From John Bradshaw:
authorAnders Broman <anders.broman@ericsson.com>
Thu, 1 Sep 2011 04:35:57 +0000 (04:35 -0000)
committerAnders Broman <anders.broman@ericsson.com>
Thu, 1 Sep 2011 04:35:57 +0000 (04:35 -0000)
Spelling fixes
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6296

svn path=/trunk/; revision=38834

13 files changed:
CPackConfig.txt
README
README.DECT
README.bsd
README.cmake
README.hpux
airpcap.h
diameter/Cisco.xml
diameter/chargecontrol.xml
diameter/dictionary.xml
diameter/etsie2e4.xml
docbook/wsluarm.xml
docbook/wsug_src/WSUG_chapter_introduction.xml

index 8bdab476ab645f729ea785790e68540ee156810c..4dba6f890b1221f16cf1baec2328d50849d6504a 100644 (file)
@@ -38,7 +38,7 @@ set(CPACK_STRIP_FILES true)
 
 set(CPACK_SOURCE_PACKAGE_FILE_NAME "${CPACK_PACKAGE_NAME}-${CPACK_PACKAGE_VERSION}")
 set(CPACK_PACKAGE_INSTALL_DIRECTORY "/usr")
-# Win:        NSIS, ZIP, SORUCE_ZIP, CYGWIN_BINARY, SOURCE_CYGWIN,
+# Win:        NSIS, ZIP, SOURCE_ZIP, CYGWIN_BINARY, SOURCE_CYGWIN,
 # Linux/Unix: DEB, RPM, STGZ, TBZ2, TZ, SOURCE_TZ, SOURCE_TGZ
 # OSX:        PACKAGEMAKER, OSXX11
 # Syntax: "Type1;Type2;Type3"
diff --git a/README b/README
index 18dc04e0ea0f14888d97b6306eb5073cb5bc925b..c5a3962004a1654972538c234c50008648ceb2bc 100644 (file)
--- a/README
+++ b/README
@@ -106,7 +106,7 @@ Network General/Network Associates DOS-based Sniffer (compressed and
     uncompressed)
 Microsoft Network Monitor
 AIX's iptrace
-Cinco Networks NetXRray
+Cinco Networks NetXray
 Network Associates Windows-based Sniffer
 AG Group/WildPackets EtherPeek/TokenPeek/AiroPeek/EtherHelp
 RADCOM's WAN/LAN Analyzer
@@ -114,7 +114,7 @@ Lucent/Ascend access products
 HP-UX's nettl
 Toshiba's ISDN routers
 ISDN4BSD "i4btrace" utility
-Cisco Secure Intrustion Detection System iplogging facility
+Cisco Secure Intrusion Detection System iplogging facility
 pppd logs (pppdump-format files)
 VMS's TCPIPtrace utility
 DBS Etherwatch for VMS
index 1bde60573d495a807acbe80898f41c58c859a5fd..5565254c901886212f8059337388f91a1a8ba826 100644 (file)
@@ -2,11 +2,11 @@ $Id$
 
 Description:
 ============
-DECT pcap files can be obtained by using tools coming with the linux
+DECT pcap files can be obtained by using tools included with the linux
 kernel driver for the Dosch-and-Amand COM-ON-AIR cards. The driver is
 called com-on-air_cs.
 
-Wireshark itself cannot directy record from the DECT HW, as the driver
+Wireshark cannot directly record from the DECT HW, as the driver
 currently lacks a virtual network interface.
 
