1
1
mirror of https://github.com/systemd/systemd-stable.git synced 2024-12-21 09:33:57 +03:00

tree-wide: fix typo

This commit is contained in:
Yu Watanabe 2021-08-18 19:14:31 +09:00 committed by Zbigniew Jędrzejewski-Szmek
parent 66e093def8
commit bdbb61f69f
6 changed files with 10 additions and 10 deletions

View File

@ -80,7 +80,7 @@
<filename>/etc/hosts</filename>.</para>
<para>Please keep in mind that <command>nss-myhostname</command> (and <command>nss-resolve</command>) also resolve
in the other direction — from locally attached IP adresses to
in the other direction — from locally attached IP addresses to
hostnames. If you rely on that lookup being provided by DNS, you might
want to order things differently.
</para>

View File

@ -54,7 +54,7 @@
<command>systemd-resolved</command> is not running.</para>
<para>Please keep in mind that <command>nss-myhostname</command> (and <command>nss-resolve</command>) also resolve
in the other direction — from locally attached IP adresses to
in the other direction — from locally attached IP addresses to
hostnames. If you rely on that lookup being provided by DNS, you might
want to order things differently.
</para>

View File

@ -43,7 +43,7 @@ static int log_debug_open_error(struct crypt_device *cd, int r) {
* (alternatively: name is set to null, flags contains CRYPT_ACTIVATE_ALLOW_UNBOUND_KEY
* and token is assigned to at least single keyslot).
*
* - if plugin defines validate funtion (see cryptsetup_token_validate below) it must have
* - if plugin defines validate function (see cryptsetup_token_validate below) it must have
* passed the check (aka return 0)
*/
_public_ int cryptsetup_token_open(
@ -110,7 +110,7 @@ _public_ int cryptsetup_token_open(
if (r < 0)
return log_debug_open_error(cd, r);
/* free'd automaticaly by libcryptsetup */
/* free'd automatically by libcryptsetup */
*password_len = strlen(base64_encoded);
*password = TAKE_PTR(base64_encoded);

View File

@ -349,7 +349,7 @@ static int parse_argv(int argc, char *argv[]) {
char *hh;
size_t n;
/* If this is not a vaid verification mode, maybe it's a literally specified
/* If this is not a valid verification mode, maybe it's a literally specified
* SHA256 hash? We can handle that too... */
r = unhexmem(optarg, (size_t) -1, &h, &n);

View File

@ -19,9 +19,9 @@
#include "stat-util.h"
#include "string-util.h"
/* We treat tmpfs/ramfs + cgroupfs as non-physical file sytems. cgroupfs is similar to tmpfs in a way after
* all: we can create arbitrary directory hierarchies in it, and hence can also use rm_rf() on it to remove
* those again. */
/* We treat tmpfs/ramfs + cgroupfs as non-physical file systems. cgroupfs is similar to tmpfs in a way
* after all: we can create arbitrary directory hierarchies in it, and hence can also use rm_rf() on it
* to remove those again. */
static bool is_physical_fs(const struct statfs *sfs) {
return !is_temporary_fs(sfs) && !is_cgroup_fs(sfs);
}

View File

@ -353,7 +353,7 @@ static int tpm2_get_best_pcr_bank(
assert_cc(TPM2_PCRS_MAX % 8 == 0);
/* It's not enought to check how many PCRs there are, we also need to check that the 24 are
/* It's not enough to check how many PCRs there are, we also need to check that the 24 are
* enabled for this bank. Otherwise this TPM doesn't qualify. */
for (size_t j = 0; j < TPM2_PCRS_MAX/8; j++)
if (pcap->data.assignedPCR.pcrSelections[i].pcrSelect[j] != 0xFF) {
@ -411,7 +411,7 @@ static int tpm2_make_pcr_session(
};
TPML_PCR_SELECTION pcr_selection = {
.count = 1,
.pcrSelections[0].hash = TPM2_ALG_SHA256, /* overriden below, depending on TPM2 capabilities */
.pcrSelections[0].hash = TPM2_ALG_SHA256, /* overridden below, depending on TPM2 capabilities */
.pcrSelections[0].sizeofSelect = 3,
.pcrSelections[0].pcrSelect[0] = pcr_mask & 0xFF,
.pcrSelections[0].pcrSelect[1] = (pcr_mask >> 8) & 0xFF,