mirror of
https://gitlab.freedesktop.org/NetworkManager/NetworkManager.git
synced 2025-12-20 07:00:05 +01:00
all: fix typos in documentation and comments
https://bugzilla.gnome.org/show_bug.cgi?id=780199 [thaller@redhat.com: reworded commit message]
This commit is contained in:
parent
5022e3b8ee
commit
4c6edb22b7
9 changed files with 17 additions and 17 deletions
|
|
@ -1,4 +1,4 @@
|
|||
# This configuration file, when placed into into
|
||||
# This configuration file, when placed into
|
||||
# @sysconfdir@/NetworkManager/conf.d will change NetworkManager's
|
||||
# behavior to what's expected on "traditional UNIX server" type
|
||||
# deployments.
|
||||
|
|
|
|||
|
|
@ -4566,7 +4566,7 @@ nm_setting_802_1x_class_init (NMSetting8021xClass *setting_class)
|
|||
* property must be set to password used to decrypt the PKCS#<!-- -->12
|
||||
* certificate and key. When using PKCS#<!-- -->12 files and the path
|
||||
* scheme, this property should be set to the full UTF-8 encoded path of the
|
||||
* key, prefixed with the string "file://" and and ending with a terminating
|
||||
* key, prefixed with the string "file://" and ending with a terminating
|
||||
* NUL byte, and as with the blob scheme the "private-key-password" property
|
||||
* must be set to the password used to decode the PKCS#<!-- -->12 private
|
||||
* key and certificate.
|
||||
|
|
@ -4658,7 +4658,7 @@ nm_setting_802_1x_class_init (NMSetting8021xClass *setting_class)
|
|||
* property must be set to password used to decrypt the PKCS#<!-- -->12
|
||||
* certificate and key. When using PKCS#<!-- -->12 files and the path
|
||||
* scheme, this property should be set to the full UTF-8 encoded path of the
|
||||
* key, prefixed with the string "file://" and and ending with a terminating
|
||||
* key, prefixed with the string "file://" and ending with a terminating
|
||||
* NUL byte, and as with the blob scheme the
|
||||
* #NMSetting8021x:phase2-private-key-password property must be set to the
|
||||
* password used to decode the PKCS#<!-- -->12 private key and certificate.
|
||||
|
|
|
|||
|
|
@ -1267,7 +1267,7 @@ nm_ip_route_attribute_validate (const char *name,
|
|||
g_set_error (error,
|
||||
NM_CONNECTION_ERROR,
|
||||
NM_CONNECTION_ERROR_FAILED,
|
||||
_("invalid attribute type'%s'"),
|
||||
_("invalid attribute type '%s'"),
|
||||
g_variant_get_type_string (value));
|
||||
return FALSE;
|
||||
}
|
||||
|
|
|
|||
|
|
@ -251,7 +251,7 @@ verify_macsec_key (const char *key, gboolean cak, GError **error)
|
|||
g_set_error_literal (error,
|
||||
NM_CONNECTION_ERROR,
|
||||
NM_CONNECTION_ERROR_INVALID_PROPERTY,
|
||||
_("the key contais non-hexadecimal characters"));
|
||||
_("the key contains non-hexadecimal characters"));
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
|
|
|
|||
|
|
@ -182,7 +182,7 @@ nm_setting_wireless_security_get_proto (NMSettingWirelessSecurity *setting, guin
|
|||
* by this connection only supports WPA2/RSN, the connection cannot be used
|
||||
* with the access point.
|
||||
*
|
||||
* Returns: %TRUE if the protocol was new and and was added to the allowed
|
||||
* Returns: %TRUE if the protocol was new and was added to the allowed
|
||||
* protocol list, or %FALSE if it was already in the list
|
||||
**/
|
||||
gboolean
|
||||
|
|
@ -236,7 +236,7 @@ nm_setting_wireless_security_remove_proto (NMSettingWirelessSecurity *setting, g
|
|||
*
|
||||
* Removes a protocol from the allowed protocol list.
|
||||
*
|
||||
* Returns: %TRUE if the protocol was found and removed; %FALSE it it was not.
|
||||
* Returns: %TRUE if the protocol was found and removed; %FALSE if it was not.
|
||||
**/
|
||||
gboolean
|
||||
nm_setting_wireless_security_remove_proto_by_value (NMSettingWirelessSecurity *setting,
|
||||
|
|
@ -382,7 +382,7 @@ nm_setting_wireless_security_remove_pairwise (NMSettingWirelessSecurity *setting
|
|||
* Removes an encryption algorithm from the allowed pairwise encryption
|
||||
* algorithm list.
|
||||
*
|
||||
* Returns: %TRUE if the encryption algorith was found and removed; %FALSE it it was not.
|
||||
* Returns: %TRUE if the encryption algorith was found and removed; %FALSE if it was not.
|
||||
**/
|
||||
gboolean
|
||||
nm_setting_wireless_security_remove_pairwise_by_value (NMSettingWirelessSecurity *setting,
|
||||
|
|
@ -530,7 +530,7 @@ nm_setting_wireless_security_remove_group (NMSettingWirelessSecurity *setting, g
|
|||
* Removes an encryption algorithm from the allowed groupwise encryption
|
||||
* algorithm list.
