mirror of
https://github.com/SoftEtherVPN/SoftEtherVPN.git
synced 2025-09-19 17:59:19 +03:00
Correct Spelling (#458)
* spelling: accepts * spelling: account * spelling: accept * spelling: accumulate * spelling: adapter * spelling: address * spelling: additional * spelling: aggressive * spelling: adhered * spelling: allowed * spelling: ambiguous * spelling: amount * spelling: anonymous * spelling: acquisition * spelling: assemble * spelling: associated * spelling: assigns * spelling: attach * spelling: attempt * spelling: attribute * spelling: authenticate * spelling: authentication * spelling: available * spelling: bridging * spelling: cascade * spelling: cancel * spelling: check * spelling: challenge * spelling: changing * spelling: characters * spelling: cloud * spelling: compare * spelling: communication * spelling: compatible * spelling: compatibility * spelling: completion * spelling: complete * spelling: computers * spelling: configure * spelling: configuration * spelling: conformant * spelling: connection * spelling: contains * spelling: continuously * spelling: continue * spelling: convert * spelling: counters * spelling: create * spelling: created * spelling: cumulate * spelling: currently * spelling: debugging * spelling: decryption * spelling: description * spelling: default * spelling: driver * spelling: delete * spelling: destination * spelling: disabled * spelling: different * spelling: dynamically * spelling: directory * spelling: disappeared * spelling: disable * spelling: doesn't * spelling: download * spelling: dropped * spelling: enable * spelling: established * spelling: ether * spelling: except * spelling: expired * spelling: field * spelling: following * spelling: forever * spelling: firewall * spelling: first * spelling: fragment * spelling: function * spelling: gateway * spelling: identifier * spelling: identify * spelling: incoming * spelling: information * spelling: initialize * spelling: injection * spelling: inner * spelling: instead * spelling: installation * spelling: inserted * spelling: integer * spelling: interrupt * spelling: intuitive * spelling: interval * spelling: january * spelling: keybytes * spelling: know * spelling: language * spelling: length * spelling: library * spelling: listener * spelling: maintain * spelling: modified * spelling: necessary * spelling: number * spelling: obsoleted * spelling: occurred * spelling: occurring * spelling: occur * spelling: original * spelling: omittable * spelling: omit * spelling: opening * spelling: operation * spelling: packet * spelling: parameters * spelling: pointed * spelling: popupmenuopen * spelling: privilege * spelling: product * spelling: protection * spelling: promiscuous * spelling: prompt * spelling: query * spelling: random * spelling: reconnection * spelling: revocation * spelling: received * spelling: red hat * spelling: registry * spelling: release * spelling: retrieve
This commit is contained in:
committed by
Moataz Elmasry
parent
03443ab1c4
commit
ac865f04fc
@ -133,7 +133,7 @@ BOOLEAN PacketGetLinkLayerFromRegistry(LPADAPTER AdapterObject, NetType *type)
|
||||
This function grabs from the registry information like the IP addresses, the netmasks
|
||||
and the broadcast addresses of an interface. The buffer passed by the user is filled with
|
||||
npf_if_addr structures, each of which contains the data for a single address. If the buffer
|
||||
is full, the reaming addresses are dropeed, therefore set its dimension to sizeof(npf_if_addr)
|
||||
is full, the reaming addresses are dropped, therefore set its dimension to sizeof(npf_if_addr)
|
||||
if you want only the first address.
