docs: correct spelling errors across multiple packages (#25002)
This commit is contained in:
parent
ca0c177bca
commit
db3f09e679
@ -98,7 +98,7 @@ func (s *MigrateTestSuite) Test_runMigrateCmdRecord() {
|
||||
item := design99keyring.Item{
|
||||
Key: s.appName,
|
||||
Data: serializedRecord,
|
||||
Description: "SDK kerying version",
|
||||
Description: "SDK keyring version",
|
||||
}
|
||||
|
||||
cmd := MigrateCommand()
|
||||
@ -130,7 +130,7 @@ func (s *MigrateTestSuite) Test_runMigrateCmdLegacyMultiInfo() {
|
||||
item := design99keyring.Item{
|
||||
Key: s.appName,
|
||||
Data: serializedLegacyMultiInfo,
|
||||
Description: "SDK kerying version",
|
||||
Description: "SDK keyring version",
|
||||
}
|
||||
|
||||
cmd := MigrateCommand()
|
||||
|
||||
@ -170,7 +170,7 @@ func encryptPrivKey(privKey cryptotypes.PrivKey, passphrase string) (saltBytes,
|
||||
panic(errorsmod.Wrap(err, "error generating cypher from key"))
|
||||
}
|
||||
|
||||
nonce := make([]byte, aead.NonceSize(), aead.NonceSize()+len(privKeyBytes)+aead.Overhead()) // Nonce is fixed to maintain consistency, each key is generated at every encryption using a random salt.
|
||||
nonce := make([]byte, aead.NonceSize(), aead.NonceSize()+len(privKeyBytes)+aead.Overhead()) // Nonce is fixed to maintain consistency, each key is generated at every encryption using a random salt.
|
||||
|
||||
encBytes = aead.Seal(nil, nonce, privKeyBytes, nil)
|
||||
|
||||
|
||||
@ -2013,7 +2013,7 @@ func TestRenameKey(t *testing.T) {
|
||||
|
||||
// TestChangeBcrypt tests the compatibility from upstream Bcrypt and our own
|
||||
func TestChangeBcrypt(t *testing.T) {
|
||||
pw := []byte("somepasswword!")
|
||||
pw := []byte("somepassword!")
|
||||
|
||||
saltBytes := cmtcrypto.CRandBytes(16)
|
||||
cosmosHash, err := cosmosbcrypt.GenerateFromPassword(saltBytes, pw, 2)
|
||||
|
||||
@ -53,7 +53,7 @@ func (s *MigrationTestSuite) TestMigrateLegacyLocalKey() {
|
||||
item := keyring.Item{
|
||||
Key: n1,
|
||||
Data: serializedLegacyLocalInfo,
|
||||
Description: "SDK kerying version",
|
||||
Description: "SDK keyring version",
|
||||
}
|
||||
|
||||
s.Require().NoError(s.ks.SetItem(item))
|
||||
@ -71,7 +71,7 @@ func (s *MigrationTestSuite) TestMigrateLegacyLedgerKey() {
|
||||
item := keyring.Item{
|
||||
Key: n1,
|
||||
Data: serializedLegacyLedgerInfo,
|
||||
Description: "SDK kerying version",
|
||||
Description: "SDK keyring version",
|
||||
}
|
||||
|
||||
s.Require().NoError(s.ks.SetItem(item))
|
||||
|
||||
@ -15,7 +15,7 @@ func (privKey *PrivKey) Sign(msg []byte) ([]byte, error) {
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
// we do not need v in r||s||v:
|
||||
// we do not need v in r||s||v:
|
||||
rs := rsv[:len(rsv)-1]
|
||||
return rs, nil
|
||||
}
|
||||
|
||||
@ -30,7 +30,7 @@ func (m *PrivKey) Type() string {
|
||||
return name
|
||||
}
|
||||
|
||||
// Sign hashes and signs the message usign ECDSA. Implements sdk.PrivKey interface.
|
||||
// Sign hashes and signs the message using ECDSA. Implements sdk.PrivKey interface.
|
||||
func (m *PrivKey) Sign(msg []byte) ([]byte, error) {
|
||||
return m.Secret.Sign(msg)
|
||||
}
|
||||
|
||||
@ -77,7 +77,7 @@ func TestPublicKeyUnsafeHDPath(t *testing.T) {
|
||||
require.NoError(t, tmp.ValidateKey())
|
||||
(&tmp).AssertIsPrivKeyInner()
|
||||
|
||||
// in this test we are chekcking if the generated keys are correct.
|
||||
// in this test we are checking if the generated keys are correct.
|
||||
require.Equal(t, expectedAnswers[i], priv.PubKey().String(),
|
||||
"Is your device using test mnemonic: %s ?", testdata.TestMnemonic)
|
||||
|
||||
|
||||
@ -36,7 +36,7 @@ func getIndex(pk types.PubKey, keys []types.PubKey) int {
|
||||
}
|
||||
|
||||
// AddSignature adds a signature to the multisig, at the corresponding index. The index must
|
||||
// represent the pubkey index in the LegacyAmingPubKey structure, which verifies this signature.
|
||||
// represent the pubkey index in the LegacyAminoPubKey structure, which verifies this signature.
|
||||
// If the signature already exists, replace it.
|
||||
func AddSignature(mSig *signing.MultiSignatureData, sig signing.SignatureData, index int) {
|
||||
newSigIndex := mSig.BitArray.NumTrueBitsBefore(index)
|
||||
|
||||
@ -18,7 +18,7 @@ var Register = RegisterModule
|
||||
// function. All module initialization should be handled by the provided options.
|
||||
//
|
||||
// Config is a protobuf message type. It should define the cosmos.app.v1alpha.module
|
||||
// option and must explicitly specify go_packageto make debugging easier for users.
|
||||
// option and must explicitly specify go_package to make debugging easier for users.
|
||||
//
|
||||
// If you want to customize an existing module, you need to overwrite by calling
|
||||
// RegisterModule again with the same config (proto API type) and new Provide or
|
||||
|
||||
Loading…
Reference in New Issue
Block a user