Fix typos found by codespell
Signed-off-by: Pavel Roskin <proski@gnu.org>
This commit is contained in:
parent
d2f93d3706
commit
ffbf1eaa26
31 changed files with 45 additions and 45 deletions
|
@ -1023,7 +1023,7 @@ P2P-SERV-DISC-REQ 2412 02:40:61:c2:f3:b7 0 0 02000001
|
|||
|
||||
P2P-SERV-DISC-RESP: Indicate reception of a P2P service discovery
|
||||
response. The following parameters are included after the event prefix:
|
||||
source address, dialog token, Service Responce TLV(s) as hexdump.
|
||||
source address, dialog token, Service Response TLV(s) as hexdump.
|
||||
|
||||
\verbatim
|
||||
P2P-SERV-DISC-RESP 02:40:61:c2:f3:b7 0 0300000101
|
||||
|
|
|
@ -281,7 +281,7 @@ TYPEDEF_HIDES_STRUCT = NO
|
|||
# causing a significant performance penality.
|
||||
# If the system has enough physical memory increasing the cache will improve the
|
||||
# performance by keeping more symbols in memory. Note that the value works on
|
||||
# a logarithmic scale so increasing the size by one will rougly double the
|
||||
# a logarithmic scale so increasing the size by one will roughly double the
|
||||
# memory usage. The cache size is given by this formula:
|
||||
# 2^(16+SYMBOL_CACHE_SIZE). The valid range is 0..9, the default is 0,
|
||||
# corresponding to a cache size of 2^16 = 65536 symbols
|
||||
|
|
|
@ -123,7 +123,7 @@ s{
|
|||
{
|
||||
$1 . fixcomment($2) . $3
|
||||
}gesx;
|
||||
# ^^^^ Modes: g - Global, match all occurances.
|
||||
# ^^^^ Modes: g - Global, match all occurrences.
|
||||
# e - Evaluate the replacement as an expression.
|
||||
# s - Single-line - allows the pattern to match across newlines.
|
||||
# x - eXtended pattern, ignore embedded whitespace
|
||||
|
|
|
@ -82,7 +82,7 @@ ChangeLog for hostapd
|
|||
* updated management frame protection to use IEEE Std 802.11w-2009
|
||||
* fixed number of small WPS issues and added workarounds to
|
||||
interoperate with common deployed broken implementations
|
||||
* added some IEEE 802.11n co-existance rules to disable 40 MHz channels
|
||||
* added some IEEE 802.11n co-existence rules to disable 40 MHz channels
|
||||
or modify primary/secondary channels if needed based on neighboring
|
||||
networks
|
||||
* added support for NFC out-of-band mechanism with WPS
|
||||
|
|
|
@ -110,7 +110,7 @@ channel=1
|
|||
# Beacon interval in kus (1.024 ms) (default: 100; range 15..65535)
|
||||
beacon_int=100
|
||||
|
||||
# DTIM (delivery trafic information message) period (range 1..255):
|
||||
# DTIM (delivery traffic information message) period (range 1..255):
|
||||
# number of beacons between DTIMs (1 = every beacon includes DTIM element)
|
||||
# (default: 2)
|
||||
dtim_period=2
|
||||
|
|
|
@ -120,7 +120,7 @@ struct sta_info {
|
|||
* passed since last received frame from the station, a nullfunc data frame is
|
||||
* sent to the station. If this frame is not acknowledged and no other frames
|
||||
* have been received, the station will be disassociated after
|
||||
* AP_DISASSOC_DELAY seconds. Similarily, the station will be deauthenticated
