diff --git a/doc/scripts/cdefs2doc/dump_cfg_defs.pl b/doc/scripts/cdefs2doc/dump_cfg_defs.pl index 225a8175256..b1517dca1f7 100755 --- a/doc/scripts/cdefs2doc/dump_cfg_defs.pl +++ b/doc/scripts/cdefs2doc/dump_cfg_defs.pl @@ -128,7 +128,7 @@ sub help C code. -s | --src | --source - name of the source file, needed only if the input file is in "raw" translation - unit format (--tu) and usefull to restrict + unit format (--tu) and useful to restrict and speed-up the search. --patch - show patches needed for the GCC::TranslationUnit package. @@ -389,7 +389,7 @@ sub expr_op0{ my $no=@cfg_default; $i=0; if ($no > 0 && @cfg_defs != $no) { - print(STDERR "WARNING: different array lenghts ($def_cfg_name($no) &&", + print(STDERR "WARNING: different array lengths ($def_cfg_name($no) &&", " $cfg_var_name($(scalar @cfg_defs)))\n"); $no=0; } diff --git a/doc/scripts/cdefs2doc/dump_counters.pl b/doc/scripts/cdefs2doc/dump_counters.pl index 4387ee9a5ec..1ddfa29e737 100755 --- a/doc/scripts/cdefs2doc/dump_counters.pl +++ b/doc/scripts/cdefs2doc/dump_counters.pl @@ -116,7 +116,7 @@ sub help C code. -s | --src | --source - name of the source file, needed only if the input file is in "raw" translation - unit format (--tu) and usefull to restrict + unit format (--tu) and useful to restrict and speed-up the search. --patch - show patches needed for the GCC::TranslationUnit package. diff --git a/doc/scripts/cdefs2doc/dump_rpcs.pl b/doc/scripts/cdefs2doc/dump_rpcs.pl index 6c991edf905..80cfe807d3b 100755 --- a/doc/scripts/cdefs2doc/dump_rpcs.pl +++ b/doc/scripts/cdefs2doc/dump_rpcs.pl @@ -121,7 +121,7 @@ sub help C code. -s | --src | --source - name of the source file, needed only if the input file is in "raw" translation - unit format (--tu) and usefull to restrict + unit format (--tu) and useful to restrict and speed-up the search. --patch - show patches needed for the GCC::TranslationUnit package. diff --git a/doc/scripts/cdefs2doc/dump_selects.pl b/doc/scripts/cdefs2doc/dump_selects.pl index 4ba3ed4850b..b48f76bbbac 100755 --- a/doc/scripts/cdefs2doc/dump_selects.pl +++ b/doc/scripts/cdefs2doc/dump_selects.pl @@ -120,7 +120,7 @@ sub help C code. -s | --src | --source - name of the source file, needed only if the input file is in "raw" translation - unit format (--tu) and usefull to restrict + unit format (--tu) and useful to restrict and speed-up the search. --patch - show patches needed for the GCC::TranslationUnit package. diff --git a/src/modules/seas/doc/seas_admin.xml b/src/modules/seas/doc/seas_admin.xml index bb89220e345..ecd204f809f 100644 --- a/src/modules/seas/doc/seas_admin.xml +++ b/src/modules/seas/doc/seas_admin.xml @@ -99,7 +99,7 @@ At the moment, the only Application Server that works with SEAS is WeSIP Application Server, which can be downloaded from - www.wesip.eu, and used freely for non-comercial purposes. + www.wesip.eu, and used freely for non-commercial purposes. diff --git a/src/modules/seas/encode_content_length.c b/src/modules/seas/encode_content_length.c index 957d2cf7ff3..807d30b5f1d 100644 --- a/src/modules/seas/encode_content_length.c +++ b/src/modules/seas/encode_content_length.c @@ -47,7 +47,7 @@ * encoding is as follows: * 1: length of the payload. * N: Network-Byte-Ordered(little endian) of the - * multibyte number represeting the length (now, it is + * multibyte number representing the length (now, it is * a long integer) */ int encode_contentlength(char *hdr,int hdrlen,long int len,char *where) diff --git a/src/modules/seas/encode_content_length.h b/src/modules/seas/encode_content_length.h index deb1cc40467..393adf932ae 100644 --- a/src/modules/seas/encode_content_length.h +++ b/src/modules/seas/encode_content_length.h @@ -18,8 +18,8 @@ * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA */ -#ifndef __ENCODE_CONTENT_LENGHT_H__ -#define __ENCODE_CONTENT_LENGHT_H__ +#ifndef __ENCODE_CONTENT_LENGTH_H__ +#define __ENCODE_CONTENT_LENGTH_H__ int encode_contentlength(char *hdr,int hdrlen,long int len,char *where); int print_encoded_contentlength(FILE* fd,char *hdr,int hdrlen,unsigned char *payload,int paylen,char *prefix); #endif diff --git a/src/modules/seas/encode_msg.c b/src/modules/seas/encode_msg.c index e496397888a..fad4b225fb8 100644 --- a/src/modules/seas/encode_msg.c +++ b/src/modules/seas/encode_msg.c @@ -112,7 +112,7 @@ char get_header_code(struct hdr_field *hf) * parts. * * RETURNS: LENGTH of structure on success, <0 if failure - * if there was failure, you dont need to pkg_free the payload (it is done inside). + * if there was failure, you don't need to pkg_free the payload (it is done inside). * if there was success, you __NEED_TO_PKG_FREE_THE_PAYLOAD__ from the calling function. * * The encoded meta-info is composed by 3 sections: @@ -180,7 +180,7 @@ int encode_msg(struct sip_msg *msg,char *payload,int len) } else { h=(unsigned short)(ms->u.reply.statuscode); } - if(h==32){/*statuscode wont be 32...*/ + if(h==32){/*statuscode won't be 32...