From f961c1c551e5740c545d8b5ce7e7670aeacf0214 Mon Sep 17 00:00:00 2001 From: Ludovic Rousseau Date: Sat, 14 Sep 2019 17:50:58 +0200 Subject: [PATCH] Fix typos Thanks to Debian lintian for the reports: I: proxmark3: spelling-error-in-binary usr/share/proxmark3/firmware/fullimage.elf dont don't I: proxmark3: spelling-error-in-binary usr/share/proxmark3/firmware/fullimage.elf succesful successful I: proxmark3: spelling-error-in-binary usr/share/proxmark3/firmware/fullimage.elf Uknown Unknown I: proxmark3: spelling-error-in-binary usr/share/proxmark3/firmware/fullimage.elf requestes requests I: proxmark3: spelling-error-in-binary usr/share/proxmark3/firmware/fullimage.elf unkown unknown I: proxmark3: spelling-error-in-binary usr/share/proxmark3/firmware/fullimage.elf ambigous ambiguous --- armsrc/hitag2.c | 16 ++++++++-------- armsrc/iso14443a.c | 4 ++-- armsrc/iso15693.c | 2 +- armsrc/mifarecmd.c | 2 +- client/cmdlfhitag.c | 2 +- client/cmdlft55xx.c | 2 +- client/emv/apduinfo.c | 10 +++++----- common/mbedtls/ecp.h | 2 +- 8 files changed, 20 insertions(+), 20 deletions(-) diff --git a/armsrc/hitag2.c b/armsrc/hitag2.c index ab3f7cb36..67bc8c623 100644 --- a/armsrc/hitag2.c +++ b/armsrc/hitag2.c @@ -427,7 +427,7 @@ static bool hitag2_password(uint8_t *rx, const size_t rxlen, uint8_t *tx, size_t } if (blocknr > 7) { - DbpString("Read succesful!"); + DbpString("Read successful!"); bSuccessful = true; return false; } @@ -440,7 +440,7 @@ static bool hitag2_password(uint8_t *rx, const size_t rxlen, uint8_t *tx, size_t // Unexpected response default: { - Dbprintf("Uknown frame length: %d", rxlen); + Dbprintf("Unknown frame length: %d", rxlen); return false; } break; @@ -532,7 +532,7 @@ static bool hitag2_crypto(uint8_t *rx, const size_t rxlen, uint8_t *tx, size_t * blocknr++; } if (blocknr > 7) { - DbpString("Read succesful!"); + DbpString("Read successful!"); bSuccessful = true; return false; } else { @@ -546,7 +546,7 @@ static bool hitag2_crypto(uint8_t *rx, const size_t rxlen, uint8_t *tx, size_t * // Unexpected response default: { - Dbprintf("Uknown frame length: %d", rxlen); + Dbprintf("Unknown frame length: %d", rxlen); return false; } break; @@ -588,7 +588,7 @@ static bool hitag2_authenticate(uint8_t *rx, const size_t rxlen, uint8_t *tx, si memcpy(tx, NrAr, 8); bCrypto = true; } else { - DbpString("Authentication succesful!"); + DbpString("Authentication successful!"); return true; } } @@ -596,7 +596,7 @@ static bool hitag2_authenticate(uint8_t *rx, const size_t rxlen, uint8_t *tx, si // Unexpected response default: { - Dbprintf("Uknown frame length: %d", rxlen); + Dbprintf("Unknown frame length: %d", rxlen); return false; } break; @@ -655,7 +655,7 @@ static bool hitag2_test_auth_attempts(uint8_t *rx, const size_t rxlen, uint8_t * break; default: { - Dbprintf("Uknown frame length: %d", rxlen); + Dbprintf("Unknown frame length: %d", rxlen); return false; } break; @@ -696,7 +696,7 @@ static bool hitag2_read_uid(uint8_t *rx, const size_t rxlen, uint8_t *tx, size_t break; // Unexpected response default: { - Dbprintf("Uknown frame length: %d", rxlen); + Dbprintf("Unknown frame length: %d", rxlen); return