summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--openpgp/src/cert/amalgamation.rs2
-rw-r--r--openpgp/src/cert/mod.rs4
-rw-r--r--openpgp/src/crypto/mem.rs2
-rw-r--r--openpgp/src/packet/signature/subpacket.rs2
-rw-r--r--tool/src/sq-usage.rs2
-rw-r--r--tool/src/sq_cli.rs2
6 files changed, 7 insertions, 7 deletions
diff --git a/openpgp/src/cert/amalgamation.rs b/openpgp/src/cert/amalgamation.rs
index 42a0fc5f..019b11b5 100644
--- a/openpgp/src/cert/amalgamation.rs
+++ b/openpgp/src/cert/amalgamation.rs
@@ -80,7 +80,7 @@
//! A consequence of this approach is that even if the self signature
//! were considered expired at the time the signature was evaluated
//! (e.g., "now"), this fact doesn't invalidate the signature. That
-//! is, a self siganture's lifetime does not impact a signature's
+//! is, a self signature's lifetime does not impact a signature's
//! lifetime; a signature's lifetime is defined by its own creation
//! time and expiry. Similarly, a key's lifetime is defined by its
//! own creation time and expiry.
diff --git a/openpgp/src/cert/mod.rs b/openpgp/src/cert/mod.rs
index 868437a7..ac7d1252 100644
--- a/openpgp/src/cert/mod.rs
+++ b/openpgp/src/cert/mod.rs
@@ -4394,7 +4394,7 @@ mod test {
check(p, &cert, false, selfsig0);
check(p, &cert, true, now);
- // A newer self siganture.
+ // A newer self signature.
let cert = cert.merge(
Cert::from_bytes(
crate::tests::key(
@@ -4663,7 +4663,7 @@ Pu1xwz57O4zo1VYf6TqHJzVC3OMvMUM2hhdecMUe5x6GorNaj6g=
.primary_userid().unwrap().userid().value(),
b"Eminem");
- // A newer self siganture for "Slim Shady". Unlike for Certs, this
+ // A newer self signature for "Slim Shady". Unlike for Certs, this
// does NOT trump everything.
let cert = cert.merge(
Cert::from_bytes(
diff --git a/openpgp/src/crypto/mem.rs b/openpgp/src/crypto/mem.rs
index fbccde9b..5418286c 100644
--- a/openpgp/src/crypto/mem.rs
+++ b/openpgp/src/crypto/mem.rs
@@ -1,7 +1,7 @@
//! Memory protection and encryption.
//!
//! Sequoia makes an effort to protect secrets stored in memory. Even
-//! though a process' memory should be protected from being read by an
+//! though a process's memory should be protected from being read by an
//! adversary, there may be bugs in the program or the architecture
//! the program is running on that allow (partial) recovery of data.
//! Or, the process may be serialized to persistent storage, and its
diff --git a/openpgp/src/packet/signature/subpacket.rs b/openpgp/src/packet/signature/subpacket.rs
index 06f0fcd3..dd06f6bb 100644
--- a/openpgp/src/packet/signature/subpacket.rs
+++ b/openpgp/src/packet/signature/subpacket.rs
@@ -5633,7 +5633,7 @@ impl signature::SignatureBuilder {
/// let sig = SignatureBuilder::from(
/// alice
/// .with_policy(p, None)?
- /// .direct_key_signature().expect("Direct key siganture")
+ /// .direct_key_signature().expect("Direct key signature")
/// .clone()
/// )
/// .set_policy_uri("https://example.org/~alice/signing-policy.txt")?
diff --git a/tool/src/sq-usage.rs b/tool/src/sq-usage.rs
index 0312d07f..05814ced 100644
--- a/tool/src/sq-usage.rs
+++ b/tool/src/sq-usage.rs
@@ -16,7 +16,7 @@
//! OPTIONS:
//! --home <DIRECTORY> Sets the home directory to use
//! --known-notation <NOTATION>... The notation name is considered known. This is used when validating
-//! sigantures. Signatures that have unknown notations with the critical bit set
+//! signatures. Signatures that have unknown notations with the critical bit set
//! are considered invalid.
//! -m, --mapping <MAPPING> Sets the realm and mapping to use [default: org.sequoia-pgp.contacts/default]
//! -p, --policy <NETWORK-POLICY> Sets the network policy to use
diff --git a/tool/src/sq_cli.rs b/tool/src/sq_cli.rs
index fb98cd65..93b15bac 100644
--- a/tool/src/sq_cli.rs
+++ b/tool/src/sq_cli.rs
@@ -34,7 +34,7 @@ pub fn build() -> App<'static, 'static> {
.value_name("NOTATION")
.number_of_values(1)
.help("The notation name is considered known. \
- This is used when validating sigantures. \
+ This is used when validating signatures. \
Signatures that have unknown notations with the \
critical bit set are considered invalid."))
.subcommand(SubCommand::with_name("decrypt")