diff options
author | luz.paz <luzpaz@users.noreply.github.com> | 2018-09-15 07:20:54 -0400 |
---|---|---|
committer | Thomas Haller <thaller@redhat.com> | 2018-09-17 11:26:13 +0200 |
commit | 58510ed5667974e772344c1a893be9deecb1b4cc (patch) | |
tree | 66f521404a44570bd0deaa694d3403050bcc0b36 | |
parent | f985b6944a1147281e34721c96db1a41baca65b3 (diff) | |
download | NetworkManager-58510ed5667974e772344c1a893be9deecb1b4cc.tar.gz |
docs: misc. typos pt2
Remainder of typos found using `codespell -q 3 --skip="./shared,./src/systemd,*.po" -I ../NetworkManager-word-whitelist.txt` whereby whitelist consists of:
```
ans
busses
cace
cna
conexant
crasher
iff
liftime
creat
nd
sav
technik
uint
```
https://github.com/NetworkManager/NetworkManager/pull/205
61 files changed, 113 insertions, 113 deletions
@@ -69,7 +69,7 @@ This is a new stable release of NetworkManager. Notable changes include: * nmcli now scans for Wi-Fi networks before displaying them, if the last scan was too long ago. * Added the ipv6.dhcp-duid property to allow configuring the DHCPv6 DUID -* Extended ipv6.dhcp-client-id property to support DHCP client identifers +* Extended ipv6.dhcp-client-id property to support DHCP client identifiers depending on the MAC address and the stable ID. * Set NM_DISPATCHER_ACTION environment variable in dispatcher scripts. @@ -274,7 +274,7 @@ This is a new stable release of NetworkManager. Notable changes include: into the ifcfg file for improved compatibility with the legacy network service. * Improve handling of MTU by resetting the previous MTU when the device deactivates and reset the MTU to a defined value on activation. -* Improve tracking of parent devices for dependend devices like ip-tunnels, MACVLAN, +* Improve tracking of parent devices for dependent devices like ip-tunnels, MACVLAN, VETH, VLAN, and VXLAN. * Many bug fixes and improvements @@ -576,7 +576,7 @@ This is a new stable release of NetworkManager. Notable changes include: * NetworkManager no longer requires polkit libraries at runtime when Polkit support is enabled, and Polkit can be disabled at build time too * Automatically created connections are now deleted when their device goes away -* 'nmcli dev connect' now attemts to create a connection if none exists +* 'nmcli dev connect' now attempts to create a connection if none exists * Manually configured static IPv6 configuration is kept even if SLAAC fails * Manpages for the 'keyfile' and 'ifcfg-rh' plugins now describe their configuration syntax and available options @@ -719,7 +719,7 @@ This is a new stable release of NetworkManager. Notable changes include: * Better handling of WiFi devices via nl80211 when available (instead of WEXT) * IP configuration is now non-blocking; waiting for IPv6 RA no longer blocks the device from activating if IPv4 is ready and vice versa -* Addded support for firewall "zones" via FirewallD +* Added support for firewall "zones" via FirewallD * Added basic support for bonded interfaces * WiFi connections are no longer locked to a specific MAC address if they are "locally administered" addresses (ie, 02:::::) @@ -967,13 +967,13 @@ Overview of changes since NetworkManager-0.5.0 * Don't drop the last scanned AP (Dan Williams) * Broadcast state change when disconnected (Robert Love) * The Slackware backend now builds (Nico) - * Don't install unsued config files (Dan Williams) + * Don't install unused config files (Dan Williams) * Add a test for libnm_glib_unregister_callback (Christopher Aillon) * Requires wireless-tools 28pre9 (Christopher Aillon) * nm-applet * Use g_get_host_name () if we've got it (Christopher Aillon) - * Fix an unitialized variable (Robert Love) + * Fix an uninitialized variable (Robert Love) * Fix sensitivity of VPN items (Robert Love) @@ -97,7 +97,7 @@ same MAC address, the connection with the most recent timestamp should be preferred. Similarly, if the probing/listening process detects 802.1x frames the device -should be marked as requring 802.1x authentication until the carrier drops. +should be marked as requiring 802.1x authentication until the carrier drops. This would be accomplished by adding a new property to the NMDeviceEthernet object and exporting that property through the introspection/nm-device-ethernet.xml file. This would allow clients like @@ -231,7 +231,7 @@ proceeds with the connection. NM sends the correct wpa_supplicant config for WPS to the supplicant, and waits for the connection to occur. WPS can only be used the *first* time, so after a -first successfull connection, NM must request the actual hexadecimal PSK from +first successful connection, NM must request the actual hexadecimal PSK from wpa_supplicant via D-Bus, and store that PSK in the connection, clear any WPS PIN code from the connection, and save the connection to backing storage. @@ -283,7 +283,7 @@ connection process. 2) single-device-at-a-time with overlapping connections: this is also probably the best route to go for desktop use-cases as well. Instead of bringing all available connections up, only bring up the "best" connection at any given -time based on the current priority list (which is rougly Ethernet > WiFi > +time based on the current priority list (which is roughly Ethernet > WiFi > 3G/Bluetooth). However, to ensure seamless connectivity, when one connection begins to degrade, the next-best connection should be started before the current one is terminated, such that there is a small amount of overlap. diff --git a/configure.ac b/configure.ac index c4a84cc4c6..b3fc8b249f 100644 --- a/configure.ac +++ b/configure.ac @@ -623,7 +623,7 @@ AM_CONDITIONAL(WITH_JSON_VALIDATION, test "${enable_json_validation}" != "no") # we usually compile with polkit support. --enable-polkit=yes|no only sets the # default configuration for main.auth-polkit. User can always enable/disable polkit -# autorization via config. +# authorization via config. AC_ARG_ENABLE(polkit, AS_HELP_STRING([--enable-polkit=yes|no], [set default value for auth-polkit configuration option. This value can be overwritten by NM configuration. 'disabled' is an alias for 'no']), diff --git a/contrib/fedora/rpm/build.sh b/contrib/fedora/rpm/build.sh index bd92f1eb2c..017aab9c30 100755 --- a/contrib/fedora/rpm/build.sh +++ b/contrib/fedora/rpm/build.sh @@ -3,7 +3,7 @@ #set -vx # Set arguments via environment variables. -# Argument can be omited and defaults will be detected. +# Argument can be omitted and defaults will be detected. # # BUILDTYPE=|SRPM # NM_RPMBUILD_ARGS=<additional argus for rpmbuild> @@ -157,7 +157,7 @@ ln "$BUILDLOG" "$TEMPBASE/build.log" rm -f "$BUILDLOG" TEMPSPEC="$TEMP/SPECS/NetworkManager.spec" -mkdir -p "$TEMP/SOURCES/" "$TEMP/SPECS/" || die "error creating SPECS directoy" +mkdir -p "$TEMP/SOURCES/" "$TEMP/SPECS/" || die "error creating SPECS directory" if [[ "$(dirname "$SOURCE")" != "$TEMP/SOURCES" ]]; then cp "$SOURCE" "$TEMP/SOURCES/" || die "Could not copy source $SOURCE to $TEMP/SOURCES" diff --git a/docs/api/network-manager-docs.xml b/docs/api/network-manager-docs.xml index 9285744310..047c3086e3 100644 --- a/docs/api/network-manager-docs.xml +++ b/docs/api/network-manager-docs.xml @@ -258,7 +258,7 @@ </chapter> <!