Fix a lot of typos and misspellings

Change-Id: I8512cfa1d424f82a873a0e0e1d22c7b075fdd7f3
Reviewed-on: https://code.wireshark.org/review/13069
Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com>
Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
Reviewed-by: Michael Mann <mmann78@netscape.net>
daniel/osmux
moshekaplan 7 years ago committed by Michael Mann
parent c1bcbb6eee
commit cd7026951b
  1. 2
      asn1/acse/packet-acse-template.c
  2. 2
      asn1/c1222/packet-c1222-template.c
  3. 2
      asn1/camel/camel.asn
  4. 2
      asn1/cmip/cmip.cnf
  5. 2
      asn1/gprscdr/GenericChargingDataTypes.asn
  6. 2
      asn1/ranap/packet-ranap-template.c
  7. 2
      asn1/ranap/ranap.cnf
  8. 4
      asn1/s1ap/s1ap.cnf
  9. 10
      asn1/tetra/tetra.asn
  10. 2
      epan/addr_resolv.c
  11. 2
      epan/dissectors/packet-6lowpan.c
  12. 8
      epan/dissectors/packet-9p.c
  13. 20
      epan/dissectors/packet-acn.c
  14. 2
      epan/dissectors/packet-acse.c
  15. 2
      epan/dissectors/packet-adb.c
  16. 2
      epan/dissectors/packet-adb_cs.c
  17. 2
      epan/dissectors/packet-adb_service.c
  18. 2
      epan/dissectors/packet-afp.c
  19. 4
      epan/dissectors/packet-ajp13.c
  20. 4
      epan/dissectors/packet-alcap.c
  21. 22
      epan/dissectors/packet-alljoyn.c
  22. 6
      epan/dissectors/packet-amqp.c
  23. 2
      epan/dissectors/packet-amr.c
  24. 2
      epan/dissectors/packet-applemidi.c
  25. 4
      epan/dissectors/packet-ber.c
  26. 8
      epan/dissectors/packet-bgp.c
  27. 4
      epan/dissectors/packet-bssgp.c
  28. 38
      epan/dissectors/packet-btavdtp.c
  29. 2
      epan/dissectors/packet-btavdtp.h
  30. 2
      epan/dissectors/packet-btobex.c
  31. 2
      epan/dissectors/packet-btsdp.h
  32. 2
      epan/dissectors/packet-c1222.c
  33. 2
      epan/dissectors/packet-cipmotion.c
  34. 2
      epan/dissectors/packet-cipsafety.c
  35. 2
      epan/dissectors/packet-cmip.c
  36. 6
      epan/dissectors/packet-corosync-totemsrp.c
  37. 6
      epan/dissectors/packet-dhcp-failover.c
  38. 10
      epan/dissectors/packet-diameter.c
  39. 2
      epan/dissectors/packet-diameter_3gpp.c
  40. 2
      epan/dissectors/packet-distcc.c
  41. 2
      epan/dissectors/packet-dji-uav.c
  42. 8
      epan/dissectors/packet-ecmp.c
  43. 2
      epan/dissectors/packet-epl.c
  44. 2
      epan/dissectors/packet-epon.c
  45. 2
      epan/dissectors/packet-erf.c
  46. 4
      epan/dissectors/packet-eth.c
  47. 2
      epan/dissectors/packet-ethertype.c
  48. 6
      epan/dissectors/packet-etsi_card_app_toolkit.c
  49. 2
      epan/dissectors/packet-extreme.c
  50. 2
      epan/dissectors/packet-forces.c
  51. 2
      epan/dissectors/packet-gsm_ipa.c
  52. 2
      epan/dissectors/packet-gtpv2.c
  53. 2
      epan/dissectors/packet-h223.c
  54. 2
      epan/dissectors/packet-h450-ros.c
  55. 2
      epan/dissectors/packet-hartip.c
  56. 20
      epan/dissectors/packet-idrp.c
  57. 36
      epan/dissectors/packet-iec104.c
  58. 12
      epan/dissectors/packet-ieee17221.c
  59. 2
      epan/dissectors/packet-ieee1722a.c
  60. 10
      epan/dissectors/packet-ieee802154.c
  61. 2
      epan/dissectors/packet-igap.c
  62. 2
      epan/dissectors/packet-ipmi-session.c
  63. 14
      epan/dissectors/packet-ipsec.c
  64. 4
      epan/dissectors/packet-iscsi.c
  65. 2
      epan/dissectors/packet-isi.c
  66. 4
      epan/dissectors/packet-isis-hello.c
  67. 8
      epan/dissectors/packet-isis-lsp.c
  68. 2
      epan/dissectors/packet-isl.c
  69. 2
      epan/dissectors/packet-ismacryp.c
  70. 2
      epan/dissectors/packet-ismp.c
  71. 2
      epan/dissectors/packet-isns.c
  72. 2
      epan/dissectors/packet-iso14443.c
  73. 48
      epan/dissectors/packet-isup.c
  74. 6
      epan/dissectors/packet-iwarp-mpa.c
  75. 2
      epan/dissectors/packet-ixveriwave.c
  76. 2
      epan/dissectors/packet-jmirror.c
  77. 2
      epan/dissectors/packet-juniper.c
  78. 2
      epan/dissectors/packet-kingfisher.c
  79. 4
      epan/dissectors/packet-kink.c
  80. 4
      epan/dissectors/packet-kismet.c
  81. 6
      epan/dissectors/packet-l2tp.c
  82. 2
      epan/dissectors/packet-lapd.c
  83. 4
      epan/dissectors/packet-lbmc.c
  84. 2
      epan/dissectors/packet-linx.c
  85. 4
      epan/dissectors/packet-lldp.c
  86. 2
      epan/dissectors/packet-llrp.c
  87. 4
      epan/dissectors/packet-lmp.c
  88. 2
      epan/dissectors/packet-lwapp.c
  89. 2
      epan/dissectors/packet-mausb.c
  90. 2
      epan/dissectors/packet-mbtcp.c
  91. 2
      epan/dissectors/packet-mcpe.c
  92. 2
      epan/dissectors/packet-megaco.c
  93. 8
      epan/dissectors/packet-mih.c
  94. 2
      epan/dissectors/packet-mint.c
  95. 6
      epan/dissectors/packet-mip.c
  96. 2
      epan/dissectors/packet-mip6.c
  97. 2
      epan/dissectors/packet-mmse.c
  98. 2
      epan/dissectors/packet-mount.c
  99. 10
      epan/dissectors/packet-mp2t.c
  100. 2
      epan/dissectors/packet-mp4ves.c
  101. Some files were not shown because too many files have changed in this diff Show More

@ -199,7 +199,7 @@ dissect_acse(tvbuff_t *tvb, packet_info *pinfo, proto_tree *parent_tree, void* d
case SES_DISCONNECT: /* RLRQ */
case SES_FINISH: /* RLRE */
case SES_ABORT: /* ABRT */
case CLSES_UNIT_DATA: /* AARQ Connetctionless session */
case CLSES_UNIT_DATA: /* AARQ Connectionless session */
break;
case SES_DATA_TRANSFER:
oid=find_oid_by_pres_ctx_id(pinfo, indir_ref);

