Fix typos
Change-Id: I69e5c6d82fddd1da1e414e7764f3a5d90351a43d Reviewed-on: https://gerrit.libreoffice.org/76377 Tested-by: Jenkins Reviewed-by: Julien Nabet <serval2412@yahoo.fr>
This commit is contained in:
committed by
Julien Nabet
parent
caa6268094
commit
496f32ea2b
@@ -30,10 +30,10 @@ module com { module sun { module star { module xml { module crypto {
|
||||
/**
|
||||
* Interface of XML encryption template
|
||||
*
|
||||
* <p>This interface represents a encryption template, which is the same as the
|
||||
* <p>This interface represents an encryption template, which is the same as the
|
||||
* desired XML encryption element[ EncryptedType ] but some of the nodes may be
|
||||
* empty. The empty entities include CipherValue, which is a subset of
|
||||
* EncryptedData or EncryptedKey. Empty entities are not allowed in a encryption
|
||||
* EncryptedData or EncryptedKey. Empty entities are not allowed in an encryption
|
||||
* template when performing decryption.</p>
|
||||
*
|
||||
* <p>In some cases, the encryptor or decryptor can determine and locate the
|
||||
|
@@ -59,7 +59,7 @@ protected:
|
||||
/*
|
||||
* the id of ElementCollector of the template element.
|
||||
* For a signature, the template element is the Signature element,
|
||||
* for a encryption, the EncryptedData/EncryptedKey element is.
|
||||
* for an encryption, the EncryptedData/EncryptedKey element is.
|
||||
*/
|
||||
sal_Int32 m_nIdOfTemplateEC;
|
||||
|
||||
|
@@ -86,7 +86,7 @@ short CertificateChooser::run()
|
||||
|
||||
// PostUserEvent( LINK( this, CertificateChooser, Initialize ) );
|
||||
|
||||
// PostUserLink behavior is to slow, so do it directly before Execute().
|
||||
// PostUserLink behavior is too slow, so do it directly before Execute().
|
||||
// Problem: This Dialog should be visible right now, and the parent should not be accessible.
|
||||
// Show, Update, DisableInput...
|
||||
|
||||
|
@@ -596,7 +596,7 @@ void DigitalSignaturesDialog::ImplFillSignaturesBox()
|
||||
sImage = BMP_SIG_NOT_VALIDATED;
|
||||
}
|
||||
//Check if the signature is a "old" document signature, that is, which was created
|
||||
//by an version of OOo previous to 3.2
|
||||
//by a version of OOo previous to 3.2
|
||||
// If there is no storage, then it's pointless to check storage
|
||||
// stream references.
|
||||
else if (maSignatureManager.getSignatureMode() == DocumentSignatureMode::Content
|
||||
|
@@ -47,7 +47,7 @@ protected:
|
||||
|
||||
/*
|
||||
* the type value, is one of following values:
|
||||
* TYPEOFELEMENTMARK - the default value, represents an blocker if
|
||||
* TYPEOFELEMENTMARK - the default value, represents a blocker if
|
||||
* not changed
|
||||
* TYPEOFELEMENTCOLLECTOR - represents an ElementCollector
|
||||
*/
|
||||
|
@@ -242,7 +242,7 @@ bool XSecController::chainOn()
|
||||
* NOTES
|
||||
* Sometimes, the last key SAX event can't be transferred to the
|
||||
* SAXEventKeeper together.
|
||||
* For instance, at the time an referenced element is detected, the
|
||||
* For instance, at the time a referenced element is detected, the
|
||||
* startElement event has already been reserved by the ElementStackKeeper.
|
||||
* Meanwhile, an ElementCollector needs to be created before the
|
||||
* SAXEventKeeper receives that startElement event.
