diff --git a/epan/dissectors/packet-rtps.c b/epan/dissectors/packet-rtps.c index 1dfb32f3b9..be62d9fc2c 100644 --- a/epan/dissectors/packet-rtps.c +++ b/epan/dissectors/packet-rtps.c @@ -15878,7 +15878,7 @@ void proto_register_rtps(void) { FT_BOOLEAN, 8, TFS(&tfs_set_notset), RTPS_HE_TIMESTAMP_FLAG, NULL, HFILL } }, { &hf_rtps_flag_header_extension_message_length, { - "Header Extension Message Length", "rtps.flag.header_extension.message_legth", + "Header Extension Message Length", "rtps.flag.header_extension.message_length", FT_BOOLEAN, 8, TFS(&tfs_set_notset), RTPS_HE_MESSAGE_LENGTH_FLAG, NULL, HFILL } }, { &hf_rtps_header_extension_checksum, { diff --git a/epan/dissectors/packet-ssh.c b/epan/dissectors/packet-ssh.c index cb50189fc8..3142312255 100644 --- a/epan/dissectors/packet-ssh.c +++ b/epan/dissectors/packet-ssh.c @@ -1144,7 +1144,7 @@ ssh_tree_add_hostsignature(tvbuff_t *tvb, packet_info *pinfo, int offset, proto_ } if(offset-offset0!=(int)(4+sig_len)){ - expert_add_info_format(pinfo, ti, &ei_ssh_packet_decode, "Decoded %d bytes, but packet legnth is %d bytes", offset-offset0, sig_len); + expert_add_info_format(pinfo, ti, &ei_ssh_packet_decode, "Decoded %d bytes, but packet length is %d bytes", offset-offset0, sig_len); } return 4+sig_len; @@ -3531,8 +3531,8 @@ ssh_dissect_decrypted_packet(tvbuff_t *tvb, packet_info *pinfo, proto_tree_add_item(msg_type_tree, hf_ssh_payload, packet_tvb, offset, len, ENC_NA); } if(dissected_len!=(int)len){ -// expert_add_info_format(pinfo, ti, &ei_ssh_packet_decode, "Decoded %d bytes, but packet legnth is %d bytes", dissected_len, len); - expert_add_info_format(pinfo, ti, &ei_ssh_packet_decode, "Decoded %d bytes, but packet legnth is %d bytes [%d]", dissected_len, len, msg_code); +// expert_add_info_format(pinfo, ti, &ei_ssh_packet_decode, "Decoded %d bytes, but packet length is %d bytes", dissected_len, len); + expert_add_info_format(pinfo, ti, &ei_ssh_packet_decode, "Decoded %d bytes, but packet length is %d bytes [%d]", dissected_len, len, msg_code); } offset +=len; @@ -3639,7 +3639,7 @@ ssh_dissect_userauth_generic(tvbuff_t *packet_tvb, packet_info *pinfo, // proto_tree_add_item(blob_tree, hf_ssh2_msg_code, packet_tvb, offset, 1, ENC_BIG_ENDIAN); dissected_len = ssh_dissect_public_key_blob(packet_tvb, pinfo, offset, blob_tree) - offset; if(dissected_len!=(int)slen){ - expert_add_info_format(pinfo, blob_tree, &ei_ssh_packet_decode, "Decoded %d bytes, but packet legnth is %d bytes", dissected_len, slen); + expert_add_info_format(pinfo, blob_tree, &ei_ssh_packet_decode, "Decoded %d bytes, but packet length is %d bytes", dissected_len, slen); } offset += slen; if(bHaveSignature){ @@ -3650,7 +3650,7 @@ ssh_dissect_userauth_generic(tvbuff_t *packet_tvb, packet_info *pinfo, signature_tree = proto_tree_add_subtree(msg_type_tree, packet_tvb, offset, slen, ett_userauth_pk_signautre, NULL, "Public key signature"); dissected_len = ssh_dissect_public_key_signature(packet_tvb, pinfo, offset, signature_tree) - offset; if(dissected_len!