Change "lenght" to "length" and "decypt" to "decrypt"

svn path=/trunk/; revision=22356
This commit is contained in:
Jeff Morriss 2007-07-19 13:05:39 +00:00
parent 9dad88f94b
commit 794a933a2c
8 changed files with 1295 additions and 1295 deletions

View File

@ -329,7 +329,7 @@ static const value_string tab_nacc_cause[]={
{ 0x01, "Syntax error in the Application Container" },
{ 0x02, "Reporting Cell Identifier does not match with the Destination Cell Identifier or with the Source Cell Identifier" },
{ 0x03, "SI/PSI type error" },
{ 0x04, "Inconsistent lenght of a SI/PSI message" },
{ 0x04, "Inconsistent length of a SI/PSI message" },
{ 0x05, "Inconsistent set of messages" },
{ 0, NULL },

View File

@ -1387,7 +1387,7 @@ proto_register_gdsdb(void)
NULL, HFILL }
},
{ &hf_gdsdb_attach_dpb,
{ "Database parameter block", "gdsdb.attach.dpblenght",
{ "Database parameter block", "gdsdb.attach.dpblength",
FT_UINT32, BASE_DEC, NULL, 0x0,
NULL, HFILL }
},
@ -1574,7 +1574,7 @@ proto_register_gdsdb(void)
NULL, HFILL }
},
{ &hf_gdsdb_info_buffer_length,
{ "Buffer lenght", "gdsdb.info.bufferlength",
{ "Buffer length", "gdsdb.info.bufferlength",
FT_UINT32, BASE_DEC, NULL, 0x0,
NULL, HFILL }
},
@ -1655,7 +1655,7 @@ proto_register_gdsdb(void)
},
/* gdsdb_slice_response */
{ &hf_gdsdb_sliceresponse_length,
{ "Lenght", "gdsdb.sliceresponse.lenght",
{ "Lenght", "gdsdb.sliceresponse.length",
FT_UINT32, BASE_DEC, NULL, 0x0,
NULL, HFILL }
},

View File

@ -4033,7 +4033,7 @@ static const ipmi_complcmd_dissect ipmi_complcmd_array[] = {
{ 0x0b, 0x43, 0x81, "Cannot execute command, SEL erase in progress" },
{ 0x0b, 0x44, 0x80, "Operation not supported for this Record Type" },
{ 0x0b, 0x44, 0x81, "Cannot execute command, SEL erase in progress" },
{ 0x0b, 0x45, 0x80, "Record rejected due to mismatch between record lenght in header data and number of bytes written" },
{ 0x0b, 0x45, 0x80, "Record rejected due to mismatch between record length in header data and number of bytes written" },
{ 0x0b, 0x45, 0x81, "Cannot execute command, SEL erase in progress" },
{ 0x0b, 0x46, 0x81, "Operation not supported for this Record Type" },
{ 0x0b, 0x46, 0x81, "Cannot execute command, SEL erase in progress" },

View File

@ -454,7 +454,7 @@ get_netsync_pdu_len(packet_info *pinfo _U_, tvbuff_t *tvb, int offset)
/* the calculated size if for the data only, this doesn't
* include the version (1 byte), command (1 byte),
* lenght (size_bytes bytes) and checksum (4 bytes)
* length (size_bytes bytes) and checksum (4 bytes)
*/
return 1 + 1 + size_bytes + size + 4;

View File

@ -170,7 +170,7 @@ dissect_sebek(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree)
ti = proto_tree_add_item(tree, proto_sebek, tvb, 0, -1, FALSE);
sebek_tree = proto_item_add_subtree(ti, ett_sebek);
/* check for minimum lenght before deciding where to go*/
/* check for minimum length before deciding where to go*/
if (tvb->length<6)
sebek_ver = 0;
else

View File

@ -1483,7 +1483,7 @@ static tvbuff_t* snmp_usm_priv_des(snmp_usm_params_t* p _U_, tvbuff_t* encrypted
salt_len = tvb_length_remaining(p->priv_tvb,0);
if (salt_len != 8) {
*error = "decryptionError: msgPrivacyParameters lenght != 8";
*error = "decryptionError: msgPrivacyParameters length != 8";
return NULL;
}
@ -1551,7 +1551,7 @@ static tvbuff_t* snmp_usm_priv_aes(snmp_usm_params_t* p _U_, tvbuff_t* encrypted
priv_len = tvb_length_remaining(p->priv_tvb,0);
if (priv_len != 8) {
*error = "decryptionError: msgPrivacyParameters lenght != 8";
*error = "decryptionError: msgPrivacyParameters length != 8";
return NULL;
}

View File

@ -734,7 +734,7 @@ ssl_private_decrypt(guint len, guchar* encr_data, SSL_PRIVATE_KEY* pk)
ssl_debug_printf("pcry_private_decrypt: stripping %d bytes, decr_len %d\n",
rc, decr_len);
ssl_print_data("decypted_unstrip_pre_master", decr_data_ptr, decr_len);
ssl_print_data("decrypted_unstrip_pre_master", decr_data_ptr, decr_len);
g_memmove(decr_data_ptr, &decr_data_ptr[rc], decr_len - rc);
decr_len -= rc;
@ -771,7 +771,7 @@ out:
ssl_debug_printf("pcry_private_decrypt: stripping %d bytes, decr_len %d\n",
rc, decr_len);
ssl_print_data("decypted_unstrip_pre_master", decr_data_ptr, decr_len);
ssl_print_data("decrypted_unstrip_pre_master", decr_data_ptr, decr_len);
g_memmove(decr_data_ptr, &decr_data_ptr[rc], decr_len - rc);
decr_len -= rc;
#endif /* SSL_FAST */
@ -1403,7 +1403,7 @@ ssl_decrypt_pre_master_secret(SslDecryptSession*ssl_session,
if (i!=48) {
ssl_debug_printf("ssl_decrypt_pre_master_secret wrong "
"pre_master_secret lenght (%d, expected %d)\n", i, 48);
"pre_master_secret length (%d, expected %d)\n", i, 48);
return -1;
}
@ -1458,7 +1458,7 @@ tls_check_mac(SslDecoder*decoder, gint ct, gint ver, guint8* data,
buf[0]=ct;
ssl_hmac_update(&hm,buf,1);
/* hash version,data lenght and data*/
/* hash version,data length and data*/
*((gint16*)buf) = g_htons(ver);
ssl_hmac_update(&hm,buf,2);
@ -1508,7 +1508,7 @@ ssl3_check_mac(SslDecoder*decoder,int ct,guint8* data,
buf[0]=ct;
ssl_md_update(&mc,buf,1);
/* hash data lenght in network byte order and data*/
/* hash data length in network byte order and data*/
*((gint16* )buf) = g_htons(datalen);
ssl_md_update(&mc,buf,2);
ssl_md_update(&mc,data,datalen);
@ -1563,7 +1563,7 @@ dtls_check_mac(SslDecoder*decoder, gint ct,int ver, guint8* data,
buf[0]=ct;
ssl_hmac_update(&hm,buf,1);
/* hash version,data lenght and data */
/* hash version,data length and data */
*((gint16*)buf) = g_htons(ver);
ssl_hmac_update(&hm,buf,2);

View File

@ -483,7 +483,7 @@ t30_get_string_numbers(tvbuff_t *tvb, int offset, int len)
gchar *buf;
int i;
/* the lenght must be 20 bytes per T30 rec*/
/* the length must be 20 bytes per T30 rec*/
if (len != LENGTH_T30_NUM) return NULL;
buf=ep_alloc(LENGTH_T30_NUM+1);