 There is ongoing work to change this (see this work by Patrick McHardy):
index 56a8829dec30390160b961155040099602f31595..6145aa7142c13a8acccdd4fe1ccae6a6db184b28 100644 (file)
@@ -83,7 +83,7 @@ FreeBSD 6.0 and later this can be done by creating an /etc/devfs.rules
 file with content such as
 
        [localrules=10]
-       add path 'bpf*' {mode and permissons}
+       add path 'bpf*' {mode and permissions}
 
 where "mode and permissions" can include clauses such as
 
index e085ce33d7310b21a55533399e27afc543449a80..e6acb46469a13f3f77171757c349012537b85247 100644 (file)
@@ -108,7 +108,7 @@ About cmake in general and why KDE4 uses it
 Introductory/tutorial presentation
        http://ait.web.psi.ch/services/linux/hpc/hpc_user_cookbook/tools/cmake/docs/Cmake_VM_2007.pdf
 
-Introductory arcticle in Linux Journal
+Introductory article in Linux Journal
        http://www.linuxjournal.com/node/6700/print
 
 Useful variables
index 9e603572d63104d447f4e8c800fe256d0ee3aa51..e3b3a8aa01e48ef6794060124b988c22ea8f0d69 100644 (file)
@@ -253,11 +253,11 @@ promiscuous mode support.
 
 An additional note, from Jost Martin, for HP-UX 10.20:
 
-       Q: How do I get ethereral on HPUX to capture the _outgoing_ packets
+       Q: How do I get wireshark on HPUX to capture the _outgoing_ packets
           of an interface
        A: You need to get PHNE_20892,PHNE_20725 and PHCO_10947 (or
           newer, this is as of 4.4.00) and its dependencies.  Then you can
-          enable the feature as descibed below:
+          enable the feature as described below:
 
        Patch Name: PHNE_20892
        Patch Description: s700 10.20 PCI 100Base-T cumulative patch
index 7d90031ae7033a3533dfc3a9c72b7ec56230b37f..f872565e84e89ffd04c021365495fcb78fa19179 100644 (file)
--- a/airpcap.h
+++ b/airpcap.h
@@ -138,7 +138,7 @@ typedef enum _AirpcapValidationType
 {
     AIRPCAP_VT_ACCEPT_EVERYTHING = 1,          ///< Accept all the frames the device captures
     AIRPCAP_VT_ACCEPT_CORRECT_FRAMES = 2,      ///< Accept correct frames only, i.e. frames with correct Frame Check Sequence (FCS).
-    AIRPCAP_VT_ACCEPT_CORRUPT_FRAMES = 3,      ///< Accept corrupt frames only, i.e. frames with worng Frame Check Sequence (FCS).
+    AIRPCAP_VT_ACCEPT_CORRUPT_FRAMES = 3,      ///< Accept corrupt frames only, i.e. frames with wrong Frame Check Sequence (FCS).
        AIRPCAP_VT_UNKNOWN = 4                                  ///< Unknown validation type. You should see it only in case of error.
 }AirpcapValidationType, *PAirpcapValidationType;
 
@@ -193,7 +193,7 @@ typedef struct _AirpcapKeysCollection
 /*!
   \brief Packet header.
 
-  This structure defines the BPF that preceeds every packet delivered to the application.
+  This structure defines the BPF that precedes every packet delivered to the application.
 */
 typedef struct _AirpcapBpfHeader
 {
@@ -380,7 +380,7 @@ void AirpcapClose(PAirpcapHandle AdapterHandle);
 
   The main reason to turn monitor mode off is that, when not in monitor mode, the adapter will acknowledge the
   data frames sent to its address. This is useful when the adapter needs to interact with other devices on the
-  802.11 network, bacause handling the ACKs in software is too slow.
+  802.11 network, because handling the ACKs in software is too slow.
 
