Commit 58510ed5 authored by luz.paz's avatar luz.paz Committed by Thomas Haller

docs: misc. typos pt2

Remainder of typos found using `codespell -q 3 --skip="./shared,./src/systemd,*.po" -I ../NetworkManager-word-whitelist.txt` whereby whitelist consists of:
 ```
ans
busses
cace
cna
conexant
crasher
iff
liftime
creat
nd
sav
technik
uint
```

https://github.com/NetworkManager/NetworkManager/pull/205
parent f985b694
......@@ -69,7 +69,7 @@ This is a new stable release of NetworkManager. Notable changes include:
* nmcli now scans for Wi-Fi networks before displaying them, if the last scan
was too long ago.
* Added the ipv6.dhcp-duid property to allow configuring the DHCPv6 DUID
* Extended ipv6.dhcp-client-id property to support DHCP client identifers
* Extended ipv6.dhcp-client-id property to support DHCP client identifiers
depending on the MAC address and the stable ID.
* Set NM_DISPATCHER_ACTION environment variable in dispatcher scripts.
......@@ -274,7 +274,7 @@ This is a new stable release of NetworkManager. Notable changes include:
into the ifcfg file for improved compatibility with the legacy network service.
* Improve handling of MTU by resetting the previous MTU when the device deactivates
and reset the MTU to a defined value on activation.
* Improve tracking of parent devices for dependend devices like ip-tunnels, MACVLAN,
* Improve tracking of parent devices for dependent devices like ip-tunnels, MACVLAN,
VETH, VLAN, and VXLAN.
* Many bug fixes and improvements
......@@ -576,7 +576,7 @@ This is a new stable release of NetworkManager. Notable changes include:
* NetworkManager no longer requires polkit libraries at runtime when Polkit
support is enabled, and Polkit can be disabled at build time too
* Automatically created connections are now deleted when their device goes away
* 'nmcli dev connect' now attemts to create a connection if none exists
* 'nmcli dev connect' now attempts to create a connection if none exists
* Manually configured static IPv6 configuration is kept even if SLAAC fails
* Manpages for the 'keyfile' and 'ifcfg-rh' plugins now describe their
configuration syntax and available options
......@@ -719,7 +719,7 @@ This is a new stable release of NetworkManager. Notable changes include:
* Better handling of WiFi devices via nl80211 when available (instead of WEXT)
* IP configuration is now non-blocking; waiting for IPv6 RA no longer blocks
the device from activating if IPv4 is ready and vice versa
* Addded support for firewall "zones" via FirewallD
* Added support for firewall "zones" via FirewallD
* Added basic support for bonded interfaces
* WiFi connections are no longer locked to a specific MAC address if they are
"locally administered" addresses (ie, 02:::::)
......@@ -967,13 +967,13 @@ Overview of changes since NetworkManager-0.5.0
* Don't drop the last scanned AP (Dan Williams)
* Broadcast state change when disconnected (Robert Love)
* The Slackware backend now builds (Nico)
* Don't install unsued config files (Dan Williams)
* Don't install unused config files (Dan Williams)
* Add a test for libnm_glib_unregister_callback (Christopher Aillon)
* Requires wireless-tools 28pre9 (Christopher Aillon)
* nm-applet
* Use g_get_host_name () if we've got it (Christopher Aillon)
* Fix an unitialized variable (Robert Love)
* Fix an uninitialized variable (Robert Love)
* Fix sensitivity of VPN items (Robert Love)
......
......@@ -97,7 +97,7 @@ same MAC address, the connection with the most recent timestamp should be
preferred.
Similarly, if the probing/listening process detects 802.1x frames the device
should be marked as requring 802.1x authentication until the carrier drops.
should be marked as requiring 802.1x authentication until the carrier drops.
This would be accomplished by adding a new property to the NMDeviceEthernet
object and exporting that property through the
introspection/nm-device-ethernet.xml file. This would allow clients like
......@@ -231,7 +231,7 @@ proceeds with the connection.
NM sends the correct wpa_supplicant config for WPS to the supplicant, and waits
for the connection to occur. WPS can only be used the *first* time, so after a
first successfull connection, NM must request the actual hexadecimal PSK from
first successful connection, NM must request the actual hexadecimal PSK from
wpa_supplicant via D-Bus, and store that PSK in the connection, clear any WPS
PIN code from the connection, and save the connection to backing storage.
......@@ -283,7 +283,7 @@ connection process.
2) single-device-at-a-time with overlapping connections: this is also probably
the best route to go for desktop use-cases as well. Instead of bringing all
available connections up, only bring up the "best" connection at any given
time based on the current priority list (which is rougly Ethernet > WiFi >
time based on the current priority list (which is roughly Ethernet > WiFi >
3G/Bluetooth). However, to ensure seamless connectivity, when one connection
begins to degrade, the next-best connection should be started before the
current one is terminated, such that there is a small amount of overlap.
......
