diff options
author | Magnus Hagander <magnus@hagander.net> | 2018-11-02 13:55:57 +0100 |
---|---|---|
committer | Magnus Hagander <magnus@hagander.net> | 2018-11-02 13:58:12 +0100 |
commit | 919cffd323a0408a31cde7bc58994add5694b7fc (patch) | |
tree | 4090482095d5a3fe3d7f2037dfce9e87e4c3e644 /doc/src | |
parent | b5acaa8bc8dd7f13f7ae1879aea39cef48d7aa3c (diff) |
Fix some spelling errors in the documentation
Author: Daniel Gustafsson <daniel@yesql.se>
Diffstat (limited to 'doc/src')
-rw-r--r-- | doc/src/sgml/libpq.sgml | 6 | ||||
-rw-r--r-- | doc/src/sgml/lobj.sgml | 2 |
2 files changed, 4 insertions, 4 deletions
diff --git a/doc/src/sgml/libpq.sgml b/doc/src/sgml/libpq.sgml index 2913fd79750..e8ec495d031 100644 --- a/doc/src/sgml/libpq.sgml +++ b/doc/src/sgml/libpq.sgml @@ -8375,7 +8375,7 @@ main(int argc, char **argv) exit_nicely(conn); } - /* Set always-secure search path, so malicous users can't take control. */ + /* Set always-secure search path, so malicious users can't take control. */ res = PQexec(conn, "SELECT pg_catalog.set_config('search_path', '', false)"); if (PQresultStatus(res) != PGRES_TUPLES_OK) @@ -8545,7 +8545,7 @@ main(int argc, char **argv) exit_nicely(conn); } - /* Set always-secure search path, so malicous users can't take control. */ + /* Set always-secure search path, so malicious users can't take control. */ res = PQexec(conn, "SELECT pg_catalog.set_config('search_path', '', false)"); if (PQresultStatus(res) != PGRES_TUPLES_OK) @@ -8772,7 +8772,7 @@ main(int argc, char **argv) exit_nicely(conn); } - /* Set always-secure search path, so malicous users can't take control. */ + /* Set always-secure search path, so malicious users can't take control. */ res = PQexec(conn, "SET search_path = testlibpq3"); if (PQresultStatus(res) != PGRES_COMMAND_OK) { diff --git a/doc/src/sgml/lobj.sgml b/doc/src/sgml/lobj.sgml index 3d9be58b6a7..1e756870907 100644 --- a/doc/src/sgml/lobj.sgml +++ b/doc/src/sgml/lobj.sgml @@ -899,7 +899,7 @@ main(int argc, char **argv) exit_nicely(conn); } - /* Set always-secure search path, so malicous users can't take control. */ + /* Set always-secure search path, so malicious users can't take control. */ res = PQexec(conn, "SELECT pg_catalog.set_config('search_path', '', false)"); if (PQresultStatus(res) != PGRES_TUPLES_OK) |