=(int)slen){ - expert_add_info_format(pinfo, signature_tree, &ei_ssh_packet_decode, "Decoded %d bytes, but packet legnth is %d bytes", dissected_len, slen); + expert_add_info_format(pinfo, signature_tree, &ei_ssh_packet_decode, "Decoded %d bytes, but packet length is %d bytes", dissected_len, slen); } offset += slen; } @@ -3706,7 +3706,7 @@ ssh_dissect_userauth_specific(tvbuff_t *packet_tvb, packet_info *pinfo, blob_tree = proto_tree_add_subtree(msg_type_tree, packet_tvb, offset, slen, ett_userauth_pk_blob, NULL, "Public key blob"); dissected_len = ssh_dissect_public_key_blob(packet_tvb, pinfo, offset, blob_tree) - offset; if(dissected_len!=(int)slen){ - expert_add_info_format(pinfo, ti, &ei_ssh_packet_decode, "Decoded %d bytes, but packet legnth is %d bytes", dissected_len, slen); + expert_add_info_format(pinfo, ti, &ei_ssh_packet_decode, "Decoded %d bytes, but packet length is %d bytes", dissected_len, slen); } offset += slen; } @@ -3866,7 +3866,7 @@ ssh_dissect_connection_generic(tvbuff_t *packet_tvb, packet_info *pinfo, blob_tree = proto_tree_add_subtree(msg_type_tree, packet_tvb, offset, alen, ett_userauth_pk_blob, NULL, "Public key blob"); dissected_len = ssh_dissect_public_key_blob(packet_tvb, pinfo, offset, blob_tree) - offset; if(dissected_len!=(int)alen){ - expert_add_info_format(pinfo, ti, &ei_ssh_packet_decode, "Decoded %d bytes, but packet legnth is %d bytes", dissected_len, alen); + expert_add_info_format(pinfo, ti, &ei_ssh_packet_decode, "Decoded %d bytes, but packet length is %d bytes", dissected_len, alen); } offset += alen; } diff --git a/plugins/epan/wimaxmacphy/packet-wimaxmacphy.c b/plugins/epan/wimaxmacphy/packet-wimaxmacphy.c index 082037cff7..514f49ff76 100644 --- a/plugins/epan/wimaxmacphy/packet-wimaxmacphy.c +++ b/plugins/epan/wimaxmacphy/packet-wimaxmacphy.c @@ -4859,7 +4859,7 @@ proto_register_wimaxmacphy(void) { &hf_wimaxmacphy_sub_burst_harq_chase_harq_channel_id, { - "HARQ channeld id (ACID)", + "HARQ channel id (ACID)", "wimaxmacphy.sub_burst_harq_chase_harq_channel_id", FT_UINT8, BASE_DEC, diff --git a/tools/wireshark_words.txt b/tools/wireshark_words.txt index af350f51c6..80d351837b 100644 --- a/tools/wireshark_words.txt +++ b/tools/wireshark_words.txt @@ -89,6 +89,7 @@ attendee attrib attrs audigy +authcitrix authen authenticates authenticator @@ -396,6 +397,7 @@ dfilter dfilters dfsauth dftest +dgotyp dgram dhcpv dialed @@ -496,6 +498,7 @@ erspan EspaƱa esperanto etheraddr +ethercat ethers ethertype etlfile @@ -805,6 +808,7 @@ mappable mariadb marvell mathieson +matrixes maxlen maybefcs mbits @@ -968,6 +972,7 @@ ntohs nullptr nvmeof nvram +oampdu obfuscated objectid objkey @@ -1008,6 +1013,7 @@ oscillatory oscore osdmap osmocom +osmux ospf6 outhdr pacch @@ -1138,6 +1144,7 @@ queryset quiescing quintuplet quintuplets +r3info radcom radeon radiotap @@ -1451,6 +1458,7 @@ symantec synchronizer synchronizing synchronously +syncman synphasor syntaxes sysdig @@ -1678,6 +1686,7 @@ usability usbmon usbms usbpcap +userauth userdata userinfo userlist