......@@ -623,7 +623,7 @@ AM_CONDITIONAL(WITH_JSON_VALIDATION, test "${enable_json_validation}" != "no")
# we usually compile with polkit support. --enable-polkit=yes|no only sets the
# default configuration for main.auth-polkit. User can always enable/disable polkit
# autorization via config.
# authorization via config.
AC_ARG_ENABLE(polkit,
AS_HELP_STRING([--enable-polkit=yes|no],
[set default value for auth-polkit configuration option. This value can be overwritten by NM configuration. 'disabled' is an alias for 'no']),
......
......@@ -3,7 +3,7 @@
#set -vx
# Set arguments via environment variables.
# Argument can be omited and defaults will be detected.
# Argument can be omitted and defaults will be detected.
#
# BUILDTYPE=|SRPM
# NM_RPMBUILD_ARGS=<additional argus for rpmbuild>
......@@ -157,7 +157,7 @@ ln "$BUILDLOG" "$TEMPBASE/build.log"
rm -f "$BUILDLOG"
TEMPSPEC="$TEMP/SPECS/NetworkManager.spec"
mkdir -p "$TEMP/SOURCES/" "$TEMP/SPECS/" || die "error creating SPECS directoy"
mkdir -p "$TEMP/SOURCES/" "$TEMP/SPECS/" || die "error creating SPECS directory"
if [[ "$(dirname "$SOURCE")" != "$TEMP/SOURCES" ]]; then
cp "$SOURCE" "$TEMP/SOURCES/" || die "Could not copy source $SOURCE to $TEMP/SOURCES"
......
......@@ -258,7 +258,7 @@
</chapter>
<!--
These are obsolete and intentionally ommitted from the manual since they can't
These are obsolete and intentionally omitted from the manual since they can't
appear on the D-Bus API of the present version of NetworkManager.
Keep them here so that "make check" won't think that they were skipped accidentally .
<xi:include href="dbus-org.freedesktop.NetworkManager.Device.WiMax.xml"/>
......
......@@ -69,7 +69,7 @@
mapping D-Bus signals and properties to GObject signals and properties,
and providing helpful accessor and utility functions. However, unlike
the old libnm-util/libnm-glib API, the mapping to the D-Bus API is not
exact, and various inconveniences and historical anomolies of the D-Bus
exact, and various inconveniences and historical anomalies of the D-Bus
API are papered over.
</para>
<para>
......@@ -295,7 +295,7 @@ print ("NetworkManager version " + client.get_version())]]></programlisting></in
</chapter>
<!--
These don't contain any useful documentaiton. Keep them here,
These don't contain any useful documentation. Keep them here,
so that tools/check-docs.sh knows that we did omit them intentionally.
<xi:include href="xml/nm-core-enum-types.xml"/>
<xi:include href="xml/nm-enum-types.xml"/>
......
......@@ -45,7 +45,7 @@ G_BEGIN_DECLS
/*
* NM_CONNECTION_NORMALIZE_PARAM_IP6_CONFIG_METHOD: overwrite the ip6 method
* when normalizing ip6 configuration. If omited, this defaults to
* when normalizing ip6 configuration. If omitted, this defaults to
* @NM_SETTING_IP6_CONFIG_METHOD_AUTO.
*/
#define NM_CONNECTION_NORMALIZE_PARAM_IP6_CONFIG_METHOD "ip6-config-method"
......@@ -59,7 +59,7 @@ G_BEGIN_DECLS
/**
* NMConnectionInterface:
* @parent: the parent interace struct
* @parent: the parent interface struct
* @secrets_updated: emitted when the connection's secrets are updated
* @secrets_cleared: emitted when the connection's secrets are cleared
* @changed: emitted when any change to the connection's settings occurs
......
......@@ -168,7 +168,7 @@ typedef enum {
* @NM_CONNECTIVITY_PORTAL: The Internet connection is hijacked by a captive
* portal gateway. The graphical shell may open a sandboxed web browser window
* (because the captive portals typically attempt a man-in-the-middle attacks
* agains the https connections) for the purpose of authenticating to a gateway
* against the https connections) for the purpose of authenticating to a gateway
* and retrigger the connectivity check with CheckConnectivity() when the
* browser window is dismissed.
* @NM_CONNECTIVITY_LIMITED: The host is connected to a network, does not appear
......@@ -1004,7 +1004,7 @@ typedef enum { /*< flags >*/
* again (because it's about to be deleted), but a manual activation will
* clear the volatile flag.
* @NM_SETTINGS_UPDATE2_FLAG_BLOCK_AUTOCONNECT: usually, when the connection
* has autoconnect enabled and is modified, it becomes elegible to autoconnect
* has autoconnect enabled and is modified, it becomes eligible to autoconnect
* right away. Setting this flag, disables autoconnect until the connection
* is manually activated.
*
......
......@@ -372,7 +372,7 @@ read_field (char **current, const char **out_err_str, const char *characters, co
* address/plen,gateway,metric (NETWORK via GATEWAY dev DEVICE metric METRIC)
*
* For backward, forward and sideward compatibility, slash (/),
* semicolon (;) and comma (,) are interchangable. The choice of
* semicolon (;) and comma (,) are interchangeable. The choice of
* separator in the above examples is therefore not significant.
