mirror of
https://github.com/systemd/systemd.git
synced 2025-03-25 18:50:18 +03:00
Typo fixes
This commit is contained in:
parent
c2caabbb54
commit
c629ff587b
@ -72,7 +72,7 @@
|
||||
project='man-pages'><refentrytitle>swapon</refentrytitle><manvolnum>8</manvolnum></citerefentry>
|
||||
binary is executed in, in
|
||||
<citerefentry><refentrytitle>systemd.kill</refentrytitle><manvolnum>5</manvolnum></citerefentry>,
|
||||
which define the way the these processes are
|
||||
which define the way these processes are
|
||||
terminated, and in
|
||||
<citerefentry><refentrytitle>systemd.resource-control</refentrytitle><manvolnum>5</manvolnum></citerefentry>,
|
||||
which configure resource control settings for these processes of the
|
||||
|
@ -30,7 +30,7 @@ typedef struct DnsAnswerItem DnsAnswerItem;
|
||||
* can qualify A and AAAA RRs referring to a local link with the
|
||||
* right ifindex.
|
||||
*
|
||||
* Note that we usually encode the the empty DnsAnswer object as a simple NULL. */
|
||||
* Note that we usually encode the empty DnsAnswer object as a simple NULL. */
|
||||
|
||||
typedef enum DnsAnswerFlags {
|
||||
DNS_ANSWER_AUTHENTICATED = 1, /* Item has been authenticated */
|
||||
|
@ -635,9 +635,9 @@ int dnssec_verify_rrset(
|
||||
assert(rrsig->key->type == DNS_TYPE_RRSIG);
|
||||
assert(dnskey->key->type == DNS_TYPE_DNSKEY);
|
||||
|
||||
/* Verifies the the RRSet matching the specified "key" in "a",
|
||||
/* Verifies that the RRSet matches the specified "key" in "a",
|
||||
* using the signature "rrsig" and the key "dnskey". It's
|
||||
* assumed the RRSIG and DNSKEY match. */
|
||||
* assumed that RRSIG and DNSKEY match. */
|
||||
|
||||
md_algorithm = algorithm_to_gcrypt_md(rrsig->rrsig.algorithm);
|
||||
if (md_algorithm == -EOPNOTSUPP) {
|
||||
@ -1989,7 +1989,7 @@ static int dnssec_test_positive_wildcard_nsec3(
|
||||
|
||||
/* Run a positive NSEC3 wildcard proof. Specifically:
|
||||
*
|
||||
* A proof that the the "next closer" of the generating wildcard does not exist.
|
||||
* A proof that the "next closer" of the generating wildcard does not exist.
|
||||
*
|
||||
* Note a key difference between the NSEC3 and NSEC versions of the proof. NSEC RRs don't have to exist for
|
||||
* empty non-transients. NSEC3 RRs however have to. This means it's sufficient to check if the next closer name
|
||||
|
@ -1678,7 +1678,7 @@ static int dns_transaction_negative_trust_anchor_lookup(DnsTransaction *t, const
|
||||
|
||||
assert(t);
|
||||
|
||||
/* Check whether the specified name is in the the NTA
|
||||
/* Check whether the specified name is in the NTA
|
||||
* database, either in the global one, or the link-local
|
||||
* one. */
|
||||
|
||||
|
@ -331,7 +331,7 @@ int dns_label_apply_idna(const char *encoded, size_t encoded_size, char *decoded
|
||||
|
||||
l = strlen(buffer);
|
||||
|
||||
/* Verify that the the result is not longer than one DNS label. */
|
||||
/* Verify that the result is not longer than one DNS label. */
|
||||
if (l <= 0 || l > DNS_LABEL_MAX)
|
||||
return -EINVAL;
|
||||
if (l > decoded_max)
|
||||
|
Loading…
x
Reference in New Issue
Block a user