@ -865,7 +865,7 @@ decrypt_packet(guchar *buffer, guint32 length, gboolean decrypt)
* Checks to make sure that a complete, valid BER-encoded length is in the buffer.
*
* \param tvb contains the buffer to be examined
* \param offset is the offset within the buffer at which the BER-encded length begins
* \param offset is the offset within the buffer at which the BER-encoded length begins
* \returns TRUE if a complete, valid BER-encoded length is in the buffer; otherwise FALSE
*/
static gboolean

@ -2336,7 +2336,7 @@ VariablePartsArray ::= SEQUENCE SIZE (1..5) OF VariablePart
-- InitialDPArgExtension notes: not recursive, exported,
-- locally refd 1 times, import refd 0 times
-- Udated from ETSI TS 129 078 V6.4.0 (2004-3GPP TS 29.078 version 6.4.0 Release 6 1 12)
-- Updated from ETSI TS 129 078 V6.4.0 (2004-3GPP TS 29.078 version 6.4.0 Release 6 1 12)
InitialDPArgExtension ::= SEQUENCE {
gmscAddress [0] ISDN-AddressString OPTIONAL,
forwardingDestinationNumber [1] CalledPartyNumber OPTIONAL,

@ -145,7 +145,7 @@ PrioritisedObject B "2.9.3.2.7.48" "userObject(48)"
ActiveDestination B "2.9.3.2.7.49" "activeDestination(49)"
Allomorphs B "2.9.3.2.7.50" "allomorphs(50)"
BackUpDestinationList B "2.9.3.2.7.51" "backUpDestinationList(51)"
CapacityAlarmThreshold B "2.9.3.2.7.52" "capacityAlarmTreshold(52)"
CapacityAlarmThreshold B "2.9.3.2.7.52" "capacityAlarmThreshold(52)"
ConfirmedMode B "2.9.3.2.7.53" "confirmedMode(53)"
CurrentLogSize B "2.9.3.2.7.54" "currentLogSize(54)"
Destination B "2.9.3.2.7.55" "destination(55)"

@ -49,7 +49,7 @@ FROM CMIP-1 {joint-iso-itu-t ms (9) cmip (1) version1 (1) protocol (3)}
--
-- from Rec. X.2ab[304] Editor's note: clarify if this definition is still needed. It appears that it ends in Nirvana.
-- WS imports localy
-- WS imports locally
--ManagementExtension
--FROM Attribute-ASN1Module {joint-iso-itu-t ms (9) smi (3) part2 (2) asn1Module (2) 1}
--

@ -155,7 +155,7 @@ dissect_ProtocolIEFieldValue(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree
ret = (dissector_try_uint_new(ranap_ies_dissector_table, key, tvb, pinfo, tree, FALSE, NULL)) ? tvb_captured_length(tvb) : 0;
break;
}
/* Fall trough */
/* Fall through */
default:
/* no special handling */
ret = (dissector_try_uint_new(ranap_ies_dissector_table, ProtocolIE_ID, tvb, pinfo, tree, FALSE, NULL)) ? tvb_captured_length(tvb) : 0;

@ -343,7 +343,7 @@ MAX_VAL = asn1_param_get_integer(%(ACTX)s,"upperBound")
proto_tree_add_item(tree, saved_hf, parameter_tvb, 0, 4, ENC_BIG_ENDIAN);
#.FN_HDR SourceRNC-ToTargetRNC-TransparentContainer
/* If SourceRNC-ToTargetRNC-TransparentContainer is called trough
/* If SourceRNC-ToTargetRNC-TransparentContainer is called through
dissect_ranap_SourceRNC_ToTargetRNC_TransparentContainer_PDU
ProtocolIE_ID may be unset
*/

@ -319,7 +319,7 @@ tvbuff_t *parameter_tvb=NULL;
handover_type_value = 0;
#.FN_BODY Source-ToTarget-TransparentContainer VAL_PTR = &parameter_tvb
# I think the message is "directly encoded" into the octest string(no "double encoding")
# I think the message is "directly encoded" into the octet string(no "double encoding")
# (Compare RANAP)
# Annex A
# ...Therefore the container content is encoded according to the
@ -381,7 +381,7 @@ tvbuff_t *parameter_tvb=NULL;
col_set_writable(actx->pinfo->cinfo, TRUE);
}
#.FN_BODY Target-ToSource-TransparentContainer VAL_PTR = &parameter_tvb
# I think the message is "directly encoded" into the octest string(no "double encoding")
# I think the message is "directly encoded" into the octet string(no "double encoding")
# See Target-ToSource-TransparentContainer in RANAP
tvbuff_t *parameter_tvb;

@ -1643,7 +1643,7 @@ TYPE3-IDENTIFIER ::= ENUMERATED
GROUP-IDENTITY-DOWNLINK ::= SEQUENCE
{
attach-detach-identifiet CHOICE{
attach-detach-identifier CHOICE{
attach SEQUENCE{
lifetime INTEGER(0..3),
class-of-usage INTEGER(0..7)
@ -1666,16 +1666,16 @@ GROUP-IDENTITY-DOWNLINK ::= SEQUENCE
GROUP-IDENTITY-UPLINK ::= SEQUENCE
{
attach-detach-identifiet CHOICE{
attach-detach-identifier CHOICE{
attach SEQUENCE{
class-of-usage INTEGER(0..7)
},
detach SEQUENCE{
detach-uplike ENUMERATED{
unknow-gssi(0),
unvaild-cipher(1),
invalid-cipher(1),
user-intitial(2),
reseverd(3)
reserved(3)
}
}
},
@ -2330,4 +2330,4 @@ Modify-type ::= SEQUENCE{
END
END

@ -1324,7 +1324,7 @@ manuf_name_lookup(const guint8 *addr)
}
/* Mask out the broadcast/multicast flag but not the locally
* administered flag as localy administered means: not assigend
* administered flag as locally administered means: not assigned
* by the IEEE but the local administrator instead.
* 0x01 multicast / broadcast bit
* 0x02 locally administered bit */

@ -2154,7 +2154,7 @@ dissect_6lowpan_iphc_nhc(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, gi
* disallows sending UDP datagrams without checksums. Likewise, 6LoWPAN
* requires that we recompute the checksum.
*
* If the datagram is incomplete, then leave the checsum at 0.
* If the datagram is incomplete, then leave the checksum at 0.
*/
#if 0
/*