|
||||
*/
|
||||
BOOLEAN PacketGetAddressesFromRegistry(LPTSTR AdapterName, npf_if_addr* buffer, PLONG NEntries)
|
||||
@ -181,7 +181,7 @@ BOOLEAN PacketGetAddressesFromRegistry(LPTSTR AdapterName, npf_if_addr* buffer,
|
||||
else
|
||||
{
|
||||
|
||||
// Query the registry key with the interface's adresses
|
||||
// Query the registry key with the interface's addresses
|
||||
status = RegOpenKeyEx(HKEY_LOCAL_MACHINE,TEXT("SYSTEM\\CurrentControlSet\\Services"),0,KEY_READ,&SystemKey);
|
||||
if (status != ERROR_SUCCESS)
|
||||
goto fail;
|
||||
@ -222,7 +222,7 @@ BOOLEAN PacketGetAddressesFromRegistry(LPTSTR AdapterName, npf_if_addr* buffer,
|
||||
DHCPEnabled=0;
|
||||
|
||||
|
||||
/* Retrieve the adrresses */
|
||||
/* Retrieve the addresses */
|
||||
if(DHCPEnabled){
|
||||
|
||||
BufLen = sizeof String;
|
||||
@ -284,7 +284,7 @@ BOOLEAN PacketGetAddressesFromRegistry(LPTSTR AdapterName, npf_if_addr* buffer,
|
||||
else break;
|
||||
}
|
||||
|
||||
// The number of masks MUST be equal to the number of adresses
|
||||
// The number of masks MUST be equal to the number of addresses
|
||||
if(nmasks != naddrs){
|
||||
RegCloseKey(TcpIpKey);
|
||||
RegCloseKey(UnderTcpKey);
|
||||
@ -353,7 +353,7 @@ BOOLEAN PacketGetAddressesFromRegistry(LPTSTR AdapterName, npf_if_addr* buffer,
|
||||
else break;
|
||||
}
|
||||
|
||||
// The number of masks MUST be equal to the number of adresses
|
||||
// The number of masks MUST be equal to the number of addresses
|
||||
if(nmasks != naddrs){
|
||||
RegCloseKey(TcpIpKey);
|
||||
RegCloseKey(UnderTcpKey);
|
||||
@ -432,7 +432,7 @@ BOOLEAN PacketAddIP6Addresses(PADAPTER_INFO AdInfo)
|
||||
ODS("PacketAddIP6Addresses, retrieved addresses\n");
|
||||
|
||||
//
|
||||
// Scan the list of adddresses obtained from the IP helper API
|
||||
// Scan the list of addresses obtained from the IP helper API
|
||||
//
|
||||
for(TmpAddr = AdBuffer; TmpAddr != NULL; TmpAddr = TmpAddr->Next)
|
||||
{
|
||||
@ -966,7 +966,7 @@ BOOLEAN PacketGetAdapters()
|
||||
continue;
|
||||
}
|
||||
|
||||
// Conver to ASCII
|
||||
// Convert to ASCII
|
||||
WideCharToMultiByte(
|
||||
CP_ACP,
|
||||
0,
|
||||
|
@ -64,7 +64,7 @@ GAAHandler GetAdaptersAddressesPointer = NULL;
|
||||
#endif // _WINNT4
|
||||
|
||||
#ifdef HAVE_DAG_API
|
||||
/* We load dinamically the dag library in order link it only when it's present on the system */
|
||||
/* We load dynamically the dag library in order link it only when it's present on the system */
|
||||
dagc_open_handler p_dagc_open = NULL;
|
||||
dagc_close_handler p_dagc_close = NULL;
|
||||
dagc_getlinktype_handler p_dagc_getlinktype = NULL;
|
||||
@ -127,7 +127,7 @@ BOOL APIENTRY DllMain (HANDLE DllHandle,DWORD Reason,LPVOID lpReserved)
|
||||
PacketGetFileVersion(TEXT("drivers\\see.sys"), PacketDriverVersion, sizeof(PacketDriverVersion));
|
||||
|
||||
//
|
||||
// Locate GetAdaptersAddresses dinamically since it is not present in Win2k
|
||||
// Locate GetAdaptersAddresses dynamically since it is not present in Win2k
|
||||
//
|
||||
IPHMod = GetModuleHandle(TEXT("Iphlpapi"));
|
||||
|
||||
@ -136,7 +136,7 @@ BOOL APIENTRY DllMain (HANDLE DllHandle,DWORD Reason,LPVOID lpReserved)