*/ myerror="unknown message type\n"; goto error; } @@ -290,7 +290,7 @@ int decode_msg(struct sip_msg *msg,char *code, unsigned int len) memcpy(&h,&code[2],2); h=ntohs(h); - /*TODO use shorcuts in meta-info header.*/ + /*TODO use shortcuts in meta-info header.*/ msg->buf=&code[h]; memcpy(&h,&code[4],2); diff --git a/src/modules/seas/encode_parameters.c b/src/modules/seas/encode_parameters.c index ad29225c1cc..83c0349862f 100644 --- a/src/modules/seas/encode_parameters.c +++ b/src/modules/seas/encode_parameters.c @@ -52,7 +52,7 @@ * * TODO this is little shitty, someone should unify all the param flavours * to a sigle universal type of parameter (to_param,param,disposition_param) - * the way is done here, at least, we dont have the parameter-hanling code spread all around. + * the way is done here, at least, we don't have the parameter-hanling code spread all around. */ int encode_parameters(unsigned char *where,void *pars,char *hdrstart,void *_body,char to) { diff --git a/src/modules/seas/encode_to_body.c b/src/modules/seas/encode_to_body.c index a058ab22bd0..f65c906b791 100644 --- a/src/modules/seas/encode_to_body.c +++ b/src/modules/seas/encode_to_body.c @@ -140,7 +140,7 @@ int print_encoded_to_body(FILE *fd,char *hdr,int hdrlen,unsigned char* payload,i * payload is the payload, * paylen is the payload length, * fd is the file descriptor to which to dump, - * segregationLevel is wether only URIS must be dumped or all the header code. + * segregationLevel is whether only URIS must be dumped or all the header code. * * return 0 on success, <0 on error */ diff --git a/src/modules/seas/encode_uri.c b/src/modules/seas/encode_uri.c index 4932ff0ff66..1677611fbf6 100644 --- a/src/modules/seas/encode_uri.c +++ b/src/modules/seas/encode_uri.c @@ -94,7 +94,7 @@ * the end of the field, will be the place where the * following pointer points to, minus one (note that all the * fields present in a URI are preceded by 1 character, ie - * sip[:user][:passwod][@host][:port][;param1=x][;param2=y][?hdr1=a][&hdr2=b]$p + * sip[:user][:password][@host][:port][;param1=x][;param2=y][?hdr1=a][&hdr2=b]$p * it will be necessary to have a pointer at the end, * pointing two past the end of the uri, so that the length * of the last header can be computed. diff --git a/src/modules/seas/event_dispatcher.c b/src/modules/seas/event_dispatcher.c index 8b2719ec84d..55235afbb15 100644 --- a/src/modules/seas/event_dispatcher.c +++ b/src/modules/seas/event_dispatcher.c @@ -454,7 +454,7 @@ static int dispatch_relay(void) if(use_stats && thepointer.ptr->transaction) event_stat(thepointer.ptr->transaction); if(thepointer.ptr->as == NULL || !thepointer.ptr->as->connected || thepointer.ptr->as->type==CLUSTER_TYPE){ - LM_WARN("tryied to send an event to an App Server" + LM_WARN("tried to send an event to an App Server" " that is scheduled to die!!\n"); retval=-2; goto error; @@ -467,7 +467,7 @@ static int dispatch_relay(void) switch(errno){ case EINTR: if(!thepointer.ptr->as->connected){ - LM_WARN("tryied to send an event to an App Server" + LM_WARN("tried to send an event to an App Server" " that is scheduled to die!!\n"); retval=-2; goto error; @@ -617,7 +617,7 @@ static inline int send_sockinfo(int fd) unsigned char i; char buffer[300]; int k=0,j; - buffer[k++]=16;/*This used to be T_TABLE_POWER in Kamailio 1.0.1, now its hardcoded in config.h*/ + buffer[k++]=16;/*This used to be T_TABLE_POWER in Kamailio 1.0.1, now it is hardcoded in config.h*/ for(i=0,s=udp_listen;s;s=s->next,i++); #ifdef USE_TCP for(s=tcp_listen;s;s=s->next,i++); @@ -665,7 +665,7 @@ static inline int send_sockinfo(int fd) * N: name * 1: address string length * N: address - * 2: NBO unsigned shor int port number + * 2: NBO unsigned short int port number * * TODO buffer overflow risk */ @@ -698,7 +698,7 @@ static inline int print_sock_info(char *buffer,int wheremax,int *idx,struct sock /** * Handles data from an AppServer. First searches in the AS table which was the AS - * that sent the data (we dont already know it because this comes from a poll_fd + * that sent the data (we don't already know it because this comes from a poll_fd * struct). When the one is found, it calls process_event_reply, which in turn * looks if there's a complete event in the buffer, and if there is, processes it. * @@ -744,7 +744,7 @@ static int handle_as_data(int fd) * which says the length of the following message (header and payload). * This way, we avoid multiple small reads() to the socket, which (as we know), consumes * far more processor because of the kernel read(2) system call. The drawback - * is the added complexity of mantaining a buffer, the bytes read, and looking + * is the added complexity of maintaining a buffer, the bytes read, and looking * if there is a complete message already prepared. * * Actions are supposed to be small, that's why BUF_SIZE is 2000 bytes length. diff --git a/src/modules/seas/seas.c b/src/modules/seas/seas.c index 8d95cf408fd..303b7beb10c 100644 --- a/src/modules/seas/seas.c +++ b/src/modules/seas/seas.c @@ -387,7 +387,7 @@ static int w_as_relay_sl(struct sip_msg *msg, char *as_name, char *foo) /** TODO handle this correctly !!!