@ -65,8 +65,8 @@
* @_9P_RCREATE: response with file access information
* @_9P_TREAD: request to transfer data from a file or directory
* @_9P_RREAD: response with data requested
* @_9P_TWRITE: reuqest to transfer data to a file
* @_9P_RWRITE: response with out much data was transfered to file
* @_9P_TWRITE: request to transfer data to a file
* @_9P_RWRITE: response with out much data was transferred to file
* @_9P_TCLUNK: forget about a handle to an entity within the file system
* @_9P_RCLUNK: response when server has forgotten about the handle
* @_9P_TREMOVE: request to remove an entity from the hierarchy
@ -293,7 +293,7 @@ static value_string_ext ninep_mode_vals_ext = VALUE_STRING_EXT_INIT(ninep_mode_v
*
* QID types are a subset of permissions - they are primarily
* used to differentiate semantics for a file system entity via
* a jump-table. Their value is also the most signifigant 16 bits
* a jump-table. Their value is also the most significant 16 bits
* of the permission_t
*
* See Also: http://plan9.bell-labs.com/magic/man2html/2/stat
@ -1129,7 +1129,7 @@ static void conv_set_fid_nocopy(packet_info *pinfo, guint32 fid, const char *pat
if (!val) {
val = _9p_hash_new_val(0);
val->data = wmem_tree_new(wmem_file_scope());
/* val->len is intentionnaly left to 0 so the tree won't be freed */
/* val->len is intentionally left to 0 so the tree won't be freed */
_9p_hash_set(pinfo, _9P_NOTAG, fid, val);
}

@ -1319,7 +1319,7 @@ dissect_acn_dmp_pdu(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, int off
case ACN_DMP_VECTOR_UNKNOWN:
break;
case ACN_DMP_VECTOR_GET_PROPERTY:
/* Rip trough property address */
/* Rip through property address */
while (data_offset < end_offset) {
old_offset = data_offset;
data_offset = acn_add_dmp_address(tvb, pinfo, pdu_tree, data_offset, &adt);
@ -1406,7 +1406,7 @@ dissect_acn_dmp_pdu(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, int off
}
break;
case ACN_DMP_VECTOR_UNMAP_PROPERTY:
/* Rip trough Actaul Proptery Address */
/* Rip through Actual Property Address */
while (data_offset < end_offset) {
old_offset = data_offset;
data_offset = acn_add_dmp_address(tvb, pinfo, pdu_tree, data_offset, &adt);
@ -1414,7 +1414,7 @@ dissect_acn_dmp_pdu(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, int off
}
break;
case ACN_DMP_VECTOR_SUBSCRIBE:
/* Rip trough Proptery Address */
/* Rip through Property Address */
while (data_offset < end_offset) {
old_offset = data_offset;
data_offset = acn_add_dmp_address(tvb, pinfo, pdu_tree, data_offset, &adt);
@ -1422,7 +1422,7 @@ dissect_acn_dmp_pdu(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, int off
}
break;
case ACN_DMP_VECTOR_UNSUBSCRIBE:
/* Rip trough Proptery Address */
/* Rip through Property Address */
while (data_offset < end_offset) {
old_offset = data_offset;
data_offset = acn_add_dmp_address(tvb, pinfo, pdu_tree, data_offset, &adt);
@ -1430,7 +1430,7 @@ dissect_acn_dmp_pdu(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, int off
}
break;
case ACN_DMP_VECTOR_GET_PROPERTY_FAIL:
/* Rip trough Address-Reason Code Pairs */
/* Rip through Address-Reason Code Pairs */
while (data_offset < end_offset) {
old_offset = data_offset;
data_offset = acn_add_dmp_address(tvb, pinfo, pdu_tree, data_offset, &adt);
@ -1443,7 +1443,7 @@ dissect_acn_dmp_pdu(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, int off
}
break;
case ACN_DMP_VECTOR_SET_PROPERTY_FAIL:
/* Rip trough Address-Reason Code Pairs */
/* Rip through Address-Reason Code Pairs */
while (data_offset < end_offset) {
old_offset = data_offset;
data_offset = acn_add_dmp_address(tvb, pinfo, pdu_tree, data_offset, &adt);
@ -1456,7 +1456,7 @@ dissect_acn_dmp_pdu(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, int off
}
break;
case ACN_DMP_VECTOR_MAP_PROPERTY_FAIL:
/* Rip trough Address-Reason Code Pairs */
/* Rip through Address-Reason Code Pairs */
while (data_offset < end_offset) {
old_offset = data_offset;
data_offset = acn_add_dmp_address(tvb, pinfo, pdu_tree, data_offset, &adt);
@ -1469,7 +1469,7 @@ dissect_acn_dmp_pdu(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, int off
}
break;
case ACN_DMP_VECTOR_SUBSCRIBE_ACCEPT:
/* Rip through Property Addrsses */
/* Rip through Property Addresses */
while (data_offset < end_offset) {
old_offset = data_offset;
data_offset = acn_add_dmp_address(tvb, pinfo, pdu_tree, data_offset, &adt);
@ -1477,7 +1477,7 @@ dissect_acn_dmp_pdu(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, int off
}
break;
case ACN_DMP_VECTOR_SUBSCRIBE_REJECT:
/* Rip trough Address-Reason Code Pairs */
/* Rip through Address-Reason Code Pairs */
while (data_offset < end_offset) {
old_offset = data_offset;
data_offset = acn_add_dmp_address(tvb, pinfo, pdu_tree, data_offset, &adt);
@ -1808,7 +1808,7 @@ dissect_acn_sdt_client_pdu(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree,
/* level : 8 bit value */
/* string : pointer to buffer to fill */
/* leading_char: character to buffer left of digits */
/* min_char : mininum number of characters (for filling, not including space)*/
/* min_char : minimum number of characters (for filling, not including space)*/
/* show_zero: show zeros or dots */
/* also adds a space to right end */
/* */

@ -1750,7 +1750,7 @@ dissect_acse(tvbuff_t *tvb, packet_info *pinfo, proto_tree *parent_tree, void* d
case SES_DISCONNECT: /* RLRQ */
case SES_FINISH: /* RLRE */
case SES_ABORT: /* ABRT */
case CLSES_UNIT_DATA: /* AARQ Connetctionless session */
case CLSES_UNIT_DATA: /* AARQ Connectionless session */
break;
case SES_DATA_TRANSFER:
oid=find_oid_by_pres_ctx_id(pinfo, indir_ref);

@ -891,7 +891,7 @@ proto_register_adb(void)
module = prefs_register_protocol(proto_adb, NULL);
prefs_register_static_text_preference(module, "version",
"ADB protocol version is compatibile pior to: adb 1.0.31",
"ADB protocol version is compatible prior to: adb 1.0.31",
"Version of protocol supported by this dissector.");
}

@ -422,7 +422,7 @@ proto_register_adb_cs(void)
module = prefs_register_protocol(proto_adb_cs, NULL);
prefs_register_static_text_preference(module, "version",
"ADB CS protocol version is compatibile pior to: adb 1.0.31",
"ADB CS protocol version is compatible prior to: adb 1.0.31",
"Version of protocol supported by this dissector.");
prefs_register_uint_preference(module, "server_port",

