diff options
author | Magnus Hagander | 2018-11-02 12:55:57 +0000 |
---|---|---|
committer | Magnus Hagander | 2018-11-02 12:59:23 +0000 |
commit | 1ac334b165bb55cfa9441218713ead7b8421f9ca (patch) | |
tree | a8b82166ae65efad025bcec29d0a1ce888e7989c | |
parent | 273166af8f73670a3c7efdfb9d45893d5e011dba (diff) |
Fix some spelling errors in the documentation
Author: Daniel Gustafsson <daniel@yesql.se>
-rw-r--r-- | doc/src/sgml/libpq.sgml | 6 | ||||
-rw-r--r-- | doc/src/sgml/lobj.sgml | 2 |
2 files changed, 4 insertions, 4 deletions
diff --git a/doc/src/sgml/libpq.sgml b/doc/src/sgml/libpq.sgml index 7e40de6b2b9..753136dfb1a 100644 --- a/doc/src/sgml/libpq.sgml +++ b/doc/src/sgml/libpq.sgml @@ -7838,7 +7838,7 @@ main(int argc, char **argv) exit_nicely(conn); } - /* Set always-secure search path, so malicous users can't take control. */ + /* Set always-secure search path, so malicious users can't take control. */ res = PQexec(conn, "SELECT pg_catalog.set_config('search_path', '', false)"); if (PQresultStatus(res) != PGRES_TUPLES_OK) @@ -8008,7 +8008,7 @@ main(int argc, char **argv) exit_nicely(conn); } - /* Set always-secure search path, so malicous users can't take control. */ + /* Set always-secure search path, so malicious users can't take control. */ res = PQexec(conn, "SELECT pg_catalog.set_config('search_path', '', false)"); if (PQresultStatus(res) != PGRES_TUPLES_OK) @@ -8234,7 +8234,7 @@ main(int argc, char **argv) exit_nicely(conn); } - /* Set always-secure search path, so malicous users can't take control. */ + /* Set always-secure search path, so malicious users can't take control. */ res = PQexec(conn, "SET search_path = testlibpq3"); if (PQresultStatus(res) != PGRES_COMMAND_OK) { diff --git a/doc/src/sgml/lobj.sgml b/doc/src/sgml/lobj.sgml index 2e8f2fcc542..f903d994e4f 100644 --- a/doc/src/sgml/lobj.sgml +++ b/doc/src/sgml/lobj.sgml @@ -899,7 +899,7 @@ main(int argc, char **argv) exit_nicely(conn); } - /* Set always-secure search path, so malicous users can't take control. */ + /* Set always-secure search path, so malicious users can't take control. */ res = PQexec(conn, "SELECT pg_catalog.set_config('search_path', '', false)"); if (PQresultStatus(res) != PGRES_TUPLES_OK) |