-- - These are obsolete and intentionally ommitted from the manual since they can't + These are obsolete and intentionally omitted from the manual since they can't appear on the D-Bus API of the present version of NetworkManager. Keep them here so that "make check" won't think that they were skipped accidentally . <xi:include href="dbus-org.freedesktop.NetworkManager.Device.WiMax.xml"/> diff --git a/docs/libnm/libnm-docs.xml b/docs/libnm/libnm-docs.xml index a0f87bfb6e..3597d84972 100644 --- a/docs/libnm/libnm-docs.xml +++ b/docs/libnm/libnm-docs.xml @@ -69,7 +69,7 @@ mapping D-Bus signals and properties to GObject signals and properties, and providing helpful accessor and utility functions. However, unlike the old libnm-util/libnm-glib API, the mapping to the D-Bus API is not - exact, and various inconveniences and historical anomolies of the D-Bus + exact, and various inconveniences and historical anomalies of the D-Bus API are papered over. </para> <para> @@ -295,7 +295,7 @@ print ("NetworkManager version " + client.get_version())]]></programlisting></in </chapter> <!-- - These don't contain any useful documentaiton. Keep them here, + These don't contain any useful documentation. Keep them here, so that tools/check-docs.sh knows that we did omit them intentionally. <xi:include href="xml/nm-core-enum-types.xml"/> <xi:include href="xml/nm-enum-types.xml"/> diff --git a/libnm-core/nm-connection.h b/libnm-core/nm-connection.h index 802f68ba5a..8d64a4cebc 100644 --- a/libnm-core/nm-connection.h +++ b/libnm-core/nm-connection.h @@ -45,7 +45,7 @@ G_BEGIN_DECLS /* * NM_CONNECTION_NORMALIZE_PARAM_IP6_CONFIG_METHOD: overwrite the ip6 method - * when normalizing ip6 configuration. If omited, this defaults to + * when normalizing ip6 configuration. If omitted, this defaults to * @NM_SETTING_IP6_CONFIG_METHOD_AUTO. */ #define NM_CONNECTION_NORMALIZE_PARAM_IP6_CONFIG_METHOD "ip6-config-method" @@ -59,7 +59,7 @@ G_BEGIN_DECLS /** * NMConnectionInterface: - * @parent: the parent interace struct + * @parent: the parent interface struct * @secrets_updated: emitted when the connection's secrets are updated * @secrets_cleared: emitted when the connection's secrets are cleared * @changed: emitted when any change to the connection's settings occurs diff --git a/libnm-core/nm-dbus-interface.h b/libnm-core/nm-dbus-interface.h index 4e12dc63a2..6dce6bb735 100644 --- a/libnm-core/nm-dbus-interface.h +++ b/libnm-core/nm-dbus-interface.h @@ -168,7 +168,7 @@ typedef enum { * @NM_CONNECTIVITY_PORTAL: The Internet connection is hijacked by a captive * portal gateway. The graphical shell may open a sandboxed web browser window * (because the captive portals typically attempt a man-in-the-middle attacks - * agains the https connections) for the purpose of authenticating to a gateway + * against the https connections) for the purpose of authenticating to a gateway * and retrigger the connectivity check with CheckConnectivity() when the * browser window is dismissed. * @NM_CONNECTIVITY_LIMITED: The host is connected to a network, does not appear @@ -1004,7 +1004,7 @@ typedef enum { /*< flags >*/ * again (because it's about to be deleted), but a manual activation will * clear the volatile flag. * @NM_SETTINGS_UPDATE2_FLAG_BLOCK_AUTOCONNECT: usually, when the connection - * has autoconnect enabled and is modified, it becomes elegible to autoconnect + * has autoconnect enabled and is modified, it becomes eligible to autoconnect * right away. Setting this flag, disables autoconnect until the connection * is manually activated. * diff --git a/libnm-core/nm-keyfile.c b/libnm-core/nm-keyfile.c index c7d878691b..be37d2a8e3 100644 --- a/libnm-core/nm-keyfile.c +++ b/libnm-core/nm-keyfile.c @@ -372,7 +372,7 @@ read_field (char **current, const char **out_err_str, const char *characters, co * address/plen,gateway,metric (NETWORK via GATEWAY dev DEVICE metric METRIC) * * For backward, forward and sideward compatibility, slash (/), - * semicolon (;) and comma (,) are interchangable. The choice of + * semicolon (;) and comma (,) are interchangeable. The choice of * separator in the above examples is therefore not significant. * * Leaving out the prefix length is discouraged and DEPRECATED. The @@ -2544,7 +2544,7 @@ read_one_setting_value (NMSetting *setting, */ if ( (!pip || !pip->parser_no_check_key) && !nm_keyfile_plugin_kf_has_key (keyfile, setting_name, key, &err)) { - /* Key doesn't exist or an error ocurred, thus nothing to do. */ + /* Key doesn't exist or an error occurred, thus nothing to do. */ if (err) { if (!handle_warn (info, key, NM_KEYFILE_WARN_SEVERITY_WARN, _("error loading setting value: %s"), @@ -2902,7 +2902,7 @@ nm_keyfile_read (GKeyFile *keyfile, nm_connection_add_setting (connection, NM_SETTING (s_con)); } - /* Make sure that we have 'id' even if not explictly specified in the keyfile */ + /* Make sure that we have 'id' even if not explicitly specified in the keyfile */ if ( keyfile_name && !nm_setting_connection_get_id (s_con)) { gs_free char *base_name = NULL; @@ -2911,7 +2911,7 @@ nm_keyfile_read (GKeyFile *keyfile, g_object_set (s_con, NM_SETTING_CONNECTION_ID, base_name, NULL); } - /* Make sure that we have 'uuid' even if not explictly specified in the keyfile */ + /* Make sure that we have 'uuid' even if not explicitly specified in the keyfile */ if ( keyfile_name && !nm_setting_connection_get_uuid (s_con)) { gs_free char *hashed_uuid = NULL; diff --git a/libnm-core/nm-setting-8021x.c b/libnm-core/nm-setting-8021x.c index 7e004c903b..efbf5371ae 100644 --- a/libnm-core/nm-setting-8021x.c +++ b/libnm-core/nm-setting-8021x.c @@ -246,7 +246,7 @@ nm_setting_802_1x_check_cert_scheme (gconstpointer pdata, gsize length, GError * if (scheme != NM_SETTING_802_1X_CK_SCHEME_BLOB) { /* An actual URI must be NUL terminated, contain at least * one non-NUL character, and contain only one trailing NUL - * chracter. + * character. * And ensure it's UTF-8 valid too so we can pass it through * D-Bus and stuff like that. */ diff --git a/libnm-core/nm-setting-connection.c b/libnm-core/nm-setting-connection.c index 50240bc934..1731afa66e 100644 --- a/libnm-core/nm-setting-connection.c +++ b/libnm-core/nm-setting-connection.c @@ -312,7 +312,7 @@ nm_setting_connection_get_num_permissions (NMSettingConnection *setting) * @setting: the #NMSettingConnection * @idx: the zero-based index of the permissions entry * @out_ptype: on return, the permission type (at this time, always "user") - * @out_pitem: on return, the permission item (formatted accoring to @ptype, see + * @out_pitem: on return, the permission item (formatted according to @ptype, see * #NMSettingConnection:permissions for more detail * @out_detail: on return, the permission detail (at this time, always %NULL) * @@ -748,7 +748,7 @@ nm_setting_connection_get_secondary (NMSettingConnection *setting, guint32 idx) * @setting: the #NMSettingConnection * @sec_uuid: the secondary connection UUID to add * - * Adds a new secondary connetion UUID to the setting. + * Adds a new secondary connection UUID to the setting. * * Returns: %TRUE if the secondary connection UUID was added; %FALSE if the UUID * was already present diff --git a/libnm-core/nm-setting-dcb.c b/libnm-core/nm-setting-dcb.c index dabcbbaf19..92993779c6 100644 --- a/libnm-core/nm-setting-dcb.c +++ b/libnm-core/nm-setting-dcb.c @@ -1275,7 +1275,7 @@ nm_setting_dcb_class_init (NMSettingDcbClass *klass) /* ---ifcfg-rh--- * property: priority-traffic-class * variable: DCB_PG_UP2TC - * description: Priority values. String of eight trafic