@ -813,7 +813,7 @@ proto_register_adb_service(void)
module = prefs_register_protocol(proto_adb_service, NULL);
prefs_register_static_text_preference(module, "version",
"ADB Service protocol version is compatibile pior to: adb 1.0.31",
"ADB Service protocol version is compatible prior to: adb 1.0.31",
"Version of protocol supported by this dissector.");
prefs_register_bool_preference(module, "framebuffer_more_details",

@ -53,7 +53,7 @@ http://developer.apple.com/DOCUMENTATION/macos8/pdf/ASAppleTalkFiling2.1_2.2.pdf
http://developer.apple.com/documentation/Networking/Conceptual/AFP/index.html
Current AFP 3.x specfication, in HTML form, at
Current AFP 3.x specification, in HTML form, at
http://developer.apple.com/mac/library/documentation/Networking/Reference/AFP_Reference/Reference/reference.html
Current AFP 3.x programming guide, in HTML form, at

@ -78,7 +78,7 @@ void proto_reg_handoff_ajp13(void);
* looking at raw network packets, aren't we? The stuff on the
* wire. Wireshark has been getting better and better at helping
* dissectors with this. I'm a little fuzzy on the details, but my
* uderstanding is that wireshark now contains a fairly substantial
* understanding is that wireshark now contains a fairly substantial
* user-space TCP/IP stack so it can re-assemble the data. But I might
* be wrong. Since AJP13 is going to be used either on the loopback
* interface or on a LAN, it isn't likely to be a big issues anyway.
@ -89,7 +89,7 @@ void proto_reg_handoff_ajp13(void);
* PDU can stretch across multiple TCP segments. Assembling them is
* obviously possible, but a royal pain. During the "phase one"
* in-order pass you have to keep track of a bunch of offsets and
* store which PDU goes with which TCP segment. Luckly, recent
* store which PDU goes with which TCP segment. Luckily, recent
* (0.9.4+) versions of wireshark provide the "tcp_dissect_pdus()"
* function that takes care of much of the work. See the comments in
* packet-tcp.c, the example code in packet-dns.c, or check the

@ -1503,7 +1503,7 @@ proto_register_alcap(void)
{ &hf_alcap_compat_pass_on_sni,
{ "Pass-On SNI", "alcap.compat.pass.sni",
FT_UINT8, BASE_DEC, VALS(send_notification), 0x40,
"Send Notificaation Indicator", HFILL }
"Send Notification Indicator", HFILL }
},
{ &hf_alcap_compat_pass_on_ii,
{ "Pass-On II", "alcap.compat.pass.ii",
@ -1513,7 +1513,7 @@ proto_register_alcap(void)
{ &hf_alcap_compat_general_sni,
{ "General SNI", "alcap.compat.general.sni",
FT_UINT8, BASE_DEC, VALS(send_notification), 0x04,
"Send Notificaation Indicator", HFILL }
"Send Notification Indicator", HFILL }
},
{ &hf_alcap_compat_general_ii,
{ "General II", "alcap.compat.general.ii",

@ -201,7 +201,7 @@ static int proto_AllJoyn_ardp = -1; /* The top level. Entire AllJoyn Reliable D
#define ARDP_HEADER_LEN_OFFSET 1 /* Offset into the ARDP header for the actual length of the header. */
/* These are bit masks for ARDP flags. */
/* These bits are depricated and do not exist for version 1. */
/* These bits are deprecated and do not exist for version 1. */
#define ARDP_SYN 0x01
#define ARDP_ACK 0x02
#define ARDP_EAK 0x04
@ -232,7 +232,7 @@ static int hf_ardp_nsa = -1; /* next sequence to ack */
static int hf_ardp_fss = -1; /* fragment starting sequence number */
static int hf_ardp_fcnt = -1; /* fragment count */
static int hf_ardp_bmp = -1; /* EACK bitmap */
static int hf_ardp_segmax = -1; /* The maximum number of outstanding segments the other side can send without acknowledgement. */
static int hf_ardp_segmax = -1; /* The maximum number of outstanding segments the other side can send without acknowledgment. */
static int hf_ardp_segbmax = -1;/* The maximum segment size we are willing to receive. */
static int hf_ardp_dackt = -1; /* Receiver's delayed ACK timeout. Used in TTL estimate prior to sending a message. */
static int hf_ardp_options = -1;/* Options for the connection. Always Sequenced Delivery Mode (SDM). */
@ -330,7 +330,7 @@ static const value_string mess_header_field_encoding_vals[] = {
/* This is used to round up offsets into a packet to an even two byte
* boundary from starting_offset.
* @param current_offset is the current offset into the packet.
* @param starting_offset is offset into the packet from the begining of
* @param starting_offset is offset into the packet from the beginning of
* the message.
* @returns the offset rounded up to the next even two byte boundary from
start of the message.
@ -346,7 +346,7 @@ static gint round_to_2byte(gint current_offset,
/* This is used to round up offsets into a packet to an even four byte
* boundary from starting_offset.
* @param current_offset is the current offset into the packet.
* @param starting_offset is offset into the packet from the begining of
* @param starting_offset is offset into the packet from the beginning of
* the message.
* @returns the offset rounded up to the next even four byte boundary from
start of the message.
@ -362,7 +362,7 @@ static gint round_to_4byte(gint current_offset,
/* This is used to round up offsets into a packet to an even eight byte
* boundary from starting_offset.
* @param current_offset is the current offset into the packet.
* @param starting_offset is offset into the packet from the begining of
* @param starting_offset is offset into the packet from the beginning of
* the message.
* @returns the offset rounded up to the next even eight byte boundary from
start of the message.
@ -399,7 +399,7 @@ get_uint32(tvbuff_t *tvb,
/* This is called by dissect_AllJoyn_message() to handle the initial byte for
* a connect message.
* If it was the intial byte for a connect message and was handled then return
* If it was the initial byte for a connect message and was handled then return
* the number of bytes consumed out of the packet. If not an connect initial
* byte message or unhandled return 0.
* @param tvb is the incoming network data buffer.
@ -423,7 +423,7 @@ handle_message_connect(tvbuff_t *tvb,
if(0 == the_one_byte) {
col_set_str(pinfo->cinfo, COL_INFO, "CONNECT-initial byte");
/* Now add the value as a subtree to the inital byte. */
/* Now add the value as a subtree to the initial byte. */
proto_tree_add_item(message_tree, hf_alljoyn_connect_byte_value, tvb, offset, 1, ENC_NA);
offset += 1;
}
@ -707,7 +707,7 @@ pad_according_to_type(gint offset, gint field_starting_offset, gint max_offset,
* to an item. This is complicated a bit by the fact that structures can be nested.
* @param item is the item to append the signature data to.
* @param signature points to the signature to be appended.
* @param signature_max_length is the specificied maximum length of this signature.
* @param signature_max_length is the specified maximum length of this signature.
* @param type_stop is the character when indicates the end of the signature.
*/
static void
@ -1046,7 +1046,7 @@ parse_arg(tvbuff_t *tvb,
header_type_name = "object path";
length = get_uint32(tvb, offset, encoding) + 1;
/* The + 4 is for the length specifier. Object pathes may be of "any length"
/* The + 4 is for the length specifier. Object paths may be of "any length"
according to D-Bus spec. But there are practical limits. */
if(length < 0 || length > MAX_ARRAY_LEN || length + 4 > tvb_reported_length_remaining(tvb, offset)) {
col_add_fstr(pinfo->cinfo, COL_INFO, "BAD DATA: Object path length is %d. Only %d bytes left in packet.",
@ -2163,7 +2163,7 @@ typedef struct _alljoyn_ardp_tree_data
* @param tvb is the incoming network data buffer.
* @param pinfo contains information about the incoming packet which
* we update as we dissect the packet.
* @param tree_data is the destinationn of the data..
* @param tree_data is the destination of the data..
*/
static void
ardp_parse_header(tvbuff_t *tvb,
@ -2863,7 +2863,7 @@ proto_register_AllJoyn(void)
},
/*
* Strings are composed of a size and a data arrray.
* Strings are composed of a size and a data array.
*/
{&hf_alljoyn_string,
{"Bus Name", "alljoyn.string",

