[Libreoffice-commits] core.git: offapi/com xmlsecurity/inc xmlsecurity/source xmlsecurity/test_docs

Andrea Gelmini (via logerrit) logerrit at kemper.freedesktop.org
Wed Jul 31 13:17:59 UTC 2019


 offapi/com/sun/star/xml/crypto/XXMLEncryptionTemplate.idl   |    4 ++--
 xmlsecurity/inc/framework/securityengine.hxx                |    2 +-
 xmlsecurity/source/dialogs/certificatechooser.cxx           |    2 +-
 xmlsecurity/source/dialogs/digitalsignaturesdialog.cxx      |    2 +-
 xmlsecurity/source/framework/elementmark.hxx                |    2 +-
 xmlsecurity/source/helper/xsecctl.cxx                       |    2 +-
 xmlsecurity/source/helper/xsecparser.cxx                    |    2 +-
 xmlsecurity/source/xmlsec/xmldocumentwrapper_xmlsecimpl.cxx |    8 ++++----
 xmlsecurity/test_docs/CAs/Root_1/openssl.cfg                |    2 +-
 xmlsecurity/test_docs/CAs/Root_10/openssl.cfg               |    2 +-
 xmlsecurity/test_docs/CAs/Root_11/openssl.cfg               |    2 +-
 xmlsecurity/test_docs/CAs/Root_2/openssl.cfg                |    2 +-
 xmlsecurity/test_docs/CAs/Root_3/openssl.cfg                |    2 +-
 xmlsecurity/test_docs/CAs/Root_4/openssl.cfg                |    2 +-
 xmlsecurity/test_docs/CAs/Root_5/openssl.cfg                |    2 +-
 xmlsecurity/test_docs/CAs/Root_6/openssl.cfg                |    2 +-
 xmlsecurity/test_docs/CAs/Root_7/openssl.cfg                |    2 +-
 xmlsecurity/test_docs/CAs/Root_8/openssl.cfg                |    2 +-
 xmlsecurity/test_docs/CAs/Root_9/openssl.cfg                |    2 +-
 xmlsecurity/test_docs/CAs/Sub_CA_1_Root_1/openssl.cfg       |    2 +-
 xmlsecurity/test_docs/CAs/Sub_CA_1_Root_10/openssl.cfg      |    2 +-
 xmlsecurity/test_docs/CAs/Sub_CA_1_Root_2/openssl.cfg       |    2 +-
 xmlsecurity/test_docs/CAs/Sub_CA_1_Root_3/openssl.cfg       |    2 +-
 xmlsecurity/test_docs/CAs/Sub_CA_1_Root_4/openssl.cfg       |    2 +-
 xmlsecurity/test_docs/CAs/Sub_CA_1_Root_5/openssl.cfg       |    2 +-
 xmlsecurity/test_docs/CAs/Sub_CA_1_Root_6/openssl.cfg       |    2 +-
 xmlsecurity/test_docs/CAs/Sub_CA_1_Root_7/openssl.cfg       |    2 +-
 xmlsecurity/test_docs/CAs/Sub_CA_1_Root_8/openssl.cfg       |    2 +-
 xmlsecurity/test_docs/CAs/Sub_CA_1_Root_9/openssl.cfg       |    2 +-
 xmlsecurity/test_docs/CAs/Sub_CA_2_Root_4/openssl.cfg       |    2 +-
 xmlsecurity/test_docs/CAs/Sub_CA_2_Root_7/openssl.cfg       |    2 +-
 xmlsecurity/test_docs/CAs/Sub_CA_2_Root_8/openssl.cfg       |    2 +-
 32 files changed, 36 insertions(+), 36 deletions(-)

New commits:
commit 496f32ea2ba3600f739cf8e56e5fae65ce4927cb
Author:     Andrea Gelmini <andrea.gelmini at gelma.net>
AuthorDate: Fri Jul 26 14:11:12 2019 +0200
Commit:     Julien Nabet <serval2412 at yahoo.fr>
CommitDate: Wed Jul 31 15:17:14 2019 +0200

