3
0
mirror of https://git.kernel.org/pub/scm/network/wireless/iwd.git synced 2024-11-14 16:09:24 +01:00

treewide: fix typos

This commit is contained in:
Torstein Husebø 2020-01-21 07:21:38 +01:00 committed by Denis Kenzior
parent 2a7c4a9c3d
commit 759dbdd37f
33 changed files with 49 additions and 49 deletions

View File

@ -1,5 +1,5 @@
#! /usr/bin/python3
# Rougly based on wpa_supplicant's mac80211_hwsim/tools/hwsim_test.c utility.
# Roughly based on wpa_supplicant's mac80211_hwsim/tools/hwsim_test.c utility.
import socket
import fcntl
import struct

View File

@ -1,4 +1,4 @@
Access Point hiearchy
Access Point hierarchy
=====================
Service net.connman.iwd

View File

@ -1,4 +1,4 @@
Ad-Hoc hiearchy
Ad-Hoc hierarchy
===============
Service net.connman.iwd

View File

@ -71,7 +71,7 @@ on open networks, by using ECDH to negotiate a PMK.
- IWD supports SAE (Simultaneous Authentication of Equals). SAE is required for
the WPA3 certification. SAE uses a Diffie-Hellman key exchange to produce the
PMK thats used in the 4-way handshake. Support for hybrid WPA3/WPA2 AP's is
PMK that's used in the 4-way handshake. Support for hybrid WPA3/WPA2 AP's is
also implemented, where WPA3 is preferred.
Wireless monitor

View File

@ -49,4 +49,4 @@ Properties string Name [readonly]
Contains the path of the KnownNetwork object
corresponding to this Network. If the network
is not provisioned or has not been connected to
before, the property is ommitted.
before, the property is omitted.

View File

@ -120,7 +120,7 @@ Methods void Scan()
order. The number and distance between requested
threshold values is a compromise between resolution
and the frequency of system wakeups and
context-switches that are going to be occuring to
context-switches that are going to be occurring to
update the client's signal meter. Only one agent
can be registered at any time.

View File

@ -91,7 +91,7 @@ Overall Process
AP.
- Once Message 3 is received from the AP, the STA sanity checks certain
paremeters (Key Replay Counter, ANonce, MIC). The RSN received from the AP
parameters (Key Replay Counter, ANonce, MIC). The RSN received from the AP
is also checked against the one received in Message 3. If everything checks
out, then Message 4 is constructed and sent to the AP.

View File

@ -2994,7 +2994,7 @@ static void print_p2p_status(unsigned int level, const char *label,
{ P2P_STATUS_FAIL_LIMIT_REACHED, "Fail; limit reached" },
{ P2P_STATUS_FAIL_INVALID_PARAMS, "Fail; invalid parameters" },
{ P2P_STATUS_FAIL_UNABLE_TO_ACCOMMODATE_REQUEST, "Fail; unable "
"to accomodate request" },
"to accommodate request" },
{ P2P_STATUS_FAIL_PREV_PROTOCOL_ERROR, "Fail; previous protocol"
" error, or distruptive behavior" },
{ P2P_STATUS_FAIL_NO_COMMON_CHANNELS, "Fail; no common "
@ -3519,7 +3519,7 @@ static void print_p2p_advertised_svc_info(unsigned int level, const char *label,
print_attr(level, "%s:", label);
print_attr(level, "Servce advertisement: ID 0x%08x",
print_attr(level, "Service advertisement: ID 0x%08x",
l_get_le32(bytes + 0));
print_wsc_utf8_string(level + 1, "Service Name",
bytes + 6, bytes[6], 255);
@ -4096,7 +4096,7 @@ static void print_public_action_frame(unsigned int level, const uint8_t *body,
[22] = "HCCA TXOP Advertisement",
[23] = "HCCA TXOP Response",
[24] = "Public Key",
[25] = "Channel Availabilty Query",
[25] = "Channel Availability Query",
[26] = "Channel Schedule Management",
[27] = "Contact Verification Signal",
[28] = "GDD Enablement Request",

