Fix some typos spotted using codespell

This commit is contained in:
Richard Hughes 2019-04-08 12:47:45 +01:00
parent 02ac92c17c
commit dce91204c9
37 changed files with 48 additions and 48 deletions

View File

@ -18,7 +18,7 @@ from the PackageKit Coding Style.
* Prefer descriptive names over abbreviations (unless well-known)
and shortening of names. e.g `device` not `dev`
* Single statments inside if/else should not be enclosed by '{}'
* Single statements inside if/else should not be enclosed by '{}'
* Use comments to explain why something is being done, but also avoid
over-documenting the obvious. Here is an example of useless comment:

View File

@ -29,7 +29,7 @@ git push
ninja dist
3a. Generate the additon verification metadata
3a. Generate the additional verification metadata
gpg -b -a meson-dist/fwupd-${release_ver}.tar.xz

View File

@ -90,7 +90,7 @@ The XML is organized by a top level element representing the dependencies needed
The child elements represent individual dependencies for all distributions.
* This element has an attribute ***id*** that represents the most common package name used by distributions
* This element has an attribute ***type*** that reprsents if the package is needed at build time or runtime.
* This element has an attribute ***type*** that represents if the package is needed at build time or runtime.
Each dependency then has a mapping to individual distributions (___distro___).
* This element has an attribute ***id*** that represents the distribution.

View File

@ -41,7 +41,7 @@ bin file inside the archive, I would pass `--exe dell-thunderbolt-firmware.exe -
`--developer-name` Name of the firmware developer (e.g. Dell) **REQUIRED**
`--release-version` Version number of the firmware package (e.g. 4.21.01.002) **REQUIRED**
`--release-description` Description of the firmware release, again this can theoretically include HTML but I didnt try it.
`--release-description` Description of the firmware release, again this can theoretically include HTML but I didn't try it.
`--exe` Executable file to extract firmware from (e.g. `dell-thunderbolt-firmware.exe`) **REQUIRED**

View File

@ -37,7 +37,7 @@ If, for instance, a plugin needs the old system firmware blob (for a bsdiff)
then the plugin can write to this directory and the startup.sh script will be
able to access it as the chroot-ed `/boot`.
Firmware `.cab` files using this funtionality should list the `.tar` file:
Firmware `.cab` files using this functionality should list the `.tar` file:
<release>
<checksum filename="firmware.tar" target="content"/>

View File

@ -291,7 +291,7 @@
<li>Allow building with older meson</li>
<li>Detect the EFI system partition location at runtime</li>
<li>Do not use 8bitdo bootloader commands after a successful flash</li>
<li>Enable accesing downloaded files in flatpak and snap</li>
<li>Enable accessing downloaded files in flatpak and snap</li>
<li>Fix a potential buffer overflow when applying a DFU patch</li>
<li>Fix downgrading older releases to devices</li>
<li>Fix flashing devices that require a manual replug</li>
@ -405,7 +405,7 @@
<li>Clarify which devices don't have upgrades</li>
<li>Ensure the Thunderbolt version is xx.yy</li>
<li>Fix a daemon warning when using fwupdmgr get-results</li>
<li>Fix crasher with MST flashing</li>
<li>Fix crash with MST flashing</li>
<li>Fix DFU detach with newer releases of libusb</li>
<li>Include the device VID and PID when generating the device-id</li>
<li>Set the RemoteId when using GetDetails</li>
@ -553,7 +553,7 @@
<li>Disable unifying support if no CONFIG_HIDRAW support</li>
<li>Do not auto-open all USB devices at startup</li>
<li>Do not fail to load the daemon if cached metadata is invalid</li>
<li>Do not use system-specific infomation for UEFI PCI devices</li>
<li>Do not use system-specific information for UEFI PCI devices</li>
<li>Fix a crash when using fu_plugin_device_add_delay()</li>
<li>Fix the libdfu self test failure on s390 and ppc64</li>
<li>Fix various printing issues with the progressbar</li>
@ -648,7 +648,7 @@
<li>Split up the Unifying HID++2.0 and HID++1.0 functionality</li>
<li>Store the metadata files rather than merging to one store</li>
<li>Use a longer timeout for some Unifying operations</li>
<li>Use the UFY DeviceID prefix for Unifying devides</li>
<li>Use the UFY DeviceID prefix for Unifying devices</li>
</ul>
</description>
</release>

