mirror of
https://gitlab.freedesktop.org/NetworkManager/NetworkManager
synced 2024-10-14 12:05:03 +00:00
docs: misc. typos pt2
Remainder of typos found using `codespell -q 3 --skip="./shared,./src/systemd,*.po" -I ../NetworkManager-word-whitelist.txt` whereby whitelist consists of: ``` ans busses cace cna conexant crasher iff liftime creat nd sav technik uint ``` https://github.com/NetworkManager/NetworkManager/pull/205
This commit is contained in:
parent
f985b6944a
commit
58510ed566
12
NEWS
12
NEWS
|
@ -69,7 +69,7 @@ This is a new stable release of NetworkManager. Notable changes include:
|
|||
* nmcli now scans for Wi-Fi networks before displaying them, if the last scan
|
||||
was too long ago.
|
||||
* Added the ipv6.dhcp-duid property to allow configuring the DHCPv6 DUID
|
||||
* Extended ipv6.dhcp-client-id property to support DHCP client identifers
|
||||
* Extended ipv6.dhcp-client-id property to support DHCP client identifiers
|
||||
depending on the MAC address and the stable ID.
|
||||
* Set NM_DISPATCHER_ACTION environment variable in dispatcher scripts.
|
||||
|
||||
|
@ -274,7 +274,7 @@ This is a new stable release of NetworkManager. Notable changes include:
|
|||
into the ifcfg file for improved compatibility with the legacy network service.
|
||||
* Improve handling of MTU by resetting the previous MTU when the device deactivates
|
||||
and reset the MTU to a defined value on activation.
|
||||
* Improve tracking of parent devices for dependend devices like ip-tunnels, MACVLAN,
|
||||
* Improve tracking of parent devices for dependent devices like ip-tunnels, MACVLAN,
|
||||
VETH, VLAN, and VXLAN.
|
||||
* Many bug fixes and improvements
|
||||
|
||||
|
@ -576,7 +576,7 @@ This is a new stable release of NetworkManager. Notable changes include:
|
|||
* NetworkManager no longer requires polkit libraries at runtime when Polkit
|
||||
support is enabled, and Polkit can be disabled at build time too
|
||||
* Automatically created connections are now deleted when their device goes away
|
||||
* 'nmcli dev connect' now attemts to create a connection if none exists
|
||||
* 'nmcli dev connect' now attempts to create a connection if none exists
|
||||
* Manually configured static IPv6 configuration is kept even if SLAAC fails
|
||||
* Manpages for the 'keyfile' and 'ifcfg-rh' plugins now describe their
|
||||
configuration syntax and available options
|
||||
|
@ -719,7 +719,7 @@ This is a new stable release of NetworkManager. Notable changes include:
|
|||
* Better handling of WiFi devices via nl80211 when available (instead of WEXT)
|
||||
* IP configuration is now non-blocking; waiting for IPv6 RA no longer blocks
|
||||
the device from activating if IPv4 is ready and vice versa
|
||||
* Addded support for firewall "zones" via FirewallD
|
||||
* Added support for firewall "zones" via FirewallD
|
||||
* Added basic support for bonded interfaces
|
||||
* WiFi connections are no longer locked to a specific MAC address if they are
|
||||
"locally administered" addresses (ie, 02:::::)
|
||||
|
@ -967,13 +967,13 @@ Overview of changes since NetworkManager-0.5.0
|
|||
* Don't drop the last scanned AP (Dan Williams)
|
||||
* Broadcast state change when disconnected (Robert Love)
|
||||
* The Slackware backend now builds (Nico)
|
||||
* Don't install unsued config files (Dan Williams)
|
||||
* Don't install unused config files (Dan Williams)
|
||||
* Add a test for libnm_glib_unregister_callback (Christopher Aillon)
|
||||
* Requires wireless-tools 28pre9 (Christopher Aillon)
|
||||
|
||||
* nm-applet
|
||||
* Use g_get_host_name () if we've got it (Christopher Aillon)
|
||||
* Fix an unitialized variable (Robert Love)
|
||||
* Fix an uninitialized variable (Robert Love)
|
||||
* Fix sensitivity of VPN items (Robert Love)
|
||||
|
||||
|
||||
|
|
6
TODO
6
TODO
|
@ -97,7 +97,7 @@ same MAC address, the connection with the most recent timestamp should be
|
|||
preferred.
|
||||
|
||||
Similarly, if the probing/listening process detects 802.1x frames the device
|
||||
should be marked as requring 802.1x authentication until the carrier drops.
|
||||
should be marked as requiring 802.1x authentication until the carrier drops.
|
||||
This would be accomplished by adding a new property to the NMDeviceEthernet
|
||||
object and exporting that property through the
|
||||
introspection/nm-device-ethernet.xml file. This would allow clients like
|
||||
|
@ -231,7 +231,7 @@ proceeds with the connection.
|
|||
|
||||
NM sends the correct wpa_supplicant config for WPS to the supplicant, and waits
|
||||
for the connection to occur. WPS can only be used the *first* time, so after a
|
||||
first successfull connection, NM must request the actual hexadecimal PSK from
|
||||
first successful connection, NM must request the actual hexadecimal PSK from
|
||||
wpa_supplicant via D-Bus, and store that PSK in the connection, clear any WPS
|
||||
PIN code from the connection, and save the connection to backing storage.
|
||||
|
||||
|
@ -283,7 +283,7 @@ connection process.
|
|||
2) single-device-at-a-time with overlapping connections: this is also probably
|
||||
the best route to go for desktop use-cases as well. Instead of bringing all
|
||||
available connections up, only bring up the "best" connection at any given
|
||||
time based on the current priority list (which is rougly Ethernet > WiFi >
|
||||
time based on the current priority list (which is roughly Ethernet > WiFi >
|
||||
3G/Bluetooth). However, to ensure seamless connectivity, when one connection
|
||||
begins to degrade, the next-best connection should be started before the
|
||||
current one is terminated, such that there is a small amount of overlap.
|
||||
|
|
|
@ -623,7 +623,7 @@ AM_CONDITIONAL(WITH_JSON_VALIDATION, test "${enable_json_validation}" != "no")
|
|||
|
||||
# we usually compile with polkit support. --enable-polkit=yes|no only sets the
|
||||
# default configuration for main.auth-polkit. User can always enable/disable polkit
|
||||
# autorization via config.
|
||||
# authorization via config.
|
||||
AC_ARG_ENABLE(polkit,
|
||||
AS_HELP_STRING([--enable-polkit=yes|no],
|
||||
[set default value for auth-polkit configuration option. This value can be overwritten by NM configuration. 'disabled' is an alias for 'no']),
|
||||
|
|
|
@ -3,7 +3,7 @@
|
|||
#set -vx
|
||||
|
||||
# Set arguments via environment variables.
|
||||
# Argument can be omited and defaults will be detected.
|
||||
# Argument can be omitted and defaults will be detected.
|
||||
#
|
||||
# BUILDTYPE=|SRPM
|
||||
# NM_RPMBUILD_ARGS=<additional argus for rpmbuild>
|
||||
|
@ -157,7 +157,7 @@ ln "$BUILDLOG" "$TEMPBASE/build.log"
|
|||
rm -f "$BUILDLOG"
|
||||
|
||||
TEMPSPEC="$TEMP/SPECS/NetworkManager.spec"
|
||||
mkdir -p "$TEMP/SOURCES/" "$TEMP/SPECS/" || die "error creating SPECS directoy"
|
||||
mkdir -p "$TEMP/SOURCES/" "$TEMP/SPECS/" || die "error creating SPECS directory"
|
||||
|
||||
if [[ "$(dirname "$SOURCE")" != "$TEMP/SOURCES" ]]; then
|
||||
cp "$SOURCE" "$TEMP/SOURCES/" || die "Could not copy source $SOURCE to $TEMP/SOURCES"
|
||||
|
|
|
@ -258,7 +258,7 @@
|
|||
</chapter>
|
||||
|
||||
<!--
|
||||
These are obsolete and intentionally ommitted from the manual since they can't
|
||||
These are obsolete and intentionally omitted from the manual since they can't
|
||||
appear on the D-Bus API of the present version of NetworkManager.