class values (0 - 7). + * description: Priority values. String of eight traffic class values (0 - 7). * example: DCB_PG_UP2TC=01623701 * ---end--- */ diff --git a/libnm-core/nm-setting-sriov.c b/libnm-core/nm-setting-sriov.c index 45b3a1d2f5..785143b063 100644 --- a/libnm-core/nm-setting-sriov.c +++ b/libnm-core/nm-setting-sriov.c @@ -952,7 +952,7 @@ vfs_to_dbus (NMSetting *setting, const char *property) /* VLANs are translated into an array of maps, where each map has * keys 'id', 'qos' and 'proto'. This guarantees enough flexibility - * to accomodate any future new option. */ + * to accommodate any future new option. */ vlan_ids = nm_sriov_vf_get_vlan_ids (vf, &num_vlans); if (num_vlans) { GVariantBuilder vlans_builder; diff --git a/libnm-core/nm-setting-team.c b/libnm-core/nm-setting-team.c index e6737e48ce..5f070d8e98 100644 --- a/libnm-core/nm-setting-team.c +++ b/libnm-core/nm-setting-team.c @@ -411,7 +411,7 @@ nm_team_link_watcher_get_name (NMTeamLinkWatcher *watcher) * @watcher: the #NMTeamLinkWatcher * * Gets the delay_up interval (in milliseconds) that elapses between the link - * coming up and the runner beeing notified about it. + * coming up and the runner being notified about it. * * Since: 1.12 **/ @@ -430,7 +430,7 @@ nm_team_link_watcher_get_delay_up (NMTeamLinkWatcher *watcher) * @watcher: the #NMTeamLinkWatcher * * Gets the delay_down interval (in milliseconds) that elapses between the link - * going down and the runner beeing notified about it. + * going down and the runner being notified about it. * * Since: 1.12 **/ diff --git a/libnm-core/nm-setting-wired.c b/libnm-core/nm-setting-wired.c index baa40cc4f4..5a005b2f63 100644 --- a/libnm-core/nm-setting-wired.c +++ b/libnm-core/nm-setting-wired.c @@ -1215,7 +1215,7 @@ nm_setting_wired_class_init (NMSettingWiredClass *klass) * a hardware address in ASCII representation, or one of the special values * "preserve", "permanent", "random" or "stable". * This field replaces the deprecated "cloned-mac-address" on D-Bus, which - * can only contain explict hardware addresses. Note that this property + * can only contain explicit hardware addresses. Note that this property * only exists in D-Bus API. libnm and nmcli continue to call this property * "cloned-mac-address". * ---end--- diff --git a/libnm-core/nm-setting-wireless-security.c b/libnm-core/nm-setting-wireless-security.c index d152782168..38f4519b77 100644 --- a/libnm-core/nm-setting-wireless-security.c +++ b/libnm-core/nm-setting-wireless-security.c @@ -390,7 +390,7 @@ nm_setting_wireless_security_remove_pairwise (NMSettingWirelessSecurity *setting * Removes an encryption algorithm from the allowed pairwise encryption * algorithm list. * - * Returns: %TRUE if the encryption algorith was found and removed; %FALSE if it was not. + * Returns: %TRUE if the encryption algorithm was found and removed; %FALSE if it was not. **/ gboolean nm_setting_wireless_security_remove_pairwise_by_value (NMSettingWirelessSecurity *setting, diff --git a/libnm-core/nm-setting-wireless-security.h b/libnm-core/nm-setting-wireless-security.h index 5a732ac090..519353b043 100644 --- a/libnm-core/nm-setting-wireless-security.h +++ b/libnm-core/nm-setting-wireless-security.h @@ -54,9 +54,9 @@ G_BEGIN_DECLS * @NM_WEP_KEY_TYPE_LAST: placeholder value for bounds-checking * * The #NMWepKeyType values specify how any WEP keys present in the setting - * are intepreted. There are no standards governing how to hash the various WEP + * are interpreted. There are no standards governing how to hash the various WEP * key/passphrase formats into the actual WEP key. Unfortunately some WEP keys - * can be interpreted in multiple ways, requring the setting to specify how to + * can be interpreted in multiple ways, requiring the setting to specify how to * interpret the any WEP keys. For example, the key "732f2d712e4a394a375d366931" * is both a valid Hexadecimal WEP key and a WEP passphrase. Further, many * ASCII keys are also valid WEP passphrases, but since passphrases and ASCII diff --git a/libnm-core/nm-setting-wireless.c b/libnm-core/nm-setting-wireless.c index a9cae6c0db..e31d80b9aa 100644 --- a/libnm-core/nm-setting-wireless.c +++ b/libnm-core/nm-setting-wireless.c @@ -1461,7 +1461,7 @@ nm_setting_wireless_class_init (NMSettingWirelessClass *klass) * a hardware address in ASCII representation, or one of the special values * "preserve", "permanent", "random" or "stable". * This field replaces the deprecated "cloned-mac-address" on D-Bus, which - * can only contain explict hardware addresses. Note that this property + * can only contain explicit hardware addresses. Note that this property * only exists in D-Bus API. libnm and nmcli continue to call this property * "cloned-mac-address". * ---end--- diff --git a/libnm-core/nm-setting-wireless.h b/libnm-core/nm-setting-wireless.h index e9afe2c67f..4611f94bed 100644 --- a/libnm-core/nm-setting-wireless.h +++ b/libnm-core/nm-setting-wireless.h @@ -49,7 +49,7 @@ G_BEGIN_DECLS * @NM_SETTING_WIRELESS_WAKE_ON_WLAN_MAGIC: Wake on magic packet * @NM_SETTING_WIRELESS_WAKE_ON_WLAN_GTK_REKEY_FAILURE: Wake on GTK rekey failure * @NM_SETTING_WIRELESS_WAKE_ON_WLAN_EAP_IDENTITY_REQUEST: Wake on EAP identity request - * @NM_SETTING_WIRELESS_WAKE_ON_WLAN_4WAY_HANDSHAKE: Wake on 4way hanshake + * @NM_SETTING_WIRELESS_WAKE_ON_WLAN_4WAY_HANDSHAKE: Wake on 4way handshake * @NM_SETTING_WIRELESS_WAKE_ON_WLAN_RFKILL_RELEASE: Wake on rfkill release * @NM_SETTING_WIRELESS_WAKE_ON_WLAN_ALL: Wake on all events. This does not * include the exclusive flags @NM_SETTING_WIRELESS_WAKE_ON_WLAN_DEFAULT or diff --git a/libnm-core/nm-setting.c b/libnm-core/nm-setting.c index 0cec516517..ff86fb9082 100644 --- a/libnm-core/nm-setting.c +++ b/libnm-core/nm-setting.c @@ -1283,7 +1283,7 @@ should_compare_prop (NMSetting *setting, && g_strcmp0 (prop_name, NM_SETTING_VPN_SECRETS) == 0) { /* FIXME: NMSettingVPN:NM_SETTING_VPN_SECRETS has NM_SETTING_PARAM_SECRET. * nm_setting_get_secret_flags() quite possibly fails, but it might succeed if the - * setting accidently uses a key "secrets". */ + * setting accidentally uses a key "secrets". */ return TRUE; } diff --git a/libnm-core/nm-setting.h b/libnm-core/nm-setting.h index a7a0f81f40..d6876f86d2 100644 --- a/libnm-core/nm-setting.h +++ b/libnm-core/nm-setting.h @@ -64,7 +64,7 @@ G_BEGIN_DECLS * should be requested from the user each time it is needed * @NM_SETTING_SECRET_FLAG_NOT_REQUIRED: in situations where it cannot be * automatically determined that the secret is required (some VPNs and PPP - * providers dont require all secrets) this flag indicates that the specific + * providers don't require all secrets) this flag indicates that the specific * secret is not required * * These flags indicate specific behavior related to handling of a secret. Each diff --git a/libnm-core/nm-utils.c b/libnm-core/nm-utils.c index f6e1555ef8..b880f0f5aa 100644 --- a/libnm-core/nm-utils.c +++ b/libnm-core/nm-utils.c @@ -112,7 +112,7 @@ static const struct IsoLangToEncodings isoLangEntries2[] = LANG_ENCODINGS ("bg", "windows-1251","koi8-r", "iso-8859-5"), /* Bulgarian */ LANG_ENCODINGS ("mk", "koi8-r", "windows-1251", "iso-8859-5"),/* Macedonian */ LANG_ENCODINGS ("sr", "koi8-r", "windows-1251", "iso-8859-5"),/* Serbian */ - LANG_ENCODINGS ("uk", "koi8-u", "koi8-r", "windows-1251"), /* Ukranian */ + LANG_ENCODINGS ("uk", "koi8-u", "koi8-r", "windows-1251"), /* Ukrainian */ /* Arabic */ LANG_ENCODINGS ("ar", "iso-8859-6","windows-1256"), @@ -836,7 +836,7 @@ device_supports_ap_ciphers (guint32 dev_caps, /** * nm_utils_ap_mode_security_valid: - * @type: the security type to check device capabilties against, + * @type: the security type to check device capabilities against, * e.g. #NMU_SEC_STATIC_WEP * @wifi_caps: bitfield of the capabilities of the specific Wi-Fi device, e.g. * #NM_WIFI_DEVICE_CAP_CIPHER_WEP40 @@ -872,16 +872,16 @@ nm_utils_ap_mode_security_valid (NMUtilsSecurityType type, /** * nm_utils_security_valid: - * @type: the security type to check AP flags and device capabilties against, + * @type: the security type to check AP flags and device capabilities against, * e.g. #NMU_SEC_STATIC_WEP * @wifi_caps: bitfield of the capabilities of the specific Wi-Fi device, e.g. * #NM_WIFI_DEVICE_CAP_CIPHER_WEP40 * @have_ap: whether the @ap_flags, @ap_wpa, and @ap_rsn arguments are valid * @adhoc: whether the capabilities being tested are from an Ad-Hoc AP (IBSS) * @ap_flags: bitfield of AP capabilities, e.g. #NM_802_11_AP_FLAGS_PRIVACY - * @ap_wpa: bitfield of AP capabilties derived from the AP's WPA beacon, + * @ap_wpa: bitfield of AP capabilities derived from the AP's WPA beacon, * e.g. (#NM_802_11_AP_SEC_PAIR_TKIP | #NM_802_11_AP_SEC_KEY_MGMT_PSK) - * @ap_rsn: bitfield of AP capabilties derived from the AP's RSN/WPA2 beacon, + * @ap_rsn: bitfield of AP capabilities derived from the AP's RSN/WPA2 beacon, * e.g. (#NM_802_11_AP_SEC_PAIR_CCMP | #NM_802_11_AP_SEC_PAIR_TKIP) * * Given a set of device capabilities, and a desired security type to check @@ -891,7 +891,7 @@ nm_utils_ap_mode_security_valid (NMUtilsSecurityType type, * NOTE: this function cannot handle checking security for AP/Hotspot mode; * use nm_utils_ap_mode_security_valid() instead. * - * Returns: %TRUE if the device capabilities and AP capabilties intersect and are + * Returns: %TRUE if the device capabilities and AP capabilities intersect and are * compatible with the desired @type, %FALSE if they are not **/ gboolean @@ -2017,7 +2017,7 @@ _string_append_tc_handle (GString *string, guint32 handle) * or to pretty-format (use symbolic name for root) the key in keyfile. * The presence of prefix determnines which one is the case. * - * Private API due to general uglyness and overall uselessness for anything + * Private API due to general ugliness and overall uselessness for anything * sensible. */ void diff --git a/libnm-core/nm-vpn-editor-plugin.c b/libnm-core/nm-vpn-editor-plugin.c index d690d9b06b..cda79d80c5 100644 --- a/libnm-core/nm-vpn-editor-plugin.c +++ b/libnm-core/nm-vpn-editor-plugin.c @@ -379,8 +379,8 @@ _nm_vpn_editor_plugin_load (const char *plugin_name, * @user_data: user data for @check_file * @error: on failure the error reason. * - * Load the shared libary @plugin_name and create a new - * #NMVpnEditorPlugin instace via the #NMVpnEditorPluginFactory + * Load the shared library @plugin_name and create a new + * #NMVpnEditorPlugin instance via the #NMVpnEditorPluginFactory * function. * * If @plugin_name is not an absolute path name, it assumes the file @@ -419,8 +419,8 @@ nm_vpn_editor_plugin_load_from_file (const char *plugin_name, * the given service. * @error: on failure the error reason. * - * Load the shared libary @plugin_name and create a new - * #NMVpnEditorPlugin instace via the #NMVpnEditorPluginFactory + * Load the shared library @plugin_name and create a new + * #NMVpnEditorPlugin instance via the #NMVpnEditorPluginFactory * function. * * This is similar to nm_vpn_editor_plugin_load_from_file(), but diff --git a/libnm-core/nm-vpn-plugin-info.c b/libnm-core/nm-vpn-plugin-info.c index 7954227963..f8111e3350 100644 --- a/libnm-core/nm-vpn-plugin-info.c +++ b/libnm-core/nm-vpn-plugin-info.c @@ -1341,7 +1341,7 @@ nm_vpn_plugin_info_class_init (NMVpnPluginInfoClass *plugin_class) /** * NMVpnPluginInfo:keyfile: * - * Initalize the instance with a different keyfile instance. + * Initialize the instance with a different keyfile instance. * When passing a keyfile instance, the constructor will not * try to read from filename. * diff --git a/libnm-core/tests/test-keyfile.c b/libnm-core/tests/test-keyfile.c index d941fa22c4..865cb68ccd 100644 --- a/libnm-core/tests/test-keyfile.c +++ b/libnm-core/tests/test-keyfile.c @@ -241,7 +241,7 @@ _keyfile_convert (NMConnection **con, k0_c1_k2 = _nm_keyfile_write (k0_c1, write_handler, write_data); k0_c1_k2_c3 = _nm_keyfile_read (k0_c1_k2, keyfile_name, base_dir, read_handler, read_data, FALSE); - /* It is a expeced behavior, that if @k0 contains a relative path ca-cert, @k0_c1 will + /* It is a expected behavior, that if @k0 contains a relative path ca-cert, @k0_c1 will * contain that path as relative. But @k0_c1_k2 and @k0_c1_k2_c3 will have absolute paths. * In this case, hack up @k0_c1_k2_c3 to contain the same relative path. */ s1 = nm_connection_get_setting_802_1x (k0_c1); @@ -409,7 +409,7 @@ test_8021x_cert (void) g_assert_no_error (error); g_assert (success); - /* test reseting ca-cert to different values and see whether we can write/read. */ + /* test resetting ca-cert to different values and see whether we can write/read. */ nm_connection_add_setting (con, NM_SETTING (s_8021x)); nmtst_assert_connection_verifies_and_normalizable (con); diff --git a/libnm-glib/nm-client.c b/libnm-glib/nm-client.c index 0da7b0f4e5..16fee71414 100644 --- a/libnm-glib/nm-client.c +++ b/libnm-glib/nm-client.c @@ -1840,7 +1840,7 @@ constructed (GObject *object) GError *error = NULL; if (!nm_utils_init (&error)) { - g_warning ("Couldn't initilize nm-utils/crypto system: %s", + g_warning ("Couldn't initialize nm-utils/crypto system: %s", error->message); g_clear_error (&error); } diff --git a/libnm-glib/nm-object.c b/libnm-glib/nm-object.c index e2c96d62b9..967400e739 100644 --- a/libnm-glib/nm-object.c +++ b/libnm-glib/nm-object.c @@ -451,10 +451,10 @@ nm_object_class_init (NMObjectClass *nm_object_class) /** * NMObject::object-creation-failed: * @master_object: the object that received the signal - * @error: the error that occured while creating object + * @error: the error that occurred while creating object * @failed_path: object path of the failed object * - * Indicates that an error occured while creating an #NMObject object + * Indicates that an error occurred while creating an #NMObject object * during property handling of @master_object. * * Note: Be aware that the signal is private for libnm-glib's internal diff --git a/libnm-glib/nm-object.h b/libnm-glib/nm-object.h index 73aa9de541..d37fb683c5 100644 --- a/libnm-glib/nm-object.h +++ b/libnm-glib/nm-object.h @@ -66,7 +66,7 @@ typedef struct { /* Signals */ /* The "object-creation-failed" signal is PRIVATE for libnm-glib and * is not meant for any external usage. It indicates that an error - * occured during creation of an object. + * occurred during creation of an object. */ void (*object_creation_failed) (NMObject *master_object, GError *error, diff --git a/libnm-glib/nm-secret-agent.c b/libnm-glib/nm-secret-agent.c index 16e3199dd0..361af6f8d2 100644 --- a/libnm-glib/nm-secret-agent.c +++ b/libnm-glib/nm-secret-agent.c @@ -703,7 +703,7 @@ auto_register_cb (gpointer user_data) * @callback: (scope async): a callback, to be invoked when the operation is done * @user_data: (closure): caller-specific data to be passed to @callback * - * Asyncronously retrieve secrets belonging to @connection for the + * Asynchronously retrieve secrets belonging to @connection for the * setting @setting_name. @flags indicate specific behavior that the secret * agent should use when performing the request, for example returning only * existing secrets without user interaction, or requesting entirely new @@ -742,7 +742,7 @@ nm_secret_agent_get_secrets (NMSecretAgent *self, * @callback: (scope async): a callback, to be invoked when the operation is done * @user_data: (closure): caller-specific data to be passed to @callback * - * Asyncronously ensure that all secrets inside @connection + * Asynchronously ensure that all secrets inside @connection * are stored to disk. */ void @@ -1031,7 +1031,7 @@ nm_secret_agent_class_init (NMSecretAgentClass *class) /** * NMSecretAgent::registration-result: * @agent: the agent that received the signal - * @error: the error, if any, that occured while registering + * @error: the error, if any, that occurred while registering * * Indicates the result of a registration request; if @error is NULL the * request was successful. diff --git a/libnm-util/nm-connection.h b/libnm-util/nm-connection.h index 6e119c2c0b..9bee219e86 100644 --- a/libnm-util/nm-connection.h +++ b/libnm-util/nm-connection.h @@ -100,7 +100,7 @@ typedef enum /* * NM_CONNECTION_NORMALIZE_PARAM_IP6_CONFIG_METHOD: overwrite the ip6 method - * when normalizing ip6 configuration. If omited, this defaults to + * when normalizing ip6 configuration. If omitted, this defaults to * @NM_SETTING_IP6_CONFIG_METHOD_AUTO. */ #define NM_CONNECTION_NORMALIZE_PARAM_IP6_CONFIG_METHOD "ip6-config-method" diff --git a/libnm-util/nm-param-spec-specialized.c b/libnm-util/nm-param-spec-specialized.c index dfc8ea9874..8581ecc5b0 100644 --- a/libnm-util/nm-param-spec-specialized.c +++ b/libnm-util/nm-param-spec-specialized.c @@ -539,9 +539,9 @@ _gvalues_compare (const GValue *value1, const GValue *value2) if (p1 == p2) ret = 0; /* Exactly the same values */ else if (!p1) - ret = 1; /* The comparision functions below don't handle NULLs */ + ret = 1; /* The comparison functions below don't handle NULLs */ else if (!p2) - ret = -1; /* The comparision functions below don't handle NULLs */ + ret = -1; /* The comparison functions below don't handle NULLs */ else if (type1 == G_TYPE_STRV) ret = _gvalues_compare_strv (value1, value2); else if (dbus_g_type_is_collection (type1)) diff --git a/libnm-util/nm-setting-8021x.c b/libnm-util/nm-setting-8021x.c index ae7a47e664..805a5d25ad 100644 --- a/libnm-util/nm-setting-8021x.c +++ b/libnm-util/nm-setting-8021x.c @@ -435,7 +435,7 @@ get_cert_scheme (GByteArray *array) && !memcmp (array->data, SCHEME_PATH, NM_STRLEN (SCHEME_PATH))) { /* But it must also be NUL terminated, contain at least * one non-NUL character, and contain only one trailing NUL - * chracter. + * character. * And ensure it's UTF-8 valid too so we can pass it through * D-Bus and stuff like that. */ if ( array->len > NM_STRLEN (SCHEME_PATH) + 1 @@ -3723,7 +3723,7 @@ nm_setting_802_1x_class_init (NMSetting8021xClass *setting_class) /* Initialize crypto lbrary. */ if (!nm_utils_init (&error)) { - g_warning ("Couldn't initilize nm-utils/crypto system: %s", + g_warning ("Couldn't initialize nm-utils/crypto system: %s", error->message); g_error_free (error); } diff --git a/libnm-util/nm-setting-connection.c b/libnm-util/nm-setting-connection.c index c7da1aa46c..4750733f2a 100644 --- a/libnm-util/nm-setting-connection.c +++ b/libnm-util/nm-setting-connection.c @@ -294,7 +294,7 @@ nm_setting_connection_get_num_permissions (NMSettingConnection *setting) * @setting: the #NMSettingConnection * @idx: the zero-based index of the permissions entry * @out_ptype: on return, the permission type (at this time, always "user") - * @out_pitem: on return, the permission item (formatted accoring to @ptype, see + * @out_pitem: on return, the permission item (formatted according to @ptype, see * #NMSettingConnection:permissions for more detail * @out_detail: on return, the permission detail (at this time, always %NULL) * @@ -646,7 +646,7 @@ nm_setting_connection_get_secondary (NMSettingConnection *setting, guint32 idx) * @setting: the #NMSettingConnection * @sec_uuid: the secondary connection UUID to add * - * Adds a new secondary connetion UUID to the setting. + * Adds a new secondary connection UUID to the setting. * * Returns: %TRUE if the secondary connection UUID was added; %FALSE if the UUID * was already present diff --git a/libnm-util/nm-setting-wireless-security.c b/libnm-util/nm-setting-wireless-security.c index 00d35a2fe0..33598dfec0 100644 --- a/libnm-util/nm-setting-wireless-security.c +++ b/libnm-util/nm-setting-wireless-security.c @@ -407,7 +407,7 @@ nm_setting_wireless_security_remove_pairwise (NMSettingWirelessSecurity *setting * Removes an encryption algorithm from the allowed pairwise encryption * algorithm list. * - * Returns: %TRUE if the encryption algorith was found and removed; %FALSE if it was not. + * Returns: %TRUE if the encryption algorithm was found and removed; %FALSE if it was not. * * Since: 0.9.10 **/ diff --git a/libnm-util/nm-setting-wireless-security.h b/libnm-util/nm-setting-wireless-security.h index 1140582b56..cbeeb9bfaf 100644 --- a/libnm-util/nm-setting-wireless-security.h +++ b/libnm-util/nm-setting-wireless-security.h @@ -79,9 +79,9 @@ GQuark nm_setting_wireless_security_error_quark (void); * @NM_WEP_KEY_TYPE_LAST: placeholder value for bounds-checking * * The #NMWepKeyType values specify how any WEP keys present in the setting - * are intepreted. There are no standards governing how to hash the various WEP + * are interpreted. There are no standards governing how to hash the various WEP * key/passphrase formats into the actual WEP key. Unfortunately some WEP keys - * can be interpreted in multiple ways, requring the setting to specify how to + * can be interpreted in multiple ways, requiring the setting to specify how to * interpret the any WEP keys. For example, the key "732f2d712e4a394a375d366931" * is both a valid Hexadecimal WEP key and a WEP passphrase. Further, many * ASCII keys are also valid WEP passphrases, but since passphrases and ASCII diff --git a/libnm-util/nm-setting.c b/libnm-util/nm-setting.c index 9147dfe150..dfff2fe52b 100644 --- a/libnm-util/nm-setting.c +++ b/libnm-util/nm-setting.c @@ -674,7 +674,7 @@ should_compare_prop (NMSetting *setting, && g_strcmp0 (prop_name, NM_SETTING_VPN_SECRETS) == 0) { /* FIXME: NMSettingVPN:NM_SETTING_VPN_SECRETS has NM_SETTING_PARAM_SECRET. * nm_setting_get_secret_flags() quite possibly fails, but it might succeed if the - * setting accidently uses a key "secrets". */ + * setting accidentally uses a key "secrets". */ return FALSE; } diff --git a/libnm-util/nm-setting.h b/libnm-util/nm-setting.h index d235efbd4e..d70445a2e7 100644 --- a/libnm-util/nm-setting.h +++ b/libnm-util/nm-setting.h @@ -91,7 +91,7 @@ GQuark nm_setting_error_quark (void); * should be requested from the user each time it is needed * @NM_SETTING_SECRET_FLAG_NOT_REQUIRED: in situations where it cannot be * automatically determined that the secret is required (some VPNs and PPP - * providers dont require all secrets) this flag indicates that the specific + * providers don't require all secrets) this flag