From d65285ab8feb1f7c23b5b42712996493b400a73a Mon Sep 17 00:00:00 2001 From: Yegor Yefremov Date: Tue, 1 Feb 2022 09:31:44 +0100 Subject: [PATCH] src/drivers: Fix typos Fix typos found with codespell utility. Signed-off-by: Yegor Yefremov --- src/drivers/driver.h | 8 ++++---- src/drivers/driver_macsec_qca.c | 2 +- src/drivers/driver_nl80211_capa.c | 2 +- src/drivers/driver_nl80211_event.c | 3 ++- src/drivers/ndis_events.c | 5 +++-- 5 files changed, 11 insertions(+), 9 deletions(-) diff --git a/src/drivers/driver.h b/src/drivers/driver.h index e3b4262b5..4b86d8fc6 100644 --- a/src/drivers/driver.h +++ b/src/drivers/driver.h @@ -1036,7 +1036,7 @@ struct wpa_driver_associate_params { * * If the driver needs to do special configuration for WPS association, * this variable provides more information on what type of association - * is being requested. Most drivers should not need ot use this. + * is being requested. Most drivers should not need to use this. */ enum wps_mode wps; @@ -1775,7 +1775,7 @@ enum wpa_driver_if_type { WPA_IF_P2P_GROUP, /** - * WPA_IF_P2P_DEVICE - P2P Device interface is used to indentify the + * WPA_IF_P2P_DEVICE - P2P Device interface is used to identify the * abstracted P2P Device function in the driver */ WPA_IF_P2P_DEVICE, @@ -2603,7 +2603,7 @@ struct wpa_driver_ops { * some drivers may expect them in different order than wpa_supplicant * is using. If the TX/RX keys are swapped, all TKIP encrypted packets * will trigger Michael MIC errors. This can be fixed by changing the - * order of MIC keys by swapping te bytes 16..23 and 24..31 of the key + * order of MIC keys by swapping the bytes 16..23 and 24..31 of the key * in driver_*.c set_key() implementation, see driver_ndis.c for an * example on how this can be done. */ @@ -4612,7 +4612,7 @@ enum wpa_event_type { * This event must be delivered when a Michael MIC error is detected by * the local driver. Additional data for event processing is * provided with union wpa_event_data::michael_mic_failure. This - * information is used to request new encyption key and to initiate + * information is used to request new encryption key and to initiate * TKIP countermeasures if needed. */ EVENT_MICHAEL_MIC_FAILURE, diff --git a/src/drivers/driver_macsec_qca.c b/src/drivers/driver_macsec_qca.c index 54964f37e..eccaf6375 100644 --- a/src/drivers/driver_macsec_qca.c +++ b/src/drivers/driver_macsec_qca.c @@ -861,7 +861,7 @@ static int macsec_qca_get_available_transmit_sc(void *priv, u32 *channel) } } - wpa_printf(MSG_DEBUG, "%s: no avaiable channel", __func__); + wpa_printf(MSG_DEBUG, "%s: no available channel", __func__); return -1; } diff --git a/src/drivers/driver_nl80211_capa.c b/src/drivers/driver_nl80211_capa.c index 47765fe40..3a42706ec 100644 --- a/src/drivers/driver_nl80211_capa.c +++ b/src/drivers/driver_nl80211_capa.c @@ -1341,7 +1341,7 @@ int wpa_driver_nl80211_capa(struct wpa_driver_nl80211_data *drv) drv->has_capability = 1; drv->has_driver_key_mgmt = info.has_key_mgmt | info.has_key_mgmt_iftype; - /* Fallback to hardcoded defaults if the driver does nott advertize any + /* Fallback to hardcoded defaults if the driver does not advertise any * AKM capabilities. */ if (!drv->has_driver_key_mgmt) { drv->capa.key_mgmt = WPA_DRIVER_CAPA_KEY_MGMT_WPA | diff --git a/src/drivers/driver_nl80211_event.c b/src/drivers/driver_nl80211_event.c index b06320049..085acb85a 100644 --- a/src/drivers/driver_nl80211_event.c +++ b/src/drivers/driver_nl80211_event.c @@ -2831,7 +2831,8 @@ static void nl80211_control_port_frame(struct wpa_driver_nl80211_data *drv, nla_len(tb[NL80211_ATTR_FRAME])); break; default: - wpa_printf(MSG_INFO, "nl80211: Unxpected ethertype 0x%04x from " + wpa_printf(MSG_INFO, + "nl80211: Unexpected ethertype 0x%04x from " MACSTR " over control port", ethertype, MAC2STR(src_addr)); break; diff --git a/src/drivers/ndis_events.c b/src/drivers/ndis_events.c index 93673a363..4d4ec81d9 100644 --- a/src/drivers/ndis_events.c +++ b/src/drivers/ndis_events.c @@ -372,8 +372,9 @@ ndis_events_indicate(IWbemObjectSink *this, long lObjectCount, L"MSNdis_NotifyAdapterRemoval") == 0) { ndis_events_adapter_removal(events); } else { - wpa_printf(MSG_DEBUG, "Unepected event - __CLASS: " - "'%S'", vtClass.bstrVal); + wpa_printf(MSG_DEBUG, + "Unexpected event - __CLASS: '%S'", + vtClass.bstrVal); } VariantClear(&vtClass); -- 2.47.2