mirror of
https://github.com/openjdk/jdk.git
synced 2025-09-22 20:14:43 +02:00
6810672: Comment typos
I have collected some typos I have found while looking at the code. Reviewed-by: kvn, never
This commit is contained in:
parent
67a5668b16
commit
05d1de7727
120 changed files with 278 additions and 277 deletions
|
@ -419,7 +419,7 @@ main(int argc, char ** argv)
|
|||
goto leave;
|
||||
}
|
||||
mainClass = LoadClass(env, classname);
|
||||
if(mainClass == NULL) { /* exception occured */
|
||||
if(mainClass == NULL) { /* exception occurred */
|
||||
ReportExceptionDescription(env);
|
||||
message = "Could not find the main class. Program will exit.";
|
||||
goto leave;
|
||||
|
@ -441,7 +441,7 @@ main(int argc, char ** argv)
|
|||
goto leave;
|
||||
}
|
||||
mainClass = LoadClass(env, classname);
|
||||
if(mainClass == NULL) { /* exception occured */
|
||||
if(mainClass == NULL) { /* exception occurred */
|
||||
ReportExceptionDescription(env);
|
||||
message = "Could not find the main class. Program will exit.";
|
||||
goto leave;
|
||||
|
|
|
@ -47,7 +47,7 @@
|
|||
#ifdef JAVA_ARGS
|
||||
/*
|
||||
* ApplicationHome is prepended to each of these entries; the resulting
|
||||
* strings are concatenated (seperated by PATH_SEPARATOR) and used as the
|
||||
* strings are concatenated (separated by PATH_SEPARATOR) and used as the
|
||||
* value of -cp option to the launcher.
|
||||
*/
|
||||
#ifndef APP_CLASSPATH
|
||||
|
|
|
@ -192,7 +192,7 @@ static pid_t filename_to_pid(const char* filename) {
|
|||
// check if the given path is considered a secure directory for
|
||||
// the backing store files. Returns true if the directory exists
|
||||
// and is considered a secure location. Returns false if the path
|
||||
// is a symbolic link or if an error occured.
|
||||
// is a symbolic link or if an error occurred.
|
||||
//
|
||||
static bool is_directory_secure(const char* path) {
|
||||
struct stat statbuf;
|
||||
|
|
|
@ -419,7 +419,7 @@ main(int argc, char ** argv)
|
|||
goto leave;
|
||||
}
|
||||
mainClass = LoadClass(env, classname);
|
||||
if(mainClass == NULL) { /* exception occured */
|
||||
if(mainClass == NULL) { /* exception occurred */
|
||||
ReportExceptionDescription(env);
|
||||
message = "Could not find the main class. Program will exit.";
|
||||
goto leave;
|
||||
|
@ -441,7 +441,7 @@ main(int argc, char ** argv)
|
|||
goto leave;
|
||||
}
|
||||
mainClass = LoadClass(env, classname);
|
||||
if(mainClass == NULL) { /* exception occured */
|
||||
if(mainClass == NULL) { /* exception occurred */
|
||||
ReportExceptionDescription(env);
|
||||
message = "Could not find the main class. Program will exit.";
|
||||
goto leave;
|
||||
|
|
|
@ -47,7 +47,7 @@
|
|||
#ifdef JAVA_ARGS
|
||||
/*
|
||||
* ApplicationHome is prepended to each of these entries; the resulting
|
||||
* strings are concatenated (seperated by PATH_SEPARATOR) and used as the
|
||||
* strings are concatenated (separated by PATH_SEPARATOR) and used as the
|
||||
* value of -cp option to the launcher.
|
||||
*/
|
||||
#ifndef APP_CLASSPATH
|
||||
|
|
|
@ -194,7 +194,7 @@ static pid_t filename_to_pid(const char* filename) {
|
|||
// check if the given path is considered a secure directory for
|
||||
// the backing store files. Returns true if the directory exists
|
||||
// and is considered a secure location. Returns false if the path
|
||||
// is a symbolic link or if an error occured.
|
||||
// is a symbolic link or if an error occurred.
|
||||
//
|
||||
static bool is_directory_secure(const char* path) {
|
||||
struct stat statbuf;
|
||||
|
|
|
@ -195,7 +195,7 @@ static int filename_to_pid(const char* filename) {
|
|||
// check if the given path is considered a secure directory for
|
||||
// the backing store files. Returns true if the directory exists
|
||||
// and is considered a secure location. Returns false if the path
|
||||
// is a symbolic link or if an error occured.
|
||||
// is a symbolic link or if an error occurred.
|
||||
//
|
||||
static bool is_directory_secure(const char* path) {
|
||||
|
||||
|
@ -994,7 +994,7 @@ static bool add_allow_aces(PSECURITY_DESCRIPTOR pSD,
|
|||
return false;
|
||||
}
|
||||
|
||||
// if running on windows 2000 or later, set the automatic inheritence
|
||||
// if running on windows 2000 or later, set the automatic inheritance
|
||||
// control flags.
|
||||
SetSecurityDescriptorControlFnPtr _SetSecurityDescriptorControl;
|
||||
_SetSecurityDescriptorControl = (SetSecurityDescriptorControlFnPtr)
|
||||
|
@ -1002,7 +1002,7 @@ static bool add_allow_aces(PSECURITY_DESCRIPTOR pSD,
|
|||
"SetSecurityDescriptorControl");
|
||||
|
||||
if (_SetSecurityDescriptorControl != NULL) {
|
||||
// We do not want to further propogate inherited DACLs, so making them
|
||||
// We do not want to further propagate inherited DACLs, so making them
|
||||
// protected prevents that.
|
||||
if (!_SetSecurityDescriptorControl(pSD, SE_DACL_PROTECTED,
|
||||
SE_DACL_PROTECTED)) {
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue