docs: misc. typos pt2

Remainder of typos found using `codespell -q 3 --skip="./shared,./src/systemd,*.po" -I ../NetworkManager-word-whitelist.txt` whereby whitelist consists of:
 ```
ans
busses
cace
cna
conexant
crasher
iff
liftime
creat
nd
sav
technik
uint
```

https://github.com/NetworkManager/NetworkManager/pull/205
This commit is contained in:
luz.paz 2018-09-15 07:20:54 -04:00 committed by Thomas Haller
parent f985b6944a
commit 58510ed566
61 changed files with 113 additions and 113 deletions

12
NEWS
View file

@ -69,7 +69,7 @@ This is a new stable release of NetworkManager. Notable changes include:
* nmcli now scans for Wi-Fi networks before displaying them, if the last scan
was too long ago.
* Added the ipv6.dhcp-duid property to allow configuring the DHCPv6 DUID
* Extended ipv6.dhcp-client-id property to support DHCP client identifers
* Extended ipv6.dhcp-client-id property to support DHCP client identifiers
depending on the MAC address and the stable ID.
* Set NM_DISPATCHER_ACTION environment variable in dispatcher scripts.
@ -274,7 +274,7 @@ This is a new stable release of NetworkManager. Notable changes include:
into the ifcfg file for improved compatibility with the legacy network service.
* Improve handling of MTU by resetting the previous MTU when the device deactivates
and reset the MTU to a defined value on activation.
* Improve tracking of parent devices for dependend devices like ip-tunnels, MACVLAN,
* Improve tracking of parent devices for dependent devices like ip-tunnels, MACVLAN,
VETH, VLAN, and VXLAN.
* Many bug fixes and improvements
@ -576,7 +576,7 @@ This is a new stable release of NetworkManager. Notable changes include:
* NetworkManager no longer requires polkit libraries at runtime when Polkit
support is enabled, and Polkit can be disabled at build time too
* Automatically created connections are now deleted when their device goes away
* 'nmcli dev connect' now attemts to create a connection if none exists
* 'nmcli dev connect' now attempts to create a connection if none exists
* Manually configured static IPv6 configuration is kept even if SLAAC fails
* Manpages for the 'keyfile' and 'ifcfg-rh' plugins now describe their
configuration syntax and available options
@ -719,7 +719,7 @@ This is a new stable release of NetworkManager. Notable changes include:
* Better handling of WiFi devices via nl80211 when available (instead of WEXT)
* IP configuration is now non-blocking; waiting for IPv6 RA no longer blocks
the device from activating if IPv4 is ready and vice versa
* Addded support for firewall "zones" via FirewallD
* Added support for firewall "zones" via FirewallD
* Added basic support for bonded interfaces
* WiFi connections are no longer locked to a specific MAC address if they are
"locally administered" addresses (ie, 02:::::)
@ -967,13 +967,13 @@ Overview of changes since NetworkManager-0.5.0
* Don't drop the last scanned AP (Dan Williams)
* Broadcast state change when disconnected (Robert Love)
* The Slackware backend now builds (Nico)
* Don't install unsued config files (Dan Williams)
* Don't install unused config files (Dan Williams)
* Add a test for libnm_glib_unregister_callback (Christopher Aillon)
* Requires wireless-tools 28pre9 (Christopher Aillon)
* nm-applet
* Use g_get_host_name () if we've got it (Christopher Aillon)
* Fix an unitialized variable (Robert Love)
* Fix an uninitialized variable (Robert Love)
* Fix sensitivity of VPN items (Robert Love)

6
TODO
View file

@ -97,7 +97,7 @@ same MAC address, the connection with the most recent timestamp should be
preferred.
Similarly, if the probing/listening process detects 802.1x frames the device
should be marked as requring 802.1x authentication until the carrier drops.
should be marked as requiring 802.1x authentication until the carrier drops.
This would be accomplished by adding a new property to the NMDeviceEthernet
object and exporting that property through the
introspection/nm-device-ethernet.xml file. This would allow clients like
@ -231,7 +231,7 @@ proceeds with the connection.
NM sends the correct wpa_supplicant config for WPS to the supplicant, and waits
for the connection to occur. WPS can only be used the *first* time, so after a
first successfull connection, NM must request the actual hexadecimal PSK from
first successful connection, NM must request the actual hexadecimal PSK from
wpa_supplicant via D-Bus, and store that PSK in the connection, clear any WPS
PIN code from the connection, and save the connection to backing storage.
@ -283,7 +283,7 @@ connection process.
2) single-device-at-a-time with overlapping connections: this is also probably
the best route to go for desktop use-cases as well. Instead of bringing all
available connections up, only bring up the "best" connection at any given
time based on the current priority list (which is rougly Ethernet > WiFi >
time based on the current priority list (which is roughly Ethernet > WiFi >
3G/Bluetooth). However, to ensure seamless connectivity, when one connection
begins to degrade, the next-best connection should be started before the
current one is terminated, such that there is a small amount of overlap.

View file

@ -623,7 +623,7 @@ AM_CONDITIONAL(WITH_JSON_VALIDATION, test "${enable_json_validation}" != "no")
# we usually compile with polkit support. --enable-polkit=yes|no only sets the
# default configuration for main.auth-polkit. User can always enable/disable polkit
# autorization via config.
# authorization via config.
AC_ARG_ENABLE(polkit,
AS_HELP_STRING([--enable-polkit=yes|no],
[set default value for auth-polkit configuration option. This value can be overwritten by NM configuration. 'disabled' is an alias for 'no']),

View file

@ -3,7 +3,7 @@
#set -vx
# Set arguments via environment variables.
# Argument can be omited and defaults will be detected.
# Argument can be omitted and defaults will be detected.
#
# BUILDTYPE=|SRPM
# NM_RPMBUILD_ARGS=<additional argus for rpmbuild>
@ -157,7 +157,7 @@ ln "$BUILDLOG" "$TEMPBASE/build.log"
rm -f "$BUILDLOG"
TEMPSPEC="$TEMP/SPECS/NetworkManager.spec"
mkdir -p "$TEMP/SOURCES/" "$TEMP/SPECS/" || die "error creating SPECS directoy"
mkdir -p "$TEMP/SOURCES/" "$TEMP/SPECS/" || die "error creating SPECS directory"
if [[ "$(dirname "$SOURCE")" != "$TEMP/SOURCES" ]]; then
cp "$SOURCE" "$TEMP/SOURCES/" || die "Could not copy source $SOURCE to $TEMP/SOURCES"

View file

@ -258,7 +258,7 @@
</chapter>
<!--
These are obsolete and intentionally ommitted from the manual since they can't
These are obsolete and intentionally omitted from the manual since they can't
appear on the D-Bus API of the present version of NetworkManager.
Keep them here so that "make check" won't think that they were skipped accidentally .
<xi:include href="dbus-org.freedesktop.NetworkManager.Device.WiMax.xml"/>

View file

@ -69,7 +69,7 @@
mapping D-Bus signals and properties to GObject signals and properties,
and providing helpful accessor and utility functions. However, unlike
the old libnm-util/libnm-glib API, the mapping to the D-Bus API is not
exact, and various inconveniences and historical anomolies of the D-Bus
exact, and various inconveniences and historical anomalies of the D-Bus
API are papered over.
</para>
<para>
@ -295,7 +295,7 @@ print ("NetworkManager version " + client.get_version())]]></programlisting></in
</chapter>
<!--
These don't contain any useful documentaiton. Keep them here,
These don't contain any useful documentation. Keep them here,
so that tools/check-docs.sh knows that we did omit them intentionally.
<xi:include href="xml/nm-core-enum-types.xml"/>
<xi:include href="xml/nm-enum-types.xml"/>

View file

@ -45,7 +45,7 @@ G_BEGIN_DECLS
/*
* NM_CONNECTION_NORMALIZE_PARAM_IP6_CONFIG_METHOD: overwrite the ip6 method
* when normalizing ip6 configuration. If omited, this defaults to
* when normalizing ip6 configuration. If omitted, this defaults to
* @NM_SETTING_IP6_CONFIG_METHOD_AUTO.
*/
#define NM_CONNECTION_NORMALIZE_PARAM_IP6_CONFIG_METHOD "ip6-config-method"
@ -59,7 +59,7 @@ G_BEGIN_DECLS
/**
* NMConnectionInterface:
* @parent: the parent interace struct
* @parent: the parent interface struct
* @secrets_updated: emitted when the connection's secrets are updated
* @secrets_cleared: emitted when the connection's secrets are cleared
* @changed: emitted when any change to the connection's settings occurs

View file

@ -168,7 +168,7 @@ typedef enum {
* @NM_CONNECTIVITY_PORTAL: The Internet connection is hijacked by a captive
* portal gateway. The graphical shell may open a sandboxed web browser window
* (because the captive portals typically attempt a man-in-the-middle attacks
* agains the https connections) for the purpose of authenticating to a gateway
* against the https connections) for the purpose of authenticating to a gateway
* and retrigger the connectivity check with CheckConnectivity() when the
* browser window is dismissed.
* @NM_CONNECTIVITY_LIMITED: The host is connected to a network, does not appear
@ -1004,7 +1004,7 @@ typedef enum { /*< flags >*/
* again (because it's about to be deleted), but a manual activation will
* clear the volatile flag.
* @NM_SETTINGS_UPDATE2_FLAG_BLOCK_AUTOCONNECT: usually, when the connection
* has autoconnect enabled and is modified, it becomes elegible to autoconnect
* has autoconnect enabled and is modified, it becomes eligible to autoconnect
* right away. Setting this flag, disables autoconnect until the connection
* is manually activated.
*

View file

@ -372,7 +372,7 @@ read_field (char **current, const char **out_err_str, const char *characters, co
* address/plen,gateway,metric (NETWORK via GATEWAY dev DEVICE metric METRIC)
*
* For backward, forward and sideward compatibility, slash (/),
* semicolon (;) and comma (,) are interchangable. The choice of
* semicolon (;) and comma (,) are interchangeable. The choice of
* separator in the above examples is therefore not significant.
*
* Leaving out the prefix length is discouraged and DEPRECATED. The
@ -2544,7 +2544,7 @@ read_one_setting_value (NMSetting *setting,
*/
if ( (!pip || !pip->parser_no_check_key)
&& !nm_keyfile_plugin_kf_has_key (keyfile, setting_name, key, &err)) {
/* Key doesn't exist or an error ocurred, thus nothing to do. */
/* Key doesn't exist or an error occurred, thus nothing to do. */
if (err) {
if (!handle_warn (info, key, NM_KEYFILE_WARN_SEVERITY_WARN,
_("error loading setting value: %s"),
@ -2902,7 +2902,7 @@ nm_keyfile_read (GKeyFile *keyfile,
nm_connection_add_setting (connection, NM_SETTING (s_con));
}
/* Make sure that we have 'id' even if not explictly specified in the keyfile */
/* Make sure that we have 'id' even if not explicitly specified in the keyfile */
if ( keyfile_name
&& !nm_setting_connection_get_id (s_con)) {
gs_free char *base_name = NULL;
@ -2911,7 +2911,7 @@ nm_keyfile_read (GKeyFile *keyfile,
g_object_set (s_con, NM_SETTING_CONNECTION_ID, base_name, NULL);
}
/* Make sure that we have 'uuid' even if not explictly specified in the keyfile */
/* Make sure that we have 'uuid' even if not explicitly specified in the keyfile */
if ( keyfile_name
&& !nm_setting_connection_get_uuid (s_con)) {
gs_free char *hashed_uuid = NULL;

View file

@ -246,7 +246,7 @@ nm_setting_802_1x_check_cert_scheme (gconstpointer pdata, gsize length, GError *
if (scheme != NM_SETTING_802_1X_CK_SCHEME_BLOB) {
/* An actual URI must be NUL terminated, contain at least
* one non-NUL character, and contain only one trailing NUL
* chracter.
* character.
* And ensure it's UTF-8 valid too so we can pass it through
* D-Bus and stuff like that. */

View file

@ -312,7 +312,7 @@ nm_setting_connection_get_num_permissions (NMSettingConnection *setting)
* @setting: the #NMSettingConnection
* @idx: the zero-based index of the permissions entry
* @out_ptype: on return, the permission type (at this time, always "user")
* @out_pitem: on return, the permission item (formatted accoring to @ptype, see
* @out_pitem: on return, the permission item (formatted according to @ptype, see
* #NMSettingConnection:permissions for more detail
* @out_detail: on return, the permission detail (at this time, always %NULL)
*
@ -748,7 +748,7 @@ nm_setting_connection_get_secondary (NMSettingConnection *setting, guint32 idx)
* @setting: the #NMSettingConnection
* @sec_uuid: the secondary connection UUID to add
*
* Adds a new secondary connetion UUID to the setting.
* Adds a new secondary connection UUID to the setting.
*
* Returns: %TRUE if the secondary connection UUID was added; %FALSE if the UUID
* was already present