false; } break; diff --git a/armsrc/iso14443a.c b/armsrc/iso14443a.c index 794ead3c5..c49d93a1f 100644 --- a/armsrc/iso14443a.c +++ b/armsrc/iso14443a.c @@ -1005,7 +1005,7 @@ static bool SimulateIso14443aInit(int tagType, int flags, uint8_t *data, tag_res } break; default: { - if (DBGLEVEL >= DBG_ERROR) Dbprintf("Error: unkown tagtype (%d)", tagType); + if (DBGLEVEL >= DBG_ERROR) Dbprintf("Error: unknown tagtype (%d)", tagType); return false; } break; @@ -2999,7 +2999,7 @@ void ReaderMifare(bool first_try, uint8_t block, uint8_t keytype) { mf_nr_ar[3] &= 0x1F; - if (DBGLEVEL >= DBG_EXTENDED) Dbprintf("Number of sent auth requestes: %u", i); + if (DBGLEVEL >= DBG_EXTENDED) Dbprintf("Number of sent auth requests: %u", i); uint8_t buf[32] = {0x00}; memset(buf, 0x00, sizeof(buf)); diff --git a/armsrc/iso15693.c b/armsrc/iso15693.c index 84de71021..ecf0640a5 100644 --- a/armsrc/iso15693.c +++ b/armsrc/iso15693.c @@ -766,7 +766,7 @@ void DbdecodeIso15693Answer(int len, uint8_t *d) { strncat(status, "0F: no info", DBD15STATLEN - strlen(status)); break; case 0x10: - strncat(status, "10: dont exist", DBD15STATLEN - strlen(status)); + strncat(status, "10: don't exist", DBD15STATLEN - strlen(status)); break; case 0x11: strncat(status, "11: lock again", DBD15STATLEN - strlen(status)); diff --git a/armsrc/mifarecmd.c b/armsrc/mifarecmd.c index 4fccdab8b..089a320ad 100644 --- a/armsrc/mifarecmd.c +++ b/armsrc/mifarecmd.c @@ -1038,7 +1038,7 @@ void MifareNested(uint32_t arg0, uint32_t arg1, uint32_t arg2, uint8_t *datain) if (valid_nonce(nttest, nt2, ks1, par_array)) { if (ncount > 0) { // we are only interested in disambiguous nonces, try again - if (DBGLEVEL >= 3) Dbprintf("Nonce#%d: dismissed (ambigous), ntdist=%d", i + 1, j); + if (DBGLEVEL >= 3) Dbprintf("Nonce#%d: dismissed (ambiguous), ntdist=%d", i + 1, j); target_nt[i] = 0; break; } diff --git a/client/cmdlfhitag.c b/client/cmdlfhitag.c index 2bcd476ea..a54b96a68 100644 --- a/client/cmdlfhitag.c +++ b/client/cmdlfhitag.c @@ -245,7 +245,7 @@ static int CmdLFHitagList(const char *Cmd) { if (f) { fclose(f); - PrintAndLogEx(NORMAL, "Recorded activity succesfully written to file: %s", filename); + PrintAndLogEx(NORMAL, "Recorded activity successfully written to file: %s", filename); } free(got); diff --git a/client/cmdlft55xx.c b/client/cmdlft55xx.c index f6412652f..fbdd4c083 100644 --- a/client/cmdlft55xx.c +++ b/client/cmdlft55xx.c @@ -1397,7 +1397,7 @@ static int CmdT55xxWriteBlock(const char *Cmd) { //t55xxVerifyWrite( uint8_t block, bool page1, bool usepwd, uint8_t override, uint32_t password, uint8_t downlink_mode, uint32_t data) { bool isOK = t55xxVerifyWrite(block, page1, usepwd, 1, password, downlink_mode, data); if (isOK) - PrintAndLogEx(SUCCESS, "Write OK, validation succesful"); + PrintAndLogEx(SUCCESS, "Write OK, validation successful"); else PrintAndLogEx(WARNING, "Write could not validate the written data"); } diff --git a/client/emv/apduinfo.c b/client/emv/apduinfo.c index 7c3e87408..35735fb47 100644 --- a/client/emv/apduinfo.c +++ b/client/emv/apduinfo.c @@ -191,7 +191,7 @@ const APDUCode APDUCodeTable[] = { {"9681", APDUCODE_TYPE_NONE, "Slave