diff --git a/CONTRIBUTING.md b/CONTRIBUTING.md
index da5332fa2..71a93a6fd 100644
--- a/CONTRIBUTING.md
+++ b/CONTRIBUTING.md
@@ -18,7 +18,7 @@ from the PackageKit Coding Style.
* Prefer descriptive names over abbreviations (unless well-known)
and shortening of names. e.g `device` not `dev`
- * Single statments inside if/else should not be enclosed by '{}'
+ * Single statements inside if/else should not be enclosed by '{}'
* Use comments to explain why something is being done, but also avoid
over-documenting the obvious. Here is an example of useless comment:
diff --git a/RELEASE b/RELEASE
index f782b8b92..3bf730080 100644
--- a/RELEASE
+++ b/RELEASE
@@ -29,7 +29,7 @@ git push
ninja dist
-3a. Generate the additon verification metadata
+3a. Generate the additional verification metadata
gpg -b -a meson-dist/fwupd-${release_ver}.tar.xz
diff --git a/contrib/ci/README.md b/contrib/ci/README.md
index c482821f9..227580163 100644
--- a/contrib/ci/README.md
+++ b/contrib/ci/README.md
@@ -90,7 +90,7 @@ The XML is organized by a top level element representing the dependencies needed
The child elements represent individual dependencies for all distributions.
* This element has an attribute ***id*** that represents the most common package name used by distributions
-* This element has an attribute ***type*** that reprsents if the package is needed at build time or runtime.
+* This element has an attribute ***type*** that represents if the package is needed at build time or runtime.
Each dependency then has a mapping to individual distributions (___distro___).
* This element has an attribute ***id*** that represents the distribution.
diff --git a/contrib/firmware-packager/README.md b/contrib/firmware-packager/README.md
index 894a94bff..6b51e6b98 100644
--- a/contrib/firmware-packager/README.md
+++ b/contrib/firmware-packager/README.md
@@ -41,7 +41,7 @@ bin file inside the archive, I would pass `--exe dell-thunderbolt-firmware.exe -
`--developer-name` Name of the firmware developer (e.g. Dell) **REQUIRED**
`--release-version` Version number of the firmware package (e.g. 4.21.01.002) **REQUIRED**
-`--release-description` Description of the firmware release, again this can theoretically include HTML but I didnt try it.
+`--release-description` Description of the firmware release, again this can theoretically include HTML but I didn't try it.
`--exe` Executable file to extract firmware from (e.g. `dell-thunderbolt-firmware.exe`) **REQUIRED**
diff --git a/data/builder/README.md b/data/builder/README.md
index 205065ff0..57dc2dbca 100644
--- a/data/builder/README.md
+++ b/data/builder/README.md
@@ -37,7 +37,7 @@ If, for instance, a plugin needs the old system firmware blob (for a bsdiff)
then the plugin can write to this directory and the startup.sh script will be
able to access it as the chroot-ed `/boot`.