|
||||
Keep them here so that "make check" won't think that they were skipped accidentally .
|
||||
<xi:include href="dbus-org.freedesktop.NetworkManager.Device.WiMax.xml"/>
|
||||
|
|
|
@ -69,7 +69,7 @@
|
|||
mapping D-Bus signals and properties to GObject signals and properties,
|
||||
and providing helpful accessor and utility functions. However, unlike
|
||||
the old libnm-util/libnm-glib API, the mapping to the D-Bus API is not
|
||||
exact, and various inconveniences and historical anomolies of the D-Bus
|
||||
exact, and various inconveniences and historical anomalies of the D-Bus
|
||||
API are papered over.
|
||||
</para>
|
||||
<para>
|
||||
|
@ -295,7 +295,7 @@ print ("NetworkManager version " + client.get_version())]]></programlisting></in
|
|||
</chapter>
|
||||
|
||||
<!--
|
||||
These don't contain any useful documentaiton. Keep them here,
|
||||
These don't contain any useful documentation. Keep them here,
|
||||
so that tools/check-docs.sh knows that we did omit them intentionally.
|
||||
<xi:include href="xml/nm-core-enum-types.xml"/>
|
||||
<xi:include href="xml/nm-enum-types.xml"/>
|
||||
|
|
|
@ -45,7 +45,7 @@ G_BEGIN_DECLS
|
|||
|
||||
/*
|
||||
* NM_CONNECTION_NORMALIZE_PARAM_IP6_CONFIG_METHOD: overwrite the ip6 method
|
||||
* when normalizing ip6 configuration. If omited, this defaults to
|
||||
* when normalizing ip6 configuration. If omitted, this defaults to
|
||||
* @NM_SETTING_IP6_CONFIG_METHOD_AUTO.
|
||||
*/
|
||||
#define NM_CONNECTION_NORMALIZE_PARAM_IP6_CONFIG_METHOD "ip6-config-method"
|
||||
|
@ -59,7 +59,7 @@ G_BEGIN_DECLS
|
|||
|
||||
/**
|
||||
* NMConnectionInterface:
|
||||
* @parent: the parent interace struct
|
||||
* @parent: the parent interface struct
|
||||
* @secrets_updated: emitted when the connection's secrets are updated
|
||||
* @secrets_cleared: emitted when the connection's secrets are cleared
|
||||
* @changed: emitted when any change to the connection's settings occurs
|
||||
|
|
|
@ -168,7 +168,7 @@ typedef enum {
|
|||
* @NM_CONNECTIVITY_PORTAL: The Internet connection is hijacked by a captive
|
||||
* portal gateway. The graphical shell may open a sandboxed web browser window
|
||||
* (because the captive portals typically attempt a man-in-the-middle attacks
|
||||
* agains the https connections) for the purpose of authenticating to a gateway
|
||||
* against the https connections) for the purpose of authenticating to a gateway
|
||||
* and retrigger the connectivity check with CheckConnectivity() when the
|
||||
* browser window is dismissed.
|
||||
* @NM_CONNECTIVITY_LIMITED: The host is connected to a network, does not appear
|
||||
|
@ -1004,7 +1004,7 @@ typedef enum { /*< flags >*/
|
|||
* again (because it's about to be deleted), but a manual activation will
|
||||
* clear the volatile flag.
|
||||
* @NM_SETTINGS_UPDATE2_FLAG_BLOCK_AUTOCONNECT: usually, when the connection
|
||||
* has autoconnect enabled and is modified, it becomes elegible to autoconnect
|
||||
* has autoconnect enabled and is modified, it becomes eligible to autoconnect
|
||||
* right away. Setting this flag, disables autoconnect until the connection
|
||||
* is manually activated.
|
||||
*
|
||||
|
|
|
@ -372,7 +372,7 @@ read_field (char **current, const char **out_err_str, const char *characters, co
|
|||
* address/plen,gateway,metric (NETWORK via GATEWAY dev DEVICE metric METRIC)
|
||||
*
|
||||
* For backward, forward and sideward compatibility, slash (/),
|
||||
* semicolon (;) and comma (,) are interchangable. The choice of
|
||||
* semicolon (;) and comma (,) are interchangeable. The choice of
|
||||
* separator in the above examples is therefore not significant.
|
||||
*
|
||||
* Leaving out the prefix length is discouraged and DEPRECATED. The
|
||||
|
@ -2544,7 +2544,7 @@ read_one_setting_value (NMSetting *setting,
|
|||
*/
|
||||
if ( (!pip || !pip->parser_no_check_key)
|
||||
&& !nm_keyfile_plugin_kf_has_key (keyfile, setting_name, key, &err)) {
|
||||
/* Key doesn't exist or an error ocurred, thus nothing to do. */
|
||||
/* Key doesn't exist or an error occurred, thus nothing to do. */
|
||||
if (err) {
|
||||
if (!handle_warn (info, key, NM_KEYFILE_WARN_SEVERITY_WARN,
|
||||
_("error loading setting value: %s"),
|
||||
|
@ -2902,7 +2902,7 @@ nm_keyfile_read (GKeyFile *keyfile,
|
|||
nm_connection_add_setting (connection, NM_SETTING (s_con));
|
||||
}
|
||||
|
||||
/* Make sure that we have 'id' even if not explictly specified in the keyfile */
|
||||
/* Make sure that we have 'id' even if not explicitly specified in the keyfile */
|
||||
if ( keyfile_name
|
||||
&& !nm_setting_connection_get_id (s_con)) {
|
||||
gs_free char *base_name = NULL;
|
||||
|
@ -2911,7 +2911,7 @@ nm_keyfile_read (GKeyFile *keyfile,
|
|||
g_object_set (s_con, NM_SETTING_CONNECTION_ID, base_name, NULL);
|
||||
}
|
||||
|
||||
/* Make sure that we have 'uuid' even if not explictly specified in the keyfile */
|
||||
/* Make sure that we have 'uuid' even if not explicitly specified in the keyfile */
|
||||
if ( keyfile_name
|
||||
&& !nm_setting_connection_get_uuid (s_con)) {
|
||||
gs_free char *hashed_uuid = NULL;
|
||||
|
|
|
@ -246,7 +246,7 @@ nm_setting_802_1x_check_cert_scheme (gconstpointer pdata, gsize length, GError *
|
|||
if (scheme != NM_SETTING_802_1X_CK_SCHEME_BLOB) {
|
||||
/* An actual URI must be NUL terminated, contain at least
|
||||
* one non-NUL character, and contain only one trailing NUL
|
||||
* chracter.
|
||||
* character.
|
||||
* And ensure it's UTF-8 valid too so we can pass it through
|
||||
* D-Bus and stuff like that. */
|
||||
|
||||
|
|
|
@ -312,7 +312,7 @@ nm_setting_connection_get_num_permissions (NMSettingConnection *setting)
|
|||
* @setting: the #NMSettingConnection
|
||||
* @idx: the zero-based index of the permissions entry
|
||||
* @out_ptype: on return, the permission type (at this time, always "user")
|
||||
* @out_pitem: on return, the permission item (formatted accoring to @ptype, see
|
||||
* @out_pitem: on return, the permission item (formatted according to @ptype, see
|
||||
* #NMSettingConnection:permissions for more detail
|
||||
* @out_detail: on return, the permission detail (at this time, always %NULL)
|
||||
*
|
||||
|
@ -748,7 +748,7 @@ nm_setting_connection_get_secondary (NMSettingConnection *setting, guint32 idx)
|
|||
* @setting: the #NMSettingConnection
|
||||
* @sec_uuid: the secondary connection UUID to add
|
||||
*
|
||||
* Adds a new secondary connetion UUID to the setting.
|
||||
* Adds a new secondary connection UUID to the setting.
|
||||
*
|
||||
* Returns: %TRUE if the secondary connection UUID was added; %FALSE if the UUID
|
||||
* was already present
|
||||
|
|
|
@ -1275,7 +1275,7 @@ nm_setting_dcb_class_init (NMSettingDcbClass *klass)
|
|||
/* ---ifcfg-rh---
|
||||
* property: priority-traffic-class
|
||||
* variable: DCB_PG_UP2TC
|
||||
* description: Priority values. String of eight trafic class values (0 - 7).