View file

@ -1275,7 +1275,7 @@ nm_setting_dcb_class_init (NMSettingDcbClass *klass)
/* ---ifcfg-rh---
* property: priority-traffic-class
* variable: DCB_PG_UP2TC
* description: Priority values. String of eight trafic class values (0 - 7).
* description: Priority values. String of eight traffic class values (0 - 7).
* example: DCB_PG_UP2TC=01623701
* ---end---
*/

View file

@ -952,7 +952,7 @@ vfs_to_dbus (NMSetting *setting, const char *property)
/* VLANs are translated into an array of maps, where each map has
* keys 'id', 'qos' and 'proto'. This guarantees enough flexibility
* to accomodate any future new option. */
* to accommodate any future new option. */
vlan_ids = nm_sriov_vf_get_vlan_ids (vf, &num_vlans);
if (num_vlans) {
GVariantBuilder vlans_builder;

View file

@ -411,7 +411,7 @@ nm_team_link_watcher_get_name (NMTeamLinkWatcher *watcher)
* @watcher: the #NMTeamLinkWatcher
*
* Gets the delay_up interval (in milliseconds) that elapses between the link
* coming up and the runner beeing notified about it.
* coming up and the runner being notified about it.
*
* Since: 1.12
**/
@ -430,7 +430,7 @@ nm_team_link_watcher_get_delay_up (NMTeamLinkWatcher *watcher)
* @watcher: the #NMTeamLinkWatcher
*
* Gets the delay_down interval (in milliseconds) that elapses between the link
* going down and the runner beeing notified about it.
* going down and the runner being notified about it.
*
* Since: 1.12
**/

View file

@ -1215,7 +1215,7 @@ nm_setting_wired_class_init (NMSettingWiredClass *klass)
* a hardware address in ASCII representation, or one of the special values
* "preserve", "permanent", "random" or "stable".
* This field replaces the deprecated "cloned-mac-address" on D-Bus, which
* can only contain explict hardware addresses. Note that this property
* can only contain explicit hardware addresses. Note that this property
* only exists in D-Bus API. libnm and nmcli continue to call this property
* "cloned-mac-address".
* ---end---

View file

@ -390,7 +390,7 @@ nm_setting_wireless_security_remove_pairwise (NMSettingWirelessSecurity *setting
* Removes an encryption algorithm from the allowed pairwise encryption
* algorithm list.
*
* Returns: %TRUE if the encryption algorith was found and removed; %FALSE if it was not.
* Returns: %TRUE if the encryption algorithm was found and removed; %FALSE if it was not.
**/
gboolean
nm_setting_wireless_security_remove_pairwise_by_value (NMSettingWirelessSecurity *setting,

View file

@ -54,9 +54,9 @@ G_BEGIN_DECLS
* @NM_WEP_KEY_TYPE_LAST: placeholder value for bounds-checking
*
* The #NMWepKeyType values specify how any WEP keys present in the setting
* are intepreted. There are no standards governing how to hash the various WEP
* are interpreted. There are no standards governing how to hash the various WEP
* key/passphrase formats into the actual WEP key. Unfortunately some WEP keys
* can be interpreted in multiple ways, requring the setting to specify how to
* can be interpreted in multiple ways, requiring the setting to specify how to
* interpret the any WEP keys. For example, the key "732f2d712e4a394a375d366931"
* is both a valid Hexadecimal WEP key and a WEP passphrase. Further, many
* ASCII keys are also valid WEP passphrases, but since passphrases and ASCII

View file

@ -1461,7 +1461,7 @@ nm_setting_wireless_class_init (NMSettingWirelessClass *klass)
* a hardware address in ASCII representation, or one of the special values
* "preserve", "permanent", "random" or "stable".
* This field replaces the deprecated "cloned-mac-address" on D-Bus, which
* can only contain explict hardware addresses. Note that this property
* can only contain explicit hardware addresses. Note that this property
* only exists in D-Bus API. libnm and nmcli continue to call this property
* "cloned-mac-address".
* ---end---

View file

@ -49,7 +49,7 @@ G_BEGIN_DECLS
* @NM_SETTING_WIRELESS_WAKE_ON_WLAN_MAGIC: Wake on magic packet
* @NM_SETTING_WIRELESS_WAKE_ON_WLAN_GTK_REKEY_FAILURE: Wake on GTK rekey failure
* @NM_SETTING_WIRELESS_WAKE_ON_WLAN_EAP_IDENTITY_REQUEST: Wake on EAP identity request
* @NM_SETTING_WIRELESS_WAKE_ON_WLAN_4WAY_HANDSHAKE: Wake on 4way hanshake
* @NM_SETTING_WIRELESS_WAKE_ON_WLAN_4WAY_HANDSHAKE: Wake on 4way handshake
* @NM_SETTING_WIRELESS_WAKE_ON_WLAN_RFKILL_RELEASE: Wake on rfkill release
* @NM_SETTING_WIRELESS_WAKE_ON_WLAN_ALL: Wake on all events. This does not
* include the exclusive flags @NM_SETTING_WIRELESS_WAKE_ON_WLAN_DEFAULT or

View file

@ -1283,7 +1283,7 @@ should_compare_prop (NMSetting *setting,
&& g_strcmp0 (prop_name, NM_SETTING_VPN_SECRETS) == 0) {
/* FIXME: NMSettingVPN:NM_SETTING_VPN_SECRETS has NM_SETTING_PARAM_SECRET.
* nm_setting_get_secret_flags() quite possibly fails, but it might succeed if the
* setting accidently uses a key "secrets". */
* setting accidentally uses a key "secrets". */
return TRUE;
}

View file

@ -64,7 +64,7 @@ G_BEGIN_DECLS
* should be requested from the user each time it is needed
* @NM_SETTING_SECRET_FLAG_NOT_REQUIRED: in situations where it cannot be
* automatically determined that the secret is required (some VPNs and PPP
* providers dont require all secrets) this flag indicates that the specific
* providers don't require all secrets) this flag indicates that the specific
* secret is not required
*
* These flags indicate specific behavior related to handling of a secret. Each

