summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--offapi/com/sun/star/xml/crypto/XXMLEncryptionTemplate.idl4
-rw-r--r--xmlsecurity/inc/framework/securityengine.hxx2
-rw-r--r--xmlsecurity/source/dialogs/certificatechooser.cxx2
-rw-r--r--xmlsecurity/source/dialogs/digitalsignaturesdialog.cxx2
-rw-r--r--xmlsecurity/source/framework/elementmark.hxx2
-rw-r--r--xmlsecurity/source/helper/xsecctl.cxx2
-rw-r--r--xmlsecurity/source/helper/xsecparser.cxx2
-rw-r--r--xmlsecurity/source/xmlsec/xmldocumentwrapper_xmlsecimpl.cxx8
-rw-r--r--xmlsecurity/test_docs/CAs/Root_1/openssl.cfg2
-rw-r--r--xmlsecurity/test_docs/CAs/Root_10/openssl.cfg2
-rw-r--r--xmlsecurity/test_docs/CAs/Root_11/openssl.cfg2
-rw-r--r--xmlsecurity/test_docs/CAs/Root_2/openssl.cfg2
-rw-r--r--xmlsecurity/test_docs/CAs/Root_3/openssl.cfg2
-rw-r--r--xmlsecurity/test_docs/CAs/Root_4/openssl.cfg2
-rw-r--r--xmlsecurity/test_docs/CAs/Root_5/openssl.cfg2
-rw-r--r--xmlsecurity/test_docs/CAs/Root_6/openssl.cfg2
-rw-r--r--xmlsecurity/test_docs/CAs/Root_7/openssl.cfg2
-rw-r--r--xmlsecurity/test_docs/CAs/Root_8/openssl.cfg2
-rw-r--r--xmlsecurity/test_docs/CAs/Root_9/openssl.cfg2
-rw-r--r--xmlsecurity/test_docs/CAs/Sub_CA_1_Root_1/openssl.cfg2
-rw-r--r--xmlsecurity/test_docs/CAs/Sub_CA_1_Root_10/openssl.cfg2
-rw-r--r--xmlsecurity/test_docs/CAs/Sub_CA_1_Root_2/openssl.cfg2
-rw-r--r--xmlsecurity/test_docs/CAs/Sub_CA_1_Root_3/openssl.cfg2
-rw-r--r--xmlsecurity/test_docs/CAs/Sub_CA_1_Root_4/openssl.cfg2
-rw-r--r--xmlsecurity/test_docs/CAs/Sub_CA_1_Root_5/openssl.cfg2
-rw-r--r--xmlsecurity/test_docs/CAs/Sub_CA_1_Root_6/openssl.cfg2
-rw-r--r--xmlsecurity/test_docs/CAs/Sub_CA_1_Root_7/openssl.cfg2
-rw-r--r--xmlsecurity/test_docs/CAs/Sub_CA_1_Root_8/openssl.cfg2
-rw-r--r--xmlsecurity/test_docs/CAs/Sub_CA_1_Root_9/openssl.cfg2
-rw-r--r--xmlsecurity/test_docs/CAs/Sub_CA_2_Root_4/openssl.cfg2
-rw-r--r--xmlsecurity/test_docs/CAs/Sub_CA_2_Root_7/openssl.cfg2
-rw-r--r--xmlsecurity/test_docs/CAs/Sub_CA_2_Root_8/openssl.cfg2
32 files changed, 36 insertions, 36 deletions
diff --git a/offapi/com/sun/star/xml/crypto/XXMLEncryptionTemplate.idl b/offapi/com/sun/star/xml/crypto/XXMLEncryptionTemplate.idl
index b19eac3504be..a630d84bf2c2 100644
--- a/offapi/com/sun/star/xml/crypto/XXMLEncryptionTemplate.idl
+++ b/offapi/com/sun/star/xml/crypto/XXMLEncryptionTemplate.idl
@@ -30,10 +30,10 @@ module com { module sun { module star { module xml { module crypto {
/**
* Interface of XML encryption template
*
- * <p>This interface represents a encryption template, which is the same as the
+ * <p>This interface represents an encryption template, which is the same as the
* desired XML encryption element[ EncryptedType ] but some of the nodes may be
* empty. The empty entities include CipherValue, which is a subset of
- * EncryptedData or EncryptedKey. Empty entities are not allowed in a encryption
+ * EncryptedData or EncryptedKey. Empty entities are not allowed in an encryption
* template when performing decryption.</p>
*
* <p>In some cases, the encryptor or decryptor can determine and locate the
diff --git a/xmlsecurity/inc/framework/securityengine.hxx b/xmlsecurity/inc/framework/securityengine.hxx
index 50cec2d4b8b8..ca47389c427b 100644
--- a/xmlsecurity/inc/framework/securityengine.hxx
+++ b/xmlsecurity/inc/framework/securityengine.hxx
@@ -59,7 +59,7 @@ protected:
/*
* the id of ElementCollector of the template element.