    Fix typos
    
    Change-Id: I69e5c6d82fddd1da1e414e7764f3a5d90351a43d
    Reviewed-on: https://gerrit.libreoffice.org/76377
    Tested-by: Jenkins
    Reviewed-by: Julien Nabet <serval2412 at yahoo.fr>

diff --git a/offapi/com/sun/star/xml/crypto/XXMLEncryptionTemplate.idl b/offapi/com/sun/star/xml/crypto/XXMLEncryptionTemplate.idl
index b19eac3504be..a630d84bf2c2 100644
--- a/offapi/com/sun/star/xml/crypto/XXMLEncryptionTemplate.idl
+++ b/offapi/com/sun/star/xml/crypto/XXMLEncryptionTemplate.idl
@@ -30,10 +30,10 @@ module com { module sun { module star { module xml { module crypto {
 /**
  * Interface of XML encryption template
  *
- * <p>This interface represents a encryption template, which is the same as the
+ * <p>This interface represents an encryption template, which is the same as the
  * desired XML encryption element[ EncryptedType ] but some of the nodes may be
  * empty. The empty entities include CipherValue, which is a subset of
- * EncryptedData or EncryptedKey. Empty entities are not allowed in a encryption
+ * EncryptedData or EncryptedKey. Empty entities are not allowed in an encryption
  * template when performing decryption.</p>
  *
  * <p>In some cases, the encryptor or decryptor can determine and locate the
diff --git a/xmlsecurity/inc/framework/securityengine.hxx b/xmlsecurity/inc/framework/securityengine.hxx
index 50cec2d4b8b8..ca47389c427b 100644
--- a/xmlsecurity/inc/framework/securityengine.hxx
+++ b/xmlsecurity/inc/framework/securityengine.hxx
@@ -59,7 +59,7 @@ protected:
     /*
      * the id of ElementCollector of the template element.
      * For a signature, the template element is the Signature element,
-     * for a encryption, the EncryptedData/EncryptedKey element is.
+     * for an encryption, the EncryptedData/EncryptedKey element is.
      */
     sal_Int32 m_nIdOfTemplateEC;
 
diff --git a/xmlsecurity/source/dialogs/certificatechooser.cxx b/xmlsecurity/source/dialogs/certificatechooser.cxx
index 68bd9efbb497..ec499bc159b0 100644
--- a/xmlsecurity/source/dialogs/certificatechooser.cxx
+++ b/xmlsecurity/source/dialogs/certificatechooser.cxx
@@ -86,7 +86,7 @@ short CertificateChooser::run()
 
     // PostUserEvent( LINK( this, CertificateChooser, Initialize ) );
 
-    // PostUserLink behavior is to slow, so do it directly before Execute().
+    // PostUserLink behavior is too slow, so do it directly before Execute().
     // Problem: This Dialog should be visible right now, and the parent should not be accessible.
     // Show, Update, DisableInput...
 
diff --git a/xmlsecurity/source/dialogs/digitalsignaturesdialog.cxx b/xmlsecurity/source/dialogs/digitalsignaturesdialog.cxx
index c2568eba803b..9ff40b864144 100644
--- a/xmlsecurity/source/dialogs/digitalsignaturesdialog.cxx
+++ b/xmlsecurity/source/dialogs/digitalsignaturesdialog.cxx
@@ -596,7 +596,7 @@ void DigitalSignaturesDialog::ImplFillSignaturesBox()
                 sImage = BMP_SIG_NOT_VALIDATED;
             }
             //Check if the signature is a "old" document signature, that is, which was created
-            //by an version of OOo previous to 3.2
+            //by a version of OOo previous to 3.2
             // If there is no storage, then it's pointless to check storage
             // stream references.
             else if (maSignatureManager.getSignatureMode() == DocumentSignatureMode::Content
diff --git a/xmlsecurity/source/framework/elementmark.hxx b/xmlsecurity/source/framework/elementmark.hxx
index 8697a9de8876..e035cc1a58c8 100644
--- a/xmlsecurity/source/framework/elementmark.hxx
+++ b/xmlsecurity/source/framework/elementmark.hxx
@@ -47,7 +47,7 @@ protected:
 
