seoz pushed a commit to branch master.

commit 5d20302c35a52342a05c9229c3b47f3397c2a4b6
Author: Daniel Juyung Seo <[email protected]>
Date:   Sat Mar 9 14:38:36 2013 +0900

    eina eina_hash.h,eina_list.h: fixed a typo.
    
    ilustrate -> illustrate
---
 src/lib/eina/eina_hash.h |  2 +-
 src/lib/eina/eina_list.h | 10 +++++-----
 2 files changed, 6 insertions(+), 6 deletions(-)

diff --git a/src/lib/eina/eina_hash.h b/src/lib/eina/eina_hash.h
index d73a775..a127dda 100644
--- a/src/lib/eina/eina_hash.h
+++ b/src/lib/eina/eina_hash.h
@@ -181,7 +181,7 @@
  * hash_of_element is calculated using the hashing function, passed as
  * parameter to the @ref eina_hash_new function. N is the number of buckets
  * (array positions), and is calculated based on the buckets_power_size
- * (argument of @ref eina_hash_new too). The following picture ilustrates the
+ * (argument of @ref eina_hash_new too). The following picture illustrates the
  * basic idea:
  *
  * @htmlonly
diff --git a/src/lib/eina/eina_list.h b/src/lib/eina/eina_list.h
index a81f57b..e70530b 100644
--- a/src/lib/eina/eina_list.h
+++ b/src/lib/eina/eina_list.h
@@ -1358,7 +1358,7 @@ EAPI Eina_Accessor        *eina_list_accessor_new(const 
Eina_List *list) EINA_MA
  * the last. @p data is the data related to the current element.
  * @p l is an #Eina_List used as the list iterator.
  *
- * The following diagram ilustrates this macro iterating over a list of four
+ * The following diagram illustrates this macro iterating over a list of four
  * elements("one", "two", "three" and "four"):
  * @htmlonly
  * <img src="eina-list-foreach.png" style="max-width: 100%;" />
@@ -1416,7 +1416,7 @@ EAPI Eina_Accessor        *eina_list_accessor_new(const 
Eina_List *list) EINA_MA
  * @p data is the data related to the current element, while @p l
  * is an #Eina_List that is used as the list iterator.
  *
- * The following diagram ilustrates this macro iterating over a list of four
+ * The following diagram illustrates this macro iterating over a list of four
  * elements("one", "two", "three" and "four"):
  * @htmlonly
  * <img src="eina-list-reverse-foreach.png" style="max-width: 100%;" />
@@ -1477,7 +1477,7 @@ EAPI Eina_Accessor        *eina_list_accessor_new(const 
Eina_List *list) EINA_MA
  * Since this macro stores a pointer to the next list node in @p l_next,
  * deleting the current node and continuing looping is safe.
  *
- * The following diagram ilustrates this macro iterating over a list of four
+ * The following diagram illustrates this macro iterating over a list of four
  * elements("one", "two", "three" and "four"):
  * @htmlonly
  * <img src="eina-list-foreach-safe.png" style="max-width: 100%;" />
@@ -1533,7 +1533,7 @@ EAPI Eina_Accessor        *eina_list_accessor_new(const 
Eina_List *list) EINA_MA
  * Since this macro stores a pointer to the previous list node in @p l_prev,
  * deleting the current node and continuing looping is safe.
  *
- * The following diagram ilustrates this macro iterating over a list of four
+ * The following diagram illustrates this macro iterating over a list of four
  * elements("one", "two", "three" and "four"):
  * @htmlonly
  * <img src="eina-list-reverse-foreach-safe.png" style="max-width: 100%;" />
@@ -1581,7 +1581,7 @@ EAPI Eina_Accessor        *eina_list_accessor_new(const 
Eina_List *list) EINA_MA
  * This macro will call #eina_list_remove_list for each list node, and store
  * the data contained in the current node in @p data.
  *
- * The following diagram ilustrates this macro iterating over a list of four
+ * The following diagram illustrates this macro iterating over a list of four
  * elements("one", "two", "three" and "four"):
  * @htmlonly
  * <img src="eina-list-free.png" style="max-width: 100%;" />

-- 

------------------------------------------------------------------------------
Symantec Endpoint Protection 12 positioned as A LEADER in The Forrester  
Wave(TM): Endpoint Security, Q1 2013 and "remains a good choice" in the  
endpoint security space. For insight on selecting the right partner to 
tackle endpoint security challenges, access the full report. 
http://p.sf.net/sfu/symantec-dev2dev

Reply via email to