summaryrefslogtreecommitdiff
path: root/epan
diff options
context:
space:
mode:
authorSake Blok <sake@euronet.nl>2007-10-16 23:42:33 +0000
committerSake Blok <sake@euronet.nl>2007-10-16 23:42:33 +0000
commit6bec9d3d9e9382f41924339563f17aba6b346798 (patch)
tree0f87cd34f039a68004ef24dc4d35b3653ff2f3fd /epan
parent4e6eec17b131555d08fec348dfd861339a288c28 (diff)
downloadwireshark-6bec9d3d9e9382f41924339563f17aba6b346798.tar.gz
From tmiller@hcjbtech.org : Spelling error on GDS DB protocol dissector: "Buffer lenght:"
(recursively grepped through the source and corrected all occurences, even the ones just in comments) svn path=/trunk/; revision=23211
Diffstat (limited to 'epan')
-rw-r--r--epan/crypt/airpdcap.c2
-rw-r--r--epan/crypt/airpdcap_system.h2
-rw-r--r--epan/crypt/airpdcap_user.h2
-rw-r--r--epan/dissectors/packet-dtpt.c2
-rw-r--r--epan/dissectors/packet-fmp.c2
-rw-r--r--epan/dissectors/packet-gdsdb.c4
-rw-r--r--epan/dissectors/packet-ospf.c2
-rw-r--r--epan/dissectors/packet-rsl.c2
-rw-r--r--epan/dissectors/packet-ssl-utils.h2
-rw-r--r--epan/oids.h4
-rw-r--r--epan/wslua/wslua_dumper.c2
-rw-r--r--epan/wslua/wslua_tvb.c10
12 files changed, 18 insertions, 18 deletions
diff --git a/epan/crypt/airpdcap.c b/epan/crypt/airpdcap.c
index 8fb1b19a13..757ab18f82 100644
--- a/epan/crypt/airpdcap.c
+++ b/epan/crypt/airpdcap.c
@@ -831,7 +831,7 @@ AirPDcapRsna4WHandshake(
if (AIRPDCAP_EAP_SEC(data[offset])==0) {
/* PATCH: some implementations set secure bit to 0 also in the 4th message */
- /* to recognize which message is this check if wep_key data lenght is 0 */
+ /* to recognize which message is this check if wep_key data length is 0 */
/* in the 4th message */
if (data[offset+92]!=0 || data[offset+93]!=0) {
/* message 2 */
diff --git a/epan/crypt/airpdcap_system.h b/epan/crypt/airpdcap_system.h
index 5aeb77a37f..91846d3f58 100644
--- a/epan/crypt/airpdcap_system.h
+++ b/epan/crypt/airpdcap_system.h
@@ -183,7 +183,7 @@ extern "C" {
* WPA/WPA2 decryption
* @return
* - AIRPDCAP_RET_SUCCESS: Decryption has been done (decrypt_data and
- * decrypt_length will contain the packet data decrypted and the lenght of
+ * decrypt_length will contain the packet data decrypted and the length of
* the new packet)
* - AIRPDCAP_RET_SUCCESS_HANDSHAKE: A step of the 4-way handshake for
* WPA key has been successfully done
diff --git a/epan/crypt/airpdcap_user.h b/epan/crypt/airpdcap_user.h
index 04d90a4003..35f73a9671 100644
--- a/epan/crypt/airpdcap_user.h
+++ b/epan/crypt/airpdcap_user.h
@@ -123,7 +123,7 @@ typedef struct _AIRPDCAP_KEY_ITEM {
/**
* The binary value of the WEP key.
