Fix typos

Change-Id: I69e5c6d82fddd1da1e414e7764f3a5d90351a43d
Reviewed-on: https://gerrit.libreoffice.org/76377
Tested-by: Jenkins
Reviewed-by: Julien Nabet <serval2412@yahoo.fr>
This commit is contained in:
Andrea Gelmini
2019-07-26 14:11:12 +02:00
committed by Julien Nabet
parent caa6268094
commit 496f32ea2b
32 changed files with 36 additions and 36 deletions

View File

@@ -30,10 +30,10 @@ module com { module sun { module star { module xml { module crypto {
/**
* Interface of XML encryption template
*
* <p>This interface represents a encryption template, which is the same as the
* <p>This interface represents an encryption template, which is the same as the
* desired XML encryption element[ EncryptedType ] but some of the nodes may be
* empty. The empty entities include CipherValue, which is a subset of
* EncryptedData or EncryptedKey. Empty entities are not allowed in a encryption
* EncryptedData or EncryptedKey. Empty entities are not allowed in an encryption
* template when performing decryption.</p>
*
* <p>In some cases, the encryptor or decryptor can determine and locate the

View File

@@ -59,7 +59,7 @@ protected:
/*
* the id of ElementCollector of the template element.
* For a signature, the template element is the Signature element,
* for a encryption, the EncryptedData/EncryptedKey element is.
* for an encryption, the EncryptedData/EncryptedKey element is.
*/
sal_Int32 m_nIdOfTemplateEC;

View File

@@ -86,7 +86,7 @@ short CertificateChooser::run()
// PostUserEvent( LINK( this, CertificateChooser, Initialize ) );
// PostUserLink behavior is to slow, so do it directly before Execute().
// PostUserLink behavior is too slow, so do it directly before Execute().
// Problem: This Dialog should be visible right now, and the parent should not be accessible.
// Show, Update, DisableInput...

View File

@@ -596,7 +596,7 @@ void DigitalSignaturesDialog::ImplFillSignaturesBox()
sImage = BMP_SIG_NOT_VALIDATED;
}
//Check if the signature is a "old" document signature, that is, which was created
//by an version of OOo previous to 3.2
//by a version of OOo previous to 3.2
// If there is no storage, then it's pointless to check storage
// stream references.
else if (maSignatureManager.getSignatureMode() == DocumentSignatureMode::Content

View File

@@ -47,7 +47,7 @@ protected:
/*
* the type value, is one of following values:
* TYPEOFELEMENTMARK - the default value, represents an blocker if
* TYPEOFELEMENTMARK - the default value, represents a blocker if
* not changed
* TYPEOFELEMENTCOLLECTOR - represents an ElementCollector
*/

View File

@@ -242,7 +242,7 @@ bool XSecController::chainOn()
* NOTES
* Sometimes, the last key SAX event can't be transferred to the
* SAXEventKeeper together.
* For instance, at the time an referenced element is detected, the
* For instance, at the time a referenced element is detected, the
* startElement event has already been reserved by the ElementStackKeeper.
* Meanwhile, an ElementCollector needs to be created before the
* SAXEventKeeper receives that startElement event.

View File

@@ -312,7 +312,7 @@ void SAL_CALL XSecParser::endElement( const OUString& aName )
{
if ( m_bReferenceUnresolved )
/*
* it must be a octet stream
* it must be an octet stream
*/
{
m_pXSecController->addStreamReference( m_currentReferenceURI, true, m_nReferenceDigestID );