* For a signature, the template element is the Signature element,
- * for a encryption, the EncryptedData/EncryptedKey element is.
+ * for an encryption, the EncryptedData/EncryptedKey element is.
*/
sal_Int32 m_nIdOfTemplateEC;
diff --git a/xmlsecurity/source/dialogs/certificatechooser.cxx b/xmlsecurity/source/dialogs/certificatechooser.cxx
index 68bd9efbb497..ec499bc159b0 100644
--- a/xmlsecurity/source/dialogs/certificatechooser.cxx
+++ b/xmlsecurity/source/dialogs/certificatechooser.cxx
@@ -86,7 +86,7 @@ short CertificateChooser::run()
// PostUserEvent( LINK( this, CertificateChooser, Initialize ) );
- // PostUserLink behavior is to slow, so do it directly before Execute().
+ // PostUserLink behavior is too slow, so do it directly before Execute().
// Problem: This Dialog should be visible right now, and the parent should not be accessible.
// Show, Update, DisableInput...
diff --git a/xmlsecurity/source/dialogs/digitalsignaturesdialog.cxx b/xmlsecurity/source/dialogs/digitalsignaturesdialog.cxx
index c2568eba803b..9ff40b864144 100644
--- a/xmlsecurity/source/dialogs/digitalsignaturesdialog.cxx
+++ b/xmlsecurity/source/dialogs/digitalsignaturesdialog.cxx
@@ -596,7 +596,7 @@ void DigitalSignaturesDialog::ImplFillSignaturesBox()
sImage = BMP_SIG_NOT_VALIDATED;
}
//Check if the signature is a "old" document signature, that is, which was created
- //by an version of OOo previous to 3.2
+ //by a version of OOo previous to 3.2
// If there is no storage, then it's pointless to check storage
// stream references.
else if (maSignatureManager.getSignatureMode() == DocumentSignatureMode::Content
diff --git a/xmlsecurity/source/framework/elementmark.hxx b/xmlsecurity/source/framework/elementmark.hxx
index 8697a9de8876..e035cc1a58c8 100644
--- a/xmlsecurity/source/framework/elementmark.hxx
+++ b/xmlsecurity/source/framework/elementmark.hxx
@@ -47,7 +47,7 @@ protected:
/*
* the type value, is one of following values:
- * TYPEOFELEMENTMARK - the default value, represents an blocker if
+ * TYPEOFELEMENTMARK - the default value, represents a blocker if
* not changed
* TYPEOFELEMENTCOLLECTOR - represents an ElementCollector
*/
diff --git a/xmlsecurity/source/helper/xsecctl.cxx b/xmlsecurity/source/helper/xsecctl.cxx
index 6dbd44b091be..ab108d13c224 100644
--- a/xmlsecurity/source/helper/xsecctl.cxx
+++ b/xmlsecurity/source/helper/xsecctl.cxx
@@ -242,7 +242,7 @@ bool XSecController::chainOn()
* NOTES
* Sometimes, the last key SAX event can't be transferred to the
* SAXEventKeeper together.