|
||||
* description: Priority values. String of eight traffic class values (0 - 7).
|
||||
* example: DCB_PG_UP2TC=01623701
|
||||
* ---end---
|
||||
*/
|
||||
|
|
|
@ -952,7 +952,7 @@ vfs_to_dbus (NMSetting *setting, const char *property)
|
|||
|
||||
/* VLANs are translated into an array of maps, where each map has
|
||||
* keys 'id', 'qos' and 'proto'. This guarantees enough flexibility
|
||||
* to accomodate any future new option. */
|
||||
* to accommodate any future new option. */
|
||||
vlan_ids = nm_sriov_vf_get_vlan_ids (vf, &num_vlans);
|
||||
if (num_vlans) {
|
||||
GVariantBuilder vlans_builder;
|
||||
|
|
|
@ -411,7 +411,7 @@ nm_team_link_watcher_get_name (NMTeamLinkWatcher *watcher)
|
|||
* @watcher: the #NMTeamLinkWatcher
|
||||
*
|
||||
* Gets the delay_up interval (in milliseconds) that elapses between the link
|
||||
* coming up and the runner beeing notified about it.
|
||||
* coming up and the runner being notified about it.
|
||||
*
|
||||
* Since: 1.12
|
||||
**/
|
||||
|
@ -430,7 +430,7 @@ nm_team_link_watcher_get_delay_up (NMTeamLinkWatcher *watcher)
|
|||
* @watcher: the #NMTeamLinkWatcher
|
||||
*
|
||||
* Gets the delay_down interval (in milliseconds) that elapses between the link
|
||||
* going down and the runner beeing notified about it.
|
||||
* going down and the runner being notified about it.
|
||||
*
|
||||
* Since: 1.12
|
||||
**/
|
||||
|
|
|
@ -1215,7 +1215,7 @@ nm_setting_wired_class_init (NMSettingWiredClass *klass)
|
|||
* a hardware address in ASCII representation, or one of the special values
|
||||
* "preserve", "permanent", "random" or "stable".
|
||||
* This field replaces the deprecated "cloned-mac-address" on D-Bus, which
|
||||
* can only contain explict hardware addresses. Note that this property
|
||||
* can only contain explicit hardware addresses. Note that this property
|
||||
* only exists in D-Bus API. libnm and nmcli continue to call this property
|
||||
* "cloned-mac-address".
|
||||
* ---end---
|
||||
|
|
|
@ -390,7 +390,7 @@ nm_setting_wireless_security_remove_pairwise (NMSettingWirelessSecurity *setting
|
|||
* Removes an encryption algorithm from the allowed pairwise encryption
|
||||
* algorithm list.
|
||||
*
|
||||
* Returns: %TRUE if the encryption algorith was found and removed; %FALSE if it was not.
|
||||
* Returns: %TRUE if the encryption algorithm was found and removed; %FALSE if it was not.
|
||||
**/
|
||||
gboolean
|
||||
nm_setting_wireless_security_remove_pairwise_by_value (NMSettingWirelessSecurity *setting,
|
||||
|
|
|
@ -54,9 +54,9 @@ G_BEGIN_DECLS
|
|||
* @NM_WEP_KEY_TYPE_LAST: placeholder value for bounds-checking
|
||||
*
|
||||
* The #NMWepKeyType values specify how any WEP keys present in the setting
|
||||
* are intepreted. There are no standards governing how to hash the various WEP
|
||||
* are interpreted. There are no standards governing how to hash the various WEP
|
||||
* key/passphrase formats into the actual WEP key. Unfortunately some WEP keys
|
||||
* can be interpreted in multiple ways, requring the setting to specify how to
|
||||
* can be interpreted in multiple ways, requiring the setting to specify how to
|
||||
* interpret the any WEP keys. For example, the key "732f2d712e4a394a375d366931"
|
||||
* is both a valid Hexadecimal WEP key and a WEP passphrase. Further, many
|
||||
* ASCII keys are also valid WEP passphrases, but since passphrases and ASCII
|
||||
|
|
|
@ -1461,7 +1461,7 @@ nm_setting_wireless_class_init (NMSettingWirelessClass *klass)
|
|||
* a hardware address in ASCII representation, or one of the special values
|
||||
* "preserve", "permanent", "random" or "stable".
|
||||
* This field replaces the deprecated "cloned-mac-address" on D-Bus, which
|
||||
* can only contain explict hardware addresses. Note that this property
|
||||
* can only contain explicit hardware addresses. Note that this property
|
||||
* only exists in D-Bus API. libnm and nmcli continue to call this property
|
||||
* "cloned-mac-address".
|
||||
* ---end---
|
||||
|
|
|
@ -49,7 +49,7 @@ G_BEGIN_DECLS
|
|||
* @NM_SETTING_WIRELESS_WAKE_ON_WLAN_MAGIC: Wake on magic packet
|
||||
* @NM_SETTING_WIRELESS_WAKE_ON_WLAN_GTK_REKEY_FAILURE: Wake on GTK rekey failure
|
||||
* @NM_SETTING_WIRELESS_WAKE_ON_WLAN_EAP_IDENTITY_REQUEST: Wake on EAP identity request
|
||||
* @NM_SETTING_WIRELESS_WAKE_ON_WLAN_4WAY_HANDSHAKE: Wake on 4way hanshake
|
||||
* @NM_SETTING_WIRELESS_WAKE_ON_WLAN_4WAY_HANDSHAKE: Wake on 4way handshake
|
||||
* @NM_SETTING_WIRELESS_WAKE_ON_WLAN_RFKILL_RELEASE: Wake on rfkill release
|
||||
* @NM_SETTING_WIRELESS_WAKE_ON_WLAN_ALL: Wake on all events. This does not
|
||||
* include the exclusive flags @NM_SETTING_WIRELESS_WAKE_ON_WLAN_DEFAULT or
|
||||
|
|
|
@ -1283,7 +1283,7 @@ should_compare_prop (NMSetting *setting,
|
|||
&& g_strcmp0 (prop_name, NM_SETTING_VPN_SECRETS) == 0) {
|
||||
/* FIXME: NMSettingVPN:NM_SETTING_VPN_SECRETS has NM_SETTING_PARAM_SECRET.
|
||||
* nm_setting_get_secret_flags() quite possibly fails, but it might succeed if the
|
||||
* setting accidently uses a key "secrets". */
|
||||
* setting accidentally uses a key "secrets". */
|
||||
return TRUE;
|
||||
}
|
||||
|
||||
|
|
|
@ -64,7 +64,7 @@ G_BEGIN_DECLS
|
|||
* should be requested from the user each time it is needed
|
||||
* @NM_SETTING_SECRET_FLAG_NOT_REQUIRED: in situations where it cannot be
|
||||
* automatically determined that the secret is required (some VPNs and PPP
|
||||
* providers dont require all secrets) this flag indicates that the specific
|
||||
* providers don't require all secrets) this flag indicates that the specific
|
||||
* secret is not required
|
||||
*
|
||||
* These flags indicate specific behavior related to handling of a secret. Each
|
||||
|
|
|
@ -112,7 +112,7 @@ static const struct IsoLangToEncodings isoLangEntries2[] =
|
|||
LANG_ENCODINGS ("bg", "windows-1251","koi8-r", "iso-8859-5"), /* Bulgarian */
|
||||
LANG_ENCODINGS ("mk", "koi8-r", "windows-1251", "iso-8859-5"),/* Macedonian */
|
||||
LANG_ENCODINGS ("sr", "koi8-r", "windows-1251", "iso-8859-5"),/* Serbian */
|
||||
LANG_ENCODINGS ("uk", "koi8-u", "koi8-r", "windows-1251"), /* Ukranian */
|
||||
LANG_ENCODINGS ("uk", "koi8-u", "koi8-r", "windows-1251"), /* Ukrainian */
|
||||
|
||||
/* Arabic */
|
||||
LANG_ENCODINGS ("ar", "iso-8859-6","windows-1256"),
|
||||
|
@ -836,7 +836,7 @@ device_supports_ap_ciphers (guint32 dev_caps,
|
|||
|
||||
/**
|
||||
* nm_utils_ap_mode_security_valid:
|
||||
* @type: the security type to check device capabilties against,
|
||||
* @type: the security type to check device capabilities against,
|
||||
* e.g. #NMU_SEC_STATIC_WEP
|
||||
* @wifi_caps: bitfield of the capabilities of the specific Wi-Fi device, e.g.