   \note When an adapter is plugged into the system, it's always configured with monitor mode ON. The monitor mode
         configuration is not stored persistently, so if you want to turn monitor mode off, you will need to do it
@@ -417,7 +417,7 @@ gboolean AirpcapGetMonitorMode(PAirpcapHandle AdapterHandle, gboolean * PMonitor
   the developer's pack can be used as a reference on how to decode 802.11 frames with radiotap headers.
   - \ref AIRPCAP_LT_802_11_PLUS_PPI, to capture 802.11 frames (including control frames) with a Per Packet Information (PPI)
        header that contains per-packet meta information like channel and power information. More details on the PPI header can
-       be founf in the PPI online documentation (TODO).
+       be found in the PPI online documentation (TODO).
 */
 gboolean AirpcapSetLinkType(PAirpcapHandle AdapterHandle, AirpcapLinkType NewLinkType);
 
@@ -460,7 +460,7 @@ gboolean AirpcapSetFcsPresence(PAirpcapHandle AdapterHandle, gboolean IsFcsPrese
   \param PIsFcsPresent User-provided variable that will be set to true if the adapter is including the FCS.
   \return TRUE if the operation is successful. FALSE otherwise.
 
-  In the default configuration, the adatper has FCS inclusion turned on. The MAC Frame Check Sequence is 4 bytes
+  In the default configuration, the adapter has FCS inclusion turned on. The MAC Frame Check Sequence is 4 bytes
   and is located at the end of the 802.11 packet, with both AIRPCAP_LT_802_11 and AIRPCAP_LT_802_11_PLUS_RADIO
   link types.
   When the FCS inclusion is turned on, and if the link type is AIRPCAP_LT_802_11_PLUS_RADIO, the radiotap header
@@ -483,7 +483,7 @@ gboolean AirpcapSetFcsValidation(PAirpcapHandle AdapterHandle, AirpcapValidation
   \brief Checks if the specified adapter is configured to capture frames with incorrect an incorrect Frame Check Sequence (FCS).
   \param AdapterHandle Handle to the adapter.
   \param ValidationType Pointer to a user supplied variable that will contain the type of validation the driver will perform. See the documentation of \ref AirpcapValidationType for details.
-  \return TRUE if the operation is succesful. FALSE otherwise.
+  \return TRUE if the operation is successful. FALSE otherwise.
 
   \note By default, the driver is configured in \ref AIRPCAP_VT_ACCEPT_EVERYTHING mode.
 */
@@ -518,7 +518,7 @@ gboolean AirpcapSetDeviceKeys(PAirpcapHandle AdapterHandle, PAirpcapKeysCollecti
   \param KeysCollection User-allocated PAirpcapKeysCollection structure that will be filled with the keys.
   \param PKeysCollectionSize \b IN: pointer to a user-allocated variable that contains the length of the KeysCollection structure, in bytes.
                                                \b OUT: amount of data moved by the driver in the buffer pointed by KeysBuffer, in bytes.
-  \return TRUE if the operation is succesful. If an error occurs, the return value is FALSE and KeysCollectionSize is zero.
+  \return TRUE if the operation is successful. If an error occurs, the return value is FALSE and KeysCollectionSize is zero.
   If the provided buffer is too small to contain the keys, the return value is FALSE and KeysCollectionSize contains the
   needed KeysCollection length, in bytes. If the device doesn't have any decryption key configured, the return value is TRUE, and
   KeysCollectionSize will be zero.
@@ -567,7 +567,7 @@ gboolean AirpcapSetDriverKeys(PAirpcapHandle AdapterHandle, PAirpcapKeysCollecti
   \param KeysCollection User-allocated PAirpcapKeysCollection structure that will be filled with the keys.
   \param PKeysCollectionSize \b IN: pointer to a user-allocated variable that contains the length of the KeysCollection structure, in bytes.
                                                \b OUT: amount of data moved by the driver in the buffer pointed by KeysBuffer, in bytes.
-  \return TRUE if the operation is succesful. If an error occurs, the return value is FALSE and KeysCollectionSize is zero.
+  \return TRUE if the operation is successful. If an error occurs, the return value is FALSE and KeysCollectionSize is zero.
   If the provided buffer is too small to contain the keys, the return value is FALSE and KeysCollectionSize contains the
   needed KeysCollection length, in bytes. If the device doesn't have any decryption key configured, the return value is TRUE, and
   KeysCollectionSize will be zero.
@@ -598,7 +598,7 @@ gboolean AirpcapSetDecryptionState(PAirpcapHandle AdapterHandle, AirpcapDecrypti
   \brief Tells if this open instance is configured to perform the decryption of the incoming frames with the <b>adapter-specific</b> keys.
   \param AdapterHandle Handle to the adapter.
   \param PEnable Pointer to a user supplied variable that will contain the decryption configuration. See \ref PAirpcapDecryptionState for details.
-  \return TRUE if the operation is succesful. FALSE otherwise.
+  \return TRUE if the operation is successful. FALSE otherwise.
 
