diff --git a/src/ffi.rs b/src/ffi.rs index cc0de8c4ec4e0d2db0a91286731708b4a62e6913..9e2bb5f2224e93f5ccfd3e87e3181550f2fcd42c 100644 --- a/src/ffi.rs +++ b/src/ffi.rs @@ -19,7 +19,7 @@ pub struct MM { // // This wrapper allows the function to return a Result. The Ok // variant should be (). It may be something else. In that case, the -// value is simply discarded. The Error variant must be convertable +// value is simply discarded. The Error variant must be convertible // to a `crate::ErrorCode` using `Into`. macro_rules! ffi { (fn $f:ident( $( $v:ident: $t:ty ),* ) -> $rt:ty $body:block ) => { diff --git a/src/keystore.rs b/src/keystore.rs index 56b2a74b498720e14a7b9c85b2459f263460c8d4..a8cb591b32fdd27b682e37070af29e2a4590c4ca 100644 --- a/src/keystore.rs +++ b/src/keystore.rs @@ -375,7 +375,7 @@ impl Keystore { // // If the keydata is in the certificate cache, returns the // certificate. Otherwise, parses the keydata, adds the - // certifiate to the cache, and returns the certificate. + // certificate to the cache, and returns the certificate. fn parse_cert(cache: &mut CertCache, bytes: &[u8]) -> Result { tracer!(*crate::TRACE, "Keystore::parse_cert"); @@ -707,7 +707,7 @@ impl Keystore { wrap_err!( tx.commit(), UnknownDbError, - "commiting transaction" + "committing transaction" )?; // Cache the updated certificate. It will likely be used in diff --git a/src/lib.rs b/src/lib.rs index 0d2c4eb6bc860afe5aaf88b9a79b4e8c71cd669c..b8c0a49b2ea674f566df6fcd63a2643f1471afca 100644 --- a/src/lib.rs +++ b/src/lib.rs @@ -1921,7 +1921,7 @@ fn _pgp_key_expired(vc: &ValidCert) -> bool } // Check to see if the key is broken. Ideally, we'd do this in one - // pass below, but givem the choice for how to check for expiry, + // pass below, but given the choice for how to check for expiry, // this is the simplest solutiom. if _pgp_key_broken(vc) { return false; // still isn't expired. is broken. there's a difference and a different check.