-Firmware `.cab` files using this funtionality should list the `.tar` file:
+Firmware `.cab` files using this functionality should list the `.tar` file:
diff --git a/data/org.freedesktop.fwupd.metainfo.xml b/data/org.freedesktop.fwupd.metainfo.xml
index 904b23ff1..6bd565179 100644
--- a/data/org.freedesktop.fwupd.metainfo.xml
+++ b/data/org.freedesktop.fwupd.metainfo.xml
@@ -291,7 +291,7 @@
Allow building with older meson
Detect the EFI system partition location at runtime
Do not use 8bitdo bootloader commands after a successful flash
- Enable accesing downloaded files in flatpak and snap
+ Enable accessing downloaded files in flatpak and snap
Fix a potential buffer overflow when applying a DFU patch
Fix downgrading older releases to devices
Fix flashing devices that require a manual replug
@@ -405,7 +405,7 @@
Clarify which devices don't have upgrades
Ensure the Thunderbolt version is xx.yy
Fix a daemon warning when using fwupdmgr get-results
- Fix crasher with MST flashing
+ Fix crash with MST flashing
Fix DFU detach with newer releases of libusb
Include the device VID and PID when generating the device-id
Set the RemoteId when using GetDetails
@@ -553,7 +553,7 @@
Disable unifying support if no CONFIG_HIDRAW support
Do not auto-open all USB devices at startup
Do not fail to load the daemon if cached metadata is invalid
- Do not use system-specific infomation for UEFI PCI devices
+ Do not use system-specific information for UEFI PCI devices
Fix a crash when using fu_plugin_device_add_delay()
Fix the libdfu self test failure on s390 and ppc64
Fix various printing issues with the progressbar
@@ -648,7 +648,7 @@
Split up the Unifying HID++2.0 and HID++1.0 functionality
Store the metadata files rather than merging to one store
Use a longer timeout for some Unifying operations
- Use the UFY DeviceID prefix for Unifying devides
+ Use the UFY DeviceID prefix for Unifying devices
diff --git a/docs/libfwupd/libfwupd-docs.xml b/docs/libfwupd/libfwupd-docs.xml
index ad4d01e39..68ad43745 100644
--- a/docs/libfwupd/libfwupd-docs.xml
+++ b/docs/libfwupd/libfwupd-docs.xml
@@ -155,7 +155,7 @@ fu_plugin_startup (FuPlugin *plugin, GError **error)
- Creating an abstact device
+ Creating an abstract device
This section shows how you would create a device which is exported
to the daemon and thus can be queried and updated by the client software.
@@ -294,7 +294,7 @@ fu_plugin_update (FuPlugin *plugin,
For some hardware, we might want to do an action before or after
the actual firmware is squirted into the device.
This could be something as simple as checking the system battery
- level is over a certain theshold, or it could be as complicated as
+ level is over a certain threshold, or it could be as complicated as
ensuring a vendor-specific GPIO is asserted when specific types
of hardware are updated.
@@ -334,7 +334,7 @@ fu_plugin_update_cleanup (FuPlugin *plugin, FuDevice *device, GError **error)
Detaching to bootloader mode
Some hardware can only be updated in a special bootloader mode, which
- for most devices can be switched to automaticaly.
+ for most devices can be switched to automatically.
In some cases the user to do something manually, for instance
re-inserting the hardware with a secret button pressed.
diff --git a/libfwupd/fwupd-client.c b/libfwupd/fwupd-client.c
index 053860929..741a2e65c 100644
--- a/libfwupd/fwupd-client.c
+++ b/libfwupd/fwupd-client.c
@@ -651,7 +651,7 @@ fwupd_client_proxy_call_cb (GObject *source, GAsyncResult *res, gpointer user_da
* @error: the #GError, or %NULL
*
* Activates up a device, which normally means the device switches to a new
- * firmware verson. This should only be called when data loss cannot occur.
+ * firmware version. This should only be called when data loss cannot occur.
*
* Returns: %TRUE for success
*
diff --git a/libfwupd/fwupd-enums.h b/libfwupd/fwupd-enums.h
index 526f54f52..d66579eb2 100644
--- a/libfwupd/fwupd-enums.h
+++ b/libfwupd/fwupd-enums.h
@@ -180,7 +180,7 @@ typedef enum {
* FwupdUpdateState:
* @FWUPD_UPDATE_STATE_UNKNOWN: Unknown
* @FWUPD_UPDATE_STATE_PENDING: Update is pending
- * @FWUPD_UPDATE_STATE_SUCCESS: Update was successfull
+ * @FWUPD_UPDATE_STATE_SUCCESS: Update was successful
* @FWUPD_UPDATE_STATE_FAILED: Update failed
* @FWUPD_UPDATE_STATE_NEEDS_REBOOT: Waiting for a reboot to apply
*
diff --git a/libfwupd/meson.build b/libfwupd/meson.build
index 7c719a610..8ff658411 100644
--- a/libfwupd/meson.build
+++ b/libfwupd/meson.build
@@ -122,7 +122,7 @@ if get_option('introspection')
# 2. The map file is required to build the lib that the GIR is built from
#
# To avoid the circular dep, and to ensure we don't change exported API
- # accidentaly actually check in a version of the version script to git.