|
||||
#endif // _WINNT4
|
||||
|
||||
#ifdef HAVE_DAG_API
|
||||
/* We load dinamically the dag library in order link it only when it's present on the system */
|
||||
/* We load dynamically the dag library in order link it only when it's present on the system */
|
||||
if((DagcLib = LoadLibrary(TEXT("dagc.dll"))) == NULL)
|
||||
{
|
||||
// Report the error but go on
|
||||
@ -250,7 +250,7 @@ PCHAR WChar2SChar(PWCHAR string)
|
||||
PCHAR TmpStr;
|
||||
TmpStr = (CHAR*) GlobalAllocPtr(GMEM_MOVEABLE | GMEM_ZEROINIT, (wcslen(string)+2));
|
||||
|
||||
// Conver to ASCII
|
||||
// Convert to ASCII
|
||||
WideCharToMultiByte(
|
||||
CP_ACP,
|
||||
0,
|
||||
@ -435,7 +435,7 @@ LONG PacketDumpRegistryKey(PCHAR KeyName, PCHAR FileName)
|
||||
\brief Returns the version of a dll or exe file
|
||||
\param FileName Name of the file whose version has to be retrieved.
|
||||
\param VersionBuff Buffer that will contain the string with the file version.
|
||||
\param VersionBuffLen Length of the buffer poited by VersionBuff.
|
||||
\param VersionBuffLen Length of the buffer pointed by VersionBuff.
|
||||
\return If the function succeeds, the return value is TRUE.
|
||||
|
||||
\note uses the GetFileVersionInfoSize() and GetFileVersionInfo() WIN32 API functions
|
||||
@ -1759,7 +1759,7 @@ BOOLEAN PacketSetReadTimeout(LPADAPTER AdapterObject,int timeout)
|
||||
else
|
||||
if(timeout == 1)
|
||||
{
|
||||
// tell the DAG card to wait forvever
|
||||
// tell the DAG card to wait forever
|
||||
AdapterObject->DagReadTimeout.tv_sec = -1;
|
||||
AdapterObject->DagReadTimeout.tv_usec = -1;
|
||||
}
|
||||
@ -1819,7 +1819,7 @@ BOOLEAN PacketSetBuff(LPADAPTER AdapterObject,int dim)
|
||||
\return This function returns TRUE if the filter is set successfully, FALSE if an error occurs
|
||||
or if the filter program is not accepted after a safeness check by the driver. The driver performs
|
||||
the check in order to avoid system crashes due to buggy or malicious filters, and it rejects non
|
||||
conformat filters.
|
||||
conformant filters.
|
||||
|
||||
This function associates a new BPF filter to the adapter AdapterObject. The filter, pointed by fp, is a
|
||||
set of bpf_insn instructions.
|
||||
@ -1854,7 +1854,7 @@ BOOLEAN PacketSetBpf(LPADAPTER AdapterObject, struct bpf_program *fp)
|
||||
\param AdapterObject Pointer to an _ADAPTER structure.
|
||||
\param snaplen Desired snap len for this capture.
|
||||
\return If the function succeeds, the return value is nonzero and specifies the actual snaplen that
|
||||
the card is using. If the function fails or if the card does't allow to set sna length, the return
|
||||
the card is using. If the function fails or if the card doesn't allow to set sna length, the return
|
||||
value is 0.
|
||||
|
||||
The snap len is the amount of packet that is actually captured by the interface and received by the
|
||||
@ -1943,7 +1943,7 @@ BOOLEAN PacketGetStats(LPADAPTER AdapterObject,struct bpf_stat *s)
|
||||
\param s Pointer to a user provided bpf_stat structure that will be filled by the function.
|
||||
\return If the function succeeds, the return value is nonzero.