@ -1408,7 +1408,7 @@ static int hf_amqp_1_0_replyTo_str = -1;
static int hf_amqp_1_0_mechanisms_sym = -1;
/* Several field can be of multiple types. To distinguish it among hf_amqp_1_0_* variables,
* table below "translates" original hf_amqp_1_0_* variable to the type-speficic one.
* table below "translates" original hf_amqp_1_0_* variable to the type-specific one.
* Each row contains synonym fields for {FT_NONE, FT_UINT, FT_STRING, FT_BYTES, FT_GUID}
* NULL indicates no synonym of a given type
* FT_NONE field must be always present
@ -10710,8 +10710,8 @@ get_amqp_1_0_value_formatter(tvbuff_t *tvb,
}
else if(code == AMQP_1_0_TYPE_NULL)
{
/* null value says that a particular field was optional and is omited
* the omited fields of standard structutes are not shown
/* null value says that a particular field was optional and is omitted
* the omitted fields of standard structures are not shown
* however, we still display null values of custom lists, maps and arrays */
if(hf_amqp_type == hf_amqp_1_0_list)
{

@ -526,7 +526,7 @@ dissect_amr_common(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, gint amr
bit_offset += 4;
proto_tree_add_bits_item(toc_tree, hf_amr_toc_q, tvb, bit_offset, 1, ENC_BIG_ENDIAN);
bit_offset += 1;
/* 2 pading bits */
/* 2 padding bits */
bit_offset += 2;
offset += 1;
}

@ -241,7 +241,7 @@ test_applemidi(tvbuff_t *tvb, guint16 *command_p, gboolean conversation_establis
/* If the conversation is establised (one prior packet with a valid known command)
* we won't check the commands anymore - this way we still show new commands
* Apple might introduct as "unknown" instead of punting to RTP-dissector */
* Apple might introduce as "unknown" instead of punting to RTP-dissector */
if ( conversation_established ) {
return TRUE;
}

@ -3604,7 +3604,7 @@ dissect_ber_GeneralizedTime(gboolean implicit_tag, asn1_ctx_t *actx, proto_tree
first_delim[0] = 0;
second_delim[0] = 0;
ret = sscanf( tmpstr, "%14d%1[.,+-Z]%4d%1[+-Z]%4d", &tmp_int, first_delim, &first_digits, second_delim, &second_digits);
/* tmp_int does not contain valid value bacause of overflow but we use it just for format checking */
/* tmp_int does not contain valid value because of overflow but we use it just for format checking */
if (ret < 1) {
/* Nothing matched */
goto invalid;
@ -4033,7 +4033,7 @@ dissect_ber_bitstring32(gboolean implicit_tag, asn1_ctx_t *actx, proto_tree *par
tree = proto_item_get_subtree(actx->created_item);
if (bit_fields && tree && tmp_tvb) {
/* tmp_tvb points to the actual bitstring (including any pad bits at the end.
* note that this bitstring is not neccessarily always encoded as 4 bytes
* note that this bitstring is not necessarily always encoded as 4 bytes
* so we have to read it byte by byte.
*/
val = 0;

@ -5144,7 +5144,7 @@ dissect_bgp_open(tvbuff_t *tvb, proto_tree *tree, packet_info *pinfo)
}
/*
* Heursitic for auto-detecton os ASN length 2 or 4 bytes
* Heuristic for auto-detection of ASN length 2 or 4 bytes
*/
static guint8
@ -5162,7 +5162,7 @@ heuristic_as2_or_4_from_as_path(tvbuff_t *tvb, gint as_path_offset, gint end_att
/* Heuristic is done in two phases
* First we try to identify the as length (2 or 4 bytes)
* then we do check that our assumption is ok
* recalculing the offset and checking we end up with the right result
* recalculating the offset and checking we end up with the right result
* k is used to navigate into the AS_PATH */
k = as_path_offset;
/* case of AS_PATH type being explicitly 4 bytes ASN */
@ -5202,7 +5202,7 @@ heuristic_as2_or_4_from_as_path(tvbuff_t *tvb, gint as_path_offset, gint end_att
*number_as_segment = counter_as_segment;
return(bgp_asn_len);
}
/* case of a empty path attribut */
/* case of a empty path attribute */
if (as_path_offset == end_attr_offset)
{
*number_as_segment = 0;
@ -5213,7 +5213,7 @@ heuristic_as2_or_4_from_as_path(tvbuff_t *tvb, gint as_path_offset, gint end_att
/* we do run the heuristic on first segment and look at next segment if it exists */
k++;
length = tvb_get_guint8(tvb, k++);
/* let's do some cheking with an as length 2 bytes */
/* let's do some checking with an as length 2 bytes */
offset_check = k + 2*length;
next_type = tvb_get_guint8(tvb, offset_check);
/* we do have one segment made of 2 bytes ASN we do reach the end of the attribute taking

@ -537,7 +537,7 @@ x8f Priority Class Indicator
*/
/* Macros */
/* Defined localy here without the check of curr_len wrapping, that will be taken care of when this IEI dissecton finishes */
/* Defined locally here without the check of curr_len wrapping, that will be taken care of when this IEI dissection finishes */
#define ELEM_IN_ELEM_MAND_TELV(EMT_iei, EMT_pdu_type, EMT_elem_idx, EMT_elem_name_addition) \
{\
if ((consumed = elem_telv(tvb, tree, pinfo, (guint8) EMT_iei, EMT_pdu_type, EMT_elem_idx, curr_offset, curr_len, EMT_elem_name_addition)) > 0) \
@ -996,7 +996,7 @@ de_bssgp_llc_frames_disc(tvbuff_t *tvb, proto_tree *tree, packet_info *pinfo _U_
/* Octets 3-n contain either the IMSI, IMEISV or IMEI coded as the
* value part (starting with octet 3) of the Mobile Identity IE defined in
* 3GPP TS 24.008, not including 3GPP TS 24.008 IEI and
* 3GPP TS 24.008 length indcator
* 3GPP TS 24.008 length indicator
*/
/*
* 11.3.21 MS Bucket Size