* @note
- * It is accepted a key of lenght between
+ * It is accepted a key of length between
* AIRPDCAP_WEP_KEY_MINLEN and
* AIRPDCAP_WEP_KEY_MAXLEN. A WEP key
* standard-compliante should be either 40 bits
diff --git a/epan/dissectors/packet-dtpt.c b/epan/dissectors/packet-dtpt.c
index 8e380f61f5..3800616a08 100644
--- a/epan/dissectors/packet-dtpt.c
+++ b/epan/dissectors/packet-dtpt.c
@@ -1119,7 +1119,7 @@ proto_register_dtpt(void)
FT_UINT32, BASE_DEC, NULL, 0x0,
"Remote Address", HFILL }},
{ &hf_dtpt_sockaddr_length,
- { "Lenght", "dtpt.sockaddr.length",
+ { "Length", "dtpt.sockaddr.length",
FT_UINT16, BASE_DEC, NULL, 0x0,
"Socket Address Length", HFILL }},
{ &hf_dtpt_sockaddr_family,
diff --git a/epan/dissectors/packet-fmp.c b/epan/dissectors/packet-fmp.c
index 0665ded564..326035e789 100644
--- a/epan/dissectors/packet-fmp.c
+++ b/epan/dissectors/packet-fmp.c
@@ -528,7 +528,7 @@ dissect_InterpretVolMgtStuff(tvbuff_t *tvb, int offset, proto_tree *tree)
for(i=0;i<numdisks;i++){
offset = dissect_rpc_uint64(tvb, tree, hf_fmp_sig_offset, offset);
length = tvb_get_ntohl(tvb, offset);
- proto_tree_add_text(tree, tvb, offset, 4, "Lenght of List : %d", length);
+ proto_tree_add_text(tree, tvb, offset, 4, "Length of List : %d", length);
offset += 4;
for(j=0;j<length;j++){
diff --git a/epan/dissectors/packet-gdsdb.c b/epan/dissectors/packet-gdsdb.c
index b31d663fab..116c3bcc05 100644
--- a/epan/dissectors/packet-gdsdb.c
+++ b/epan/dissectors/packet-gdsdb.c
@@ -1531,7 +1531,7 @@ proto_register_gdsdb(void)
NULL, HFILL }
},
{ &hf_gdsdb_segment_length,
- { "Lenght", "gdsdb.segment.length",
+ { "Length", "gdsdb.segment.length",
FT_UINT32, BASE_DEC, NULL, 0x0,
NULL, HFILL }
},
@@ -1655,7 +1655,7 @@ proto_register_gdsdb(void)
},
/* gdsdb_slice_response */
{ &hf_gdsdb_sliceresponse_length,
- { "Lenght", "gdsdb.sliceresponse.length",
+ { "Length", "gdsdb.sliceresponse.length",
FT_UINT32, BASE_DEC, NULL, 0x0,
NULL, HFILL }
},
diff --git a/epan/dissectors/packet-ospf.c b/epan/dissectors/packet-ospf.c
index bf95c12bad..5509ddbcb0 100644
--- a/epan/dissectors/packet-ospf.c
+++ b/epan/dissectors/packet-ospf.c
@@ -1823,7 +1823,7 @@ dissect_ospf_lsa_mpls(tvbuff_t *tvb, int offset, proto_tree *tree,
if(((stlv_len % 4)!=0)) {
proto_tree_add_text(stlv_tree, tvb, stlv_offset+4, stlv_len,
- "Malformed Packet: Lenght must be N x 4 octets");
+ "Malformed Packet: Length must be N x 4 octets");
break;
}
diff --git a/epan/dissectors/packet-rsl.c b/epan/dissectors/packet-rsl.c
index ccf5368626..51ccbac2ce 100644
--- a/epan/dissectors/packet-rsl.c
+++ b/epan/dissectors/packet-rsl.c
@@ -2418,7 +2418,7 @@ dissect_rsl_ie_cmd_ind(tvbuff_t *tvb, packet_info *pinfo _U_, proto_tree *tree,
}
- /* TODO Lenght wrong if extended */
+ /* TODO Length wrong if extended */
ti = proto_tree_add_text(tree, tvb,offset,2,"Command indicator IE");
ie_tree = proto_item_add_subtree(ti, ett_ie_cmd_ind);
diff --git a/epan/dissectors/packet-ssl-utils.h b/epan/dissectors/packet-ssl-utils.h
index 4114fe314f..e6d45f4a93 100644
--- a/epan/dissectors/packet-ssl-utils.h
+++ b/epan/dissectors/packet-ssl-utils.h
@@ -382,7 +382,7 @@ ssl_decrypt_pre_master_secret(SslDecryptSession*ssl_session,
@param decoder the stream decoder to be used
@param ct the content type of this ssl record
@param in a pinter to the ssl record to be decrypted
- @param inl the record lenght
+ @param inl the record length
@param out a pointer to the store for the decrypted data
@param outl the decrypted data len
@return 0 on success */
diff --git a/epan/oids.h b/epan/oids.h
index d3823a8ca6..dbf25480cd 100644
--- a/epan/oids.h
