diff options
author | Bill Meier <wmeier@newsguy.com> | 2013-02-26 02:38:52 +0000 |
---|---|---|
committer | Bill Meier <wmeier@newsguy.com> | 2013-02-26 02:38:52 +0000 |
commit | a6e56df8b683bb696655c331f64f22abc8f36af4 (patch) | |
tree | b21cee2fefd1e6c9a65348c355761bdd776459f3 /epan | |
parent | b320eb3d971372d1293a5c072b2cb4b4e2300a0e (diff) |
it's ==> its & its ==> it's as needed.
svn path=/trunk/; revision=47898
Diffstat (limited to 'epan')
-rw-r--r-- | epan/crypt/airpdcap.c | 4 | ||||
-rw-r--r-- | epan/wslua/init_wslua.c | 2 | ||||
-rw-r--r-- | epan/wslua/wslua_tvb.c | 4 |
3 files changed, 5 insertions, 5 deletions
diff --git a/epan/crypt/airpdcap.c b/epan/crypt/airpdcap.c index 33c3cad759..b047104a59 100644 --- a/epan/crypt/airpdcap.c +++ b/epan/crypt/airpdcap.c @@ -325,7 +325,7 @@ Ideally, it would be best to maintain an expanding list of SA keys. Perhaps we c that they apply to. Then, whenever we need to decrypt a packet, we can determine which key to use based on whether it is broadcast or unicast and within what packet number range it falls. -Either that, or store two versions of encrypted packets - the orginal packet and it's successfully +Either that, or store two versions of encrypted packets - the orginal packet and its successfully decrypted version. Then Wireshark wouldn't have to decrypt packets on the fly if they were already successfully decrypted. */ @@ -429,7 +429,7 @@ AirPDcapDecryptWPABroadcastKey(const EAPOL_RSN_KEY *pEAPKey, guint8 *decryption sa->validKey = TRUE; sa->wpa.key_ver = key_version; - /* Since this is a GTK and it's size is only 32 bytes (vs. the 64 byte size of a PTK), we fake it and put it in at a 32-byte offset so the */ + /* Since this is a GTK and its size is only 32 bytes (vs. the 64 byte size of a PTK), we fake it and put it in at a 32-byte offset so the */ /* AirPDcapRsnaMng() function will extract the right piece of the GTK for decryption. (The first 16 bytes of the GTK are used for decryption.) */ memset(sa->wpa.ptk, 0, sizeof(sa->wpa.ptk)); memcpy(sa->wpa.ptk+32, szEncryptedKey, key_len); diff --git a/epan/wslua/init_wslua.c b/epan/wslua/init_wslua.c index 2233aa0b05..37736340be 100644 --- a/epan/wslua/init_wslua.c +++ b/epan/wslua/init_wslua.c @@ -360,7 +360,7 @@ int wslua_init(register_cb cb, gpointer client_data) { lua_newtable (L); lua_dissectors_table_ref = luaL_ref(L, LUA_REGISTRYINDEX); - /* set running_superuser variable to it's propper value */ + /* set running_superuser variable to its proper value */ WSLUA_REG_GLOBAL_BOOL(L,"running_superuser",started_with_special_privs()); /* special constant used by PDU reassembly handling */ diff --git a/epan/wslua/wslua_tvb.c b/epan/wslua/wslua_tvb.c index 93a8f944c3..06f44e1dd6 100644 --- a/epan/wslua/wslua_tvb.c +++ b/epan/wslua/wslua_tvb.c @@ -316,14 +316,14 @@ int ByteArray_register(lua_State* L) { * Tvb & TvbRange * * a Tvb represents a tvbuff_t in Lua. - * a TvbRange represents a range in a tvb (tvb,offset,length) it's main purpose is to do bounds checking, + * a TvbRange represents a range in a tvb (tvb,offset,length) its main purpose is to do bounds checking, * it helps too simplifing argument passing to Tree. In wireshark terms this is worthless nothing * not already done by the TVB itself. In lua's terms is necessary to avoid abusing TRY{}CATCH(){} * via preemptive bounds checking. * * These lua objects refers to structures in wireshak that are freed independently from Lua's garbage collector. * To avoid using a pointer from Lua to Wireshark's that is already freed, we maintain a list of the pointers with - * a marker that track's it's expiry. + * a marker that track's its expiry. * * All pointers are marked as expired when the dissection of the current frame is finished or when the garbage * collector tries to free the object referring to the pointer, whichever comes first. |