*
* Leaving out the prefix length is discouraged and DEPRECATED. The
......@@ -2544,7 +2544,7 @@ read_one_setting_value (NMSetting *setting,
*/
if ( (!pip || !pip->parser_no_check_key)
&& !nm_keyfile_plugin_kf_has_key (keyfile, setting_name, key, &err)) {
/* Key doesn't exist or an error ocurred, thus nothing to do. */
/* Key doesn't exist or an error occurred, thus nothing to do. */
if (err) {
if (!handle_warn (info, key, NM_KEYFILE_WARN_SEVERITY_WARN,
_("error loading setting value: %s"),
......@@ -2902,7 +2902,7 @@ nm_keyfile_read (GKeyFile *keyfile,
nm_connection_add_setting (connection, NM_SETTING (s_con));
}
/* Make sure that we have 'id' even if not explictly specified in the keyfile */
/* Make sure that we have 'id' even if not explicitly specified in the keyfile */
if ( keyfile_name
&& !nm_setting_connection_get_id (s_con)) {
gs_free char *base_name = NULL;
......@@ -2911,7 +2911,7 @@ nm_keyfile_read (GKeyFile *keyfile,
g_object_set (s_con, NM_SETTING_CONNECTION_ID, base_name, NULL);
}
/* Make sure that we have 'uuid' even if not explictly specified in the keyfile */
/* Make sure that we have 'uuid' even if not explicitly specified in the keyfile */
if ( keyfile_name
&& !nm_setting_connection_get_uuid (s_con)) {
gs_free char *hashed_uuid = NULL;
......
......@@ -246,7 +246,7 @@ nm_setting_802_1x_check_cert_scheme (gconstpointer pdata, gsize length, GError *
if (scheme != NM_SETTING_802_1X_CK_SCHEME_BLOB) {
/* An actual URI must be NUL terminated, contain at least
* one non-NUL character, and contain only one trailing NUL
* chracter.
* character.
* And ensure it's UTF-8 valid too so we can pass it through
* D-Bus and stuff like that. */
......
......@@ -312,7 +312,7 @@ nm_setting_connection_get_num_permissions (NMSettingConnection *setting)
* @setting: the #NMSettingConnection
* @idx: the zero-based index of the permissions entry
* @out_ptype: on return, the permission type (at this time, always "user")
* @out_pitem: on return, the permission item (formatted accoring to @ptype, see
* @out_pitem: on return, the permission item (formatted according to @ptype, see
* #NMSettingConnection:permissions for more detail
* @out_detail: on return, the permission detail (at this time, always %NULL)
*
......@@ -748,7 +748,7 @@ nm_setting_connection_get_secondary (NMSettingConnection *setting, guint32 idx)
* @setting: the #NMSettingConnection
* @sec_uuid: the secondary connection UUID to add
*
* Adds a new secondary connetion UUID to the setting.
* Adds a new secondary connection UUID to the setting.
*
* Returns: %TRUE if the secondary connection UUID was added; %FALSE if the UUID
* was already present
......
......@@ -1275,7 +1275,7 @@ nm_setting_dcb_class_init (NMSettingDcbClass *klass)
/* ---ifcfg-rh---
* property: priority-traffic-class
* variable: DCB_PG_UP2TC
* description: Priority values. String of eight trafic class values (0 - 7).
* description: Priority values. String of eight traffic class values (0 - 7).
* example: DCB_PG_UP2TC=01623701
* ---end---
*/
......
......@@ -952,7 +952,7 @@ vfs_to_dbus (NMSetting *setting, const char *property)
/* VLANs are translated into an array of maps, where each map has
* keys 'id', 'qos' and 'proto'. This guarantees enough flexibility
* to accomodate any future new option. */
* to accommodate any future new option. */
vlan_ids = nm_sriov_vf_get_vlan_ids (vf, &num_vlans);
if (num_vlans) {
GVariantBuilder vlans_builder;
......
......@@ -411,7 +411,7 @@ nm_team_link_watcher_get_name (NMTeamLinkWatcher *watcher)
* @watcher: the #NMTeamLinkWatcher
*
* Gets the delay_up interval (in milliseconds) that elapses between the link
* coming up and the runner beeing notified about it.
* coming up and the runner being notified about it.
*
* Since: 1.12
**/
......@@ -430,7 +430,7 @@ nm_team_link_watcher_get_delay_up (NMTeamLinkWatcher *watcher)
* @watcher: the #NMTeamLinkWatcher
*
* Gets the delay_down interval (in milliseconds) that elapses between the link
* going down and the runner beeing notified about it.
* going down and the runner being notified about it.
*
* Since: 1.12
**/
......
......@@ -1215,7 +1215,7 @@ nm_setting_wired_class_init (NMSettingWiredClass *klass)
* a hardware address in ASCII representation, or one of the special values
* "preserve", "permanent", "random" or "stable".
