Browse code

core: fix spelling errors catched by lintian #688

Victor Seva authored on 29/06/2016 14:48:09
Showing 15 changed files
... ...
@@ -1425,7 +1425,7 @@ int cfg_diff_init(cfg_ctx_t *ctx,
1425 1425
  * return value:
1426 1426
  *	1: valid value is found
1427 1427
  *	0: no more changed value found
1428
- *	-1: error occured 
1428
+ *	-1: error occurred 
1429 1429
  */
1430 1430
 int cfg_diff_next(void **h,
1431 1431
 			str *gname, unsigned int **gid, str *vname,
... ...
@@ -168,7 +168,7 @@ int cfg_diff_init(cfg_ctx_t *ctx,
168 168
  * return value:
169 169
  *	1: valid value is found
170 170
  *	0: no more changed value found
171
- *	-1: error occured
171
+ *	-1: error occurred
172 172
  *
173 173
  *
174 174
  * can be used as follows:
... ...
@@ -184,7 +184,7 @@ int cfg_diff_init(cfg_ctx_t *ctx,
184 184
  * }
185 185
  * cfg_diff_release(ctx);
186 186
  * if (err) {
187
- *	error occured, the changes cannot be retrieved
187
+ *	error occurred, the changes cannot be retrieved
188 188
  *	...
189 189
  * }
190 190
  */
... ...
@@ -196,7 +196,7 @@ void daemon_status_no_wait()
196 196
 
197 197
 /**
198 198
  * enable dumpable flag for core dumping after setuid() & friends
199
- * @return 0 when no critical error occured, -1 on such error
199
+ * @return 0 when no critical error occurred, -1 on such error
200 200
  */
201 201
 int enable_dumpable(void)
202 202
 {
... ...
@@ -96,7 +96,7 @@ route{
96 96
 		break;
97 97
 	};
98 98
 
99
-	# error occured ...
99
+	# error occurred ...
100 100
 	if (! t_newtran())
101 101
 	{
102 102
 		sl_reply_error();
... ...
@@ -35,7 +35,7 @@ fi
35 35
 if [ $PROCCNT -ne $ALL ] ; then 
36 36
 
37 37
 	cd $SERDIR
38
-	echo "Alarm: ser restart occured on `date` at $HOSTNAME" > $TMP
38
+	echo "Alarm: ser restart occurred on `date` at $HOSTNAME" > $TMP
39 39
 	if [ -r $BIN -a -r $CORE ] ; then
40 40
 		echo "----------------------------------" >> $TMP
41 41
 		DATE=`date "+%Y-%m-%d--%H-%M"`
... ...
@@ -51,6 +51,6 @@ if [ $PROCCNT -ne $ALL ] ; then
51 51
 	fi
52 52
 
53 53
 	/etc/init.d/sr restart
54
-	mail -s "ser restart occured" $NOTIFY < $TMP
54
+	mail -s "ser restart occurred" $NOTIFY < $TMP
55 55
 	rm -f $TMP
56 56
 fi
... ...
@@ -26,7 +26,7 @@ route{
26 26
 		break;
27 27
 	};
28 28
 
29
-	# create transaction state; abort if error occured
29
+	# create transaction state; abort if error occurred
30 30
 	if ( !t_newtran()) {
31 31
 		sl_reply_error();
32 32
 		break;
... ...
@@ -261,7 +261,7 @@ void binrpc_set_mallocs(void* _malloc, void* _realloc, void* _free);
261 261
  * Function: binrpc_get_last_errs
262 262
  * 
263 263
  * Description: 
264
- *   The function returns last error that occured when function returned FATAL_ERROR
264
+ *   The function returns last error that occurred when function returned FATAL_ERROR
265 265
  * 
266 266
  * */
267 267
 char *binrpc_get_last_errs();
... ...
@@ -28,7 +28,7 @@
28 28
 
29 29
 <refsect1><title>Description</title>
30 30
 <para>Removes first message from the queue. If the queue is empty or an error
31
-occured it returns NULL value. Removed messages are NOT automaticaly freed -
31
+occurred it returns NULL value. Removed messages are NOT automaticaly freed -
32 32
 caller must use <function>free_message</function> or free it itself (see <xref
33 33
 linkend="free_message"/>)!
34 34
 </para>
... ...
@@ -37,7 +37,7 @@ linkend="free_message"/>)!
37 37
 