|
||||
* #NM_WIFI_DEVICE_CAP_CIPHER_WEP40
|
||||
|
@ -872,16 +872,16 @@ nm_utils_ap_mode_security_valid (NMUtilsSecurityType type,
|
|||
|
||||
/**
|
||||
* nm_utils_security_valid:
|
||||
* @type: the security type to check AP flags and device capabilties against,
|
||||
* @type: the security type to check AP flags and device capabilities against,
|
||||
* e.g. #NMU_SEC_STATIC_WEP
|
||||
* @wifi_caps: bitfield of the capabilities of the specific Wi-Fi device, e.g.
|
||||
* #NM_WIFI_DEVICE_CAP_CIPHER_WEP40
|
||||
* @have_ap: whether the @ap_flags, @ap_wpa, and @ap_rsn arguments are valid
|
||||
* @adhoc: whether the capabilities being tested are from an Ad-Hoc AP (IBSS)
|
||||
* @ap_flags: bitfield of AP capabilities, e.g. #NM_802_11_AP_FLAGS_PRIVACY
|
||||
* @ap_wpa: bitfield of AP capabilties derived from the AP's WPA beacon,
|
||||
* @ap_wpa: bitfield of AP capabilities derived from the AP's WPA beacon,
|
||||
* e.g. (#NM_802_11_AP_SEC_PAIR_TKIP | #NM_802_11_AP_SEC_KEY_MGMT_PSK)
|
||||
* @ap_rsn: bitfield of AP capabilties derived from the AP's RSN/WPA2 beacon,
|
||||
* @ap_rsn: bitfield of AP capabilities derived from the AP's RSN/WPA2 beacon,
|
||||
* e.g. (#NM_802_11_AP_SEC_PAIR_CCMP | #NM_802_11_AP_SEC_PAIR_TKIP)
|
||||
*
|
||||
* Given a set of device capabilities, and a desired security type to check
|
||||
|
@ -891,7 +891,7 @@ nm_utils_ap_mode_security_valid (NMUtilsSecurityType type,
|
|||
* NOTE: this function cannot handle checking security for AP/Hotspot mode;
|
||||
* use nm_utils_ap_mode_security_valid() instead.
|
||||
*
|
||||
* Returns: %TRUE if the device capabilities and AP capabilties intersect and are
|
||||
* Returns: %TRUE if the device capabilities and AP capabilities intersect and are
|
||||
* compatible with the desired @type, %FALSE if they are not
|
||||
**/
|
||||
gboolean
|
||||
|
@ -2017,7 +2017,7 @@ _string_append_tc_handle (GString *string, guint32 handle)
|
|||
* or to pretty-format (use symbolic name for root) the key in keyfile.
|
||||
* The presence of prefix determnines which one is the case.
|
||||
*
|
||||
* Private API due to general uglyness and overall uselessness for anything
|
||||
* Private API due to general ugliness and overall uselessness for anything
|
||||
* sensible.
|
||||
*/
|
||||
void
|
||||
|
|
|
@ -379,8 +379,8 @@ _nm_vpn_editor_plugin_load (const char *plugin_name,
|
|||
* @user_data: user data for @check_file
|
||||
* @error: on failure the error reason.
|
||||
*
|
||||
* Load the shared libary @plugin_name and create a new
|
||||
* #NMVpnEditorPlugin instace via the #NMVpnEditorPluginFactory
|
||||
* Load the shared library @plugin_name and create a new
|
||||
* #NMVpnEditorPlugin instance via the #NMVpnEditorPluginFactory
|
||||
* function.
|
||||
*
|
||||
* If @plugin_name is not an absolute path name, it assumes the file
|
||||
|
@ -419,8 +419,8 @@ nm_vpn_editor_plugin_load_from_file (const char *plugin_name,
|
|||
* the given service.
|
||||
* @error: on failure the error reason.
|
||||
*
|
||||
* Load the shared libary @plugin_name and create a new
|
||||
* #NMVpnEditorPlugin instace via the #NMVpnEditorPluginFactory
|
||||
* Load the shared library @plugin_name and create a new
|
||||
* #NMVpnEditorPlugin instance via the #NMVpnEditorPluginFactory
|
||||
* function.
|
||||
*
|
||||
* This is similar to nm_vpn_editor_plugin_load_from_file(), but
|
||||
|
|
|
@ -1341,7 +1341,7 @@ nm_vpn_plugin_info_class_init (NMVpnPluginInfoClass *plugin_class)
|
|||
/**
|
||||
* NMVpnPluginInfo:keyfile:
|
||||
*
|
||||
* Initalize the instance with a different keyfile instance.
|
||||
* Initialize the instance with a different keyfile instance.
|
||||
* When passing a keyfile instance, the constructor will not
|
||||
* try to read from filename.
|
||||
*
|
||||
|
|
|
@ -241,7 +241,7 @@ _keyfile_convert (NMConnection **con,
|
|||
k0_c1_k2 = _nm_keyfile_write (k0_c1, write_handler, write_data);
|
||||
k0_c1_k2_c3 = _nm_keyfile_read (k0_c1_k2, keyfile_name, base_dir, read_handler, read_data, FALSE);
|
||||
|
||||
/* It is a expeced behavior, that if @k0 contains a relative path ca-cert, @k0_c1 will
|
||||
/* It is a expected behavior, that if @k0 contains a relative path ca-cert, @k0_c1 will
|
||||
* contain that path as relative. But @k0_c1_k2 and @k0_c1_k2_c3 will have absolute paths.
|
||||
* In this case, hack up @k0_c1_k2_c3 to contain the same relative path. */
|
||||
s1 = nm_connection_get_setting_802_1x (k0_c1);
|
||||
|
@ -409,7 +409,7 @@ test_8021x_cert (void)
|
|||
g_assert_no_error (error);
|
||||
g_assert (success);
|
||||
|
||||
/* test reseting ca-cert to different values and see whether we can write/read. */
|
||||
/* test resetting ca-cert to different values and see whether we can write/read. */
|
||||
|
||||
nm_connection_add_setting (con, NM_SETTING (s_8021x));
|
||||
nmtst_assert_connection_verifies_and_normalizable (con);
|
||||
|
|
|
@ -1840,7 +1840,7 @@ constructed (GObject *object)
|
|||
GError *error = NULL;
|
||||
|
||||
if (!nm_utils_init (&error)) {
|
||||
g_warning ("Couldn't initilize nm-utils/crypto system: %s",
|
||||
g_warning ("Couldn't initialize nm-utils/crypto system: %s",
|
||||
error->message);
|
||||
g_clear_error (&error);
|
||||
}
|
||||
|
|
|
@ -451,10 +451,10 @@ nm_object_class_init (NMObjectClass *nm_object_class)
|
|||
/**
|
||||
* NMObject::object-creation-failed:
|
||||
* @master_object: the object that received the signal
|
||||
* @error: the error that occured while creating object
|
||||
* @error: the error that occurred while creating object
|
||||
* @failed_path: object path of the failed object
|
||||
*
|
||||
* Indicates that an error occured while creating an #NMObject object
|
||||
* Indicates that an error occurred while creating an #NMObject object
|
||||
* during property handling of @master_object.
|
||||
*
|
||||
* Note: Be aware that the signal is private for libnm-glib's internal
|
||||
|
|
|
@ -66,7 +66,7 @@ typedef struct {
|
|||
/* Signals */
|
||||
/* The "object-creation-failed" signal is PRIVATE for libnm-glib and
|
||||
* is not meant for any external usage. It indicates that an error
|
||||
* occured during creation of an object.
|
||||
* occurred during creation of an object.