View File

@ -155,7 +155,7 @@ fu_plugin_startup (FuPlugin *plugin, GError **error)
</section>
<section>
<title>Creating an abstact device</title>
<title>Creating an abstract device</title>
<para>
This section shows how you would create a device which is exported
to the daemon and thus can be queried and updated by the client software.
@ -294,7 +294,7 @@ fu_plugin_update (FuPlugin *plugin,
For some hardware, we might want to do an action before or after
the actual firmware is squirted into the device.
This could be something as simple as checking the system battery
level is over a certain theshold, or it could be as complicated as
level is over a certain threshold, or it could be as complicated as
ensuring a vendor-specific GPIO is asserted when specific types
of hardware are updated.
</para>
@ -334,7 +334,7 @@ fu_plugin_update_cleanup (FuPlugin *plugin, FuDevice *device, GError **error)
<title>Detaching to bootloader mode</title>
<para>
Some hardware can only be updated in a special bootloader mode, which
for most devices can be switched to automaticaly.
for most devices can be switched to automatically.
In some cases the user to do something manually, for instance
re-inserting the hardware with a secret button pressed.
</para>

View File

@ -651,7 +651,7 @@ fwupd_client_proxy_call_cb (GObject *source, GAsyncResult *res, gpointer user_da
* @error: the #GError, or %NULL
*
* Activates up a device, which normally means the device switches to a new
* firmware verson. This should only be called when data loss cannot occur.
* firmware version. This should only be called when data loss cannot occur.
*
* Returns: %TRUE for success
*

View File

@ -180,7 +180,7 @@ typedef enum {
* FwupdUpdateState:
* @FWUPD_UPDATE_STATE_UNKNOWN: Unknown
* @FWUPD_UPDATE_STATE_PENDING: Update is pending
* @FWUPD_UPDATE_STATE_SUCCESS: Update was successfull
* @FWUPD_UPDATE_STATE_SUCCESS: Update was successful
* @FWUPD_UPDATE_STATE_FAILED: Update failed
* @FWUPD_UPDATE_STATE_NEEDS_REBOOT: Waiting for a reboot to apply
*

View File

@ -122,7 +122,7 @@ if get_option('introspection')
# 2. The map file is required to build the lib that the GIR is built from
#
# To avoid the circular dep, and to ensure we don't change exported API
# accidentaly actually check in a version of the version script to git.
# accidentally actually check in a version of the version script to git.
mapfile_target = custom_target('mapfile',
input: gir[0],
output: 'fwupd.map',

View File

@ -48,7 +48,7 @@ lt_revision = '0'
lt_age = '0'
lt_version = '@0@.@1@.@2@'.format(lt_current, lt_age, lt_revision)
# get suported warning flags
# get supported warning flags
warning_flags = [
'-fstack-protector-strong',
'-Waggregate-return',
@ -77,7 +77,7 @@ warning_flags = [
'-Wmissing-prototypes',
'-Wnested-externs',
'-Wno-cast-function-type',
'-Wno-address-of-packed-member', # incompatable with g_autoptr()
'-Wno-address-of-packed-member', # incompatible with g_autoptr()
'-Wno-unknown-pragmas',
'-Wno-discarded-qualifiers',
'-Wno-missing-field-initializers',

View File

@ -715,7 +715,7 @@ fu_dell_dock_mst_invalidate_bank (FuDevice *symbiote, MSTBank bank_in_use,
new_tag = g_bytes_get_data (bytes_new, NULL);
g_debug ("CRC byte is currently 0x%x", new_tag[3]);
/* tag succesfully cleared */
/* tag successfully cleared */
if ((new_tag[3] == 0xff && crc_tag[3] != 0xff) ||
(new_tag[3] == 0x00 && crc_tag[3] == 0xff)) {
break;