@ -359,11 +359,11 @@ static const enum_val_t pref_vdp_codec[] = {
/* APT-X Codec */
static int proto_aptx = -1;
static int hf_aptx_data = -1;
static int hf_aptx_cummulative_frame_duration = -1;
static int hf_aptx_cumulative_frame_duration = -1;
static int hf_aptx_delta_time = -1;
static int hf_aptx_avrcp_song_position = -1;
static int hf_aptx_delta_time_from_the_beginning = -1;
static int hf_aptx_cummulative_duration = -1;
static int hf_aptx_cumulative_duration = -1;
static int hf_aptx_diff = -1;
static gint ett_aptx = -1;
static dissector_handle_t aptx_handle;
@ -1446,7 +1446,7 @@ dissect_btavdtp(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void *data)
media_packet_info_t *previous_media_packet_info;
media_packet_info_t *current_media_packet_info;
nstime_t first_abs_ts;
gdouble cummulative_frame_duration;
gdouble cumulative_frame_duration;
gdouble avrcp_song_position = -1.0;
btavrcp_song_position_data_t *song_position_data;
@ -1509,7 +1509,7 @@ dissect_btavdtp(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void *data)
if (previous_media_packet_info && previous_media_packet_info->stream_number == sep_data.stream_number ) {
sep_data.previous_media_packet_info = previous_media_packet_info;
first_abs_ts = previous_media_packet_info->first_abs_ts;
cummulative_frame_duration = previous_media_packet_info->cummulative_frame_duration;
cumulative_frame_duration = previous_media_packet_info->cumulative_frame_duration;
if (avrcp_song_position == -1.0)
avrcp_song_position = previous_media_packet_info->avrcp_song_position;
else
@ -1518,11 +1518,11 @@ dissect_btavdtp(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void *data)
if (avrcp_song_position == -1.0)
avrcp_song_position = 0.0;
first_abs_ts = pinfo->fd->abs_ts;
cummulative_frame_duration = 0.0;
cumulative_frame_duration = 0.0;
sep_data.previous_media_packet_info = (media_packet_info_t *) wmem_new(wmem_epan_scope(), media_packet_info_t);
sep_data.previous_media_packet_info->abs_ts = pinfo->fd->abs_ts;
sep_data.previous_media_packet_info->first_abs_ts = first_abs_ts;
sep_data.previous_media_packet_info->cummulative_frame_duration = cummulative_frame_duration;
sep_data.previous_media_packet_info->cumulative_frame_duration = cumulative_frame_duration;
sep_data.previous_media_packet_info->avrcp_song_position = avrcp_song_position;
sep_data.previous_media_packet_info->stream_number = sep_data.stream_number;
}
@ -1539,7 +1539,7 @@ dissect_btavdtp(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void *data)
current_media_packet_info = wmem_new(wmem_file_scope(), media_packet_info_t);
current_media_packet_info->abs_ts = pinfo->fd->abs_ts;
current_media_packet_info->first_abs_ts = first_abs_ts;
current_media_packet_info->cummulative_frame_duration = cummulative_frame_duration;
current_media_packet_info->cumulative_frame_duration = cumulative_frame_duration;
current_media_packet_info->avrcp_song_position = avrcp_song_position;
current_media_packet_info->stream_number = sep_data.stream_number;
@ -2762,7 +2762,7 @@ dissect_aptx(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void *data)
proto_tree *aptx_tree;
proto_item *pitem;
bta2dp_codec_info_t *info;
gdouble cummulative_frame_duration = 0;
gdouble cumulative_frame_duration = 0;
info = (bta2dp_codec_info_t *) data;
@ -2845,9 +2845,9 @@ dissect_aptx(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void *data)
expected_speed_data = frequency * (sample_bits / 8.0) * number_of_channels;
frame_duration = (((double) frame_length / (double) expected_speed_data) * 1000.0);
cummulative_frame_duration = (tvb_reported_length(tvb) / 4.0) * frame_duration;
cumulative_frame_duration = (tvb_reported_length(tvb) / 4.0) * frame_duration;
pitem = proto_tree_add_double(aptx_tree, hf_aptx_cummulative_frame_duration, tvb, 0, 0, cummulative_frame_duration);
pitem = proto_tree_add_double(aptx_tree, hf_aptx_cumulative_frame_duration, tvb, 0, 0, cumulative_frame_duration);
proto_item_append_text(pitem, " ms");
PROTO_ITEM_SET_GENERATED(pitem);
@ -2869,13 +2869,13 @@ dissect_aptx(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void *data)
PROTO_ITEM_SET_GENERATED(pitem);
if (!pinfo->fd->flags.visited)
info->current_media_packet_info->cummulative_frame_duration += cummulative_frame_duration;
info->current_media_packet_info->cumulative_frame_duration += cumulative_frame_duration;
pitem = proto_tree_add_double(aptx_tree, hf_aptx_cummulative_duration, tvb, 0, 0, info->previous_media_packet_info->cummulative_frame_duration);
pitem = proto_tree_add_double(aptx_tree, hf_aptx_cumulative_duration, tvb, 0, 0, info->previous_media_packet_info->cumulative_frame_duration);
proto_item_append_text(pitem, " ms");
PROTO_ITEM_SET_GENERATED(pitem);
pitem = proto_tree_add_double(aptx_tree, hf_aptx_diff, tvb, 0, 0, info->previous_media_packet_info->cummulative_frame_duration - nstime_to_msec(&delta));
pitem = proto_tree_add_double(aptx_tree, hf_aptx_diff, tvb, 0, 0, info->previous_media_packet_info->cumulative_frame_duration - nstime_to_msec(&delta));
proto_item_append_text(pitem, " ms");
PROTO_ITEM_SET_GENERATED(pitem);
}
@ -2893,8 +2893,8 @@ proto_register_aptx(void)
FT_BYTES, BASE_NONE, NULL, 0x00,
NULL, HFILL }
},
{ &hf_aptx_cummulative_frame_duration,
{ "Cummulative Frame Duration", "aptx.cummulative_frame_duration",
{ &hf_aptx_cumulative_frame_duration,
{ "Cumulative Frame Duration", "aptx.cumulative_frame_duration",
FT_DOUBLE, BASE_NONE, NULL, 0x00,
NULL, HFILL }
},
@ -2913,8 +2913,8 @@ proto_register_aptx(void)
FT_DOUBLE, BASE_NONE, NULL, 0x00,
NULL, HFILL }
},
{ &hf_aptx_cummulative_duration,
{ "Cummulative Music Duration", "aptx.cummulative_music_duration",
{ &hf_aptx_cumulative_duration,
{ "Cumulative Music Duration", "aptx.cumulative_music_duration",
FT_DOUBLE, BASE_NONE, NULL, 0x00,
NULL, HFILL }
},
@ -3073,7 +3073,7 @@ dissect_bta2dp(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void *data)
bta2dp_codec_info.current_media_packet_info = sep_data.current_media_packet_info;
#if RTP_PLAYER_WORKAROUND == TRUE
/* XXX: Workaround to get multiple RTP streams, because converation are too
/* XXX: Workaround to get multiple RTP streams, because conversations are too
weak to recognize Bluetooth streams (key is: guint32 interface_id, guint32 adapter_id, guint32 chandle, guint32 cid, guint32 direction -> guint32 stream_number) */
pinfo->srcport = sep_data.stream_number;
pinfo->destport = sep_data.stream_number;
@ -3309,7 +3309,7 @@ dissect_btvdp(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void *data)
btvdp_codec_info.content_protection_type = sep_data.content_protection_type;
#if RTP_PLAYER_WORKAROUND == TRUE
/* XXX: Workaround to get multiple RTP streams, because converation are too
/* XXX: Workaround to get multiple RTP streams, because conversations are too
weak to recognize Bluetooth streams (key is: guint32 interface_id, guint32 adapter_id, guint32 chandle, guint32 cid, guint32 direction -> guint32 stream_number) */
pinfo->srcport = sep_data.stream_number;
pinfo->destport = sep_data.stream_number;