View File

@ -148,7 +148,7 @@ struct pcap *pcap_create(const char *pathname)
}
if (len != PCAP_HDR_SIZE) {
fprintf(stderr, "Written PCAP header size mimatch\n");
fprintf(stderr, "Written PCAP header size mismatch\n");
goto failed;
}

View File

@ -51,7 +51,7 @@ static struct hardcoded_sim *sim;
* to - result of XOR array
* a - array 1
* b - array 2
* len - size of aray
* len - size of array
*/
#define XOR(to, a, b, len) \
for (i = 0; i < len; i++) { \

View File

@ -227,7 +227,7 @@ static struct eapol_sm *adhoc_new_sm(struct sta_state *sta, bool authenticator,
handshake_state_set_event_func(hs, adhoc_handshake_event, sta);
handshake_state_set_ssid(hs, (void *)adhoc->ssid, strlen(adhoc->ssid));
/* we dont have the connecting peer rsn info, so just set ap == own */
/* we don't have the connecting peer rsn info, so just set ap == own */
handshake_state_set_authenticator_ie(hs, bss_rsne);
handshake_state_set_supplicant_ie(hs, bss_rsne);
handshake_state_set_pmk(hs, adhoc->pmk, 32);

View File

@ -148,9 +148,9 @@ char **anqp_parse_nai_realms(const unsigned char *anqp, unsigned int len)
/*
* The method list is a variable field, so the only way to
* reliably increment anqp is by realm_len at the very end since
* we dont know how many bytes parse_eap advanced (it does
* we don't know how many bytes parse_eap advanced (it does
* internal length checking so it should not overflow). We
* cant incrementally advance anqp/len, hence the hardcoded
* can't incrementally advance anqp/len, hence the hardcoded
* length and pointer adjustments.
*/

View File

@ -77,7 +77,7 @@ struct mschapv2_response {
} __attribute__((packed));
/**
* Generate the asymetric start keys from our mschapv2 master key for MPPE
* Generate the asymmetric start keys from our mschapv2 master key for MPPE
* This function is specified in:
* https://tools.ietf.org/html/draft-ietf-pppext-mschapv2-keys-02
*

View File

@ -481,7 +481,7 @@ static void eap_pwd_handle_confirm(struct eap_state *eap,
/*
* We just need to store clen/plen once. Since all these buffers are
* created with enough bytes in mind we know these wont fail. Also, all
* created with enough bytes in mind we know these won't fail. Also, all
* scalar/point objects were created with the same curve, so it can be
* safe to assume the return values will not change from what clen/plen
* already are.

View File

@ -467,7 +467,7 @@ static void handle_challenge(struct eap_state *eap, const uint8_t *pkt,
case EAP_SIM_AT_IV:
case EAP_SIM_AT_ENCR_DATA:
case EAP_SIM_AT_MAC:
/* need a case for these so the default wont get hit */
/* need a case for these so the default won't get hit */
break;
default:

View File

@ -401,7 +401,7 @@ static int eap_tls_init_request_assembly(struct eap_state *eap,
len -= 4;
if (!tls_msg_len || tls_msg_len > EAP_TLS_PDU_MAX_LEN) {
l_warn("%s: Fragmented pkt size is outside of alowed"
l_warn("%s: Fragmented pkt size is outside of allowed"
" boundaries [1, %u]", eap_get_method_name(eap),
EAP_TLS_PDU_MAX_LEN);

View File

@ -986,7 +986,7 @@ static void eap_wsc_handle_request(struct eap_state *eap,
wsc->rx_pdu_buf_len >
EAP_WSC_PDU_MAX_LEN) {
l_warn("Fragmented pkt size is outside of "
"alowed boundaries [1, %u]",
"allowed boundaries [1, %u]",
EAP_WSC_PDU_MAX_LEN);
return;
}