View file

@ -112,7 +112,7 @@ static const struct IsoLangToEncodings isoLangEntries2[] =
LANG_ENCODINGS ("bg", "windows-1251","koi8-r", "iso-8859-5"), /* Bulgarian */
LANG_ENCODINGS ("mk", "koi8-r", "windows-1251", "iso-8859-5"),/* Macedonian */
LANG_ENCODINGS ("sr", "koi8-r", "windows-1251", "iso-8859-5"),/* Serbian */
LANG_ENCODINGS ("uk", "koi8-u", "koi8-r", "windows-1251"), /* Ukranian */
LANG_ENCODINGS ("uk", "koi8-u", "koi8-r", "windows-1251"), /* Ukrainian */
/* Arabic */
LANG_ENCODINGS ("ar", "iso-8859-6","windows-1256"),
@ -836,7 +836,7 @@ device_supports_ap_ciphers (guint32 dev_caps,
/**
* nm_utils_ap_mode_security_valid:
* @type: the security type to check device capabilties against,
* @type: the security type to check device capabilities against,
* e.g. #NMU_SEC_STATIC_WEP
* @wifi_caps: bitfield of the capabilities of the specific Wi-Fi device, e.g.
* #NM_WIFI_DEVICE_CAP_CIPHER_WEP40
@ -872,16 +872,16 @@ nm_utils_ap_mode_security_valid (NMUtilsSecurityType type,
/**
* nm_utils_security_valid:
* @type: the security type to check AP flags and device capabilties against,
* @type: the security type to check AP flags and device capabilities against,
* e.g. #NMU_SEC_STATIC_WEP
* @wifi_caps: bitfield of the capabilities of the specific Wi-Fi device, e.g.
* #NM_WIFI_DEVICE_CAP_CIPHER_WEP40
* @have_ap: whether the @ap_flags, @ap_wpa, and @ap_rsn arguments are valid
* @adhoc: whether the capabilities being tested are from an Ad-Hoc AP (IBSS)
* @ap_flags: bitfield of AP capabilities, e.g. #NM_802_11_AP_FLAGS_PRIVACY
* @ap_wpa: bitfield of AP capabilties derived from the AP's WPA beacon,
* @ap_wpa: bitfield of AP capabilities derived from the AP's WPA beacon,
* e.g. (#NM_802_11_AP_SEC_PAIR_TKIP | #NM_802_11_AP_SEC_KEY_MGMT_PSK)
* @ap_rsn: bitfield of AP capabilties derived from the AP's RSN/WPA2 beacon,
* @ap_rsn: bitfield of AP capabilities derived from the AP's RSN/WPA2 beacon,
* e.g. (#NM_802_11_AP_SEC_PAIR_CCMP | #NM_802_11_AP_SEC_PAIR_TKIP)
*
* Given a set of device capabilities, and a desired security type to check
@ -891,7 +891,7 @@ nm_utils_ap_mode_security_valid (NMUtilsSecurityType type,
* NOTE: this function cannot handle checking security for AP/Hotspot mode;
* use nm_utils_ap_mode_security_valid() instead.
*
* Returns: %TRUE if the device capabilities and AP capabilties intersect and are
* Returns: %TRUE if the device capabilities and AP capabilities intersect and are
* compatible with the desired @type, %FALSE if they are not
**/
gboolean
@ -2017,7 +2017,7 @@ _string_append_tc_handle (GString *string, guint32 handle)
* or to pretty-format (use symbolic name for root) the key in keyfile.
* The presence of prefix determnines which one is the case.
*
* Private API due to general uglyness and overall uselessness for anything
* Private API due to general ugliness and overall uselessness for anything
* sensible.
*/
void

View file

@ -379,8 +379,8 @@ _nm_vpn_editor_plugin_load (const char *plugin_name,
* @user_data: user data for @check_file
* @error: on failure the error reason.
*
* Load the shared libary @plugin_name and create a new
* #NMVpnEditorPlugin instace via the #NMVpnEditorPluginFactory
* Load the shared library @plugin_name and create a new
* #NMVpnEditorPlugin instance via the #NMVpnEditorPluginFactory
* function.
*
* If @plugin_name is not an absolute path name, it assumes the file
@ -419,8 +419,8 @@ nm_vpn_editor_plugin_load_from_file (const char *plugin_name,
* the given service.
* @error: on failure the error reason.
*
* Load the shared libary @plugin_name and create a new
* #NMVpnEditorPlugin instace via the #NMVpnEditorPluginFactory
* Load the shared library @plugin_name and create a new
* #NMVpnEditorPlugin instance via the #NMVpnEditorPluginFactory
* function.
*
* This is similar to nm_vpn_editor_plugin_load_from_file(), but

View file

@ -1341,7 +1341,7 @@ nm_vpn_plugin_info_class_init (NMVpnPluginInfoClass *plugin_class)
/**
* NMVpnPluginInfo:keyfile:
*
* Initalize the instance with a different keyfile instance.
* Initialize the instance with a different keyfile instance.
* When passing a keyfile instance, the constructor will not
* try to read from filename.
*

View file

@ -241,7 +241,7 @@ _keyfile_convert (NMConnection **con,
k0_c1_k2 = _nm_keyfile_write (k0_c1, write_handler, write_data);
k0_c1_k2_c3 = _nm_keyfile_read (k0_c1_k2, keyfile_name, base_dir, read_handler, read_data, FALSE);
/* It is a expeced behavior, that if @k0 contains a relative path ca-cert, @k0_c1 will
/* It is a expected behavior, that if @k0 contains a relative path ca-cert, @k0_c1 will
* contain that path as relative. But @k0_c1_k2 and @k0_c1_k2_c3 will have absolute paths.
* In this case, hack up @k0_c1_k2_c3 to contain the same relative path. */
s1 = nm_connection_get_setting_802_1x (k0_c1);
@ -409,7 +409,7 @@ test_8021x_cert (void)
g_assert_no_error (error);
g_assert (success);
/* test reseting ca-cert to different values and see whether we can write/read. */
/* test resetting ca-cert to different values and see whether we can write/read. */
nm_connection_add_setting (con, NM_SETTING (s_8021x));
nmtst_assert_connection_verifies_and_normalizable (con);

View file

@ -1840,7 +1840,7 @@ constructed (GObject *object)
GError *error = NULL;
if (!nm_utils_init (&error)) {
g_warning ("Couldn't initilize nm-utils/crypto system: %s",
g_warning ("Couldn't initialize nm-utils/crypto system: %s",
error->message);
g_clear_error (&error);
}

View file

@ -451,10 +451,10 @@ nm_object_class_init (NMObjectClass *nm_object_class)
/**
* NMObject::object-creation-failed:
* @master_object: the object that received the signal
* @error: the error that occured while creating object
* @error: the error that occurred while creating object
* @failed_path: object path of the failed object
*
* Indicates that an error occured while creating an #NMObject object
* Indicates that an error occurred while creating an #NMObject object
* during property handling of @master_object.
*
* Note: Be aware that the signal is private for libnm-glib's internal

