diff options
author | luz.paz <luzpaz@users.noreply.github.com> | 2018-09-15 07:20:54 -0400 |
---|---|---|
committer | Thomas Haller <thaller@redhat.com> | 2018-09-17 11:26:13 +0200 |
commit | 58510ed5667974e772344c1a893be9deecb1b4cc (patch) | |
tree | 66f521404a44570bd0deaa694d3403050bcc0b36 /libnm-util | |
parent | f985b6944a1147281e34721c96db1a41baca65b3 (diff) | |
download | NetworkManager-58510ed5667974e772344c1a893be9deecb1b4cc.tar.gz |
docs: misc. typos pt2
Remainder of typos found using `codespell -q 3 --skip="./shared,./src/systemd,*.po" -I ../NetworkManager-word-whitelist.txt` whereby whitelist consists of:
```
ans
busses
cace
cna
conexant
crasher
iff
liftime
creat
nd
sav
technik
uint
```
https://github.com/NetworkManager/NetworkManager/pull/205
Diffstat (limited to 'libnm-util')
-rw-r--r-- | libnm-util/nm-connection.h | 2 | ||||
-rw-r--r-- | libnm-util/nm-param-spec-specialized.c | 4 | ||||
-rw-r--r-- | libnm-util/nm-setting-8021x.c | 4 | ||||
-rw-r--r-- | libnm-util/nm-setting-connection.c | 4 | ||||
-rw-r--r-- | libnm-util/nm-setting-wireless-security.c | 2 | ||||
-rw-r--r-- | libnm-util/nm-setting-wireless-security.h | 4 | ||||
-rw-r--r-- | libnm-util/nm-setting.c | 2 | ||||
-rw-r--r-- | libnm-util/nm-setting.h | 2 | ||||
-rw-r--r-- | libnm-util/nm-utils.c | 12 | ||||
-rw-r--r-- | libnm-util/tests/test-general.c | 4 |
10 files changed, 20 insertions, 20 deletions
diff --git a/libnm-util/nm-connection.h b/libnm-util/nm-connection.h index 6e119c2c0b..9bee219e86 100644 --- a/libnm-util/nm-connection.h +++ b/libnm-util/nm-connection.h @@ -100,7 +100,7 @@ typedef enum /* * NM_CONNECTION_NORMALIZE_PARAM_IP6_CONFIG_METHOD: overwrite the ip6 method - * when normalizing ip6 configuration. If omited, this defaults to + * when normalizing ip6 configuration. If omitted, this defaults to * @NM_SETTING_IP6_CONFIG_METHOD_AUTO. */ #define NM_CONNECTION_NORMALIZE_PARAM_IP6_CONFIG_METHOD "ip6-config-method" diff --git a/libnm-util/nm-param-spec-specialized.c b/libnm-util/nm-param-spec-specialized.c index dfc8ea9874..8581ecc5b0 100644 --- a/libnm-util/nm-param-spec-specialized.c +++ b/libnm-util/nm-param-spec-specialized.c @@ -539,9 +539,9 @@ _gvalues_compare (const GValue *value1, const GValue *value2) if (p1 == p2) ret = 0; /* Exactly the same values */ else if (!p1) - ret = 1; /* The comparision functions below don't handle NULLs */ + ret = 1; /* The comparison functions below don't handle NULLs */ else if (!p2) - ret = -1; /* The comparision functions below don't handle NULLs */ + ret = -1; /* The comparison functions below don't handle NULLs */ else if (type1 == G_TYPE_STRV) ret = _gvalues_compare_strv (value1, value2); else if (dbus_g_type_is_collection (type1)) diff --git a/libnm-util/nm-setting-8021x.c b/libnm-util/nm-setting-8021x.c index ae7a47e664..805a5d25ad 100644 --- a/libnm-util/nm-setting-8021x.c +++ b/libnm-util/nm-setting-8021x.c @@ -435,7 +435,7 @@ get_cert_scheme (GByteArray *array) && !memcmp (array->data, SCHEME_PATH, NM_STRLEN (SCHEME_PATH))) { /* But it must also be NUL terminated, contain at least * one non-NUL character, and contain only one trailing NUL - * chracter. + * character. * And ensure it's UTF-8 valid too so we can pass it through * D-Bus and stuff like that. */ if ( array->len > NM_STRLEN (SCHEME_PATH) + 1 @@ -3723,7 +3723,7 @@ nm_setting_802_1x_class_init (NMSetting8021xClass *setting_class) /* Initialize crypto lbrary. */ if (!nm_utils_init (&error)) { - g_warning ("Couldn't initilize nm-utils/crypto system: %s", + g_warning ("Couldn't initialize nm-utils/crypto system: %s", error->message); g_error_free (error); } diff --git a/libnm-util/nm-setting-connection.c b/libnm-util/nm-setting-connection.c index c7da1aa46c..4750733f2a 100644 --- a/libnm-util/nm-setting-connection.c +++ b/libnm-util/nm-setting-connection.c @@ -294,7 +294,7 @@ nm_setting_connection_get_num_permissions (NMSettingConnection *setting) * @setting: the #NMSettingConnection * @idx: the zero-based index of the permissions entry * @out_ptype: on return, the permission type (at this time, always "user") - * @out_pitem: on return, the permission item (formatted accoring to @ptype, see + * @out_pitem: on return, the permission item (formatted according to @ptype, see * #NMSettingConnection:permissions for more detail * @out_detail: on return, the permission detail (at this time, always %NULL) * @@ -646,7 +646,7 @@ nm_setting_connection_get_secondary (NMSettingConnection *setting, guint32 idx) * @setting: the #NMSettingConnection * @sec_uuid: the secondary connection UUID to add * - * Adds a new secondary connetion UUID to the setting. + * Adds a new secondary connection UUID to the setting. * * Returns: %TRUE if the secondary connection UUID was added; %FALSE if the UUID * was already present diff --git a/libnm-util/nm-setting-wireless-security.c b/libnm-util/nm-setting-wireless-security.c index 00d35a2fe0..33598dfec0 100644 --- a/libnm-util/nm-setting-wireless-security.c +++ b/libnm-util/nm-setting-wireless-security.c @@ -407,7 +407,7 @@ nm_setting_wireless_security_remove_pairwise (NMSettingWirelessSecurity *setting * Removes an encryption algorithm from the allowed pairwise encryption * algorithm list. * - * Returns: %TRUE if the encryption algorith was found and removed; %FALSE if it was not. + * Returns: %TRUE if the encryption algorithm was found and removed; %FALSE if it was not. * * Since: 0.9.10 **/ diff --git a/libnm-util/nm-setting-wireless-security.h b/libnm-util/nm-setting-wireless-security.h index 1140582b56..cbeeb9bfaf 100644 --- a/libnm-util/nm-setting-wireless-security.h +++ b/libnm-util/nm-setting-wireless-security.h @@ -79,9 +79,9 @@ GQuark nm_setting_wireless_security_error_quark (void); * @NM_WEP_KEY_TYPE_LAST: placeholder value for bounds-checking * * The #NMWepKeyType values specify how any WEP keys present in the setting - * are intepreted. There are no standards governing how to hash the various WEP + * are interpreted. There are no standards governing how to hash the various WEP * key/passphrase formats into the actual WEP key. Unfortunately some WEP keys - * can be interpreted in multiple ways, requring the setting to specify how to + * can be interpreted in multiple ways, requiring the setting to specify how to * interpret the any WEP keys. For example, the key "732f2d712e4a394a375d366931" * is both a valid Hexadecimal WEP key and a WEP passphrase. Further, many * ASCII keys are also valid WEP passphrases, but since passphrases and ASCII diff --git a/libnm-util/nm-setting.c b/libnm-util/nm-setting.c index 9147dfe150..dfff2fe52b 100644 --- a/libnm-util/nm-setting.c +++ b/libnm-util/nm-setting.c @@ -674,7 +674,7 @@ should_compare_prop (NMSetting *setting, && g_strcmp0 (prop_name, NM_SETTING_VPN_SECRETS) == 0) { /* FIXME: NMSettingVPN:NM_SETTING_VPN_SECRETS has NM_SETTING_PARAM_SECRET. * nm_setting_get_secret_flags() quite possibly fails, but it might succeed if the - * setting accidently uses a key "secrets". */ + * setting accidentally uses a key "secrets". */ return FALSE; } diff --git a/libnm-util/nm-setting.h b/libnm-util/nm-setting.h index d235efbd4e..d70445a2e7 100644 --- a/libnm-util/nm-setting.h +++ b/libnm-util/nm-setting.h @@ -91,7 +91,7 @@ GQuark nm_setting_error_quark (void); * should be requested from the user each time it is needed * @NM_SETTING_SECRET_FLAG_NOT_REQUIRED: in situations where it cannot be * automatically determined that the secret is required (some VPNs and PPP - * providers dont require all secrets) this flag indicates that the specific + * providers don't require all secrets) this flag indicates that the specific * secret is not required * * These flags indicate specific behavior related to handling of a secret. Each diff --git a/libnm-util/nm-utils.c b/libnm-util/nm-utils.c index 054d69f4c1..e2a4bfb059 100644 --- a/libnm-util/nm-utils.c +++ b/libnm-util/nm-utils.c @@ -103,7 +103,7 @@ static const struct IsoLangToEncodings isoLangEntries2[] = { "bg", {"windows-1251","koi8-r", "iso-8859-5"} }, /* Bulgarian */ { "mk", {"koi8-r", "windows-1251", "iso-8859-5"} }, /* Macedonian */ { "sr", {"koi8-r", "windows-1251", "iso-8859-5"} }, /* Serbian */ - { "uk", {"koi8-u", "koi8-r", "windows-1251"} }, /* Ukranian */ + { "uk", {"koi8-u", "koi8-r", "windows-1251"} }, /* Ukrainian */ /* Arabic */ { "ar", {"iso-8859-6", "windows-1256", NULL} }, @@ -600,7 +600,7 @@ device_supports_ap_ciphers (guint32 dev_caps, /** * nm_utils_ap_mode_security_valid: - * @type: the security type to check device capabilties against, + * @type: the security type to check device capabilities against, * e.g. #NMU_SEC_STATIC_WEP * @wifi_caps: bitfield of the capabilities of the specific Wi-Fi device, e.g. * #NM_WIFI_DEVICE_CAP_CIPHER_WEP40 @@ -638,16 +638,16 @@ nm_utils_ap_mode_security_valid (NMUtilsSecurityType type, /** * nm_utils_security_valid: - * @type: the security type to check AP flags and device capabilties against, + * @type: the security type to check AP flags and device capabilities against, * e.g. #NMU_SEC_STATIC_WEP * @wifi_caps: bitfield of the capabilities of the specific Wi-Fi device, e.g. * #NM_WIFI_DEVICE_CAP_CIPHER_WEP40 * @have_ap: whether the @ap_flags, @ap_wpa, and @ap_rsn arguments are valid * @adhoc: whether the capabilities being tested are from an Ad-Hoc AP (IBSS) * @ap_flags: bitfield of AP capabilities, e.g. #NM_802_11_AP_FLAGS_PRIVACY - * @ap_wpa: bitfield of AP capabilties derived from the AP's WPA beacon, + * @ap_wpa: bitfield of AP capabilities derived from the AP's WPA beacon, * e.g. (#NM_802_11_AP_SEC_PAIR_TKIP | #NM_802_11_AP_SEC_KEY_MGMT_PSK) - * @ap_rsn: bitfield of AP capabilties derived from the AP's RSN/WPA2 beacon, + * @ap_rsn: bitfield of AP capabilities derived from the AP's RSN/WPA2 beacon, * e.g. (#NM_802_11_AP_SEC_PAIR_CCMP | #NM_802_11_AP_SEC_PAIR_TKIP) * * Given a set of device capabilities, and a desired security type to check @@ -657,7 +657,7 @@ nm_utils_ap_mode_security_valid (NMUtilsSecurityType type, * NOTE: this function cannot handle checking security for AP/Hotspot mode; * use nm_utils_ap_mode_security_valid() instead. * - * Returns: %TRUE if the device capabilities and AP capabilties intersect and are + * Returns: %TRUE if the device capabilities and AP capabilities intersect and are * compatible with the desired @type, %FALSE if they are not **/ gboolean diff --git a/libnm-util/tests/test-general.c b/libnm-util/tests/test-general.c index 304797a927..9e097f19aa 100644 --- a/libnm-util/tests/test-general.c +++ b/libnm-util/tests/test-general.c @@ -2314,7 +2314,7 @@ test_connection_verify_sets_interface_name (void) g_assert_cmpstr (nm_connection_get_interface_name (con), ==, NULL); - /* for backward compatiblity, normalizes the interface name */ + /* for backward compatibility, normalizes the interface name */ success = nm_connection_verify (con, &error); g_assert (success && !error); @@ -2373,7 +2373,7 @@ test_connection_normalize_virtual_iface_name (void) g_assert_cmpstr (nm_connection_get_interface_name (con), ==, IFACE_NAME); g_assert_cmpstr (nm_setting_vlan_get_interface_name (s_vlan), ==, IFACE_VIRT); - /* for backward compatiblity, normalizes the interface name */ + /* for backward compatibility, normalizes the interface name */ success = nm_connection_verify (con, &error); g_assert (success && !error); |