diff options
-rw-r--r-- | Makefile | 2 | ||||
-rw-r--r-- | buffered-reader/src/generic.rs | 2 | ||||
-rw-r--r-- | buffered-reader/src/lib.rs | 4 | ||||
-rw-r--r-- | net/src/wkd.rs | 2 | ||||
-rw-r--r-- | openpgp-ffi/src/error.rs | 4 | ||||
-rw-r--r-- | openpgp-ffi/src/packet/pkesk.rs | 2 | ||||
-rw-r--r-- | openpgp-ffi/src/serialize.rs | 2 | ||||
-rw-r--r-- | openpgp/src/autocrypt.rs | 4 | ||||
-rw-r--r-- | openpgp/src/crypto/aead.rs | 4 | ||||
-rw-r--r-- | openpgp/src/crypto/hash.rs | 2 | ||||
-rw-r--r-- | openpgp/src/crypto/s2k.rs | 2 | ||||
-rw-r--r-- | openpgp/src/crypto/symmetric.rs | 2 | ||||
-rw-r--r-- | openpgp/src/message/mod.rs | 2 | ||||
-rw-r--r-- | openpgp/src/packet/header/ctb.rs | 2 | ||||
-rw-r--r-- | openpgp/src/packet/key/mod.rs | 2 | ||||
-rw-r--r-- | openpgp/src/packet/signature/subpacket.rs | 2 | ||||
-rw-r--r-- | openpgp/src/packet/userid/rfc2822/mod.rs | 12 | ||||
-rw-r--r-- | openpgp/src/parse/parse.rs | 4 | ||||
-rw-r--r-- | openpgp/src/serialize/mod.rs | 2 | ||||
-rw-r--r-- | openpgp/src/serialize/tpk_armored.rs | 2 | ||||
-rw-r--r-- | openpgp/src/tpk/mod.rs | 4 | ||||
-rw-r--r-- | store/src/backend/mod.rs | 2 |
22 files changed, 33 insertions, 33 deletions
@@ -5,7 +5,7 @@ PREFIX ?= /usr/local DESTDIR ?= CARGO_FLAGS ?= # cargo's "target" directory. Normally, this is in the root -# directory of the project, but it can be overriden by setting +# directory of the project, but it can be overridden by setting # CARGO_TARGET_DIR. CARGO_TARGET_DIR ?= $(shell pwd)/target # We currently only support absolute paths. diff --git a/buffered-reader/src/generic.rs b/buffered-reader/src/generic.rs index 8c29bb09..67a3eeee 100644 --- a/buffered-reader/src/generic.rs +++ b/buffered-reader/src/generic.rs @@ -158,7 +158,7 @@ impl<T: io::Read, C> Generic<T, C> { } if self.error.is_some() { - // An error occured. If we have enough data to fulfill + // An error occurred. If we have enough data to fulfill // the caller's request, then delay returning the error. if let Some(ref buffer) = self.buffer { if amount > buffer.len() { diff --git a/buffered-reader/src/lib.rs b/buffered-reader/src/lib.rs index f3099343..578c2cf7 100644 --- a/buffered-reader/src/lib.rs +++ b/buffered-reader/src/lib.rs @@ -31,7 +31,7 @@ //! # Details //! //! Because the [`BufRead`] trait doesn't provide a mechanism for the -//! user to size the interal buffer, a parser can't generally be sure +//! user to size the internal buffer, a parser can't generally be sure //! that the internal buffer will be large enough to allow it to work //! with all data in place. //! @@ -164,7 +164,7 @@ //! lazily. This is done by implementing the `BufferedReader` trait //! for the framing parser, and stacking the `BufferedReader`s. //! -//! For our next example, we rewrite the previous code asssuming that +//! For our next example, we rewrite the previous code assuming that //! the object parser reads from a `BufferedReader` object. Since the //! framing parser is really just a limit on the object's size, we //! don't need to implement a special `BufferedReader`, but can use a diff --git a/net/src/wkd.rs b/net/src/wkd.rs index 9f4f9bcc..02dee7ec 100644 --- a/net/src/wkd.rs +++ b/net/src/wkd.rs @@ -185,7 +185,7 @@ impl Url { // let mut path_buf = PathBuf::new(); // path_buf.push(url.domain().unwrap()); // path_buf.push(url.path()); - // Because the domain part will disapear, dunno why. + // Because the domain part will disappear, dunno why. // url.to_file_path() would not create the directory with the domain, // but expect the hostname to match the domain. // Ignore the query part of the url, take only the domain and path. diff --git a/openpgp-ffi/src/error.rs b/openpgp-ffi/src/error.rs index 23b65c4e..3b64e250 100644 --- a/openpgp-ffi/src/error.rs +++ b/openpgp-ffi/src/error.rs @@ -99,7 +99,7 @@ pub enum Status { /// Unsupported Compression algorithm. UnsupportedCompressionAlgorithm = -28, - /// Unsupport signature type. + /// Unsupported