|
||||
*
|
||||
* Returns: %TRUE if the algorithm was found and removed; %FALSE it it was not.
|
||||
* Returns: %TRUE if the algorithm was found and removed; %FALSE if it was not.
|
||||
**/
|
||||
gboolean
|
||||
nm_setting_wireless_security_remove_group_by_value (NMSettingWirelessSecurity *setting,
|
||||
|
|
|
|||
|
|
@ -3560,7 +3560,7 @@ nm_setting_802_1x_class_init (NMSetting8021xClass *setting_class)
|
|||
* #NMSetting8021x:private-key-password property must be set to password
|
||||
* used to decrypt the PKCS#<!-- -->12 certificate and key. When using PKCS#<!-- -->12 files
|
||||
* and the path scheme, this property should be set to the full UTF-8
|
||||
* encoded path of the key, prefixed with the string "file://" and and
|
||||
* encoded path of the key, prefixed with the string "file://" and
|
||||
* ending with a terminating NUL byte, and as with the blob scheme the
|
||||
* "private-key-password" property must be set to the password used to
|
||||
* decode the PKCS#<!-- -->12 private key and certificate.
|
||||
|
|
@ -3632,7 +3632,7 @@ nm_setting_802_1x_class_init (NMSetting8021xClass *setting_class)
|
|||
* password used to decrypt the PKCS#<!-- -->12 certificate and key. When using
|
||||
* PKCS#<!-- -->12 files and the path scheme, this property should be set to the
|
||||
* full UTF-8 encoded path of the key, prefixed with the string "file://"
|
||||
* and and ending with a terminating NUL byte, and as with the blob scheme
|
||||
* and ending with a terminating NUL byte, and as with the blob scheme
|
||||
* the #NMSetting8021x:phase2-private-key-password property must be set to
|
||||
* the password used to decode the PKCS#<!-- -->12 private key and certificate.
|
||||
*
|
||||
|
|
|
|||
|
|
@ -206,7 +206,7 @@ nm_setting_wireless_security_get_proto (NMSettingWirelessSecurity *setting, guin
|
|||
* by this connection only supports WPA2/RSN, the connection cannot be used
|
||||
* with the access point.
|
||||
*
|
||||
* Returns: %TRUE if the protocol was new and and was added to the allowed
|
||||
* Returns: %TRUE if the protocol was new and was added to the allowed
|
||||
* protocol list, or %FALSE if it was already in the list
|
||||
**/
|
||||
gboolean
|
||||
|
|
@ -260,7 +260,7 @@ nm_setting_wireless_security_remove_proto (NMSettingWirelessSecurity *setting, g
|
|||
*
|
||||
* Removes a protocol from the allowed protocol list.
|
||||
*
|
||||
* Returns: %TRUE if the protocol was found and removed; %FALSE it it was not.
|
||||
* Returns: %TRUE if the protocol was found and removed; %FALSE if it was not.
|
||||
*
|
||||
* Since: 0.9.10
|
||||
**/
|
||||
|
|
@ -408,7 +408,7 @@ nm_setting_wireless_security_remove_pairwise (NMSettingWirelessSecurity *setting
|
|||
* Removes an encryption algorithm from the allowed pairwise encryption
|
||||
* algorithm list.
|
||||
*
|
||||
* Returns: %TRUE if the encryption algorith was found and removed; %FALSE it it was not.
|
||||
* Returns: %TRUE if the encryption algorith was found and removed; %FALSE if it was not.
|
||||
*
|
||||
* Since: 0.9.10
|
||||
**/
|
||||
|
|
@ -558,7 +558,7 @@ nm_setting_wireless_security_remove_group (NMSettingWirelessSecurity *setting, g
|
|||
* Removes an encryption algorithm from the allowed groupwise encryption
|
||||
* algorithm list.
|
||||
*
|
||||
* Returns: %TRUE if the algorithm was found and removed; %FALSE it it was not.
|
||||
* Returns: %TRUE if the algorithm was found and removed; %FALSE if it was not.
|
||||
*
|
||||
* Since: 0.9.10
|
||||
**/
|
||||
|
|
|
|||
|
|
@ -5685,7 +5685,7 @@ connection_requires_carrier (NMConnection *connection)
|
|||
return TRUE;
|
||||
}
|
||||
|
||||
/* If an IP version wants a carrier and and the other IP version isn't
|
||||
/* If an IP version wants a carrier and the other IP version isn't
|
||||
* used, the connection requires carrier since it will just fail without one.
|
||||
*/
|
||||
if (ip4_carrier_wanted && !ip6_used)
|
||||
|
|
|
|||
|
|
@ -178,7 +178,7 @@ remove_agent (NMAgentManager *self, const char *owner)
|
|||
while (g_hash_table_iter_next (&iter, &data, NULL))
|
||||
request_remove_agent ((Request *) data, agent, &pending_reqs);
|
||||
|
||||
/* We cannot call request_next_agent() from from within hash iterating loop,
|
||||
/* We cannot call request_next_agent() from within hash iterating loop,
|
||||
* because it may remove the request from the hash table, which invalidates
|
||||
* the iterator. So, only remove the agent from requests. And store the requests
|
||||
* that should be sent to other agent to a temporary list to proceed afterwards.
|
||||
|
|
|
|||
Loading…
Add table
Reference in a new issue