diff options
author | Sake Blok <sake@euronet.nl> | 2007-10-16 23:42:33 +0000 |
---|---|---|
committer | Sake Blok <sake@euronet.nl> | 2007-10-16 23:42:33 +0000 |
commit | 6bec9d3d9e9382f41924339563f17aba6b346798 (patch) | |
tree | 0f87cd34f039a68004ef24dc4d35b3653ff2f3fd | |
parent | 4e6eec17b131555d08fec348dfd861339a288c28 (diff) |
From tmiller@hcjbtech.org : Spelling error on GDS DB protocol dissector: "Buffer lenght:"
(recursively grepped through the source and corrected all occurences, even
the ones just in comments)
svn path=/trunk/; revision=23211
-rw-r--r-- | epan/crypt/airpdcap.c | 2 | ||||
-rw-r--r-- | epan/crypt/airpdcap_system.h | 2 | ||||
-rw-r--r-- | epan/crypt/airpdcap_user.h | 2 | ||||
-rw-r--r-- | epan/dissectors/packet-dtpt.c | 2 | ||||
-rw-r--r-- | epan/dissectors/packet-fmp.c | 2 | ||||
-rw-r--r-- | epan/dissectors/packet-gdsdb.c | 4 | ||||
-rw-r--r-- | epan/dissectors/packet-ospf.c | 2 | ||||
-rw-r--r-- | epan/dissectors/packet-rsl.c | 2 | ||||
-rw-r--r-- | epan/dissectors/packet-ssl-utils.h | 2 | ||||
-rw-r--r-- | epan/oids.h | 4 | ||||
-rw-r--r-- | epan/wslua/wslua_dumper.c | 2 | ||||
-rw-r--r-- | epan/wslua/wslua_tvb.c | 10 | ||||
-rw-r--r-- | gtk/airpcap_dlg.c | 2 | ||||
-rw-r--r-- | gtk/airpcap_dlg.h | 2 | ||||
-rw-r--r-- | wiretap/k12.c | 6 |
15 files changed, 23 insertions, 23 deletions
diff --git a/epan/crypt/airpdcap.c b/epan/crypt/airpdcap.c index 8fb1b19a13..757ab18f82 100644 --- a/epan/crypt/airpdcap.c +++ b/epan/crypt/airpdcap.c @@ -831,7 +831,7 @@ AirPDcapRsna4WHandshake( if (AIRPDCAP_EAP_SEC(data[offset])==0) { /* PATCH: some implementations set secure bit to 0 also in the 4th message */ - /* to recognize which message is this check if wep_key data lenght is 0 */ + /* to recognize which message is this check if wep_key data length is 0 */ /* in the 4th message */ if (data[offset+92]!=0 || data[offset+93]!=0) { /* message 2 */ diff --git a/epan/crypt/airpdcap_system.h b/epan/crypt/airpdcap_system.h index 5aeb77a37f..91846d3f58 100644 --- a/epan/crypt/airpdcap_system.h +++ b/epan/crypt/airpdcap_system.h @@ -183,7 +183,7 @@ extern "C" { * WPA/WPA2 decryption * @return * - AIRPDCAP_RET_SUCCESS: Decryption has been done (decrypt_data and - * decrypt_length will contain the packet data decrypted and the lenght of + * decrypt_length will contain the packet data decrypted and the length of * the new packet) * - AIRPDCAP_RET_SUCCESS_HANDSHAKE: A step of the 4-way handshake for * WPA key has been successfully done diff --git a/epan/crypt/airpdcap_user.h b/epan/crypt/airpdcap_user.h index 04d90a4003..35f73a9671 100644 --- a/epan/crypt/airpdcap_user.h +++ b/epan/crypt/airpdcap_user.h @@ -123,7 +123,7 @@ typedef struct _AIRPDCAP_KEY_ITEM { /** * The binary value of the WEP key. * @note - * It is accepted a key of lenght between + * It is accepted a key of length between * AIRPDCAP_WEP_KEY_MINLEN and * AIRPDCAP_WEP_KEY_MAXLEN. A WEP key * standard-compliante should be either 40 bits diff --git