*/ } } - //this shouln't be here, because it will remove the transaction from memory, but + //this shouldn't be here, because it will remove the transaction from memory, but //if transaction isn't unref'ed iw will be released anyway at t_unref if kr (killreason)==0 // a wait timer will be put to run with WT_TIME_OUT (5 seconds, within which the AS should respond) // this is a bug !!! I think this is why we lose calls at high load !! @@ -457,7 +457,7 @@ char * create_as_event_t(struct cell *t,struct sip_msg *msg,char processor_id,in LM_DBG("new CANCEL\n"); originalT=seas_f.tmb.t_lookup_original(msg); if(!originalT || originalT==T_UNDEFINED){ - /** we dont even pass the unknown CANCEL to JAIN*/ + /** we don't even pass the unknown CANCEL to JAIN*/ LM_WARN("CANCEL does not match any existing transaction!!\n"); goto error; }else{ diff --git a/src/modules/seas/seas_action.c b/src/modules/seas/seas_action.c index 1f370f77009..e91c740a319 100644 --- a/src/modules/seas/seas_action.c +++ b/src/modules/seas/seas_action.c @@ -730,7 +730,7 @@ int ac_reply(as_p the_as,unsigned char processor_id,unsigned int flags,char *act LM_DBG("Trying to construct a SipReply with: ReasonPhrase:[%.*s] body:[%.*s] headers:[%.*s] totag:[%.*s]\n",\ my_msg->first_line.u.reply.reason.len,my_msg->first_line.u.reply.reason.s,\ body.len,body.s,new_header.len,new_header.s,totag.len,totag.s); - /* t_reply_with_body un-ref-counts the transaction, so dont use it anymore*/ + /* t_reply_with_body un-ref-counts the transaction, so don't use it anymore*/ if(seas_f.tmb.t_reply_with_body(c,my_msg->first_line.u.reply.statuscode,&(my_msg->first_line.u.reply.reason),&body,&new_header,&totag)<0){ LM_ERR("Failed to t_reply\n"); goto error; @@ -995,7 +995,7 @@ int ac_uac_req(as_p the_as,unsigned char processor_id,unsigned int flags,char *a if(tb->tag_value.s && tb->tag_value.len) shm_str_dup(&my_dlg->id.rem_tag,&tb->tag_value); /**Awful hack: to be able to set our own CSeq, from_tag and call-ID we have - * to use req_within instead of req_outside (it sets it's own CSeq,Call-ID + * to use req_within instead of req_outside (it sets its own CSeq, Call-ID * and ftag), so we have to simulate that the dialog is already in completed * state so... */ @@ -1019,7 +1019,7 @@ int ac_uac_req(as_p the_as,unsigned char processor_id,unsigned int flags,char *a body.s[clen]=0; LM_DBG("Trying to construct a Sip Request with: body:%d[%.*s] headers:%d[%.*s]\n",\ body.len,body.len,body.s,headers.len,headers.len,headers.s); - /*t_reply_with_body un-ref-counts the transaction, so dont use it anymore*/ + /*t_reply_with_body un-ref-counts the transaction, so don't use it anymore*/ }else{ body.s=NULL; body.len=0; @@ -1408,7 +1408,7 @@ int as_action_fail_resp(int uac_id,int sip_error,char *err_buf,int i) /* * This callback function should be used in order to free the parameters passed to uac_cb. - * This callback is called when the transaction is detroyed. + * This callback is called when the transaction is destroyed. */ void uac_cleanup_cb(struct cell* t, int type, struct tmcb_params *rcvd_params) { @@ -1463,7 +1463,7 @@ void uas_e2e_ack_cb(struct cell* t, int type,struct tmcb_params *rcvd_params) /** * This function will be called from a SER process when a reply is received for - * the transaction. The SER processes only have acces to the EventDispatcher + * the transaction. The SER processes only have access to the EventDispatcher * fifo (not to the ActionDispatcher) so EventDispatcher will be the one who * will send the event to the AppServer. */ diff --git a/src/modules/seas/statistics.c b/src/modules/seas/statistics.c index cc9223ad231..2e1006a381d 100644 --- a/src/modules/seas/statistics.c +++ b/src/modules/seas/statistics.c @@ -211,7 +211,7 @@ void action_stat(struct cell *t) /** - * stats socket sould be an IP_address:port or unix://path/to_file + * stats socket should be an IP_address:port or unix://path/to_file * TODO handling unix sockets and IPv6 !! * * returns @@ -297,7 +297,7 @@ int start_stats_server(char *stats_socket) } /** - * stats socket sould be an IP_address:port or unix://path/to_file + * stats socket should be an IP_address:port or unix://path/to_file * TODO handling unix sockets and IPv6 !! * * returns @@ -351,7 +351,7 @@ void serve_stats(int fd) } retrn=print_stats_info(f,sock); if(retrn==-1){ - /**simple error happened, dont worry*/ + /**simple error happened, don't worry*/ LM_ERR("printing statisticss \n"); continue; }else if(retrn==-2){ diff --git a/src/modules/siputils/chargingvector.c b/src/modules/siputils/chargingvector.c index 0fed98b4c9c..e736ba9688e 100644 --- a/src/modules/siputils/chargingvector.c +++ b/src/modules/siputils/chargingvector.c @@ -410,7 +410,7 @@ int sip_handle_pcv(struct sip_msg *msg, char *flags, char *str2) char * pcv_body = pcv_buf + 19; char pcv_value[40]; - /* We use the IP adress of the interface that received the message as generated-at */ + /* We use the IP address of the interface that received the message as generated-at */ if(msg->rcv.bind_address==NULL || msg->rcv.bind_address->address_str.s==NULL) { LM_ERR("No IP address for message. Failed to generate charging vector.