fix misc. spelling errors

Signed-off-by: pasta <pasta@dashboost.org>
This commit is contained in:
pasta 2021-07-17 14:15:21 -05:00 committed by Pasta
parent 07abb538c3
commit c12d3fd2cb
No known key found for this signature in database
GPG Key ID: 52527BEDABE87984
26 changed files with 30 additions and 30 deletions

View File

@ -43,7 +43,7 @@ RUN apt-get update && apt-get install $APT_ARGS imagemagick libcap-dev librsvg2-
# This is a hack. It is needed because gcc-multilib and g++-multilib are conflicting with g++-arm-linux-gnueabihf. This is # This is a hack. It is needed because gcc-multilib and g++-multilib are conflicting with g++-arm-linux-gnueabihf. This is
# due to gcc-multilib installing the following symbolic link, which is needed for -m32 support. However, this causes # due to gcc-multilib installing the following symbolic link, which is needed for -m32 support. However, this causes
# arm builds to also have the asm folder implicitely in the include search path. This is kind of ok, because the asm folder # arm builds to also have the asm folder implicitly in the include search path. This is kind of ok, because the asm folder
# for arm has precedence. # for arm has precedence.
RUN ln -s x86_64-linux-gnu/asm /usr/include/asm RUN ln -s x86_64-linux-gnu/asm /usr/include/asm

View File

@ -22,7 +22,7 @@ if [ "$CHECK_DOC" = 1 ]; then
#test/lint/git-subtree-check.sh src/secp256k1 #test/lint/git-subtree-check.sh src/secp256k1
#test/lint/git-subtree-check.sh src/univalue #test/lint/git-subtree-check.sh src/univalue
#test/lint/git-subtree-check.sh src/leveldb #test/lint/git-subtree-check.sh src/leveldb
# TODO: Check docs (reenable after all Bitcoin PRs have been merged and docs fully fixed) # TODO: Check docs (re-enable after all Bitcoin PRs have been merged and docs fully fixed)
#test/lint/check-doc.py #test/lint/check-doc.py
# Check rpc consistency # Check rpc consistency
test/lint/check-rpc-mappings.py . test/lint/check-rpc-mappings.py .

View File

@ -11,7 +11,7 @@
* debug.log: contains debug information and general logging generated by dashd or dash-qt * debug.log: contains debug information and general logging generated by dashd or dash-qt
* evodb/*: special txes and quorums database * evodb/*: special txes and quorums database
* fee_estimates.dat: stores statistics used to estimate minimum transaction fees and priorities required for confirmation * fee_estimates.dat: stores statistics used to estimate minimum transaction fees and priorities required for confirmation
* governance.dat: stores data for governance obgects * governance.dat: stores data for governance objects
* indexes/txindex/*: optional transaction index database (LevelDB); since 0.17.0 * indexes/txindex/*: optional transaction index database (LevelDB); since 0.17.0
* llmq/*: quorum signatures database * llmq/*: quorum signatures database
* mempool.dat: dump of the mempool's transactions * mempool.dat: dump of the mempool's transactions

View File

@ -27,7 +27,7 @@ The following rpc commands are available:
- _keepass genkey_: generates a base64 encoded 256 bit AES key that can be used for the communication with KeePassHttp. Only necessary for manual configuration. Use init for automatic configuration. - _keepass genkey_: generates a base64 encoded 256 bit AES key that can be used for the communication with KeePassHttp. Only necessary for manual configuration. Use init for automatic configuration.
- _keepass init_: sets up the association between dashd and keepass by generating an AES key and sending an association message to KeePassHttp. This will trigger KeePass to ask for an Id for the association. Returns the association and the base64 encoded string for the AES key. - _keepass init_: sets up the association between dashd and keepass by generating an AES key and sending an association message to KeePassHttp. This will trigger KeePass to ask for an Id for the association. Returns the association and the base64 encoded string for the AES key.
- _keepass setpassphrase_: updates the passphrase in KeePassHttp to a new value. This should match the passphrase you intend to use for the wallet. Please note that the standard RPC commands _walletpassphrasechange_ and the wallet encrption from the QT GUI already send the updates to KeePassHttp, so this is only necessary for manual manipulation of the password. - _keepass setpassphrase_: updates the passphrase in KeePassHttp to a new value. This should match the passphrase you intend to use for the wallet. Please note that the standard RPC commands _walletpassphrasechange_ and the wallet encryption from the QT GUI already send the updates to KeePassHttp, so this is only necessary for manual manipulation of the password.
### How to setup ### How to setup