* This field replaces the deprecated "cloned-mac-address" on D-Bus, which
* can only contain explict hardware addresses. Note that this property
* can only contain explicit hardware addresses. Note that this property
* only exists in D-Bus API. libnm and nmcli continue to call this property
* "cloned-mac-address".
* ---end---
......
......@@ -390,7 +390,7 @@ nm_setting_wireless_security_remove_pairwise (NMSettingWirelessSecurity *setting
* Removes an encryption algorithm from the allowed pairwise encryption
* algorithm list.
*
* Returns: %TRUE if the encryption algorith was found and removed; %FALSE if it was not.
* Returns: %TRUE if the encryption algorithm was found and removed; %FALSE if it was not.
**/
gboolean
nm_setting_wireless_security_remove_pairwise_by_value (NMSettingWirelessSecurity *setting,
......
......@@ -54,9 +54,9 @@ G_BEGIN_DECLS
* @NM_WEP_KEY_TYPE_LAST: placeholder value for bounds-checking
*
* The #NMWepKeyType values specify how any WEP keys present in the setting
* are intepreted. There are no standards governing how to hash the various WEP
* are interpreted. There are no standards governing how to hash the various WEP
* key/passphrase formats into the actual WEP key. Unfortunately some WEP keys
* can be interpreted in multiple ways, requring the setting to specify how to
* can be interpreted in multiple ways, requiring the setting to specify how to
* interpret the any WEP keys. For example, the key "732f2d712e4a394a375d366931"
* is both a valid Hexadecimal WEP key and a WEP passphrase. Further, many
* ASCII keys are also valid WEP passphrases, but since passphrases and ASCII
......
......@@ -1461,7 +1461,7 @@ nm_setting_wireless_class_init (NMSettingWirelessClass *klass)
* a hardware address in ASCII representation, or one of the special values
* "preserve", "permanent", "random" or "stable".
* This field replaces the deprecated "cloned-mac-address" on D-Bus, which
* can only contain explict hardware addresses. Note that this property
* can only contain explicit hardware addresses. Note that this property
* only exists in D-Bus API. libnm and nmcli continue to call this property
* "cloned-mac-address".
* ---end---
......
......@@ -49,7 +49,7 @@ G_BEGIN_DECLS
* @NM_SETTING_WIRELESS_WAKE_ON_WLAN_MAGIC: Wake on magic packet
* @NM_SETTING_WIRELESS_WAKE_ON_WLAN_GTK_REKEY_FAILURE: Wake on GTK rekey failure
* @NM_SETTING_WIRELESS_WAKE_ON_WLAN_EAP_IDENTITY_REQUEST: Wake on EAP identity request
* @NM_SETTING_WIRELESS_WAKE_ON_WLAN_4WAY_HANDSHAKE: Wake on 4way hanshake
* @NM_SETTING_WIRELESS_WAKE_ON_WLAN_4WAY_HANDSHAKE: Wake on 4way handshake
* @NM_SETTING_WIRELESS_WAKE_ON_WLAN_RFKILL_RELEASE: Wake on rfkill release
* @NM_SETTING_WIRELESS_WAKE_ON_WLAN_ALL: Wake on all events. This does not
* include the exclusive flags @NM_SETTING_WIRELESS_WAKE_ON_WLAN_DEFAULT or
......
......@@ -1283,7 +1283,7 @@ should_compare_prop (NMSetting *setting,
&& g_strcmp0 (prop_name, NM_SETTING_VPN_SECRETS) == 0) {
/* FIXME: NMSettingVPN:NM_SETTING_VPN_SECRETS has NM_SETTING_PARAM_SECRET.
* nm_setting_get_secret_flags() quite possibly fails, but it might succeed if the
* setting accidently uses a key "secrets". */
* setting accidentally uses a key "secrets". */
return TRUE;
}
......
......@@ -64,7 +64,7 @@ G_BEGIN_DECLS
* should be requested from the user each time it is needed
* @NM_SETTING_SECRET_FLAG_NOT_REQUIRED: in situations where it cannot be
* automatically determined that the secret is required (some VPNs and PPP
* providers dont require all secrets) this flag indicates that the specific
* providers don't require all secrets) this flag indicates that the specific
* secret is not required
*
* These flags indicate specific behavior related to handling of a secret. Each
......
......@@ -112,7 +112,7 @@ static const struct IsoLangToEncodings isoLangEntries2[] =
LANG_ENCODINGS ("bg", "windows-1251","koi8-r", "iso-8859-5"), /* Bulgarian */
LANG_ENCODINGS ("mk", "koi8-r", "windows-1251", "iso-8859-5"),/* Macedonian */
LANG_ENCODINGS ("sr", "koi8-r", "windows-1251", "iso-8859-5"),/* Serbian */
LANG_ENCODINGS ("uk", "koi8-u", "koi8-r", "windows-1251"), /* Ukranian */
LANG_ENCODINGS ("uk", "koi8-u", "koi8-r", "windows-1251"), /* Ukrainian */
/* Arabic */
LANG_ENCODINGS ("ar", "iso-8859-6","windows-1256"),
......@@ -836,7 +836,7 @@ device_supports_ap_ciphers (guint32 dev_caps,
/**
* nm_utils_ap_mode_security_valid:
* @type: the security type to check device capabilties against,
* @type: the security type to check device capabilities against,
* e.g. #NMU_SEC_STATIC_WEP
* @wifi_caps: bitfield of the capabilities of the specific Wi-Fi device, e.g.