\n"); diff --git a/src/modules/siputils/checks.c b/src/modules/siputils/checks.c index c174662d8df..6aba2317dbb 100644 --- a/src/modules/siputils/checks.c +++ b/src/modules/siputils/checks.c @@ -575,7 +575,7 @@ int w_uri_param_rm(struct sip_msg* _msg, char* _param, char* _str2) * Converts URI, if it is tel URI, to SIP URI. Returns 1, if * conversion succeeded and 2 if no conversion was needed, i.e., URI was not * tel URI. Returns -1, if conversion failed. Takes SIP URI hostpart from - * second parameter and (if needed) writes the result to third paramater. + * second parameter and (if needed) writes the result to third parameter. */ int tel2sip(struct sip_msg* _msg, char* _uri, char* _hostpart, char* _res) { diff --git a/src/modules/siputils/checks.h b/src/modules/siputils/checks.h index eaeaca3f81e..e55739e66ad 100644 --- a/src/modules/siputils/checks.h +++ b/src/modules/siputils/checks.h @@ -71,7 +71,7 @@ int ki_add_uri_param(struct sip_msg* _msg, str* param); * Converts URI, if it is tel URI, to SIP URI. Returns 1, if * conversion succeeded or if no conversion was needed, i.e., URI was not * tel URI. Returns -1, if conversion failed. Takes SIP URI hostpart from - * second parameter and (if needed) writes the result to third paramater. + * second parameter and (if needed) writes the result to third parameter. */ int tel2sip(struct sip_msg* _msg, char* _uri, char* _hostpart, char* _res); diff --git a/src/modules/siputils/contact_ops.c b/src/modules/siputils/contact_ops.c index 86b02382cc2..322911f3c43 100644 --- a/src/modules/siputils/contact_ops.c +++ b/src/modules/siputils/contact_ops.c @@ -304,7 +304,7 @@ int encode2format(str uri, struct uri_format *format) format->first = start - string + 4; /*sip: */ format->second = end - string; /* --------------------------testing ------------------------------- */ - /* sip:gva@pass@10.0.0.1;;transport=udp>;expires=2 INCORECT BEHAVIOR OF + /* sip:gva@pass@10.0.0.1;;transport=udp>;expires=2 INCORRECT BEHAVIOR OF * parse_uri,myfunction works good */ foo = parse_uri(start, end - start, &sipUri); if(foo != 0) { diff --git a/src/modules/siputils/doc/siputils_admin.xml b/src/modules/siputils/doc/siputils_admin.xml index d887c1b260f..f3e9d32a55e 100644 --- a/src/modules/siputils/doc/siputils_admin.xml +++ b/src/modules/siputils/doc/siputils_admin.xml @@ -1181,7 +1181,7 @@ if (is_supported("outbound")) { ... } for replies true also in the case of additional SIP reply reception. - Parameter mode is optional and can be an integer or a varaible holding + Parameter mode is optional and can be an integer or a variable holding an integer. If not provided, the behaviour is like mode==0. diff --git a/src/modules/siputils/siputils.c b/src/modules/siputils/siputils.c index 139a334f790..099248555ec 100644 --- a/src/modules/siputils/siputils.c +++ b/src/modules/siputils/siputils.c @@ -22,7 +22,7 @@ /*! * \file - * \brief Module with several utiltity functions related to SIP messages handling + * \brief Module with several utility functions related to SIP messages handling * \ingroup siputils * - Module \ref siputils */ diff --git a/src/modules/tls/doc/params.xml b/src/modules/tls/doc/params.xml index d90157ca24e..b51e5ce99a0 100644 --- a/src/modules/tls/doc/params.xml +++ b/src/modules/tls/doc/params.xml @@ -467,7 +467,7 @@ modparam("tls", "connection_timeout", 60) <varname>tls_disable_compression</varname> (boolean) If set compression over TLS will be disabled. - Note that compression uses a lot of memory (about 10x more then with + Note that compression uses a lot of memory (about 10x more than with the compression disabled), so if you want to minimize memory usage is a good idea to disable it. TLS compression also expose you for the @@ -568,9 +568,9 @@ modparam("tls", "ssl_freelist_max_len", 0) allow a successful handshake (try minimum 1024). - Lower values would lead to less memory usage, but values lower then + Lower values would lead to less memory usage, but values lower than the typical &kamailio; write size would incur a slight performance - penalty. Good values are bigger then the size of the biggest + penalty. Good values are bigger than the size of the biggest SIP packet one normally expects to forward. For example in most setups 2048 would be a good value. @@ -579,7 +579,7 @@ modparam("tls", "ssl_freelist_max_len", 0) Values on the lower side, even if valid (> 512), might not allow for a successful initial handshake. This happens if the certificate does not fit inside one send fragment. - Values lower then 1024 should not be used. + Values lower than 1024 should not be used. Even with higher values, if the handshake fails, try increasing the value. @@ -1042,7 +1042,7 @@ modparam("tls", "renegotiation", 1) If flag (bit) at index 0 is set (value 1), the memory management operations - registered for TLS are wapped within a pthread mutex lock. It can be useful + registered for TLS are wrapped within a pthread mutex lock. It can be useful with newer versions