- * For instance, at the time an referenced element is detected, the
+ * For instance, at the time a referenced element is detected, the
* startElement event has already been reserved by the ElementStackKeeper.
* Meanwhile, an ElementCollector needs to be created before the
* SAXEventKeeper receives that startElement event.
diff --git a/xmlsecurity/source/helper/xsecparser.cxx b/xmlsecurity/source/helper/xsecparser.cxx
index 10b2a95cba99..82f347bff976 100644
--- a/xmlsecurity/source/helper/xsecparser.cxx
+++ b/xmlsecurity/source/helper/xsecparser.cxx
@@ -312,7 +312,7 @@ void SAL_CALL XSecParser::endElement( const OUString& aName )
{
if ( m_bReferenceUnresolved )
/*
- * it must be a octet stream
+ * it must be an octet stream
*/
{
m_pXSecController->addStreamReference( m_currentReferenceURI, true, m_nReferenceDigestID );
diff --git a/xmlsecurity/source/xmlsec/xmldocumentwrapper_xmlsecimpl.cxx b/xmlsecurity/source/xmlsec/xmldocumentwrapper_xmlsecimpl.cxx
index 8f9ebb1c18e4..a2ebb134d1e5 100644
--- a/xmlsecurity/source/xmlsec/xmldocumentwrapper_xmlsecimpl.cxx
+++ b/xmlsecurity/source/xmlsec/xmldocumentwrapper_xmlsecimpl.cxx
@@ -175,7 +175,7 @@ void XMLDocumentWrapper_XmlSecImpl::sendStartElement(
* xHandler2 - the second XDocumentHandler interface to receive the
* startElement SAX event. It can't be NULL.
* pNode - the node on which the startElement should be generated.
- * This node must be a element type.
+ * This node must be an element type.
******************************************************************************/
{
SvXMLAttributeList* pAttributeList = new SvXMLAttributeList();
@@ -250,11 +250,11 @@ void XMLDocumentWrapper_XmlSecImpl::sendEndElement(
/****** XMLDocumentWrapper_XmlSecImpl/sendEndElement **************************
*
* NAME
- * sendEndElement -- Constructs a endElement SAX event
+ * sendEndElement -- Constructs an endElement SAX event
*
* FUNCTION
* Used when converting the document into SAX event stream.
- * This method constructs a endElement SAX event for a particular
+ * This method constructs an endElement SAX event for a particular
* element, then calls the endElement methods of the XDocumentHandlers.
*
* INPUTS
@@ -263,7 +263,7 @@ void XMLDocumentWrapper_XmlSecImpl::sendEndElement(
* xHandler2 - the second XDocumentHandler interface to receive the
* endElement SAX event. It can't be NULL.
* pNode - the node on which the endElement should be generated.
- * This node must be a element type.
+ * This node must be an element type.
******************************************************************************/
{
OString sNodeName = getNodeQName(pNode);
diff --git a/xmlsecurity/test_docs/CAs/Root_1/openssl.cfg b/xmlsecurity/test_docs/CAs/Root_1/openssl.cfg
index d6907c7d3be6..0dd15bd9ecd1 100644
--- a/xmlsecurity/test_docs/CAs/Root_1/openssl.cfg
+++ b/xmlsecurity/test_docs/CAs/Root_1/openssl.cfg
@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
basicConstraints = critical, CA:true
# Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
+# prevent it being used as a test self-signed certificate it is best
# left out by default.
# keyUsage = cRLSign, keyCertSign
diff --git a/xmlsecurity/test_docs/CAs/Root_10/openssl.cfg b/xmlsecurity/test_docs/CAs/Root_10/openssl.cfg