|
||||
* AP_DISASSOC_DELAY seconds. Similarly, the station will be deauthenticated
|
||||
* after AP_DEAUTH_DELAY seconds has passed after disassociation. */
|
||||
#define AP_MAX_INACTIVITY (5 * 60)
|
||||
#define AP_DISASSOC_DELAY (1)
|
||||
|
|
|
@ -628,7 +628,7 @@ struct wmm_parameter_element {
|
|||
u8 oui_type; /* 2 */
|
||||
u8 oui_subtype; /* 1 */
|
||||
u8 version; /* 1 for WMM version 1.0 */
|
||||
u8 qos_info; /* AP/STA specif QoS info */
|
||||
u8 qos_info; /* AP/STA specific QoS info */
|
||||
u8 reserved; /* 0 */
|
||||
struct wmm_ac_parameter ac[4]; /* AC_BE, AC_BK, AC_VI, AC_VO */
|
||||
|
||||
|
|
|
@ -224,7 +224,7 @@ static int sha256_done(struct sha256_state *md, unsigned char *out)
|
|||
md->curlen = 0;
|
||||
}
|
||||
|
||||
/* pad upto 56 bytes of zeroes */
|
||||
/* pad up to 56 bytes of zeroes */
|
||||
while (md->curlen < 56) {
|
||||
md->buf[md->curlen++] = (unsigned char) 0;
|
||||
}
|
||||
|
|
|
@ -1438,7 +1438,7 @@ struct wpa_driver_ops {
|
|||
* Returns: Pointer to private data, %NULL on failure
|
||||
*
|
||||
* This function is used instead of init() or init2() when the driver
|
||||
* wrapper is used withh hostapd.
|
||||
* wrapper is used with hostapd.
|
||||
*/
|
||||
void * (*hapd_init)(struct hostapd_data *hapd,
|
||||
struct wpa_init_params *params);
|
||||
|
|
|
@ -4366,7 +4366,7 @@ static int nl80211_create_iface(struct wpa_driver_nl80211_data *drv,
|
|||
|
||||
ret = nl80211_create_iface_once(drv, ifname, iftype, addr, wds);
|
||||
|
||||
/* if error occured and interface exists already */
|
||||
/* if error occurred and interface exists already */
|
||||
if (ret == -ENFILE && if_nametoindex(ifname)) {
|
||||
wpa_printf(MSG_INFO, "Try to remove and re-create %s", ifname);
|
||||
|
||||
|
|
|
@ -364,7 +364,7 @@ static void * wpa_driver_roboswitch_init(void *ctx, const char *ifname)
|
|||
/* copy ifname and take a pointer to the second to last character */
|
||||
sep = drv->ifname +
|
||||
os_strlcpy(drv->ifname, ifname, sizeof(drv->ifname)) - 2;
|
||||
/* find the '.' seperating <interface> and <vlan> */
|
||||
/* find the '.' separating <interface> and <vlan> */
|
||||
while (sep > drv->ifname && *sep != '.') sep--;
|
||||
if (sep <= drv->ifname) {
|
||||
wpa_printf(MSG_INFO, "%s: No <interface>.<vlan> pair in "
|
||||
|
|
|
@ -139,7 +139,7 @@ enum {
|
|||
IKEV2_TRANSFORM_ESN = 5
|
||||
};
|
||||
|
||||
/* IKEv2 Tranform Type 1 (Encryption Algorithm) */
|
||||
/* IKEv2 Transform Type 1 (Encryption Algorithm) */
|
||||
enum {
|
||||
ENCR_DES_IV64 = 1,
|
||||
ENCR_DES = 2,
|
||||
|
|
|
@ -196,7 +196,7 @@ static void eap_peap_deinit(struct eap_sm *sm, void *priv)
|
|||
* @nak_type: TLV type (EAP_TLV_*)
|
||||
* Returns: Buffer to the allocated EAP-TLV NAK message or %NULL on failure
|
||||
*
|
||||
* This funtion builds an EAP-TLV NAK message. The caller is responsible for
|
||||
* This function builds an EAP-TLV NAK message. The caller is responsible for
|
||||
* freeing the returned buffer.