of libssl and libcrypto, which have a more pthread multi-threading oriented design. @@ -1312,7 +1312,7 @@ end the PRNG engine is set to "cryptorand". - The following options are avaialble: + The following options are available: krand - use internal kam_rand() function diff --git a/src/modules/tls/doc/tls.xml b/src/modules/tls/doc/tls.xml index 23d59ed49cb..2abf9ac1446 100644 --- a/src/modules/tls/doc/tls.xml +++ b/src/modules/tls/doc/tls.xml @@ -228,7 +228,7 @@ make TLS_EXTRA_LIBS="-lkrb5 -lz" all include_modules=tls allocations start to fail (due to memory shortage), Openssl can crash or cause memory leaks (making the memory shortage even worse). As of this writing all Openssl versions were affected (including 0.9.8e), see Openssl bug #1491. The TLS module has some - workarounds for preventing this problem (see low_mem_treshold1 + workarounds for preventing this problem (see low_mem_threshold1 and low_mem_threshold2), however starting Kamailio with enough shared memory is higly recommended. When this is not possible a quick way to significantly reduce Openssl memory usage it to disable compression (see tls_disable_compression). diff --git a/src/modules/tls/sbufq.h b/src/modules/tls/sbufq.h index e9fc4c2b8dc..69376b9590f 100644 --- a/src/modules/tls/sbufq.h +++ b/src/modules/tls/sbufq.h @@ -217,7 +217,7 @@ inline static unsigned int sbufq_destroy(struct sbuffer_queue* q) * flush_f(param1, param2, const void* buf, unsigned size). * It should return the number of bytes "flushed" on * success, or <0 on error. If the number of bytes - * "flushed" is smaller then the requested size, it + * "flushed" is smaller than the requested size, it * would be assumed that no more bytes can be flushed * and sbufq_flush will exit. * @param flush_p1 - parameter for the flush function callback. diff --git a/src/modules/tls/tls_cfg.h b/src/modules/tls/tls_cfg.h index be3ccdaa888..ad54d787363 100644 --- a/src/modules/tls/tls_cfg.h +++ b/src/modules/tls/tls_cfg.h @@ -79,7 +79,7 @@ struct cfg_group_tls { /* maximum number of bytes (clear text) sent into one record. * The default and maximum value are ~16k. Lower values would lead to a * lower memory footprint. - * Values lower then the typical app. write size might decrease + * Values lower than the typical app. write size might decrease * performance (extra write() syscalls), so it should be kept ~2k for ser. */ int ssl_max_send_fragment; diff --git a/src/modules/tls/tls_ct_q.h b/src/modules/tls/tls_ct_q.h index ab0c64e5e15..8bcd0d194c7 100644 --- a/src/modules/tls/tls_ct_q.h +++ b/src/modules/tls/tls_ct_q.h @@ -107,7 +107,7 @@ inline static unsigned int tls_ct_q_destroy(tls_ct_q** ct_q) * flush_f(flush_p, const void* buf, unsigned size). * It should return the number of bytes "flushed" on * success, or <0 on error. If the number of bytes - * "flushed" is smaller then the requested size, it + * "flushed" is smaller than the requested size, it * would be assumed that no more bytes can be flushed * and sbufq_flush will exit. * @param flush_p1 - parameter for the flush function callback. diff --git a/src/modules/tls/tls_domain.c b/src/modules/tls/tls_domain.c index c524aac750d..d718c928936 100644 --- a/src/modules/tls/tls_domain.c +++ b/src/modules/tls/tls_domain.c @@ -681,7 +681,7 @@ static int set_cipher_list(tls_domain_t* d) char* cipher_list; cipher_list=d->cipher_list.s; -#ifdef TLS_KSSL_WORKARROUND +#ifdef TLS_KSSL_WORKAROUND if (openssl_kssl_malloc_bug) { /* is openssl bug #1467 present ? */ if (d->cipher_list.s==0) { /* use "DEFAULT:!KRB5" */ @@ -700,7 +700,7 @@ static int set_cipher_list(tls_domain_t* d) } } } -#endif /* TLS_KSSL_WORKARROUND */ +#endif /* TLS_KSSL_WORKAROUND */ if (!cipher_list) return 0; procs_no=get_max_procs(); for(i = 0; i < procs_no; i++) { @@ -823,7 +823,7 @@ static int set_ssl_options(tls_domain_t* d) #endif procs_no=get_max_procs(); - options=SSL_OP_ALL; /* all the bug workarrounds by default */ + options=SSL_OP_ALL; /* all the bug workarounds by default */ #if OPENSSL_VERSION_NUMBER >= 0x00907000L options|=SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION | SSL_OP_CIPHER_SERVER_PREFERENCE; @@ -1323,7 +1323,7 @@ static int load_private_key(tls_domain_t* d) for(idx = 0, ret_pwd = 0; idx < 3; idx++) { #ifndef OPENSSL_NO_ENGINE // in PROC_INIT skip loading HSM keys due to - // fork() issues with PKCS#11 libaries + // fork() issues with PKCS#11 libraries if (strncmp(d->pkey_file.s, "/engine:", 8) != 0) { ret_pwd = SSL_CTX_use_PrivateKey_file(d->ctx[i], d->pkey_file.s, SSL_FILETYPE_PEM); diff --git a/src/modules/tls/tls_init.c b/src/modules/tls/tls_init.c index a65b8b72eba..8f40fab0212 100644 --- a/src/modules/tls/tls_init.c +++ b/src/modules/tls/tls_init.c @@ -18,7 +18,7 @@ /*! \defgroup tls Kamailio TLS support * - * This modules implements SIP over TCP with TLS encryption. + * This module implements SIP over TCP with TLS encryption. * Make sure you read the README file that describes configuration * of TLS for single servers and servers hosting multiple domains, * and thus using multiple SSL/TLS certificates. @@ -116,20 +116,20 @@ void ksr_tls_lock_destroy(void) # include "fixed_c_zlib.h" #endif -#ifdef TLS_KSSL_WORKARROUND +#ifdef TLS_KSSL_WORKAROUND #if OPENSSL_VERSION_NUMBER < 0x00908050L # warning "openssl lib compiled with kerberos support which introduces a bug\ (wrong malloc/free used in kssl.c) -- attempting workaround" -# warning "NOTE: if you don't link libssl staticaly don't try running the \ +# warning "NOTE: if you don't link libssl statically don't try running the \ compiled code on a system with a differently compiled openssl (it's safer \ to compile on the _target_ system)" #endif /* OPENSSL_VERSION_NUMBER */ -#endif /* TLS_KSSL_WORKARROUND */ +#endif /* TLS_KSSL_WORKAROUND */ /* openssl < 1. 