forked from osmocom/wireshark
Change "lenght" to "length" and "decypt" to "decrypt"
svn path=/trunk/; revision=22356
This commit is contained in:
parent
9dad88f94b
commit
794a933a2c
|
@ -329,7 +329,7 @@ static const value_string tab_nacc_cause[]={
|
|||
{ 0x01, "Syntax error in the Application Container" },
|
||||
{ 0x02, "Reporting Cell Identifier does not match with the Destination Cell Identifier or with the Source Cell Identifier" },
|
||||
{ 0x03, "SI/PSI type error" },
|
||||
{ 0x04, "Inconsistent lenght of a SI/PSI message" },
|
||||
{ 0x04, "Inconsistent length of a SI/PSI message" },
|
||||
{ 0x05, "Inconsistent set of messages" },
|
||||
{ 0, NULL },
|
||||
|
||||
|
|
|
@ -1387,7 +1387,7 @@ proto_register_gdsdb(void)
|
|||
NULL, HFILL }
|
||||
},
|
||||
{ &hf_gdsdb_attach_dpb,
|
||||
{ "Database parameter block", "gdsdb.attach.dpblenght",
|
||||
{ "Database parameter block", "gdsdb.attach.dpblength",
|
||||
FT_UINT32, BASE_DEC, NULL, 0x0,
|
||||
NULL, HFILL }
|
||||
},
|
||||
|
@ -1574,7 +1574,7 @@ proto_register_gdsdb(void)
|
|||
NULL, HFILL }
|
||||
},
|
||||
{ &hf_gdsdb_info_buffer_length,
|
||||
{ "Buffer lenght", "gdsdb.info.bufferlength",
|
||||
{ "Buffer length", "gdsdb.info.bufferlength",
|
||||
FT_UINT32, BASE_DEC, NULL, 0x0,
|
||||
NULL, HFILL }
|
||||
},
|
||||
|
@ -1655,7 +1655,7 @@ proto_register_gdsdb(void)
|
|||
},
|
||||
/* gdsdb_slice_response */
|
||||
{ &hf_gdsdb_sliceresponse_length,
|
||||
{ "Lenght", "gdsdb.sliceresponse.lenght",
|
||||
{ "Lenght", "gdsdb.sliceresponse.length",
|
||||
FT_UINT32, BASE_DEC, NULL, 0x0,
|
||||
NULL, HFILL }
|
||||
},
|
||||
|
|
|
@ -4033,7 +4033,7 @@ static const ipmi_complcmd_dissect ipmi_complcmd_array[] = {
|
|||
{ 0x0b, 0x43, 0x81, "Cannot execute command, SEL erase in progress" },
|
||||
{ 0x0b, 0x44, 0x80, "Operation not supported for this Record Type" },
|
||||
{ 0x0b, 0x44, 0x81, "Cannot execute command, SEL erase in progress" },
|
||||
{ 0x0b, 0x45, 0x80, "Record rejected due to mismatch between record lenght in header data and number of bytes written" },
|
||||
{ 0x0b, 0x45, 0x80, "Record rejected due to mismatch between record length in header data and number of bytes written" },
|
||||
{ 0x0b, 0x45, 0x81, "Cannot execute command, SEL erase in progress" },
|
||||
{ 0x0b, 0x46, 0x81, "Operation not supported for this Record Type" },
|
||||
{ 0x0b, 0x46, 0x81, "Cannot execute command, SEL erase in progress" },
|
||||
|
|
|
@ -454,7 +454,7 @@ get_netsync_pdu_len(packet_info *pinfo _U_, tvbuff_t *tvb, int offset)
|
|||
|
||||
/* the calculated size if for the data only, this doesn't
|
||||
* include the version (1 byte), command (1 byte),
|
||||
* lenght (size_bytes bytes) and checksum (4 bytes)
|
||||
* length (size_bytes bytes) and checksum (4 bytes)
|
||||
*/
|
||||
|
||||
return 1 + 1 + size_bytes + size + 4;
|
||||
|
|
|
@ -170,7 +170,7 @@ dissect_sebek(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree)
|
|||
ti = proto_tree_add_item(tree, proto_sebek, tvb, 0, -1, FALSE);
|
||||
sebek_tree = proto_item_add_subtree(ti, ett_sebek);
|
||||
|
||||
/* check for minimum lenght before deciding where to go*/
|
||||
/* check for minimum length before deciding where to go*/
|
||||
if (tvb->length<6)
|
||||
sebek_ver = 0;
|
||||
else
|
||||
|
|
|
@ -1483,7 +1483,7 @@ static tvbuff_t* snmp_usm_priv_des(snmp_usm_params_t* p _U_, tvbuff_t* encrypted