View File

@ -115,7 +115,7 @@ typedef enum {
* @DFU_CIPHER_KIND_XTEA: XTEA cipher detected
* @DFU_CIPHER_KIND_RSA: RSA cipher detected
*
* The type of cipher used for transfering the firmware.
* The type of cipher used for transferring the firmware.
**/
typedef enum {
DFU_CIPHER_KIND_NONE,

View File

@ -228,7 +228,7 @@ dfu_element_set_target_size (DfuElement *element, guint32 target_size)
g_assert (buf != NULL);
memcpy (buf, data, length);
/* set the pading value */
/* set the padding value */
if (priv->padding_value != 0x00) {
memset (buf + length,
priv->padding_value,

View File

@ -161,7 +161,7 @@ dfu_firmware_to_metadata (DfuFirmware *firmware, GError **error)
g_set_error (error,
FWUPD_ERROR,
FWUPD_ERROR_NOT_SUPPORTED,
"metdata key too long: %s",
"metadata key too long: %s",
key);
return NULL;
}

View File

@ -222,7 +222,7 @@ dfu_firmware_dfu_func (void)
g_assert_cmpint (dfu_firmware_get_size (firmware), ==, 0x8eB4);
g_assert_cmpint (dfu_firmware_get_cipher_kind (firmware), ==, DFU_CIPHER_KIND_NONE);
/* can we roundtrip without loosing data */
/* can we roundtrip without losing data */
roundtrip_orig = dfu_self_test_get_bytes_for_file (file, &error);
g_assert_no_error (error);
g_assert (roundtrip_orig != NULL);
@ -263,7 +263,7 @@ dfu_firmware_dfuse_func (void)
g_assert_cmpint (dfu_firmware_get_size (firmware), ==, 0x168d5);
g_assert_cmpint (dfu_firmware_get_cipher_kind (firmware), ==, DFU_CIPHER_KIND_NONE);
/* can we roundtrip without loosing data */
/* can we roundtrip without losing data */
roundtrip_orig = dfu_self_test_get_bytes_for_file (file, &error);
g_assert_no_error (error);
g_assert (roundtrip_orig != NULL);
@ -308,7 +308,7 @@ dfu_firmware_metadata_func (void)
g_assert_cmpstr (dfu_firmware_get_metadata (firmware, "key"), ==, "value");
g_assert_cmpstr (dfu_firmware_get_metadata (firmware, "???"), ==, NULL);
/* can we roundtrip without loosing data */
/* can we roundtrip without losing data */
roundtrip_orig = dfu_self_test_get_bytes_for_file (file, &error);
g_assert_no_error (error);
g_assert (roundtrip_orig != NULL);

View File

@ -117,7 +117,7 @@ dfu_target_stm_upload_element (DfuTarget *target,
g_set_error (error,
FWUPD_ERROR,
FWUPD_ERROR_NOT_SUPPORTED,
"memory sector at 0x%04x is not readble",
"memory sector at 0x%04x is not readable",
(guint) offset);
return NULL;
}

View File

@ -1042,7 +1042,7 @@ dfu_target_upload (DfuTarget *target,
if (zone_cur == zone_last)
continue;
/* get the size of the entire continous zone */
/* get the size of the entire continuous zone */
zone_size = dfu_target_get_size_of_zone (target, zone_cur);
zone_last = zone_cur;

View File

@ -30,7 +30,7 @@ G_DECLARE_DERIVABLE_TYPE (DfuTarget, dfu_target, DFU, TARGET, GUsbDevice)
* @DFU_TARGET_TRANSFER_FLAG_ANY_CIPHER: Allow any cipher kinds to be downloaded
* @DFU_TARGET_TRANSFER_FLAG_ADDR_HEURISTIC: Automatically detect the address to use
*
* The optional flags used for transfering firmware.
* The optional flags used for transferring firmware.
**/
typedef enum {
DFU_TARGET_TRANSFER_FLAG_NONE = 0,

View File

@ -2156,7 +2156,7 @@ dfu_tool_detach (DfuToolPrivate *priv, gchar **values, GError **error)
if (priv->transfer_size > 0)
dfu_device_set_transfer_size (device, priv->transfer_size);
/* detatch */
/* detach */
locker = fu_device_locker_new (device, error);
if (locker == NULL)
return FALSE;