|
||||
*/
|
||||
void (*object_creation_failed) (NMObject *master_object,
|
||||
GError *error,
|
||||
|
|
|
@ -703,7 +703,7 @@ auto_register_cb (gpointer user_data)
|
|||
* @callback: (scope async): a callback, to be invoked when the operation is done
|
||||
* @user_data: (closure): caller-specific data to be passed to @callback
|
||||
*
|
||||
* Asyncronously retrieve secrets belonging to @connection for the
|
||||
* Asynchronously retrieve secrets belonging to @connection for the
|
||||
* setting @setting_name. @flags indicate specific behavior that the secret
|
||||
* agent should use when performing the request, for example returning only
|
||||
* existing secrets without user interaction, or requesting entirely new
|
||||
|
@ -742,7 +742,7 @@ nm_secret_agent_get_secrets (NMSecretAgent *self,
|
|||
* @callback: (scope async): a callback, to be invoked when the operation is done
|
||||
* @user_data: (closure): caller-specific data to be passed to @callback
|
||||
*
|
||||
* Asyncronously ensure that all secrets inside @connection
|
||||
* Asynchronously ensure that all secrets inside @connection
|
||||
* are stored to disk.
|
||||
*/
|
||||
void
|
||||
|
@ -1031,7 +1031,7 @@ nm_secret_agent_class_init (NMSecretAgentClass *class)
|
|||
/**
|
||||
* NMSecretAgent::registration-result:
|
||||
* @agent: the agent that received the signal
|
||||
* @error: the error, if any, that occured while registering
|
||||
* @error: the error, if any, that occurred while registering
|
||||
*
|
||||
* Indicates the result of a registration request; if @error is NULL the
|
||||
* request was successful.
|
||||
|
|
|
@ -100,7 +100,7 @@ typedef enum
|
|||
|
||||
/*
|
||||
* NM_CONNECTION_NORMALIZE_PARAM_IP6_CONFIG_METHOD: overwrite the ip6 method
|
||||
* when normalizing ip6 configuration. If omited, this defaults to
|
||||
* when normalizing ip6 configuration. If omitted, this defaults to
|
||||
* @NM_SETTING_IP6_CONFIG_METHOD_AUTO.
|
||||
*/
|
||||
#define NM_CONNECTION_NORMALIZE_PARAM_IP6_CONFIG_METHOD "ip6-config-method"
|
||||
|
|
|
@ -539,9 +539,9 @@ _gvalues_compare (const GValue *value1, const GValue *value2)
|
|||
if (p1 == p2)
|
||||
ret = 0; /* Exactly the same values */
|
||||
else if (!p1)
|
||||
ret = 1; /* The comparision functions below don't handle NULLs */
|
||||
ret = 1; /* The comparison functions below don't handle NULLs */
|
||||
else if (!p2)
|
||||
ret = -1; /* The comparision functions below don't handle NULLs */
|
||||
ret = -1; /* The comparison functions below don't handle NULLs */
|
||||
else if (type1 == G_TYPE_STRV)
|
||||
ret = _gvalues_compare_strv (value1, value2);
|
||||
else if (dbus_g_type_is_collection (type1))
|
||||
|
|
|
@ -435,7 +435,7 @@ get_cert_scheme (GByteArray *array)
|
|||
&& !memcmp (array->data, SCHEME_PATH, NM_STRLEN (SCHEME_PATH))) {
|
||||
/* But it must also be NUL terminated, contain at least
|
||||
* one non-NUL character, and contain only one trailing NUL
|
||||
* chracter.
|
||||
* character.
|
||||
* And ensure it's UTF-8 valid too so we can pass it through
|
||||
* D-Bus and stuff like that. */
|
||||
if ( array->len > NM_STRLEN (SCHEME_PATH) + 1
|
||||
|
@ -3723,7 +3723,7 @@ nm_setting_802_1x_class_init (NMSetting8021xClass *setting_class)
|
|||
|
||||
/* Initialize crypto lbrary. */
|
||||
if (!nm_utils_init (&error)) {
|
||||
g_warning ("Couldn't initilize nm-utils/crypto system: %s",
|
||||
g_warning ("Couldn't initialize nm-utils/crypto system: %s",
|
||||
error->message);
|
||||
g_error_free (error);
|
||||
}
|
||||
|
|
|
@ -294,7 +294,7 @@ nm_setting_connection_get_num_permissions (NMSettingConnection *setting)
|
|||
* @setting: the #NMSettingConnection
|
||||
* @idx: the zero-based index of the permissions entry
|
||||
* @out_ptype: on return, the permission type (at this time, always "user")
|
||||
* @out_pitem: on return, the permission item (formatted accoring to @ptype, see
|
||||
* @out_pitem: on return, the permission item (formatted according to @ptype, see
|
||||
* #NMSettingConnection:permissions for more detail
|
||||
* @out_detail: on return, the permission detail (at this time, always %NULL)
|
||||
*
|
||||
|
@ -646,7 +646,7 @@ nm_setting_connection_get_secondary (NMSettingConnection *setting, guint32 idx)
|
|||
* @setting: the #NMSettingConnection
|
||||
* @sec_uuid: the secondary connection UUID to add
|
||||
*
|
||||
* Adds a new secondary connetion UUID to the setting.
|
||||
* Adds a new secondary connection UUID to the setting.
|
||||
*
|
||||
* Returns: %TRUE if the secondary connection UUID was added; %FALSE if the UUID
|
||||
* was already present
|
||||
|
|
|
@ -407,7 +407,7 @@ nm_setting_wireless_security_remove_pairwise (NMSettingWirelessSecurity *setting
|
|||
* Removes an encryption algorithm from the allowed pairwise encryption
|
||||
* algorithm list.
|
||||
*
|
||||
* Returns: %TRUE if the encryption algorith was found and removed; %FALSE if it was not.
|
||||
* Returns: %TRUE if the encryption algorithm was found and removed; %FALSE if it was not.
|
||||
*
|
||||
* Since: 0.9.10
|
||||
**/
|
||||
|
|
|
@ -79,9 +79,9 @@ GQuark nm_setting_wireless_security_error_quark (void);
|
|||
* @NM_WEP_KEY_TYPE_LAST: placeholder value for bounds-checking
|
||||
*
|
||||
* The #NMWepKeyType values specify how any WEP keys present in the setting
|
||||
* are intepreted. There are no standards governing how to hash the various WEP
|
||||
* are interpreted. There are no standards governing how to hash the various WEP
|
||||
* key/passphrase formats into the actual WEP key. Unfortunately some WEP keys
|
||||
* can be interpreted in multiple ways, requring the setting to specify how to
|
||||
* can be interpreted in multiple ways, requiring the setting to specify how to
|
||||
* interpret the any WEP keys. For example, the key "732f2d712e4a394a375d366931"
|
||||
* is both a valid Hexadecimal WEP key and a WEP passphrase. Further, many
|
||||
* ASCII keys are also valid WEP passphrases, but since passphrases and ASCII
|
||||
|
|
|
@ -674,7 +674,7 @@ should_compare_prop (NMSetting *setting,
|
|||
&& g_strcmp0 (prop_name, NM_SETTING_VPN_SECRETS) == 0) {
|
||||
/* FIXME: NMSettingVPN:NM_SETTING_VPN_SECRETS has NM_SETTING_PARAM_SECRET.