* #NM_WIFI_DEVICE_CAP_CIPHER_WEP40
......@@ -872,16 +872,16 @@ nm_utils_ap_mode_security_valid (NMUtilsSecurityType type,
/**
* nm_utils_security_valid:
* @type: the security type to check AP flags and device capabilties against,
* @type: the security type to check AP flags and device capabilities against,
* e.g. #NMU_SEC_STATIC_WEP
* @wifi_caps: bitfield of the capabilities of the specific Wi-Fi device, e.g.
* #NM_WIFI_DEVICE_CAP_CIPHER_WEP40
* @have_ap: whether the @ap_flags, @ap_wpa, and @ap_rsn arguments are valid
* @adhoc: whether the capabilities being tested are from an Ad-Hoc AP (IBSS)
* @ap_flags: bitfield of AP capabilities, e.g. #NM_802_11_AP_FLAGS_PRIVACY
* @ap_wpa: bitfield of AP capabilties derived from the AP's WPA beacon,
* @ap_wpa: bitfield of AP capabilities derived from the AP's WPA beacon,
* e.g. (#NM_802_11_AP_SEC_PAIR_TKIP | #NM_802_11_AP_SEC_KEY_MGMT_PSK)
* @ap_rsn: bitfield of AP capabilties derived from the AP's RSN/WPA2 beacon,
* @ap_rsn: bitfield of AP capabilities derived from the AP's RSN/WPA2 beacon,
* e.g. (#NM_802_11_AP_SEC_PAIR_CCMP | #NM_802_11_AP_SEC_PAIR_TKIP)
*
* Given a set of device capabilities, and a desired security type to check
......@@ -891,7 +891,7 @@ nm_utils_ap_mode_security_valid (NMUtilsSecurityType type,
* NOTE: this function cannot handle checking security for AP/Hotspot mode;
* use nm_utils_ap_mode_security_valid() instead.
*
* Returns: %TRUE if the device capabilities and AP capabilties intersect and are
* Returns: %TRUE if the device capabilities and AP capabilities intersect and are
* compatible with the desired @type, %FALSE if they are not
**/
gboolean
......@@ -2017,7 +2017,7 @@ _string_append_tc_handle (GString *string, guint32 handle)
* or to pretty-format (use symbolic name for root) the key in keyfile.
* The presence of prefix determnines which one is the case.
*
* Private API due to general uglyness and overall uselessness for anything
* Private API due to general ugliness and overall uselessness for anything
* sensible.
*/
void
......
......@@ -379,8 +379,8 @@ _nm_vpn_editor_plugin_load (const char *plugin_name,
* @user_data: user data for @check_file
* @error: on failure the error reason.
*
* Load the shared libary @plugin_name and create a new
* #NMVpnEditorPlugin instace via the #NMVpnEditorPluginFactory
* Load the shared library @plugin_name and create a new
* #NMVpnEditorPlugin instance via the #NMVpnEditorPluginFactory
* function.
*
* If @plugin_name is not an absolute path name, it assumes the file
......@@ -419,8 +419,8 @@ nm_vpn_editor_plugin_load_from_file (const char *plugin_name,
* the given service.
* @error: on failure the error reason.
*
* Load the shared libary @plugin_name and create a new
* #NMVpnEditorPlugin instace via the #NMVpnEditorPluginFactory
* Load the shared library @plugin_name and create a new
* #NMVpnEditorPlugin instance via the #NMVpnEditorPluginFactory
* function.
*
* This is similar to nm_vpn_editor_plugin_load_from_file(), but
......
......@@ -1341,7 +1341,7 @@ nm_vpn_plugin_info_class_init (NMVpnPluginInfoClass *plugin_class)
/**
* NMVpnPluginInfo:keyfile:
*
* Initalize the instance with a different keyfile instance.
* Initialize the instance with a different keyfile instance.
* When passing a keyfile instance, the constructor will not
* try to read from filename.
*
......
......@@ -241,7 +241,7 @@ _keyfile_convert (NMConnection **con,
k0_c1_k2 = _nm_keyfile_write (k0_c1, write_handler, write_data);
k0_c1_k2_c3 = _nm_keyfile_read (k0_c1_k2, keyfile_name, base_dir, read_handler, read_data, FALSE);
/* It is a expeced behavior, that if @k0 contains a relative path ca-cert, @k0_c1 will
/* It is a expected behavior, that if @k0 contains a relative path ca-cert, @k0_c1 will
* contain that path as relative. But @k0_c1_k2 and @k0_c1_k2_c3 will have absolute paths.