   The adapter-specific decryption keys can be configured with the \ref AirpcapSetDeviceKeys() function.
   \note By default, the driver is configured with \ref AIRPCAP_DECRYPTION_ON.
@@ -665,7 +665,7 @@ gboolean AirpcapGetDeviceChannel(PAirpcapHandle AdapterHandle, guint * PChannel)
   application is busy, at the cost of higher kernel memory usage.
 
   \note don't use this function unless you know what you are doing. Due to caching issues and bigger non-paged
-  memory consumption, bigger buffer sizes can decrease the capture performace instead of improving it.
+  memory consumption, bigger buffer sizes can decrease the capture performance instead of improving it.
 */
 gboolean AirpcapSetKernelBuffer(PAirpcapHandle AdapterHandle, guint BufferSize);
 
@@ -729,7 +729,7 @@ gboolean AirpcapStoreCurConfigAsAdapterDefault(PAirpcapHandle AdapterHandle);
   \return TRUE on success.
 
   The AirPcap driver is able to perform kernel-level filtering using the standard BPF pseudo-machine format. You can read
-  the WinPcap documentation at http://www.winpcap.org/devel.htm for more details on the BPF filtering mechaism.
+  the WinPcap documentation at http://www.winpcap.org/devel.htm for more details on the BPF filtering mechanism.
 
   A filter can be automatically created by using the pcap_compile() function of the WinPcap API. This function
   converts a human readable text expression with the tcpdump/libpcap syntax into a BPF program.
index 693ebd0bf01ba9412bce4a184100ed33f48af968..765973da35fcf67171672a8d64bc192fa504eb98 100644 (file)
@@ -9,7 +9,7 @@
 
     </avp>
 
-    <!--Cisco-Charging-Rule-Defination-->
+    <!--Cisco-Charging-Rule-Definition-->
 
                <avp name="Cisco-Charging-Rule-Definition" code="131072" vendor-id="Cisco" mandatory="must" may-encrypt="yes" protected="mustnot" vendor-bit="must">
                        <grouped>
                
                <avp name="Billing-Plan-Install" code="131187" vendor-id="Cisco" mandatory="must" protected="mustnot" may-encrypt="yes" vendor-bit="must">
                        <grouped>
-                               <gavp name="Billing-Plan-Defination"/>  
+                               <gavp name="Billing-Plan-Definition"/>  
 