|
||||
* nm_setting_get_secret_flags() quite possibly fails, but it might succeed if the
|
||||
* setting accidently uses a key "secrets". */
|
||||
* setting accidentally uses a key "secrets". */
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
|
|
|
@ -91,7 +91,7 @@ GQuark nm_setting_error_quark (void);
|
|||
* should be requested from the user each time it is needed
|
||||
* @NM_SETTING_SECRET_FLAG_NOT_REQUIRED: in situations where it cannot be
|
||||
* automatically determined that the secret is required (some VPNs and PPP
|
||||
* providers dont require all secrets) this flag indicates that the specific
|
||||
* providers don't require all secrets) this flag indicates that the specific
|
||||
* secret is not required
|
||||
*
|
||||
* These flags indicate specific behavior related to handling of a secret. Each
|
||||
|
|
|
@ -103,7 +103,7 @@ static const struct IsoLangToEncodings isoLangEntries2[] =
|
|||
{ "bg", {"windows-1251","koi8-r", "iso-8859-5"} }, /* Bulgarian */
|
||||
{ "mk", {"koi8-r", "windows-1251", "iso-8859-5"} }, /* Macedonian */
|
||||
{ "sr", {"koi8-r", "windows-1251", "iso-8859-5"} }, /* Serbian */
|
||||
{ "uk", {"koi8-u", "koi8-r", "windows-1251"} }, /* Ukranian */
|
||||
{ "uk", {"koi8-u", "koi8-r", "windows-1251"} }, /* Ukrainian */
|
||||
|
||||
/* Arabic */
|
||||
{ "ar", {"iso-8859-6", "windows-1256", NULL} },
|
||||
|
@ -600,7 +600,7 @@ device_supports_ap_ciphers (guint32 dev_caps,
|
|||
|
||||
/**
|
||||
* nm_utils_ap_mode_security_valid:
|
||||
* @type: the security type to check device capabilties against,
|
||||
* @type: the security type to check device capabilities against,
|
||||
* e.g. #NMU_SEC_STATIC_WEP
|
||||
* @wifi_caps: bitfield of the capabilities of the specific Wi-Fi device, e.g.
|
||||
* #NM_WIFI_DEVICE_CAP_CIPHER_WEP40
|
||||
|
@ -638,16 +638,16 @@ nm_utils_ap_mode_security_valid (NMUtilsSecurityType type,
|
|||
|
||||
/**
|
||||
* nm_utils_security_valid:
|
||||
* @type: the security type to check AP flags and device capabilties against,
|
||||
* @type: the security type to check AP flags and device capabilities against,
|
||||
* e.g. #NMU_SEC_STATIC_WEP
|
||||
* @wifi_caps: bitfield of the capabilities of the specific Wi-Fi device, e.g.
|
||||
* #NM_WIFI_DEVICE_CAP_CIPHER_WEP40
|
||||
* @have_ap: whether the @ap_flags, @ap_wpa, and @ap_rsn arguments are valid
|
||||
* @adhoc: whether the capabilities being tested are from an Ad-Hoc AP (IBSS)
|
||||
* @ap_flags: bitfield of AP capabilities, e.g. #NM_802_11_AP_FLAGS_PRIVACY
|
||||
* @ap_wpa: bitfield of AP capabilties derived from the AP's WPA beacon,
|
||||
* @ap_wpa: bitfield of AP capabilities derived from the AP's WPA beacon,
|
||||
* e.g. (#NM_802_11_AP_SEC_PAIR_TKIP | #NM_802_11_AP_SEC_KEY_MGMT_PSK)
|
||||
* @ap_rsn: bitfield of AP capabilties derived from the AP's RSN/WPA2 beacon,
|
||||
* @ap_rsn: bitfield of AP capabilities derived from the AP's RSN/WPA2 beacon,
|
||||
* e.g. (#NM_802_11_AP_SEC_PAIR_CCMP | #NM_802_11_AP_SEC_PAIR_TKIP)
|
||||
*
|
||||
* Given a set of device capabilities, and a desired security type to check
|
||||
|
@ -657,7 +657,7 @@ nm_utils_ap_mode_security_valid (NMUtilsSecurityType type,
|
|||
* NOTE: this function cannot handle checking security for AP/Hotspot mode;
|
||||
* use nm_utils_ap_mode_security_valid() instead.
|
||||
*
|
||||
* Returns: %TRUE if the device capabilities and AP capabilties intersect and are
|
||||
* Returns: %TRUE if the device capabilities and AP capabilities intersect and are
|
||||
* compatible with the desired @type, %FALSE if they are not
|
||||
**/
|
||||
gboolean
|
||||
|
|
|
@ -2314,7 +2314,7 @@ test_connection_verify_sets_interface_name (void)
|
|||
|
||||
g_assert_cmpstr (nm_connection_get_interface_name (con), ==, NULL);
|
||||
|
||||
/* for backward compatiblity, normalizes the interface name */
|
||||
/* for backward compatibility, normalizes the interface name */
|
||||
success = nm_connection_verify (con, &error);
|
||||
g_assert (success && !error);
|
||||
|
||||
|
@ -2373,7 +2373,7 @@ test_connection_normalize_virtual_iface_name (void)
|
|||
g_assert_cmpstr (nm_connection_get_interface_name (con), ==, IFACE_NAME);
|
||||
g_assert_cmpstr (nm_setting_vlan_get_interface_name (s_vlan), ==, IFACE_VIRT);
|
||||
|
||||
/* for backward compatiblity, normalizes the interface name */
|
||||
/* for backward compatibility, normalizes the interface name */
|
||||
success = nm_connection_verify (con, &error);
|
||||
g_assert (success && !error);
|
||||
|
||||
|
|
|
@ -60,7 +60,7 @@ open $fo, '>', $output or die "Can't open $output: $!";
|
|||
# write XML header
|
||||
write_header();
|
||||
|
||||
# write generated documenation for each setting
|
||||
# write generated documentation for each setting
|
||||
foreach my $c_file (@source_files) {
|
||||
my $setting_name = get_setting_name($c_file);
|
||||
if ($setting_name) {
|
||||
|
|
|
@ -2470,7 +2470,7 @@ proxy_type (GDBusObjectManagerClient *manager,
|
|||
const char *interface_name,
|
||||
gpointer user_data)
|
||||
{
|
||||
/* ObjectManager asks us for an object proxy. Unfortunatelly, we can't
|
||||
/* ObjectManager asks us for an object proxy. Unfortunately, we can't
|
||||
* decide that by interface name and GDBusObjectManager doesn't allow
|
||||
* us to look at the known interface list. Thus we need to create a
|
||||
* generic GDBusObject and only couple a NMObject subclass later. */
|
||||
|
|
|
@ -105,7 +105,7 @@ _nm_dbus_is_connection_private (GDBusConnection *connection)
|
|||
* rule the proxy added and ensure a less granular rule is present instead.
|
||||
*
|
||||
* Also, don't do this immediately since it has a performance penalty.
|
||||
* Still better than loosing the signals altogether.
|
||||
* Still better than losing the signals altogether.
|
||||
*
|
||||
* Ideally, we should be able to tell glib not to hook its rules:
|
||||
* https://bugzilla.gnome.org/show_bug.cgi?id=758749
|
||||
|
|
|
@ -361,7 +361,7 @@ nm_device_vxlan_get_l2miss (NMDeviceVxlan *device)
|
|||
* nm_device_vxlan_get_l3miss:
|
||||
* @device: a #NMDeviceVxlan
|
||||
*
|
||||
* Returns: wether netlink IP ADDR miss notifications are generated
|
||||
* Returns: whether netlink IP ADDR miss notifications are generated
|
||||
*
|
||||
* Since: 1.2
|
||||
**/
|
||||
|
|
|
@ -370,7 +370,7 @@ nm_device_wifi_request_scan (NMDeviceWifi *device,
|
|||
* after that for the scan to complete.
|
||||
* This is the same as @nm_device_wifi_request_scan except it accepts @options
|
||||
* for the scanning. The argument is the dictionary passed to RequestScan()
|
||||
* D-Bus call. Valid otions inside the dictionary are:
|
||||
* D-Bus call. Valid options inside the dictionary are:
|
||||
* 'ssids' => array of SSIDs (saay)
|
||||
*
|
||||
* Returns: %TRUE on success, %FALSE on error, in which case @error will be
|
||||
|
@ -487,7 +487,7 @@ nm_device_wifi_request_scan_async (NMDeviceWifi *device,
|
|||
* that for the scan to complete.
|
||||
* This is the same as @nm_device_wifi_request_scan_async except it accepts @options
|
||||
* for the scanning. The argument is the dictionary passed to RequestScan()
|
||||
* D-Bus call. Valid otions inside the dictionary are:
|
||||
* D-Bus call. Valid options inside the dictionary are:
|
||||
* 'ssids' => array of SSIDs (saay)
|
||||
*
|
||||
* Since: 1.2
|
||||
|
|
|
@ -2392,7 +2392,7 @@ device_delete_cb (GObject *proxy,
|
|||
* @callback: callback to be called when delete operation completes
|
||||
* @user_data: caller-specific data passed to @callback
|
||||
*
|
||||
* Asynchronously begins deleteing the software device. Hardware devices can't
|
||||
* Asynchronously begins deleting the software device. Hardware devices can't
|
||||
* be deleted.
