Fix some spelling errors

This commit is contained in:
Martin Mathieson 2023-02-04 11:00:34 +00:00 committed by Martin Mathieson
parent ecbfda08c4
commit 8812c5ed20
4 changed files with 18 additions and 9 deletions

View File

@ -15878,7 +15878,7 @@ void proto_register_rtps(void) {
FT_BOOLEAN, 8, TFS(&tfs_set_notset), RTPS_HE_TIMESTAMP_FLAG, NULL, HFILL } FT_BOOLEAN, 8, TFS(&tfs_set_notset), RTPS_HE_TIMESTAMP_FLAG, NULL, HFILL }
}, },
{ &hf_rtps_flag_header_extension_message_length, { { &hf_rtps_flag_header_extension_message_length, {
"Header Extension Message Length", "rtps.flag.header_extension.message_legth", "Header Extension Message Length", "rtps.flag.header_extension.message_length",
FT_BOOLEAN, 8, TFS(&tfs_set_notset), RTPS_HE_MESSAGE_LENGTH_FLAG, NULL, HFILL } FT_BOOLEAN, 8, TFS(&tfs_set_notset), RTPS_HE_MESSAGE_LENGTH_FLAG, NULL, HFILL }
}, },
{ &hf_rtps_header_extension_checksum, { { &hf_rtps_header_extension_checksum, {

View File

@ -1144,7 +1144,7 @@ ssh_tree_add_hostsignature(tvbuff_t *tvb, packet_info *pinfo, int offset, proto_
} }
if(offset-offset0!=(int)(4+sig_len)){ if(offset-offset0!=(int)(4+sig_len)){
expert_add_info_format(pinfo, ti, &ei_ssh_packet_decode, "Decoded %d bytes, but packet legnth is %d bytes", offset-offset0, sig_len); expert_add_info_format(pinfo, ti, &ei_ssh_packet_decode, "Decoded %d bytes, but packet length is %d bytes", offset-offset0, sig_len);
} }
return 4+sig_len; return 4+sig_len;
@ -3531,8 +3531,8 @@ ssh_dissect_decrypted_packet(tvbuff_t *tvb, packet_info *pinfo,
proto_tree_add_item(msg_type_tree, hf_ssh_payload, packet_tvb, offset, len, ENC_NA); proto_tree_add_item(msg_type_tree, hf_ssh_payload, packet_tvb, offset, len, ENC_NA);
} }
if(dissected_len!=(int)len){ if(dissected_len!=(int)len){
// expert_add_info_format(pinfo, ti, &ei_ssh_packet_decode, "Decoded %d bytes, but packet legnth is %d bytes", dissected_len, len); // expert_add_info_format(pinfo, ti, &ei_ssh_packet_decode, "Decoded %d bytes, but packet length is %d bytes", dissected_len, len);
expert_add_info_format(pinfo, ti, &ei_ssh_packet_decode, "Decoded %d bytes, but packet legnth is %d bytes [%d]", dissected_len, len, msg_code); expert_add_info_format(pinfo, ti, &ei_ssh_packet_decode, "Decoded %d bytes, but packet length is %d bytes [%d]", dissected_len, len, msg_code);
} }
offset +=len; offset +=len;
@ -3639,7 +3639,7 @@ ssh_dissect_userauth_generic(tvbuff_t *packet_tvb, packet_info *pinfo,
// proto_tree_add_item(blob_tree, hf_ssh2_msg_code, packet_tvb, offset, 1, ENC_BIG_ENDIAN); // proto_tree_add_item(blob_tree, hf_ssh2_msg_code, packet_tvb, offset, 1, ENC_BIG_ENDIAN);
dissected_len = ssh_dissect_public_key_blob(packet_tvb, pinfo, offset, blob_tree) - offset; dissected_len = ssh_dissect_public_key_blob(packet_tvb, pinfo, offset, blob_tree) - offset;
if(dissected_len!=(int)slen){ if(dissected_len!=(int)slen){
expert_add_info_format(pinfo, blob_tree, &ei_ssh_packet_decode, "Decoded %d bytes, but packet legnth is %d bytes", dissected_len, slen); expert_add_info_format(pinfo, blob_tree, &ei_ssh_packet_decode, "Decoded %d bytes, but packet length is %d bytes", dissected_len, slen);
} }
offset += slen; offset += slen;
if(bHaveSignature){ if(bHaveSignature){
@ -3650,7 +3650,7 @@ ssh_dissect_userauth_generic(tvbuff_t *packet_tvb, packet_info *pinfo,
signature_tree = proto_tree_add_subtree(msg_type_tree, packet_tvb, offset, slen, ett_userauth_pk_signautre, NULL, "Public key signature"); signature_tree = proto_tree_add_subtree(msg_type_tree, packet_tvb, offset, slen, ett_userauth_pk_signautre, NULL, "Public key signature");
dissected_len = ssh_dissect_public_key_signature(packet_tvb, pinfo, offset, signature_tree) - offset; dissected_len = ssh_dissect_public_key_signature(packet_tvb, pinfo, offset, signature_tree) - offset;
if(dissected_len!=(int)slen){ if(dissected_len!=(int)slen){
expert_add_info_format(pinfo, signature_tree, &ei_ssh_packet_decode, "Decoded %d bytes, but packet legnth is %d bytes", dissected_len, slen); expert_add_info_format(pinfo, signature_tree, &ei_ssh_packet_decode, "Decoded %d bytes, but packet length is %d bytes", dissected_len, slen);
} }
offset += slen; offset += slen;
} }
@ -3706,7 +3706,7 @@ ssh_dissect_userauth_specific(tvbuff_t *packet_tvb, packet_info *pinfo,
blob_tree = proto_tree_add_subtree(msg_type_tree, packet_tvb, offset, slen, ett_userauth_pk_blob, NULL, "Public key blob"); blob_tree = proto_tree_add_subtree(msg_type_tree, packet_tvb, offset, slen, ett_userauth_pk_blob, NULL, "Public key blob");
dissected_len = ssh_dissect_public_key_blob(packet_tvb, pinfo, offset, blob_tree) - offset; dissected_len = ssh_dissect_public_key_blob(packet_tvb, pinfo, offset, blob_tree) - offset;
if(dissected_len!=(int)slen){ if(dissected_len!=(int)slen){
expert_add_info_format(pinfo, ti, &ei_ssh_packet_decode, "Decoded %d bytes, but packet legnth is %d bytes", dissected_len, slen); expert_add_info_format(pinfo, ti, &ei_ssh_packet_decode, "Decoded %d bytes, but packet length is %d bytes", dissected_len, slen);
} }
offset += slen; offset += slen;
} }
@ -3866,7 +3866,7 @@ ssh_dissect_connection_generic(tvbuff_t *packet_tvb, packet_info *pinfo,
blob_tree = proto_tree_add_subtree(msg_type_tree, packet_tvb, offset, alen, ett_userauth_pk_blob, NULL, "Public key blob"); blob_tree = proto_tree_add_subtree(msg_type_tree, packet_tvb, offset, alen, ett_userauth_pk_blob, NULL, "Public key blob");
dissected_len = ssh_dissect_public_key_blob(packet_tvb, pinfo, offset, blob_tree) - offset; dissected_len = ssh_dissect_public_key_blob(packet_tvb, pinfo, offset, blob_tree) - offset;
if(dissected_len!=(int)alen){ if(dissected_len!=(int)alen){
expert_add_info_format(pinfo, ti, &ei_ssh_packet_decode, "Decoded %d bytes, but packet legnth is %d bytes", dissected_len, alen); expert_add_info_format(pinfo, ti, &ei_ssh_packet_decode, "Decoded %d bytes, but packet length is %d bytes", dissected_len, alen);
} }
offset += alen; offset += alen;
} }

