diff options
author | Chris Maynard <Christopher.Maynard@GTECH.COM> | 2012-02-01 02:05:19 +0000 |
---|---|---|
committer | Chris Maynard <Christopher.Maynard@GTECH.COM> | 2012-02-01 02:05:19 +0000 |
commit | 3db18f185eef4184c263b8c9a1da68f5b40d9a07 (patch) | |
tree | bda9f291f6f9c5131c5dcfbc545d4f3f7a2d4614 /epan | |
parent | f88e871171cbf5ccdf5093ad2c97772d5a144a8b (diff) |
Fix some typos.
svn path=/trunk/; revision=40787
Diffstat (limited to 'epan')
-rw-r--r-- | epan/dissectors/packet-http.c | 6 | ||||
-rw-r--r-- | epan/dissectors/packet-icmp.c | 8 | ||||
-rw-r--r-- | epan/dissectors/packet-icmpv6.c | 28 | ||||
-rw-r--r-- | epan/dissectors/packet-ipv6.c | 6 |
4 files changed, 24 insertions, 24 deletions
diff --git a/epan/dissectors/packet-http.c b/epan/dissectors/packet-http.c index 8bd466bb0f..faba3d305a 100644 --- a/epan/dissectors/packet-http.c +++ b/epan/dissectors/packet-http.c @@ -958,7 +958,7 @@ dissect_http_message(tvbuff_t *tvb, int offset, packet_info *pinfo, * which would require subdissectors to deal intelligently * with empty segments. * - * Acccording to RFC 2616, however, 1xx responses, 204 responses, + * According to RFC 2616, however, 1xx responses, 204 responses, * and 304 responses MUST NOT include a message body; if no * content length is specified for them, we don't attempt to * dissect the body. @@ -1745,7 +1745,7 @@ http_payload_subdissector(tvbuff_t *tvb, proto_tree *tree, if(strings[0] != NULL && strings[1] != NULL) { /* - * The string was successfuly split in two + * The string was successfully split in two * Create a proxy-connect subtree */ if(tree) { @@ -2670,7 +2670,7 @@ proto_register_http(void) &http_desegment_body); prefs_register_bool_preference(http_module, "dechunk_body", "Reassemble chunked transfer-coded bodies", - "Whether to reassemble bodies of entities that are transfered " + "Whether to reassemble bodies of entities that are transferred " "using the \"Transfer-Encoding: chunked\" method", &http_dechunk_body); #ifdef HAVE_LIBZ diff --git a/epan/dissectors/packet-icmp.c b/epan/dissectors/packet-icmp.c index 0becf135ac..61ab6e16e2 100644 --- a/epan/dissectors/packet-icmp.c +++ b/epan/dissectors/packet-icmp.c @@ -1061,7 +1061,7 @@ static guint32 get_best_guess_mstimeofday(tvbuff_t *tvb, gint offset, guint32 co /* Account for the special case from RFC 792 as best we can by clearing * the msb. Ref: [Page 16] of http://tools.ietf.org/html/rfc792: - If the time is not available in miliseconds or cannot be provided + If the time is not available in milliseconds or cannot be provided with respect to midnight UT then any time can be inserted in a timestamp provided the high order bit of the timestamp is also set to indicate this non-standard value. @@ -1091,8 +1091,8 @@ static guint32 get_best_guess_mstimeofday(tvbuff_t *tvb, gint offset, guint32 co } /* Both are bigger than MSPERDAY, but neither one's msb's are set. This - * is cleary invalid, but now what