Explorar o código

qcacld-3.0: Fix typo "lenght"

Replace typo "lenght" with correct spelling "length".

Change-Id: I227fe599d88c68982dd102f71c0bad30cd5d93cf
CRs-Fixed: 2238297
Jeff Johnson %!s(int64=7) %!d(string=hai) anos
pai
achega
fe8e9497e9

+ 2 - 2
core/dp/htt/htt_t2h.c

@@ -411,7 +411,7 @@ static void htt_t2h_lp_msg_handler(void *context, qdf_nbuf_t htt_t2h_msg,
 		int msg_len = qdf_nbuf_len(htt_t2h_msg);
 		if (msg_len < (sizeof(struct htt_mgmt_tx_compl_ind) + sizeof(*msg_word))) {
 			QDF_TRACE(QDF_MODULE_ID_HTT, QDF_TRACE_LEVEL_ERROR,
-				  "Invalid msg_word lenght in HTT_T2H_MSG_TYPE_MGMT_TX_COMPL_IND");
+				  "Invalid msg_word length in HTT_T2H_MSG_TYPE_MGMT_TX_COMPL_IND");
 			WARN_ON(1);
 			break;
 		}
@@ -572,7 +572,7 @@ static void htt_t2h_lp_msg_handler(void *context, qdf_nbuf_t htt_t2h_msg,
 
 		if (msg_len < sizeof(struct htt_flow_pool_unmap_t)) {
 			QDF_TRACE(QDF_MODULE_ID_HTT, QDF_TRACE_LEVEL_ERROR,
-				  "Invalid msg_word lenght in HTT_T2H_MSG_TYPE_FLOW_POOL_UNMAP");
+				  "Invalid msg_word length in HTT_T2H_MSG_TYPE_FLOW_POOL_UNMAP");
 			WARN_ON(1);
 			break;
 		}

+ 1 - 1
core/dp/ol/inc/ol_htt_api.h

@@ -162,7 +162,7 @@ htt_h2t_dbg_stats_get(struct htt_pdev_t *pdev,
  * @brief Get the fields from HTT T2H stats upload message's stats info header
  * @details
  *  Parse the a HTT T2H message's stats info tag-length-value header,
- *  to obtain the stats type, status, data lenght, and data address.
+ *  to obtain the stats type, status, data length, and data address.
  *
  * @param stats_info_list - address of stats record's header
  * @param[out] type - which type of FW stats are contained in the record

+ 1 - 1
core/hdd/src/wlan_hdd_cfg80211.c

@@ -17044,7 +17044,7 @@ static int __wlan_hdd_cfg80211_set_default_key(struct wiphy *wiphy,
 				 * encryption. In this canse the key
 				 * length is 5 but the encryption type
 				 * is 104 hence checking the key
-				 * lenght(5) and encryption type(104)
+				 * length(5) and encryption type(104)
 				 * and switching encryption type to 40
 				 */
 				roam_profile->EncryptionType.

+ 1 - 1
core/mac/src/pe/lim/lim_utils.c

@@ -6546,7 +6546,7 @@ QDF_STATUS lim_send_ext_cap_ie(tpAniSirGlobal mac_ctx,
  * @addn_ie: Additional IE buffer
  * @addn_ielen: Length of additional IE
  * @eid: EID of IE to strip
- * @size_of_len_field: lenght of IE length field
+ * @size_of_len_field: length of IE length field
  * @oui: if present matches OUI also
  * @oui_length: if previous present, this is length of oui
  * @extracted_ie: if not NULL, copy the stripped IE to this buffer

+ 1 - 1
core/mac/src/pe/sch/sch_beacon_gen.c

@@ -82,7 +82,7 @@ static tSirRetStatus sch_get_p2p_ie_offset(uint8_t *pExtraIe,
  * @max_bcn_size:  max beacon size
  * @num_bytes:     final size
  * @addn_ie:       pointer to additional IE
- * @addn_ielen:    lenght of additional IE
+ * @addn_ielen:    length of additional IE
  *
  * Return: status of operation
  */

+ 1 - 1
core/sme/src/csr/csr_api_roam.c

@@ -15174,7 +15174,7 @@ QDF_STATUS csr_send_join_req_msg(tpAniSirGlobal pMac, uint32_t sessionId,
 		 * So, take the size of the tSirSmeJoinReq, subtract  size of
 		 * bssDescription, add the number of bytes indicated by the
 		 * length field of the bssDescription, add the size of length
-		 * field  because it not included in the lenghth field.
+		 * field because it not included in the length field.
 		 */
 		msgLen = sizeof(tSirSmeJoinReq) - sizeof(*pBssDescription) +
 				pBssDescription->length +