doc: fix typo lenght/length

pull/6779/head
Philippe Antoine 3 years ago committed by Victor Julien
parent 9bea850d53
commit e1c0725e05

@ -23,7 +23,7 @@ alert pkthdr any any -> any any (msg:"SURICATA IPv6 duplicated Hop-By-Hop Option
alert pkthdr any any -> any any (msg:"SURICATA IPv6 duplicated Destination Options extension header"; decode-event:ipv6.exthdr_dupl_dh; classtype:protocol-command-decode; sid:2200018; rev:2;)
alert pkthdr any any -> any any (msg:"SURICATA IPv6 duplicated Authentication Header extension header"; decode-event:ipv6.exthdr_dupl_ah; classtype:protocol-command-decode; sid:2200019; rev:2;)
alert pkthdr any any -> any any (msg:"SURICATA IPv6 duplicate ESP extension header"; decode-event:ipv6.exthdr_dupl_eh; classtype:protocol-command-decode; sid:2200020; rev:2;)
alert pkthdr any any -> any any (msg:"SURICATA IPv6 invalid option lenght in header"; decode-event:ipv6.exthdr_invalid_optlen; classtype:protocol-command-decode; sid:2200021; rev:2;)
alert pkthdr any any -> any any (msg:"SURICATA IPv6 invalid option length in header"; decode-event:ipv6.exthdr_invalid_optlen; classtype:protocol-command-decode; sid:2200021; rev:3;)
alert pkthdr any any -> any any (msg:"SURICATA IPv6 wrong IP version"; decode-event:ipv6.wrong_ip_version; classtype:protocol-command-decode; sid:2200022; rev:2;)
# RFC 4302 states the reserved field should be 0.
alert pkthdr any any -> any any (msg:"SURICATA IPv6 AH reserved field not 0"; decode-event:ipv6.exthdr_ah_res_not_null; classtype:protocol-command-decode; sid:2200081; rev:2;)

@ -191,7 +191,7 @@ mod tests {
let buff:&[u8] = &[
/* message type */ 0x00,
/* length */ 0x00, 0x00, 0x29,
/* data < lenght*/ 0xff, 0x53, 0x4d, 0x42, 0x04, 0x00, 0x00, 0x00,
/* data < length*/ 0xff, 0x53, 0x4d, 0x42, 0x04, 0x00, 0x00, 0x00,
0x00, 0x18, 0x43, 0xc8, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x02, 0x08, 0xbd, 0x20, 0x02, 0x08, 0x06, 0x00,

@ -2022,7 +2022,7 @@ static int SSLv2Decode(uint8_t direction, SSLState *ssl_state,
return -1;
}
/* record_lenghts_length should never be zero */
/* record_lengths_length should never be zero */
if (ssl_state->curr_connp->record_lengths_length == 0) {
SCLogDebug("SSLv2 record lengths length is zero");
SSLSetEvent(ssl_state, TLS_DECODER_EVENT_INVALID_SSLV2_HEADER);

@ -376,7 +376,7 @@ Packet *PacketDefragPktSetup(Packet *parent, const uint8_t *pkt, uint32_t len, u
else
p->root = parent;
/* copy packet and set lenght, proto */
/* copy packet and set length, proto */
if (pkt && len) {
PacketCopyData(p, pkt, len);
}

@ -219,7 +219,7 @@ static int DetectEngineContentInspectionTest09(void) {
/** \test mix in byte_extract */
static int DetectEngineContentInspectionTest10(void) {
TEST_HEADER;
/* extract first byte as lenght field and check with isdataat */
/* extract first byte as length field and check with isdataat */
TEST_RUN("9abcdefghi", 10, "byte_extract:1,0,data_size,string; isdataat:data_size;", true, 2);
TEST_RUN("9abcdefgh", 9, "byte_extract:1,0,data_size,string; isdataat:!data_size;", true, 2);
/* anchor len field to pattern 'x' to test recursion */

@ -54,7 +54,7 @@ void PrintBufferRawLineHex(char *nbuf, int *offset, int max_size, const uint8_t
* Prints in the format "00 AA BB"
*
* \param retbuf pointer to the buffer which will have the result
* \param rebuflen lenght of the buffer
* \param rebuflen length of the buffer
* \param buf buffer to print from
* \param buflen length of the input buffer
*/

Loading…
Cancel
Save