View File

@ -211,7 +211,7 @@ bool CBloomFilter::CheckSpecialTransactionMatchesAndUpdate(const CTransaction &t
} }
case(TRANSACTION_COINBASE): case(TRANSACTION_COINBASE):
case(TRANSACTION_QUORUM_COMMITMENT): case(TRANSACTION_QUORUM_COMMITMENT):
// No aditional checks for this transaction types // No additional checks for this transaction types
return false; return false;
} }

View File

@ -1731,7 +1731,7 @@ bool CCoinJoinClientSession::CreateDenominated(CAmount nBalanceToDenominate, con
// Number of denoms we can create given our denom and the amount of funds we have left // Number of denoms we can create given our denom and the amount of funds we have left
int denomsToCreateValue = countPossibleOutputs(nDenomValue); int denomsToCreateValue = countPossibleOutputs(nDenomValue);
// Prefer overshooting the targed balance by larger denoms (hence `+1`) instead of a more // Prefer overshooting the target balance by larger denoms (hence `+1`) instead of a more
// accurate approximation by many smaller denoms. This is ok because when we get here we // accurate approximation by many smaller denoms. This is ok because when we get here we
// should have nCoinJoinDenomsGoal of each smaller denom already. Also, without `+1` // should have nCoinJoinDenomsGoal of each smaller denom already. Also, without `+1`
// we can end up in a situation when there is already nCoinJoinDenomsHardCap of smaller // we can end up in a situation when there is already nCoinJoinDenomsHardCap of smaller

View File

@ -126,7 +126,7 @@ CTransactionBuilder::CTransactionBuilder(std::shared_ptr<CWallet> pwalletIn, con
coinControl.Select(coin.outpoint); coinControl.Select(coin.outpoint);
dummyTx.vin.emplace_back(coin.outpoint, CScript()); dummyTx.vin.emplace_back(coin.outpoint, CScript());
} }
// Get a comparable dummy scriptPubKey, avoid writting/flushing to the actual wallet db // Get a comparable dummy scriptPubKey, avoid writing/flushing to the actual wallet db
CScript dummyScript; CScript dummyScript;
{ {
LOCK(pwallet->cs_wallet); LOCK(pwallet->cs_wallet);

View File

@ -424,7 +424,7 @@ int CCoinJoin::AmountToDenomination(CAmount nInputAmount)
Returns: Returns:
- one of standard denominations from vecStandardDenominations based on the provided bitshifted integer - one of standard denominations from vecStandardDenominations based on the provided bitshifted integer
- 0 for non-initialized sessions (nDenom = 0) - 0 for non-initialized sessions (nDenom = 0)
- a value below 0 if an error occured while converting from one to another - a value below 0 if an error occurred while converting from one to another
*/ */
CAmount CCoinJoin::DenominationToAmount(int nDenom) CAmount CCoinJoin::DenominationToAmount(int nDenom)
{ {

View File

@ -222,7 +222,7 @@ std::vector<CSuperblock_sptr> CGovernanceTriggerManager::GetActiveTriggers()
/** /**
* Is Superblock Triggered * Is Superblock Triggered
* *
* - Does this block have a non-executed and actived trigger? * - Does this block have a non-executed and activated trigger?
*/ */
bool CSuperblockManager::IsSuperblockTriggered(int nBlockHeight) bool CSuperblockManager::IsSuperblockTriggered(int nBlockHeight)
@ -504,7 +504,7 @@ void CSuperblock::ParsePaymentSchedule(const std::string& strPaymentAddresses, c
vecParsed1 = SplitBy(strPaymentAddresses, "|"); vecParsed1 = SplitBy(strPaymentAddresses, "|");
vecParsed2 = SplitBy(strPaymentAmounts, "|"); vecParsed2 = SplitBy(strPaymentAmounts, "|");
// IF THESE DONT MATCH, SOMETHING IS WRONG // IF THESE DON'T MATCH, SOMETHING IS WRONG
if (vecParsed1.size() != vecParsed2.size()) { if (vecParsed1.size() != vecParsed2.size()) {
std::ostringstream ostr; std::ostringstream ostr;

View File

@ -456,7 +456,7 @@ bool CGovernanceObject::IsValidLocally(std::string& strError, bool& fMissingConf
fMissingConfirmations = false; fMissingConfirmations = false;
if (fUnparsable) { if (fUnparsable) {
strError = "Object data unparseable"; strError = "Object data unparsable";
return false; return false;
} }