|
||||
*/
|
||||
static struct wpabuf * eap_tlv_build_nak(int id, u16 nak_type)
|
||||
|
@ -346,8 +346,8 @@ static int eap_tlv_add_cryptobinding(struct eap_sm *sm,
|
|||
* @status: Status (EAP_TLV_RESULT_SUCCESS or EAP_TLV_RESULT_FAILURE)
|
||||
* Returns: Buffer to the allocated EAP-TLV Result message or %NULL on failure
|
||||
*
|
||||
* This funtion builds an EAP-TLV Result message. The caller is responsible for
|
||||
* freeing the returned buffer.
|
||||
* This function builds an EAP-TLV Result message. The caller is responsible
|
||||
* for freeing the returned buffer.
|
||||
*/
|
||||
static struct wpabuf * eap_tlv_build_result(struct eap_sm *sm,
|
||||
struct eap_peap_data *data,
|
||||
|
|
|
@ -425,7 +425,7 @@ static int ikev2_process_kei(struct ikev2_responder_data *data,
|
|||
}
|
||||
|
||||
/* RFC 4306, Section 3.4:
|
||||
* The length of DH public value MUST be equal to the lenght of the
|
||||
* The length of DH public value MUST be equal to the length of the
|
||||
* prime modulus.
|
||||
*/
|
||||
if (kei_len - 4 != data->dh->prime_len) {
|
||||
|
|
|
@ -119,7 +119,7 @@ struct eap_sm {
|
|||
|
||||
/* Full authenticator state machine local variables */
|
||||
|
||||
/* Long-term (maintained betwen packets) */
|
||||
/* Long-term (maintained between packets) */
|
||||
EapType currentMethod;
|
||||
int currentId;
|
||||
enum {
|
||||
|
|
|
@ -404,7 +404,7 @@ static int ikev2_process_ker(struct ikev2_initiator_data *data,
|
|||
}
|
||||
|
||||
/* RFC 4306, Section 3.4:
|
||||
* The length of DH public value MUST be equal to the lenght of the
|
||||
* The length of DH public value MUST be equal to the length of the
|
||||
* prime modulus.
|
||||
*/
|
||||
if (ker_len - 4 != data->dh->prime_len) {
|
||||
|
|
|
@ -561,7 +561,7 @@ SM_STEP(SUPP_BE)
|
|||
* IEEE Std 802.1X-2004 has transitions from REQUEST to FAIL
|
||||
* and SUCCESS based on eapFail and eapSuccess, respectively.
|
||||
* However, IEEE Std 802.1X-2004 is also specifying that
|
||||
* eapNoResp should be set in conjuction with eapSuccess and
|
||||
* eapNoResp should be set in conjunction with eapSuccess and
|
||||
* eapFail which would mean that more than one of the
|
||||
* transitions here would be activated at the same time.
|
||||
* Skipping RESPONSE and/or RECEIVE states in these cases can
|
||||
|
|
|
@ -476,7 +476,7 @@ static void wpa_supplicant_key_neg_complete(struct wpa_sm *sm,
|
|||
* Start preauthentication after a short wait to avoid a
|
||||
* possible race condition between the data receive and key
|
||||
* configuration after the 4-Way Handshake. This increases the
|
||||
* likelyhood of the first preauth EAPOL-Start frame getting to
|
||||
* likelihood of the first preauth EAPOL-Start frame getting to
|
||||
* the target AP.