|
||||
|
||||
With this function, the programmer can retireve the sname values provided by PacketGetStats(), plus:
|
||||
With this function, the programmer can retrieve the sname values provided by PacketGetStats(), plus:
|
||||
|
||||
- the number of drops by interface (not yet supported, always 0).
|
||||
- the number of packets that reached the application, i.e that were accepted by the kernel filter and
|
||||
@ -2083,7 +2083,7 @@ BOOLEAN PacketSetHwFilter(LPADAPTER AdapterObject,ULONG Filter)
|
||||
- a variable number of ASCII strings, each with the names of an adapter, separated by a "\0"
|
||||
- a double "\0"
|
||||
- a number of ASCII strings, each with the description of an adapter, separated by a "\0". The number
|
||||
of descriptions is the same of the one of names. The fisrt description corresponds to the first name, and
|
||||
of descriptions is the same of the one of names. The first description corresponds to the first name, and
|
||||
so on.
|
||||
- a double "\0".
|
||||
*/
|
||||
@ -2175,7 +2175,7 @@ BOOLEAN PacketGetAdapterNames(PTSTR pStr,PULONG BufferSize)
|
||||
This function grabs from the registry information like the IP addresses, the netmasks
|
||||
and the broadcast addresses of an interface. The buffer passed by the user is filled with
|
||||
npf_if_addr structures, each of which contains the data for a single address. If the buffer
|
||||
is full, the reaming addresses are dropeed, therefore set its dimension to sizeof(npf_if_addr)
|
||||
is full, the reaming addresses are dropped, therefore set its dimension to sizeof(npf_if_addr)
|
||||
if you want only the first address.
|
||||
*/
|
||||
BOOLEAN PacketGetNetInfoEx(PCHAR AdapterName, npf_if_addr* buffer, PLONG NEntries)
|
||||
|
@ -307,7 +307,7 @@ struct _PACKET_OID_DATA {
|
||||
ULONG Oid; ///< OID code. See the Microsoft DDK documentation or the file ntddndis.h
|
||||
///< for a complete list of valid codes.
|
||||
ULONG Length; ///< Length of the data field
|
||||
UCHAR Data[1]; ///< variable-lenght field that contains the information passed to or received
|
||||
UCHAR Data[1]; ///< variable-length field that contains the information passed to or received
|
||||
///< from the adapter.
|
||||
};
|
||||
typedef struct _PACKET_OID_DATA PACKET_OID_DATA, *PPACKET_OID_DATA;
|
||||
@ -347,7 +347,7 @@ LONG PacketDumpRegistryKey(PCHAR KeyName, PCHAR FileName);
|
||||
#endif
|
||||
#endif
|
||||
|
||||
/* We load dinamically the dag library in order link it only when it's present on the system */
|
||||
/* We load dynamically the dag library in order link it only when it's present on the system */
|
||||
#ifdef HAVE_DAG_API
|
||||
typedef dagc_t* (*dagc_open_handler)(const char *source, unsigned flags, char *ebuf); ///< prototype used to dynamically load the dag dll
|
||||
typedef void (*dagc_close_handler)(dagc_t *dagcfd); ///< prototype used to dynamically load the dag dll
|
||||
|
@ -207,7 +207,7 @@ int dagc_stats(dagc_t *dagcfd, dagc_stats_t *ps);
|
||||
* for open, close and write. However, if the programmer uses these functions, he is more protected
|
||||
* against file format changes (for example if the file format will have an header in the future).
|
||||
* Moreover, assuming that the user knows the file format is a bad practice: providing
|
||||
* simple simple save functionality is more intutive and user-friendly.
|
||||
* simple simple save functionality is more intuitive and user-friendly.
|
||||
*/
|
||||
int dagc_dumpfile_open(dagc_t *dagcfd, char* name);
|
||||
|
||||
|
Reference in New Issue
Block a user