* In this case, hack up @k0_c1_k2_c3 to contain the same relative path. */
s1 = nm_connection_get_setting_802_1x (k0_c1);
......@@ -409,7 +409,7 @@ test_8021x_cert (void)
g_assert_no_error (error);
g_assert (success);
/* test reseting ca-cert to different values and see whether we can write/read. */
/* test resetting ca-cert to different values and see whether we can write/read. */
nm_connection_add_setting (con, NM_SETTING (s_8021x));
nmtst_assert_connection_verifies_and_normalizable (con);
......
......@@ -1840,7 +1840,7 @@ constructed (GObject *object)
GError *error = NULL;
if (!nm_utils_init (&error)) {
g_warning ("Couldn't initilize nm-utils/crypto system: %s",
g_warning ("Couldn't initialize nm-utils/crypto system: %s",
error->message);
g_clear_error (&error);
}
......
......@@ -451,10 +451,10 @@ nm_object_class_init (NMObjectClass *nm_object_class)
/**
* NMObject::object-creation-failed:
* @master_object: the object that received the signal
* @error: the error that occured while creating object
* @error: the error that occurred while creating object
* @failed_path: object path of the failed object
*
* Indicates that an error occured while creating an #NMObject object
* Indicates that an error occurred while creating an #NMObject object
* during property handling of @master_object.
*
* Note: Be aware that the signal is private for libnm-glib's internal
......
......@@ -66,7 +66,7 @@ typedef struct {
/* Signals */
/* The "object-creation-failed" signal is PRIVATE for libnm-glib and
* is not meant for any external usage. It indicates that an error
* occured during creation of an object.
* occurred during creation of an object.
*/
void (*object_creation_failed) (NMObject *master_object,
GError *error,
......
......@@ -703,7 +703,7 @@ auto_register_cb (gpointer user_data)
* @callback: (scope async): a callback, to be invoked when the operation is done
* @user_data: (closure): caller-specific data to be passed to @callback
*
* Asyncronously retrieve secrets belonging to @connection for the
* Asynchronously retrieve secrets belonging to @connection for the
* setting @setting_name. @flags indicate specific behavior that the secret
* agent should use when performing the request, for example returning only
* existing secrets without user interaction, or requesting entirely new
......@@ -742,7 +742,7 @@ nm_secret_agent_get_secrets (NMSecretAgent *self,
* @callback: (scope async): a callback, to be invoked when the operation is done
* @user_data: (closure): caller-specific data to be passed to @callback
*
* Asyncronously ensure that all secrets inside @connection
* Asynchronously ensure that all secrets inside @connection
* are stored to disk.
*/
void
......@@ -1031,7 +1031,7 @@ nm_secret_agent_class_init (NMSecretAgentClass *class)
/**
* NMSecretAgent::registration-result:
* @agent: the agent that received the signal
* @error: the error, if any, that occured while registering
* @error: the error, if any, that occurred while registering
*
* Indicates the result of a registration request; if @error is NULL the
* request was successful.
......
......@@ -100,7 +100,7 @@ typedef enum
/*
* NM_CONNECTION_NORMALIZE_PARAM_IP6_CONFIG_METHOD: overwrite the ip6 method
* when normalizing ip6 configuration. If omited, this defaults to
* when normalizing ip6 configuration. If omitted, this defaults to
* @NM_SETTING_IP6_CONFIG_METHOD_AUTO.
*/
#define NM_CONNECTION_NORMALIZE_PARAM_IP6_CONFIG_METHOD "ip6-config-method"
......
......@@ -539,9 +539,9 @@ _gvalues_compare (const GValue *value1, const GValue *value2)
if (p1 == p2)
ret = 0; /* Exactly the same values */
else if (!p1)
ret = 1; /* The comparision functions below don't handle NULLs */
ret = 1; /* The comparison functions below don't handle NULLs */
else if (!p2)
ret = -1; /* The comparision functions below don't handle NULLs */
ret = -1; /* The comparison functions below don't handle NULLs */
else if (type1 == G_TYPE_STRV)
ret = _gvalues_compare_strv (value1, value2);
else if (dbus_g_type_is_collection (type1))
......
......@@ -435,7 +435,7 @@ get_cert_scheme (GByteArray *array)
&& !memcmp (array->data, SCHEME_PATH, NM_STRLEN (SCHEME_PATH))) {
/* But it must also be NUL terminated, contain at least
* one non-NUL character, and contain only one trailing NUL
* chracter.
* character.
* And ensure it's UTF-8 valid too so we can pass it through
* D-Bus and stuff like that. */
if ( array->len > NM_STRLEN (SCHEME_PATH) + 1
......@@ -3723,7 +3723,7 @@ nm_setting_802_1x_class_init (NMSetting8021xClass *setting_class)
/* Initialize crypto lbrary. */
if (!nm_utils_init (&error)) {
g_warning ("Couldn't initilize nm-utils/crypto system: %s",
g_warning ("Couldn't initialize nm-utils/crypto system: %s",
error->message);
g_error_free (error);
}
......