+ # accidentally actually check in a version of the version script to git.
mapfile_target = custom_target('mapfile',
input: gir[0],
output: 'fwupd.map',
diff --git a/meson.build b/meson.build
index 1f824457b..42cdc0bd8 100644
--- a/meson.build
+++ b/meson.build
@@ -48,7 +48,7 @@ lt_revision = '0'
lt_age = '0'
lt_version = '@0@.@1@.@2@'.format(lt_current, lt_age, lt_revision)
-# get suported warning flags
+# get supported warning flags
warning_flags = [
'-fstack-protector-strong',
'-Waggregate-return',
@@ -77,7 +77,7 @@ warning_flags = [
'-Wmissing-prototypes',
'-Wnested-externs',
'-Wno-cast-function-type',
- '-Wno-address-of-packed-member', # incompatable with g_autoptr()
+ '-Wno-address-of-packed-member', # incompatible with g_autoptr()
'-Wno-unknown-pragmas',
'-Wno-discarded-qualifiers',
'-Wno-missing-field-initializers',
diff --git a/plugins/dell-dock/fu-dell-dock-i2c-mst.c b/plugins/dell-dock/fu-dell-dock-i2c-mst.c
index 4f24f6603..e8e46c20c 100644
--- a/plugins/dell-dock/fu-dell-dock-i2c-mst.c
+++ b/plugins/dell-dock/fu-dell-dock-i2c-mst.c
@@ -715,7 +715,7 @@ fu_dell_dock_mst_invalidate_bank (FuDevice *symbiote, MSTBank bank_in_use,
new_tag = g_bytes_get_data (bytes_new, NULL);
g_debug ("CRC byte is currently 0x%x", new_tag[3]);
- /* tag succesfully cleared */
+ /* tag successfully cleared */
if ((new_tag[3] == 0xff && crc_tag[3] != 0xff) ||
(new_tag[3] == 0x00 && crc_tag[3] == 0xff)) {
break;
diff --git a/plugins/dfu/dfu-common.h b/plugins/dfu/dfu-common.h
index 0ca325934..19a782eff 100644
--- a/plugins/dfu/dfu-common.h
+++ b/plugins/dfu/dfu-common.h
@@ -115,7 +115,7 @@ typedef enum {
* @DFU_CIPHER_KIND_XTEA: XTEA cipher detected
* @DFU_CIPHER_KIND_RSA: RSA cipher detected
*
- * The type of cipher used for transfering the firmware.
+ * The type of cipher used for transferring the firmware.
**/
typedef enum {
DFU_CIPHER_KIND_NONE,
diff --git a/plugins/dfu/dfu-element.c b/plugins/dfu/dfu-element.c
index f91e0b905..aa146fc52 100644
--- a/plugins/dfu/dfu-element.c
+++ b/plugins/dfu/dfu-element.c
@@ -228,7 +228,7 @@ dfu_element_set_target_size (DfuElement *element, guint32 target_size)
g_assert (buf != NULL);
memcpy (buf, data, length);
- /* set the pading value */
+ /* set the padding value */
if (priv->padding_value != 0x00) {
memset (buf + length,
priv->padding_value,
diff --git a/plugins/dfu/dfu-format-metadata.c b/plugins/dfu/dfu-format-metadata.c
index 3fd05d7b2..519992a2c 100644
--- a/plugins/dfu/dfu-format-metadata.c
+++ b/plugins/dfu/dfu-format-metadata.c
@@ -161,7 +161,7 @@ dfu_firmware_to_metadata (DfuFirmware *firmware, GError **error)
g_set_error (error,
FWUPD_ERROR,
FWUPD_ERROR_NOT_SUPPORTED,
- "metdata key too long: %s",
+ "metadata key too long: %s",
key);
return NULL;
}
diff --git a/plugins/dfu/dfu-self-test.c b/plugins/dfu/dfu-self-test.c
index b387367e6..1232b6aab 100644
--- a/plugins/dfu/dfu-self-test.c
+++ b/plugins/dfu/dfu-self-test.c
@@ -222,7 +222,7 @@ dfu_firmware_dfu_func (void)
g_assert_cmpint (dfu_firmware_get_size (firmware), ==, 0x8eB4);
g_assert_cmpint (dfu_firmware_get_cipher_kind (firmware), ==, DFU_CIPHER_KIND_NONE);
- /* can we roundtrip without loosing data */