|
||||
*/
|
||||
eloop_register_timeout(1, 0, wpa_sm_start_preauth, sm, NULL);
|
||||
|
|
|
@ -572,7 +572,7 @@ static int mp_mod (mp_int * a, mp_int * b, mp_int * c)
|
|||
|
||||
/* this is a shell function that calls either the normal or Montgomery
|
||||
* exptmod functions. Originally the call to the montgomery code was
|
||||
* embedded in the normal function but that wasted alot of stack space
|
||||
* embedded in the normal function but that wasted a lot of stack space
|
||||
* for nothing (since 99% of the time the Montgomery code would be called)
|
||||
*/
|
||||
static int mp_exptmod (mp_int * G, mp_int * X, mp_int * P, mp_int * Y)
|
||||
|
@ -2207,7 +2207,7 @@ static int mp_2expt (mp_int * a, int b)
|
|||
/* zero a as per default */
|
||||
mp_zero (a);
|
||||
|
||||
/* grow a to accomodate the single bit */
|
||||
/* grow a to accommodate the single bit */
|
||||
if ((res = mp_grow (a, b / DIGIT_BIT + 1)) != MP_OKAY) {
|
||||
return res;
|
||||
}
|
||||
|
@ -2319,7 +2319,7 @@ CLEANUP:
|
|||
}
|
||||
|
||||
|
||||
/* multiplies |a| * |b| and only computes upto digs digits of result
|
||||
/* multiplies |a| * |b| and only computes up to digs digits of result
|
||||
* HAC pp. 595, Algorithm 14.12 Modified so you can control how
|
||||
* many digits of output are created.
|
||||
*/
|
||||
|
@ -2829,7 +2829,7 @@ static int mp_mul_2(mp_int * a, mp_int * b)
|
|||
{
|
||||
int x, res, oldused;
|
||||
|
||||
/* grow to accomodate result */
|
||||
/* grow to accommodate result */
|
||||
if (b->alloc < a->used + 1) {
|
||||
if ((res = mp_grow (b, a->used + 1)) != MP_OKAY) {
|
||||
return res;
|
||||
|
@ -2891,8 +2891,8 @@ static int mp_mul_2(mp_int * a, mp_int * b)
|
|||
/*
|
||||
* shifts with subtractions when the result is greater than b.
|
||||
*
|
||||
* The method is slightly modified to shift B unconditionally upto just under
|
||||
* the leading bit of b. This saves alot of multiple precision shifting.
|
||||
* The method is slightly modified to shift B unconditionally up to just under
|
||||
* the leading bit of b. This saves a lot of multiple precision shifting.
|
||||
*/
|
||||
static int mp_montgomery_calc_normalization (mp_int * a, mp_int * b)
|
||||
{
|
||||
|
|
|
@ -144,7 +144,7 @@ void eloop_unregister_sock(int sock, eloop_event_type type);
|
|||
* Returns: 0 on success, -1 on failure
|
||||
*
|
||||
* Register an event handler for the given event. This function is used to
|
||||
* register eloop implementation specific events which are mainly targetted for
|
||||
* register eloop implementation specific events which are mainly targeted for
|
||||
* operating system specific code (driver interface and l2_packet) since the
|
||||
* portable code will not be able to use such an OS-specific call. The handler
|
||||
* function will be called whenever the event is triggered. The handler
|
||||
|
|
|
@ -891,8 +891,8 @@ static void wps_registrar_pbc_timeout(void *eloop_ctx, void *timeout_ctx)
|
|||
* PBC mode. The PBC mode will be stopped after walk time (2 minutes) timeout
|
||||
* or when a PBC registration is completed. If more than one Enrollee in active
|
||||
* PBC mode has been detected during the monitor time (previous 2 minutes), the
|
||||
* PBC mode is not actived and -2 is returned to indicate session overlap. This
|
||||
* is skipped if a specific Enrollee is selected.
|
||||
* PBC mode is not activated and -2 is returned to indicate session overlap.
|
||||
* This is skipped if a specific Enrollee is selected.
|
||||
*/
|
||||
int wps_registrar_button_pushed(struct wps_registrar *reg,
|
||||
const u8 *p2p_dev_addr)
|
||||
|
|
|
@ -47,7 +47,7 @@
|
|||
* -- Needs renaming with module prefix to avoid polluting the debugger
|
||||
* namespace and causing possible collisions with other static fncs
|
||||
* and structure declarations when using the debugger.
