diff --git a/client/keys/migrate_test.go b/client/keys/migrate_test.go index bacbbacc74..55cf5038e0 100644 --- a/client/keys/migrate_test.go +++ b/client/keys/migrate_test.go @@ -98,7 +98,7 @@ func (s *MigrateTestSuite) Test_runMigrateCmdRecord() { item := design99keyring.Item{ Key: s.appName, Data: serializedRecord, - Description: "SDK kerying version", + Description: "SDK keyring version", } cmd := MigrateCommand() @@ -130,7 +130,7 @@ func (s *MigrateTestSuite) Test_runMigrateCmdLegacyMultiInfo() { item := design99keyring.Item{ Key: s.appName, Data: serializedLegacyMultiInfo, - Description: "SDK kerying version", + Description: "SDK keyring version", } cmd := MigrateCommand() diff --git a/crypto/armor.go b/crypto/armor.go index 56feef1485..5768f9469d 100644 --- a/crypto/armor.go +++ b/crypto/armor.go @@ -170,7 +170,7 @@ func encryptPrivKey(privKey cryptotypes.PrivKey, passphrase string) (saltBytes, panic(errorsmod.Wrap(err, "error generating cypher from key")) } - nonce := make([]byte, aead.NonceSize(), aead.NonceSize()+len(privKeyBytes)+aead.Overhead()) // Nonce is fixed to maintain consistency, each key is generated at every encryption using a random salt. + nonce := make([]byte, aead.NonceSize(), aead.NonceSize()+len(privKeyBytes)+aead.Overhead()) // Nonce is fixed to maintain consistency, each key is generated at every encryption using a random salt. encBytes = aead.Seal(nil, nonce, privKeyBytes, nil) diff --git a/crypto/keyring/keyring_test.go b/crypto/keyring/keyring_test.go index 0bacf6b823..0919cbd2c4 100644 --- a/crypto/keyring/keyring_test.go +++ b/crypto/keyring/keyring_test.go @@ -2013,7 +2013,7 @@ func TestRenameKey(t *testing.T) { // TestChangeBcrypt tests the compatibility from upstream Bcrypt and our own func TestChangeBcrypt(t *testing.T) { - pw := []byte("somepasswword!") + pw := []byte("somepassword!") saltBytes := cmtcrypto.CRandBytes(16) cosmosHash, err := cosmosbcrypt.GenerateFromPassword(saltBytes, pw, 2) diff --git a/crypto/keyring/migration_test.go b/crypto/keyring/migration_test.go index a8ddee925a..1f85a2d11a 100644 --- a/crypto/keyring/migration_test.go +++ b/crypto/keyring/migration_test.go @@ -53,7 +53,7 @@ func (s *MigrationTestSuite) TestMigrateLegacyLocalKey() { item := keyring.Item{ Key: n1, Data: serializedLegacyLocalInfo, - Description: "SDK kerying version", + Description: "SDK keyring version", } s.Require().NoError(s.ks.SetItem(item)) @@ -71,7 +71,7 @@ func (s *MigrationTestSuite) TestMigrateLegacyLedgerKey() { item := keyring.Item{ Key: n1, Data: serializedLegacyLedgerInfo, - Description: "SDK kerying version", + Description: "SDK keyring version", } s.Require().NoError(s.ks.SetItem(item)) diff --git a/crypto/keys/secp256k1/secp256k1_cgo.go b/crypto/keys/secp256k1/secp256k1_cgo.go index ac69c41637..295d5f3048 100644 --- a/crypto/keys/secp256k1/secp256k1_cgo.go +++ b/crypto/keys/secp256k1/secp256k1_cgo.go @@ -15,7 +15,7 @@ func (privKey *PrivKey) Sign(msg []byte) ([]byte, error) { if err != nil { return nil, err } - // we do not need v in r||s||v: + // we do not need v in r||s||v: rs := rsv[:len(rsv)-1] return rs, nil } diff --git a/crypto/keys/secp256r1/privkey.go b/crypto/keys/secp256r1/privkey.go index 09939cc65e..4da1069274 100644 --- a/crypto/keys/secp256r1/privkey.go +++ b/crypto/keys/secp256r1/privkey.go @@ -30,7 +30,7 @@ func (m *PrivKey) Type() string { return name } -// Sign hashes and signs the message usign ECDSA. Implements sdk.PrivKey interface. +// Sign hashes and signs the message using ECDSA. Implements sdk.PrivKey interface. func (m *PrivKey) Sign(msg []byte) ([]byte, error) { return m.Secret.Sign(msg) } diff --git a/crypto/ledger/ledger_test.go b/crypto/ledger/ledger_test.go index 3e1805c105..62840d4a45 100644 --- a/crypto/ledger/ledger_test.go +++ b/crypto/ledger/ledger_test.go @@ -77,7 +77,7 @@ func TestPublicKeyUnsafeHDPath(t *testing.T) { require.NoError(t, tmp.ValidateKey()) (&tmp).AssertIsPrivKeyInner() - // in this test we are chekcking if the generated keys are correct. + // in this test we are checking if the generated keys are correct. require.Equal(t, expectedAnswers[i], priv.PubKey().String(), "Is your device using test mnemonic: %s ?", testdata.TestMnemonic) diff --git a/crypto/types/multisig/multisignature.go b/crypto/types/multisig/multisignature.go index 12f2e799f9..49ad877546 100644 --- a/crypto/types/multisig/multisignature.go +++ b/crypto/types/multisig/multisignature.go @@ -36,7 +36,7 @@ func getIndex(pk types.PubKey, keys []types.PubKey) int { } // AddSignature adds a signature to the multisig, at the corresponding index. The index must -// represent the pubkey index in the LegacyAmingPubKey structure, which verifies this signature. +// represent the pubkey index in the LegacyAminoPubKey structure, which verifies this signature. // If the signature already exists, replace it. func AddSignature(mSig *signing.MultiSignatureData, sig signing.SignatureData, index int) { newSigIndex := mSig.BitArray.NumTrueBitsBefore(index) diff --git a/depinject/appconfig/module.go b/depinject/appconfig/module.go index a4d3d5d16a..ed118291e3 100644 --- a/depinject/appconfig/module.go +++ b/depinject/appconfig/module.go @@ -18,7 +18,7 @@ var Register = RegisterModule // function. All module initialization should be handled by the provided options. // // Config is a protobuf message type. It should define the cosmos.app.v1alpha.module -// option and must explicitly specify go_packageto make debugging easier for users. +// option and must explicitly specify go_package to make debugging easier for users. // // If you want to customize an existing module, you need to overwrite by calling // RegisterModule again with the same config (proto API type) and new Provide or