indicates that the specific * secret is not required * * These flags indicate specific behavior related to handling of a secret. Each diff --git a/libnm-util/nm-utils.c b/libnm-util/nm-utils.c index 054d69f4c1..e2a4bfb059 100644 --- a/libnm-util/nm-utils.c +++ b/libnm-util/nm-utils.c @@ -103,7 +103,7 @@ static const struct IsoLangToEncodings isoLangEntries2[] = { "bg", {"windows-1251","koi8-r", "iso-8859-5"} }, /* Bulgarian */ { "mk", {"koi8-r", "windows-1251", "iso-8859-5"} }, /* Macedonian */ { "sr", {"koi8-r", "windows-1251", "iso-8859-5"} }, /* Serbian */ - { "uk", {"koi8-u", "koi8-r", "windows-1251"} }, /* Ukranian */ + { "uk", {"koi8-u", "koi8-r", "windows-1251"} }, /* Ukrainian */ /* Arabic */ { "ar", {"iso-8859-6", "windows-1256", NULL} }, @@ -600,7 +600,7 @@ device_supports_ap_ciphers (guint32 dev_caps, /** * nm_utils_ap_mode_security_valid: - * @type: the security type to check device capabilties against, + * @type: the security type to check device capabilities against, * e.g. #NMU_SEC_STATIC_WEP * @wifi_caps: bitfield of the capabilities of the specific Wi-Fi device, e.g. * #NM_WIFI_DEVICE_CAP_CIPHER_WEP40 @@ -638,16 +638,16 @@ nm_utils_ap_mode_security_valid (NMUtilsSecurityType type, /** * nm_utils_security_valid: - * @type: the security type to check AP flags and device capabilties against, + * @type: the security type to check AP flags and device capabilities against, * e.g. #NMU_SEC_STATIC_WEP * @wifi_caps: bitfield of the capabilities of the specific Wi-Fi device, e.g. * #NM_WIFI_DEVICE_CAP_CIPHER_WEP40 * @have_ap: whether the @ap_flags, @ap_wpa, and @ap_rsn arguments are valid * @adhoc: whether the capabilities being tested are from an Ad-Hoc AP (IBSS) * @ap_flags: bitfield of AP capabilities, e.g. #NM_802_11_AP_FLAGS_PRIVACY - * @ap_wpa: bitfield of AP capabilties derived from the AP's WPA beacon, + * @ap_wpa: bitfield of AP capabilities derived from the AP's WPA beacon, * e.g. (#NM_802_11_AP_SEC_PAIR_TKIP | #NM_802_11_AP_SEC_KEY_MGMT_PSK) - * @ap_rsn: bitfield of AP capabilties derived from the AP's RSN/WPA2 beacon, + * @ap_rsn: bitfield of AP capabilities derived from the AP's RSN/WPA2 beacon, * e.g. (#NM_802_11_AP_SEC_PAIR_CCMP | #NM_802_11_AP_SEC_PAIR_TKIP) * * Given a set of device capabilities, and a desired security type to check @@ -657,7 +657,7 @@ nm_utils_ap_mode_security_valid (NMUtilsSecurityType type, * NOTE: this function cannot handle checking security for AP/Hotspot mode; * use nm_utils_ap_mode_security_valid() instead. * - * Returns: %TRUE if the device capabilities and AP capabilties intersect and are + * Returns: %TRUE if the device capabilities and AP capabilities intersect and are * compatible with the desired @type, %FALSE if they are not **/ gboolean diff --git a/libnm-util/tests/test-general.c b/libnm-util/tests/test-general.c index 304797a927..9e097f19aa 100644 --- a/libnm-util/tests/test-general.c +++ b/libnm-util/tests/test-general.c @@ -2314,7 +2314,7 @@ test_connection_verify_sets_interface_name (void) g_assert_cmpstr (nm_connection_get_interface_name (con), ==, NULL); - /* for backward compatiblity, normalizes the interface name */ + /* for backward compatibility, normalizes the interface name */ success = nm_connection_verify (con, &error); g_assert (success && !error); @@ -2373,7 +2373,7 @@ test_connection_normalize_virtual_iface_name (void) g_assert_cmpstr (nm_connection_get_interface_name (con), ==, IFACE_NAME); g_assert_cmpstr (nm_setting_vlan_get_interface_name (s_vlan), ==, IFACE_VIRT); - /* for backward compatiblity, normalizes the interface name */ + /* for backward compatibility, normalizes the interface name */ success = nm_connection_verify (con, &error); g_assert (success && !error); diff --git a/libnm/generate-plugin-docs.pl b/libnm/generate-plugin-docs.pl index e4963b7c50..74e2126c67 100755 --- a/libnm/generate-plugin-docs.pl +++ b/libnm/generate-plugin-docs.pl @@ -60,7 +60,7 @@ open $fo, '>', $output or die "Can't open $output: $!"; # write XML header write_header(); -# write generated documenation for each setting +# write generated documentation for each setting foreach my $c_file (@source_files) { my $setting_name = get_setting_name($c_file); if ($setting_name) { diff --git a/libnm/nm-client.c b/libnm/nm-client.c index 96db30c756..d6187536e0 100644 --- a/libnm/nm-client.c +++ b/libnm/nm-client.c @@ -2470,7 +2470,7 @@ proxy_type (GDBusObjectManagerClient *manager, const char *interface_name, gpointer user_data) { - /* ObjectManager asks us for an object proxy. Unfortunatelly, we can't + /* ObjectManager asks us for an object proxy. Unfortunately, we can't * decide that by interface name and GDBusObjectManager doesn't allow * us to look at the known interface list. Thus we need to create a * generic GDBusObject and only couple a NMObject subclass later. */ diff --git a/libnm/nm-dbus-helpers.c b/libnm/nm-dbus-helpers.c index 33c6819148..44eed0c83c 100644 --- a/libnm/nm-dbus-helpers.c +++ b/libnm/nm-dbus-helpers.c @@ -105,7 +105,7 @@ _nm_dbus_is_connection_private (GDBusConnection *connection) * rule the proxy added and ensure a less granular rule is present instead. * * Also, don't do this immediately since it has a performance penalty. - * Still better than loosing the signals altogether. + * Still better than losing the signals altogether. * * Ideally, we should be able to tell glib not to hook its rules: * https://bugzilla.gnome.org/show_bug.cgi?id=758749 diff --git a/libnm/nm-device-vxlan.c b/libnm/nm-device-vxlan.c index 27b9c981a1..9a87ad137a 100644 --- a/libnm/nm-device-vxlan.c +++ b/libnm/nm-device-vxlan.c @@ -361,7 +361,7 @@ nm_device_vxlan_get_l2miss (NMDeviceVxlan *device) * nm_device_vxlan_get_l3miss: * @device: a #NMDeviceVxlan * - * Returns: wether netlink IP ADDR miss notifications are generated + * Returns: whether netlink IP ADDR miss notifications are generated * * Since: 1.2 **/ diff --git a/libnm/nm-device-wifi.c b/libnm/nm-device-wifi.c index 848e297cca..9fb1eebfba 100644 --- a/libnm/nm-device-wifi.c +++ b/libnm/nm-device-wifi.c @@ -370,7 +370,7 @@ nm_device_wifi_request_scan (NMDeviceWifi *device, * after that for the scan to complete. * This is the same as @nm_device_wifi_request_scan except it accepts @options * for the scanning. The argument is the dictionary passed to RequestScan() - * D-Bus call. Valid otions inside the dictionary are: + * D-Bus call. Valid options inside the dictionary are: * 'ssids' => array of SSIDs (saay) * * Returns: %TRUE on success, %FALSE on error, in which case @error will be @@ -487,7 +487,7 @@ nm_device_wifi_request_scan_async (NMDeviceWifi *device, * that for the scan to complete. * This is the same as @nm_device_wifi_request_scan_async except it accepts @options * for the scanning. The argument is the dictionary passed to RequestScan() - * D-Bus call. Valid otions inside the dictionary are: + * D-Bus call. Valid options inside the dictionary are: * 'ssids' => array of SSIDs (saay) * * Since: 1.2 diff --git a/libnm/nm-device.c b/libnm/nm-device.c index aa45c4ada0..2cab5cb401 100644 --- a/libnm/nm-device.c +++ b/libnm/nm-device.c @@ -2392,7 +2392,7 @@ device_delete_cb (GObject *proxy, * @callback: callback to be called when delete operation completes * @user_data: caller-specific data passed to @callback * - * Asynchronously begins deleteing the software device. Hardware devices can't + * Asynchronously