Skip to content

Commit 24cf060

Browse files
yurchordkg
authored andcommitted
Clean up word replication.
-- This fixes extra word repetitions (like "the the" or "is is") in the code and docs. Signed-off-by: Daniel Kahn Gillmor <[email protected]>
1 parent 831d014 commit 24cf060

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

95 files changed

+136
-136
lines changed

agent/call-scd.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@
5050
/* Definition of module local data of the CTRL structure. */
5151
struct scd_local_s
5252
{
53-
/* We keep a list of all allocated context with a an achnor at
53+
/* We keep a list of all allocated context with an achnor at
5454
SCD_LOCAL_LIST (see below). */
5555
struct scd_local_s *next_local;
5656

agent/command-ssh.c

+3-3
Original file line numberDiff line numberDiff line change
@@ -2721,7 +2721,7 @@ data_hash (unsigned char *data, size_t data_n,
27212721
}
27222722

27232723

2724-
/* This function signs the data described by CTRL. If HASH is is not
2724+
/* This function signs the data described by CTRL. If HASH is not
27252725
NULL, (HASH,HASHLEN) overrides the hash stored in CTRL. This is to
27262726
allow the use of signature algorithms that implement the hashing
27272727
internally (e.g. Ed25519). On success the created signature is
@@ -3654,7 +3654,7 @@ start_command_handler_ssh (ctrl_t ctrl, gnupg_fd_t sock_client)
36543654

36553655
#ifdef HAVE_W32_SYSTEM
36563656
/* Serve one ssh-agent request. This is used for the Putty support.
3657-
REQUEST is the the mmapped memory which may be accessed up to a
3657+
REQUEST is the mmapped memory which may be accessed up to a
36583658
length of MAXREQLEN. Returns 0 on success which also indicates
36593659
that a valid SSH response message is now in REQUEST. */
36603660
int
@@ -3749,7 +3749,7 @@ serve_mmapped_ssh_request (ctrl_t ctrl,
37493749
size_t response_size;
37503750

37513751
/* NB: In contrast to the request-stream, the response stream
3752-
includes the the message type byte. */
3752+
includes the message type byte. */
37533753
if (es_fclose_snatch (response_stream, &response_data, &response_size))
37543754
{
37553755
log_error ("snatching ssh response failed: %s",

agent/command.c

+3-3
Original file line numberDiff line numberDiff line change
@@ -434,7 +434,7 @@ leave_cmd (assuan_context_t ctx, gpg_error_t err)
434434
static const char hlp_geteventcounter[] =
435435
"GETEVENTCOUNTER\n"
436436
"\n"
437-
"Return a a status line named EVENTCOUNTER with the current values\n"
437+
"Return a status line named EVENTCOUNTER with the current values\n"
438438
"of all event counters. The values are decimal numbers in the range\n"
439439
"0 to UINT_MAX and wrapping around to 0. The actual values should\n"
440440
"not be relied upon, they shall only be used to detect a change.\n"
@@ -2007,7 +2007,7 @@ static const char hlp_keywrap_key[] =
20072007
"KEYWRAP_KEY [--clear] <mode>\n"
20082008
"\n"
20092009
"Return a key to wrap another key. For now the key is returned\n"
2010-
"verbatim and and thus makes not much sense because an eavesdropper on\n"
2010+
"verbatim and thus makes not much sense because an eavesdropper on\n"
20112011
"the gpg-agent connection will see the key as well as the wrapped key.\n"
20122012
"However, this function may either be equipped with a public key\n"
20132013
"mechanism or not used at all if the key is a pre-shared key. In any\n"
@@ -2631,7 +2631,7 @@ static const char hlp_putval[] =
26312631
"try to connect to that daemon. Only if that fails they may start\n"
26322632
"an own instance of the service daemon. \n"
26332633
"\n"
2634-
"KEY is an an arbitrary symbol with the same syntax rules as keys\n"
2634+
"KEY is an arbitrary symbol with the same syntax rules as keys\n"
26352635
"for shell environment variables. PERCENT_ESCAPED_VALUE is the\n"
26362636
"corresponding value; they should be similar to the values of\n"
26372637
"envronment variables but gpg-agent does not enforce any\n"

agent/divert-scd.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -387,7 +387,7 @@ divert_pksign (ctrl_t ctrl,
387387
}
388388