View file

@ -66,7 +66,7 @@ typedef struct {
/* Signals */
/* The "object-creation-failed" signal is PRIVATE for libnm-glib and
* is not meant for any external usage. It indicates that an error
* occured during creation of an object.
* occurred during creation of an object.
*/
void (*object_creation_failed) (NMObject *master_object,
GError *error,

View file

@ -703,7 +703,7 @@ auto_register_cb (gpointer user_data)
* @callback: (scope async): a callback, to be invoked when the operation is done
* @user_data: (closure): caller-specific data to be passed to @callback
*
* Asyncronously retrieve secrets belonging to @connection for the
* Asynchronously retrieve secrets belonging to @connection for the
* setting @setting_name. @flags indicate specific behavior that the secret
* agent should use when performing the request, for example returning only
* existing secrets without user interaction, or requesting entirely new
@ -742,7 +742,7 @@ nm_secret_agent_get_secrets (NMSecretAgent *self,
* @callback: (scope async): a callback, to be invoked when the operation is done
* @user_data: (closure): caller-specific data to be passed to @callback
*
* Asyncronously ensure that all secrets inside @connection
* Asynchronously ensure that all secrets inside @connection
* are stored to disk.
*/
void
@ -1031,7 +1031,7 @@ nm_secret_agent_class_init (NMSecretAgentClass *class)
/**
* NMSecretAgent::registration-result:
* @agent: the agent that received the signal
* @error: the error, if any, that occured while registering
* @error: the error, if any, that occurred while registering
*
* Indicates the result of a registration request; if @error is NULL the
* request was successful.

View file

@ -100,7 +100,7 @@ typedef enum
/*
* NM_CONNECTION_NORMALIZE_PARAM_IP6_CONFIG_METHOD: overwrite the ip6 method
* when normalizing ip6 configuration. If omited, this defaults to
* when normalizing ip6 configuration. If omitted, this defaults to
* @NM_SETTING_IP6_CONFIG_METHOD_AUTO.
*/
#define NM_CONNECTION_NORMALIZE_PARAM_IP6_CONFIG_METHOD "ip6-config-method"

View file

@ -539,9 +539,9 @@ _gvalues_compare (const GValue *value1, const GValue *value2)
if (p1 == p2)
ret = 0; /* Exactly the same values */
else if (!p1)
ret = 1; /* The comparision functions below don't handle NULLs */
ret = 1; /* The comparison functions below don't handle NULLs */
else if (!p2)
ret = -1; /* The comparision functions below don't handle NULLs */
ret = -1; /* The comparison functions below don't handle NULLs */
else if (type1 == G_TYPE_STRV)
ret = _gvalues_compare_strv (value1, value2);
else if (dbus_g_type_is_collection (type1))

View file

@ -435,7 +435,7 @@ get_cert_scheme (GByteArray *array)
&& !memcmp (array->data, SCHEME_PATH, NM_STRLEN (SCHEME_PATH))) {
/* But it must also be NUL terminated, contain at least
* one non-NUL character, and contain only one trailing NUL
* chracter.
* character.
* And ensure it's UTF-8 valid too so we can pass it through
* D-Bus and stuff like that. */
if ( array->len > NM_STRLEN (SCHEME_PATH) + 1
@ -3723,7 +3723,7 @@ nm_setting_802_1x_class_init (NMSetting8021xClass *setting_class)
/* Initialize crypto lbrary. */
if (!nm_utils_init (&error)) {
g_warning ("Couldn't initilize nm-utils/crypto system: %s",
g_warning ("Couldn't initialize nm-utils/crypto system: %s",
error->message);
g_error_free (error);
}

View file

@ -294,7 +294,7 @@ nm_setting_connection_get_num_permissions (NMSettingConnection *setting)
* @setting: the #NMSettingConnection
* @idx: the zero-based index of the permissions entry
* @out_ptype: on return, the permission type (at this time, always "user")
* @out_pitem: on return, the permission item (formatted accoring to @ptype, see
* @out_pitem: on return, the permission item (formatted according to @ptype, see
* #NMSettingConnection:permissions for more detail
* @out_detail: on return, the permission detail (at this time, always %NULL)
*
@ -646,7 +646,7 @@ nm_setting_connection_get_secondary (NMSettingConnection *setting, guint32 idx)
* @setting: the #NMSettingConnection
* @sec_uuid: the secondary connection UUID to add
*
* Adds a new secondary connetion UUID to the setting.
* Adds a new secondary connection UUID to the setting.
*
* Returns: %TRUE if the secondary connection UUID was added; %FALSE if the UUID
* was already present

View file

@ -407,7 +407,7 @@ nm_setting_wireless_security_remove_pairwise (NMSettingWirelessSecurity *setting
* Removes an encryption algorithm from the allowed pairwise encryption
* algorithm list.
*
* Returns: %TRUE if the encryption algorith was found and removed; %FALSE if it was not.
* Returns: %TRUE if the encryption algorithm was found and removed; %FALSE if it was not.
*
* Since: 0.9.10
**/

View file

@ -79,9 +79,9 @@ GQuark nm_setting_wireless_security_error_quark (void);
* @NM_WEP_KEY_TYPE_LAST: placeholder value for bounds-checking
*
* The #NMWepKeyType values specify how any WEP keys present in the setting
* are intepreted. There are no standards governing how to hash the various WEP
* are interpreted. There are no standards governing how to hash the various WEP
* key/passphrase formats into the actual WEP key. Unfortunately some WEP keys
* can be interpreted in multiple ways, requring the setting to specify how to
* can be interpreted in multiple ways, requiring the setting to specify how to
* interpret the any WEP keys. For example, the key "732f2d712e4a394a375d366931"
* is both a valid Hexadecimal WEP key and a WEP passphrase. Further, many
* ASCII keys are also valid WEP passphrases, but since passphrases and ASCII

View file

@ -674,7 +674,7 @@ should_compare_prop (NMSetting *setting,
&& g_strcmp0 (prop_name, NM_SETTING_VPN_SECRETS) == 0) {
/* FIXME: NMSettingVPN:NM_SETTING_VPN_SECRETS has NM_SETTING_PARAM_SECRET.
* nm_setting_get_secret_flags() quite possibly fails, but it might succeed if the
* setting accidently uses a key "secrets". */
* setting accidentally uses a key "secrets". */
return FALSE;
}

View file

@ -91,7 +91,7 @@ GQuark nm_setting_error_quark (void);
* should be requested from the user each time it is needed
* @NM_SETTING_SECRET_FLAG_NOT_REQUIRED: in situations where it cannot be
* automatically determined that the secret is required (some VPNs and PPP
* providers dont require all secrets) this flag indicates that the specific
* providers don't require all secrets) this flag indicates that the specific
* secret is not required
*
* These flags indicate specific behavior related to handling of a secret. Each

