mirror of
https://github.com/morgan9e/FreeRDP
synced 2026-04-15 00:44:19 +09:00
spell check with codespell
This commit is contained in:
@@ -1217,7 +1217,7 @@ static DWORD WINAPI test_peer_mainloop(LPVOID arg)
|
||||
if (WTSVirtualChannelManagerCheckFileDescriptor(context->vcm) != TRUE)
|
||||
break;
|
||||
|
||||
/* Handle dynamic virtual channel intializations */
|
||||
/* Handle dynamic virtual channel initializations */
|
||||
if (WTSVirtualChannelManagerIsChannelJoined(context->vcm, DRDYNVC_SVC_CHANNEL_NAME))
|
||||
{
|
||||
switch (WTSVirtualChannelManagerGetDrdynvcState(context->vcm))
|
||||
|
||||
@@ -98,7 +98,7 @@ BOOL wf_mirror_driver_display_device_attach(wfInfo* wfi, DWORD mode)
|
||||
WLog_DBG(TAG, "Error opening RegKey: status=0x%08lX", status);
|
||||
|
||||
if (status == ERROR_ACCESS_DENIED)
|
||||
WLog_DBG(TAG, "access denied. Do you have admin privleges?");
|
||||
WLog_DBG(TAG, "access denied. Do you have admin privileges?");
|
||||
|
||||
return FALSE;
|
||||
}
|
||||
@@ -111,7 +111,7 @@ BOOL wf_mirror_driver_display_device_attach(wfInfo* wfi, DWORD mode)
|
||||
WLog_DBG(TAG, "Error querying RegKey: status=0x%08lX", status);
|
||||
|
||||
if (status == ERROR_ACCESS_DENIED)
|
||||
WLog_DBG(TAG, "access denied. Do you have admin privleges?");
|
||||
WLog_DBG(TAG, "access denied. Do you have admin privileges?");
|
||||
|
||||
return FALSE;
|
||||
}
|
||||
@@ -127,7 +127,7 @@ BOOL wf_mirror_driver_display_device_attach(wfInfo* wfi, DWORD mode)
|
||||
WLog_DBG(TAG, "Error writing registry key: %ld", status);
|
||||
|
||||
if (status == ERROR_ACCESS_DENIED)
|
||||
WLog_DBG(TAG, "access denied. Do you have admin privleges?");
|
||||
WLog_DBG(TAG, "access denied. Do you have admin privileges?");
|
||||
|
||||
WLog_DBG(TAG, "");
|
||||
return FALSE;
|
||||
|
||||
@@ -136,7 +136,7 @@ int wf_wasapi_get_device_string(LPWSTR pattern, LPWSTR* deviceStr)
|
||||
if (wcscmp(pattern, nameVar.pwszVal) < 0)
|
||||
{
|
||||
unsigned int devStrLen;
|
||||
WLog_INFO(TAG, "Using sound ouput endpoint: [%s] (%s)", nameVar.pwszVal, pwszID);
|
||||
WLog_INFO(TAG, "Using sound output endpoint: [%s] (%s)", nameVar.pwszVal, pwszID);
|
||||
// WLog_INFO(TAG, "matched %d characters", wcscmp(pattern, nameVar.pwszVal);
|
||||
devStrLen = wcslen(pwszID);
|
||||
*deviceStr = (LPWSTR)calloc(devStrLen + 1, 2);
|
||||
|
||||
@@ -303,7 +303,7 @@ static BOOL rdpdr_process_server_header(BOOL server, wLog* log, wStream* s, UINT
|
||||
if (!Stream_CheckAndLogRequiredLengthRx(server, log, s, expect))
|
||||
{
|
||||
RX_LOG(server, log, WLOG_WARN,
|
||||
"RDPDR_HEADER[%s | %s] not enought data, expected %" PRIuz ", "
|
||||
"RDPDR_HEADER[%s | %s] not enough data, expected %" PRIuz ", "
|
||||
"got %" PRIuz,
|
||||
rdpdr_component_string(component), rdpdr_packetid_string(PacketId), expect,
|
||||
Stream_GetRemainingLength(s));
|
||||
|
||||
@@ -60,7 +60,7 @@ and map connecting users and credentials to target server users and credentials.
