diff options
author | Binh-Minh Ribler <bmribler@hdfgroup.org> | 2020-07-28 17:20:13 (GMT) |
---|---|---|
committer | Binh-Minh Ribler <bmribler@hdfgroup.org> | 2020-07-28 17:20:13 (GMT) |
commit | 707e30c6be1954c0027374124207e46caae68cbc (patch) | |
tree | 8018a2af4b758d1037058b8b2f37d16050f23985 /src/H5Olink.c | |
parent | 303be6d7de5241403eafea504c661ef30dab4a15 (diff) | |
download | hdf5-707e30c6be1954c0027374124207e46caae68cbc.zip hdf5-707e30c6be1954c0027374124207e46caae68cbc.tar.gz hdf5-707e30c6be1954c0027374124207e46caae68cbc.tar.bz2 |
Fixed typos in error messages.
Diffstat (limited to 'src/H5Olink.c')
-rw-r--r-- | src/H5Olink.c | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/src/H5Olink.c b/src/H5Olink.c index 8aaf2d2..c27b51f 100644 --- a/src/H5Olink.c +++ b/src/H5Olink.c @@ -203,7 +203,7 @@ H5O__link_decode(H5F_t *f, H5O_t H5_ATTR_UNUSED *open_oh, /* Make sure that length doesn't exceed buffer size, which could occur when the file is corrupted */ if(p + len > p_end) - HGOTO_ERROR(H5E_OHDR, H5E_OVERFLOW, NULL, "name length causes read pass end of buffer") + HGOTO_ERROR(H5E_OHDR, H5E_OVERFLOW, NULL, "name length causes read past end of buffer") /* Get the link's name */ if(NULL == (lnk->name = (char *)H5MM_malloc(len + 1))) @@ -228,7 +228,7 @@ H5O__link_decode(H5F_t *f, H5O_t H5_ATTR_UNUSED *open_oh, /* Make sure that length doesn't exceed buffer size, which could occur when the file is corrupted */ if(p + len > p_end) - HGOTO_ERROR(H5E_OHDR, H5E_OVERFLOW, NULL, "name length causes read pass end of buffer") + HGOTO_ERROR(H5E_OHDR, H5E_OVERFLOW, NULL, "name length causes read past end of buffer") if(NULL == (lnk->u.soft.name = (char *)H5MM_malloc((size_t)len + 1))) HGOTO_ERROR(H5E_RESOURCE, H5E_NOSPACE, NULL, "memory allocation failed") @@ -253,7 +253,7 @@ H5O__link_decode(H5F_t *f, H5O_t H5_ATTR_UNUSED *open_oh, /* Make sure that length doesn't exceed buffer size, which could occur when the file is corrupted */ if(p + len > p_end) - HGOTO_ERROR(H5E_OHDR, H5E_OVERFLOW, NULL, "name length causes read pass end of buffer") + HGOTO_ERROR(H5E_OHDR, H5E_OVERFLOW, NULL, "name length causes read past end of buffer") if(NULL == (lnk->u.ud.udata = H5MM_malloc((size_t)len))) HGOTO_ERROR(H5E_RESOURCE, H5E_NOSPACE, NULL, "memory allocation failed") |