View File

@ -98,7 +98,7 @@ CKeePassIntegrator::CKeePassIntegrator()
nPort = DEFAULT_KEEPASS_HTTP_PORT; nPort = DEFAULT_KEEPASS_HTTP_PORT;
} }
// Initialze from application context // Initialize from application context
void CKeePassIntegrator::init() void CKeePassIntegrator::init()
{ {
bIsActive = gArgs.GetBoolArg("-keepass", false); bIsActive = gArgs.GetBoolArg("-keepass", false);
@ -184,7 +184,7 @@ SecureString CKeePassIntegrator::CKeePassResponse::getSecureStr(const std::strin
} }
catch (std::exception &e) catch (std::exception &e)
{ {
std::string strError = "Exception occured while decrypting "; std::string strError = "Exception occurred while decrypting ";
strError += strName + ": " + e.what(); strError += strName + ": " + e.what();
throw std::runtime_error(strError); throw std::runtime_error(strError);
} }

View File

@ -16,9 +16,9 @@ public:
static bool GetKeysFromSecret(const std::string& strSecret, CKey& keyRet, CPubKey& pubkeyRet); static bool GetKeysFromSecret(const std::string& strSecret, CKey& keyRet, CPubKey& pubkeyRet);
/// Sign the message, returns true if successful /// Sign the message, returns true if successful
static bool SignMessage(const std::string& strMessage, std::vector<unsigned char>& vchSigRet, const CKey& key); static bool SignMessage(const std::string& strMessage, std::vector<unsigned char>& vchSigRet, const CKey& key);
/// Verify the message signature, returns true if succcessful /// Verify the message signature, returns true if successful
static bool VerifyMessage(const CPubKey& pubkey, const std::vector<unsigned char>& vchSig, const std::string& strMessage, std::string& strErrorRet); static bool VerifyMessage(const CPubKey& pubkey, const std::vector<unsigned char>& vchSig, const std::string& strMessage, std::string& strErrorRet);
/// Verify the message signature, returns true if succcessful /// Verify the message signature, returns true if successful
static bool VerifyMessage(const CKeyID& keyID, const std::vector<unsigned char>& vchSig, const std::string& strMessage, std::string& strErrorRet); static bool VerifyMessage(const CKeyID& keyID, const std::vector<unsigned char>& vchSig, const std::string& strMessage, std::string& strErrorRet);
}; };

View File

@ -566,7 +566,7 @@ static void CheckTypeConversionOp(const valtype& bin, const valtype& num)
<< bin.size() << OP_NUM2BIN, << bin.size() << OP_NUM2BIN,
{rebuilt_bin}); {rebuilt_bin});
// BIN2NUM is indempotent. // BIN2NUM is idempotent.
CheckTestResultForAllFlags({bin}, CScript() << OP_BIN2NUM << OP_BIN2NUM, CheckTestResultForAllFlags({bin}, CScript() << OP_BIN2NUM << OP_BIN2NUM,
{num}); {num});
} }

View File

@ -243,7 +243,7 @@ BOOST_AUTO_TEST_CASE(CreateNewBlock_validity)
pblock->nNonce = blockinfo[i].nonce; pblock->nNonce = blockinfo[i].nonce;
// This will usually succeed in the first round as we take the nonce from blockinfo // This will usually succeed in the first round as we take the nonce from blockinfo
// It's however usefull when adding new blocks with unknown nonces (you should add the found block to blockinfo) // It's however useful when adding new blocks with unknown nonces (you should add the found block to blockinfo)
while (!CheckProofOfWork(pblock->GetHash(), pblock->nBits, chainparams.GetConsensus())) { while (!CheckProofOfWork(pblock->GetHash(), pblock->nBits, chainparams.GetConsensus())) {
pblock->nNonce++; pblock->nNonce++;
} }

View File

@ -886,7 +886,7 @@ void CTxMemPool::removeProTxSpentCollateralConflicts(const CTransaction &tx)
} }
auto dmn = mnList.GetMNByCollateral(in.prevout); auto dmn = mnList.GetMNByCollateral(in.prevout);
if (dmn) { if (dmn) {
// These are updates refering to a mined ProRegTx // These are updates referring to a mined ProRegTx
removeSpentCollateralConflict(dmn->proTxHash); removeSpentCollateralConflict(dmn->proTxHash);
} }
} }

View File

@ -23,7 +23,7 @@ public:
maxSize(_maxSize), maxSize(_maxSize),
truncateThreshold(_truncateThreshold == 0 ? _maxSize * 2 : _truncateThreshold) truncateThreshold(_truncateThreshold == 0 ? _maxSize * 2 : _truncateThreshold)
{ {
// either specify maxSize through template arguments or the contructor and fail otherwise // either specify maxSize through template arguments or the constructor and fail otherwise
assert(_maxSize != 0); assert(_maxSize != 0);
} }