a/epan/dissectors/packet-dtpt.c b/epan/dissectors/packet-dtpt.c index 8e380f61f5..3800616a08 100644 --- a/epan/dissectors/packet-dtpt.c +++ b/epan/dissectors/packet-dtpt.c @@ -1119,7 +1119,7 @@ proto_register_dtpt(void) FT_UINT32, BASE_DEC, NULL, 0x0, "Remote Address", HFILL }}, { &hf_dtpt_sockaddr_length, - { "Lenght", "dtpt.sockaddr.length", + { "Length", "dtpt.sockaddr.length", FT_UINT16, BASE_DEC, NULL, 0x0, "Socket Address Length", HFILL }}, { &hf_dtpt_sockaddr_family, diff --git a/epan/dissectors/packet-fmp.c b/epan/dissectors/packet-fmp.c index 0665ded564..326035e789 100644 --- a/epan/dissectors/packet-fmp.c +++ b/epan/dissectors/packet-fmp.c @@ -528,7 +528,7 @@ dissect_InterpretVolMgtStuff(tvbuff_t *tvb, int offset, proto_tree *tree) for(i=0;i<numdisks;i++){ offset = dissect_rpc_uint64(tvb, tree, hf_fmp_sig_offset, offset); length = tvb_get_ntohl(tvb, offset); - proto_tree_add_text(tree, tvb, offset, 4, "Lenght of List : %d", length); + proto_tree_add_text(tree, tvb, offset, 4, "Length of List : %d", length); offset += 4; for(j=0;j<length;j++){ diff --git a/epan/dissectors/packet-gdsdb.c b/epan/dissectors/packet-gdsdb.c index b31d663fab..116c3bcc05 100644 --- a/epan/dissectors/packet-gdsdb.c +++ b/epan/dissectors/packet-gdsdb.c @@ -1531,7 +1531,7 @@ proto_register_gdsdb(void) NULL, HFILL } }, { &hf_gdsdb_segment_length, - { "Lenght", "gdsdb.segment.length", + { "Length", "gdsdb.segment.length", FT_UINT32, BASE_DEC, NULL, 0x0, NULL, HFILL } }, @@ -1655,7 +1655,7 @@ proto_register_gdsdb(void) }, /* gdsdb_slice_response */ { &hf_gdsdb_sliceresponse_length, - { "Lenght", "gdsdb.sliceresponse.length", + { "Length", "gdsdb.sliceresponse.length", FT_UINT32, BASE_DEC, NULL, 0x0, NULL, HFILL } }, diff --git a/epan/dissectors/packet-ospf.c b/epan/dissectors/packet-ospf.c index bf95c12bad..5509ddbcb0 100644 --- a/epan/dissectors/packet-ospf.c +++ b/epan/dissectors/packet-ospf.c @@ -1823,7 +1823,7 @@ dissect_ospf_lsa_mpls(tvbuff_t *tvb, int offset, proto_tree *tree, if(((stlv_len % 4)!=0)) { proto_tree_add_text(stlv_tree, tvb, stlv_offset+4, stlv_len, - "Malformed Packet: Lenght must be N x 4 octets"); + "Malformed Packet: Length must be N x 4 octets"); break; } diff --git a/epan/dissectors/packet-rsl.c b/epan/dissectors/packet-rsl.c index ccf5368626..51ccbac2ce 100644 --- a/epan/dissectors/packet-rsl.c +++ b/epan/dissectors/packet-rsl.c @@ -2418,7 +2418,7 @@ dissect_rsl_ie_cmd_ind(tvbuff_t *tvb, packet_info *pinfo _U_, proto_tree *tree, } - /* TODO Lenght wrong if extended */ + /* TODO Length wrong if extended */ ti = proto_tree_add_text(tree, tvb,offset,2,"Command indicator IE"); ie_tree = proto_item_add_subtree(ti, ett_ie_cmd_ind); diff --git a/epan/dissectors/packet-ssl-utils.h b/epan/dissectors/packet-ssl-utils.h index 4114fe314f..e6d45f4a93 100644 --- a/epan/dissectors/packet-ssl-utils.h +++ b/epan/dissectors/packet-ssl-utils.h @@ -382,7 +382,7 @@ ssl_decrypt_pre_master_secret(SslDecryptSession*ssl_session, @param decoder the stream decoder to