diff --git a/addons/misra.py b/addons/misra.py index cc698ca57..12cc67d21 100755 --- a/addons/misra.py +++ b/addons/misra.py @@ -1739,7 +1739,7 @@ class MisraChecker: # Rule existed in the dictionary. Check for # filename entries. - # Get the dictionary for the rule numer + # Get the dictionary for the rule number fileDict = self.suppressedRules[ruleNum] # If the filename is not in the dict already add it diff --git a/addons/y2038/README b/addons/y2038/README index f064d93fd..990b24bd4 100644 --- a/addons/y2038/README +++ b/addons/y2038/README @@ -36,7 +36,7 @@ any user code around which uses 32-bit epoch representations. There is Y2038-proofing work in progress on the Linux and GNU glibc front. -2. What is the Y2038 ccpcheck addon? +2. What is the Y2038 cppcheck addon? The Y2038 cppcheck addon is a tool to help detect code which might need fixing because it is Y2038-unsafe. This may be because it uses types or functions from diff --git a/test/testsimplifytemplate.cpp b/test/testsimplifytemplate.cpp index 1d3c9456a..e9180b58b 100644 --- a/test/testsimplifytemplate.cpp +++ b/test/testsimplifytemplate.cpp @@ -981,7 +981,7 @@ private: "int f ( int t ) { return t ; }", tok(code2)); } - void template42() { // #4878 cpcheck aborts in ext-blocks.cpp (clang testcode) + void template42() { // #4878 cppcheck aborts in ext-blocks.cpp (clang testcode) const char code[] = "template\n" "int f0(Args ...args) {\n" " return ^ {\n" @@ -993,7 +993,7 @@ private: tok(code); } - void template43() { // #5097 - Assert due to '>>' in 'B>' not being treated as end of template instantation + void template43() { // #5097 - Assert due to '>>' in 'B>' not being treated as end of template instantiation const char code[] = "template struct E { typedef int Int; };\n" "template struct C { };\n" "template struct D { static int f() { return C::f(); } };\n"