View File

@ -3422,7 +3422,7 @@ void ResetBlockFailureFlags(CBlockIndex *pindex) {
CBlockIndex* CChainState::AddToBlockIndex(const CBlockHeader& block, enum BlockStatus nStatus) CBlockIndex* CChainState::AddToBlockIndex(const CBlockHeader& block, enum BlockStatus nStatus)
{ {
assert(!(nStatus & BLOCK_FAILED_MASK)); // no failed blocks alowed assert(!(nStatus & BLOCK_FAILED_MASK)); // no failed blocks allowed
AssertLockHeld(cs_main); AssertLockHeld(cs_main);
// Check for duplicate // Check for duplicate

View File

@ -4071,7 +4071,7 @@ DBErrors CWallet::LoadWallet(bool& fFirstRunRet)
} }
// Goes through all wallet transactions and checks if they are masternode collaterals, in which case these are locked // Goes through all wallet transactions and checks if they are masternode collaterals, in which case these are locked
// This avoids accidential spending of collaterals. They can still be unlocked manually if a spend is really intended. // This avoids accidental spending of collaterals. They can still be unlocked manually if a spend is really intended.
void CWallet::AutoLockMasternodeCollaterals() void CWallet::AutoLockMasternodeCollaterals()
{ {
auto mnList = deterministicMNManager->GetListAtChainTip(); auto mnList = deterministicMNManager->GetListAtChainTip();

View File

@ -878,7 +878,7 @@ class FullBlockTest(BitcoinTestFramework):
# \-> b67 (20) # \-> b67 (20)
# #
# #
self.log.info("Reject a block with a transaction double spending a transaction creted in the same block") self.log.info("Reject a block with a transaction double spending a transaction created in the same block")
self.move_tip(65) self.move_tip(65)
b67 = self.next_block(67) b67 = self.next_block(67)
tx1 = self.create_and_sign_transaction(out[20], out[20].vout[0].nValue) tx1 = self.create_and_sign_transaction(out[20], out[20].vout[0].nValue)

View File

@ -153,7 +153,7 @@ class LLMQChainLocksTest(DashTestFramework):
assert("confirmations" in tx and tx["confirmations"] > 0) assert("confirmations" in tx and tx["confirmations"] > 0)
# Enable network on first node again, which will cause the blocks to propagate and IS locks to happen retroactively # Enable network on first node again, which will cause the blocks to propagate and IS locks to happen retroactively
# for the mined TXs, which will then allow the network to create a CLSIG # for the mined TXs, which will then allow the network to create a CLSIG
self.log.info("Reenable network on first node and wait for chainlock") self.log.info("Re-enable network on first node and wait for chainlock")
reconnect_isolated_node(self.nodes[0], 1) reconnect_isolated_node(self.nodes[0], 1)
self.wait_for_chainlocked_block(self.nodes[0], self.nodes[0].getbestblockhash(), timeout=30) self.wait_for_chainlocked_block(self.nodes[0], self.nodes[0].getbestblockhash(), timeout=30)

View File

@ -202,7 +202,7 @@ class LLMQ_IS_CL_Conflicts(DashTestFramework):
# Create an ISLOCK but don't broadcast it yet # Create an ISLOCK but don't broadcast it yet
islock = self.create_islock(rawtx2) islock = self.create_islock(rawtx2)
# Disable ChainLocks to avoid accidential locking # Disable ChainLocks to avoid accidental locking
self.nodes[0].spork("SPORK_19_CHAINLOCKS_ENABLED", 4070908800) self.nodes[0].spork("SPORK_19_CHAINLOCKS_ENABLED", 4070908800)
# Send tx1, which will later conflict with the ISLOCK # Send tx1, which will later conflict with the ISLOCK

View File

@ -119,7 +119,7 @@ class LLMQSigningTest(DashTestFramework):
assert(node.quorum("verify", 100, id, msgHash, recsig["sig"], "", height)) assert(node.quorum("verify", 100, id, msgHash, recsig["sig"], "", height))
assert(not node.quorum("verify", 100, id, msgHashConflict, recsig["sig"])) assert(not node.quorum("verify", 100, id, msgHashConflict, recsig["sig"]))
assert not node.quorum("verify", 100, id, msgHash, recsig["sig"], "", height_bad) assert not node.quorum("verify", 100, id, msgHash, recsig["sig"], "", height_bad)
# Use specifc quorum # Use specific quorum
assert(node.quorum("verify", 100, id, msgHash, recsig["sig"], recsig["quorumHash"])) assert(node.quorum("verify", 100, id, msgHash, recsig["sig"], recsig["quorumHash"]))
assert(not node.quorum("verify", 100, id, msgHashConflict, recsig["sig"], recsig["quorumHash"])) assert(not node.quorum("verify", 100, id, msgHashConflict, recsig["sig"], recsig["quorumHash"]))
assert_raises_rpc_error(-8, "quorum not found", node.quorum, "verify", 100, id, msgHash, recsig["sig"], hash_bad) assert_raises_rpc_error(-8, "quorum not found", node.quorum, "verify", 100, id, msgHash, recsig["sig"], hash_bad)