View File

@@ -175,7 +175,7 @@ void XMLDocumentWrapper_XmlSecImpl::sendStartElement(
* xHandler2 - the second XDocumentHandler interface to receive the
* startElement SAX event. It can't be NULL.
* pNode - the node on which the startElement should be generated.
* This node must be a element type.
* This node must be an element type.
******************************************************************************/
{
SvXMLAttributeList* pAttributeList = new SvXMLAttributeList();
@@ -250,11 +250,11 @@ void XMLDocumentWrapper_XmlSecImpl::sendEndElement(
/****** XMLDocumentWrapper_XmlSecImpl/sendEndElement **************************
*
* NAME
* sendEndElement -- Constructs a endElement SAX event
* sendEndElement -- Constructs an endElement SAX event
*
* FUNCTION
* Used when converting the document into SAX event stream.
* This method constructs a endElement SAX event for a particular
* This method constructs an endElement SAX event for a particular
* element, then calls the endElement methods of the XDocumentHandlers.
*
* INPUTS
@@ -263,7 +263,7 @@ void XMLDocumentWrapper_XmlSecImpl::sendEndElement(
* xHandler2 - the second XDocumentHandler interface to receive the
* endElement SAX event. It can't be NULL.
* pNode - the node on which the endElement should be generated.
* This node must be a element type.
* This node must be an element type.
******************************************************************************/
{
OString sNodeName = getNodeQName(pNode);

View File

@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
basicConstraints = critical, CA:true
# Key usage: this is typical for a CA certificate. However since it will
# prevent it being used as an test self-signed certificate it is best
# prevent it being used as a test self-signed certificate it is best
# left out by default.
# keyUsage = cRLSign, keyCertSign

View File

@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
basicConstraints = critical, CA:true
# Key usage: this is typical for a CA certificate. However since it will
# prevent it being used as an test self-signed certificate it is best
# prevent it being used as a test self-signed certificate it is best
# left out by default.
# keyUsage = cRLSign, keyCertSign

View File

@@ -218,7 +218,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
basicConstraints = critical, CA:true
# Key usage: this is typical for a CA certificate. However since it will
# prevent it being used as an test self-signed certificate it is best
# prevent it being used as a test self-signed certificate it is best
# left out by default.
# keyUsage = cRLSign, keyCertSign

View File

@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
basicConstraints = critical, CA:true
# Key usage: this is typical for a CA certificate. However since it will
# prevent it being used as an test self-signed certificate it is best
# prevent it being used as a test self-signed certificate it is best
# left out by default.
# keyUsage = cRLSign, keyCertSign

View File

@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
basicConstraints = critical, CA:true
# Key usage: this is typical for a CA certificate. However since it will
# prevent it being used as an test self-signed certificate it is best
# prevent it being used as a test self-signed certificate it is best
# left out by default.
# keyUsage = cRLSign, keyCertSign

View File

@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
basicConstraints = critical, CA:true
# Key usage: this is typical for a CA certificate. However since it will
# prevent it being used as an test self-signed certificate it is best
# prevent it being used as a test self-signed certificate it is best
# left out by default.
# keyUsage = cRLSign, keyCertSign

View File

@@ -212,7 +212,7 @@ crlDistributionPoints=URI:http://localhost:8901/demoCA/crl/Root_5.crl
basicConstraints = critical, CA:true
# Key usage: this is typical for a CA certificate. However since it will
# prevent it being used as an test self-signed certificate it is best
# prevent it being used as a test self-signed certificate it is best
# left out by default.
# keyUsage = cRLSign, keyCertSign

View File

@@ -212,7 +212,7 @@ crlDistributionPoints=URI:http://localhost:8901/demoCA/crl/Root_6.crl
basicConstraints = critical, CA:true
# Key usage: this is typical for a CA certificate. However since it will
# prevent it being used as an test self-signed certificate it is best
# prevent it being used as a test self-signed certificate it is best
# left out by default.
# keyUsage = cRLSign, keyCertSign

View File

@@ -212,7 +212,7 @@ crlDistributionPoints=URI:http://localhost:8901/demoCA/crl/Root_7.crl
basicConstraints = critical, CA:true
# Key usage: this is typical for a CA certificate. However since it will
# prevent it being used as an test self-signed certificate it is best
# prevent it being used as a test self-signed certificate it is best
# left out by default.
# keyUsage = cRLSign, keyCertSign

View File

@@ -212,7 +212,7 @@ authorityInfoAccess = OCSP;URI:http://localhost:8888
basicConstraints = critical, CA:true
# Key usage: this is typical for a CA certificate. However since it will
# prevent it being used as an test self-signed certificate it is best
# prevent it being used as a test self-signed certificate it is best
# left out by default.
# keyUsage = cRLSign, keyCertSign