+++ b/epan/oids.h
@@ -118,11 +118,11 @@ extern void oids_init(void);
* subids: is an array of guint32s
*/
-/* return lenght of encoded buffer */
+/* return length of encoded buffer */
guint oid_subid2encoded(guint len, guint32* subids, guint8** encoded_p);
guint oid_string2encoded(const gchar *oid_str, guint8** encoded_p);
-/* return lenght of subid array */
+/* return length of subid array */
guint oid_encoded2subid(const guint8 *oid, gint len, guint32** subids_p);
guint oid_string2subid(const gchar *oid_str, guint32** subids_p);
diff --git a/epan/wslua/wslua_dumper.c b/epan/wslua/wslua_dumper.c
index faf361a632..b0fcf6f947 100644
--- a/epan/wslua/wslua_dumper.c
+++ b/epan/wslua/wslua_dumper.c
@@ -77,7 +77,7 @@ WSLUA_CONSTRUCTOR PseudoHeader_eth(lua_State* L) {
Creates an ethernet pseudoheader
*/
-#define WSLUA_OPTARG_PseudoHeader_eth_FCSLEN 1 /* the fcs lenght */
+#define WSLUA_OPTARG_PseudoHeader_eth_FCSLEN 1 /* the fcs length */
PseudoHeader ph = g_malloc(sizeof(struct lua_pseudo_header));
ph->type = PHDR_ETH;
diff --git a/epan/wslua/wslua_tvb.c b/epan/wslua/wslua_tvb.c
index bf605f1668..acb59cb886 100644
--- a/epan/wslua/wslua_tvb.c
+++ b/epan/wslua/wslua_tvb.c
@@ -213,7 +213,7 @@ WSLUA_METHOD ByteArray_len(lua_State* L) {
WSLUA_METHOD ByteArray_subset(lua_State* L) {
/* obtain a segment of a ByteArray */
#define WSLUA_ARG_ByteArray_set_index_OFFSET 2 /* the position of the first byte */
-#define WSLUA_ARG_ByteArray_set_index_LENGTH 2 /* the lenght of the segment */
+#define WSLUA_ARG_ByteArray_set_index_LENGTH 2 /* the length of the segment */
ByteArray ba = checkByteArray(L,1);
int offset = luaL_checkint(L,2);
int len = luaL_checkint(L,3);
@@ -305,7 +305,7 @@ int ByteArray_register(lua_State* L) {
* Tvb & TvbRange
*
* a Tvb represents a tvbuff_t in Lua.
- * a TvbRange represents a range in a tvb (tvb,offset,lenght) it's main purpose is to do bounds checking,
+ * a TvbRange represents a range in a tvb (tvb,offset,length) it's main purpose is to do bounds checking,
* it helps too simplifing argument passing to Tree. In wireshark terms this is worthless nothing
* not already done by the TVB itself. In lua's terms is necessary to avoid abusing TRY{}CATCH(){}
* via preemptive bounds checking.
@@ -415,7 +415,7 @@ WSLUA_METHOD Tvb_len(lua_State* L) {
if (!tvb) return 0;
lua_pushnumber(L,tvb_length(tvb));
- WSLUA_RETURN(1); /* the lenght of the Tvb. */
+ WSLUA_RETURN(1); /* the length of the Tvb. */
}
WSLUA_METHOD Tvb_offset(lua_State* L) {
@@ -439,7 +439,7 @@ WSLUA_METAMETHOD Tvb__call(lua_State* L) {
WSLUA_CLASS_DEFINE(TvbRange,FAIL_ON_NULL("expired tvbrange"),NOP);
/*
* a TvbRange represents an usable range of a Tvb and is used to extract data from the Tvb that generated it
- * TvbRanges are created by calling a tvb (e.g. tvb(offset,lenght)). If the TvbRange span is outside the Tvb's range the creation will cause a runtime error.
+ * TvbRanges are created by calling a tvb (e.g. tvb(offset,length)). If the TvbRange span is outside the Tvb's range the creation will cause a runtime error.
*/
TvbRange new_TvbRange(lua_State* L, tvbuff_t* tvb, int offset, int len) {
@@ -510,7 +510,7 @@ int Tvb_register(lua_State* L) {
*/
static int TvbRange_get_index(lua_State* L) {
/* WSLUA_ATTRIBUTE TvbRange_tvb RO The Tvb from which this TvbRange was generated */
- /* WSLUA_ATTRIBUTE TvbRange_len RW The lenght (in octets) of this TvbRange */
+ /* WSLUA_ATTRIBUTE TvbRange_len RW The length (in octets) of this TvbRange */
/* WSLUA_ATTRIBUTE TvbRange_offset RW The offset (in octets) of this TvbRange */
TvbRange tvbr = checkTvbRange(L,1);