|
||||
**/
|
||||
void
|
||||
|
|
|
@ -125,7 +125,7 @@ next:
|
|||
}
|
||||
if (square_brackets_sensible) {
|
||||
/* If there's a [<string>] that survived the substitution, then the string
|
||||
* is a short form that is generally preferrable. */
|
||||
* is a short form that is generally preferable. */
|
||||
q = strchr (desc_full, ']');
|
||||
if (p && q > p) {
|
||||
p++;
|
||||
|
|
|
@ -612,7 +612,7 @@ handle_object_property (NMObject *self, const char *property_name, GVariant *val
|
|||
*
|
||||
* NOTE: We've ignored this before and the server hits the condition
|
||||
* more often that it should. Given we're able to recover from
|
||||
* ther error, let's lower the severity of the log message to
|
||||
* the error, let's lower the severity of the log message to
|
||||
* avoid unnecessarily bothering the user. This can be removed
|
||||
* once the issue is fixed on the server. */
|
||||
#if NM_MORE_ASSERTS
|
||||
|
|
|
@ -57,7 +57,7 @@ typedef struct {
|
|||
|
||||
/* The "object-creation-failed" method is PRIVATE for libnm and
|
||||
* is not meant for any external usage. It indicates that an error
|
||||
* occured during creation of an object.
|
||||
* occurred during creation of an object.
|
||||
*/
|
||||
void (*object_creation_failed) (NMObject *master_object,
|
||||
const char *failed_path);
|
||||
|
|
|
@ -1325,7 +1325,7 @@ nm_vpn_service_plugin_initable_iface_init (GInitableIface *iface)
|
|||
/*****************************************************************************/
|
||||
|
||||
/* this header is intended to be copied to users of nm_vpn_editor_plugin_call(),
|
||||
* to simplify invocation of generic functions. Include it here, to complile
|
||||
* to simplify invocation of generic functions. Include it here, to compile
|
||||
* the code. */
|
||||
#include "nm-utils/nm-vpn-editor-plugin-call.h"
|
||||
|
||||
|
|
|
@ -69,7 +69,7 @@ int nm_match_spec_device_by_pllink (const NMPlatformLink *pllink,
|
|||
* away. It iterates the mainloop for another NM_SHUTDOWN_TIMEOUT_MS_EXTRA. This
|
||||
* should give time to reap the child process (after SIGKILL).
|
||||
*
|
||||
* So, the maxiumum time we should wait before sending SIGKILL should be at most
|
||||
* So, the maximum time we should wait before sending SIGKILL should be at most
|
||||
* NM_SHUTDOWN_TIMEOUT_MS.
|
||||
*/
|
||||
#define NM_SHUTDOWN_TIMEOUT_MS 1500
|
||||
|
|
|
@ -7452,7 +7452,7 @@ dhcp4_get_client_id (NMDevice *self,
|
|||
|
||||
if (!client_id) {
|
||||
_LOGD (LOGD_DEVICE | LOGD_DHCP4 | LOGD_IP4,
|
||||
"ipv4.dhcp-client-id: no explicity client-id configured");
|
||||
"ipv4.dhcp-client-id: no explicit client-id configured");
|
||||
return NULL;
|
||||
}
|
||||
|
||||
|
|
|
@ -118,7 +118,7 @@ kill_pid (void)
|
|||
if (pid_str)
|
||||
pid = strtol (pid_str, NULL, 10);
|
||||
if (pid) {
|
||||
_LOGI ("a fatal error occured, kill dhclient instance with pid %d\n", pid);
|
||||
_LOGI ("a fatal error occurred, kill dhclient instance with pid %d\n", pid);
|
||||
kill (pid, SIGTERM);
|
||||
}
|
||||
}
|
||||
|
@ -190,7 +190,7 @@ do_notify:
|
|||
_LOGW ("failure to call notify: %s (try signal via Event)", error->message);
|
||||
g_clear_error (&error);
|
||||
|
||||
/* for backward compatibilty, try to emit the signal. There is no stable
|
||||
/* for backward compatibility, try to emit the signal. There is no stable
|
||||
* API between the dhcp-helper and NetworkManager. However, while upgrading
|
||||
* the NetworkManager package, a newer helper might want to notify an
|
||||
* older server, which still uses the "Event". */
|
||||
|
|
|
@ -139,7 +139,7 @@ nm_auth_chain_get_data (NMAuthChain *self, const char *tag)
|
|||
* @self: A #NMAuthChain.
|
||||
* @tag: A "tag" uniquely identifying the data to steal.
|
||||
*
|
||||
* Removes the datum assocated with @tag from the chain's data associations,
|
||||
* Removes the datum associated with @tag from the chain's data associations,
|
||||
* without invoking the association's destroy handler. The caller assumes
|
||||
* ownership over the returned value.
|
||||
*
|
||||
|
|
|
@ -801,7 +801,7 @@ read_config (GKeyFile *keyfile, gboolean is_base_config, const char *dirname, co
|
|||
new_val = _nm_utils_slist_to_strv (new_specs, FALSE);
|
||||
}
|
||||
|
||||
/* merge the string lists, by omiting duplicates. */
|
||||
/* merge the string lists, by omitting duplicates. */
|
||||
|
||||
for (iter_val = old_val; iter_val && *iter_val; iter_val++) {
|
||||
if ( last_char != '-'
|
||||
|
@ -1858,7 +1858,7 @@ state_write (NMConfig *self)
|
|||
&error)) {
|
||||
_LOGD ("state: error writing state file \"%s\": %s", filename, error->message);
|
||||
g_clear_error (&error);
|
||||
/* we leave the state dirty. That potentally means, that we try to
|
||||
/* we leave the state dirty. That potentially means, that we try to
|
||||
* write the file over and over again, although it isn't possible. */
|
||||
priv->state->p.dirty = TRUE;
|
||||
} else
|
||||
|
|
|
@ -708,7 +708,7 @@ _sleep_duration_convert_ms_to_us (guint32 sleep_duration_msec)
|
|||
* @log_domain: log debug information for this domain. Errors and warnings are logged both
|
||||
* as %LOGD_CORE and @log_domain.
|
||||
* @log_name: name of the process to kill for logging.
|
||||
* @child_status: (out) (allow-none): return the exit status of the child, if no error occured.
|
||||
* @child_status: (out) (allow-none): return the exit status of the child, if no error occurred.
|
||||
* @wait_before_kill_msec: Waittime in milliseconds before sending %SIGKILL signal. Set this value
|
||||
* to zero, not to send %SIGKILL. If @sig is already %SIGKILL, this parameter has not effect.
|
||||
* @sleep_duration_msec: the synchronous function sleeps repeatedly waiting for the child to terminate.
|
||||
|
@ -717,7 +717,7 @@ _sleep_duration_convert_ms_to_us (guint32 sleep_duration_msec)
|
|||
* Kill a child process synchronously and wait. The function first checks if the child already terminated
|
||||
* and if it did, return the exit status. Otherwise send one @sig signal. @sig will always be
|
||||
* sent unless the child already exited. If the child does not exit within @wait_before_kill_msec milliseconds,
|
||||
* the function will send %SIGKILL and waits for the child indefinitly. If @wait_before_kill_msec is zero, no
|
||||
* the function will send %SIGKILL and waits for the child indefinitely. If @wait_before_kill_msec is zero, no
|
||||
* %SIGKILL signal will be sent.
|
||||
*
|
||||
* In case of error, errno is preserved to contain the last reason of failure.
|
||||
|
@ -894,7 +894,7 @@ out:
|
|||
* @sleep_duration_msec: the synchronous function sleeps repeatedly waiting for the child to terminate.
|
||||
* Set to zero, to use the default (meaning 20 wakeups per seconds).