 
                        </grouped>
index 4d4879b58331f131d5acee323c18e4f376e7eaa7..f03233b5e3721af5af5945dd058556b15708b2a0 100644 (file)
                                <gavp name="CC-Time"/>
                                <gavp name="CC-Money"/>
                                <gavp name="CC-Total-Octets"/>
-                               <gavp name="CC-Imput-Octets"/>
+                               <gavp name="CC-Input-Octets"/>
                                <gavp name="CC-output-Octets"/>
                                <gavp name="CC-Service-Specific-Units"/>
                        </grouped>
                                <gavp name="CC-Time"/>
                                <gavp name="CC-Money"/>
                                <gavp name="CC-Total-Octets"/>
-                               <gavp name="CC-Imput-Octets"/>
+                               <gavp name="CC-Input-Octets"/>
                                <gavp name="CC-output-Octets"/>
                                <gavp name="CC-Service-Specific-Units"/>
                        </grouped>
                                <gavp name="CC-Time"/>
                                <gavp name="CC-Money"/>
                                <gavp name="CC-Total-Octets"/>
-                               <gavp name="CC-Imput-Octets"/>
+                               <gavp name="CC-Input-Octets"/>
                                <gavp name="CC-output-Octets"/>
                                <gavp name="CC-Service-Specific-Units"/>
                        </grouped>
index 0634ff89a9d813a0a6d080dbcc265766c89e40e2..887edb432438d47513912545748a5a99edb412fd 100644 (file)
@@ -56,7 +56,7 @@
   -->
                <!-- *********************** Commands ***************************** -->
                <!-- Diameter Base Protocol Command Codes -->
-               <!-- 0-255 RADIUS compatability codes [http://www.iana.org/assignments/radius-types] -->
+               <!-- 0-255 RADIUS compatibility codes [http://www.iana.org/assignments/radius-types] -->
                <!--256 Unassigned -->
                <command name="Capabilities-Exchange"         code="257" vendor-id="None"/>
                <command name="Re-Auth"                       code="258" vendor-id="None"/>
                        <type type-name="OctetString"/>
                </avp>
 
-<!-- AVP:s 411 - 461 Belongs to Carge Control and is defined in chargecontrol.xml
+<!-- AVP:s 411 - 461 Belongs to Charge Control and is defined in chargecontrol.xml
 411 CC-Correlation-Id [RFC4006]
 412 CC-Input-Octets [RFC4006]
 413 CC-Money [RFC4006]
@@ -2573,75 +2573,75 @@ Note: The AVP codes from 320 to 399 are reserved for TS 29.234
                        <enum name="Private identity not requested" code="1"/>
                </avp>
                <avp name="GBA-Push-Info" code="417" vendor-bit="must" may-encrypt="no" vendor-id="TGPP">
-                       <type type-name="OctectString"/>
+                       <type type-name="OctetString"/>
                </avp>
                <avp name="NAF-SA-Identifier" code="418" vendor-bit="must" may-encrypt="no" vendor-id="TGPP">
-                       <type type-name="OctectString"/>
+                       <type type-name="OctetString"/>
                </avp>
                <avp name="Security-Feature-Request" code="419" vendor-bit="must" may-encrypt="no" vendor-id="TGPP">
-                       <type type-name="OctectString"/>
+                       <type type-name="OctetString"/>
                </avp>
                <avp name="Security-Feature-Response" code="420" vendor-bit="must" may-encrypt="no" vendor-id="TGPP">
-                       <type type-name="OctectString"/>
+                       <type type-name="OctetString"/>
                </avp>
 <!-- Note: The AVP codes from 421 to 499 are reserved for TS 29.109
 
