diff options
-rw-r--r-- | openpgp/src/cert/amalgamation.rs | 2 | ||||
-rw-r--r-- | openpgp/src/cert/mod.rs | 4 | ||||
-rw-r--r-- | openpgp/src/crypto/mem.rs | 2 | ||||
-rw-r--r-- | openpgp/src/packet/signature/subpacket.rs | 2 | ||||
-rw-r--r-- | tool/src/sq-usage.rs | 2 | ||||
-rw-r--r-- | tool/src/sq_cli.rs | 2 |
6 files changed, 7 insertions, 7 deletions
diff --git a/openpgp/src/cert/amalgamation.rs b/openpgp/src/cert/amalgamation.rs index 42a0fc5f..019b11b5 100644 --- a/openpgp/src/cert/amalgamation.rs +++ b/openpgp/src/cert/amalgamation.rs @@ -80,7 +80,7 @@ //! A consequence of this approach is that even if the self signature //! were considered expired at the time the signature was evaluated //! (e.g., "now"), this fact doesn't invalidate the signature. That -//! is, a self siganture's lifetime does not impact a signature's +//! is, a self signature's lifetime does not impact a signature's //! lifetime; a signature's lifetime is defined by its own creation //! time and expiry. Similarly, a key's lifetime is defined by its //! own creation time and expiry. diff --git a/openpgp/src/cert/mod.rs b/openpgp/src/cert/mod.rs index 868437a7..ac7d1252 100644 --- a/openpgp/src/cert/mod.rs +++ b/openpgp/src/cert/mod.rs @@ -4394,7 +4394,7 @@ mod test { check(p, &cert, false, selfsig0); check(p, &cert, true, now); - // A newer self siganture. + // A newer self signature. let cert = cert.merge( Cert::from_bytes( crate::tests::key( @@ -4663,7 +4663,7 @@ Pu1xwz57O4zo1VYf6TqHJzVC3OMvMUM2hhdecMUe5x6GorNaj6g= .primary_userid().unwrap().userid().value(), b"Eminem"); - // A newer self siganture for "Slim Shady". Unlike for Certs, this + // A newer self signature for "Slim Shady". Unlike for Certs, this // does NOT trump everything. let cert = cert.merge( Cert::from_bytes( diff --git a/openpgp/src/crypto/mem.rs b/openpgp/src/crypto/mem.rs index fbccde9b..5418286c 100644 --- a/openpgp/src/crypto/mem.rs +++ b/openpgp/src/crypto/mem.rs @@ -1,7 +1,7 @@ //! Memory protection and encryption. //! //! Sequoia makes an effort to protect secrets stored in memory. Even -//! though a process' memory should be protected from being read by an +//! though a process's memory should be protected from being read by an //! adversary, there may be bugs in the program or the architecture //! the program is running on that allow (partial) recovery of data. //! Or, the process may be serialized to persistent storage, and its diff --git a/openpgp/src/packet/signature/subpacket.rs b/openpgp/src/packet/signature/subpacket.rs index 06f0fcd3..dd06f6bb 100644 --- a/openpgp/src/packet/signature/subpacket.rs +++ b/openpgp/src/packet/signature/subpacket.rs @@ -5633,7 +5633,7 @@ impl signature::SignatureBuilder { /// let sig = SignatureBuilder::from( /// alice /// .with_policy(p, None)? - /// .direct_key_signature().expect("Direct key siganture") + /// .direct_key_signature().expect("Direct key signature") /// .clone() /// ) /// .set_policy_uri("https://example.org/~alice/signing-policy.txt")? diff --git a/tool/src/sq-usage.rs b/tool/src/sq-usage.rs index 0312d07f..05814ced 100644 --- a/tool/src/sq-usage.rs +++ b/tool/src/sq-usage.rs @@ -16,7 +16,7 @@ //! OPTIONS: //! --home <DIRECTORY> Sets the home directory to use //! --known-notation <NOTATION>... The notation name is considered known. This is used when validating -//! sigantures. Signatures that have unknown notations with the critical bit set +//! signatures. Signatures that have unknown notations with the critical bit set //! are considered invalid. //! -m, --mapping <MAPPING> Sets the realm and mapping to use [default: org.sequoia-pgp.contacts/default] //! -p, --policy <NETWORK-POLICY> Sets the network policy to use diff --git a/tool/src/sq_cli.rs b/tool/src/sq_cli.rs index fb98cd65..93b15bac 100644 --- a/tool/src/sq_cli.rs +++ b/tool/src/sq_cli.rs @@ -34,7 +34,7 @@ pub fn build() -> App<'static, 'static> { .value_name("NOTATION") .number_of_values(1) .help("The notation name is considered known. \ - This is used when validating sigantures. \ + This is used when validating signatures. \ Signatures that have unknown notations with the \ critical bit set are considered invalid.")) .subcommand(SubCommand::with_name("decrypt") |