|
||||
* @max_wait_msec: if 0, waits indefinitely until the process is gone (or a zombie). Otherwise, this
|
||||
* is the maxium wait time until returning. If @max_wait_msec is non-zero but smaller then @wait_before_kill_msec,
|
||||
* is the maximum wait time until returning. If @max_wait_msec is non-zero but smaller then @wait_before_kill_msec,
|
||||
* we will not send a final %SIGKILL.
|
||||
*
|
||||
* Kill a non-child process synchronously and wait. This function will not return before the
|
||||
|
@ -2231,7 +2231,7 @@ nm_utils_log_connection_diff (NMConnection *connection,
|
|||
return;
|
||||
}
|
||||
|
||||
/* FIXME: it doesn't nicely show the content of NMSettingVpn, becuase nm_connection_diff() does not
|
||||
/* FIXME: it doesn't nicely show the content of NMSettingVpn, because nm_connection_diff() does not
|
||||
* expand the hash values. */
|
||||
|
||||
sorted_hashes = _log_connection_sort_hashes (connection, diff_base, connection_diff);
|
||||
|
@ -2610,7 +2610,7 @@ _secret_key_read (guint8 **out_secret_key,
|
|||
}
|
||||
|
||||
out:
|
||||
/* regardless of success or failue, we always return a secret-key. The
|
||||
/* regardless of success or failure, we always return a secret-key. The
|
||||
* caller may choose to ignore the error and proceed. */
|
||||
*out_key_len = key_len;
|
||||
*out_secret_key = secret_key;
|
||||
|
@ -3047,7 +3047,7 @@ nm_utils_stable_id_parse (const char *stable_id,
|
|||
_stable_id_append (str, deviceid);
|
||||
else if (g_str_has_prefix (&stable_id[i], "${RANDOM}")) {
|
||||
/* RANDOM makes not so much sense for cloned-mac-address
|
||||
* as the result is simmilar to specyifing "cloned-mac-address=random".
|
||||
* as the result is similar to specyifing "cloned-mac-address=random".
|
||||
* It makes however sense for RFC 7217 Stable Privacy IPv6 addresses
|
||||
* where this is effectively the only way to generate a different
|
||||
* (random) host identifier for each connect.
|
||||
|
|
|
@ -1182,7 +1182,7 @@ _nm_dbus_manager_obj_notify (NMDBusObject *obj,
|
|||
priv = NM_DBUS_MANAGER_GET_PRIVATE (self);
|
||||
|
||||
/* do a naive search for the matching NMDBusPropertyInfoExtended infos. Since the number of
|
||||
* (interaces x properties) is static and possibly small, this naive search is effectively
|
||||
* (interfaces x properties) is static and possibly small, this naive search is effectively
|
||||
* O(1). We might wanna introduce some index to lookup the properties in question faster.
|
||||
*
|
||||
* The nice part of this implementation is however, that the order in which properties
|
||||
|
@ -1518,7 +1518,7 @@ nm_dbus_manager_acquire_bus (NMDBusManager *self)
|
|||
* (3) if we are able to create the connection but registration fails,
|
||||
* it means that something is borked. Quite possibly another NetworkManager
|
||||
* instance is running. We need to exit right away.
|
||||
* To appease (1) and (3), we cannot initalize synchronously, because we need
|
||||
* To appease (1) and (3), we cannot initialize synchronously, because we need
|
||||
* to know right away whether another NetworkManager instance is running (3).
|
||||
**/
|
||||
|
||||
|
|
|
@ -395,7 +395,7 @@ _connection_is_vpn (NMConnection *connection)
|
|||
|
||||
/* we have an incomplete (invalid) connection at hand. That can only
|
||||
* happen during AddAndActivate. Determine whether it's VPN type based
|
||||
* on the existance of a [vpn] section. */
|
||||
* on the existence of a [vpn] section. */
|
||||
return !!nm_connection_get_setting_vpn (connection);
|
||||
}
|
||||
|
||||
|
@ -1728,7 +1728,7 @@ find_parent_device_for_connection (NMManager *self, NMConnection *connection, NM
|
|||
if (!parent_connection)
|
||||
return NULL;
|
||||
|
||||
/* Check if the parent connection is currently activated or is comaptible
|
||||
/* Check if the parent connection is currently activated or is compatible
|
||||
* with some known device.
|
||||
*/
|
||||
c_list_for_each_entry (candidate, &priv->devices_lst_head, devices_lst) {
|
||||
|
@ -4705,7 +4705,7 @@ nm_manager_activate_connection (NMManager *self,
|
|||
* is only a partial activation.
|
||||
* @connection: the partial #NMConnection to be activated (if @sett_conn is unspecified)
|
||||
* @device_path: the object path of the device to be activated, or NULL
|
||||
* @out_device: on successful reutrn, the #NMDevice to be activated with @connection
|
||||
* @out_device: on successful return, the #NMDevice to be activated with @connection
|
||||
* The caller may pass in a device which shortcuts the lookup by path.
|
||||
* In this case, the passed in device must have the matching @device_path
|
||||
* already.
|
||||
|
@ -7245,7 +7245,7 @@ set_property (GObject *object, guint prop_id,
|
|||
g_value_get_boolean (value));
|
||||
break;
|
||||
case PROP_WIMAX_ENABLED:
|
||||
/* WIMAX is depreacted. This does nothing. */
|
||||
/* WIMAX is deprecated. This does nothing. */
|
||||
break;
|
||||
case PROP_CONNECTIVITY_CHECK_ENABLED:
|
||||
nm_config_set_connectivity_check_enabled (priv->config,
|
||||
|
|
|
@ -271,7 +271,7 @@ pacrunner_send_done (GObject *source, GAsyncResult *res, gpointer user_data)
|
|||
g_variant_get (variant, "(&o)", &path);
|
||||
|
||||
if (c_list_is_empty (&config->lst)) {
|
||||
_LOG2D (config, "sent (%s), but destory it right away", path);
|
||||
_LOG2D (config, "sent (%s), but destroy it right away", path);
|
||||
g_dbus_proxy_call (priv->pacrunner,
|
||||
"DestroyProxyConfiguration",
|
||||
g_variant_new ("(o)", path),
|
||||
|
|
|
@ -1969,7 +1969,7 @@ device_ip_config_changed (NMDevice *device,
|
|||
/* We catch already all the IP events registering on the device state changes but
|
||||
* the ones where the IP changes but the device state keep stable (i.e., activated):
|
||||
* ignore IP config changes but when the device is in activated state.
|
||||
* Prevents unecessary changes to DNS information.
|
||||
* Prevents unnecessary changes to DNS information.
|
||||
*/
|
||||
if (nm_device_get_state (device) == NM_DEVICE_STATE_ACTIVATED) {
|
||||
if (old_config != new_config) {
|
||||
|
|
|
@ -557,7 +557,7 @@ nm_supplicant_config_add_bgscan (NMSupplicantConfig *self,
|
|||
NM_SETTING_WIRELESS_MODE_ADHOC))
|
||||
return TRUE;
|
||||
|
||||
/* Don't scan when the connection is locked to a specifc AP, since
|
||||
/* Don't scan when the connection is locked to a specific AP, since
|
||||
* intra-ESS roaming (which requires periodic scanning) isn't being
|
||||
* used due to the specific AP lock. (bgo #513820)
|
||||
*/
|
||||
|
|
|
@ -278,7 +278,7 @@ if [ $RESULT -ne 0 -a $RESULT -ne 77 ]; then
|
|||
UNRESOLVED=$(awk -F: '/obj:\// {print $NF}' "$LOGFILE" | sort | uniq)
|
||||
if [ -n "$UNRESOLVED" ]; then
|
||||
echo Some addresses could not be resolved into symbols. >&2
|
||||
echo The errors might get suppressed when you install the debuging symbols. >&2
|
||||
echo The errors might get suppressed when you install the debugging symbols. >&2
|
||||
if [ -x /usr/bin/dnf ]; then
|
||||
echo Hint: dnf debuginfo-install $UNRESOLVED >&2
|
||||
elif [ -x /usr/bin/debuginfo-install ]; then
|
||||
|
|
Loading…
Reference in a new issue