                <avp name="Reserved for TS 29.109" code="421" vendor-bit="must" may-encrypt="no" vendor-id="TGPP">
-                       <type type-name="OctectString"/>
+                       <type type-name="OctetString"/>
                </avp>
                <avp name="Reserved for TS 29.109" code="422" vendor-bit="must" may-encrypt="no" vendor-id="TGPP">
-                       <type type-name="OctectString"/>
+                       <type type-name="OctetString"/>
                </avp>
                <avp name="Reserved for TS 29.109" code="423" vendor-bit="must" may-encrypt="no" vendor-id="TGPP">
-                       <type type-name="OctectString"/>
+                       <type type-name="OctetString"/>
                </avp>
                <avp name="Reserved for TS 29.109" code="424" vendor-bit="must" may-encrypt="no" vendor-id="TGPP">
-                       <type type-name="OctectString"/>
+                       <type type-name="OctetString"/>
                </avp>
                <avp name="Reserved for TS 29.109" code="425" vendor-bit="must" may-encrypt="no" vendor-id="TGPP">
-                       <type type-name="OctectString"/>
+                       <type type-name="OctetString"/>
                </avp>
                <avp name="Reserved for TS 29.109" code="426" vendor-bit="must" may-encrypt="no" vendor-id="TGPP">
-                       <type type-name="OctectString"/>
+                       <type type-name="OctetString"/>
                </avp>
                <avp name="Reserved for TS 29.109" code="427" vendor-bit="must" may-encrypt="no" vendor-id="TGPP">
-                       <type type-name="OctectString"/>
+                       <type type-name="OctetString"/>
                </avp>
                <avp name="Reserved for TS 29.109" code="428" vendor-bit="must" may-encrypt="no" vendor-id="TGPP">
-                       <type type-name="OctectString"/>
+                       <type type-name="OctetString"/>
                </avp>
                <avp name="Reserved for TS 29.109" code="429" vendor-bit="must" may-encrypt="no" vendor-id="TGPP">
-                       <type type-name="OctectString"/>
+                       <type type-name="OctetString"/>
                </avp>
                <avp name="Reserved for TS 29.109" code="430" vendor-bit="must" may-encrypt="no" vendor-id="TGPP">
-                       <type type-name="OctectString"/>
+                       <type type-name="OctetString"/>
                </avp>
                <avp name="Reserved for TS 29.109" code="431" vendor-bit="must" may-encrypt="no" vendor-id="TGPP">
-                       <type type-name="OctectString"/>
+                       <type type-name="OctetString"/>
                </avp>
                <avp name="Reserved for TS 29.109" code="432" vendor-bit="must" may-encrypt="no" vendor-id="TGPP">
-                       <type type-name="OctectString"/>
+                       <type type-name="OctetString"/>
                </avp>
                <avp name="Reserved for TS 29.109" code="433" vendor-bit="must" may-encrypt="no" vendor-id="TGPP">
-                       <type type-name="OctectString"/>
+                       <type type-name="OctetString"/>
                </avp>
                <avp name="Reserved for TS 29.109" code="434" vendor-bit="must" may-encrypt="no" vendor-id="TGPP">
-                       <type type-name="OctectString"/>
+                       <type type-name="OctetString"/>
                </avp>
                <avp name="Reserved for TS 29.109" code="435" vendor-bit="must" may-encrypt="no" vendor-id="TGPP">
-                       <type type-name="OctectString"/>
+                       <type type-name="OctetString"/>
                </avp>
                <avp name="Reserved for TS 29.109" code="436" vendor-bit="must" may-encrypt="no" vendor-id="TGPP">
-                       <type type-name="OctectString"/>
+                       <type type-name="OctetString"/>
                </avp>
                <avp name="Reserved for TS 29.109" code="437" vendor-bit="must" may-encrypt="no" vendor-id="TGPP">
-                       <type type-name="OctectString"/>
+                       <type type-name="OctetString"/>
                </avp>
                <avp name="Reserved for TS 29.109" code="438" vendor-bit="must" may-encrypt="no" vendor-id="TGPP">
-                       <type type-name="OctectString"/>
+                       <type type-name="OctetString"/>
                </avp>
                <avp name="Reserved for TS 29.109" code="439" vendor-bit="must" may-encrypt="no" vendor-id="TGPP">
-                       <type type-name="OctectString"/>
+                       <type type-name="OctetString"/>
                </avp>
 29.109 [7]
 Note: The AVP codes from 421 to 499 are reserved for TS 29.109
@@ -3261,7 +3261,7 @@ Note: The AVP codes from 800 to 822 are reserved for TS 32.299.
                        <enum name="Other" code="6"/>
                </avp>
                <avp name="TMGI" code="900" mandatory="must" may-encrypt="no" protected="mustnot" vendor-bit="must" vendor-id="TGPP">
-                       <type type-name="OctectString"/>
+                       <type type-name="OctetString"/>
                </avp>
                <avp name="Required-MBMS-Bearer-Capabilities" code="901" mandatory="must" may-encrypt="no" protected="mustnot" vendor-bit="must" vendor-id="TGPP">
                        <type type-name="UTF8String"/>
@@ -3273,7 +3273,7 @@ Note: The AVP codes from 800 to 822 are reserved for TS 32.299.
                        <enum name="UPDATE" code="2"/>
                </avp>
                <avp name="MBMS-Service-Area" code="903" mandatory="must" may-encrypt="no" protected="mustnot" vendor-bit="must" vendor-id="TGPP">
-                       <type type-name="OctectString"/>
+                       <type type-name="OctetString"/>
                </avp>
                <avp name="MBMS-Session-Duration" code="904" mandatory="must" may-encrypt="no" protected="mustnot" vendor-bit="must" vendor-id="TGPP">
                        <type type-name="Unsigned32"/>
@@ -3498,8 +3498,8 @@ Note: The AVP codes from 924 to 999 are reserved for TS 29.061
                <avp name="QoS-Information" code="1016" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="must" vendor-id="TGPP">
                        <grouped>
                                <gavp name="QoS-Class-Identifier"/>
-                               <gavp name="Max-Requested-Bandwdith-DL"/>
-                               <gavp name="Max-Requested-Bandwdith-UL"/>
+                               <gavp name="Max-Requested-Bandwidth-DL"/>
+                               <gavp name="Max-Requested-Bandwidth-UL"/>
                                <gavp name="Guaranteed-Bitrate-UL"/>
                                <gavp name="Guaranteed-Bitrate-DL"/>
                                <gavp name="Bearer-Identifier"/>
@@ -5347,7 +5347,7 @@ Note: The AVP codes from 1634 to 1699 are reserved for TS 29.272.
                        <enum name="INVITE_INTO_CONF" code="2"/>
                        <enum name="QUIT_CONF" code="3"/>
                </avp>
-               <avp name="PDN-Conncetion-ID" code="2050" vendor-bit="must" vendor-id="TGPP">
+               <avp name="PDN-Connection-ID" code="2050" vendor-bit="must" vendor-id="TGPP">
                        <type type-name="Unsigned32"/>
                </avp>
                <avp name="Dynamic-Address-Flag" code="2051" vendor-bit="must" vendor-id="TGPP">
index 66b1b813043ee034ec0a0673cfcf8ec53352e2fc..2829d48cde6243faaf5e69150d8b4eff88ba667e 100644 (file)
@@ -6,7 +6,7 @@
 