@ -30,7 +30,7 @@
typedef struct _media_packet_info_t {
nstime_t abs_ts;
nstime_t first_abs_ts;
gdouble cummulative_frame_duration;
gdouble cumulative_frame_duration;
gdouble avrcp_song_position;
guint32 stream_number;
} media_packet_info_t;

@ -2784,7 +2784,7 @@ proto_register_btobex(void)
NULL, HFILL}
},
{ &hf_authentication_parameter,
{ "Autentication Parameter", "btobex.authentication",
{ "Authentication Parameter", "btobex.authentication",
FT_UINT8, BASE_HEX, NULL, 0x00,
NULL, HFILL}
},

@ -168,7 +168,7 @@
/* This structure is passed to other dissectors
* and contains information about the relation between service, PSM/server
* channel, local/remote service. The btrfcomm and btl2cap dissectors
* need this information to determine the kind of data transfered on
* need this information to determine the kind of data transferred on
* dynamically assigned server channels and PSM's, respectively.
*/
typedef struct _btsdp_data_t {

@ -916,7 +916,7 @@ decrypt_packet(guchar *buffer, guint32 length, gboolean decrypt)
* Checks to make sure that a complete, valid BER-encoded length is in the buffer.
*
* \param tvb contains the buffer to be examined
* \param offset is the offset within the buffer at which the BER-encded length begins
* \param offset is the offset within the buffer at which the BER-encoded length begins
* \returns TRUE if a complete, valid BER-encoded length is in the buffer; otherwise FALSE
*/
static gboolean

@ -30,7 +30,7 @@
#include "packet-cip.h"
void proto_register_cipmotion(void);
/* The entry point to the actual disection is: dissect_cipmotion */
/* The entry point to the actual dissection is: dissect_cipmotion */
void proto_reg_handoff_cipmotion(void);
/* Protocol handle for CIP Motion */

@ -35,7 +35,7 @@
void proto_register_cipsafety(void);
void proto_reg_handoff_cipsafety(void);
/* The entry point to the actual disection is: dissect_cipsafety */
/* The entry point to the actual dissection is: dissect_cipsafety */
/* Protocol handle for CIP Safety */
static int proto_cipsafety = -1;

@ -5871,7 +5871,7 @@ void proto_register_cmip(void) {
register_ber_oid_dissector("2.9.3.2.7.49", dissect_ActiveDestination_PDU, proto_cmip, "activeDestination(49)");
register_ber_oid_dissector("2.9.3.2.7.50", dissect_Allomorphs_PDU, proto_cmip, "allomorphs(50)");
register_ber_oid_dissector("2.9.3.2.7.51", dissect_BackUpDestinationList_PDU, proto_cmip, "backUpDestinationList(51)");
register_ber_oid_dissector("2.9.3.2.7.52", dissect_CapacityAlarmThreshold_PDU, proto_cmip, "capacityAlarmTreshold(52)");
register_ber_oid_dissector("2.9.3.2.7.52", dissect_CapacityAlarmThreshold_PDU, proto_cmip, "capacityAlarmThreshold(52)");
register_ber_oid_dissector("2.9.3.2.7.53", dissect_ConfirmedMode_PDU, proto_cmip, "confirmedMode(53)");
register_ber_oid_dissector("2.9.3.2.7.54", dissect_CurrentLogSize_PDU, proto_cmip, "currentLogSize(54)");
register_ber_oid_dissector("2.9.3.2.7.55", dissect_Destination_PDU, proto_cmip, "destination(55)");

@ -1,5 +1,5 @@
/* packet-corosync-totemsrp.c
* Dissectors for totem single ring protocol implementated in corosync cluster engine
* Dissectors for totem single ring protocol implemented in corosync cluster engine
* Copyright 2007 2009 2010 2014 Masatake YAMATO <yamato@redhat.com>
* Copyright (c) 2010 2014 Red Hat, Inc.
*
@ -1129,9 +1129,9 @@ proto_register_corosync_totemsrp(void)
FT_UINT32, BASE_DEC, NULL, 0x0,
NULL, HFILL}},
/* token_hold_canel */
/* token_hold_cancel */
{ &hf_corosync_totemsrp_token_hold_cancel,
{"Hold cancel token", "corosync_totemsrp.token_hold_canel",
{"Hold cancel token", "corosync_totemsrp.token_hold_cancel",
FT_NONE, BASE_NONE, NULL, 0x0,
NULL, HFILL}},
};

@ -147,7 +147,7 @@ enum {
DHCP_FO_PD_BINDING_STATUS,
DHCP_FO_PD_ASSIGNED_IP_ADDRESS,
DHCP_FO_PD_SENDING_SERVER_IP_ADDRESS,
DHCP_FO_PD_ADDRESSES_TRANSFERED,
DHCP_FO_PD_ADDRESSES_TRANSFERRED,
DHCP_FO_PD_CLIENT_IDENTIFIER,
DHCP_FO_PD_CLIENT_HARDWARE_ADDRESS,
DHCP_FO_PD_FTDDNS,
@ -182,7 +182,7 @@ static const value_string option_code_vals[] =
{DHCP_FO_PD_BINDING_STATUS, "binding-status"},
{DHCP_FO_PD_ASSIGNED_IP_ADDRESS, "assigned-IP-address"},
{DHCP_FO_PD_SENDING_SERVER_IP_ADDRESS, "sending-server-IP-address"},
{DHCP_FO_PD_ADDRESSES_TRANSFERED, "addresses-transferred"},
{DHCP_FO_PD_ADDRESSES_TRANSFERRED, "addresses-transferred"},
{DHCP_FO_PD_CLIENT_IDENTIFIER, "client-identifier"},
{DHCP_FO_PD_CLIENT_HARDWARE_ADDRESS, "client-hardware-address"},
{DHCP_FO_PD_FTDDNS, "FTDDNS"},
@ -549,7 +549,7 @@ dissect_dhcpfo_pdu(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void* da
offset, option_length, ENC_BIG_ENDIAN);
break;
case DHCP_FO_PD_ADDRESSES_TRANSFERED:
case DHCP_FO_PD_ADDRESSES_TRANSFERRED:
if (option_length != 4) {
expert_add_info_format(pinfo, oi, &ei_dhcpfo_bad_length, "addresses transferred is not 4 bytes long");
break;