index 1366ca2ba008..f48e3d5a3463 100644
--- a/xmlsecurity/test_docs/CAs/Root_10/openssl.cfg
+++ b/xmlsecurity/test_docs/CAs/Root_10/openssl.cfg
@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
basicConstraints = critical, CA:true
# Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
+# prevent it being used as a test self-signed certificate it is best
# left out by default.
# keyUsage = cRLSign, keyCertSign
diff --git a/xmlsecurity/test_docs/CAs/Root_11/openssl.cfg b/xmlsecurity/test_docs/CAs/Root_11/openssl.cfg
index c38d22bcbeac..dd84cb90698b 100644
--- a/xmlsecurity/test_docs/CAs/Root_11/openssl.cfg
+++ b/xmlsecurity/test_docs/CAs/Root_11/openssl.cfg
@@ -218,7 +218,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
basicConstraints = critical, CA:true
# Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
+# prevent it being used as a test self-signed certificate it is best
# left out by default.
# keyUsage = cRLSign, keyCertSign
diff --git a/xmlsecurity/test_docs/CAs/Root_2/openssl.cfg b/xmlsecurity/test_docs/CAs/Root_2/openssl.cfg
index d6907c7d3be6..0dd15bd9ecd1 100644
--- a/xmlsecurity/test_docs/CAs/Root_2/openssl.cfg
+++ b/xmlsecurity/test_docs/CAs/Root_2/openssl.cfg
@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
basicConstraints = critical, CA:true
# Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
+# prevent it being used as a test self-signed certificate it is best
# left out by default.
# keyUsage = cRLSign, keyCertSign
diff --git a/xmlsecurity/test_docs/CAs/Root_3/openssl.cfg b/xmlsecurity/test_docs/CAs/Root_3/openssl.cfg
index a9b2faeb9374..51e5205253e8 100644
--- a/xmlsecurity/test_docs/CAs/Root_3/openssl.cfg
+++ b/xmlsecurity/test_docs/CAs/Root_3/openssl.cfg
@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
basicConstraints = critical, CA:true
# Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
+# prevent it being used as a test self-signed certificate it is best
# left out by default.
# keyUsage = cRLSign, keyCertSign
diff --git a/xmlsecurity/test_docs/CAs/Root_4/openssl.cfg b/xmlsecurity/test_docs/CAs/Root_4/openssl.cfg
index a9b2faeb9374..51e5205253e8 100644
--- a/xmlsecurity/test_docs/CAs/Root_4/openssl.cfg
+++ b/xmlsecurity/test_docs/CAs/Root_4/openssl.cfg
@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
basicConstraints = critical, CA:true
# Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
+# prevent it being used as a test self-signed certificate it is best
# left out by default.
# keyUsage = cRLSign, keyCertSign
diff --git a/xmlsecurity/test_docs/CAs/Root_5/openssl.cfg b/xmlsecurity/test_docs/CAs/Root_5/openssl.cfg
index b96b72d84dac..0ea6df2972a6 100644
--- a/xmlsecurity/test_docs/CAs/Root_5/openssl.cfg
+++ b/xmlsecurity/test_docs/CAs/Root_5/openssl.cfg
@@ -212,7 +212,7 @@ crlDistributionPoints=URI:http://localhost:8901/demoCA/crl/Root_5.crl
basicConstraints = critical, CA:true
# Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
+# prevent it being used as a test self-signed certificate it is best
# left out by default.
# keyUsage = cRLSign, keyCertSign
diff --git a/xmlsecurity/test_docs/CAs/Root_6/openssl.cfg b/xmlsecurity/test_docs/CAs/Root_6/openssl.cfg
index c8f620f4ac08..f49c11090115 100644
--- a/xmlsecurity/test_docs/CAs/Root_6/openssl.cfg
+++ b/xmlsecurity/test_docs/CAs/Root_6/openssl.cfg
@@ -212,7 +212,7 @@ crlDistributionPoints=URI:http://localhost:8901/demoCA/crl/Root_6.crl