|
||||
|
@@ -312,7 +312,7 @@ void SAL_CALL XSecParser::endElement( const OUString& aName )
|
||||
{
|
||||
if ( m_bReferenceUnresolved )
|
||||
/*
|
||||
* it must be a octet stream
|
||||
* it must be an octet stream
|
||||
*/
|
||||
{
|
||||
m_pXSecController->addStreamReference( m_currentReferenceURI, true, m_nReferenceDigestID );
|
||||
|
@@ -175,7 +175,7 @@ void XMLDocumentWrapper_XmlSecImpl::sendStartElement(
|
||||
* xHandler2 - the second XDocumentHandler interface to receive the
|
||||
* startElement SAX event. It can't be NULL.
|
||||
* pNode - the node on which the startElement should be generated.
|
||||
* This node must be a element type.
|
||||
* This node must be an element type.
|
||||
******************************************************************************/
|
||||
{
|
||||
SvXMLAttributeList* pAttributeList = new SvXMLAttributeList();
|
||||
@@ -250,11 +250,11 @@ void XMLDocumentWrapper_XmlSecImpl::sendEndElement(
|
||||
/****** XMLDocumentWrapper_XmlSecImpl/sendEndElement **************************
|
||||
*
|
||||
* NAME
|
||||
* sendEndElement -- Constructs a endElement SAX event
|
||||
* sendEndElement -- Constructs an endElement SAX event
|
||||
*
|
||||
* FUNCTION
|
||||
* Used when converting the document into SAX event stream.
|
||||
* This method constructs a endElement SAX event for a particular
|
||||
* This method constructs an endElement SAX event for a particular
|
||||
* element, then calls the endElement methods of the XDocumentHandlers.
|
||||
*
|
||||
* INPUTS
|
||||
@@ -263,7 +263,7 @@ void XMLDocumentWrapper_XmlSecImpl::sendEndElement(
|
||||
* xHandler2 - the second XDocumentHandler interface to receive the
|
||||
* endElement SAX event. It can't be NULL.
|
||||
* pNode - the node on which the endElement should be generated.
|
||||
* This node must be a element type.
|
||||
* This node must be an element type.
|
||||
******************************************************************************/
|
||||
{
|
||||
OString sNodeName = getNodeQName(pNode);
