From aea865b360cd47523455158c1e765f42e3b8b157 Mon Sep 17 00:00:00 2001 From: Ato Araki Date: Mon, 17 May 2021 22:48:11 +0900 Subject: [PATCH] Fix length typo Closes https://github.com/espressif/esp-idf/pull/7037 --- components/app_trace/sys_view/SEGGER/SEGGER_SYSVIEW.c | 2 +- components/driver/spi_master.c | 2 +- components/esp_rom/include/esp32s2/rom/usb/cpio.h | 2 +- components/esp_rom/include/esp32s3/rom/usb/cpio.h | 2 +- components/wpa_supplicant/src/crypto/crypto.h | 2 +- 5 files changed, 5 insertions(+), 5 deletions(-) diff --git a/components/app_trace/sys_view/SEGGER/SEGGER_SYSVIEW.c b/components/app_trace/sys_view/SEGGER/SEGGER_SYSVIEW.c index e1599cc1b9..14e3c5534e 100644 --- a/components/app_trace/sys_view/SEGGER/SEGGER_SYSVIEW.c +++ b/components/app_trace/sys_view/SEGGER/SEGGER_SYSVIEW.c @@ -69,7 +69,7 @@ Additional information: Packets with IDs 24..31 are standard packets with extendible structure and contain a length field. - + Packets with IDs >= 32 always contain a length field. diff --git a/components/driver/spi_master.c b/components/driver/spi_master.c index 5efe7993cd..50d07f0f72 100644 --- a/components/driver/spi_master.c +++ b/components/driver/spi_master.c @@ -18,7 +18,7 @@ complicated mode which combines the two modes above: The idea is that to send something to a SPI device, you allocate a transaction descriptor. It contains some information about the transfer - like the lenghth, address, command etc, plus pointers to transmit and + like the length, address, command etc, plus pointers to transmit and receive buffer. The address of this block gets pushed into the transmit queue. The SPI driver does its magic, and sends and retrieves the data eventually. The data gets written to the receive buffers, if needed the diff --git a/components/esp_rom/include/esp32s2/rom/usb/cpio.h b/components/esp_rom/include/esp32s2/rom/usb/cpio.h index 5603b3f541..886b5080fb 100644 --- a/components/esp_rom/include/esp32s2/rom/usb/cpio.h +++ b/components/esp_rom/include/esp32s2/rom/usb/cpio.h @@ -79,7 +79,7 @@ typedef enum { * The initial time with reason=CPIO_RSN_FILE_INITIAL, when more data is available with * CPIO_RSN_FILE_MORE and finally with CPIO_RSN_FILE_END. For these calls, fileinfo * will again contain file information. buff will be the information contained in the - * file at offset buff_offset, and the lenght of this buffer will be in buff_len. + * file at offset buff_offset, and the length of this buffer will be in buff_len. * * The library guarantees to feed all file data to the callback consequitively, so * within the same file, the buff_offset from a call will always be (buff_offset+buff_len) diff --git a/components/esp_rom/include/esp32s3/rom/usb/cpio.h b/components/esp_rom/include/esp32s3/rom/usb/cpio.h index 5603b3f541..886b5080fb 100644 --- a/components/esp_rom/include/esp32s3/rom/usb/cpio.h +++ b/components/esp_rom/include/esp32s3/rom/usb/cpio.h @@ -79,7 +79,7 @@ typedef enum { * The initial time with reason=CPIO_RSN_FILE_INITIAL, when more data is available with * CPIO_RSN_FILE_MORE and finally with CPIO_RSN_FILE_END. For these calls, fileinfo * will again contain file information. buff will be the information contained in the - * file at offset buff_offset, and the lenght of this buffer will be in buff_len. + * file at offset buff_offset, and the length of this buffer will be in buff_len. * * The library guarantees to feed all file data to the callback consequitively, so * within the same file, the buff_offset from a call will always be (buff_offset+buff_len) diff --git a/components/wpa_supplicant/src/crypto/crypto.h b/components/wpa_supplicant/src/crypto/crypto.h index 75234e229c..9a43c9bfd9 100644 --- a/components/wpa_supplicant/src/crypto/crypto.h +++ b/components/wpa_supplicant/src/crypto/crypto.h @@ -1066,7 +1066,7 @@ void crypto_free_buffer(unsigned char *buf); * @crypto_ec_get_priv_key_der: get private key in der format * @key: key structure * @key_data: key data in charater buffer - * @key_len = key lenght of charater buffer + * @key_len = key length of charater buffer * Return : 0 if success */ int crypto_ec_get_priv_key_der(struct crypto_key *key, unsigned char **key_data, int *key_len);