
 cipher/cipher.c          |  2 +-
 cipher/ecc-misc.c        |  2 +-
 cipher/primegen.c        |  2 +-
 cipher/rsa-common.c      |  2 +-
 cipher/rsa.c             |  2 +-
 compat/clock.c           |  2 +-
 configure.ac             |  4 ++--
 doc/gcrypt.texi          |  6 +++---
 mpi/alpha/README         |  4 ++--
 mpi/ec.c                 |  2 +-
 mpi/mips3/README         |  2 +-
 random/random-drbg.c     |  2 +-
 random/rndhw.c           |  2 +-
 random/rndunix.c         |  2 +-
 random/rndw32.c          |  6 +++---
 src/gcrypt.h.in          |  4 ++--
 src/global.c             |  2 +-
 src/secmem.c             |  2 +-
 tests/basic.c            |  2 +-
 tests/bench-slope.c      |  2 +-
 tests/cavs_driver.pl     |  2 +-
 tests/hashtest.c         |  2 +-
 tests/t-lock.c           |  2 +-
 27 files changed, 39 insertions(+), 39 deletions(-)


hooks/post-receive
-- 
The GNU crypto library
http://git.gnupg.org


_______________________________________________
Gnupg-commits mailing list
Gnupg-commits at gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-commits




More information about the Gcrypt-devel mailing list