View File

@ -9,7 +9,7 @@ This plugin is used to update hardware that uses the fastboot protocol.
Firmware Format
---------------
The daemon will decompress the cabinet archive and extract a firmare blob in
The daemon will decompress the cabinet archive and extract a firmware blob in
ZIP file format. Inside the zip file must be all the firmware images for each
partition and a manifest file. The partition images can be in any format, but
the manifest must be either an Android `flashfile.xml` format file, or a QFIL

View File

@ -277,7 +277,7 @@ fu_rts54hid_device_setup (FuDevice *device, GError **error)
if (!fu_rts54hid_device_ensure_status (self, error))
return FALSE;
/* both conditons must be set */
/* both conditions must be set */
if (!self->fw_auth) {
fu_device_set_update_error (device,
"device does not support authentication");

View File

@ -272,7 +272,7 @@ fu_rts54hub_device_setup (FuDevice *device, GError **error)
if (!fu_rts54hub_device_ensure_status (self, error))
return FALSE;
/* all three conditons must be set */
/* all three conditions must be set */
if (!self->running_on_flash) {
fu_device_set_update_error (device,
"device is abnormally running from ROM");

View File

@ -25,7 +25,7 @@ G_BEGIN_DECLS
#define SIO_LDNxx_IDX_IOBAD0 0x60 /* 16 bit */
#define SIO_LDNxx_IDX_IOBAD1 0x62 /* 16 bit */
/* these registers are only accessable by EC */
/* these registers are only accessible by EC */
#define GCTRL_ECHIPID1 0x2000
#define GCTRL_ECHIPID2 0x2001
#define GCTRL_ECHIPVER 0x2002

View File

@ -317,7 +317,7 @@ fu_plugin_synapticsmst_enumerate (FuPlugin *plugin,
dev_id_str = g_strdup_printf ("MST-DIRECT-%s-0-0", aux_node);
fu_dev = fu_plugin_cache_lookup (plugin, dev_id_str);
/* If we open succesfully a device exists here */
/* If we open successfully a device exists here */
device = synapticsmst_device_new (SYNAPTICSMST_DEVICE_KIND_DIRECT, aux_node, 0, 0);
if (!synapticsmst_device_open (device, &error_local)) {
/* No device exists here, but was there - remove from DB */

View File

@ -424,7 +424,7 @@ fwup_delete_boot_entry(VOID)
/*
* check if the boot path created by fwupdate,
* check with EFI_LOAD_OPTION decription
* check with EFI_LOAD_OPTION description
*/
EFI_LOAD_OPTION *load_op = (EFI_LOAD_OPTION *) info_ptr;
if (_StrHasPrefix(load_op->description, L"Linux Firmware Updater") ||

View File

@ -10,7 +10,7 @@ Nordic (U0007) device and the Texas Instruments (U0008) version.
This plugin will not work with the different "Nano" dongle (U0010) as it does
not use the Unifying protocol.
Some bootloader protocol infomation was taken from the Mousejack[1] project,
Some bootloader protocol information was taken from the Mousejack[1] project,
specifically logitech-usb-restore.py and unifying.py. Other documentation was
supplied by Logitech.

View File

@ -157,7 +157,7 @@ fu_unifying_bootloader_texas_write_firmware (FuDevice *device, GBytes *fw, GErro
memcpy (req->data, payload->data, payload->len);
if (!fu_unifying_bootloader_request (self, req, error)) {
g_prefix_error (error,
"failed to write ram bufer @0x%02x: ",
"failed to write ram buffer @0x%02x: ",
req->addr);
return FALSE;
}

View File

@ -210,7 +210,7 @@ fu_unifying_peripheral_poll (FuDevice *device, GError **error)
g_warning ("failed to get pending read: %s", error_local->message);
return TRUE;
}
/* no data to recieve */
/* no data to receive */
g_clear_error (&error_local);
}

View File

@ -14,7 +14,7 @@ understanding it would be used to build a plugin under a LGPLv2+ licence.
Wacom devices are actually composite devices, with the main ARM CPU being
programmed using a more complicated erase, write, verify algorithm based
on a historical update protocol. The "sub-module" devices use a newer protocol,
again based on HID, but are handled differently depending on thier type.
again based on HID, but are handled differently depending on their type.
Firmware Format
---------------