......@@ -294,7 +294,7 @@ nm_setting_connection_get_num_permissions (NMSettingConnection *setting)
* @setting: the #NMSettingConnection
* @idx: the zero-based index of the permissions entry
* @out_ptype: on return, the permission type (at this time, always "user")
* @out_pitem: on return, the permission item (formatted accoring to @ptype, see
* @out_pitem: on return, the permission item (formatted according to @ptype, see
* #NMSettingConnection:permissions for more detail
* @out_detail: on return, the permission detail (at this time, always %NULL)
*
......@@ -646,7 +646,7 @@ nm_setting_connection_get_secondary (NMSettingConnection *setting, guint32 idx)
* @setting: the #NMSettingConnection
* @sec_uuid: the secondary connection UUID to add
*
* Adds a new secondary connetion UUID to the setting.
* Adds a new secondary connection UUID to the setting.
*
* Returns: %TRUE if the secondary connection UUID was added; %FALSE if the UUID
* was already present
......
......@@ -407,7 +407,7 @@ nm_setting_wireless_security_remove_pairwise (NMSettingWirelessSecurity *setting
* Removes an encryption algorithm from the allowed pairwise encryption
* algorithm list.
*
* Returns: %TRUE if the encryption algorith was found and removed; %FALSE if it was not.
* Returns: %TRUE if the encryption algorithm was found and removed; %FALSE if it was not.
*
* Since: 0.9.10
**/
......
......@@ -79,9 +79,9 @@ GQuark nm_setting_wireless_security_error_quark (void);
* @NM_WEP_KEY_TYPE_LAST: placeholder value for bounds-checking
*
* The #NMWepKeyType values specify how any WEP keys present in the setting
* are intepreted. There are no standards governing how to hash the various WEP
* are interpreted. There are no standards governing how to hash the various WEP
* key/passphrase formats into the actual WEP key. Unfortunately some WEP keys
* can be interpreted in multiple ways, requring the setting to specify how to
* can be interpreted in multiple ways, requiring the setting to specify how to
* interpret the any WEP keys. For example, the key "732f2d712e4a394a375d366931"
* is both a valid Hexadecimal WEP key and a WEP passphrase. Further, many
* ASCII keys are also valid WEP passphrases, but since passphrases and ASCII
......
......@@ -674,7 +674,7 @@ should_compare_prop (NMSetting *setting,
&& g_strcmp0 (prop_name, NM_SETTING_VPN_SECRETS) == 0) {
/* FIXME: NMSettingVPN:NM_SETTING_VPN_SECRETS has NM_SETTING_PARAM_SECRET.
* nm_setting_get_secret_flags() quite possibly fails, but it might succeed if the
* setting accidently uses a key "secrets". */
* setting accidentally uses a key "secrets". */
return FALSE;
}
......
......@@ -91,7 +91,7 @@ GQuark nm_setting_error_quark (void);
* should be requested from the user each time it is needed
* @NM_SETTING_SECRET_FLAG_NOT_REQUIRED: in situations where it cannot be
* automatically determined that the secret is required (some VPNs and PPP
* providers dont require all secrets) this flag indicates that the specific
* providers don't require all secrets) this flag indicates that the specific
* secret is not required
*
* These flags indicate specific behavior related to handling of a secret. Each
......
......@@ -103,7 +103,7 @@ static const struct IsoLangToEncodings isoLangEntries2[] =
{ "bg", {"windows-1251","koi8-r", "iso-8859-5"} }, /* Bulgarian */
{ "mk", {"koi8-r", "windows-1251", "iso-8859-5"} }, /* Macedonian */
{ "sr", {"koi8-r", "windows-1251", "iso-8859-5"} }, /* Serbian */
{ "uk", {"koi8-u", "koi8-r", "windows-1251"} }, /* Ukranian */
{ "uk", {"koi8-u", "koi8-r", "windows-1251"} }, /* Ukrainian */
/* Arabic */
{ "ar", {"iso-8859-6", "windows-1256", NULL} },
......@@ -600,7 +600,7 @@ device_supports_ap_ciphers (guint32 dev_caps,
/**
* nm_utils_ap_mode_security_valid:
* @type: the security type to check device capabilties against,
* @type: the security type to check device capabilities against,
* e.g. #NMU_SEC_STATIC_WEP
* @wifi_caps: bitfield of the capabilities of the specific Wi-Fi device, e.g.
* #NM_WIFI_DEVICE_CAP_CIPHER_WEP40
......@@ -638,16 +638,16 @@ nm_utils_ap_mode_security_valid (NMUtilsSecurityType type,
/**
* nm_utils_security_valid:
* @type: the security type to check AP flags and device capabilties against,
* @type: the security type to check AP flags and device capabilities against,
* e.g. #NMU_SEC_STATIC_WEP
* @wifi_caps: bitfield of the capabilities of the specific Wi-Fi device, e.g.
