1
1
mirror of https://github.com/systemd/systemd-stable.git synced 2024-12-22 13:33:56 +03:00

tree-wide: fix typo

This commit is contained in:
Yu Watanabe 2021-08-18 19:14:31 +09:00 committed by Zbigniew Jędrzejewski-Szmek
parent 66e093def8
commit bdbb61f69f
6 changed files with 10 additions and 10 deletions

View File

@ -80,7 +80,7 @@
<filename>/etc/hosts</filename>.</para> <filename>/etc/hosts</filename>.</para>
<para>Please keep in mind that <command>nss-myhostname</command> (and <command>nss-resolve</command>) also resolve <para>Please keep in mind that <command>nss-myhostname</command> (and <command>nss-resolve</command>) also resolve
in the other direction — from locally attached IP adresses to in the other direction — from locally attached IP addresses to
hostnames. If you rely on that lookup being provided by DNS, you might hostnames. If you rely on that lookup being provided by DNS, you might
want to order things differently. want to order things differently.
</para> </para>

View File

@ -54,7 +54,7 @@
<command>systemd-resolved</command> is not running.</para> <command>systemd-resolved</command> is not running.</para>
<para>Please keep in mind that <command>nss-myhostname</command> (and <command>nss-resolve</command>) also resolve <para>Please keep in mind that <command>nss-myhostname</command> (and <command>nss-resolve</command>) also resolve
in the other direction — from locally attached IP adresses to in the other direction — from locally attached IP addresses to
hostnames. If you rely on that lookup being provided by DNS, you might hostnames. If you rely on that lookup being provided by DNS, you might
want to order things differently. want to order things differently.
</para> </para>

View File

@ -43,7 +43,7 @@ static int log_debug_open_error(struct crypt_device *cd, int r) {
* (alternatively: name is set to null, flags contains CRYPT_ACTIVATE_ALLOW_UNBOUND_KEY * (alternatively: name is set to null, flags contains CRYPT_ACTIVATE_ALLOW_UNBOUND_KEY
* and token is assigned to at least single keyslot). * and token is assigned to at least single keyslot).
* *
* - if plugin defines validate funtion (see cryptsetup_token_validate below) it must have * - if plugin defines validate function (see cryptsetup_token_validate below) it must have
* passed the check (aka return 0) * passed the check (aka return 0)
*/ */
_public_ int cryptsetup_token_open( _public_ int cryptsetup_token_open(
@ -110,7 +110,7 @@ _public_ int cryptsetup_token_open(
if (r < 0) if (r < 0)
return log_debug_open_error(cd, r); return log_debug_open_error(cd, r);
/* free'd automaticaly by libcryptsetup */ /* free'd automatically by libcryptsetup */
*password_len = strlen(base64_encoded); *password_len = strlen(base64_encoded);
*password = TAKE_PTR(base64_encoded); *password = TAKE_PTR(base64_encoded);

View File

@ -349,7 +349,7 @@ static int parse_argv(int argc, char *argv[]) {
char *hh; char *hh;
size_t n; size_t n;
/* If this is not a vaid verification mode, maybe it's a literally specified /* If this is not a valid verification mode, maybe it's a literally specified
* SHA256 hash? We can handle that too... */ * SHA256 hash? We can handle that too... */
r = unhexmem(optarg, (size_t) -1, &h, &n); r = unhexmem(optarg, (size_t) -1, &h, &n);

View File

@ -19,9 +19,9 @@
#include "stat-util.h" #include "stat-util.h"
#include "string-util.h" #include "string-util.h"
/* We treat tmpfs/ramfs + cgroupfs as non-physical file sytems. cgroupfs is similar to tmpfs in a way after /* We treat tmpfs/ramfs + cgroupfs as non-physical file systems. cgroupfs is similar to tmpfs in a way
* all: we can create arbitrary directory hierarchies in it, and hence can also use rm_rf() on it to remove * after all: we can create arbitrary directory hierarchies in it, and hence can also use rm_rf() on it
* those again. */ * to remove those again. */
static bool is_physical_fs(const struct statfs *sfs) { static bool is_physical_fs(const struct statfs *sfs) {
return !is_temporary_fs(sfs) && !is_cgroup_fs(sfs); return !is_temporary_fs(sfs) && !is_cgroup_fs(sfs);
} }

View File

@ -353,7 +353,7 @@ static int tpm2_get_best_pcr_bank(
assert_cc(TPM2_PCRS_MAX % 8 == 0); assert_cc(TPM2_PCRS_MAX % 8 == 0);
/* It's not enought to check how many PCRs there are, we also need to check that the 24 are /* It's not enough to check how many PCRs there are, we also need to check that the 24 are
* enabled for this bank. Otherwise this TPM doesn't qualify. */ * enabled for this bank. Otherwise this TPM doesn't qualify. */
for (size_t j = 0; j < TPM2_PCRS_MAX/8; j++) for (size_t j = 0; j < TPM2_PCRS_MAX/8; j++)
if (pcap->data.assignedPCR.pcrSelections[i].pcrSelect[j] != 0xFF) { if (pcap->data.assignedPCR.pcrSelections[i].pcrSelect[j] != 0xFF) {
@ -411,7 +411,7 @@ static int tpm2_make_pcr_session(
}; };
TPML_PCR_SELECTION pcr_selection = { TPML_PCR_SELECTION pcr_selection = {
.count = 1, .count = 1,
.pcrSelections[0].hash = TPM2_ALG_SHA256, /* overriden below, depending on TPM2 capabilities */ .pcrSelections[0].hash = TPM2_ALG_SHA256, /* overridden below, depending on TPM2 capabilities */
.pcrSelections[0].sizeofSelect = 3, .pcrSelections[0].sizeofSelect = 3,
.pcrSelections[0].pcrSelect[0] = pcr_mask & 0xFF, .pcrSelections[0].pcrSelect[0] = pcr_mask & 0xFF,
.pcrSelections[0].pcrSelect[1] = (pcr_mask >> 8) & 0xFF, .pcrSelections[0].pcrSelect[1] = (pcr_mask >> 8) & 0xFF,