+ /* can we roundtrip without losing data */
roundtrip_orig = dfu_self_test_get_bytes_for_file (file, &error);
g_assert_no_error (error);
g_assert (roundtrip_orig != NULL);
@@ -263,7 +263,7 @@ dfu_firmware_dfuse_func (void)
g_assert_cmpint (dfu_firmware_get_size (firmware), ==, 0x168d5);
g_assert_cmpint (dfu_firmware_get_cipher_kind (firmware), ==, DFU_CIPHER_KIND_NONE);
- /* can we roundtrip without loosing data */
+ /* can we roundtrip without losing data */
roundtrip_orig = dfu_self_test_get_bytes_for_file (file, &error);
g_assert_no_error (error);
g_assert (roundtrip_orig != NULL);
@@ -308,7 +308,7 @@ dfu_firmware_metadata_func (void)
g_assert_cmpstr (dfu_firmware_get_metadata (firmware, "key"), ==, "value");
g_assert_cmpstr (dfu_firmware_get_metadata (firmware, "???"), ==, NULL);
- /* can we roundtrip without loosing data */
+ /* can we roundtrip without losing data */
roundtrip_orig = dfu_self_test_get_bytes_for_file (file, &error);
g_assert_no_error (error);
g_assert (roundtrip_orig != NULL);
diff --git a/plugins/dfu/dfu-target-stm.c b/plugins/dfu/dfu-target-stm.c
index 1db778c30..de41292d4 100644
--- a/plugins/dfu/dfu-target-stm.c
+++ b/plugins/dfu/dfu-target-stm.c
@@ -117,7 +117,7 @@ dfu_target_stm_upload_element (DfuTarget *target,
g_set_error (error,
FWUPD_ERROR,
FWUPD_ERROR_NOT_SUPPORTED,
- "memory sector at 0x%04x is not readble",
+ "memory sector at 0x%04x is not readable",
(guint) offset);
return NULL;
}
diff --git a/plugins/dfu/dfu-target.c b/plugins/dfu/dfu-target.c
index ba25d26ce..07e350286 100644
--- a/plugins/dfu/dfu-target.c
+++ b/plugins/dfu/dfu-target.c
@@ -1042,7 +1042,7 @@ dfu_target_upload (DfuTarget *target,
if (zone_cur == zone_last)
continue;
- /* get the size of the entire continous zone */
+ /* get the size of the entire continuous zone */
zone_size = dfu_target_get_size_of_zone (target, zone_cur);
zone_last = zone_cur;
diff --git a/plugins/dfu/dfu-target.h b/plugins/dfu/dfu-target.h
index 25148da9d..609164812 100644
--- a/plugins/dfu/dfu-target.h
+++ b/plugins/dfu/dfu-target.h
@@ -30,7 +30,7 @@ G_DECLARE_DERIVABLE_TYPE (DfuTarget, dfu_target, DFU, TARGET, GUsbDevice)
* @DFU_TARGET_TRANSFER_FLAG_ANY_CIPHER: Allow any cipher kinds to be downloaded
* @DFU_TARGET_TRANSFER_FLAG_ADDR_HEURISTIC: Automatically detect the address to use
*
- * The optional flags used for transfering firmware.
+ * The optional flags used for transferring firmware.
**/
typedef enum {
DFU_TARGET_TRANSFER_FLAG_NONE = 0,
diff --git a/plugins/dfu/dfu-tool.c b/plugins/dfu/dfu-tool.c
index 196415f47..9e7a64d1d 100644
--- a/plugins/dfu/dfu-tool.c
+++ b/plugins/dfu/dfu-tool.c
@@ -2156,7 +2156,7 @@ dfu_tool_detach (DfuToolPrivate *priv, gchar **values, GError **error)
if (priv->transfer_size > 0)
dfu_device_set_transfer_size (device, priv->transfer_size);
- /* detatch */
+ /* detach */
locker = fu_device_locker_new (device, error);
if (locker == NULL)
return FALSE;
diff --git a/plugins/fastboot/README.md b/plugins/fastboot/README.md
index 43eeb3b9e..bff04dffc 100644
--- a/plugins/fastboot/README.md
+++ b/plugins/fastboot/README.md
@@ -9,7 +9,7 @@ This plugin is used to update hardware that uses the fastboot protocol.