|
||||
|
||||
3. edit configurartion and:
|
||||
|
||||
* provide (preferrably absolute) paths for \fBCertificateFile\fP and \fBPrivateKeyFile\fP generated previously
|
||||
* provide (preferably absolute) paths for \fBCertificateFile\fP and \fBPrivateKeyFile\fP generated previously
|
||||
* remove the \fBCertificateContents\fP and \fBPrivateKeyContents\fP
|
||||
* Adjust the \fB[Server]\fP settings \fBHost\fP and \fBPort\fP to bind a specific port on a network interface
|
||||
* Adjust the \fB[Target]\fP \fBHost\fP and \fBPort\fP settings to the \fBRDP\fP target server
|
||||
|
||||
@@ -18,7 +18,7 @@ so the proxy refuses to start if they are not found:
|
||||
Required = demo,cap
|
||||
```
|
||||
|
||||
Modules must be installed as shared libraris in the `<base install>/lib/freerdp3/proxy` folder and match the pattern
|
||||
Modules must be installed as shared libraries in the `<base install>/lib/freerdp3/proxy` folder and match the pattern
|
||||
`proxy-<name>-plugin.<ext>` (e.g. `proxy-demo-plugin.so`) to be found.
|
||||
For security reasons loading by full path is not supported and only the installation path is used for lookup.
|
||||
|
||||
|
||||
@@ -833,7 +833,7 @@ static DWORD WINAPI pf_client_thread_proc(pClientContext* pc)
|
||||
pdata = pc->pdata;
|
||||
WINPR_ASSERT(pdata);
|
||||
/*
|
||||
* during redirection, freerdp's abort event might be overriden (reset) by the library, after
|
||||
* during redirection, freerdp's abort event might be overridden (reset) by the library, after
|
||||
* the server set it in order to shutdown the connection. it means that the server might signal
|
||||
* the client to abort, but the library code will override the signal and the client will
|
||||
* continue its work instead of exiting. That's why the client must wait on `pdata->abort_event`
|
||||
|
||||
@@ -290,7 +290,7 @@ BOOL pf_context_copy_settings(rdpSettings* dst, const rdpSettings* src)
|
||||
goto out_fail;
|
||||
}
|
||||
|
||||
/* We handle certificate management for this client ourselfes. */
|
||||
/* We handle certificate management for this client ourselves. */
|
||||
rc = freerdp_settings_set_bool(dst, FreeRDP_ExternalCertificateManagement, TRUE);
|
||||
|
||||
out_fail:
|
||||
|
||||
@@ -225,7 +225,7 @@ static BOOL pf_server_setup_channels(freerdp_peer* peer)
|
||||
channelContext = StaticChannelContext_new(ps, cname, channelId);
|
||||
if (!channelContext)
|
||||
{
|
||||
PROXY_LOG_ERR(TAG, ps, "error seting up channelContext for '%s'", cname);
|
||||
PROXY_LOG_ERR(TAG, ps, "error setting up channelContext for '%s'", cname);
|
||||
goto fail;
|
||||
}
|
||||
|
||||
@@ -813,7 +813,7 @@ BOOL pf_server_start(proxyServer* server)
|
||||
WLog_ERR(TAG, "failed to start listener: address already in use!");
|
||||
break;
|
||||
case EACCES:
|
||||
WLog_ERR(TAG, "failed to start listener: insufficent permissions!");
|
||||
WLog_ERR(TAG, "failed to start listener: insufficient permissions!");
|
||||
break;
|
||||
default:
|
||||
WLog_ERR(TAG, "failed to start listener: errno=%d", errno);
|
||||
@@ -852,7 +852,7 @@ BOOL pf_server_start_from_socket(proxyServer* server, int socket)
|
||||
WLog_ERR(TAG, "failed to start listener: address already in use!");
|
||||
break;
|
||||
case EACCES:
|
||||
WLog_ERR(TAG, "failed to start listener: insufficent permissions!");
|
||||
WLog_ERR(TAG, "failed to start listener: insufficient permissions!");
|
||||
break;
|
||||
default:
|
||||
WLog_ERR(TAG, "failed to start listener: errno=%d", errno);
|
||||
|
||||
@@ -56,7 +56,7 @@ UINT32 shadow_encoder_create_frame_id(rdpShadowEncoder* encoder)
|
||||
|
||||
/*
|
||||
* Calculate preferred fps according to how much frames are
|
||||
* in-progress. Note that it only works when subsytem implementation
|
||||
* in-progress. Note that it only works when subsystem implementation
|
||||
* calls shadow_encoder_preferred_fps and takes the suggestion.
|
||||
*/
|
||||
if (inFlightFrames > 1)
|
||||
|
||||
@@ -681,7 +681,7 @@ int shadow_server_start(rdpShadowServer* server)
|
||||
|
||||
/* Bind magic:
|
||||
*
|
||||
* emtpy ... bind TCP all
|
||||
* empty ... bind TCP all
|
||||
* <local path> ... bind local (IPC)
|
||||
* bind-socket,<address> ... bind TCP to specified interface
|
||||
*/
|
||||
|
||||
Reference in New Issue
Block a user