|
||||
* -- The http error code generation is pretty bogus, hopefully noone cares.
|
||||
* -- The http error code generation is pretty bogus, hopefully no one cares.
|
||||
*
|
||||
* Author: Ted Merrill, Atheros Communications, based upon earlier work
|
||||
* as explained above and below.
|
||||
|
|
|
@ -956,7 +956,7 @@ static void web_connection_parse_subscribe(struct upnp_wps_device_sm *sm,
|
|||
break; /* no unterminated lines allowed */
|
||||
|
||||
/* NT assures that it is our type of subscription;
|
||||
* not used for a renewl.
|
||||
* not used for a renewal.
|
||||
**/
|
||||
match = "NT:";
|
||||
match_len = os_strlen(match);
|
||||
|
|
|
@ -123,7 +123,7 @@ struct wpa_config {
|
|||
* If this is specified, %wpa_supplicant will open a control interface
|
||||
* that is available for external programs to manage %wpa_supplicant.
|
||||
* The meaning of this string depends on which control interface
|
||||
* mechanism is used. For all cases, the existance of this parameter
|
||||
* mechanism is used. For all cases, the existence of this parameter
|
||||
* in configuration is used to determine whether the control interface
|
||||
* is enabled.
|
||||
*
|
||||
|
|
|
@ -905,7 +905,7 @@ static int wpas_dbus_get_group_obj_path(struct wpa_supplicant *wpa_s,
|
|||
|
||||
/**
|
||||
* wpas_dbus_signal_p2p_group_started - Signals P2P group has
|
||||
* started.Emitted when a group is succesfully started
|
||||
* started. Emitted when a group is successfully started
|
||||
* irrespective of the role (client/GO) of the current device
|
||||
*
|
||||
* @wpa_s: %wpa_supplicant network interface data
|
||||
|
|
|
@ -335,7 +335,7 @@ DBusMessage * wpas_dbus_handler_p2p_group_add(DBusMessage *message,
|
|||
goto out;
|
||||
}
|
||||
|
||||
/* Get the SSID structure form the persistant group id */
|
||||
/* Get the SSID structure from the persistent group id */
|
||||
ssid = wpa_config_get_network(wpa_s->conf, group_id);
|
||||
if (ssid == NULL || ssid->disabled != 2)
|
||||
goto inv_args;
|
||||
|
@ -597,7 +597,7 @@ DBusMessage * wpas_dbus_handler_p2p_invite(DBusMessage *message,
|
|||
if (persistent) {
|
||||
/*
|
||||
* A group ID is defined meaning we want to re-invoke a
|
||||
* persistant group
|
||||
* persistent group
|
||||
*/
|
||||
|
||||
iface = wpas_dbus_new_decompose_object_path(pg_object_path, 1,
|
||||
|
@ -616,7 +616,7 @@ DBusMessage * wpas_dbus_handler_p2p_invite(DBusMessage *message,
|
|||
goto out;
|
||||
}
|
||||
|
||||
/* Get the SSID structure form the persistant group id */
|
||||
/* Get the SSID structure from the persistent group id */
|
||||
ssid = wpa_config_get_network(wpa_s->conf, group_id);
|
||||
if (ssid == NULL || ssid->disabled != 2)
|
||||
goto err;
|
||||
|
@ -767,7 +767,7 @@ dbus_bool_t wpas_dbus_getter_p2p_device_properties(DBusMessageIter *iter,
|
|||
wpa_s->conf->p2p_go_intent))
|
||||
goto err_no_mem;
|
||||
|
||||
/* Persistant Reconnect */
|
||||
/* Persistent Reconnect */
|
||||
if (!wpa_dbus_dict_append_bool(&dict_iter, "PersistantReconnect",
|
||||
wpa_s->conf->persistent_reconnect))
|
||||
goto err_no_mem;
|
||||
|
@ -1271,7 +1271,7 @@ dbus_bool_t wpas_dbus_getter_p2p_peer_ies(DBusMessageIter *iter,