be used @param ct the content type of this ssl record @param in a pinter to the ssl record to be decrypted - @param inl the record lenght + @param inl the record length @param out a pointer to the store for the decrypted data @param outl the decrypted data len @return 0 on success */ diff --git a/epan/oids.h b/epan/oids.h index d3823a8ca6..dbf25480cd 100644 --- a/epan/oids.h +++ b/epan/oids.h @@ -118,11 +118,11 @@ extern void oids_init(void); * subids: is an array of guint32s */ -/* return lenght of encoded buffer */ +/* return length of encoded buffer */ guint oid_subid2encoded(guint len, guint32* subids, guint8** encoded_p); guint oid_string2encoded(const gchar *oid_str, guint8** encoded_p); -/* return lenght of subid array */ +/* return length of subid array */ guint oid_encoded2subid(const guint8 *oid, gint len, guint32** subids_p); guint oid_string2subid(const gchar *oid_str, guint32** subids_p); diff --git a/epan/wslua/wslua_dumper.c b/epan/wslua/wslua_dumper.c index faf361a632..b0fcf6f947 100644 --- a/epan/wslua/wslua_dumper.c +++ b/epan/wslua/wslua_dumper.c @@ -77,7 +77,7 @@ WSLUA_CONSTRUCTOR PseudoHeader_eth(lua_State* L) { Creates an ethernet pseudoheader */ -#define WSLUA_OPTARG_PseudoHeader_eth_FCSLEN 1 /* the fcs lenght */ +#define WSLUA_OPTARG_PseudoHeader_eth_FCSLEN 1 /* the fcs length */ PseudoHeader ph = g_malloc(sizeof(struct lua_pseudo_header)); ph->type = PHDR_ETH; diff --git a/epan/wslua/wslua_tvb.c b/epan/wslua/wslua_tvb.c index bf605f1668..acb59cb886 100644 --- a/epan/wslua/wslua_tvb.c +++ b/epan/wslua/wslua_tvb.c @@ -213,7 +213,7 @@ WSLUA_METHOD ByteArray_len(lua_State* L) { WSLUA_METHOD ByteArray_subset(lua_State* L) { /* obtain a segment of a ByteArray */ #define WSLUA_ARG_ByteArray_set_index_OFFSET 2 /* the position of the first byte */ -#define WSLUA_ARG_ByteArray_set_index_LENGTH 2 /* the lenght of the segment */ +#define WSLUA_ARG_ByteArray_set_index_LENGTH 2 /* the length of the segment */ ByteArray ba = checkByteArray(L,1); int offset = luaL_checkint(L,2); int len = luaL_checkint(L,3); @@ -305,7 +305,7 @@ int ByteArray_register(lua_State* L) { * Tvb & TvbRange * * a Tvb represents a tvbuff_t in Lua. - * a TvbRange represents a range in a tvb (tvb,offset,lenght) it's main purpose is to do bounds checking, + * a TvbRange represents a range in a tvb (tvb,offset,length) it's main purpose is to do bounds checking, * it helps too simplifing argument passing to Tree. In wireshark terms this is worthless nothing * not already done by the TVB itself. In lua's terms is necessary to avoid abusing TRY{}CATCH(){} * via preemptive bounds checking. @@ -415,7 +415,7 @@ WSLUA_METHOD Tvb_len(lua_State* L) { if (!tvb) return 0; lua_pushnumber(L,tvb_length(tvb)); - WSLUA_RETURN(1); /* the lenght of the Tvb. */ + WSLUA_RETURN(1); /* the length of the Tvb. */ } WSLUA_METHOD Tvb_offset(lua_State* L) { @@ -439,7 +439,7 @@ WSLUA_METAMETHOD Tvb__call(lua_State* L) { WSLUA_CLASS_DEFINE(TvbRange,FAIL_ON_NULL("expired