View File

@ -71,7 +71,7 @@ class RawTransactionsTest(BitcoinTestFramework):
rawtxfund = self.nodes[2].fundrawtransaction(rawtx) rawtxfund = self.nodes[2].fundrawtransaction(rawtx)
fee = rawtxfund['fee'] fee = rawtxfund['fee']
dec_tx = self.nodes[2].decoderawtransaction(rawtxfund['hex']) dec_tx = self.nodes[2].decoderawtransaction(rawtxfund['hex'])
assert(len(dec_tx['vin']) > 0) #test if we have enought inputs assert(len(dec_tx['vin']) > 0) #test if we have enough inputs
############################## ##############################
# simple test with two coins # # simple test with two coins #

View File

@ -100,7 +100,7 @@ class HTTPBasicsTest(BitcoinTestFramework):
self.log.info('Try running all non-whitelisted commands as each user...') self.log.info('Try running all non-whitelisted commands as each user...')
for command in nonwhitelisted: for command in nonwhitelisted:
test_command(command, [], rpcuser_authpair_platform, 403) test_command(command, [], rpcuser_authpair_platform, 403)
if command != "stop": # avoid stoping the node while testing if command != "stop": # avoid stopping the node while testing
# we don't care about the exact status here, should simply be anything else but 403 # we don't care about the exact status here, should simply be anything else but 403
test_command(command, [], rpcuser_authpair_operator, 403, True) test_command(command, [], rpcuser_authpair_operator, 403, True)

View File

@ -1092,7 +1092,7 @@ class DashTestFramework(BitcoinTestFramework):
assert_equal(q, new_quorum) assert_equal(q, new_quorum)
quorum_info = self.nodes[0].quorum("info", 100, new_quorum) quorum_info = self.nodes[0].quorum("info", 100, new_quorum)
# Mine 8 (SIGN_HEIGHT_OFFSET) more blocks to make sure that the new quorum gets eligable for signing sessions # Mine 8 (SIGN_HEIGHT_OFFSET) more blocks to make sure that the new quorum gets eligible for signing sessions
self.nodes[0].generate(8) self.nodes[0].generate(8)
sync_blocks(nodes) sync_blocks(nodes)

View File

@ -146,7 +146,7 @@ class WalletUpgradeToHDTest(BitcoinTestFramework):
node.walletpassphrase(walletpass, 100) node.walletpassphrase(walletpass, 100)
assert_equal(mnemonic, node.dumphdinfo()['mnemonic']) assert_equal(mnemonic, node.dumphdinfo()['mnemonic'])
assert_equal(chainid, node.getwalletinfo()['hdchainid']) assert_equal(chainid, node.getwalletinfo()['hdchainid'])
# Note: wallet encryption results in additonal keypool topup, # Note: wallet encryption results in additional keypool topup,
# so we can't compare new balance to balance_non_HD here, # so we can't compare new balance to balance_non_HD here,
# assert_equal(balance_non_HD, node.getbalance()) # won't work # assert_equal(balance_non_HD, node.getbalance()) # won't work
assert(balance_non_HD != node.getbalance()) assert(balance_non_HD != node.getbalance())
@ -170,7 +170,7 @@ class WalletUpgradeToHDTest(BitcoinTestFramework):
node.walletpassphrase(walletpass, 100) node.walletpassphrase(walletpass, 100)
assert_equal(mnemonic, node.dumphdinfo()['mnemonic']) assert_equal(mnemonic, node.dumphdinfo()['mnemonic'])
assert_equal(chainid, node.getwalletinfo()['hdchainid']) assert_equal(chainid, node.getwalletinfo()['hdchainid'])
# Note: wallet encryption results in additonal keypool topup, # Note: wallet encryption results in additional keypool topup,
# so we can't compare new balance to balance_non_HD here, # so we can't compare new balance to balance_non_HD here,
# assert_equal(balance_non_HD, node.getbalance()) # won't work # assert_equal(balance_non_HD, node.getbalance()) # won't work
assert(balance_non_HD != node.getbalance()) assert(balance_non_HD != node.getbalance())