38 38
 <refsect1><title>Return value</title>
39 39
 <para>Returns pointer to message removed from the queue. If the queue is empty
40
-or an error occured the return value is NULL.
40
+or an error occurred the return value is NULL.
41 41
 <!-- return value description -->
42 42
 </para>
43 43
 </refsect1>
... ...
@@ -13,11 +13,11 @@ int get_expiration_value(struct sip_msg *m, int *value);
13 13
 int is_terminating_notify(struct sip_msg *m);
14 14
 
15 15
 /* returns 1 if given extension is in Supported headers, 
16
- * 0 if not or an error occured while parsing */
16
+ * 0 if not or an error occurred while parsing */
17 17
 int supports_extension(struct sip_msg *m, str *extension);
18 18
 
19 19
 /* returns 1 if given extension is in Require headers, 
20
- * 0 if not or an error occured while parsing */
20
+ * 0 if not or an error occurred while parsing */
21 21
 int requires_extension(struct sip_msg *m, str *extension);
22 22
 
23 23
 /**
... ...
@@ -427,7 +427,7 @@ int db_table_version(const db_func_t* dbf, db1_con_t* connection, const str* tab
427 427
 
428 428
 /*! \brief
429 429
  * Check the table version
430
- * 0 means ok, -1 means an error occured
430
+ * 0 means ok, -1 means an error occurred
431 431
  */
432 432
 int db_check_table_version(db_func_t* dbf, db1_con_t* dbh, const str* table, const unsigned int version)
433 433
 {
... ...
@@ -507,7 +507,7 @@ int db_table_version(const db_func_t* dbf, db1_con_t* con, const str* table);
507 507
  * \param dbh database connection handle
508 508
  * \param table checked table
509 509
  * \param version checked version
510
- * \return 0 means ok, -1 means an error occured
510
+ * \return 0 means ok, -1 means an error occurred
511 511
  */
512 512
 int db_check_table_version(db_func_t* dbf, db1_con_t* dbh, const str* table, const unsigned int version);
513 513
 
... ...
@@ -62,7 +62,7 @@ int get_msg_rules(const str_t *username, const str_t *filename,
62 62
 	/* parse input data */
63 63
 	res = parse_msg_rules(data, dsize, dst);
64 64
 	if (res != RES_OK) {
65
-		ERROR_LOG("Error occured during document parsing!\n");
65
+		ERROR_LOG("Error occurred during document parsing!\n");
66 66
 	}
67 67
 
68 68
 	if (data) cds_free(data);
... ...
@@ -63,7 +63,7 @@ int get_pres_rules(const str_t *username, const str_t *filename,
63 63
 	/* parse input data */
64 64
 	res = parse_pres_rules(data, dsize, dst);
65 65
 	if (res != RES_OK) {
66
-		ERROR_LOG("Error occured during parsing pres-rules for %.*s!\n", 
66
+		ERROR_LOG("Error occurred during parsing pres-rules for %.*s!\n", 
67 67
 				str_len(username), 
68 68
 				username ? username->s : "");
69 69
 	}
... ...
@@ -53,7 +53,7 @@
53 53
  * and if no data is queued on the fd, recv_all will not wait (it will 
54 54
  * return error and set errno to EAGAIN/EWOULDBLOCK). However if even 1 byte
55 55
  *  is queued, the call will block until the whole data_len was read or an
56
- *  error or eof occured ("semi-nonblocking" behaviour,  some tcp code
56
+ *  error or eof occurred ("semi-nonblocking" behaviour,  some tcp code
57 57
  *   counts on it).
58 58
  * if flags is set to MSG_WAITALL it will block even if no byte is available.
59 59
  *  
... ...
@@ -1610,7 +1610,7 @@ repeat_1st_read:
1610 1610
 #endif /* USE_TLS */
1611 1611
 			resp=tcp_read_req(con, &n, &read_flags);
1612 1612
 			if (unlikely(resp<0)){
1613
-				/* some error occured, but on the new fd, not on the tcp
1613
+				/* some error occurred, but on the new fd, not on the tcp
1614 1614
 				 * main fd, so keep the ret value */
1615 1615
 				if (unlikely(resp!=CONN_EOF))
1616 1616
 					con->state=S_CONN_BAD;
... ...
@@ -1669,7 +1669,7 @@ repeat_read:
1669 1669
 			resp=tcp_read_req(con, &ret, &read_flags);
1670 1670
 			if (unlikely(resp<0)){
1671 1671
 read_error:
1672
-				ret=-1; /* some error occured */
1672
+				ret=-1; /* some error occurred */
1673 1673
 				if (unlikely(io_watch_del(&io_w, con->fd, idx,
1674 1674
 											IO_FD_CLOSING) < 0)){
1675 1675
 					LM_CRIT("io_watch_del failed for %p id %d fd %d,"