0 */ #if OPENSSL_VERSION_NUMBER < 0x01000000L # warning "openssl < 1.0: no TLS extensions or server name support" -#endif /* OPENSSL_VERION < 1.0 */ +#endif /* OPENSSL_VERSION < 1.0 */ @@ -146,7 +146,7 @@ void ksr_tls_lock_destroy(void) #endif -#ifdef TLS_KSSL_WORKARROUND +#ifdef TLS_KSSL_WORKAROUND int openssl_kssl_malloc_bug=0; /* is openssl bug #1467 present ? */ #endif @@ -211,7 +211,7 @@ inline static int backtrace2str(char* buf, int size) }else if ((s=strchr(bt_strs[i], '['))!=0){ e=s+strlen(s); }else{ - s=bt_strs[i]; e=s+strlen(s); /* add thw whole string */ + s=bt_strs[i]; e=s+strlen(s); /* add the whole string */ } next=buf_append(p, end, s, (int)(long)(e-s)); if (next==0) break; @@ -870,7 +870,7 @@ int tls_h_mod_init_f(void) } } -#ifdef TLS_KSSL_WORKARROUND +#ifdef TLS_KSSL_WORKAROUND /* if openssl compiled with kerberos support, and openssl < 0.9.8e-dev * or openssl between 0.9.9-dev and 0.9.9-beta1 apply workaround for * openssl bug #1467 */ @@ -916,7 +916,7 @@ int tls_h_mod_init_f(void) if ((low_mem_threshold1 != cfg_get(tls, tls_cfg, low_mem_threshold1)) || (low_mem_threshold2 != cfg_get(tls, tls_cfg, low_mem_threshold2))) { - /* ugly hack to set the initial values for the mem tresholds */ + /* ugly hack to set the initial values for the mem thresholds */ if (cfg_register_ctx(&cfg_ctx, 0)) { LM_ERR("failed to register cfg context\n"); return -1; diff --git a/src/modules/tls/tls_init.h b/src/modules/tls/tls_init.h index c3fe829f008..8fe44d78e85 100644 --- a/src/modules/tls/tls_init.h +++ b/src/modules/tls/tls_init.h @@ -35,12 +35,12 @@ #if OPENSSL_VERSION_NUMBER < 0x01000000L /* alternative: check ifdef SSL_CTRL_SET_TLSEXT_HOSTNAME */ #define OPENSSL_NO_TLSEXT -#endif /* OPENSSL_VERION < 1.0 */ +#endif /* OPENSSL_VERSION < 1.0 */ #ifndef OPENSSL_NO_KRB5 -/* enable workarround for openssl kerberos wrong malloc bug +/* enable workaround for openssl kerberos wrong malloc bug * (kssl code uses libc malloc/free/calloc instead of OPENSSL_malloc & * friends)*/ -#define TLS_KSSL_WORKARROUND +#define TLS_KSSL_WORKAROUND extern int openssl_kssl_malloc_bug; /* is openssl bug #1467 present ? */ #endif diff --git a/src/modules/tls/tls_server.c b/src/modules/tls/tls_server.c index c52b9588188..afd16ab5424 100644 --- a/src/modules/tls/tls_server.c +++ b/src/modules/tls/tls_server.c @@ -57,7 +57,7 @@ int tls_run_event_routes(struct tcp_connection *c); -/* low memory treshold for openssl bug #1491 workaround */ +/* low memory threshold for openssl bug #1491 workaround */ #define LOW_MEM_NEW_CONNECTION_TEST() \ (cfg_get(tls, tls_cfg, low_mem_threshold1) && \ (shm_available_safe() < cfg_get(tls, tls_cfg, low_mem_threshold1))) @@ -219,7 +219,7 @@ static str *tls_get_connect_server_name(void) * Separated from tls_tcpconn_init to allow delayed ssl context * init (from the "child" process and not from the main one). * WARNING: the connection should be already locked. - * @return 0 on success, -1 on errror. + * @return 0 on success, -1 on error. */ static int tls_complete_init(struct tcp_connection* c) { @@ -306,7 +306,7 @@ static int tls_complete_init(struct tcp_connection* c) #endif #if OPENSSL_VERSION_NUMBER < 0x010100000L -#ifdef TLS_KSSL_WORKARROUND +#ifdef TLS_KSSL_WORKAROUND /* if needed apply workaround for openssl bug #1467 */ if (data->ssl->kssl_ctx && openssl_kssl_malloc_bug){ kssl_ctx_free(data->ssl->kssl_ctx); @@ -1013,7 +1013,7 @@ int tls_h_encode_f(struct tcp_connection *c, * Each modification of ssl data structures has to be protected, another process * might ask for the same connection and attempt write to it which would * result in updating the ssl structures. - * WARNING: must be called whic c->write_lock _unlocked_. + * WARNING: must be called with c->write_lock _unlocked_. * @param c - tcp connection pointer. The following flags might be set: * @param flags - value/result: * input: RD_CONN_FORCE_EOF - force EOF after the first @@ -1106,7 +1106,7 @@ int tls_h_read_f(struct tcp_connection* c, rd_conn_flags_t* flags) /* read() only if no previously detected EOF, or previous * short read (which means the socket buffer was emptied) */ if (likely(!