tvbrange"),NOP); /* * a TvbRange represents an usable range of a Tvb and is used to extract data from the Tvb that generated it - * TvbRanges are created by calling a tvb (e.g. tvb(offset,lenght)). If the TvbRange span is outside the Tvb's range the creation will cause a runtime error. + * TvbRanges are created by calling a tvb (e.g. tvb(offset,length)). If the TvbRange span is outside the Tvb's range the creation will cause a runtime error. */ TvbRange new_TvbRange(lua_State* L, tvbuff_t* tvb, int offset, int len) { @@ -510,7 +510,7 @@ int Tvb_register(lua_State* L) { */ static int TvbRange_get_index(lua_State* L) { /* WSLUA_ATTRIBUTE TvbRange_tvb RO The Tvb from which this TvbRange was generated */ - /* WSLUA_ATTRIBUTE TvbRange_len RW The lenght (in octets) of this TvbRange */ + /* WSLUA_ATTRIBUTE TvbRange_len RW The length (in octets) of this TvbRange */ /* WSLUA_ATTRIBUTE TvbRange_offset RW The offset (in octets) of this TvbRange */ TvbRange tvbr = checkTvbRange(L,1); diff --git a/gtk/airpcap_dlg.c b/gtk/airpcap_dlg.c index 81f41ea356..1616efc55c 100644 --- a/gtk/airpcap_dlg.c +++ b/gtk/airpcap_dlg.c @@ -339,7 +339,7 @@ on_add_type_en_changed(GtkWidget *w, gpointer data) } /* - * Returns FALSE if a text string has lenght 0, i.e. the first char + * Returns FALSE if a text string has length 0, i.e. the first char * is '\0', TRUE otherwise */ gboolean diff --git a/gtk/airpcap_dlg.h b/gtk/airpcap_dlg.h index 82cc3373c9..5585dfe8da 100644 --- a/gtk/airpcap_dlg.h +++ b/gtk/airpcap_dlg.h @@ -32,7 +32,7 @@ #define AIRPCAP_ADVANCED_FROM_OPTIONS 1 /* - * Returns FALSE if a text string has lenght 0, i.e. the first char + * Returns FALSE if a text string has length 0, i.e. the first char * is '\0', TRUE otherwise */ gboolean diff --git a/wiretap/k12.c b/wiretap/k12.c index 48aa620426..649c251603 100644 --- a/wiretap/k12.c +++ b/wiretap/k12.c @@ -203,7 +203,7 @@ typedef struct _k12_src_desc_t { * Every about 0x2000 bytes 0x10 bytes are inserted in the file, * even in the middle of a record. * This reads the next record without the eventual 0x10 bytes. - * returns the lenght of the record + the stuffing (if any) + * returns the length of the record + the stuffing (if any) * * XXX: works at most with 0x1FFF bytes per record */ @@ -230,7 +230,7 @@ static gint get_record(guint8** bufferp, FILE* fh, gint64 file_offset) { *bufferp = buffer; if ( junky_offset == 0x2000 ) { - /* the lenght of the record is 0x10 bytes ahead from we are reading */ + /* the length of the record is 0x10 bytes ahead from we are reading */ read = file_read(junk,1,0x14,fh); if (read == 2 && junk[0] == 0xff && junk[1] == 0xff) { @@ -243,7 +243,7 @@ static gint get_record(guint8** bufferp, FILE* fh, gint64 file_offset) { memcpy(buffer,&(junk[0x10]),4); } else { - /* the lenght of the record is right where we are reading */ + /* the length of the record is right where we are reading */ read = file_read(buffer,1, 0x4, fh); if (read == 2 && buffer[0] == 0xff && buffer[1] == 0xff) { |