View File

@ -120,7 +120,7 @@ fu_device_list_get_all (FuDeviceList *self)
* @self: A #FuDeviceList
*
* Returns all the active devices that have been added to the device list.
* An active device is defined as a device that is currently conected and has
* An active device is defined as a device that is currently connected and has
* is owned by a plugin.
*
* Returns: (transfer container) (element-type FuDevice): the devices
@ -649,7 +649,7 @@ fu_device_list_replug_cb (gpointer user_data)
* @device: A #FuDevice
* @error: A #GError, or %NULL
*
* Waits for a specific devic to replug if %FWUPD_DEVICE_FLAG_WAIT_FOR_REPLUG
* Waits for a specific device to replug if %FWUPD_DEVICE_FLAG_WAIT_FOR_REPLUG
* is set.
*
* If the device does not exist this function returns without an error.

View File

@ -2148,7 +2148,7 @@ fu_device_setup (FuDevice *self, GError **error)
* @error: A #GError, or %NULL
*
* Activates up a device, which normally means the device switches to a new
* firmware verson. This should only be called when data loss cannot occur.
* firmware version. This should only be called when data loss cannot occur.
*
* Returns: %TRUE for success
*

View File

@ -1355,7 +1355,7 @@ fu_engine_create_release_metadata (FuEngine *self, FuPlugin *plugin, GError **er
* @flags: The #FwupdInstallFlags, e.g. %FWUPD_DEVICE_FLAG_UPDATABLE
* @error: A #GError, or %NULL
*
* Installs a specfic firmware file on a device.
* Installs a specific firmware file on a device.
*
* By this point all the requirements and tests should have been done in
* fu_engine_check_requirements() so this should not fail before running
@ -3027,7 +3027,7 @@ fu_engine_get_downgrades (FuEngine *self, const gchar *device_id, GError **error
continue;
}
/* don't show releases we are not allowed to dowgrade to */
/* don't show releases we are not allowed to downgrade to */
if (fwupd_release_has_flag (rel_tmp, FWUPD_RELEASE_FLAG_BLOCKED_VERSION)) {
g_string_append_printf (error_str, "%s=lowest, ",
fwupd_release_get_version (rel_tmp));

View File

@ -21,7 +21,7 @@
*
* This list of plugins provides a way to get the specific plugin quickly using
* a hash table and also any plugin-list specific functionality such as
* sorting by dependancy order.
* sorting by dependency order.
*
* See also: #FuPlugin
*/

View File

@ -667,7 +667,7 @@ fu_plugin_set_runtime_versions (FuPlugin *self, GHashTable *runtime_versions)
* @component_id: An AppStream component id, e.g. "org.gnome.Software"
* @version: A version string, e.g. "1.2.3"
*
* Sets a runtime version of a specific dependancy.
* Sets a runtime version of a specific dependency.
*
* Since: 1.0.7
**/
@ -697,7 +697,7 @@ fu_plugin_set_compile_versions (FuPlugin *self, GHashTable *compile_versions)
* @component_id: An AppStream component id, e.g. "org.gnome.Software"
* @version: A version string, e.g. "1.2.3"
*
* Sets a compile-time version of a specific dependancy.
* Sets a compile-time version of a specific dependency.
*
* Since: 1.0.7
**/

View File

@ -982,7 +982,7 @@ fu_util_download_chunk_cb (SoupMessage *msg, SoupBuffer *chunk, gpointer user_da
if (header_size < body_length)
return;
/* calulate percentage */
/* calculate percentage */
percentage = (guint) ((100 * body_length) / header_size);
g_debug ("progress: %u%%", percentage);
fu_progressbar_update (priv->progressbar, FWUPD_STATUS_DOWNLOADING, percentage);

View File

@ -6,7 +6,7 @@
<doc:doc>
<doc:description>
<doc:para>
The interface used for quering firmware for the system.
The interface used for querying firmware for the system.
</doc:para>
</doc:description>
</doc:doc>