|
||||
|
@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
|
||||
basicConstraints = critical, CA:true
|
||||
|
||||
# Key usage: this is typical for a CA certificate. However since it will
|
||||
# prevent it being used as an test self-signed certificate it is best
|
||||
# prevent it being used as a test self-signed certificate it is best
|
||||
# left out by default.
|
||||
# keyUsage = cRLSign, keyCertSign
|
||||
|
||||
|
@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
|
||||
basicConstraints = critical, CA:true
|
||||
|
||||
# Key usage: this is typical for a CA certificate. However since it will
|
||||
# prevent it being used as an test self-signed certificate it is best
|
||||
# prevent it being used as a test self-signed certificate it is best
|
||||
# left out by default.
|
||||
# keyUsage = cRLSign, keyCertSign
|
||||
|
||||
|
@@ -218,7 +218,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
|
||||
basicConstraints = critical, CA:true
|
||||
|
||||
# Key usage: this is typical for a CA certificate. However since it will
|
||||
# prevent it being used as an test self-signed certificate it is best
|
||||
# prevent it being used as a test self-signed certificate it is best
|
||||
# left out by default.
|
||||
# keyUsage = cRLSign, keyCertSign
|
||||
|
||||
|
@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
|
||||
basicConstraints = critical, CA:true
|
||||
|
||||
# Key usage: this is typical for a CA certificate. However since it will
|
||||
# prevent it being used as an test self-signed certificate it is best
|
||||
# prevent it being used as a test self-signed certificate it is best
|
||||
# left out by default.
|
||||
# keyUsage = cRLSign, keyCertSign
|
||||
|
||||
|
@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
|
||||
basicConstraints = critical, CA:true
|
||||
|
||||
# Key usage: this is typical for a CA certificate. However since it will
|
||||
# prevent it being used as an test self-signed certificate it is best
|
||||
# prevent it being used as a test self-signed certificate it is best
|
||||
# left out by default.
|
||||
# keyUsage = cRLSign, keyCertSign
|
||||
|
||||
|
@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
|
||||
basicConstraints = critical, CA:true
|
||||
|
||||
# Key usage: this is typical for a CA certificate. However since it will
|
||||
# prevent it being used as an test self-signed certificate it is best
|
||||
# prevent it being used as a test self-signed certificate it is best
|
||||
# left out by default.
|
||||
# keyUsage = cRLSign, keyCertSign
|
||||
|
||||
|
@@ -212,7 +212,7 @@ crlDistributionPoints=URI:http://localhost:8901/demoCA/crl/Root_5.crl
|
||||
basicConstraints = critical, CA:true
|
||||
|
||||
# Key usage: this is typical for a CA certificate. However since it will
|
||||
# prevent it being used as an test self-signed certificate it is best
|
||||
# prevent it being used as a test self-signed certificate it is best
|
||||
# left out by default.
|
||||
# keyUsage = cRLSign, keyCertSign
|
||||
|
||||
|
@@ -212,7 +212,7 @@ crlDistributionPoints=URI:http://localhost:8901/demoCA/crl/Root_6.crl
|
||||
basicConstraints = critical, CA:true
|
||||
|
||||
# Key usage: this is typical for a CA certificate. However since it will
|
||||
# prevent it being used as an test self-signed certificate it is best
|
||||
# prevent it being used as a test self-signed certificate it is best
|
||||
# left out by default.
|
||||
# keyUsage = cRLSign, keyCertSign
|
||||
|
||||
|
@@ -212,7 +212,7 @@ crlDistributionPoints=URI:http://localhost:8901/demoCA/crl/Root_7.crl