TODO? For now, take the one closest to - * the commparative timestamp, which is another way of saying, "let's + * is clearly invalid, but now what TODO? For now, take the one closest to + * the comparative timestamp, which is another way of saying, "let's * return a deterministic wild guess. */ if (abs(be_ts - comp_ts) < abs(le_ts - comp_ts)) return (be_ts); @@ -1665,7 +1665,7 @@ proto_register_icmp(void) { "MTU", "icmp.int_info.mtu", FT_BOOLEAN, 8, NULL, INT_INFO_MTU, "True: MTU present; False: MTU not present", HFILL }}, { &hf_icmp_int_info_afi, - { "Address Family Identfier", "icmp.int_info.afi", FT_UINT16, BASE_DEC, NULL, 0x0, + { "Address Family Identifier", "icmp.int_info.afi", FT_UINT16, BASE_DEC, NULL, 0x0, "Address Family of the interface address", HFILL }}, { &hf_icmp_int_info_ipv4, { "Source", "icmp.int_info.ip", FT_IPv4, BASE_NONE, NULL, 0x0, diff --git a/epan/dissectors/packet-icmpv6.c b/epan/dissectors/packet-icmpv6.c index 39aa03af41..d9ec6f8377 100644 --- a/epan/dissectors/packet-icmpv6.c +++ b/epan/dissectors/packet-icmpv6.c @@ -80,7 +80,7 @@ * RFC 5269: Distributing a Symmetric Fast Mobile IPv6 (FMIPv6) Handover Key Using SEcure Neighbor Discovery (SEND) * RFC 5271: Mobile IPv6 Fast Handovers for 3G CDMA Networks * RFC 6275: Mobility Support in IPv6 - * draft-ieft-roll-rpl-19.txt: RPL: IPv6 Routing Protocol for Low power and Lossy Networks + * draft-ietf-roll-rpl-19.txt: RPL: IPv6 Routing Protocol for Low power and Lossy Networks * draft-ietf-csi-proxy-send-05: Secure Proxy ND Support for SEND * draft-ietf-6lowpan-nd-18: Neighbor Discovery Optimization for Low Power and Lossy Networks (6LoWPAN) * http://www.iana.org/assignments/icmpv6-parameters (last updated 2011-04-08) @@ -575,7 +575,7 @@ static const value_string icmpv6_type_val[] = { { ICMP6_MCAST_ROUTER_SOLICIT, "Multicast Router Solicitation" }, /* [RFC4286] */ { ICMP6_MCAST_ROUTER_TERM, "Multicast Router Termination" }, /* [RFC4286] */ { ICMP6_FMIPV6_MESSAGES, "FMIPv6" }, /* [RFC5568] */ - { ICMP6_RPL_CONTROL, "RPL Control" }, /* draft-ieft-roll-rpl-19.txt Pending IANA */ + { ICMP6_RPL_CONTROL, "RPL Control" }, /* draft-ietf-roll-rpl-19.txt Pending IANA */ { ICMP6_6LOWPANND_DAR, "Duplicate Address Request"}, /* draft-ietf-6lowpan-nd-18.txt Pending IANA */ { ICMP6_6LOWPANND_DAC, "Duplicate Address Confirmation"}, /* draft-ietf-6lowpan-nd-18.txt Pending IANA */ { 200, "Private experimentation" }, /* [RFC4443] */ @@ -602,7 +602,7 @@ static const value_string icmpv6_unreach_code_val[] = { { ICMP6_DST_UNREACH_NOPORT, "Port unreachable" }, { ICMP6_DST_UNREACH_INGR_EGR, "Source address failed ingress/egress policy" }, { ICMP6_DST_UNREACH_REJECT, "Reject route to destination" }, - { ICMP6_DST_UNREACH_ERROR, "Error in Source Routing Header" }, /* [draft-ieft-roll-rpl-19.txt] */ + { ICMP6_DST_UNREACH_ERROR, "Error in Source Routing Header" }, /* [draft-ietf-roll-rpl-19.txt] */ { 0, NULL } }; @@ -801,8 +801,8 @@ static const