signature type. UnsupportedSignatureType = -20, /// Invalid password. @@ -176,7 +176,7 @@ pub extern "C" fn pgp_status_to_string(status: Status) -> *const c_char { UnsupportedAEADAlgorithm => "Unsupported AEAD algorithm\x00", UnsupportedCompressionAlgorithm => "Unsupported compression algorithm\x00", - UnsupportedSignatureType => "Unsupport signature type\x00", + UnsupportedSignatureType => "Unsupported signature type\x00", InvalidPassword => "Invalid password\x00", InvalidSessionKey => "Invalid session key\x00", MissingSessionKey => "Missing session key\x00", diff --git a/openpgp-ffi/src/packet/pkesk.rs b/openpgp-ffi/src/packet/pkesk.rs index 55b1827c..8f844d6c 100644 --- a/openpgp-ffi/src/packet/pkesk.rs +++ b/openpgp-ffi/src/packet/pkesk.rs @@ -15,7 +15,7 @@ use crate::RefRaw; /// Returns the PKESK's recipient. /// -/// The return value is a reference ot a `KeyID`. The caller must not +/// The return value is a reference to a `KeyID`. The caller must not /// modify or free it. #[::sequoia_ffi_macros::extern_fn] #[no_mangle] pub extern "C" fn pgp_pkesk_recipient(pkesk: *const PKESK) diff --git a/openpgp-ffi/src/serialize.rs b/openpgp-ffi/src/serialize.rs index 918c30fb..e799888c 100644 --- a/openpgp-ffi/src/serialize.rs +++ b/openpgp-ffi/src/serialize.rs @@ -143,7 +143,7 @@ pub extern "C" fn pgp_arbitrary_writer_new /// packet, then hashes and emits the data stream, then for every key /// writes a signature packet. /// -/// The hash is performed using the algorithm specificed in +/// The hash is performed using the algorithm specified in /// `hash_algo`. Pass 0 for the default (which is what you usually /// want). #[::sequoia_ffi_macros::extern_fn] #[no_mangle] diff --git a/openpgp/src/autocrypt.rs b/openpgp/src/autocrypt.rs index d849244c..e69df6d3 100644 --- a/openpgp/src/autocrypt.rs +++ b/openpgp/src/autocrypt.rs @@ -332,7 +332,7 @@ impl AutocryptSetupMessage { /// You can set the `prefer_encrypt` setting, which defaults to /// "nopreference", using `set_prefer_encrypt`. /// - /// Note: this generates a random passcode. To retreive the + /// Note: this generates a random passcode. To retrieve the /// passcode, use the `passcode` method. /// /// To decode an Autocrypt Setup Message, use the `from_bytes` or @@ -1010,7 +1010,7 @@ In the light of the Efail vulnerability I am asking myself if it's .collect::<Vec<(usize, usize)>>() { let is_good = lower < count && count < upper; - eprintln!("{}: {} occurances{}.", + eprintln!("{}: {} occurrences{}.", i, count, if is_good { "" } else { " UNLIKELY" }); if !is_good { diff --git a/openpgp/src/crypto/aead.rs b/openpgp/src/crypto/aead.rs index 93e6ad5d..47501d60 100644 --- a/openpgp/src/crypto/aead.rs +++ b/openpgp/src/crypto/aead.rs @@ -204,7 +204,7 @@ impl<'a> Decryptor<'a> { // Note: this implementation tries *very* hard to make sure we don't // gratuitiously do a short read. Specifically, if the return value // is less than `plaintext.len()`, then it is either because we - // reached the end of the input or an error occured. + // reached the end of the input or an error occurred. fn read_helper(&mut self, plaintext: &mut [u8]) -> Result<usize> { use std::cmp::Ordering; @@ -380,7 +380,7 @@ impl<'a> Decryptor<'a> { // Note: this implementation tries *very* hard to make sure we don't // gratuitiously do a short read. Specifically, if the return value // is less than `plaintext.len()`, then it is either because we -// reached the end of the input or an error occured. +// reached the end of the input or an error occurred. impl<'a> io::Read for Decryptor<'a> { fn read(&mut self, buf: &mut [u8]) -> io::Result<usize> { match self.read_helper(buf) { diff --git a/openpgp/src/crypto/hash.rs b/openpgp/src/crypto/hash.rs index cc5ea49d..d35394b9 100644 --- a/openpgp/src/crypto/hash.rs +++ b/openpgp/src/crypto/hash.rs @@ -83,7 +83,7 @@ impl HashAlgorithm { } } - /// Creates a new Nettle hash context for this algorith. + /// Creates a new Nettle hash context for