389389

390-
/* Decrypt the the value given asn an S-expression in CIPHER using the
390+
/* Decrypt the value given asn an S-expression in CIPHER using the
391391
key identified by SHADOW_INFO and return the plaintext in an
392392
allocated buffer in R_BUF. The padding information is stored at
393393
R_PADDING with -1 for not known. */

agent/findkey.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -1289,7 +1289,7 @@ agent_public_key_from_file (ctrl_t ctrl,
12891289

12901290

12911291

1292-
/* Check whether the the secret key identified by GRIP is available.
1292+
/* Check whether the secret key identified by GRIP is available.
12931293
Returns 0 is the key is available. */
12941294
int
12951295
agent_key_available (const unsigned char *grip)

agent/genkey.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -220,7 +220,7 @@ check_passphrase_constraints (ctrl_t ctrl, const char *pw,
220220
}
221221

222222
/* Now check the constraints and collect the error messages unless
223-
in in silent mode which returns immediately. */
223+
in silent mode which returns immediately. */
224224
if (utf8_charcount (pw, -1) < minlen )
225225
{
226226
if (!failed_constraint)

agent/gpg-agent.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -2394,7 +2394,7 @@ handle_signal (int signo)
23942394
}
23952395
#endif
23962396

2397-
/* Check the nonce on a new connection. This is a NOP unless we we
2397+
/* Check the nonce on a new connection. This is a NOP unless we
23982398
are using our Unix domain socket emulation under Windows. */
23992399
static int
24002400
check_nonce (ctrl_t ctrl, assuan_sock_nonce_t *nonce)

agent/keyformat.txt

+3-3
Original file line numberDiff line numberDiff line change
@@ -133,7 +133,7 @@ The currently defined protection modes are:
133133

134134
*** openpgp-s2k3-sha1-aes-cbc
135135

136-
This describes an algorithm using using AES in CBC mode for
136+
This describes an algorithm using AES in CBC mode for
137137
encryption, SHA-1 for integrity protection and the String to Key
138138
algorithm 3 from OpenPGP (rfc4880).
139139

@@ -182,7 +182,7 @@ The currently defined protection modes are:
182182

183183
*** openpgp-s2k3-ocb-aes
184184

185-
This describes an algorithm using using AES-128 in OCB mode, a nonce
185+
This describes an algorithm using AES-128 in OCB mode, a nonce
186186
of 96 bit, a taglen of 128 bit, and the String to Key algorithm 3
187187
from OpenPGP (rfc4880).
188188

@@ -311,7 +311,7 @@ This format is used to transfer keys between gpg and gpg-agent.
311311
* PROTALGO is a Libgcrypt style cipher algorithm name
312312
* IV is the initialization verctor.
313313
* S2KMODE is the value from RFC-4880.
314-
* S2KHASH is a a libgcrypt style hash algorithm identifier.
314+
* S2KHASH is a libgcrypt style hash algorithm identifier.
315315
* S2KSALT is the 8 byte salt
316316
* S2KCOUNT is the count value from RFC-4880.
317317

agent/preset-passphrase.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -239,7 +239,7 @@ main (int argc, char **argv)
239239
else
240240
usage (1);
241241

242-
/* Tell simple-pwquery about the the standard socket name. */
242+
/* Tell simple-pwquery about the standard socket name. */
243243
{
244244
char *tmp = make_filename (gnupg_socketdir (), GPG_AGENT_SOCK_NAME, NULL);
245245
simple_pw_set_socket (tmp);

agent/protect.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -690,7 +690,7 @@ agent_protect (const unsigned char *plainkey, const char *passphrase,
690690
return rc;
691691

692692
/* Now create the protected version of the key. Note that the 10
693-
extra bytes are for for the inserted "protected-" string (the
693+
extra bytes are for the inserted "protected-" string (the
694694
beginning of the plaintext reads: "((11:private-key(" ). The 35
695695
term is the space for (12:protected-at15:<timestamp>). */
696696
*resultlen = (10

common/argparse.c

+2-2
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@
6161
/* GnuPG uses GPLv3+ but a standalone version of this defaults to
6262
GPLv2+ because that is the license of this file. Change this if
6363
you include it in a program which uses GPLv3. If you don't want to
64-
set a a copyright string for your usage() you may also hardcode it
64+
set a copyright string for your usage() you may also hardcode it
6565
here. */
6666
#ifndef GNUPG_MAJOR_VERSION
6767