|
||||
basicConstraints = critical, CA:true
|
||||
|
||||
# Key usage: this is typical for a CA certificate. However since it will
|
||||
# prevent it being used as an test self-signed certificate it is best
|
||||
# prevent it being used as a test self-signed certificate it is best
|
||||
# left out by default.
|
||||
# keyUsage = cRLSign, keyCertSign
|
||||
|
||||
|
@@ -212,7 +212,7 @@ authorityInfoAccess = OCSP;URI:http://localhost:8888
|
||||
basicConstraints = critical, CA:true
|
||||
|
||||
# Key usage: this is typical for a CA certificate. However since it will
|
||||
# prevent it being used as an test self-signed certificate it is best
|
||||
# prevent it being used as a test self-signed certificate it is best
|
||||
# left out by default.
|
||||
# keyUsage = cRLSign, keyCertSign
|
||||
|
||||
|
@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
|
||||
basicConstraints = critical, CA:true
|
||||
|
||||
# Key usage: this is typical for a CA certificate. However since it will
|
||||
# prevent it being used as an test self-signed certificate it is best
|
||||
# prevent it being used as a test self-signed certificate it is best
|
||||
# left out by default.
|
||||
# keyUsage = cRLSign, keyCertSign
|
||||
|
||||
|
@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
|
||||
basicConstraints = critical, CA:true
|
||||
|
||||
# Key usage: this is typical for a CA certificate. However since it will
|
||||
# prevent it being used as an test self-signed certificate it is best
|
||||
# prevent it being used as a test self-signed certificate it is best
|
||||
# left out by default.
|
||||
# keyUsage = cRLSign, keyCertSign
|
||||
|
||||
|
@@ -213,7 +213,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
|
||||
basicConstraints = critical, CA:true
|
||||
|
||||
# Key usage: this is typical for a CA certificate. However since it will
|
||||
# prevent it being used as an test self-signed certificate it is best
|
||||
# prevent it being used as a test self-signed certificate it is best
|
||||
# left out by default.
|
||||
# keyUsage = cRLSign, keyCertSign
|
||||
|
||||
|
@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
|
||||
basicConstraints = critical, CA:true
|
||||
|
||||
# Key usage: this is typical for a CA certificate. However since it will
|
||||
# prevent it being used as an test self-signed certificate it is best
|
||||
# prevent it being used as a test self-signed certificate it is best
|
||||
# left out by default.
|
||||
# keyUsage = cRLSign, keyCertSign
|
||||
|
||||
|
@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
|
||||
basicConstraints = critical, CA:true
|
||||
|
||||
# Key usage: this is typical for a CA certificate. However since it will
|
||||
# prevent it being used as an test self-signed certificate it is best
|
||||
# prevent it being used as a test self-signed certificate it is best
|
||||
# left out by default.
|
||||
# keyUsage = cRLSign, keyCertSign
|
||||
|
||||
|
@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
|
||||
basicConstraints = critical, CA:true
|
||||
|
||||
# Key usage: this is typical for a CA certificate. However since it will
|
||||
# prevent it being used as an test self-signed certificate it is best
|
||||
# prevent it being used as a test self-signed certificate it is best
|
||||
# left out by default.
|
||||
# keyUsage = cRLSign, keyCertSign
|
||||
|
||||
|
@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
|
||||
basicConstraints = critical, CA:true
|
||||
|
||||
# Key usage: this is typical for a CA certificate. However since it will
|
||||
# prevent it being used as an test self-signed certificate it is best
|
||||
# prevent it being used as a test self-signed certificate it is best
|
||||
# left out by default.
|
||||
# keyUsage = cRLSign, keyCertSign
|
||||
|
||||
|
@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
|
||||
basicConstraints = critical, CA:true
|
||||
|
||||
# Key usage: this is typical for a CA certificate. However since it will
|
||||
# prevent it being used as an test self-signed certificate it is best
|
||||
# prevent it being used as a test self-signed certificate it is best
|
||||
# left out by default.
|
||||
# keyUsage = cRLSign, keyCertSign
|
||||
|
||||
|
@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
|
||||
basicConstraints = critical, CA:true
|
||||
|
||||
# Key usage: this is typical for a CA certificate. However since it will
|
||||
# prevent it being used as an test self-signed certificate it is best
|
||||
# prevent it being used as a test self-signed certificate it is best
|
||||
# left out by default.
|
||||
# keyUsage = cRLSign, keyCertSign
|
||||
|
||||
|
@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
|
||||
basicConstraints = critical, CA:true
|
||||
|
||||
# Key usage: this is typical for a CA certificate. However since it will
|
||||
# prevent it being used as an test self-signed certificate it is best
|
||||
# prevent it being used as a test self-signed certificate it is best
|
||||
# left out by default.
|
||||
# keyUsage = cRLSign, keyCertSign
|
||||
|
||||
|
@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
|
||||
basicConstraints = critical, CA:true
|
||||
|
||||
# Key usage: this is typical for a CA certificate. However since it will
|
||||
# prevent it being used as an test self-signed certificate it is best
|
||||
# prevent it being used as a test self-signed certificate it is best
|
||||
# left out by default.
|
||||
# keyUsage = cRLSign, keyCertSign
|
||||
|
||||
|
@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
|
||||
basicConstraints = critical, CA:true
|
||||
|
||||
# Key usage: this is typical for a CA certificate. However since it will
|
||||
# prevent it being used as an test self-signed certificate it is best
|
||||
# prevent it being used as a test self-signed certificate it is best
|
||||
# left out by default.
|
||||
# keyUsage = cRLSign, keyCertSign
|
||||
|
||||
|
@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
|
||||
basicConstraints = critical, CA:true
|
||||
|
||||
# Key usage: this is typical for a CA certificate. However since it will
|
||||
# prevent it being used as an test self-signed certificate it is best
|
||||
# prevent it being used as a test self-signed certificate it is best
|
||||
# left out by default.
|
||||
# keyUsage = cRLSign, keyCertSign
|
||||
|
||||
|
@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
|
||||
basicConstraints = critical, CA:true
|
||||
|
||||
# Key usage: this is typical for a CA certificate. However since it will
|
||||
# prevent it being used as an test self-signed certificate it is best
|
||||
# prevent it being used as a test self-signed certificate it is best
|
||||
# left out by default.
|
||||
# keyUsage = cRLSign, keyCertSign
|
||||
|
||||
|
Reference in New Issue
Block a user