begins deleting the software device. Hardware devices can't * be deleted. **/ void diff --git a/libnm/nm-libnm-utils.c b/libnm/nm-libnm-utils.c index 3621906597..f740c37caf 100644 --- a/libnm/nm-libnm-utils.c +++ b/libnm/nm-libnm-utils.c @@ -125,7 +125,7 @@ next: } if (square_brackets_sensible) { /* If there's a [<string>] that survived the substitution, then the string - * is a short form that is generally preferrable. */ + * is a short form that is generally preferable. */ q = strchr (desc_full, ']'); if (p && q > p) { p++; diff --git a/libnm/nm-object.c b/libnm/nm-object.c index 43bbba7f4c..4fcea8785a 100644 --- a/libnm/nm-object.c +++ b/libnm/nm-object.c @@ -612,7 +612,7 @@ handle_object_property (NMObject *self, const char *property_name, GVariant *val * * NOTE: We've ignored this before and the server hits the condition * more often that it should. Given we're able to recover from - * ther error, let's lower the severity of the log message to + * the error, let's lower the severity of the log message to * avoid unnecessarily bothering the user. This can be removed * once the issue is fixed on the server. */ #if NM_MORE_ASSERTS diff --git a/libnm/nm-object.h b/libnm/nm-object.h index 5b4580ebd7..1cc61a7314 100644 --- a/libnm/nm-object.h +++ b/libnm/nm-object.h @@ -57,7 +57,7 @@ typedef struct { /* The "object-creation-failed" method is PRIVATE for libnm and * is not meant for any external usage. It indicates that an error - * occured during creation of an object. + * occurred during creation of an object. */ void (*object_creation_failed) (NMObject *master_object, const char *failed_path); diff --git a/libnm/nm-vpn-service-plugin.c b/libnm/nm-vpn-service-plugin.c index 2213824edb..56f5dc6b7d 100644 --- a/libnm/nm-vpn-service-plugin.c +++ b/libnm/nm-vpn-service-plugin.c @@ -1325,7 +1325,7 @@ nm_vpn_service_plugin_initable_iface_init (GInitableIface *iface) /*****************************************************************************/ /* this header is intended to be copied to users of nm_vpn_editor_plugin_call(), - * to simplify invocation of generic functions. Include it here, to complile + * to simplify invocation of generic functions. Include it here, to compile * the code. */ #include "nm-utils/nm-vpn-editor-plugin-call.h" diff --git a/src/NetworkManagerUtils.h b/src/NetworkManagerUtils.h index b26d08bdce..26907243f6 100644 --- a/src/NetworkManagerUtils.h +++ b/src/NetworkManagerUtils.h @@ -69,7 +69,7 @@ int nm_match_spec_device_by_pllink (const NMPlatformLink *pllink, * away. It iterates the mainloop for another NM_SHUTDOWN_TIMEOUT_MS_EXTRA. This * should give time to reap the child process (after SIGKILL). * - * So, the maxiumum time we should wait before sending SIGKILL should be at most + * So, the maximum time we should wait before sending SIGKILL should be at most * NM_SHUTDOWN_TIMEOUT_MS. */ #define NM_SHUTDOWN_TIMEOUT_MS 1500 diff --git a/src/devices/nm-device.c b/src/devices/nm-device.c index b211baebe2..8145331b78 100644 --- a/src/devices/nm-device.c +++ b/src/devices/nm-device.c @@ -7452,7 +7452,7 @@ dhcp4_get_client_id (NMDevice *self, if (!client_id) { _LOGD (LOGD_DEVICE | LOGD_DHCP4 | LOGD_IP4, - "ipv4.dhcp-client-id: no explicity client-id configured"); + "ipv4.dhcp-client-id: no explicit client-id configured"); return NULL; } diff --git a/src/dhcp/nm-dhcp-helper.c b/src/dhcp/nm-dhcp-helper.c index 2b48d7a5f0..730eb17362 100644 --- a/src/dhcp/nm-dhcp-helper.c +++ b/src/dhcp/nm-dhcp-helper.c @@ -118,7 +118,7 @@ kill_pid (void) if (pid_str) pid = strtol (pid_str, NULL, 10); if (pid) { - _LOGI ("a fatal error occured, kill dhclient instance with pid %d\n", pid); + _LOGI ("a fatal error occurred, kill dhclient instance with pid %d\n", pid); kill (pid, SIGTERM); } } @@ -190,7 +190,7 @@ do_notify: _LOGW ("failure to call notify: %s (try signal via Event)", error->message); g_clear_error (&error); - /* for backward compatibilty, try to emit the signal. There is no stable + /* for backward compatibility, try to emit the signal. There is no stable * API between the dhcp-helper and NetworkManager. However, while upgrading * the NetworkManager package, a newer helper might want to notify an * older server, which still uses the "Event". */ diff --git a/src/nm-auth-utils.c b/src/nm-auth-utils.c index b41f6efa16..0c4a4bac4d 100644 --- a/src/nm-auth-utils.c +++ b/src/nm-auth-utils.c @@ -139,7 +139,7 @@ nm_auth_chain_get_data (NMAuthChain *self, const char *tag) * @self: A #NMAuthChain. * @tag: A "tag" uniquely identifying the data to steal. * - * Removes the datum assocated with @tag from the chain's data associations, + * Removes the datum associated with @tag from the chain's data associations, * without invoking the association's destroy handler. The caller assumes * ownership over the returned value. * diff --git a/src/nm-config.c b/src/nm-config.c index 102070e951..fb4e6a66b5 100644 --- a/src/nm-config.c +++ b/src/nm-config.c @@ -801,7 +801,7 @@ read_config (GKeyFile *keyfile, gboolean is_base_config, const char *dirname, co new_val = _nm_utils_slist_to_strv (new_specs, FALSE); } - /* merge the string lists, by omiting duplicates. */ + /* merge the string lists, by omitting duplicates. */ for (iter_val = old_val; iter_val && *iter_val; iter_val++) { if ( last_char != '-' @@ -1858,7 +1858,7 @@ state_write (NMConfig *self) &error)) { _LOGD ("state: error writing state file \"%s\": %s", filename, error->message); g_clear_error (&error); - /* we leave the state dirty. That potentally means, that we try to + /* we leave the state dirty. That potentially means, that we try to * write the file over and over again, although it isn't possible. */ priv->state->p.dirty = TRUE; } else diff --git a/src/nm-core-utils.c b/src/nm-core-utils.c index ca8c952671..97866256d8 100644 --- a/src/nm-core-utils.c +++ b/src/nm-core-utils.c @@ -708,7 +708,7 @@ _sleep_duration_convert_ms_to_us (guint32 sleep_duration_msec) * @log_domain: log debug information for this domain. Errors and warnings are logged both * as %LOGD_CORE and @log_domain. * @log_name: name of the process to kill for logging. - * @child_status: (out) (allow-none): return the exit status of the child, if no error occured. + * @child_status: (out) (allow-none): return the exit status of the child, if no error occurred. * @wait_before_kill_msec: Waittime in milliseconds before sending %SIGKILL signal. Set this value * to zero, not to send %SIGKILL. If @sig is already %SIGKILL, this parameter has not effect. * @sleep_duration_msec: the synchronous function sleeps repeatedly waiting for the child to terminate. @@ -717,7 +717,7 @@ _sleep_duration_convert_ms_to_us (guint32 sleep_duration_msec) * Kill a child process synchronously and wait. The function first checks if the child already terminated * and if it did, return the exit status. Otherwise send one @sig signal. @sig will always be * sent unless the child already exited. If the child does not exit within @wait_before_kill_msec milliseconds, - * the function will send %SIGKILL and waits for the child indefinitly. If @wait_before_kill_msec is zero, no + * the function will send %SIGKILL and waits for the child indefinitely. If @wait_before_kill_msec is zero, no * %SIGKILL signal will be sent. * * In case of error, errno is preserved to contain the last reason of failure. @@ -894,7 +894,7 @@ out: * @sleep_duration_msec: the