basicConstraints = critical, CA:true
# Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
+# prevent it being used as a test self-signed certificate it is best
# left out by default.
# keyUsage = cRLSign, keyCertSign
diff --git a/xmlsecurity/test_docs/CAs/Root_7/openssl.cfg b/xmlsecurity/test_docs/CAs/Root_7/openssl.cfg
index 3724679b961a..f2615bef4fd4 100644
--- a/xmlsecurity/test_docs/CAs/Root_7/openssl.cfg
+++ b/xmlsecurity/test_docs/CAs/Root_7/openssl.cfg
@@ -212,7 +212,7 @@ crlDistributionPoints=URI:http://localhost:8901/demoCA/crl/Root_7.crl
basicConstraints = critical, CA:true
# Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
+# prevent it being used as a test self-signed certificate it is best
# left out by default.
# keyUsage = cRLSign, keyCertSign
diff --git a/xmlsecurity/test_docs/CAs/Root_8/openssl.cfg b/xmlsecurity/test_docs/CAs/Root_8/openssl.cfg
index b9e076a2bf86..077e13b2b548 100644
--- a/xmlsecurity/test_docs/CAs/Root_8/openssl.cfg
+++ b/xmlsecurity/test_docs/CAs/Root_8/openssl.cfg
@@ -212,7 +212,7 @@ authorityInfoAccess = OCSP;URI:http://localhost:8888
basicConstraints = critical, CA:true
# Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
+# prevent it being used as a test self-signed certificate it is best
# left out by default.
# keyUsage = cRLSign, keyCertSign
diff --git a/xmlsecurity/test_docs/CAs/Root_9/openssl.cfg b/xmlsecurity/test_docs/CAs/Root_9/openssl.cfg
index 1366ca2ba008..f48e3d5a3463 100644
--- a/xmlsecurity/test_docs/CAs/Root_9/openssl.cfg
+++ b/xmlsecurity/test_docs/CAs/Root_9/openssl.cfg
@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
basicConstraints = critical, CA:true
# Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
+# prevent it being used as a test self-signed certificate it is best
# left out by default.
# keyUsage = cRLSign, keyCertSign
diff --git a/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_1/openssl.cfg b/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_1/openssl.cfg
index d6907c7d3be6..0dd15bd9ecd1 100644
--- a/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_1/openssl.cfg
+++ b/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_1/openssl.cfg
@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
basicConstraints = critical, CA:true
# Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
+# prevent it being used as a test self-signed certificate it is best
# left out by default.
# keyUsage = cRLSign, keyCertSign
diff --git a/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_10/openssl.cfg b/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_10/openssl.cfg
index 36e8c8a4ad0c..431650974b83 100644
--- a/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_10/openssl.cfg
+++ b/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_10/openssl.cfg
@@ -213,7 +213,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
basicConstraints = critical, CA:true
# Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
+# prevent it being used as a test self-signed certificate it is best
# left out by default.
# keyUsage = cRLSign, keyCertSign
diff --git a/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_2/openssl.cfg b/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_2/openssl.cfg
index a9b2faeb9374..51e5205253e8 100644
--- a/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_2/openssl.cfg
+++ b/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_2/openssl.cfg
@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
basicConstraints = critical, CA:true
# Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
+# prevent it being used as a test self-signed certificate it is best
# left out by default.
# keyUsage = cRLSign, keyCertSign
diff --git a/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_3/openssl.cfg b/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_3/openssl.cfg
index a9b2faeb9374..51e5205253e8 100644
--- a/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_3/openssl.cfg
+++ b/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_3/openssl.cfg
@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
basicConstraints = critical, CA:true
# Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
+# prevent it being used as a test self-signed certificate it is best
# left out by default.
# keyUsage = cRLSign, keyCertSign
diff --git a/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_4/openssl.cfg b/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_4/openssl.cfg
