summaryrefslogtreecommitdiff
path: root/doc/src
diff options
context:
space:
mode:
authorMagnus Hagander <magnus@hagander.net>2018-11-02 13:55:57 +0100
committerMagnus Hagander <magnus@hagander.net>2018-11-02 13:58:12 +0100
commit919cffd323a0408a31cde7bc58994add5694b7fc (patch)
tree4090482095d5a3fe3d7f2037dfce9e87e4c3e644 /doc/src
parentb5acaa8bc8dd7f13f7ae1879aea39cef48d7aa3c (diff)
Fix some spelling errors in the documentation
Author: Daniel Gustafsson <daniel@yesql.se>
Diffstat (limited to 'doc/src')
-rw-r--r--doc/src/sgml/libpq.sgml6
-rw-r--r--doc/src/sgml/lobj.sgml2
2 files changed, 4 insertions, 4 deletions
diff --git a/doc/src/sgml/libpq.sgml b/doc/src/sgml/libpq.sgml
index 2913fd79750..e8ec495d031 100644
--- a/doc/src/sgml/libpq.sgml
+++ b/doc/src/sgml/libpq.sgml
@@ -8375,7 +8375,7 @@ main(int argc, char **argv)
exit_nicely(conn);
}
- /* Set always-secure search path, so malicous users can't take control. */
+ /* Set always-secure search path, so malicious users can't take control. */
res = PQexec(conn,
"SELECT pg_catalog.set_config('search_path', '', false)");
if (PQresultStatus(res) != PGRES_TUPLES_OK)
@@ -8545,7 +8545,7 @@ main(int argc, char **argv)
exit_nicely(conn);
}
- /* Set always-secure search path, so malicous users can't take control. */
+ /* Set always-secure search path, so malicious users can't take control. */
res = PQexec(conn,
"SELECT pg_catalog.set_config('search_path', '', false)");
if (PQresultStatus(res) != PGRES_TUPLES_OK)
@@ -8772,7 +8772,7 @@ main(int argc, char **argv)
exit_nicely(conn);
}
- /* Set always-secure search path, so malicous users can't take control. */
+ /* Set always-secure search path, so malicious users can't take control. */
res = PQexec(conn, "SET search_path = testlibpq3");
if (PQresultStatus(res) != PGRES_COMMAND_OK)
{
diff --git a/doc/src/sgml/lobj.sgml b/doc/src/sgml/lobj.sgml
index 3d9be58b6a7..1e756870907 100644
--- a/doc/src/sgml/lobj.sgml
+++ b/doc/src/sgml/lobj.sgml
@@ -899,7 +899,7 @@ main(int argc, char **argv)
exit_nicely(conn);
}
- /* Set always-secure search path, so malicous users can't take control. */
+ /* Set always-secure search path, so malicious users can't take control. */
res = PQexec(conn,
"SELECT pg_catalog.set_config('search_path', '', false)");
if (PQresultStatus(res) != PGRES_TUPLES_OK)