|
|||
salt_len = tvb_length_remaining(p->priv_tvb,0);
|
||||
|
||||
if (salt_len != 8) {
|
||||
*error = "decryptionError: msgPrivacyParameters lenght != 8";
|
||||
*error = "decryptionError: msgPrivacyParameters length != 8";
|
||||
return NULL;
|
||||
}
|
||||
|
||||
|
@ -1551,7 +1551,7 @@ static tvbuff_t* snmp_usm_priv_aes(snmp_usm_params_t* p _U_, tvbuff_t* encrypted
|
|||
priv_len = tvb_length_remaining(p->priv_tvb,0);
|
||||
|
||||
if (priv_len != 8) {
|
||||
*error = "decryptionError: msgPrivacyParameters lenght != 8";
|
||||
*error = "decryptionError: msgPrivacyParameters length != 8";
|
||||
return NULL;
|
||||
}
|
||||
|
||||
|
|
|
@ -734,7 +734,7 @@ ssl_private_decrypt(guint len, guchar* encr_data, SSL_PRIVATE_KEY* pk)
|
|||
|
||||
ssl_debug_printf("pcry_private_decrypt: stripping %d bytes, decr_len %d\n",
|
||||
rc, decr_len);
|
||||
ssl_print_data("decypted_unstrip_pre_master", decr_data_ptr, decr_len);
|
||||
ssl_print_data("decrypted_unstrip_pre_master", decr_data_ptr, decr_len);
|
||||
g_memmove(decr_data_ptr, &decr_data_ptr[rc], decr_len - rc);
|
||||
decr_len -= rc;
|
||||
|
||||
|
@ -771,7 +771,7 @@ out:
|
|||
|
||||
ssl_debug_printf("pcry_private_decrypt: stripping %d bytes, decr_len %d\n",
|
||||
rc, decr_len);
|
||||
ssl_print_data("decypted_unstrip_pre_master", decr_data_ptr, decr_len);
|
||||
ssl_print_data("decrypted_unstrip_pre_master", decr_data_ptr, decr_len);
|
||||
g_memmove(decr_data_ptr, &decr_data_ptr[rc], decr_len - rc);
|
||||
decr_len -= rc;
|
||||
#endif /* SSL_FAST */
|
||||
|
@ -1403,7 +1403,7 @@ ssl_decrypt_pre_master_secret(SslDecryptSession*ssl_session,
|
|||
|
||||
if (i!=48) {
|
||||
ssl_debug_printf("ssl_decrypt_pre_master_secret wrong "
|
||||
"pre_master_secret lenght (%d, expected %d)\n", i, 48);
|
||||
"pre_master_secret length (%d, expected %d)\n", i, 48);
|
||||
return -1;
|
||||
}
|
||||
|
||||
|
@ -1458,7 +1458,7 @@ tls_check_mac(SslDecoder*decoder, gint ct, gint ver, guint8* data,
|
|||
buf[0]=ct;
|
||||
ssl_hmac_update(&hm,buf,1);
|
||||
|
||||
/* hash version,data lenght and data*/
|
||||
/* hash version,data length and data*/
|
||||
*((gint16*)buf) = g_htons(ver);
|
||||
ssl_hmac_update(&hm,buf,2);
|
||||
|
||||
|
@ -1508,7 +1508,7 @@ ssl3_check_mac(SslDecoder*decoder,int ct,guint8* data,
|
|||
buf[0]=ct;
|
||||
ssl_md_update(&mc,buf,1);
|
||||
|
||||
/* hash data lenght in network byte order and data*/
|
||||
/* hash data length in network byte order and data*/
|
||||
*((gint16* )buf) = g_htons(datalen);
|
||||
ssl_md_update(&mc,buf,2);
|
||||
ssl_md_update(&mc,data,datalen);
|
||||
|
@ -1563,7 +1563,7 @@ dtls_check_mac(SslDecoder*decoder, gint ct,int ver, guint8* data,
|
|||
buf[0]=ct;
|
||||
ssl_hmac_update(&hm,buf,1);
|
||||
|
||||
/* hash version,data lenght and data */
|
||||
/* hash version,data length and data */
|
||||
*((gint16*)buf) = g_htons(ver);
|
||||
ssl_hmac_update(&hm,buf,2);
|
||||
|
||||
|
|
|
@ -483,7 +483,7 @@ t30_get_string_numbers(tvbuff_t *tvb, int offset, int len)
|
|||
gchar *buf;
|
||||
int i;
|
||||
|
||||
/* the lenght must be 20 bytes per T30 rec*/
|
||||
/* the length must be 20 bytes per T30 rec*/
|
||||
if (len != LENGTH_T30_NUM) return NULL;
|
||||
|
||||
buf=ep_alloc(LENGTH_T30_NUM+1);
|
||||
|
|
Loading…
Reference in New Issue