@ -377,7 +377,7 @@ diameterstat_init(struct register_srt* srt _U_, GArray* srt_array, srt_gui_init_
srt_stat_table *diameter_srt_table;
int* idx;
/* XXX - This is a hack/workaround support so reseting/freeing parameters at the dissector
/* XXX - This is a hack/workaround support so resetting/freeing parameters at the dissector
level doesn't need to be supported. */
if (diameterstat_cmd_str_hash != NULL)
{
@ -390,7 +390,7 @@ diameterstat_init(struct register_srt* srt _U_, GArray* srt_array, srt_gui_init_
g_hash_table_insert(diameterstat_cmd_str_hash, "Unknown", idx);
/** @todo the filter to use in stead of NULL is "diameter.cmd.code"
* to enable the filter popup in the service response time dalouge
* to enable the filter popup in the service response time dialogue
* Note to make it work the command code must be stored rather than the
* index.
*/
@ -408,7 +408,7 @@ diameterstat_packet(void *pss, packet_info *pinfo, epan_dissect_t *edt _U_, cons
int* idx = NULL;
/* Process only answers where corresponding request is found.
* Unpaired daimeter messages are currently not supported by statistics.
* Unpaired diameter messages are currently not supported by statistics.
* Return 0, since redraw is not needed. */
if(!diameter || diameter->processing_request || !diameter->req_frame)
return 0;
@ -1411,7 +1411,7 @@ dissect_diameter_common(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, voi
}
/* Handle requests for which no answers were found and
* anawers for which no requests were found in the tap listener.
* answers for which no requests were found in the tap listener.
* In case if you don't need unpaired requests/answers use:
* if (diameter_pair->processing_request || !diameter_pair->req_frame)
* return;
@ -2371,7 +2371,7 @@ proto_reg_handoff_diameter(void)
/* AVP Code: 97 Framed-IPv6-Address */
dissector_add_uint("diameter.base", 97, create_dissector_handle(dissect_diameter_base_framed_ipv6_prefix, proto_diameter));
/* AVP Code: 265 Suported-Vendor-Id */
/* AVP Code: 265 Supported-Vendor-Id */
dissector_add_uint("diameter.base", 265, create_dissector_handle(dissect_diameter_vendor_id, proto_diameter));
/* AVP Code: 266 Vendor-Id */

@ -2084,7 +2084,7 @@ proto_register_diameter_3gpp(void)
NULL, HFILL }
},
{ &hf_diameter_3gpp_feature_list_gx_flags_bit21,
{ "Conditionali APN Policy Info", "diameter.3gpp.feature_list_gx_flags_bit21",
{ "Conditional APN Policy Info", "diameter.3gpp.feature_list_gx_flags_bit21",
FT_BOOLEAN, 32, TFS(&tfs_supported_not_supported), 0x00200000,
NULL, HFILL }
},

@ -70,7 +70,7 @@ extern void proto_reg_handoff_distcc(void);
#define DESEGMENT_TCP(x) \
if(distcc_desegment && pinfo->can_desegment){\
/* only attempt reassembly if whe have the full segment */\
/* only attempt reassembly if we have the full segment */\
if(tvb_captured_length_remaining(tvb, offset)==tvb_reported_length_remaining(tvb, offset)){\
if(parameter>tvb_captured_length_remaining(tvb, offset)){\
proto_tree_add_expert_format(tree, pinfo, &ei_distcc_short_pdu, tvb, offset-12, -1, "[Short " x " PDU]");\

@ -244,7 +244,7 @@ dissect_djiuav_pdu(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void *da
pdu_length - 1 - offset, ENC_NA);
offset += pdu_length - 1 - offset;
}
/* FIXME: calcualte XOR and validate transmitted value */
/* FIXME: calculate XOR and validate transmitted value */
proto_tree_add_item(djiuav_tree, hf_djiuav_checksum, tvb, offset, 1,
ENC_BIG_ENDIAN);
offset += 1;

@ -2369,7 +2369,7 @@ static void cyclic_setup(packet_info* pinfo, guint16 offset, gboolean request, t
case 1: /* edit */
case 2: /* finalise */
case 3: /* delete */
/* no mode specific datan */
/* no mode specific data */
break;
case 4: /* exist */
@ -2501,7 +2501,7 @@ static void program_control(int offset, gboolean request, tvbuff_t *tvb, proto_t
/* */
/* Returns: nothing */
/* */
/* Notes: for querys, the "offset" points to the "target". */
/* Notes: for queries, the "offset" points to the "target". */
/* for responses, the "offset" points to the "status". */
/* */
/* sample ECMP Request Frame */
@ -2559,7 +2559,7 @@ static void modbus_pdu(int offset, gboolean request, tvbuff_t *tvb, packet_info*
/* */
/* Returns: nothing */
/* */
/* Notes: for querys, the "offset" points to the "size". */
/* Notes: for queries, the "offset" points to the "size". */
/* for responses, the "offset" points to the size. */
/* */
/* sample ECMP Request Frame (Read Holding Registers) */
@ -2629,7 +2629,7 @@ static void interrogate(packet_info* pinfo, int offset, gboolean request, tvbuff
/* */
/* Returns: nothing */
/* */
/* Notes: for querys, the "offset" points to the "item type". */
/* Notes: for queries, the "offset" points to the "item type". */
/* for responses, the "offset" points to the "item type". */
/* */
/* sample ECMP Request Frame */

@ -3251,7 +3251,7 @@ dissect_epl_sdo_command_write_multiple_by_index(proto_tree *epl_tree, tvbuff_t *
* - 1 byte for subindex
* - 1 byte for reserved and padding */
/* Guarding against readout of padding. Probaility is nearly zero, as
/* Guarding against readout of padding. Probability is nearly zero, as
* padding was checked above, but to be sure, this remains here */
if ( (guint32)( padding + 8 ) >= datalength )
break;

@ -264,7 +264,7 @@ proto_register_epon(void)
},
{ &ei_epon_dpoe_bad,
{ "epon.dpoe.expert", PI_MALFORMED, PI_ERROR,
"DPoE security byte must be 0x55 if encrypton is disabled.", EXPFILL }
"DPoE security byte must be 0x55 if encryption is disabled.", EXPFILL }
},
{ &ei_epon_dpoe_encrypted_data,
{ "epon.dpoe.encrypted.expert", PI_UNDECODED, PI_NOTE,

@ -1434,7 +1434,7 @@ dissect_erf(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void* data _U_)
hdlc_type = ERF_HDLC_CHDLC;
else {
/* Anything to check for to recognize Frame Relay or MTP2?