index a9b2faeb9374..51e5205253e8 100644
--- a/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_4/openssl.cfg
+++ b/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_4/openssl.cfg
@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
basicConstraints = critical, CA:true
# Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
+# prevent it being used as a test self-signed certificate it is best
# left out by default.
# keyUsage = cRLSign, keyCertSign
diff --git a/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_5/openssl.cfg b/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_5/openssl.cfg
index 86b9f3bf0278..963ab884f645 100644
--- a/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_5/openssl.cfg
+++ b/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_5/openssl.cfg
@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
basicConstraints = critical, CA:true
# Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
+# prevent it being used as a test self-signed certificate it is best
# left out by default.
# keyUsage = cRLSign, keyCertSign
diff --git a/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_6/openssl.cfg b/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_6/openssl.cfg
index feae40560e68..188ed62e2a76 100644
--- a/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_6/openssl.cfg
+++ b/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_6/openssl.cfg
@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
basicConstraints = critical, CA:true
# Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
+# prevent it being used as a test self-signed certificate it is best
# left out by default.
# keyUsage = cRLSign, keyCertSign
diff --git a/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_7/openssl.cfg b/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_7/openssl.cfg
index 3fe6d3696507..7cbc4664fa2f 100644
--- a/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_7/openssl.cfg
+++ b/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_7/openssl.cfg
@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
basicConstraints = critical, CA:true
# Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
+# prevent it being used as a test self-signed certificate it is best
# left out by default.
# keyUsage = cRLSign, keyCertSign
diff --git a/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_8/openssl.cfg b/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_8/openssl.cfg
index 3b51276ea7b4..571237e7da69 100644
--- a/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_8/openssl.cfg
+++ b/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_8/openssl.cfg
@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
basicConstraints = critical, CA:true
# Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
+# prevent it being used as a test self-signed certificate it is best
# left out by default.
# keyUsage = cRLSign, keyCertSign
diff --git a/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_9/openssl.cfg b/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_9/openssl.cfg
index bce569719fd2..4a5b97f53017 100644
--- a/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_9/openssl.cfg
+++ b/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_9/openssl.cfg
@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
basicConstraints = critical, CA:true
# Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
+# prevent it being used as a test self-signed certificate it is best
# left out by default.
# keyUsage = cRLSign, keyCertSign
diff --git a/xmlsecurity/test_docs/CAs/Sub_CA_2_Root_4/openssl.cfg b/xmlsecurity/test_docs/CAs/Sub_CA_2_Root_4/openssl.cfg
index a9b2faeb9374..51e5205253e8 100644
--- a/xmlsecurity/test_docs/CAs/Sub_CA_2_Root_4/openssl.cfg
+++ b/xmlsecurity/test_docs/CAs/Sub_CA_2_Root_4/openssl.cfg
@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
basicConstraints = critical, CA:true
# Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
+# prevent it being used as a test self-signed certificate it is best
# left out by default.
# keyUsage = cRLSign, keyCertSign
diff --git a/xmlsecurity/test_docs/CAs/Sub_CA_2_Root_7/openssl.cfg b/xmlsecurity/test_docs/CAs/Sub_CA_2_Root_7/openssl.cfg
index 7887aed1a1b1..c6acf751f5c0 100644
--- a/xmlsecurity/test_docs/CAs/Sub_CA_2_Root_7/openssl.cfg
+++ b/xmlsecurity/test_docs/CAs/Sub_CA_2_Root_7/openssl.cfg
@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
basicConstraints = critical, CA:true
# Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
+# prevent it being used as a test self-signed certificate it is best
# left out by default.
# keyUsage = cRLSign, keyCertSign
diff --git a/xmlsecurity/test_docs/CAs/Sub_CA_2_Root_8/openssl.cfg b/xmlsecurity/test_docs/CAs/Sub_CA_2_Root_8/openssl.cfg
index 3b51276ea7b4..571237e7da69 100644
--- a/xmlsecurity/test_docs/CAs/Sub_CA_2_Root_8/openssl.cfg
+++ b/xmlsecurity/test_docs/CAs/Sub_CA_2_Root_8/openssl.cfg
@@ -212,7 +212,7 @@ authorityKeyIdentifier=keyid:always,issuer:always
basicConstraints = critical, CA:true
# Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
+# prevent it being used as a test self-signed certificate it is best
# left out by default.
# keyUsage = cRLSign, keyCertSign