        <application id="16777231" name="Diameter e2e4 Application" uri="http://pda.etsi.org">
 
-       <!-- ETSI ES 283 026 V1.6.0 (2008-02) Specifies some eperimental resultcodes with vendor id ETSI
+       <!-- ETSI ES 283 026 V1.6.0 (2008-02) Specifies some experimental resultcodes with vendor id ETSI
                6.3.2 Experimental-Result-Code AVP values defined in the present
                document
        This clause defines the specific values of the Experimental-Result-Code AVP (vendor-id is ETSI):
index 790aa4406d26d5523379593d4b1028ff7fbfdc40..2c33d5a7d1f2a65a7a407e163d70dbd601de1dbb 100644 (file)
@@ -124,7 +124,7 @@ do
                local tap = Listener.new();
 
                function remove()
-                       -- this way we remove the listener than otherwise will remain running indifinitelly
+                       -- this way we remove the listener than otherwise will remain running indefinitely
                        tap:remove();
                end
 
index c13ed6457bed65ca07e6d731761667be0a540168..7968faeda1b179b6187bedb74902f2cbb6ecd4c1 100644 (file)
        <listitem><para>
          Windows 95, 98 and ME are no longer supported. The "old technology"
          releases of Windows lack memory protection (specifically <ulink
-         url="http://msdn.microsoft.com/en-us/library/aa366898.aspx">VirutalProtect</ulink>)
+         url="http://msdn.microsoft.com/en-us/library/aa366898.aspx">VirtualProtect</ulink>)
          which we use to improve program safety and security. The last known
          version to work was Ethereal 0.10.14 (which includes WinPcap 3.1). You
          can get it from <ulink url="http://ethereal.com/download.html" />.