View File

@ -4859,7 +4859,7 @@ proto_register_wimaxmacphy(void)
{ {
&hf_wimaxmacphy_sub_burst_harq_chase_harq_channel_id, &hf_wimaxmacphy_sub_burst_harq_chase_harq_channel_id,
{ {
"HARQ channeld id (ACID)", "HARQ channel id (ACID)",
"wimaxmacphy.sub_burst_harq_chase_harq_channel_id", "wimaxmacphy.sub_burst_harq_chase_harq_channel_id",
FT_UINT8, FT_UINT8,
BASE_DEC, BASE_DEC,

View File

@ -89,6 +89,7 @@ attendee
attrib attrib
attrs attrs
audigy audigy
authcitrix
authen authen
authenticates authenticates
authenticator authenticator
@ -396,6 +397,7 @@ dfilter
dfilters dfilters
dfsauth dfsauth
dftest dftest
dgotyp
dgram dgram
dhcpv dhcpv
dialed dialed
@ -496,6 +498,7 @@ erspan
España España
esperanto esperanto
etheraddr etheraddr
ethercat
ethers ethers
ethertype ethertype
etlfile etlfile
@ -805,6 +808,7 @@ mappable
mariadb mariadb
marvell marvell
mathieson mathieson
matrixes
maxlen maxlen
maybefcs maybefcs
mbits mbits
@ -968,6 +972,7 @@ ntohs
nullptr nullptr
nvmeof nvmeof
nvram nvram
oampdu
obfuscated obfuscated
objectid objectid
objkey objkey
@ -1008,6 +1013,7 @@ oscillatory
oscore oscore
osdmap osdmap
osmocom osmocom
osmux
ospf6 ospf6
outhdr outhdr
pacch pacch
@ -1138,6 +1144,7 @@ queryset
quiescing quiescing
quintuplet quintuplet
quintuplets quintuplets
r3info
radcom radcom
radeon radeon
radiotap radiotap
@ -1451,6 +1458,7 @@ symantec
synchronizer synchronizer
synchronizing synchronizing
synchronously synchronously
syncman
synphasor synphasor
syntaxes syntaxes
sysdig sysdig
@ -1678,6 +1686,7 @@ usability
usbmon usbmon
usbms usbms
usbpcap usbpcap
userauth
userdata userdata
userinfo userinfo
userlist userlist