* #NM_WIFI_DEVICE_CAP_CIPHER_WEP40
* @have_ap: whether the @ap_flags, @ap_wpa, and @ap_rsn arguments are valid
* @adhoc: whether the capabilities being tested are from an Ad-Hoc AP (IBSS)
* @ap_flags: bitfield of AP capabilities, e.g. #NM_802_11_AP_FLAGS_PRIVACY
* @ap_wpa: bitfield of AP capabilties derived from the AP's WPA beacon,
* @ap_wpa: bitfield of AP capabilities derived from the AP's WPA beacon,
* e.g. (#NM_802_11_AP_SEC_PAIR_TKIP | #NM_802_11_AP_SEC_KEY_MGMT_PSK)
* @ap_rsn: bitfield of AP capabilties derived from the AP's RSN/WPA2 beacon,
* @ap_rsn: bitfield of AP capabilities derived from the AP's RSN/WPA2 beacon,
* e.g. (#NM_802_11_AP_SEC_PAIR_CCMP | #NM_802_11_AP_SEC_PAIR_TKIP)
*
* Given a set of device capabilities, and a desired security type to check
......@@ -657,7 +657,7 @@ nm_utils_ap_mode_security_valid (NMUtilsSecurityType type,
* NOTE: this function cannot handle checking security for AP/Hotspot mode;
* use nm_utils_ap_mode_security_valid() instead.
*
* Returns: %TRUE if the device capabilities and AP capabilties intersect and are
* Returns: %TRUE if the device capabilities and AP capabilities intersect and are
* compatible with the desired @type, %FALSE if they are not
**/
gboolean
......
......@@ -2314,7 +2314,7 @@ test_connection_verify_sets_interface_name (void)
g_assert_cmpstr (nm_connection_get_interface_name (con), ==, NULL);
/* for backward compatiblity, normalizes the interface name */
/* for backward compatibility, normalizes the interface name */
success = nm_connection_verify (con, &error);
g_assert (success && !error);
......@@ -2373,7 +2373,7 @@ test_connection_normalize_virtual_iface_name (void)
g_assert_cmpstr (nm_connection_get_interface_name (con), ==, IFACE_NAME);
g_assert_cmpstr (nm_setting_vlan_get_interface_name (s_vlan), ==, IFACE_VIRT);
/* for backward compatiblity, normalizes the interface name */
/* for backward compatibility, normalizes the interface name */
success = nm_connection_verify (con, &error);
g_assert (success && !error);
......
......@@ -60,7 +60,7 @@ open $fo, '>', $output or die "Can't open $output: $!";
# write XML header
write_header();
# write generated documenation for each setting
# write generated documentation for each setting
foreach my $c_file (@source_files) {
my $setting_name = get_setting_name($c_file);
if ($setting_name) {
......
......@@ -2470,7 +2470,7 @@ proxy_type (GDBusObjectManagerClient *manager,
const char *interface_name,
gpointer user_data)
{
/* ObjectManager asks us for an object proxy. Unfortunatelly, we can't
/* ObjectManager asks us for an object proxy. Unfortunately, we can't
* decide that by interface name and GDBusObjectManager doesn't allow
* us to look at the known interface list. Thus we need to create a
* generic GDBusObject and only couple a NMObject subclass later. */
......
......@@ -105,7 +105,7 @@ _nm_dbus_is_connection_private (GDBusConnection *connection)
* rule the proxy added and ensure a less granular rule is present instead.
*
* Also, don't do this immediately since it has a performance penalty.
* Still better than loosing the signals altogether.
* Still better than losing the signals altogether.
*
* Ideally, we should be able to tell glib not to hook its rules:
* https://bugzilla.gnome.org/show_bug.cgi?id=758749
......
......@@ -361,7 +361,7 @@ nm_device_vxlan_get_l2miss (NMDeviceVxlan *device)
* nm_device_vxlan_get_l3miss:
* @device: a #NMDeviceVxlan
*
* Returns: wether netlink IP ADDR miss notifications are generated
* Returns: whether netlink IP ADDR miss notifications are generated
*
* Since: 1.2
**/
......
......@@ -370,7 +370,7 @@ nm_device_wifi_request_scan (NMDeviceWifi *device,
* after that for the scan to complete.
* This is the same as @nm_device_wifi_request_scan except it accepts @options
* for the scanning. The argument is the dictionary passed to RequestScan()
* D-Bus call. Valid otions inside the dictionary are:
* D-Bus call. Valid options inside the dictionary are:
* 'ssids' => array of SSIDs (saay)
*
* Returns: %TRUE on success, %FALSE on error, in which case @error will be
......@@ -487,7 +487,7 @@ nm_device_wifi_request_scan_async (NMDeviceWifi *device,
* that for the scan to complete.
* This is the same as @nm_device_wifi_request_scan_async except it accepts @options
* for the scanning. The argument is the dictionary passed to RequestScan()
* D-Bus call. Valid otions inside the dictionary are:
* D-Bus call. Valid options inside the dictionary are:
* 'ssids' => array of SSIDs (saay)
*
* Since: 1.2
......
......@@ -2392,7 +2392,7 @@ device_delete_cb (GObject *proxy,
* @callback: callback to be called when delete operation completes
* @user_data: caller-specific data passed to @callback
*
* Asynchronously begins deleteing the software device. Hardware devices can't
* Asynchronously begins deleting the software device. Hardware devices can't