not found"}, {"9700", APDUCODE_TYPE_NONE, "PIN blocked and Unblock Try Counter is 1 or 2"}, {"9702", APDUCODE_TYPE_NONE, "Main keys are blocked"}, - {"9704", APDUCODE_TYPE_NONE, "PIN not succesfully verified, 3 or more PIN tries left"}, + {"9704", APDUCODE_TYPE_NONE, "PIN not successfully verified, 3 or more PIN tries left"}, {"9784", APDUCODE_TYPE_NONE, "Base key"}, {"9785", APDUCODE_TYPE_NONE, "Limit exceeded - C-MAC key"}, {"9786", APDUCODE_TYPE_NONE, "SM error - Limit exceeded - R-MAC key"}, @@ -205,13 +205,13 @@ const APDUCode APDUCodeTable[] = { {"9850", APDUCODE_TYPE_ERROR, "INCREASE or DECREASE could not be executed because a limit has been reached."}, {"9862", APDUCODE_TYPE_ERROR, "Authentication Error, application specific (incorrect MAC)"}, {"9900", APDUCODE_TYPE_NONE, "1 PIN try left"}, - {"9904", APDUCODE_TYPE_NONE, "PIN not succesfully verified, 1 PIN try left"}, + {"9904", APDUCODE_TYPE_NONE, "PIN not successfully verified, 1 PIN try left"}, {"9985", APDUCODE_TYPE_NONE, "Wrong status - Cardholder lock"}, {"9986", APDUCODE_TYPE_ERROR, "Missing privilege"}, {"9987", APDUCODE_TYPE_NONE, "PIN is not installed"}, {"9988", APDUCODE_TYPE_NONE, "Wrong status - R-MAC state"}, {"9A00", APDUCODE_TYPE_NONE, "2 PIN try left"}, - {"9A04", APDUCODE_TYPE_NONE, "PIN not succesfully verified, 2 PIN try left"}, + {"9A04", APDUCODE_TYPE_NONE, "PIN not successfully verified, 2 PIN try left"}, {"9A71", APDUCODE_TYPE_NONE, "Wrong parameter value - Double agent AID"}, {"9A72", APDUCODE_TYPE_NONE, "Wrong parameter value - Double agent Type"}, {"9D05", APDUCODE_TYPE_ERROR, "Incorrect certificate type"}, @@ -258,9 +258,9 @@ const APDUCode APDUCodeTable[] = { {"9D63", APDUCODE_TYPE_ERROR, "Crypto functions not available"}, {"9D64", APDUCODE_TYPE_ERROR, "No application loaded"}, {"9E00", APDUCODE_TYPE_NONE, "PIN not installed"}, - {"9E04", APDUCODE_TYPE_NONE, "PIN not succesfully verified, PIN not installed"}, + {"9E04", APDUCODE_TYPE_NONE, "PIN not successfully verified, PIN not installed"}, {"9F00", APDUCODE_TYPE_NONE, "PIN blocked and Unblock Try Counter is 3"}, - {"9F04", APDUCODE_TYPE_NONE, "PIN not succesfully verified, PIN blocked and Unblock Try Counter is 3"}, + {"9F04", APDUCODE_TYPE_NONE, "PIN not successfully verified, PIN blocked and Unblock Try Counter is 3"}, {"9FXX", APDUCODE_TYPE_NONE, "Command successfully executed; 'xx' bytes of data are available and can be requested using GET RESPONSE."}, {"9XXX", APDUCODE_TYPE_NONE, "Application related status, (ISO 7816-3)"} }; diff --git a/common/mbedtls/ecp.h b/common/mbedtls/ecp.h index 4c2592a9e..1c4bdd65c 100644 --- a/common/mbedtls/ecp.h +++ b/common/mbedtls/ecp.h @@ -528,7 +528,7 @@ int mbedtls_ecp_tls_write_point(const mbedtls_ecp_group *grp, const mbedtls_ecp_ * * \return \c 0 on success, * \return An \c MBEDTLS_ERR_MPI_XXX error code on initialization failure. - * \return #MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE for unkownn groups. + * \return #MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE for unknown groups. */ int mbedtls_ecp_group_load(mbedtls_ecp_group *grp, mbedtls_ecp_group_id id);