View File

@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
basicConstraints = critical, CA:true
# Key usage: this is typical for a CA certificate. However since it will
# prevent it being used as an test self-signed certificate it is best
# prevent it being used as a test self-signed certificate it is best
# left out by default.
# keyUsage = cRLSign, keyCertSign

View File

@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
basicConstraints = critical, CA:true
# Key usage: this is typical for a CA certificate. However since it will
# prevent it being used as an test self-signed certificate it is best
# prevent it being used as a test self-signed certificate it is best
# left out by default.
# keyUsage = cRLSign, keyCertSign

View File

@@ -213,7 +213,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
basicConstraints = critical, CA:true
# Key usage: this is typical for a CA certificate. However since it will
# prevent it being used as an test self-signed certificate it is best
# prevent it being used as a test self-signed certificate it is best
# left out by default.
# keyUsage = cRLSign, keyCertSign

View File

@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
basicConstraints = critical, CA:true
# Key usage: this is typical for a CA certificate. However since it will
# prevent it being used as an test self-signed certificate it is best
# prevent it being used as a test self-signed certificate it is best
# left out by default.
# keyUsage = cRLSign, keyCertSign

View File

@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
basicConstraints = critical, CA:true
# Key usage: this is typical for a CA certificate. However since it will
# prevent it being used as an test self-signed certificate it is best
# prevent it being used as a test self-signed certificate it is best
# left out by default.
# keyUsage = cRLSign, keyCertSign

View File

@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
basicConstraints = critical, CA:true
# Key usage: this is typical for a CA certificate. However since it will
# prevent it being used as an test self-signed certificate it is best
# prevent it being used as a test self-signed certificate it is best
# left out by default.
# keyUsage = cRLSign, keyCertSign

View File

@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
basicConstraints = critical, CA:true
# Key usage: this is typical for a CA certificate. However since it will
# prevent it being used as an test self-signed certificate it is best
# prevent it being used as a test self-signed certificate it is best
# left out by default.
# keyUsage = cRLSign, keyCertSign

View File

@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
basicConstraints = critical, CA:true
# Key usage: this is typical for a CA certificate. However since it will
# prevent it being used as an test self-signed certificate it is best
# prevent it being used as a test self-signed certificate it is best
# left out by default.
# keyUsage = cRLSign, keyCertSign

View File

@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
basicConstraints = critical, CA:true
# Key usage: this is typical for a CA certificate. However since it will
# prevent it being used as an test self-signed certificate it is best
# prevent it being used as a test self-signed certificate it is best
# left out by default.
# keyUsage = cRLSign, keyCertSign

View File

@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
basicConstraints = critical, CA:true
# Key usage: this is typical for a CA certificate. However since it will
# prevent it being used as an test self-signed certificate it is best
# prevent it being used as a test self-signed certificate it is best
# left out by default.
# keyUsage = cRLSign, keyCertSign

View File

@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
basicConstraints = critical, CA:true
# Key usage: this is typical for a CA certificate. However since it will
# prevent it being used as an test self-signed certificate it is best
# prevent it being used as a test self-signed certificate it is best
# left out by default.
# keyUsage = cRLSign, keyCertSign

View File

@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
basicConstraints = critical, CA:true
# Key usage: this is typical for a CA certificate. However since it will
# prevent it being used as an test self-signed certificate it is best
# prevent it being used as a test self-signed certificate it is best
# left out by default.
# keyUsage = cRLSign, keyCertSign

View File

@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
basicConstraints = critical, CA:true
# Key usage: this is typical for a CA certificate. However since it will
# prevent it being used as an test self-signed certificate it is best
# prevent it being used as a test self-signed certificate it is best
# left out by default.
# keyUsage = cRLSign, keyCertSign

View File

@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
basicConstraints = critical, CA:true
# Key usage: this is typical for a CA certificate. However since it will
# prevent it being used as an test self-signed certificate it is best
# prevent it being used as a test self-signed certificate it is best
# left out by default.
# keyUsage = cRLSign, keyCertSign