this algorithm. /// /// # Errors /// diff --git a/openpgp/src/crypto/s2k.rs b/openpgp/src/crypto/s2k.rs index 44655613..2a819c47 100644 --- a/openpgp/src/crypto/s2k.rs +++ b/openpgp/src/crypto/s2k.rs @@ -74,7 +74,7 @@ impl Default for S2K { } impl S2K { - /// Convert the string to a key using the S2K's paramters. + /// Convert the string to a key using the S2K's parameters. pub fn derive_key(&self, string: &Password, key_size: usize) -> Result<SessionKey> { match self { diff --git a/openpgp/src/crypto/symmetric.rs b/openpgp/src/crypto/symmetric.rs index 61c7dcd0..5ca999ad 100644 --- a/openpgp/src/crypto/symmetric.rs +++ b/openpgp/src/crypto/symmetric.rs @@ -194,7 +194,7 @@ fn read_exact<R: io::Read>(reader: &mut R, mut buffer: &mut [u8]) // Note: this implementation tries *very* hard to make sure we don't // gratuitiously do a short read. Specifically, if the return value // is less than `plaintext.len()`, then it is either because we -// reached the end of the input or an error occured. +// reached the end of the input or an error occurred. impl<R: io::Read> io::Read for Decryptor<R> { fn read(&mut self, plaintext: &mut [u8]) -> io::Result<usize> { let mut pos = 0; diff --git a/openpgp/src/message/mod.rs b/openpgp/src/message/mod.rs index cdf3d1d9..2e1981e0 100644 --- a/openpgp/src/message/mod.rs +++ b/openpgp/src/message/mod.rs @@ -963,7 +963,7 @@ mod tests { // There are no simple constructors for SEIP packets: they are // interleaved with SK-ESK and PK-ESK packets. And, the // session key needs to be managed. Instead, we use some - // internal iterfaces to progressively build up more + // internal interfaces to progressively build up more // complicated messages. let mut lit = Literal::new(Text); diff --git a/openpgp/src/packet/header/ctb.rs b/openpgp/src/packet/header/ctb.rs index fbe81a9a..1a6565a4 100644 --- a/openpgp/src/packet/header/ctb.rs +++ b/openpgp/src/packet/header/ctb.rs @@ -109,7 +109,7 @@ impl From<PacketLengthType> for u8 { pub struct CTBOld { /// Common CTB fields. common: CTBCommon, - /// Type of length sepcifier. + /// Type of length specifier. pub length_type: PacketLengthType, } diff --git a/openpgp/src/packet/key/mod.rs b/openpgp/src/packet/key/mod.rs index 22636759..5cea7423 100644 --- a/openpgp/src/packet/key/mod.rs +++ b/openpgp/src/packet/key/mod.rs @@ -409,7 +409,7 @@ macro_rules! create_conversions { { /// Changes the key's parts tag to `PublicParts`. pub fn mark_parts_public(self) -> $Key<PublicParts, R> { - // Ideally, we'd use self.into() to do the actualy + // Ideally, we'd use self.into() to do the actually // conversion. But, because P is not concrete, we get the // following error: // diff --git a/openpgp/src/packet/signature/subpacket.rs b/openpgp/src/packet/signature/subpacket.rs index 7d3a4c27..9d0d0c92 100644 --- a/openpgp/src/packet/signature/subpacket.rs +++ b/openpgp/src/packet/signature/subpacket.rs @@ -319,7 +319,7 @@ pub struct SubpacketArea { // The subpacket area, but parsed so that the map is indexed by // the subpacket tag, and the value corresponds to the *last* - // occurance of that subpacket in the subpacket area. + // occurrence of that subpacket in the subpacket area. // // Since self-referential structs are a no-no, we use (start, len) // to reference the content in the area. diff --git a/openpgp/src/packet/userid/rfc2822/mod.rs b/openpgp/src/packet/userid/rfc2822/mod.rs index af4a3ef5..f30a6631 100644 --- a/openpgp/src/packet/userid/rfc2822/mod.rs +++ b/openpgp/src/packet/userid/rfc2822/mod.rs @@ -1273,18 +1273,18 @@ mod tests { // Try some URIs for completeness. Test { - input: "ssh://user:pasword@example.org/resource", + input: "ssh://user:password@example.org/resource", output: Some(vec![ Component::InvalidAddress( - e(), "ssh://user:pasword@example.org/resource".into()) + e(), "ssh://user:password@example.org/resource".into()) ]) }, Test { - input: "(not a comment) ssh://user:pasword@example.org/resource", + input: "(not a