|
|||
|
||||
|
||||
/**
|
||||
* wpas_dbus_getter_persistent_groups - Get array of peristent group objects
|
||||
* wpas_dbus_getter_persistent_groups - Get array of persistent group objects
|
||||
* @iter: Pointer to incoming dbus message iter
|
||||
* @error: Location to store error on failure
|
||||
* @user_data: Function specific data
|
||||
|
|
|
@ -62,12 +62,12 @@ interface wlan2 #default: eth0
|
|||
# The location of the pid file
|
||||
pidfile /var/run/udhcpd-wlan2.pid #default: /var/run/udhcpd.pid
|
||||
|
||||
# Everytime udhcpd writes a leases file, the below script will be called.
|
||||
# Every time udhcpd writes a leases file, the below script will be called.
|
||||
# Useful for writing the lease file to flash every few hours.
|
||||
|
||||
#notify_file #default: (no script)
|
||||
|
||||
#notify_file dumpleases # <--- usefull for debugging
|
||||
#notify_file dumpleases # <--- useful for debugging
|
||||
|
||||
# The following are bootp specific options, setable by udhcpd.
|
||||
|
||||
|
|
|
@ -28,7 +28,7 @@
|
|||
# Parameters for the control interface. If this is specified, wpa_supplicant
|
||||
# will open a control interface that is available for external programs to
|
||||
# manage wpa_supplicant. The meaning of this string depends on which control
|
||||
# interface mechanism is used. For all cases, the existance of this parameter
|
||||
# interface mechanism is used. For all cases, the existence of this parameter
|
||||
# in configuration is used to determine whether the control interface is
|
||||
# enabled.
|
||||
#
|
||||
|
@ -354,7 +354,7 @@ fast_reauth=1
|
|||
#
|
||||
# mixed_cell: This option can be used to configure whether so called mixed
|
||||
# cells, i.e., networks that use both plaintext and encryption in the same
|
||||
# SSID, are allowed when selecting a BSS form scan results.
|
||||
# SSID, are allowed when selecting a BSS from scan results.
|
||||
# 0 = disabled (default)
|
||||
# 1 = enabled
|
||||
#
|
||||
|
|
|
@ -230,7 +230,7 @@ through my mail whenever time permits.
|
|||
|
||||
<p>
|
||||
Host AP mailing list can also be used for topics related to
|
||||
hostapd. Since this list has a broader audience, your likelyhood of
|
||||
hostapd. Since this list has a broader audience, your likelihood of
|
||||
getting responses is higher. This list is recommended for general
|
||||
questions about hostapd and its development. In addition, I
|
||||
will send release notes to it whenever a new version is available.
|
||||
|
|
|
@ -250,7 +250,7 @@ through my mail whenever time permits.
|
|||
|
||||
<p>
|
||||
There is also a mailing list for Host AP related messages.
|
||||
Since this list has a broader audience, your likelyhood of getting
|
||||
Since this list has a broader audience, your likelihood of getting
|
||||
responses is higher. This list is recommended for general questions
|
||||
about Host AP driver and its development. In addition, I will send
|
||||
release notes to it whenever a new version is available.
|
||||
|
|
|
@ -322,7 +322,7 @@ through my mail whenever time permits.
|
|||
</p>
|
||||
|
||||
<p>Host AP mailing list can also be used for topics related to
|
||||
wpa_supplicant. Since this list has a broader audience, your likelyhood
|
||||
wpa_supplicant. Since this list has a broader audience, your likelihood
|
||||
of getting responses is higher. This list is recommended for general
|
||||
questions about wpa_supplicant and its development. In addition, I
|
||||
will send release notes to it whenever a new version is available.
|
||||
|
|
Loading…
Reference in a new issue