Skip to content

Commit

Permalink
build: Fix typo spotted by codespell
Browse files Browse the repository at this point in the history
  • Loading branch information
ueno committed Dec 29, 2018
1 parent 4ee6545 commit 95faa51
Show file tree
Hide file tree
Showing 15 changed files with 22 additions and 22 deletions.
2 changes: 1 addition & 1 deletion ChangeLog
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
=== ChangeLog is autogenerated ===

This project relys on commit messages to provide change history. Please
This project relies on commit messages to provide change history. Please
write commit messages in the following format:

=== begin example commit ===
Expand Down
8 changes: 4 additions & 4 deletions NEWS
Original file line number Diff line number Diff line change
Expand Up @@ -140,7 +140,7 @@

0.20.3 (stable)
* Fix problems reinitializing managed modules after fork
* Fix bad bookeeping when fail initializing one of the modules
* Fix bad bookkeeping when fail initializing one of the modules
* Fix case where module would be unloaded while in use [#74919]
* Remove assertions when module used before initialized [#74919]
* Fix handling of mmap failure and mapping empty files [#74773]
Expand Down Expand Up @@ -186,7 +186,7 @@
* Port to use CKA_PUBLIC_KEY_INFO and updated trust store spec
* Add option to use freebl for hashing
* Implement reloading of token data
* Fix warnings and possible minor bugs higlighted by code scanners
* Fix warnings and possible minor bugs highlighted by code scanners
* Don't load configs in home directories when running setuid or setgid
* Support treating ~/.config as $XDG_CONFIG_HOME
* Use $XDG_DATA_HOME/pkcs11 as default user config directory
Expand Down Expand Up @@ -241,15 +241,15 @@
* Use descriptive labels for the trust module tokens [#62534]
* Remove the temporary built in distrust objects
* Make extracted output directories and files read-only [#61898]
* Don't export unneccessary ABI
* Don't export unnecessary ABI
* Build fixes [#62479]

0.17.2 (unstable)
* Fix build on 32-bit linux
* Fix several crashers

0.17.1 (unstable)
* Support a p11-kit specific PKCS#11 attribute persistance format [#62156]
* Support a p11-kit specific PKCS#11 attribute persistence format [#62156]
* Use the SHA1 hash of SPKI as the CKA_ID in the trust module by default [#62329]
* Refactor a trust builder which builds objects out of parsed data [#62329]
* Combine trust policy when extracting certificates [#61497]
Expand Down
2 changes: 1 addition & 1 deletion common/pkcs11.h
Original file line number Diff line number Diff line change
Expand Up @@ -859,7 +859,7 @@ typedef unsigned long ck_mechanism_type_t;

#define CKM_VENDOR_DEFINED ((unsigned long) (1UL << 31))

/* Ammendments */
/* Amendments */
#define CKM_SHA224 (0x255UL)
#define CKM_SHA224_HMAC (0x256UL)
#define CKM_SHA224_HMAC_GENERAL (0x257UL)
Expand Down
2 changes: 1 addition & 1 deletion common/test-lexer.c
Original file line number Diff line number Diff line change
Expand Up @@ -96,7 +96,7 @@ check_lex_msg (const char *file,
}
break;
case TOK_EOF:
p11_test_fail (file, line, function, "eof should not be recieved");
p11_test_fail (file, line, function, "eof should not be received");
break;
}
}
Expand Down
2 changes: 1 addition & 1 deletion doc/manual/Makefile.am
Original file line number Diff line number Diff line change
Expand Up @@ -94,7 +94,7 @@ content_files=p11-kit-config.xml p11-kit-sharing.xml \
annotation-glossary.xml \
$(NULL)

# SGML files where gtk-doc abbrevations (#GtkWidget) are expanded
# SGML files where gtk-doc abbreviations (#GtkWidget) are expanded
# These files must be listed here *and* in content_files
# e.g. expand_content_files=running.sgml
expand_content_files= $(generate_files)
Expand Down
2 changes: 1 addition & 1 deletion p11-kit/iter.c
Original file line number Diff line number Diff line change
Expand Up @@ -830,7 +830,7 @@ p11_kit_iter_get_token (P11KitIter *iter)
* p11_kit_iter_get_session:
* @iter: the iterator
*
* Get the session which the current matching object is acessible
* Get the session which the current matching object is accessible
* through.
*
* This can only be called after p11_kit_iter_next() succeeds.
Expand Down
2 changes: 1 addition & 1 deletion p11-kit/modules.c
Original file line number Diff line number Diff line change
Expand Up @@ -593,7 +593,7 @@ take_config_and_load_module_inlock (char **name,
*/
mod->init_args.pReserved = p11_dict_get (*config, "x-init-reserved");

/* Take ownership of thes evariables */
/* Take ownership of these variables */
p11_dict_free (mod->config);
mod->config = *config;
*config = NULL;
Expand Down
6 changes: 3 additions & 3 deletions p11-kit/rpc-message.c
Original file line number Diff line number Diff line change
Expand Up @@ -235,7 +235,7 @@ p11_rpc_message_write_attribute_buffer (p11_rpc_message *msg,
assert (msg != NULL);
assert (msg->output != NULL);

/* Make sure this is in the rigth order */
/* Make sure this is in the right order */
assert (!msg->signature || p11_rpc_message_verify_part (msg, "fA"));