@@ -571,7 +571,7 @@ optfile_parse (FILE *fp, const char *filename, unsigned *lineno,
571571
int unread_buf[3]; /* We use an int so that we can store EOF. */
572572
int unread_buf_count = 0;
573573

574-
if (!fp) /* Divert to to arg_parse() in this case. */
574+
if (!fp) /* Divert to arg_parse() in this case. */
575575
return arg_parse (arg, opts);
576576

577577
initialize (arg, filename, lineno);

common/asshelp.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -414,7 +414,7 @@ start_new_gpg_agent (assuan_context_t *r_ctx,
414414

415415
/* If the agent has been configured for use with a standard
416416
socket, an environment variable is not required and thus
417-
we we can savely start the agent here. */
417+
we can safely start the agent here. */
418418
i = 0;
419419
argv[i++] = "--homedir";
420420
argv[i++] = abs_homedir;

common/dotlock.c

+3-3
Original file line numberDiff line numberDiff line change
@@ -411,7 +411,7 @@ struct dotlock_handle
411411
};
412412

413413

414-
/* A list of of all lock handles. The volatile attribute might help
414+
/* A list of all lock handles. The volatile attribute might help
415415
if used in an atexit handler. Note that [UN]LOCK_all_lockfiles
416416
must not change ERRNO. */
417417
static volatile dotlock_t all_lockfiles;
@@ -913,15 +913,15 @@ dotlock_create (const char *file_to_lock, unsigned int flags)
913913

914914

915915

916-
/* Convenience function to store a file descriptor (or any any other
916+
/* Convenience function to store a file descriptor (or any other
917917
integer value) in the context of handle H. */
918918
void
919919
dotlock_set_fd (dotlock_t h, int fd)
920920
{
921921
h->extra_fd = fd;
922922
}
923923

924-
/* Convenience function to retrieve a file descriptor (or any any other
924+
/* Convenience function to retrieve a file descriptor (or any other
925925
integer value) stored in the context of handle H. */
926926
int
927927
dotlock_get_fd (dotlock_t h)

common/iobuf.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -2502,7 +2502,7 @@ iobuf_get_fname_nonnull (iobuf_t a)
25022502
* Enable or disable partial body length mode (RFC 4880 4.2.2.4).
25032503
*
25042504
* If LEN is 0, this disables partial block mode by popping the
2505-
* partial body length filter, which which must be the most recently
2505+
* partial body length filter, which must be the most recently
25062506
* added filter.
25072507
*
25082508
* If LEN is non-zero, it pushes a partial body length filter. If

common/membuf.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ init_membuf_secure (membuf_t *mb, int initiallen)
6767
}
6868

6969

70-
/* Shift the the content of the membuf MB by AMOUNT bytes. The next
70+
/* Shift the content of the membuf MB by AMOUNT bytes. The next
7171
operation will then behave as if AMOUNT bytes had not been put into
7272
the buffer. If AMOUNT is greater than the actual accumulated
7373
bytes, the membuf is basically reset to its initial state. */

common/name-value.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ struct name_value_entry
5959
/* The name. Comments and blank lines have NAME set to NULL. */
6060
char *name;
6161

62-
/* The value as stored in the file. We store it when when we parse
62+
/* The value as stored in the file. We store it when we parse
6363
a file so that we can reproduce it. */
6464
strlist_t raw_value;
6565

common/session-env.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -317,7 +317,7 @@ session_env_getenv (session_env_t se, const char *name)
317317
long it has not been removed or updated by a call to
318318
session_env_putenv. If the variable does not exist, the function
319319
tries to return the value trough a call to getenv; if that returns
320-
a value, this value is recorded and and used. If no value could be
320+
a value, this value is recorded and used. If no value could be
321321
found, returns NULL. The caller must not change the returned
322322
value. */
323323
char *

common/sexp-parse.h

+1-1
Original file line numberDiff line numberDiff line change
@@ -89,7 +89,7 @@ sskip (unsigned char const **buf, int *depth)
8989
}
9090

