aboutsummaryrefslogtreecommitdiffstats
path: root/epan/dissectors/packet-dof.c
diff options
context:
space:
mode:
authorMartin Mathieson <martin.r.mathieson@googlemail.com>2024-02-25 22:46:47 +0000
committerMartin Mathieson <martin.r.mathieson@googlemail.com>2024-02-25 22:46:47 +0000
commite0300eaed86cf1749bd1e36c474d6bb54b83975f (patch)
tree65d966582a06caabf587273eb86aac4d32c2fd4c /epan/dissectors/packet-dof.c
parenteb706e9b8417730e13ea0fbe83b87bb6785f7387 (diff)
Fix lots of spellings
Diffstat (limited to 'epan/dissectors/packet-dof.c')
-rw-r--r--epan/dissectors/packet-dof.c12
1 files changed, 6 insertions, 6 deletions
diff --git a/epan/dissectors/packet-dof.c b/epan/dissectors/packet-dof.c
index de0809b24d..f32fab3a61 100644
--- a/epan/dissectors/packet-dof.c
+++ b/epan/dissectors/packet-dof.c
@@ -208,7 +208,7 @@
/**
* This structure represents a SID, or Sender ID, in the system.
* This is allocated as global memory, and must be freed. SIDs
- * are Object IDs, and can be displayed in hex but preferrably
+ * are Object IDs, and can be displayed in hex but preferably
* using the OID output format. Even though the OID contains
* a length, we prefix this buffer with a length (which must
* be less than 255 by the definition of a SID.
@@ -3301,7 +3301,7 @@ typedef struct _tcp_session_data
dof_transport_session common;
/* This flag is used to determine that an entire TCP session is NOT OpenDOF.
- * Because of TCP/IP negotation in the DPS it is easy to confuse arbitrary
+ * Because of TCP/IP negotiation in the DPS it is easy to confuse arbitrary
* protocols as OpenDOF. Once it is determined that it is not then this
* flag can be set, which will turn off all the OpenDOF dissectors.
*/
@@ -4557,7 +4557,7 @@ static guint8 parseAttribute(struct parseCtx *ctx)
{
if (parseAttributeID(ctx) == 0)
{
- /* seperated by ':' */
+ /* separated by ':' */
if (PARSECTX_READ_CHAR_OID(ctx) == ':' && PARSECTX_CHECK_LEN(ctx, 1) == 0)
{
guint8 *length = PARSECTX_GET_CURRENT_POS_BUF(ctx);
@@ -4590,7 +4590,7 @@ static guint8 parseAttributes(struct parseCtx *ctx)
if (parseAttribute(ctx) != 0)
return 1;
- /* multiple seperated by '|' */
+ /* multiple separated by '|' */
if (PARSECTX_PEEK_CHAR_OID(ctx) == '|' && PARSECTX_PEEK_NEXT_CHAR_OID(ctx) != ')')
{
PARSECTX_OR_AT_POS_BUF(ctx, avpID, 0x80); /* set that there is a next attribute */
@@ -4612,7 +4612,7 @@ static guint8 parseFormatOID(struct parseCtx *ctx)
/* Get class id */
if (parseOIDClass(ctx) == 0)
{
- /* seperated by ':' */
+ /* separated by ':' */
if (PARSECTX_READ_CHAR_OID(ctx) == ':' && PARSECTX_CHECK_LEN(ctx, 1) == 0)
{
guint8 *length = PARSECTX_GET_CURRENT_POS_BUF(ctx);
@@ -9603,7 +9603,7 @@ static int dissect_tep(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void
}
- /* Whether or not this can be decrypted, the security mode infomation
+ /* Whether or not this can be decrypted, the security mode information
* should be kept with the session.
*/
{