synchronous function sleeps repeatedly waiting for the child to terminate. * Set to zero, to use the default (meaning 20 wakeups per seconds). * @max_wait_msec: if 0, waits indefinitely until the process is gone (or a zombie). Otherwise, this - * is the maxium wait time until returning. If @max_wait_msec is non-zero but smaller then @wait_before_kill_msec, + * is the maximum wait time until returning. If @max_wait_msec is non-zero but smaller then @wait_before_kill_msec, * we will not send a final %SIGKILL. * * Kill a non-child process synchronously and wait. This function will not return before the @@ -2231,7 +2231,7 @@ nm_utils_log_connection_diff (NMConnection *connection, return; } - /* FIXME: it doesn't nicely show the content of NMSettingVpn, becuase nm_connection_diff() does not + /* FIXME: it doesn't nicely show the content of NMSettingVpn, because nm_connection_diff() does not * expand the hash values. */ sorted_hashes = _log_connection_sort_hashes (connection, diff_base, connection_diff); @@ -2610,7 +2610,7 @@ _secret_key_read (guint8 **out_secret_key, } out: - /* regardless of success or failue, we always return a secret-key. The + /* regardless of success or failure, we always return a secret-key. The * caller may choose to ignore the error and proceed. */ *out_key_len = key_len; *out_secret_key = secret_key; @@ -3047,7 +3047,7 @@ nm_utils_stable_id_parse (const char *stable_id, _stable_id_append (str, deviceid); else if (g_str_has_prefix (&stable_id[i], "${RANDOM}")) { /* RANDOM makes not so much sense for cloned-mac-address - * as the result is simmilar to specyifing "cloned-mac-address=random". + * as the result is similar to specyifing "cloned-mac-address=random". * It makes however sense for RFC 7217 Stable Privacy IPv6 addresses * where this is effectively the only way to generate a different * (random) host identifier for each connect. diff --git a/src/nm-dbus-manager.c b/src/nm-dbus-manager.c index 0a421aa9b6..c74b57a484 100644 --- a/src/nm-dbus-manager.c +++ b/src/nm-dbus-manager.c @@ -1182,7 +1182,7 @@ _nm_dbus_manager_obj_notify (NMDBusObject *obj, priv = NM_DBUS_MANAGER_GET_PRIVATE (self); /* do a naive search for the matching NMDBusPropertyInfoExtended infos. Since the number of - * (interaces x properties) is static and possibly small, this naive search is effectively + * (interfaces x properties) is static and possibly small, this naive search is effectively * O(1). We might wanna introduce some index to lookup the properties in question faster. * * The nice part of this implementation is however, that the order in which properties @@ -1518,7 +1518,7 @@ nm_dbus_manager_acquire_bus (NMDBusManager *self) * (3) if we are able to create the connection but registration fails, * it means that something is borked. Quite possibly another NetworkManager * instance is running. We need to exit right away. - * To appease (1) and (3), we cannot initalize synchronously, because we need + * To appease (1) and (3), we cannot initialize synchronously, because we need * to know right away whether another NetworkManager instance is running (3). **/ diff --git a/src/nm-manager.c b/src/nm-manager.c index f8be6d3792..4f55276b3e 100644 --- a/src/nm-manager.c +++ b/src/nm-manager.c @@ -395,7 +395,7 @@ _connection_is_vpn (NMConnection *connection) /* we have an incomplete (invalid) connection at hand. That can only * happen during AddAndActivate. Determine whether it's VPN type based - * on the existance of a [vpn] section. */ + * on the existence of a [vpn] section. */ return !!nm_connection_get_setting_vpn (connection); } @@ -1728,7 +1728,7 @@ find_parent_device_for_connection (NMManager *self, NMConnection *connection, NM if (!parent_connection) return NULL; - /* Check if the parent connection is currently activated or is comaptible + /* Check if the parent connection is currently activated or is compatible * with some known device. */ c_list_for_each_entry (candidate, &priv->devices_lst_head, devices_lst) { @@ -4705,7 +4705,7 @@ nm_manager_activate_connection (NMManager *self, * is only a partial activation. * @connection: the partial #NMConnection to be activated (if @sett_conn is unspecified) * @device_path: the object path of the device to be activated, or NULL - * @out_device: on successful reutrn, the #NMDevice to be activated with @connection + * @out_device: on successful return, the #NMDevice to be activated with @connection * The caller may pass in a device which shortcuts the lookup by path. * In this case, the passed in device must have the matching @device_path * already. @@ -7245,7 +7245,7 @@ set_property (GObject *object, guint prop_id, g_value_get_boolean (value)); break; case PROP_WIMAX_ENABLED: - /* WIMAX is depreacted. This does nothing. */ + /* WIMAX is deprecated. This does nothing. */ break; case PROP_CONNECTIVITY_CHECK_ENABLED: nm_config_set_connectivity_check_enabled (priv->config, diff --git a/src/nm-pacrunner-manager.c b/src/nm-pacrunner-manager.c index af43edbe2e..677e56e393 100644 --- a/src/nm-pacrunner-manager.c +++ b/src/nm-pacrunner-manager.c @@ -271,7 +271,7 @@ pacrunner_send_done (GObject *source, GAsyncResult *res, gpointer user_data) g_variant_get (variant, "(&o)", &path); if (c_list_is_empty (&config->lst)) { - _LOG2D (config, "sent (%s), but destory it right away", path); + _LOG2D (config, "sent (%s), but destroy it right away", path); g_dbus_proxy_call (priv->pacrunner, "DestroyProxyConfiguration", g_variant_new ("(o)", path), diff --git a/src/nm-policy.c b/src/nm-policy.c index 7f8c665c30..5ac40dca53 100644 --- a/src/nm-policy.c +++ b/src/nm-policy.c @@ -1969,7 +1969,7 @@ device_ip_config_changed (NMDevice *device, /* We catch already all the IP events registering on the device state changes but * the ones where the IP changes but the device state keep stable (i.e., activated): * ignore IP config changes but when the device is in activated state. - * Prevents unecessary changes to DNS information. + * Prevents unnecessary changes to DNS information. */ if (nm_device_get_state (device) == NM_DEVICE_STATE_ACTIVATED) { if (old_config != new_config) { diff --git a/src/supplicant/nm-supplicant-config.c b/src/supplicant/nm-supplicant-config.c index 41d510e876..9dc28abe1d 100644 --- a/src/supplicant/nm-supplicant-config.c +++ b/src/supplicant/nm-supplicant-config.c @@ -557,7 +557,7 @@ nm_supplicant_config_add_bgscan (NMSupplicantConfig *self, NM_SETTING_WIRELESS_MODE_ADHOC)) return TRUE; - /* Don't scan when the connection is locked to a specifc AP, since + /* Don't scan when the connection is locked to a specific AP, since * intra-ESS roaming (which requires periodic scanning) isn't being * used due to the specific AP lock. (bgo #513820) */ diff --git a/tools/run-nm-test.sh b/tools/run-nm-test.sh index 29ac7cd365..6b96a139d8 100755 --- a/tools/run-nm-test.sh +++ b/tools/run-nm-test.sh @@ -278,7 +278,7 @@ if [ $RESULT -ne 0 -a $RESULT -ne 77 ]; then UNRESOLVED=$(awk -F: '/obj:\// {print $NF}' "$LOGFILE" | sort | uniq) if [ -n "$UNRESOLVED" ]; then echo Some addresses could not be resolved into symbols. >&2 - echo The errors might get suppressed when you install the debuging symbols. >&2 + echo The errors might get suppressed when you install the debugging symbols. >&2 if [ -x /usr/bin/dnf ]; then echo Hint: dnf debuginfo-install $UNRESOLVED >&2 elif [ -x /usr/bin/debuginfo-install ]; then |