     /*
      * the type value, is one of following values:
-     * TYPEOFELEMENTMARK - the default value, represents an blocker if
+     * TYPEOFELEMENTMARK - the default value, represents a blocker if
      *                     not changed
      * TYPEOFELEMENTCOLLECTOR - represents an ElementCollector
      */
diff --git a/xmlsecurity/source/helper/xsecctl.cxx b/xmlsecurity/source/helper/xsecctl.cxx
index 6dbd44b091be..ab108d13c224 100644
--- a/xmlsecurity/source/helper/xsecctl.cxx
+++ b/xmlsecurity/source/helper/xsecctl.cxx
@@ -242,7 +242,7 @@ bool XSecController::chainOn()
  *   NOTES
  *  Sometimes, the last key SAX event can't be transferred to the
  *  SAXEventKeeper together.
- *  For instance, at the time an referenced element is detected, the
+ *  For instance, at the time a referenced element is detected, the
  *  startElement event has already been reserved by the ElementStackKeeper.
  *  Meanwhile, an ElementCollector needs to be created before the
  *  SAXEventKeeper receives that startElement event.
diff --git a/xmlsecurity/source/helper/xsecparser.cxx b/xmlsecurity/source/helper/xsecparser.cxx
index 10b2a95cba99..82f347bff976 100644
--- a/xmlsecurity/source/helper/xsecparser.cxx
+++ b/xmlsecurity/source/helper/xsecparser.cxx
@@ -312,7 +312,7 @@ void SAL_CALL XSecParser::endElement( const OUString& aName )
         {
             if ( m_bReferenceUnresolved )
             /*
-            * it must be a octet stream
+            * it must be an octet stream
             */
             {
                 m_pXSecController->addStreamReference( m_currentReferenceURI, true, m_nReferenceDigestID );
diff --git a/xmlsecurity/source/xmlsec/xmldocumentwrapper_xmlsecimpl.cxx b/xmlsecurity/source/xmlsec/xmldocumentwrapper_xmlsecimpl.cxx
index 8f9ebb1c18e4..a2ebb134d1e5 100644
--- a/xmlsecurity/source/xmlsec/xmldocumentwrapper_xmlsecimpl.cxx
+++ b/xmlsecurity/source/xmlsec/xmldocumentwrapper_xmlsecimpl.cxx
@@ -175,7 +175,7 @@ void XMLDocumentWrapper_XmlSecImpl::sendStartElement(
  *  xHandler2 - the second XDocumentHandler interface to receive the
  *          startElement SAX event. It can't be NULL.
  *  pNode -     the node on which the startElement should be generated.
- *          This node must be a element type.
+ *          This node must be an element type.
  ******************************************************************************/
 {
     SvXMLAttributeList* pAttributeList = new SvXMLAttributeList();
@@ -250,11 +250,11 @@ void XMLDocumentWrapper_XmlSecImpl::sendEndElement(
 /****** XMLDocumentWrapper_XmlSecImpl/sendEndElement **************************
  *
  *   NAME
- *  sendEndElement -- Constructs a endElement SAX event
+ *  sendEndElement -- Constructs an endElement SAX event
  *
  *   FUNCTION
  *  Used when converting the document into SAX event stream.
- *  This method constructs a endElement SAX event for a particular
+ *  This method constructs an endElement SAX event for a particular
  *  element, then calls the endElement methods of the XDocumentHandlers.
  *
  *   INPUTS
@@ -263,7 +263,7 @@ void XMLDocumentWrapper_XmlSecImpl::sendEndElement(
  *  xHandler2 - the second XDocumentHandler interface to receive the
  *          endElement SAX event. It can't be NULL.
  *  pNode -     the node on which the endElement should be generated.
- *          This node must be a element type.
+ *          This node must be an element type.
  ******************************************************************************/
 {
     OString sNodeName = getNodeQName(pNode);
diff --git a/xmlsecurity/test_docs/CAs/Root_1/openssl.cfg b/xmlsecurity/test_docs/CAs/Root_1/openssl.cfg
index d6907c7d3be6..0dd15bd9ecd1 100644
--- a/xmlsecurity/test_docs/CAs/Root_1/openssl.cfg
+++ b/xmlsecurity/test_docs/CAs/Root_1/openssl.cfg
@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
 basicConstraints = critical, CA:true
 
 # Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
+# prevent it being used as a test self-signed certificate it is best
 # left out by default.
 # keyUsage = cRLSign, keyCertSign
 
diff --git a/xmlsecurity/test_docs/CAs/Root_10/openssl.cfg b/xmlsecurity/test_docs/CAs/Root_10/openssl.cfg
index 1366ca2ba008..f48e3d5a3463 100644
--- a/xmlsecurity/test_docs/CAs/Root_10/openssl.cfg
+++ b/xmlsecurity/test_docs/CAs/Root_10/openssl.cfg
@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
 basicConstraints = critical, CA:true
 
 # Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
+# prevent it being used as a test self-signed certificate it is best
 # left out by default.
 # keyUsage = cRLSign, keyCertSign
 
diff --git a/xmlsecurity/test_docs/CAs/Root_11/openssl.cfg b/xmlsecurity/test_docs/CAs/Root_11/openssl.cfg
index c38d22bcbeac..dd84cb90698b 100644
--- a/xmlsecurity/test_docs/CAs/Root_11/openssl.cfg
+++ b/xmlsecurity/test_docs/CAs/Root_11/openssl.cfg
@@ -218,7 +218,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
 basicConstraints = critical, CA:true 
  
 # Key usage: this is typical for a CA certificate. However since it will 
-# prevent it being used as an test self-signed certificate it is best 
+# prevent it being used as a test self-signed certificate it is best
 # left out by default. 
 # keyUsage = cRLSign, keyCertSign 
  
diff --git a/xmlsecurity/test_docs/CAs/Root_2/openssl.cfg b/xmlsecurity/test_docs/CAs/Root_2/openssl.cfg
index d6907c7d3be6..0dd15bd9ecd1 100644
--- a/xmlsecurity/test_docs/CAs/Root_2/openssl.cfg
+++ b/xmlsecurity/test_docs/CAs/Root_2/openssl.cfg
@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
 basicConstraints = critical, CA:true
 
 # Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
+# prevent it being used as a test self-signed certificate it is best
 # left out by default.
 # keyUsage = cRLSign, keyCertSign
 
diff --git a/xmlsecurity/test_docs/CAs/Root_3/openssl.cfg b/xmlsecurity/test_docs/CAs/Root_3/openssl.cfg
index a9b2faeb9374..51e5205253e8 100644
--- a/xmlsecurity/test_docs/CAs/Root_3/openssl.cfg
+++ b/xmlsecurity/test_docs/CAs/Root_3/openssl.cfg
@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
 basicConstraints = critical, CA:true
 
 # Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
+# prevent it being used as a test self-signed certificate it is best
 # left out by default.
 # keyUsage = cRLSign, keyCertSign
 
diff --git a/xmlsecurity/test_docs/CAs/Root_4/openssl.cfg b/xmlsecurity/test_docs/CAs/Root_4/openssl.cfg
index a9b2faeb9374..51e5205253e8 100644
--- a/xmlsecurity/test_docs/CAs/Root_4/openssl.cfg
+++ b/xmlsecurity/test_docs/CAs/Root_4/openssl.cfg
@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
 basicConstraints = critical, CA:true
 
 # Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
+# prevent it being used as a test self-signed certificate it is best
 # left out by default.
 # keyUsage = cRLSign, keyCertSign
 
diff --git a/xmlsecurity/test_docs/CAs/Root_5/openssl.cfg b/xmlsecurity/test_docs/CAs/Root_5/openssl.cfg
index b96b72d84dac..0ea6df2972a6 100644
--- a/xmlsecurity/test_docs/CAs/Root_5/openssl.cfg
+++ b/xmlsecurity/test_docs/CAs/Root_5/openssl.cfg
@@ -212,7 +212,7 @@ crlDistributionPoints=URI:http://localhost:8901/demoCA/crl/Root_5.crl
 basicConstraints = critical, CA:true
 
 # Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
+# prevent it being used as a test self-signed certificate it is best
 # left out by default.
 # keyUsage = cRLSign, keyCertSign
 
diff --git a/xmlsecurity/test_docs/CAs/Root_6/openssl.cfg b/xmlsecurity/test_docs/CAs/Root_6/openssl.cfg
index c8f620f4ac08..f49c11090115 100644
--- a/xmlsecurity/test_docs/CAs/Root_6/openssl.cfg
+++ b/xmlsecurity/test_docs/CAs/Root_6/openssl.cfg
@@ -212,7 +212,7 @@ crlDistributionPoints=URI:http://localhost:8901/demoCA/crl/Root_6.crl
 basicConstraints = critical, CA:true
 
 # Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
+# prevent it being used as a test self-signed certificate it is best
 # left out by default.
 # keyUsage = cRLSign, keyCertSign
 
diff --git a/xmlsecurity/test_docs/CAs/Root_7/openssl.cfg b/xmlsecurity/test_docs/CAs/Root_7/openssl.cfg
index 3724679b961a..f2615bef4fd4 100644
--- a/xmlsecurity/test_docs/CAs/Root_7/openssl.cfg
+++ b/xmlsecurity/test_docs/CAs/Root_7/openssl.cfg
@@ -212,7 +212,7 @@ crlDistributionPoints=URI:http://localhost:8901/demoCA/crl/Root_7.crl
 basicConstraints = critical, CA:true
 
 # Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
+# prevent it being used as a test self-signed certificate it is best
 # left out by default.
 # keyUsage = cRLSign, keyCertSign
 
diff --git a/xmlsecurity/test_docs/CAs/Root_8/openssl.cfg b/xmlsecurity/test_docs/CAs/Root_8/openssl.cfg
index b9e076a2bf86..077e13b2b548 100644
--- a/xmlsecurity/test_docs/CAs/Root_8/openssl.cfg
+++ b/xmlsecurity/test_docs/CAs/Root_8/openssl.cfg
@@ -212,7 +212,7 @@ authorityInfoAccess = OCSP;URI:http://localhost:8888
 basicConstraints = critical, CA:true
 
 # Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
+# prevent it being used as a test self-signed certificate it is best
 # left out by default.
 # keyUsage = cRLSign, keyCertSign
 
diff --git a/xmlsecurity/test_docs/CAs/Root_9/openssl.cfg b/xmlsecurity/test_docs/CAs/Root_9/openssl.cfg
index 1366ca2ba008..f48e3d5a3463 100644
--- a/xmlsecurity/test_docs/CAs/Root_9/openssl.cfg
+++ b/xmlsecurity/test_docs/CAs/Root_9/openssl.cfg
@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
 basicConstraints = critical, CA:true
 
 # Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
+# prevent it being used as a test self-signed certificate it is best
 # left out by default.
 # keyUsage = cRLSign, keyCertSign
 
diff --git a/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_1/openssl.cfg b/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_1/openssl.cfg
index d6907c7d3be6..0dd15bd9ecd1 100644
--- a/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_1/openssl.cfg
+++ b/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_1/openssl.cfg
@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
 basicConstraints = critical, CA:true
 
 # Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
+# prevent it being used as a test self-signed certificate it is best
 # left out by default.
 # keyUsage = cRLSign, keyCertSign
 
diff --git a/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_10/openssl.cfg b/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_10/openssl.cfg
index 36e8c8a4ad0c..431650974b83 100644
--- a/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_10/openssl.cfg
+++ b/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_10/openssl.cfg
@@ -213,7 +213,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
 basicConstraints = critical, CA:true
 
 # Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
+# prevent it being used as a test self-signed certificate it is best
 # left out by default.
 # keyUsage = cRLSign, keyCertSign
 
diff --git a/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_2/openssl.cfg b/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_2/openssl.cfg
index a9b2faeb9374..51e5205253e8 100644
--- a/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_2/openssl.cfg
+++ b/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_2/openssl.cfg
@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
 basicConstraints = critical, CA:true
 
 # Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
+# prevent it being used as a test self-signed certificate it is best
 # left out by default.
 # keyUsage = cRLSign, keyCertSign
 
diff --git a/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_3/openssl.cfg b/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_3/openssl.cfg
index a9b2faeb9374..51e5205253e8 100644
--- a/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_3/openssl.cfg
+++ b/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_3/openssl.cfg
@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
 basicConstraints = critical, CA:true
 
 # Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
+# prevent it being used as a test self-signed certificate it is best
 # left out by default.
 # keyUsage = cRLSign, keyCertSign
 
diff --git a/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_4/openssl.cfg b/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_4/openssl.cfg
index a9b2faeb9374..51e5205253e8 100644
--- a/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_4/openssl.cfg
+++ b/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_4/openssl.cfg
@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
 basicConstraints = critical, CA:true
 
 # Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
+# prevent it being used as a test self-signed certificate it is best
 # left out by default.
 # keyUsage = cRLSign, keyCertSign
 
diff --git a/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_5/openssl.cfg b/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_5/openssl.cfg
index 86b9f3bf0278..963ab884f645 100644
--- a/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_5/openssl.cfg
+++ b/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_5/openssl.cfg
@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
 basicConstraints = critical, CA:true
 
 # Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
+# prevent it being used as a test self-signed certificate it is best
 # left out by default.
 # keyUsage = cRLSign, keyCertSign
 
diff --git a/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_6/openssl.cfg b/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_6/openssl.cfg
index feae40560e68..188ed62e2a76 100644
--- a/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_6/openssl.cfg
+++ b/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_6/openssl.cfg
@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
 basicConstraints = critical, CA:true
 
 # Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
+# prevent it being used as a test self-signed certificate it is best
 # left out by default.
 # keyUsage = cRLSign, keyCertSign
 
diff --git a/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_7/openssl.cfg b/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_7/openssl.cfg
index 3fe6d3696507..7cbc4664fa2f 100644
--- a/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_7/openssl.cfg
+++ b/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_7/openssl.cfg
@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
 basicConstraints = critical, CA:true
 
 # Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
+# prevent it being used as a test self-signed certificate it is best
 # left out by default.
 # keyUsage = cRLSign, keyCertSign
 
diff --git a/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_8/openssl.cfg b/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_8/openssl.cfg
index 3b51276ea7b4..571237e7da69 100644
--- a/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_8/openssl.cfg
+++ b/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_8/openssl.cfg
@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
 basicConstraints = critical, CA:true
 
 # Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
+# prevent it being used as a test self-signed certificate it is best
 # left out by default.
 # keyUsage = cRLSign, keyCertSign
 
diff --git a/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_9/openssl.cfg b/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_9/openssl.cfg
index bce569719fd2..4a5b97f53017 100644
--- a/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_9/openssl.cfg
+++ b/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_9/openssl.cfg
@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
 basicConstraints = critical, CA:true
 
 # Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
+# prevent it being used as a test self-signed certificate it is best
 # left out by default.
 # keyUsage = cRLSign, keyCertSign
 
diff --git a/xmlsecurity/test_docs/CAs/Sub_CA_2_Root_4/openssl.cfg b/xmlsecurity/test_docs/CAs/Sub_CA_2_Root_4/openssl.cfg
index a9b2faeb9374..51e5205253e8 100644
--- a/xmlsecurity/test_docs/CAs/Sub_CA_2_Root_4/openssl.cfg
+++ b/xmlsecurity/test_docs/CAs/Sub_CA_2_Root_4/openssl.cfg
@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
 basicConstraints = critical, CA:true
 
 # Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
+# prevent it being used as a test self-signed certificate it is best
 # left out by default.
 # keyUsage = cRLSign, keyCertSign
 
diff --git a/xmlsecurity/test_docs/CAs/Sub_CA_2_Root_7/openssl.cfg b/xmlsecurity/test_docs/CAs/Sub_CA_2_Root_7/openssl.cfg
index 7887aed1a1b1..c6acf751f5c0 100644
--- a/xmlsecurity/test_docs/CAs/Sub_CA_2_Root_7/openssl.cfg
+++ b/xmlsecurity/test_docs/CAs/Sub_CA_2_Root_7/openssl.cfg
@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
 basicConstraints = critical, CA:true
 
 # Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
+# prevent it being used as a test self-signed certificate it is best
 # left out by default.
 # keyUsage = cRLSign, keyCertSign
 
diff --git a/xmlsecurity/test_docs/CAs/Sub_CA_2_Root_8/openssl.cfg b/xmlsecurity/test_docs/CAs/Sub_CA_2_Root_8/openssl.cfg
index 3b51276ea7b4..571237e7da69 100644
--- a/xmlsecurity/test_docs/CAs/Sub_CA_2_Root_8/openssl.cfg
+++ b/xmlsecurity/test_docs/CAs/Sub_CA_2_Root_8/openssl.cfg
@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
 basicConstraints = critical, CA:true
 
 # Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
+# prevent it being used as a test self-signed certificate it is best
 # left out by default.
 # keyUsage = cRLSign, keyCertSign
 


More information about the Libreoffice-commits mailing list