Skip to content

Commit

Permalink
core: fix typos
Browse files Browse the repository at this point in the history
Thanks, lintian
> I: kamailio: spelling-error-in-binary usr/sbin/kamailio lenght length
> I: kamailio: spelling-error-in-binary usr/sbin/kamailio orderd ordered
> I: kamailio: spelling-error-in-binary usr/sbin/kamailio uknown unknown
  • Loading branch information
linuxmaniac committed Feb 8, 2018
1 parent 70b153d commit f68eb2b
Show file tree
Hide file tree
Showing 7 changed files with 13 additions and 13 deletions.
2 changes: 1 addition & 1 deletion src/core/basex.c
Expand Up @@ -342,7 +342,7 @@ char* b58_decode(char *outb, int *outbszp, char *b58, int b58sz)
/**
* encode raw data (of size binsz) into base58 format stored in b58
* - *b58sz gives the size of b58 buffer
* - *b58sz is updated to the lenght of result
* - *b58sz is updated to the length of result
* - b58 is 0-terminated
* - return NULL on failure or b58
*/
Expand Down
4 changes: 2 additions & 2 deletions src/core/basex.h
Expand Up @@ -249,9 +249,9 @@ extern unsigned char _bx_ub64[0x54+1];



/*! \brief lenght needed for encoding l bytes */
/*! \brief length needed for encoding l bytes */
#define base16_enc_len(l) (l*2)
/*! \brief maximum lenght needed for decoding l bytes */
/*! \brief maximum length needed for decoding l bytes */
#define base16_max_dec_len(l) (l/2)
/*! \brief actual space needed for decoding a string b of size l */
#define base16_dec_len(b, l) base16_max_dec_len(l)
Expand Down
2 changes: 1 addition & 1 deletion src/core/dns_cache.c
Expand Up @@ -4365,7 +4365,7 @@ int dns_cache_add_record(unsigned short type,
);
}
if (!rr_p) {
LM_ERR("Failed to correct the orderd list of SRV resource records\n");
LM_ERR("Failed to correct the ordered list of SRV resource records\n");
goto error;
}

Expand Down
2 changes: 1 addition & 1 deletion src/core/dns_cache.h
Expand Up @@ -155,7 +155,7 @@ struct dns_hash_entry{
unsigned char ent_flags; /* entry flags: unresolvable/permanent */
unsigned char name_len; /* can be maximum 255 bytes */
char name[1]; /* variable length, name, null terminated
(actual lenght = name_len +1)*/
(actual length = name_len +1)*/
};


Expand Down
2 changes: 1 addition & 1 deletion src/core/parser/sdp/sdp.c
Expand Up @@ -371,7 +371,7 @@ static int parse_sdp_session(str *sdp_body, int session_num, str *cnt_disp, sdp_
str fmtp_string;
str remote_candidates = {"a:remote-candidates:", 20};

/* hook the start and lenght of sdp body inside structure
/* hook the start and length of sdp body inside structure
* - shorcut useful for multi-part bodies and sdp operations
*/
_sdp->text = *sdp_body;
Expand Down
2 changes: 1 addition & 1 deletion src/core/parser/sdp/sdp_helpr_funcs.c
Expand Up @@ -469,7 +469,7 @@ int extract_mediaip(str *body, str *mediaip, int *pf, char *line)
return -1;
}
/* safety checks:
* - for lenght, at least 6: ' IP[4|6] x...'
* - for length, at least 6: ' IP[4|6] x...'
* - white space after
*/
if(cp + 6 > mediaip->s + mediaip->len && cp[4]!=' ') {
Expand Down
12 changes: 6 additions & 6 deletions src/core/tcp_read.c
Expand Up @@ -1176,7 +1176,7 @@ static int tcp_read_ws(struct tcp_connection *c, int* read_flags)
handled to 2^32 - which should be plenty for SIP! */
if((p[pos] & 0xff)!=0 || (p[pos + 1] & 0xff)!=0
|| (p[pos + 2] & 0xff)!=0 || (p[pos + 3] & 0xff)!=0) {
LM_WARN("advertised lenght is too large (more than 2^32)\n");
LM_WARN("advertised length is too large (more than 2^32)\n");
goto skip;
}
len = ((p[pos + 4] & 0xff) << 24)
Expand All @@ -1194,9 +1194,9 @@ static int tcp_read_ws(struct tcp_connection *c, int* read_flags)
pos += 4;
}

/* check if advertised lenght fits in read buffer */
/* check if advertised length fits in read buffer */
if(len>=r->b_size) {
LM_WARN("advertised lenght (%u) greater than buffer size (%u)\n",
LM_WARN("advertised length (%u) greater than buffer size (%u)\n",
len, r->b_size);
goto skip;
}
Expand Down Expand Up @@ -1282,9 +1282,9 @@ static int tcp_read_hep3(struct tcp_connection *c, int* read_flags)

len = ((uint32_t)(p[4] & 0xff) << 8) + (p[5] & 0xff);

/* check if advertised lenght fits in read buffer */
/* check if advertised length fits in read buffer */
if(len>=r->b_size) {
LM_WARN("advertised lenght (%u) greater than buffer size (%u)\n",
LM_WARN("advertised length (%u) greater than buffer size (%u)\n",
len, r->b_size);
goto skip;
}
Expand Down Expand Up @@ -1878,7 +1878,7 @@ inline static int handle_io(struct fd_map* fm, short events, int idx)
fm->fd, fm->type, fm->data);
goto error;
default:
LM_CRIT("uknown fd type %d\n", fm->type);
LM_CRIT("unknown fd type %d\n", fm->type);
goto error;
}

Expand Down

0 comments on commit f68eb2b

Please sign in to comment.