View file

@ -103,7 +103,7 @@ static const struct IsoLangToEncodings isoLangEntries2[] =
{ "bg", {"windows-1251","koi8-r", "iso-8859-5"} }, /* Bulgarian */
{ "mk", {"koi8-r", "windows-1251", "iso-8859-5"} }, /* Macedonian */
{ "sr", {"koi8-r", "windows-1251", "iso-8859-5"} }, /* Serbian */
{ "uk", {"koi8-u", "koi8-r", "windows-1251"} }, /* Ukranian */
{ "uk", {"koi8-u", "koi8-r", "windows-1251"} }, /* Ukrainian */
/* Arabic */
{ "ar", {"iso-8859-6", "windows-1256", NULL} },
@ -600,7 +600,7 @@ device_supports_ap_ciphers (guint32 dev_caps,
/**
* nm_utils_ap_mode_security_valid:
* @type: the security type to check device capabilties against,
* @type: the security type to check device capabilities against,
* e.g. #NMU_SEC_STATIC_WEP
* @wifi_caps: bitfield of the capabilities of the specific Wi-Fi device, e.g.
* #NM_WIFI_DEVICE_CAP_CIPHER_WEP40
@ -638,16 +638,16 @@ nm_utils_ap_mode_security_valid (NMUtilsSecurityType type,
/**
* nm_utils_security_valid:
* @type: the security type to check AP flags and device capabilties against,
* @type: the security type to check AP flags and device capabilities against,
* e.g. #NMU_SEC_STATIC_WEP
* @wifi_caps: bitfield of the capabilities of the specific Wi-Fi device, e.g.
* #NM_WIFI_DEVICE_CAP_CIPHER_WEP40
* @have_ap: whether the @ap_flags, @ap_wpa, and @ap_rsn arguments are valid
* @adhoc: whether the capabilities being tested are from an Ad-Hoc AP (IBSS)
* @ap_flags: bitfield of AP capabilities, e.g. #NM_802_11_AP_FLAGS_PRIVACY
* @ap_wpa: bitfield of AP capabilties derived from the AP's WPA beacon,
* @ap_wpa: bitfield of AP capabilities derived from the AP's WPA beacon,
* e.g. (#NM_802_11_AP_SEC_PAIR_TKIP | #NM_802_11_AP_SEC_KEY_MGMT_PSK)
* @ap_rsn: bitfield of AP capabilties derived from the AP's RSN/WPA2 beacon,
* @ap_rsn: bitfield of AP capabilities derived from the AP's RSN/WPA2 beacon,
* e.g. (#NM_802_11_AP_SEC_PAIR_CCMP | #NM_802_11_AP_SEC_PAIR_TKIP)
*
* Given a set of device capabilities, and a desired security type to check
@ -657,7 +657,7 @@ nm_utils_ap_mode_security_valid (NMUtilsSecurityType type,
* NOTE: this function cannot handle checking security for AP/Hotspot mode;
* use nm_utils_ap_mode_security_valid() instead.
*
* Returns: %TRUE if the device capabilities and AP capabilties intersect and are
* Returns: %TRUE if the device capabilities and AP capabilities intersect and are
* compatible with the desired @type, %FALSE if they are not
**/
gboolean

View file

@ -2314,7 +2314,7 @@ test_connection_verify_sets_interface_name (void)
g_assert_cmpstr (nm_connection_get_interface_name (con), ==, NULL);
/* for backward compatiblity, normalizes the interface name */
/* for backward compatibility, normalizes the interface name */
success = nm_connection_verify (con, &error);
g_assert (success && !error);
@ -2373,7 +2373,7 @@ test_connection_normalize_virtual_iface_name (void)
g_assert_cmpstr (nm_connection_get_interface_name (con), ==, IFACE_NAME);
g_assert_cmpstr (nm_setting_vlan_get_interface_name (s_vlan), ==, IFACE_VIRT);
/* for backward compatiblity, normalizes the interface name */
/* for backward compatibility, normalizes the interface name */
success = nm_connection_verify (con, &error);
g_assert (success && !error);

View file

@ -60,7 +60,7 @@ open $fo, '>', $output or die "Can't open $output: $!";
# write XML header
write_header();
# write generated documenation for each setting
# write generated documentation for each setting
foreach my $c_file (@source_files) {
my $setting_name = get_setting_name($c_file);
if ($setting_name) {

View file

@ -2470,7 +2470,7 @@ proxy_type (GDBusObjectManagerClient *manager,
const char *interface_name,
gpointer user_data)
{
/* ObjectManager asks us for an object proxy. Unfortunatelly, we can't
/* ObjectManager asks us for an object proxy. Unfortunately, we can't
* decide that by interface name and GDBusObjectManager doesn't allow
* us to look at the known interface list. Thus we need to create a
* generic GDBusObject and only couple a NMObject subclass later. */

View file

@ -105,7 +105,7 @@ _nm_dbus_is_connection_private (GDBusConnection *connection)
* rule the proxy added and ensure a less granular rule is present instead.
*
* Also, don't do this immediately since it has a performance penalty.
* Still better than loosing the signals altogether.
* Still better than losing the signals altogether.
*
* Ideally, we should be able to tell glib not to hook its rules:
* https://bugzilla.gnome.org/show_bug.cgi?id=758749

View file

@ -361,7 +361,7 @@ nm_device_vxlan_get_l2miss (NMDeviceVxlan *device)
* nm_device_vxlan_get_l3miss:
* @device: a #NMDeviceVxlan
*
* Returns: wether netlink IP ADDR miss notifications are generated
* Returns: whether netlink IP ADDR miss notifications are generated
*
* Since: 1.2
**/

View file

@ -370,7 +370,7 @@ nm_device_wifi_request_scan (NMDeviceWifi *device,
* after that for the scan to complete.
* This is the same as @nm_device_wifi_request_scan except it accepts @options
* for the scanning. The argument is the dictionary passed to RequestScan()
* D-Bus call. Valid otions inside the dictionary are:
* D-Bus call. Valid options inside the dictionary are:
* 'ssids' => array of SSIDs (saay)
*
* Returns: %TRUE on success, %FALSE on error, in which case @error will be
@ -487,7 +487,7 @@ nm_device_wifi_request_scan_async (NMDeviceWifi *device,
* that for the scan to complete.
* This is the same as @nm_device_wifi_request_scan_async except it accepts @options
* for the scanning. The argument is the dictionary passed to RequestScan()
* D-Bus call. Valid otions inside the dictionary are:
* D-Bus call. Valid options inside the dictionary are:
* 'ssids' => array of SSIDs (saay)
*
* Since: 1.2