Firmware Format
---------------
-The daemon will decompress the cabinet archive and extract a firmare blob in
+The daemon will decompress the cabinet archive and extract a firmware blob in
ZIP file format. Inside the zip file must be all the firmware images for each
partition and a manifest file. The partition images can be in any format, but
the manifest must be either an Android `flashfile.xml` format file, or a QFIL
diff --git a/plugins/rts54hid/fu-rts54hid-device.c b/plugins/rts54hid/fu-rts54hid-device.c
index aba294038..97a5c8e8e 100644
--- a/plugins/rts54hid/fu-rts54hid-device.c
+++ b/plugins/rts54hid/fu-rts54hid-device.c
@@ -277,7 +277,7 @@ fu_rts54hid_device_setup (FuDevice *device, GError **error)
if (!fu_rts54hid_device_ensure_status (self, error))
return FALSE;
- /* both conditons must be set */
+ /* both conditions must be set */
if (!self->fw_auth) {
fu_device_set_update_error (device,
"device does not support authentication");
diff --git a/plugins/rts54hub/fu-rts54hub-device.c b/plugins/rts54hub/fu-rts54hub-device.c
index fe4edb637..a85dffa8f 100644
--- a/plugins/rts54hub/fu-rts54hub-device.c
+++ b/plugins/rts54hub/fu-rts54hub-device.c
@@ -272,7 +272,7 @@ fu_rts54hub_device_setup (FuDevice *device, GError **error)
if (!fu_rts54hub_device_ensure_status (self, error))
return FALSE;
- /* all three conditons must be set */
+ /* all three conditions must be set */
if (!self->running_on_flash) {
fu_device_set_update_error (device,
"device is abnormally running from ROM");
diff --git a/plugins/superio/fu-superio-common.h b/plugins/superio/fu-superio-common.h
index c7d0d2ce8..3060d536a 100644
--- a/plugins/superio/fu-superio-common.h
+++ b/plugins/superio/fu-superio-common.h
@@ -25,7 +25,7 @@ G_BEGIN_DECLS
#define SIO_LDNxx_IDX_IOBAD0 0x60 /* 16 bit */
#define SIO_LDNxx_IDX_IOBAD1 0x62 /* 16 bit */
-/* these registers are only accessable by EC */
+/* these registers are only accessible by EC */
#define GCTRL_ECHIPID1 0x2000
#define GCTRL_ECHIPID2 0x2001
#define GCTRL_ECHIPVER 0x2002
diff --git a/plugins/synapticsmst/fu-plugin-synapticsmst.c b/plugins/synapticsmst/fu-plugin-synapticsmst.c
index 74bd71f0a..fd392f2a9 100644
--- a/plugins/synapticsmst/fu-plugin-synapticsmst.c
+++ b/plugins/synapticsmst/fu-plugin-synapticsmst.c
@@ -317,7 +317,7 @@ fu_plugin_synapticsmst_enumerate (FuPlugin *plugin,
dev_id_str = g_strdup_printf ("MST-DIRECT-%s-0-0", aux_node);
fu_dev = fu_plugin_cache_lookup (plugin, dev_id_str);
- /* If we open succesfully a device exists here */
+ /* If we open successfully a device exists here */
device = synapticsmst_device_new (SYNAPTICSMST_DEVICE_KIND_DIRECT, aux_node, 0, 0);
if (!synapticsmst_device_open (device, &error_local)) {
/* No device exists here, but was there - remove from DB */
diff --git a/plugins/uefi/efi/fwupdate.c b/plugins/uefi/efi/fwupdate.c
index 2022f77b7..f4c740a3d 100644
--- a/plugins/uefi/efi/fwupdate.c
+++ b/plugins/uefi/efi/fwupdate.c
@@ -424,7 +424,7 @@ fwup_delete_boot_entry(VOID)
/*
* check if the boot path created by fwupdate,
- * check with EFI_LOAD_OPTION decription
+ * check with EFI_LOAD_OPTION description
*/
EFI_LOAD_OPTION *load_op = (EFI_LOAD_OPTION *) info_ptr;
if (_StrHasPrefix(load_op->description, L"Linux Firmware Updater") ||
diff --git a/plugins/unifying/README.md b/plugins/unifying/README.md
index c4e913a30..19e05539d 100644
--- a/plugins/unifying/README.md
+++ b/plugins/unifying/README.md
@@ -10,7 +10,7 @@ Nordic (U0007) device and the Texas Instruments (U0008) version.
