From: Jeff Lucovsky Date: Wed, 14 Aug 2019 23:20:21 +0000 (-0400) Subject: stream/tcp: correct spelling typos X-Git-Tag: suricata-5.0.0-rc1~142 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=ef327ab1948b2c2124a11468e956746fb72c5e8d;p=thirdparty%2Fsuricata.git stream/tcp: correct spelling typos --- diff --git a/src/stream-tcp-reassemble.c b/src/stream-tcp-reassemble.c index 1b23e27f74..647b0d4145 100644 --- a/src/stream-tcp-reassemble.c +++ b/src/stream-tcp-reassemble.c @@ -504,7 +504,7 @@ int StreamTcpReassembleDepthReached(Packet *p) /** * \internal * \brief Function to Check the reassembly depth valuer against the - * allowed max depth of the stream reassmbly for TCP streams. + * allowed max depth of the stream reassembly for TCP streams. * * \param stream stream direction * \param seq sequence number where "size" starts @@ -1421,7 +1421,7 @@ static int StreamReassembleRawInline(TcpSession *ssn, const Packet *p, // more trailing data than we need if (before >= (chunk_size - p->payload_len) / 2) { - // also more heading data, devide evenly + // also more heading data, divide evenly before = after = (chunk_size - p->payload_len) / 2; } else { // heading data is less than requested, give the @@ -1640,7 +1640,7 @@ int StreamReassembleRaw(TcpSession *ssn, const Packet *p, StreamReassembleRawFunc Callback, void *cb_data, uint64_t *progress_out, bool respect_inspect_depth) { - /* handle inline seperately as the logic is very different */ + /* handle inline separately as the logic is very different */ if (StreamTcpInlineMode() == TRUE) { return StreamReassembleRawInline(ssn, p, Callback, cb_data, progress_out); } diff --git a/src/stream-tcp.c b/src/stream-tcp.c index ddfeb4951a..ae7a7341a6 100644 --- a/src/stream-tcp.c +++ b/src/stream-tcp.c @@ -1055,7 +1055,7 @@ static int StreamTcpPacketStateNone(ThreadVars *tv, Packet *p, if (TCP_GET_SACKOK(p) == 1) { ssn->flags |= STREAMTCP_FLAG_CLIENT_SACKOK; - SCLogDebug("ssn %p: SACK permited on SYN packet", ssn); + SCLogDebug("ssn %p: SACK permitted on SYN packet", ssn); } if (TCP_HAS_TFO(p)) {