View File

@ -296,7 +296,7 @@ static bool erp_derive_emsk_name(const uint8_t *session_id, size_t session_len,
/*
* RFC 6696 - Section 4.1 and 4.3 - rRK and rIK derivation
*
* All reauth keys form a hiearchy, and all ultimately are derived from the
* All reauth keys form a hierarchy, and all ultimately are derived from the
* EMSK. All keys follow the rule:
*
* "The length of the <key> MUST be equal to the length of the parent key used

View File

@ -145,8 +145,8 @@ static bool handshake_state_setup_own_ciphers(struct handshake_state *s,
s->group_management_cipher = info->group_management_cipher;
/*
* Dont set MFP for OSEN otherwise EAPoL will attempt to negotiate a
* iGTK which is not allowe for OSEN.
* Don't set MFP for OSEN otherwise EAPoL will attempt to negotiate a
* iGTK which is not allowed for OSEN.
*/
if (!s->osen_ie)
s->mfp = info->mfpc;

View File

@ -212,7 +212,7 @@ static const uint8_t *hotspot_match_roaming_consortium(
&rc3, &rc3_len) < 0)
return NULL;
/* rc1 is guarenteed to be set if the above returns success */
/* rc1 is guaranteed to be set if the above returns success */
if (rc1_len == config->rc_len && !memcmp(rc1, config->rc, rc1_len)) {
if (rc_len_out)
*rc_len_out = rc1_len;

View File

@ -1585,7 +1585,7 @@ int ie_parse_bss_load_from_data(const uint8_t *data, uint8_t len,
}
/*
* We have to store this mapping since basic rates dont come with a convenient
* We have to store this mapping since basic rates don't come with a convenient
* MCS index. Rates are stored as they are encoded in the Supported Rates IE.
* This does not include non 802.11g data rates, e.g. 1/2/4Mbps. This data was
* taken from 802.11 Section 17.3.10.2 and Table 10-7.
@ -1994,7 +1994,7 @@ static int ie_parse_vht_capability(struct ie_tlv_iter *vht_iter,
* combinations (width, MCS, NSS), saving the highest data rate we find.
*
* We could calculate a maximum data rate separately for TX/RX, but
* since this is only used for BSS ranking, the minumum between the
* since this is only used for BSS ranking, the minimum between the
* two should be good enough.
*/
for (width = sizeof(vht_width_map[0]) - 1; width >= 0; width--) {

View File

@ -275,7 +275,7 @@ static void manager_get_interface_cb(struct l_genl_msg *msg, void *user_data)
return;
if (wiphy != state->id) {
l_debug("Wiphy attribute mis-match, wanted: %u, got %u",
l_debug("Wiphy attribute mismatch, wanted: %u, got %u",
state->id, wiphy);
return;
}
@ -515,7 +515,7 @@ static void manager_new_wiphy_event(struct l_genl_msg *msg)
/*
* Until fixed, a NEW_WIPHY event will not include all the information
* that may be available, but a dump will. Because of this we do both
* GET_WIPHY/GET_INTERFACE, same as we would during initalization.
* GET_WIPHY/GET_INTERFACE, same as we would during initialization.
*/
msg = l_genl_msg_new_sized(NL80211_CMD_GET_WIPHY, 128);
l_genl_msg_append_attr(msg, NL80211_ATTR_SPLIT_WIPHY_DUMP, 0, NULL);

