mirror of
https://github.com/gchq/CyberChef
synced 2025-12-23 11:43:39 +00:00
Fixed some typos
This commit is contained in:
@@ -22,7 +22,7 @@ export const ENCODING_SCHEME = [
|
||||
/**
|
||||
* Lookup table for the binary value of each digit representation.
|
||||
*
|
||||
* I wrote a very nice algorithm to generate 8 4 2 1 encoding programatically,
|
||||
* I wrote a very nice algorithm to generate 8 4 2 1 encoding programmatically,
|
||||
* but unfortunately it's much easier (if less elegant) to use lookup tables
|
||||
* when supporting multiple encoding schemes.
|
||||
*
|
||||
|
||||
@@ -32,7 +32,7 @@ export const WORD_DELIM_OPTIONS = ["Line feed", "CRLF", "Forward slash", "Backsl
|
||||
export const INPUT_DELIM_OPTIONS = ["Line feed", "CRLF", "Space", "Comma", "Semi-colon", "Colon", "Nothing (separate chars)"];
|
||||
|
||||
/**
|
||||
* Armithmetic sequence delimiters
|
||||
* Arithmetic sequence delimiters
|
||||
*/
|
||||
export const ARITHMETIC_DELIM_OPTIONS = ["Line feed", "Space", "Comma", "Semi-colon", "Colon", "CRLF"];
|
||||
|
||||
|
||||
@@ -2463,7 +2463,7 @@ export function extractMZPE(bytes, offset) {
|
||||
const numSections = stream.readInt(2, "le");
|
||||
|
||||
// Read Optional Header Magic to determine the state of the image file
|
||||
// 0x10b = normal exeuctable, 0x107 = ROM image, 0x20b = PE32+ executable
|
||||
// 0x10b = normal executable, 0x107 = ROM image, 0x20b = PE32+ executable
|
||||
stream.moveForwardsBy(16);
|
||||
const optionalMagic = stream.readInt(2, "le");
|
||||
const pe32Plus = optionalMagic === 0x20b;
|
||||
|
||||
@@ -178,7 +178,7 @@ export function scanForFileTypes(buf, categories=Object.keys(FILE_SIGNATURES)) {
|
||||
* @param {Uint8Array} buf - The buffer to search
|
||||
* @param {Object} sig - A single signature object (Not an array of signatures)
|
||||
* @param {number} offset - Where to start search from
|
||||
* @returs {number} The position of the match or -1 if one cannot be found.
|
||||
* @returns {number} The position of the match or -1 if one cannot be found.
|
||||
*/
|
||||
function locatePotentialSig(buf, sig, offset) {
|
||||
// Find values for first key and value in sig
|
||||
|
||||
@@ -37,7 +37,7 @@ export async function parseQrCode(input, normalise) {
|
||||
image = await jimp.read(image);
|
||||
}
|
||||
} catch (err) {
|
||||
throw new OperationError(`Error normalising iamge. (${err})`);
|
||||
throw new OperationError(`Error normalising image. (${err})`);
|
||||
}
|
||||
|
||||
const qrData = jsQR(image.bitmap.data, image.getWidth(), image.getHeight());
|
||||
|
||||
Reference in New Issue
Block a user