This plugin will not work with the different "Nano" dongle (U0010) as it does
not use the Unifying protocol.
-Some bootloader protocol infomation was taken from the Mousejack[1] project,
+Some bootloader protocol information was taken from the Mousejack[1] project,
specifically logitech-usb-restore.py and unifying.py. Other documentation was
supplied by Logitech.
diff --git a/plugins/unifying/fu-unifying-bootloader-texas.c b/plugins/unifying/fu-unifying-bootloader-texas.c
index db59d560f..ce29aadaa 100644
--- a/plugins/unifying/fu-unifying-bootloader-texas.c
+++ b/plugins/unifying/fu-unifying-bootloader-texas.c
@@ -157,7 +157,7 @@ fu_unifying_bootloader_texas_write_firmware (FuDevice *device, GBytes *fw, GErro
memcpy (req->data, payload->data, payload->len);
if (!fu_unifying_bootloader_request (self, req, error)) {
g_prefix_error (error,
- "failed to write ram bufer @0x%02x: ",
+ "failed to write ram buffer @0x%02x: ",
req->addr);
return FALSE;
}
diff --git a/plugins/unifying/fu-unifying-peripheral.c b/plugins/unifying/fu-unifying-peripheral.c
index f7d6dc7c4..5d70ebb0e 100644
--- a/plugins/unifying/fu-unifying-peripheral.c
+++ b/plugins/unifying/fu-unifying-peripheral.c
@@ -210,7 +210,7 @@ fu_unifying_peripheral_poll (FuDevice *device, GError **error)
g_warning ("failed to get pending read: %s", error_local->message);
return TRUE;
}
- /* no data to recieve */
+ /* no data to receive */
g_clear_error (&error_local);
}
diff --git a/plugins/wacom-usb/README.md b/plugins/wacom-usb/README.md
index e4bc759b8..1597759a0 100644
--- a/plugins/wacom-usb/README.md
+++ b/plugins/wacom-usb/README.md
@@ -14,7 +14,7 @@ understanding it would be used to build a plugin under a LGPLv2+ licence.
Wacom devices are actually composite devices, with the main ARM CPU being
programmed using a more complicated erase, write, verify algorithm based
on a historical update protocol. The "sub-module" devices use a newer protocol,
-again based on HID, but are handled differently depending on thier type.
+again based on HID, but are handled differently depending on their type.
Firmware Format
---------------
diff --git a/src/fu-device-list.c b/src/fu-device-list.c
index 04cd20f44..34b56b6e3 100644
--- a/src/fu-device-list.c
+++ b/src/fu-device-list.c
@@ -120,7 +120,7 @@ fu_device_list_get_all (FuDeviceList *self)
* @self: A #FuDeviceList
*
* Returns all the active devices that have been added to the device list.
- * An active device is defined as a device that is currently conected and has
+ * An active device is defined as a device that is currently connected and has
* is owned by a plugin.
*
* Returns: (transfer container) (element-type FuDevice): the devices
@@ -649,7 +649,7 @@ fu_device_list_replug_cb (gpointer user_data)
* @device: A #FuDevice
* @error: A #GError, or %NULL
*
- * Waits for a specific devic to replug if %FWUPD_DEVICE_FLAG_WAIT_FOR_REPLUG
+ * Waits for a specific device to replug if %FWUPD_DEVICE_FLAG_WAIT_FOR_REPLUG
* is set.