View File

@ -227,7 +227,7 @@ struct handshake_state *netdev_handshake_state_new(struct netdev *netdev)
nhs->netdev = netdev;
/*
* Since GTK/IGTK are optional (NO_GROUP_TRAFFIC), we set them as
* 'installed' upon initalization. If/When the gtk/igtk callback is
* 'installed' upon initialization. If/When the gtk/igtk callback is
* called they will get set to false until we have received a successful
* callback from nl80211. From these callbacks we can check that all
* the keys have been installed, and only then trigger the handshake
@ -1536,7 +1536,7 @@ static void netdev_qos_map_cb(struct l_genl_msg *msg, void *user_data)
* to let the kernel know is to receive the IE, then give it right back...
*
* The kernel/driver/firmware *could* simply obtain this information as the
* frame comes in and not require userspace to forward it back... but thats a
* frame comes in and not require userspace to forward it back... but that's a
* battle for another day.
*/
static void netdev_send_qos_map_set(struct netdev *netdev,
@ -2401,7 +2401,7 @@ static int netdev_connect_common(struct netdev *netdev,
netdev->handshake = hs;
netdev->sm = sm;
netdev->frequency = bss->frequency;
netdev->cur_rssi_low = false; /* Gets udpated on the 1st CQM event */
netdev->cur_rssi_low = false; /* Gets updated on the 1st CQM event */
netdev->cur_rssi = bss->signal_strength / 100;
netdev_rssi_level_init(netdev);

View File

@ -87,7 +87,7 @@ typedef void (*netdev_connect_cb_t)(struct netdev *netdev,
* Notify function for netdev events. Depending on the event type, event_data
* will have different meanings:
*
* NETDEV_EVENT_AUTHENTICATING - unsused
* NETDEV_EVENT_AUTHENTICATING - unused
* NETDEV_EVENT_ASSOCIATING - unused
* NETDEV_EVENT_LOST_BEACON - unused
* NETDEV_EVENT_DISCONNECT_BY_AP - MMPDU_REASON_CODE

View File

@ -552,7 +552,7 @@ int network_autoconnect(struct network *network, struct scan_bss *bss)
if (!wiphy_select_cipher(wiphy, rsn.pairwise_ciphers) ||
!wiphy_select_cipher(wiphy, rsn.group_cipher)) {
l_debug("Cipher mis-match");
l_debug("Cipher mismatch");
ret = -ENETUNREACH;
goto close_settings;
}

View File

@ -354,7 +354,7 @@ static bool sae_build_commit(struct sae_sm *sm, const uint8_t *addr1,
/*
* Several cases require retransmitting the same commit message. The
* anti-clogging code path requires this as well as the retransmition
* anti-clogging code path requires this as well as the retransmission
* timeout.
*/
old_commit:

View File

@ -879,7 +879,7 @@ static bool scan_parse_vendor_specific(struct scan_bss *bss, const void *data,
/*
* Fully parses the Advertisement Protocol Element. The only thing being looked
* for is the ANQP protocol ID, but this could be burried behind several other
* for is the ANQP protocol ID, but this could be buried behind several other
* advertisement tuples so the entire IE may need to be parsed.
*/
static bool scan_parse_advertisement_protocol(struct scan_bss *bss,

View File

@ -678,7 +678,7 @@ static void station_handshake_event(struct handshake_state *hs,
case HANDSHAKE_EVENT_SETTING_KEYS_FAILED:
case HANDSHAKE_EVENT_EAP_NOTIFY:
/*
* currently we dont care about any other events. The
* currently we don't care about any other events. The
* netdev_connect_cb will notify us when the connection is
* complete.
*/
@ -2068,7 +2068,7 @@ void station_ap_directed_roam(struct station *station,
if (req_mode & WNM_REQUEST_MODE_PREFERRED_CANDIDATE_LIST) {
l_debug("roam: AP sent a preffered candidate list");
l_debug("roam: AP sent a preferred candidate list");
station_neighbor_report_cb(station->netdev, 0, body + pos,
body_len - pos,station);
} else {
@ -2162,7 +2162,7 @@ static bool station_retry_with_reason(struct station *station,
uint16_t reason_code)
{
/*
* We dont want to cause a retry and blacklist if the password was
* We don't want to cause a retry and blacklist if the password was
* incorrect. Otherwise we would just continue to fail.
*
* Other reason codes can be added here if its decided we want to