View file

@ -2392,7 +2392,7 @@ device_delete_cb (GObject *proxy,
* @callback: callback to be called when delete operation completes
* @user_data: caller-specific data passed to @callback
*
* Asynchronously begins deleteing the software device. Hardware devices can't
* Asynchronously begins deleting the software device. Hardware devices can't
* be deleted.
**/
void

View file

@ -125,7 +125,7 @@ next:
}
if (square_brackets_sensible) {
/* If there's a [<string>] that survived the substitution, then the string
* is a short form that is generally preferrable. */
* is a short form that is generally preferable. */
q = strchr (desc_full, ']');
if (p && q > p) {
p++;

View file

@ -612,7 +612,7 @@ handle_object_property (NMObject *self, const char *property_name, GVariant *val
*
* NOTE: We've ignored this before and the server hits the condition
* more often that it should. Given we're able to recover from
* ther error, let's lower the severity of the log message to
* the error, let's lower the severity of the log message to
* avoid unnecessarily bothering the user. This can be removed
* once the issue is fixed on the server. */
#if NM_MORE_ASSERTS

View file

@ -57,7 +57,7 @@ typedef struct {
/* The "object-creation-failed" method is PRIVATE for libnm and
* is not meant for any external usage. It indicates that an error
* occured during creation of an object.
* occurred during creation of an object.
*/
void (*object_creation_failed) (NMObject *master_object,
const char *failed_path);

View file

@ -1325,7 +1325,7 @@ nm_vpn_service_plugin_initable_iface_init (GInitableIface *iface)
/*****************************************************************************/
/* this header is intended to be copied to users of nm_vpn_editor_plugin_call(),
* to simplify invocation of generic functions. Include it here, to complile
* to simplify invocation of generic functions. Include it here, to compile
* the code. */
#include "nm-utils/nm-vpn-editor-plugin-call.h"

View file

@ -69,7 +69,7 @@ int nm_match_spec_device_by_pllink (const NMPlatformLink *pllink,
* away. It iterates the mainloop for another NM_SHUTDOWN_TIMEOUT_MS_EXTRA. This
* should give time to reap the child process (after SIGKILL).
*
* So, the maxiumum time we should wait before sending SIGKILL should be at most
* So, the maximum time we should wait before sending SIGKILL should be at most
* NM_SHUTDOWN_TIMEOUT_MS.
*/
#define NM_SHUTDOWN_TIMEOUT_MS 1500

View file

@ -7452,7 +7452,7 @@ dhcp4_get_client_id (NMDevice *self,
if (!client_id) {
_LOGD (LOGD_DEVICE | LOGD_DHCP4 | LOGD_IP4,
"ipv4.dhcp-client-id: no explicity client-id configured");
"ipv4.dhcp-client-id: no explicit client-id configured");
return NULL;
}

View file

@ -118,7 +118,7 @@ kill_pid (void)
if (pid_str)
pid = strtol (pid_str, NULL, 10);
if (pid) {
_LOGI ("a fatal error occured, kill dhclient instance with pid %d\n", pid);
_LOGI ("a fatal error occurred, kill dhclient instance with pid %d\n", pid);
kill (pid, SIGTERM);
}
}
@ -190,7 +190,7 @@ do_notify:
_LOGW ("failure to call notify: %s (try signal via Event)", error->message);
g_clear_error (&error);
/* for backward compatibilty, try to emit the signal. There is no stable
/* for backward compatibility, try to emit the signal. There is no stable
* API between the dhcp-helper and NetworkManager. However, while upgrading
* the NetworkManager package, a newer helper might want to notify an
* older server, which still uses the "Event". */

View file

@ -139,7 +139,7 @@ nm_auth_chain_get_data (NMAuthChain *self, const char *tag)
* @self: A #NMAuthChain.
* @tag: A "tag" uniquely identifying the data to steal.
*
* Removes the datum assocated with @tag from the chain's data associations,
* Removes the datum associated with @tag from the chain's data associations,
* without invoking the association's destroy handler. The caller assumes
* ownership over the returned value.
*

View file

@ -801,7 +801,7 @@ read_config (GKeyFile *keyfile, gboolean is_base_config, const char *dirname, co
new_val = _nm_utils_slist_to_strv (new_specs, FALSE);
}
/* merge the string lists, by omiting duplicates. */
/* merge the string lists, by omitting duplicates. */
for (iter_val = old_val; iter_val && *iter_val; iter_val++) {
if ( last_char != '-'
@ -1858,7 +1858,7 @@ state_write (NMConfig *self)
&error)) {
_LOGD ("state: error writing state file \"%s\": %s", filename, error->message);
g_clear_error (&error);
/* we leave the state dirty. That potentally means, that we try to
/* we leave the state dirty. That potentially means, that we try to
* write the file over and over again, although it isn't possible. */
priv->state->p.dirty = TRUE;
} else