*
* If the device does not exist this function returns without an error.
diff --git a/src/fu-device.c b/src/fu-device.c
index fda6b8354..1cd17dea5 100644
--- a/src/fu-device.c
+++ b/src/fu-device.c
@@ -2148,7 +2148,7 @@ fu_device_setup (FuDevice *self, GError **error)
* @error: A #GError, or %NULL
*
* Activates up a device, which normally means the device switches to a new
- * firmware verson. This should only be called when data loss cannot occur.
+ * firmware version. This should only be called when data loss cannot occur.
*
* Returns: %TRUE for success
*
diff --git a/src/fu-engine.c b/src/fu-engine.c
index e01d9e059..8a4dcdd76 100644
--- a/src/fu-engine.c
+++ b/src/fu-engine.c
@@ -1355,7 +1355,7 @@ fu_engine_create_release_metadata (FuEngine *self, FuPlugin *plugin, GError **er
* @flags: The #FwupdInstallFlags, e.g. %FWUPD_DEVICE_FLAG_UPDATABLE
* @error: A #GError, or %NULL
*
- * Installs a specfic firmware file on a device.
+ * Installs a specific firmware file on a device.
*
* By this point all the requirements and tests should have been done in
* fu_engine_check_requirements() so this should not fail before running
@@ -3027,7 +3027,7 @@ fu_engine_get_downgrades (FuEngine *self, const gchar *device_id, GError **error
continue;
}
- /* don't show releases we are not allowed to dowgrade to */
+ /* don't show releases we are not allowed to downgrade to */
if (fwupd_release_has_flag (rel_tmp, FWUPD_RELEASE_FLAG_BLOCKED_VERSION)) {
g_string_append_printf (error_str, "%s=lowest, ",
fwupd_release_get_version (rel_tmp));
diff --git a/src/fu-plugin-list.c b/src/fu-plugin-list.c
index c43837a09..08cb3b7eb 100644
--- a/src/fu-plugin-list.c
+++ b/src/fu-plugin-list.c
@@ -21,7 +21,7 @@
*
* This list of plugins provides a way to get the specific plugin quickly using
* a hash table and also any plugin-list specific functionality such as
- * sorting by dependancy order.
+ * sorting by dependency order.
*
* See also: #FuPlugin
*/
diff --git a/src/fu-plugin.c b/src/fu-plugin.c
index 4bef606ad..ee85af14b 100644
--- a/src/fu-plugin.c
+++ b/src/fu-plugin.c
@@ -667,7 +667,7 @@ fu_plugin_set_runtime_versions (FuPlugin *self, GHashTable *runtime_versions)
* @component_id: An AppStream component id, e.g. "org.gnome.Software"
* @version: A version string, e.g. "1.2.3"
*
- * Sets a runtime version of a specific dependancy.
+ * Sets a runtime version of a specific dependency.
*
* Since: 1.0.7
**/
@@ -697,7 +697,7 @@ fu_plugin_set_compile_versions (FuPlugin *self, GHashTable *compile_versions)
* @component_id: An AppStream component id, e.g. "org.gnome.Software"
* @version: A version string, e.g. "1.2.3"
*
- * Sets a compile-time version of a specific dependancy.
+ * Sets a compile-time version of a specific dependency.
*
* Since: 1.0.7
**/
diff --git a/src/fu-util.c b/src/fu-util.c
index 5e1f92e78..81e1c655c 100644
--- a/src/fu-util.c
+++ b/src/fu-util.c
@@ -982,7 +982,7 @@ fu_util_download_chunk_cb (SoupMessage *msg, SoupBuffer *chunk, gpointer user_da
if (header_size < body_length)
return;
- /* calulate percentage */
+ /* calculate percentage */
percentage = (guint) ((100 * body_length) / header_size);
g_debug ("progress: %u%%", percentage);
fu_progressbar_update (priv->progressbar, FWUPD_STATUS_DOWNLOADING, percentage);
diff --git a/src/org.freedesktop.fwupd.xml b/src/org.freedesktop.fwupd.xml
index 4c1f3c27b..4913570ba 100644
--- a/src/org.freedesktop.fwupd.xml
+++ b/src/org.freedesktop.fwupd.xml
@@ -6,7 +6,7 @@
- The interface used for quering firmware for the system.
+ The interface used for querying firmware for the system.