/* Write the number of items */
Expand Down Expand Up @@ -265,7 +265,7 @@ p11_rpc_message_write_attribute_array (p11_rpc_message *msg,
assert (msg != NULL);
assert (msg->output != NULL);

/* Make sure this is in the rigth order */
/* Make sure this is in the right order */
assert (!msg->signature || p11_rpc_message_verify_part (msg, "aA"));

/* Write the number of items */
Expand Down Expand Up @@ -328,7 +328,7 @@ p11_rpc_message_write_ulong (p11_rpc_message *msg,
assert (msg != NULL);
assert (msg->output != NULL);

/* Make sure this is in the rigth order */
/* Make sure this is in the right order */
assert (!msg->signature || p11_rpc_message_verify_part (msg, "u"));
p11_rpc_buffer_add_uint64 (msg->output, val);
return !p11_buffer_failed (msg->output);
Expand Down
4 changes: 2 additions & 2 deletions p11-kit/rpc-server.c
Original file line number Diff line number Diff line change
Expand Up @@ -238,7 +238,7 @@ proto_read_attribute_buffer (p11_rpc_message *msg,
assert (n_result != NULL);
assert (msg->input != NULL);

/* Make sure this is in the rigth order */
/* Make sure this is in the right order */
assert (!msg->signature || p11_rpc_message_verify_part (msg, "fA"));

/* Read the number of attributes */
Expand Down Expand Up @@ -292,7 +292,7 @@ proto_read_attribute_array (p11_rpc_message *msg,
assert (n_result != NULL);
assert (msg->input != NULL);

/* Make sure this is in the rigth order */
/* Make sure this is in the right order */
assert (!msg->signature || p11_rpc_message_verify_part (msg, "aA"));

/* Read the number of attributes */
Expand Down
2 changes: 1 addition & 1 deletion p11-kit/test-pin.c
Original file line number Diff line number Diff line change
Expand Up @@ -243,7 +243,7 @@ test_pin_file (void)
assert (memcmp (ptr, "yogabbagabba", length) == 0);
p11_kit_pin_unref (pin);

pin = p11_kit_pin_request (SRCDIR "/p11-kit/fixtures/nonexistant", uri, "The token",
pin = p11_kit_pin_request (SRCDIR "/p11-kit/fixtures/nonexistent", uri, "The token",
P11_KIT_PIN_FLAGS_USER_LOGIN);

assert_ptr_eq (NULL, pin);
Expand Down
2 changes: 1 addition & 1 deletion p11-kit/test-virtual.c
Original file line number Diff line number Diff line change
Expand Up @@ -124,7 +124,7 @@ test_fall_through (void)
rv = (module->C_Initialize) ("initialize-arg");
assert_num_eq (CKR_NEED_TO_CREATE_THREADS, rv);

/* All other functiosn should have just fallen through */
/* All other functions should have just fallen through */
assert_ptr_eq (mock_module_no_slots.C_Finalize, module->C_Finalize);

p11_virtual_unwrap (module);
Expand Down
2 changes: 1 addition & 1 deletion trust/test-enumerate.c
Original file line number Diff line number Diff line change
Expand Up @@ -293,7 +293,7 @@ test_info_limit_purposes (void)
mock_module_add_object (MOCK_SLOT_ONE_ID, cacert3_trusted);
mock_module_add_object (MOCK_SLOT_ONE_ID, extension_eku_server_client);

/* This should not match the above, with the attached certificat ext */
/* This should not match the above, with the attached certificate ext */
assert_ptr_eq (NULL, test.ex.limit_to_purposes);
p11_enumerate_opt_purpose (&test.ex, "1.1.1");
assert_ptr_not_null (test.ex.limit_to_purposes);
Expand Down
2 changes: 1 addition & 1 deletion trust/test-parser.c
Original file line number Diff line number Diff line change
Expand Up @@ -503,7 +503,7 @@ test_parse_invalid_file (void)
p11_message_quiet ();

p11_parser_formats (test.parser, p11_parser_format_x509, NULL);
ret = p11_parse_file (test.parser, "/nonexistant", NULL,
ret = p11_parse_file (test.parser, "/nonexistent", NULL,
P11_PARSE_FLAG_NONE);
assert_num_eq (P11_PARSE_FAILURE, ret);

Expand Down
4 changes: 2 additions & 2 deletions trust/test-token.c
Original file line number Diff line number Diff line change
Expand Up @@ -129,7 +129,7 @@ test_token_flags (void *path)

/*
* blacklist2 comes from the input/blacklist/self-server.der file. It is
* explicitly put on the blacklist, even though it containts no trust
* explicitly put on the blacklist, even though it contains no trust
* policy information.
*/

Expand All @@ -151,7 +151,7 @@ test_token_flags (void *path)

/*
* anchor comes from the input/anchors/cacert3.der file. It is
* explicitly marked as an anchor, even though it containts no trust
* explicitly marked as an anchor, even though it contains no trust
* policy information.
*/

Expand Down
2 changes: 1 addition & 1 deletion trust/trust-extract-compat.in
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
# has been customized for distribution. It should be symlinked linked to the
# distribution's update-ca-certificates or update-ca-trust command as
# appropriate. In the future this script will be called when the PKCS#11
# trust module is used to modifiy trust anchors and related data.
# trust module is used to modify trust anchors and related data.

if [ $# -ne 0 ]; then
echo "usage: trust extract-compat" >&2
Expand Down

0 comments on commit 95faa51

Please sign in to comment.