View file

@ -708,7 +708,7 @@ _sleep_duration_convert_ms_to_us (guint32 sleep_duration_msec)
* @log_domain: log debug information for this domain. Errors and warnings are logged both
* as %LOGD_CORE and @log_domain.
* @log_name: name of the process to kill for logging.
* @child_status: (out) (allow-none): return the exit status of the child, if no error occured.
* @child_status: (out) (allow-none): return the exit status of the child, if no error occurred.
* @wait_before_kill_msec: Waittime in milliseconds before sending %SIGKILL signal. Set this value
* to zero, not to send %SIGKILL. If @sig is already %SIGKILL, this parameter has not effect.
* @sleep_duration_msec: the synchronous function sleeps repeatedly waiting for the child to terminate.
@ -717,7 +717,7 @@ _sleep_duration_convert_ms_to_us (guint32 sleep_duration_msec)
* Kill a child process synchronously and wait. The function first checks if the child already terminated
* and if it did, return the exit status. Otherwise send one @sig signal. @sig will always be
* sent unless the child already exited. If the child does not exit within @wait_before_kill_msec milliseconds,
* the function will send %SIGKILL and waits for the child indefinitly. If @wait_before_kill_msec is zero, no
* the function will send %SIGKILL and waits for the child indefinitely. If @wait_before_kill_msec is zero, no
* %SIGKILL signal will be sent.
*
* In case of error, errno is preserved to contain the last reason of failure.
@ -894,7 +894,7 @@ out:
* @sleep_duration_msec: the synchronous function sleeps repeatedly waiting for the child to terminate.
* Set to zero, to use the default (meaning 20 wakeups per seconds).
* @max_wait_msec: if 0, waits indefinitely until the process is gone (or a zombie). Otherwise, this
* is the maxium wait time until returning. If @max_wait_msec is non-zero but smaller then @wait_before_kill_msec,
* is the maximum wait time until returning. If @max_wait_msec is non-zero but smaller then @wait_before_kill_msec,
* we will not send a final %SIGKILL.
*
* Kill a non-child process synchronously and wait. This function will not return before the
@ -2231,7 +2231,7 @@ nm_utils_log_connection_diff (NMConnection *connection,
return;
}
/* FIXME: it doesn't nicely show the content of NMSettingVpn, becuase nm_connection_diff() does not
/* FIXME: it doesn't nicely show the content of NMSettingVpn, because nm_connection_diff() does not
* expand the hash values. */
sorted_hashes = _log_connection_sort_hashes (connection, diff_base, connection_diff);
@ -2610,7 +2610,7 @@ _secret_key_read (guint8 **out_secret_key,
}
out:
/* regardless of success or failue, we always return a secret-key. The
/* regardless of success or failure, we always return a secret-key. The
* caller may choose to ignore the error and proceed. */
*out_key_len = key_len;
*out_secret_key = secret_key;
@ -3047,7 +3047,7 @@ nm_utils_stable_id_parse (const char *stable_id,
_stable_id_append (str, deviceid);
else if (g_str_has_prefix (&stable_id[i], "${RANDOM}")) {
/* RANDOM makes not so much sense for cloned-mac-address
* as the result is simmilar to specyifing "cloned-mac-address=random".
* as the result is similar to specyifing "cloned-mac-address=random".
* It makes however sense for RFC 7217 Stable Privacy IPv6 addresses
* where this is effectively the only way to generate a different
* (random) host identifier for each connect.

View file

@ -1182,7 +1182,7 @@ _nm_dbus_manager_obj_notify (NMDBusObject *obj,
priv = NM_DBUS_MANAGER_GET_PRIVATE (self);
/* do a naive search for the matching NMDBusPropertyInfoExtended infos. Since the number of
* (interaces x properties) is static and possibly small, this naive search is effectively
* (interfaces x properties) is static and possibly small, this naive search is effectively
* O(1). We might wanna introduce some index to lookup the properties in question faster.
*
* The nice part of this implementation is however, that the order in which properties
@ -1518,7 +1518,7 @@ nm_dbus_manager_acquire_bus (NMDBusManager *self)
* (3) if we are able to create the connection but registration fails,
* it means that something is borked. Quite possibly another NetworkManager
* instance is running. We need to exit right away.
* To appease (1) and (3), we cannot initalize synchronously, because we need
* To appease (1) and (3), we cannot initialize synchronously, because we need
* to know right away whether another NetworkManager instance is running (3).
**/

View file

@ -395,7 +395,7 @@ _connection_is_vpn (NMConnection *connection)
/* we have an incomplete (invalid) connection at hand. That can only
* happen during AddAndActivate. Determine whether it's VPN type based
* on the existance of a [vpn] section. */
* on the existence of a [vpn] section. */
return !!nm_connection_get_setting_vpn (connection);
}
@ -1728,7 +1728,7 @@ find_parent_device_for_connection (NMManager *self, NMConnection *connection, NM
if (!parent_connection)
return NULL;
/* Check if the parent connection is currently activated or is comaptible
/* Check if the parent connection is currently activated or is compatible
* with some known device.
*/
c_list_for_each_entry (candidate, &priv->devices_lst_head, devices_lst) {
@ -4705,7 +4705,7 @@ nm_manager_activate_connection (NMManager *self,
* is only a partial activation.
* @connection: the partial #NMConnection to be activated (if @sett_conn is unspecified)
* @device_path: the object path of the device to be activated, or NULL
* @out_device: on successful reutrn, the #NMDevice to be activated with @connection
* @out_device: on successful return, the #NMDevice to be activated with @connection
* The caller may pass in a device which shortcuts the lookup by path.
* In this case, the passed in device must have the matching @device_path
* already.
@ -7245,7 +7245,7 @@ set_property (GObject *object, guint prop_id,
g_value_get_boolean (value));
break;
case PROP_WIMAX_ENABLED:
/* WIMAX is depreacted. This does nothing. */
/* WIMAX is deprecated. This does nothing. */
break;
case PROP_CONNECTIVITY_CHECK_ENABLED:
nm_config_set_connectivity_check_enabled (priv->config,

View file

@ -271,7 +271,7 @@ pacrunner_send_done (GObject *source, GAsyncResult *res, gpointer user_data)
g_variant_get (variant, "(&o)", &path);
if (c_list_is_empty (&config->lst)) {
_LOG2D (config, "sent (%s), but destory it right away", path);
_LOG2D (config, "sent (%s), but destroy it right away", path);
g_dbus_proxy_call (priv->pacrunner,
"DestroyProxyConfiguration",
g_variant_new ("(o)", path),

View file

@ -1969,7 +1969,7 @@ device_ip_config_changed (NMDevice *device,
/* We catch already all the IP events registering on the device state changes but
* the ones where the IP changes but the device state keep stable (i.e., activated):
* ignore IP config changes but when the device is in activated state.
* Prevents unecessary changes to DNS information.
* Prevents unnecessary changes to DNS information.
*/
if (nm_device_get_state (device) == NM_DEVICE_STATE_ACTIVATED) {
if (old_config != new_config) {

View file

@ -557,7 +557,7 @@ nm_supplicant_config_add_bgscan (NMSupplicantConfig *self,
NM_SETTING_WIRELESS_MODE_ADHOC))
return TRUE;
/* Don't scan when the connection is locked to a specifc AP, since
/* Don't scan when the connection is locked to a specific AP, since
* intra-ESS roaming (which requires periodic scanning) isn't being
* used due to the specific AP lock. (bgo #513820)
*/

View file

@ -278,7 +278,7 @@ if [ $RESULT -ne 0 -a $RESULT -ne 77 ]; then
UNRESOLVED=$(awk -F: '/obj:\// {print $NF}' "$LOGFILE" | sort | uniq)
if [ -n "$UNRESOLVED" ]; then
echo Some addresses could not be resolved into symbols. >&2
echo The errors might get suppressed when you install the debuging symbols. >&2
echo The errors might get suppressed when you install the debugging symbols. >&2
if [ -x /usr/bin/dnf ]; then
echo Hint: dnf debuginfo-install $UNRESOLVED >&2
elif [ -x /usr/bin/debuginfo-install ]; then