9191

92-
/* Check whether the the string at the address BUF points to matches
92+
/* Check whether the string at the address BUF points to matches
9393
the token. Return true on match and update BUF to point behind the
9494
token. Return false and do not update the buffer if it does not
9595
match. */

common/simple-pwquery.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -352,7 +352,7 @@ default_inq_cb (void *opaque, const char *line)
352352

353353
/* Ask the gpg-agent for a passphrase and present the user with a
354354
DESCRIPTION, a PROMPT and optionally with a TRYAGAIN extra text.
355-
If a CACHEID is not NULL it is used to locate the passphrase in in
355+
If a CACHEID is not NULL it is used to locate the passphrase in
356356
the cache and store it under this ID. If OPT_CHECK is true
357357
gpg-agent is asked to apply some checks on the passphrase security.
358358
If ERRORCODE is not NULL it should point a variable receiving an

common/simple-pwquery.h

+1-1
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@
4242

4343
/* Ask the gpg-agent for a passphrase and present the user with a
4444
DESCRIPTION, a PROMPT and optiaonlly with a TRYAGAIN extra text.
45-
If a CACHEID is not NULL it is used to locate the passphrase in in
45+
If a CACHEID is not NULL it is used to locate the passphrase in
4646
the cache and store it under this ID. If OPT_CHECK is true
4747
gpg-agent is asked to apply some checks on the passphrase security.
4848
If ERRORCODE is not NULL it should point a variable receiving an

common/ttyio.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -602,7 +602,7 @@ tty_get( const char *prompt )
602602
return do_get ( prompt, 0 );
603603
}
604604

605-
/* Variable argument version of tty_get. The prompt is is actually a
605+
/* Variable argument version of tty_get. The prompt is actually a
606606
format string with arguments. */
607607
char *
608608
tty_getf (const char *promptfmt, ... )

common/utf8conv.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -160,7 +160,7 @@ set_native_charset (const char *newset)
160160
const char *aliases;
161161

162162
/* We are a console program thus we need to use the
163-
GetConsoleOutputCP function and not the the GetACP which
163+
GetConsoleOutputCP function and not the GetACP which
164164
would give the codepage for a GUI program. Note this is not
165165
a bulletproof detection because GetConsoleCP might return a
166166
different one for console input. Not sure how to cope with

common/yesno.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,7 @@ answer_is_yes_no_quit ( const char *s )
114114
}
115115

116116
/*
117-
Return 1 for okay, 0 for for cancel or DEF_ANSWER for default.
117+
Return 1 for okay, 0 for cancel or DEF_ANSWER for default.
118118
*/
119119
int
120120
answer_is_okay_cancel (const char *s, int def_answer)

dirmngr/certcache.c

+2-2
Original file line numberDiff line numberDiff line change
@@ -251,7 +251,7 @@ clean_cache_slot (cert_item_t ci)
251251
*
252252
* FROM_CONFIG indicates that CERT is a permanent certificate and
253253
* should stay in the cache. IS_TRUSTED requests that the trusted
254-
* flag is set for the certificate; a value of 1 indicates the the
254+
* flag is set for the certificate; a value of 1 indicates the
255255
* cert is trusted due to GnuPG mechanisms, a value of 2 indicates
256256
* that it is trusted because it has been taken from the system's
257257
* store of trusted certificates. If FPR_BUFFER is not NULL the
@@ -1002,7 +1002,7 @@ get_cert_bysubject (const char *subject_dn, unsigned int seq)
10021002

10031003

10041004

1005-
/* Return a value describing the the class of PATTERN. The offset of
1005+
/* Return a value describing the class of PATTERN. The offset of
10061006
the actual string to be used for the comparison is stored at
10071007
R_OFFSET. The offset of the serialnumer is stored at R_SN_OFFSET. */
10081008
static enum pattern_class

dirmngr/crlcache.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@
4444
Field 1: Constant "v"
4545
Field 2: Version number of this file. Must be 1.
4646
47-
This record must be the first non-comment record record and
47+
This record must be the first non-comment record and
4848
there shall only exist one record of this type.
4949
5050
1.3. CRL cache record

dirmngr/dns-stuff.c

+2-2
Original file line numberDiff line numberDiff line change
@@ -881,7 +881,7 @@ resolve_name_standard (const char *name, unsigned short port,
881881
else
882882
*portstr = 0;
883883

