diff --git a/debian/proxmox-backup-file-restore.postinst b/debian/proxmox-backup-file-restore.postinst index 9792bfb4..c73893dd 100755 --- a/debian/proxmox-backup-file-restore.postinst +++ b/debian/proxmox-backup-file-restore.postinst @@ -9,7 +9,7 @@ update_initramfs() { CACHE_PATH_DBG="/var/cache/proxmox-backup/file-restore-initramfs-debug.img" # cleanup first, in case proxmox-file-restore was uninstalled since we do - # not want an unuseable image lying around + # not want an unusable image lying around rm -f "$CACHE_PATH" if [ ! -f "$INST_PATH/initramfs.img" ]; then diff --git a/pbs-tape/src/sg_tape/encryption.rs b/pbs-tape/src/sg_tape/encryption.rs index 9fafb62a..19444d28 100644 --- a/pbs-tape/src/sg_tape/encryption.rs +++ b/pbs-tape/src/sg_tape/encryption.rs @@ -236,7 +236,7 @@ struct SspDataEncryptionAlgorithmDescriptor { algorithm_code: u32, } -// Returns the algorythm_index for AES-GCM +// Returns the algorithm_index for AES-GCM fn decode_spin_data_encryption_caps(data: &[u8]) -> Result { proxmox_lang::try_block!({ let mut reader = data; diff --git a/pbs-tools/src/crypt_config.rs b/pbs-tools/src/crypt_config.rs index cbf74190..6ea46b57 100644 --- a/pbs-tools/src/crypt_config.rs +++ b/pbs-tools/src/crypt_config.rs @@ -26,7 +26,7 @@ const FINGERPRINT_INPUT: [u8; 32] = [ pub struct CryptConfig { // the Cipher cipher: Cipher, - // A secrect key use to provide the chunk digest name space. + // A secret key use to provide the chunk digest name space. id_key: [u8; 32], // Openssl hmac PKey of id_key id_pkey: openssl::pkey::PKey, diff --git a/src/tape/test/alloc_writable_media.rs b/src/tape/test/alloc_writable_media.rs index dbc1b0c7..ff9a6348 100644 --- a/src/tape/test/alloc_writable_media.rs +++ b/src/tape/test/alloc_writable_media.rs @@ -1,4 +1,4 @@ -// Tape Media Pool tests - test allow_ritable_media() function +// Tape Media Pool tests - test allow_writable_media() function // // # cargo test --release tape::test::alloc_writable_media