(*flags & (RD_CONN_EOF|RD_CONN_SHORT_READ)))) { - /* don't read more then the free bytes in the tcp req buffer */ + /* don't read more than the free bytes in the tcp req buffer */ read_size = MIN_unsigned(rd.size, bytes_free); bytes_read = tcp_read_data(c->fd, c, (char*)rd.buf, read_size, flags); diff --git a/src/modules/tls_wolfssl/doc/tls_wolfssl.xml b/src/modules/tls_wolfssl/doc/tls_wolfssl.xml index a561fae07a1..199679b9ae0 100644 --- a/src/modules/tls_wolfssl/doc/tls_wolfssl.xml +++ b/src/modules/tls_wolfssl/doc/tls_wolfssl.xml @@ -65,7 +65,7 @@ #... loadmodule "sl.so" loadmodule "tls_wolfssl.so" -#... refer to Quick Start oftls module +#... refer to Quick Start of tls module #... for further configuration diff --git a/src/modules/tls_wolfssl/sbufq.h b/src/modules/tls_wolfssl/sbufq.h index e9fc4c2b8dc..69376b9590f 100644 --- a/src/modules/tls_wolfssl/sbufq.h +++ b/src/modules/tls_wolfssl/sbufq.h @@ -217,7 +217,7 @@ inline static unsigned int sbufq_destroy(struct sbuffer_queue* q) * flush_f(param1, param2, const void* buf, unsigned size). * It should return the number of bytes "flushed" on * success, or <0 on error. If the number of bytes - * "flushed" is smaller then the requested size, it + * "flushed" is smaller than the requested size, it * would be assumed that no more bytes can be flushed * and sbufq_flush will exit. * @param flush_p1 - parameter for the flush function callback. diff --git a/src/modules/tls_wolfssl/tls_cfg.h b/src/modules/tls_wolfssl/tls_cfg.h index be3ccdaa888..ad54d787363 100644 --- a/src/modules/tls_wolfssl/tls_cfg.h +++ b/src/modules/tls_wolfssl/tls_cfg.h @@ -79,7 +79,7 @@ struct cfg_group_tls { /* maximum number of bytes (clear text) sent into one record. * The default and maximum value are ~16k. Lower values would lead to a * lower memory footprint. - * Values lower then the typical app. write size might decrease + * Values lower than the typical app. write size might decrease * performance (extra write() syscalls), so it should be kept ~2k for ser. */ int ssl_max_send_fragment; diff --git a/src/modules/tls_wolfssl/tls_ct_q.h b/src/modules/tls_wolfssl/tls_ct_q.h index ab0c64e5e15..8bcd0d194c7 100644 --- a/src/modules/tls_wolfssl/tls_ct_q.h +++ b/src/modules/tls_wolfssl/tls_ct_q.h @@ -107,7 +107,7 @@ inline static unsigned int tls_ct_q_destroy(tls_ct_q** ct_q) * flush_f(flush_p, const void* buf, unsigned size). * It should return the number of bytes "flushed" on * success, or <0 on error. If the number of bytes - * "flushed" is smaller then the requested size, it + * "flushed" is smaller than the requested size, it * would be assumed that no more bytes can be flushed * and sbufq_flush will exit. * @param flush_p1 - parameter for the flush function callback. diff --git a/src/modules/tls_wolfssl/tls_domain.c b/src/modules/tls_wolfssl/tls_domain.c index 212ac6bc05b..4702aaa4153 100644 --- a/src/modules/tls_wolfssl/tls_domain.c +++ b/src/modules/tls_wolfssl/tls_domain.c @@ -630,7 +630,7 @@ static int set_cipher_list(tls_domain_t* d) char* cipher_list; cipher_list=d->cipher_list.s; -#ifdef TLS_KSSL_WORKARROUND +#ifdef TLS_KSSL_WORKAROUND if (openssl_kssl_malloc_bug) { /* is openssl bug #1467 present ? */ if (d->cipher_list.s==0) { /* use "DEFAULT:!KRB5" */ @@ -649,7 +649,7 @@ static int set_cipher_list(tls_domain_t* d) } } } -#endif /* TLS_KSSL_WORKARROUND */ +#endif /* TLS_KSSL_WORKAROUND */ if (!cipher_list) return 0; procs_no=get_max_procs(); for(i = 0; i < procs_no; i++) { @@ -757,7 +757,7 @@ static int set_ssl_options(tls_domain_t* d) procs_no=get_max_procs(); - options=SSL_OP_ALL; /* all the bug workarrounds by default */ + options=SSL_OP_ALL; /* all the bug workarounds by default */ options|=SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION | SSL_OP_CIPHER_SERVER_PREFERENCE; diff --git a/src/modules/tls_wolfssl/tls_init.c b/src/modules/tls_wolfssl/tls_init.c index b208970b252..1bca5427eb8 100644 --- a/src/modules/tls_wolfssl/tls_init.c +++ b/src/modules/tls_wolfssl/tls_init.c @@ -18,7 +18,7 @@ /*! \defgroup tls Kamailio TLS support * - * This modules implements SIP over TCP with TLS encryption. + * This module implements SIP over TCP with TLS encryption. * Make sure you read the README file that describes configuration * of TLS for single servers and servers hosting multiple domains, * and thus using multiple SSL/TLS certificates. @@ -123,7 +123,7 @@ inline static int backtrace2str(char* buf, int size) }else if ((s=strchr(bt_strs[i], '['))!=0){ e=s+strlen(s); }else{ - s=bt_strs[i]; e=s+strlen(s); /* add thw whole string */ + s=bt_strs[i]; e=s+strlen(s); /* add the whole string */ } next=buf_append(p, end, s, (int)(long)(e-s)); if (next==0) break; diff --git a/src/modules/tls_wolfssl/tls_server.c b/src/modules/tls_wolfssl/tls_server.c index 838fbe8a455..5400efd101c 100644 --- a/src/modules/tls_wolfssl/tls_server.c +++ b/src/modules/tls_wolfssl/tls_server.c @@ -962,7 +962,7 @@ int tls_h_encode_f(struct tcp_connection *c, * Each modification of ssl data structures has to be protected, another process * might ask for the same connection and attempt write to it which would * result in updating the ssl structures. - * WARNING: must be called whic c->write_lock _unlocked_. + * WARNING: must be called with c->write_lock _unlocked_. * @param c - tcp connection pointer. The following flags might be set: * @param flags - value/result: * input: RD_CONN_FORCE_EOF - force EOF after the first @@ -1055,7 +1055,7 @@ int tls_h_read_f(struct tcp_connection* c, rd_conn_flags_t* flags) /* read() only if no previously detected EOF, or previous * short read (which means the socket buffer was emptied) */ if (likely(!