884-
/* We can't use the the AI_IDN flag because that does the conversion
884+
/* We can't use the AI_IDN flag because that does the conversion
885885
using the current locale. However, GnuPG always used UTF-8. To
886886
support IDN we would need to make use of the libidn API. */
887887
ret = getaddrinfo (name, *portstr? portstr : NULL, &hints, &aibuf);
@@ -1680,7 +1680,7 @@ get_dns_cert_standard (const char *name, int want_certtype,
16801680
found, the malloced data is returned at (R_KEY, R_KEYLEN) and
16811681
the other return parameters are set to NULL/0. If an IPGP CERT
16821682
record was found the fingerprint is stored as an allocated block at
1683-
R_FPR and its length at R_FPRLEN; an URL is is allocated as a
1683+
R_FPR and its length at R_FPRLEN; an URL is allocated as a
16841684
string and returned at R_URL. If WANT_CERTTYPE is 0 this function
16851685
returns the first CERT found with a supported type; it is expected
16861686
that only one CERT record is used. If WANT_CERTTYPE is one of the

dirmngr/http.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -1157,7 +1157,7 @@ http_get_status_code (http_t hd)
11571157
/* Return information pertaining to TLS. If TLS is not in use for HD,
11581158
NULL is returned. WHAT is used ask for specific information:
11591159
1160-
(NULL) := Only check whether TLS is is use. Returns an
1160+
(NULL) := Only check whether TLS is in use. Returns an
11611161
unspecified string if TLS is in use. That string may
11621162
even be the empty string.
11631163
*/

dirmngr/ks-engine-ldap.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -1471,7 +1471,7 @@ modlist_dump (LDAPMod **modlist, estream_t output)
14711471
for ((ptr = (*m)->mod_values), (i = 1); ptr && *ptr; ptr++, i ++)
14721472
{
14731473
/* Assuming terminals are about 80 characters wide,
1474-
display at most most about 10 lines of debugging
1474+
display at most about 10 lines of debugging
14751475
output. If we do trim the buffer, append '...' to
14761476
the end. */
14771477
const int max_len = 10 * 70;

dirmngr/server.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -190,7 +190,7 @@ data_line_write (assuan_context_t ctx, const void *buffer_arg, size_t size)
190190
const char *buffer = buffer_arg;
191191
gpg_error_t err;
192192

193-
/* If we do not want logging, enable it it here. */
193+
/* If we do not want logging, enable it here. */
194194
if (ctrl && ctrl->server_local && ctrl->server_local->inhibit_data_logging)
195195
ctrl->server_local->inhibit_data_logging_now = 1;
196196

doc/DETAILS

+3-3
Original file line numberDiff line numberDiff line change
@@ -187,7 +187,7 @@ described here.
187187
only filled if the issuer certificate is available. The root has
188188
been reached if this is the same string as the fingerprint. The
189189
advantage of using this value is that it is guaranteed to have
190-
been been build by the same lookup algorithm as gpgsm uses.
190+
been built by the same lookup algorithm as gpgsm uses.
191191

192192
For "uid" records this field lists the preferences in the same way
193193
gpg's --edit-key menu does.
@@ -702,7 +702,7 @@ pkd:0:1024:B665B1435F4C2 .... FF26ABB:
702702

703703
VALIDATION_MODEL describes the algorithm used to check the
704704
validity of the key. The defaults are the standard Web of Trust
705-
model for gpg and the the standard X.509 model for gpgsm. The
705+
model for gpg and the standard X.509 model for gpgsm. The
706706
defined values are
707707

708708
- pgp :: The standard PGP WoT.
@@ -796,7 +796,7 @@ pkd:0:1024:B665B1435F4C2 .... FF26ABB:
796796
recent message was verified 4 seconds ago.'
797797

798798
*** PKA_TRUST_
799-
This is is one:
799+
This is one of:
800800

801801
- PKA_TRUST_GOOD <addr-spec>
802802
- PKA_TRUST_BAD <addr-spec>

doc/TRANSLATE

+1-1
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ are disabled like this
3737
.#gpgsm.some.help-item
3838
This string is not translated.
3939

40-
After translation you should remove the the hash mark so that the
40+
After translation you should remove the hash mark so that the
4141
entry looks like.
4242

4343
.gpgsm.some.help-item

0 commit comments

Comments
 (0)