src/drivers: Fix typos

Fix typos found with codespell utility.

Signed-off-by: Yegor Yefremov <yegorslists@googlemail.com>
This commit is contained in:
Yegor Yefremov 2022-02-01 09:31:44 +01:00 committed by Jouni Malinen
parent 203a027b28
commit d65285ab8f
5 changed files with 11 additions and 9 deletions

View file

@ -1036,7 +1036,7 @@ struct wpa_driver_associate_params {
*
* If the driver needs to do special configuration for WPS association,
* this variable provides more information on what type of association
* is being requested. Most drivers should not need ot use this.
* is being requested. Most drivers should not need to use this.
*/
enum wps_mode wps;
@ -1775,7 +1775,7 @@ enum wpa_driver_if_type {
WPA_IF_P2P_GROUP,
/**
* WPA_IF_P2P_DEVICE - P2P Device interface is used to indentify the
* WPA_IF_P2P_DEVICE - P2P Device interface is used to identify the
* abstracted P2P Device function in the driver
*/
WPA_IF_P2P_DEVICE,
@ -2603,7 +2603,7 @@ struct wpa_driver_ops {
* some drivers may expect them in different order than wpa_supplicant
* is using. If the TX/RX keys are swapped, all TKIP encrypted packets
* will trigger Michael MIC errors. This can be fixed by changing the
* order of MIC keys by swapping te bytes 16..23 and 24..31 of the key
* order of MIC keys by swapping the bytes 16..23 and 24..31 of the key
* in driver_*.c set_key() implementation, see driver_ndis.c for an
* example on how this can be done.
*/
@ -4612,7 +4612,7 @@ enum wpa_event_type {
* This event must be delivered when a Michael MIC error is detected by
* the local driver. Additional data for event processing is
* provided with union wpa_event_data::michael_mic_failure. This
* information is used to request new encyption key and to initiate
* information is used to request new encryption key and to initiate
* TKIP countermeasures if needed.
*/
EVENT_MICHAEL_MIC_FAILURE,

View file

@ -861,7 +861,7 @@ static int macsec_qca_get_available_transmit_sc(void *priv, u32 *channel)
}
}
wpa_printf(MSG_DEBUG, "%s: no avaiable channel", __func__);
wpa_printf(MSG_DEBUG, "%s: no available channel", __func__);
return -1;
}

View file

@ -1341,7 +1341,7 @@ int wpa_driver_nl80211_capa(struct wpa_driver_nl80211_data *drv)
drv->has_capability = 1;
drv->has_driver_key_mgmt = info.has_key_mgmt | info.has_key_mgmt_iftype;
/* Fallback to hardcoded defaults if the driver does nott advertize any
/* Fallback to hardcoded defaults if the driver does not advertise any
* AKM capabilities. */
if (!drv->has_driver_key_mgmt) {
drv->capa.key_mgmt = WPA_DRIVER_CAPA_KEY_MGMT_WPA |

View file

@ -2831,7 +2831,8 @@ static void nl80211_control_port_frame(struct wpa_driver_nl80211_data *drv,
nla_len(tb[NL80211_ATTR_FRAME]));
break;
default:
wpa_printf(MSG_INFO, "nl80211: Unxpected ethertype 0x%04x from "
wpa_printf(MSG_INFO,
"nl80211: Unexpected ethertype 0x%04x from "
MACSTR " over control port",
ethertype, MAC2STR(src_addr));
break;

View file

@ -372,8 +372,9 @@ ndis_events_indicate(IWbemObjectSink *this, long lObjectCount,
L"MSNdis_NotifyAdapterRemoval") == 0) {
ndis_events_adapter_removal(events);
} else {
wpa_printf(MSG_DEBUG, "Unepected event - __CLASS: "
"'%S'", vtClass.bstrVal);
wpa_printf(MSG_DEBUG,
"Unexpected event - __CLASS: '%S'",
vtClass.bstrVal);
}
VariantClear(&vtClass);