(*flags & (RD_CONN_EOF|RD_CONN_SHORT_READ)))) { - /* don't read more then the free bytes in the tcp req buffer */ + /* don't read more than the free bytes in the tcp req buffer */ read_size = MIN_unsigned(rd.size, bytes_free); bytes_read = tcp_read_data(c->fd, c, (char*)rd.buf, read_size, flags); diff --git a/src/modules/xcap_client/doc/xcap_client_devel.xml b/src/modules/xcap_client/doc/xcap_client_devel.xml index a5924d9774e..cd4579ef30e 100644 --- a/src/modules/xcap_client/doc/xcap_client_devel.xml +++ b/src/modules/xcap_client/doc/xcap_client_devel.xml @@ -38,7 +38,7 @@ typedef struct xcap_api { xcap_nodeSel_add_terminal_t add_terminal; xcap_nodeSel_free_t free_node_sel; xcapGetNewDoc_t getNewDoc; /* an initial request for the module - fo fetch this document that does not exist in xcap db table + to fetch this document that does not exist in xcap db table and handle its update*/ /* function to register a callback to document changes*/ diff --git a/src/modules/xcap_client/xcap_functions.c b/src/modules/xcap_client/xcap_functions.c index 39768ee74ab..6c68391005c 100644 --- a/src/modules/xcap_client/xcap_functions.c +++ b/src/modules/xcap_client/xcap_functions.c @@ -165,7 +165,7 @@ xcap_node_sel_t* xcapNodeSelAddStep(xcap_node_sel_t* curr_sel, str* name, if(ns_card> 'z') { - LM_ERR("Insuficient name cards for namespaces\n"); + LM_ERR("Insufficient name cards for namespaces\n"); goto error; } new_step.len= sprintf(new_step.s, "%c:", ns_card); diff --git a/src/modules/xcap_server/xcap_misc.c b/src/modules/xcap_server/xcap_misc.c index 8c04bbe27ca..0910b7d36e7 100644 --- a/src/modules/xcap_server/xcap_misc.c +++ b/src/modules/xcap_server/xcap_misc.c @@ -268,7 +268,7 @@ int xcap_parse_uri(str *huri, str *xroot, xcap_uri_t *xuri) if(xuri->file.s[xuri->file.len-1]=='/') xuri->file.len--; } - /* doc: aboslute and relative */ + /* doc: absolute and relative */ xuri->adoc.s = xuri->uri.s; xuri->adoc.len = xuri->file.s + xuri->file.len - xuri->adoc.s; xuri->rdoc.s = xuri->auid.s; diff --git a/src/modules/xcap_server/xcap_misc.h b/src/modules/xcap_server/xcap_misc.h index 0f461744f9c..bb840fc7742 100644 --- a/src/modules/xcap_server/xcap_misc.h +++ b/src/modules/xcap_server/xcap_misc.h @@ -53,7 +53,7 @@ typedef struct xcap_uri { typedef struct xcaps_auid_list { str auid; /* auid value */ char term; /* ending char (next one after auid) */ - int type; /* internaly type id for auid */ + int type; /* internal type id for auid */ } xcaps_auid_list_t; extern xcaps_auid_list_t xcaps_auid_list[]; diff --git a/src/modules/xhttp/xhttp_mod.c b/src/modules/xhttp/xhttp_mod.c index 31b2efb4d6e..ec53f75f40c 100644 --- a/src/modules/xhttp/xhttp_mod.c +++ b/src/modules/xhttp/xhttp_mod.c @@ -333,7 +333,7 @@ static int xhttp_handler(sip_msg_t *msg) ret = NONSIP_MSG_DROP; if(!IS_HTTP(msg)) { - /* oly http msg type */ + /* only http msg type */ return NONSIP_MSG_PASS; } diff --git a/src/modules/xhttp_pi/Makefile b/src/modules/xhttp_pi/Makefile index c0210ae4f61..79654878136 100644 --- a/src/modules/xhttp_pi/Makefile +++ b/src/modules/xhttp_pi/Makefile @@ -31,7 +31,7 @@ SER_LIBS+=$(SERLIBPATH)/srdb1/srdb1 include ../../Makefile.modules install-cfg: - # provisionning xml framework samples + # provisioning xml framework samples @mkdir -p $(data_prefix)/$(data_dir)/xhttp_pi @for FILE in $(wildcard ../../../utils/kamctl/xhttp_pi/*) ; do \ if [ -f $$FILE ] ; then \ @@ -41,7 +41,7 @@ install-cfg: $(data_prefix)/$(data_dir)/xhttp_pi/`basename "$$FILE"` ; \ fi ; \ done - # provisionning xml framework + # provisioning xml framework @$(call try_err, mkdir -p $(cfg_prefix)/$(cfg_dir)) @$(call try_err, $(INSTALL_TOUCH) \ $(cfg_prefix)/$(cfg_dir)/pi_framework.xml.sample) diff --git a/src/modules/xhttp_pi/xhttp_pi.c b/src/modules/xhttp_pi/xhttp_pi.c index 3256ef2af56..2edc95797f0 100644 --- a/src/modules/xhttp_pi/xhttp_pi.c +++ b/src/modules/xhttp_pi/xhttp_pi.c @@ -120,7 +120,7 @@ struct module_exports exports= { /** Implementation of pi_fault function required by the management API. * * This function will be called whenever a management function - * indicates that an error ocurred while it was processing the request. The + * indicates that an error occurred while it was processing the request. The * function takes the reply code and reason phrase as parameters, these will * be put in the body of the reply. * diff --git a/src/modules/xhttp_pi/xhttp_pi_fnc.c b/src/modules/xhttp_pi/xhttp_pi_fnc.c index 96f1707649c..7d58e06987f 100644 --- a/src/modules/xhttp_pi/xhttp_pi_fnc.c +++ b/src/modules/xhttp_pi/xhttp_pi_fnc.c @@ -294,7 +294,7 @@ do{ \ static const str XHTTP_PI_Response_Head_1 = str_init(""\ - "Kamailio Provisionning Interface"\ + "Kamailio Provisioning Interface"\ "