View File

@ -90,7 +90,7 @@ static struct l_dbus_message *wsc_error_walk_time_expired(
return l_dbus_message_new_error(msg,
IWD_WSC_INTERFACE ".WalkTimeExpired",
"No APs in PushButton mode found in "
"the alloted time");
"the allotted time");
}
static struct l_dbus_message *wsc_error_time_expired(struct l_dbus_message *msg)
@ -98,7 +98,7 @@ static struct l_dbus_message *wsc_error_time_expired(struct l_dbus_message *msg)
return l_dbus_message_new_error(msg,
IWD_WSC_INTERFACE ".TimeExpired",
"No APs in PIN mode found in "
"the alloted time");
"the allotted time");
}
static void wsc_enrollee_connect_cb(struct netdev *netdev,

View File

@ -1353,7 +1353,7 @@ static bool interface_info_match_dst(const void *a, const void *b)
/*
* Process frames in a similar way to how the kernel built-in hwsim medium
* does this, with an additional optimization for unicast frames and
* additonal modifications to frames decided by user-configurable rules.
* additional modifications to frames decided by user-configurable rules.
*/
static void process_frame(struct hwsim_frame *frame)
{

View File

@ -149,8 +149,8 @@ int main(int argc, char *argv[])
l_test_add("/cmac-aes/Example 1", cmac_test, &example_1);
l_test_add("/cmac-aes/Example 2", cmac_test, &example_2);
l_test_add("/cmac-aes/Exmaple 3", cmac_test, &example_3);
l_test_add("/cmac-aes/Exmaple 4", cmac_test, &example_4);
l_test_add("/cmac-aes/Example 3", cmac_test, &example_3);
l_test_add("/cmac-aes/Example 4", cmac_test, &example_4);
done:
return l_test_run();

View File

@ -78,7 +78,7 @@ static const unsigned char beacon_frame[] = {
0xff, 0xff, 0xc8, 0xd7, 0x19, 0x39, 0xbe, 0x77,
0xc8, 0xd7, 0x19, 0x39, 0xbe, 0x77, 0x50, 0xa2,
/* IEEE 802.11 wireless LAN managment frame
/* IEEE 802.11 wireless LAN management frame
* - Fixed parameters (12 bytes)
*/
0x87, 0x81, 0x31, 0xe6, 0x29, 0x02, 0x00, 0x00,
@ -742,11 +742,11 @@ int main(int argc, char *argv[])
ie_test_wpa_build_compact_info,
&ie_wpa_info_test_5);
l_test_add("/ie/Concatentation/WSC/Test Case 1",
l_test_add("/ie/Concatenation/WSC/Test Case 1",
ie_test_concat_wsc, &ie_tlv_concat_test_data_1);
l_test_add("/ie/Concatentation/WSC/Test Case 2",
l_test_add("/ie/Concatenation/WSC/Test Case 2",
ie_test_concat_wsc, &ie_tlv_concat_test_data_2);
l_test_add("/ie/Concatentation/WSC/Test Case 3",
l_test_add("/ie/Concatenation/WSC/Test Case 3",
ie_test_concat_wsc, &ie_tlv_concat_test_data_3);
l_test_add("/ie/Encapsulation/WSC/Test Case 1",

View File

@ -369,7 +369,7 @@ static void test_malformed_commit(const void *arg)
len = setup_auth_frame(frame, aa, 1, 0, aa_commit, sizeof(aa_commit));
/* dont send entire commit */
/* don't send entire commit */
assert(auth_proto_rx_authenticate(ap, (uint8_t *)frame, len - 20) != 0);
test_destruct(td);
@ -394,7 +394,7 @@ static void test_malformed_confirm(const void *arg)
frame = alloca(sizeof(struct authenticate_frame) + sizeof(aa_confirm));
len = setup_auth_frame(frame, aa, 2, 0, aa_confirm, sizeof(aa_confirm));
/* dont send entire confirm */
/* don't send entire confirm */
assert(auth_proto_rx_authenticate(ap, (uint8_t *)frame, len - 10) != 0);
test_destruct(td);