true_false_string tfs_ni_flag_a = { #define ND_OPT_DNS_SEARCH_LIST 31 #define ND_OPT_PROXY_SIGNATURE 32 /* draft-6lowpan-nd types, pending IANA assignment */ -#define ND_OPT_ADDR_REGISTRATION 131 /* Conflit with RFC6106.. */ -#define ND_OPT_6LOWPAN_CONTEXT 132 /* Conflit with draft-ietf-csi-proxy-send-05.txt.. */ +#define ND_OPT_ADDR_REGISTRATION 131 /* Conflict with RFC6106.. */ +#define ND_OPT_6LOWPAN_CONTEXT 132 /* Conflict with draft-ietf-csi-proxy-send-05.txt.. */ #define ND_OPT_AUTH_BORDER_ROUTER 33 static const value_string option_vals[] = { @@ -839,7 +839,7 @@ static const value_string option_vals[] = { /* 32 */ { ND_OPT_PROXY_SIGNATURE, "Proxy Signature (PS)" }, /* [draft-ietf-csi-proxy-send-05.txt] */ /* 31 */ { ND_OPT_ADDR_REGISTRATION, "Address Registration Option" }, /* [draft-ietf-6lowpan-nd-18.txt] */ /* 32 */ { ND_OPT_6LOWPAN_CONTEXT, "6LoWPAN Context Option" }, /* [draft-ietf-6lowpan-nd-18.txt] */ -/* 33 */ { ND_OPT_AUTH_BORDER_ROUTER, "Authorative Border Router" }, /* [draft-ietf-6lowpan-nd-18.txt] */ +/* 33 */ { ND_OPT_AUTH_BORDER_ROUTER, "Authoritative Border Router" }, /* [draft-ietf-6lowpan-nd-18.txt] */ /* 34-137 Unassigned */ { 138, "CARD Request" }, /* [RFC4065] */ { 139, "CARD Reply" }, /* [RFC4065] */ @@ -1025,11 +1025,11 @@ static const value_string rpl_code_val[] = { { ICMP6_RPL_DIS, "DODAG Information Solicitation" }, { ICMP6_RPL_DIO, "DODAG Information Object" }, { ICMP6_RPL_DAO, "Destination Advertisement Object" }, - { ICMP6_RPL_DAOACK, "Destination Advertisement Object Acknowledgement" }, + { ICMP6_RPL_DAOACK, "Destination Advertisement Object Acknowledgment" }, { ICMP6_RPL_SDIS, "Secure DODAG Information Solicitation" }, { ICMP6_RPL_SDIO, "Secure DODAG Information Object" }, { ICMP6_RPL_SDAO, "Secure Destination Advertisement Object" }, - { ICMP6_RPL_SDAOACK,"Secure Destination Advertisement Object Acknowledgement" }, + { ICMP6_RPL_SDAOACK,"Secure Destination Advertisement Object Acknowledgment" }, { ICMP6_RPL_CC, "Consistency Check" }, { 0, NULL } }; @@ -1531,7 +1531,7 @@ dissect_icmpv6_nd_opt(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree opt_offset += par_len; /* Padding */ - /* TODO: Calculate padding length and exlude from the signature */ + /* TODO: Calculate padding length and exclude from the signature */ break; } case ND_OPT_TIMESTAMP: /* Timestamp Option (13) */ @@ -2015,7 +2015,7 @@ dissect_icmpv6_nd_opt(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree proto_tree_add_item(icmp6opt_tree, hf_icmpv6_opt_digital_signature_padding , tvb, opt_offset, par_len, ENC_NA); opt_offset += par_len; /* Padding */ - /* TODO: Calculate padding length and exlude from the signature */ + /* TODO: Calculate padding length and exclude from the signature */ break; } case ND_OPT_ADDR_REGISTRATION: /* Address Registration (TBD1 Pending IANA...) */ @@ -2413,7 +2413,7 @@ dissect_icmpv6_rpl_opt(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree } opt_offset += 4; - /* Preferrred Lifetime */ + /* Preferred Lifetime */ ti_opt = proto_tree_add_item(icmp6opt_tree, hf_icmpv6_rpl_opt_prefix_plifetime, tvb, opt_offset, 4, ENC_BIG_ENDIAN); switch(tvb_get_ntohl(tvb, opt_offset)){ case 0xffffffff: @@ -3937,7 +3937,7 @@ proto_register_icmpv6(void) { "Nonce", "icmpv6.opt.nonce", FT_BYTES, BASE_NONE, NULL, 0x0, "A field containing a random number selected by the sender of the solicitation message", HFILL }}, { &hf_icmpv6_opt_certificate_padding, - { "Certificat and Padding", "icmpv6.opt.certificate_padding", FT_NONE, BASE_NONE, NULL, 0x0, + { "Certificate and Padding", "icmpv6.opt.certificate_padding", FT_NONE, BASE_NONE, NULL, 0x0, NULL, HFILL }}, { &hf_icmpv6_opt_ipa_option_code, { "Option-code", "icmpv6.opt.ipa.option_code", FT_UINT8, BASE_DEC, VALS(nd_opt_ipa_option_code_val), 0x00, @@ -3992,7 +3992,7 @@ proto_register_icmpv6(void) "This value indicates the validity of the MAP's address and the RCoA.", HFILL }}, { &hf_icmpv6_opt_map_global_address, { "Global Address", "icmpv6.opt.map.global_address", FT_IPv6, BASE_NONE, NULL, 0x0, - "TOne of the MAP's global addresses", HFILL }}, + "One of the MAP's global addresses", HFILL }}, { &hf_icmpv6_opt_route_info_flag, { "Flag", "icmpv6.opt.route_info.flag", FT_UINT8, BASE_HEX, NULL, 0x00, NULL, HFILL }}, @@ -4543,7 +4543,7 @@ proto_register_icmpv6(void) { "Flag", "icmpv6.rpl.cc.flag", FT_UINT8, BASE_HEX, NULL, 0x0, NULL, HFILL }}, { &hf_icmpv6_rpl_cc_flag_r, - { "Reponse (R)", "icmpv6.rpl.cc.flag.r", FT_BOOLEAN, 8, NULL, RPL_CC_FLAG_R, + { "Response (R)", "icmpv6.rpl.cc.flag.r", FT_BOOLEAN, 8, NULL, RPL_CC_FLAG_R, "Indicates whether the CC message is a response", HFILL }}, { &hf_icmpv6_rpl_cc_flag_rsv, { "Reserved", "icmpv6.rpl.cc.flag.rsv", FT_UINT8, BASE_DEC, NULL, RPL_CC_FLAG_RESERVED, diff --git a/epan/dissectors/packet-ipv6.c b/epan/dissectors/packet-ipv6.c index ff2be46da2..300ca1b697 100644 --- a/epan/dissectors/packet-ipv6.c +++ b/epan/dissectors/packet-ipv6.c @@ -551,7 +551,7 @@ enum { IPv6_RT_HEADER_RPL=4 }; -/* Routeing Header Types */ +/* Routing Header Types */ static const value_string routing_header_type[] = { { IPv6_RT_HEADER_SOURCE_ROUTING, "IPv6 Source Routing" }, { IPv6_RT_HEADER_NIMROD, "Nimrod" }, @@ -1478,7 +1478,7 @@ static const value_string shimctrlvals[] = { { SHIM6_TYPE_R1BIS, "R1bis" }, { SHIM6_TYPE_I2BIS, "I2bis" }, { SHIM6_TYPE_UPD_REQ, "Update Request" }, - { SHIM6_TYPE_UPD_ACK, "Update Acknowledgement" }, + { SHIM6_TYPE_UPD_ACK, "Update Acknowledgment" }, { SHIM6_TYPE_KEEPALIVE, "Keepalive" }, { SHIM6_TYPE_PROBE, "Probe" }, { 0, NULL } @@ -2297,7 +2297,7 @@ proto_register_ipv6(void) { &hf_ipv6_routing_hdr_type, { "Type", "ipv6.routing_hdr.type", FT_UINT8, BASE_DEC, VALS(routing_header_type), 0x0, - "Routeing Header Type", HFILL }}, + "Routing Header Type", HFILL }}, { &hf_ipv6_routing_hdr_left, { "Segments Left", "ipv6.routing_hdr.left", FT_UINT8, BASE_DEC, NULL, 0x0, |