comment) ssh://user:password@example.org/resource", output: Some(vec![ Component::InvalidAddress( - e(), "(not a comment) ssh://user:pasword@example.org/resource".into()) + e(), "(not a comment) ssh://user:password@example.org/resource".into()) ]) }, @@ -1481,11 +1481,11 @@ mod tests { c("Willi Wonka", Some(vec![ Component::Text("Willi Wonka".into()) ])); - // As an extention we unquoted dots. + // As an extension we unquoted dots. c("Willi A. Wonka", Some(vec![ Component::Text("Willi A. Wonka".into()) ])); - // As an extention we unquoted ats. + // As an extension we unquoted ats. c("foo@example.org", Some(vec![ Component::Text("foo@example.org".into()) ])); } diff --git a/openpgp/src/parse/parse.rs b/openpgp/src/parse/parse.rs index 5a5a356e..d57e9b52 100644 --- a/openpgp/src/parse/parse.rs +++ b/openpgp/src/parse/parse.rs @@ -3303,7 +3303,7 @@ impl <'a> PacketParser<'a> { match self.packet.tag() { Tag::SEIP | Tag::AED | Tag::SED | Tag::CompressedData => { // We didn't (fully) process a container's content. Add - // this as opaque conent to the message validator. + // this as opaque content to the message validator. let mut path = self.path().to_vec(); path.push(0); self.state.message_validator.push_token( @@ -3539,7 +3539,7 @@ impl<'a> PacketParser<'a> { Packet::SEIP(_) => { // Get the first blocksize plus two bytes and check // whether we can decrypt them using the provided key. - // Don't actually comsume them in case we can't. + // Don't actually consume them in case we can't. let bl = algo.block_size()?; { diff --git a/openpgp/src/serialize/mod.rs b/openpgp/src/serialize/mod.rs index 949ea519..96f8b17d 100644 --- a/openpgp/src/serialize/mod.rs +++ b/openpgp/src/serialize/mod.rs @@ -2691,7 +2691,7 @@ mod test { // 1. Read the message into a local buffer. let data = crate::tests::message(filename); - // 2. Do a shallow parse of the messsage. In other words, + // 2. Do a shallow parse of the message. In other words, // never recurse so that the resulting message only // contains the top-level packets. Any containers will // have their raw content stored in packet.content. diff --git a/openpgp/src/serialize/tpk_armored.rs b/openpgp/src/serialize/tpk_armored.rs index 8c4c3253..47940af7 100644 --- a/openpgp/src/serialize/tpk_armored.rs +++ b/openpgp/src/serialize/tpk_armored.rs @@ -241,7 +241,7 @@ mod tests { // Create userids one character longer than the size allowed in the // header and expect headers with the correct length. - // 1 byte characer + // 1 byte character // Can not use `to_string` here because not such method for //`std::vec::Vec<char>` let userid1: String = vec!['a'; length_value + 1].into_iter() diff --git a/openpgp/src/tpk/mod.rs b/openpgp/src/tpk/mod.rs index 329ac33a..263f41a6 100644 --- a/openpgp/src/tpk/mod.rs +++ b/openpgp/src/tpk/mod.rs @@ -1427,7 +1427,7 @@ impl TPK { // Note: just because the TPK doesn't indicate that a key is a // designed revoker doesn't mean that it isn't---we might just // be missing the signature. In other words, this is a policy - // decision, but given how easy it could be to create rouge + // decision, but given how easy it could be to create rogue // revocations, is probably the better to reject such // signatures than to keep them around and have many keys // being shown as "potentially revoked". @@ -1692,7 +1692,7 @@ mod test { .merge(tpk_add_subkey_1.clone()).unwrap(); assert_eq!(tpk_all_subkeys, merged); - // Merge alot. + // Merge a lot. let merged = tpk_base.clone() .merge(tpk_add_subkey_1.clone()).unwrap() .merge(tpk_add_subkey_1.clone()).unwrap() diff --git a/store/src/backend/mod.rs b/store/src/backend/mod.rs index 1734af0a..f81e6eb0 100644 --- a/store/src/backend/mod.rs +++ b/store/src/backend/mod.rs @@ -766,7 +766,7 @@ impl KeyServer { /// Merges other into this key updating the database. /// - /// Returnes the merged key as blob. + /// Returns the merged key as blob. fn merge(&self, other: TPK) -> Result<Vec<u8>> { let mut new = other; |