Browse Source

fix communication typo in https manpage

Reported-By: lintian spelling-error-in-manpage
tags/devuan/2.0.1+devuan1
David Kalnischkies 2 years ago
parent
commit
67bbd75cdd
12 changed files with 12 additions and 12 deletions
  1. +1
    -1
      apt-pkg/pkgsystem.cc
  2. +1
    -1
      doc/apt-transport-https.1.xml
  3. +1
    -1
      doc/po/apt-doc.pot
  4. +1
    -1
      doc/po/de.po
  5. +1
    -1
      doc/po/es.po
  6. +1
    -1
      doc/po/fr.po
  7. +1
    -1
      doc/po/it.po
  8. +1
    -1
      doc/po/ja.po
  9. +1
    -1
      doc/po/nl.po
  10. +1
    -1
      doc/po/pl.po
  11. +1
    -1
      doc/po/pt.po
  12. +1
    -1
      doc/po/pt_BR.po

+ 1
- 1
apt-pkg/pkgsystem.cc View File

@@ -72,7 +72,7 @@ std::vector<std::string> pkgSystem::ArchitecturesSupported() const /*{{{*/
return {};
}
/*}}}*/
// pkgSystem::Set/GetVersionMapping - for internal/external communcation/*{{{*/
// pkgSystem::Set/GetVersionMapping - for internal/external communication/*{{{*/
void pkgSystem::SetVersionMapping(map_id_t const in, map_id_t const out)
{
if (in == out)


+ 1
- 1
doc/apt-transport-https.1.xml View File

@@ -38,7 +38,7 @@ a user but used by APT tools based on user configuration.</para>
which, as indicated by the appended S, is wrapped in an encrypted layer known as
Transport Layer Security (TLS) to provide end-to-end encryption.
A sufficiently capable attacker can still observe the communication partners
and deeper analyse of the encrypted communcation might still reveal important details.
and deeper analyse of the encrypted communication might still reveal important details.
An overview over available alternative transport methods is given in &sources-list;.</para>
</refsect1>



+ 1
- 1
doc/po/apt-doc.pot View File

@@ -7235,7 +7235,7 @@ msgid ""
"&apt-transport-http;), which, as indicated by the appended S, is wrapped in "
"an encrypted layer known as Transport Layer Security (TLS) to provide "
"end-to-end encryption. A sufficiently capable attacker can still observe "
"the communication partners and deeper analyse of the encrypted communcation "
"the communication partners and deeper analyse of the encrypted communication "
"might still reveal important details. An overview over available "
"alternative transport methods is given in &sources-list;."
msgstr ""


+ 1
- 1
doc/po/de.po View File

@@ -10349,7 +10349,7 @@ msgid ""
"http;), which, as indicated by the appended S, is wrapped in an encrypted "
"layer known as Transport Layer Security (TLS) to provide end-to-end "
"encryption. A sufficiently capable attacker can still observe the "
"communication partners and deeper analyse of the encrypted communcation "
"communication partners and deeper analyse of the encrypted communication "
"might still reveal important details. An overview over available "
"alternative transport methods is given in &sources-list;."
msgstr ""


+ 1
- 1
doc/po/es.po View File

@@ -10082,7 +10082,7 @@ msgid ""
"http;), which, as indicated by the appended S, is wrapped in an encrypted "
"layer known as Transport Layer Security (TLS) to provide end-to-end "
"encryption. A sufficiently capable attacker can still observe the "
"communication partners and deeper analyse of the encrypted communcation "
"communication partners and deeper analyse of the encrypted communication "
"might still reveal important details. An overview over available "
"alternative transport methods is given in &sources-list;."
msgstr ""


+ 1
- 1
doc/po/fr.po View File

@@ -10254,7 +10254,7 @@ msgid ""
"http;), which, as indicated by the appended S, is wrapped in an encrypted "
"layer known as Transport Layer Security (TLS) to provide end-to-end "
"encryption. A sufficiently capable attacker can still observe the "
"communication partners and deeper analyse of the encrypted communcation "
"communication partners and deeper analyse of the encrypted communication "
"might still reveal important details. An overview over available "
"alternative transport methods is given in &sources-list;."
msgstr ""


+ 1
- 1
doc/po/it.po View File

@@ -10239,7 +10239,7 @@ msgid ""
"http;), which, as indicated by the appended S, is wrapped in an encrypted "
"layer known as Transport Layer Security (TLS) to provide end-to-end "
"encryption. A sufficiently capable attacker can still observe the "
"communication partners and deeper analyse of the encrypted communcation "
"communication partners and deeper analyse of the encrypted communication "
"might still reveal important details. An overview over available "
"alternative transport methods is given in &sources-list;."
msgstr ""


+ 1
- 1
doc/po/ja.po View File

@@ -9852,7 +9852,7 @@ msgid ""
"http;), which, as indicated by the appended S, is wrapped in an encrypted "
"layer known as Transport Layer Security (TLS) to provide end-to-end "
"encryption. A sufficiently capable attacker can still observe the "
"communication partners and deeper analyse of the encrypted communcation "
"communication partners and deeper analyse of the encrypted communication "
"might still reveal important details. An overview over available "
"alternative transport methods is given in &sources-list;."
msgstr ""


+ 1
- 1
doc/po/nl.po View File

@@ -10475,7 +10475,7 @@ msgid ""
"http;), which, as indicated by the appended S, is wrapped in an encrypted "
"layer known as Transport Layer Security (TLS) to provide end-to-end "
"encryption. A sufficiently capable attacker can still observe the "
"communication partners and deeper analyse of the encrypted communcation "
"communication partners and deeper analyse of the encrypted communication "
"might still reveal important details. An overview over available "
"alternative transport methods is given in &sources-list;."
msgstr ""


+ 1
- 1
doc/po/pl.po View File

@@ -9239,7 +9239,7 @@ msgid ""
"http;), which, as indicated by the appended S, is wrapped in an encrypted "
"layer known as Transport Layer Security (TLS) to provide end-to-end "
"encryption. A sufficiently capable attacker can still observe the "
"communication partners and deeper analyse of the encrypted communcation "
"communication partners and deeper analyse of the encrypted communication "
"might still reveal important details. An overview over available "
"alternative transport methods is given in &sources-list;."
msgstr ""


+ 1
- 1
doc/po/pt.po View File

@@ -10018,7 +10018,7 @@ msgid ""
"http;), which, as indicated by the appended S, is wrapped in an encrypted "
"layer known as Transport Layer Security (TLS) to provide end-to-end "
"encryption. A sufficiently capable attacker can still observe the "
"communication partners and deeper analyse of the encrypted communcation "
"communication partners and deeper analyse of the encrypted communication "
"might still reveal important details. An overview over available "
"alternative transport methods is given in &sources-list;."
msgstr ""


+ 1
- 1
doc/po/pt_BR.po View File

@@ -7560,7 +7560,7 @@ msgid ""
"http;), which, as indicated by the appended S, is wrapped in an encrypted "
"layer known as Transport Layer Security (TLS) to provide end-to-end "
"encryption. A sufficiently capable attacker can still observe the "
"communication partners and deeper analyse of the encrypted communcation "
"communication partners and deeper analyse of the encrypted communication "
"might still reveal important details. An overview over available "
"alternative transport methods is given in &sources-list;."
msgstr ""


Loading…
Cancel
Save