[v2,02/18] ipsec: fix spelling errors

Message ID 20210913161025.10490-3-stephen@networkplumber.org (mailing list archive)
State Superseded, archived
Delegated to: Thomas Monjalon
Headers
Series fix spelling errors |

Checks

Context Check Description
ci/checkpatch success coding style OK

Commit Message

Stephen Hemminger Sept. 13, 2021, 4:10 p.m. UTC
  Lots of typos in comments found by codespell

Signed-off-by: Stephen Hemminger <stephen@networkplumber.org>
---
 lib/ipsec/esp_inb.c   | 4 ++--
 lib/ipsec/esp_outb.c  | 2 +-
 lib/ipsec/ipsec_sad.c | 2 +-
 lib/ipsec/sa.c        | 2 +-
 lib/ipsec/sa.h        | 2 +-
 5 files changed, 6 insertions(+), 6 deletions(-)
  

Comments

Ananyev, Konstantin Oct. 7, 2021, 5:32 p.m. UTC | #1
> -----Original Message-----
> From: dev <dev-bounces@dpdk.org> On Behalf Of Stephen Hemminger
> Sent: Monday, September 13, 2021 5:10 PM
> To: dev@dpdk.org
> Cc: Stephen Hemminger <stephen@networkplumber.org>
> Subject: [dpdk-dev] [PATCH v2 02/18] ipsec: fix spelling errors
> 
> Lots of typos in comments found by codespell
> 
> Signed-off-by: Stephen Hemminger <stephen@networkplumber.org>
> ---
>  lib/ipsec/esp_inb.c   | 4 ++--
>  lib/ipsec/esp_outb.c  | 2 +-
>  lib/ipsec/ipsec_sad.c | 2 +-
>  lib/ipsec/sa.c        | 2 +-
>  lib/ipsec/sa.h        | 2 +-
>  5 files changed, 6 insertions(+), 6 deletions(-)
> 
> diff --git a/lib/ipsec/esp_inb.c b/lib/ipsec/esp_inb.c
> index 2b1df6a032a8..846fc0ea71a2 100644
> --- a/lib/ipsec/esp_inb.c
> +++ b/lib/ipsec/esp_inb.c
> @@ -415,7 +415,7 @@ trs_process_check(struct rte_mbuf *mb, struct rte_mbuf **ml,
> 
>  /*
>   * packet checks for tunnel mode:
> - * - same as for trasnport mode
> + * - same as for transport mode
>   * - esp tail next proto contains expected for that SA value
>   */
>  static inline int32_t
> @@ -501,7 +501,7 @@ trs_process_step3(struct rte_mbuf *mb)
>  static inline void
>  tun_process_step3(struct rte_mbuf *mb, uint64_t txof_msk, uint64_t txof_val)
>  {
> -	/* reset mbuf metatdata: L2/L3 len, packet type */
> +	/* reset mbuf metadata: L2/L3 len, packet type */
>  	mb->packet_type = RTE_PTYPE_UNKNOWN;
>  	mb->tx_offload = (mb->tx_offload & txof_msk) | txof_val;
> 
> diff --git a/lib/ipsec/esp_outb.c b/lib/ipsec/esp_outb.c
> index 1e181cf2cee4..0bf3cd6bd4da 100644
> --- a/lib/ipsec/esp_outb.c
> +++ b/lib/ipsec/esp_outb.c
> @@ -525,7 +525,7 @@ cpu_outb_trs_pkt_prepare(const struct rte_ipsec_session *ss,
> 
>  /*
>   * process outbound packets for SA with ESN support,
> - * for algorithms that require SQN.hibits to be implictly included
> + * for algorithms that require SQN.hibits to be implicitly included
>   * into digest computation.
>   * In that case we have to move ICV bytes back to their proper place.
>   */
> diff --git a/lib/ipsec/ipsec_sad.c b/lib/ipsec/ipsec_sad.c
> index 3f9533c80a68..531e1e323cdc 100644
> --- a/lib/ipsec/ipsec_sad.c
> +++ b/lib/ipsec/ipsec_sad.c
> @@ -62,7 +62,7 @@ EAL_REGISTER_TAILQ(rte_ipsec_sad_tailq)
>   * Inserts a rule into an appropriate hash table,
>   * updates the value for a given SPI in SPI_ONLY hash table
>   * reflecting presence of more specific rule type in two LSBs.
> - * Updates a counter that reflects the number of rules whith the same SPI.
> + * Updates a counter that reflects the number of rules with the same SPI.
>   */
>  static inline int
>  add_specific(struct rte_ipsec_sad *sad, const void *key,
> diff --git a/lib/ipsec/sa.c b/lib/ipsec/sa.c
> index e59189d215b3..f49b3ec15d4f 100644
> --- a/lib/ipsec/sa.c
> +++ b/lib/ipsec/sa.c
> @@ -126,7 +126,7 @@ ipsec_sa_size(uint64_t type, uint32_t *wnd_sz, uint32_t *nb_bucket)
>  		/*
>  		 * RFC 4303 recommends 64 as minimum window size.
>  		 * there is no point to use ESN mode without SQN window,
> -		 * so make sure we have at least 64 window when ESN is enalbed.
> +		 * so make sure we have at least 64 window when ESN is enabled.
>  		 */
>  		wsz = ((type & RTE_IPSEC_SATP_ESN_MASK) ==
>  			RTE_IPSEC_SATP_ESN_DISABLE) ?
> diff --git a/lib/ipsec/sa.h b/lib/ipsec/sa.h
> index 1bffe751f586..b8ce4e958119 100644
> --- a/lib/ipsec/sa.h
> +++ b/lib/ipsec/sa.h
> @@ -116,7 +116,7 @@ struct rte_ipsec_sa {
>  	 * In case of SA handled by multiple threads *sqn* cacheline
>  	 * could be shared by multiple cores.
>  	 * To minimise performance impact, we try to locate in a separate
> -	 * place from other frequently accesed data.
> +	 * place from other frequently accessed data.
>  	 */
>  	union {
>  		uint64_t outb;
> --

Acked-by: Konstantin Ananyev <konstantin.ananyev@intel.com>

> 2.30.2
  

Patch

diff --git a/lib/ipsec/esp_inb.c b/lib/ipsec/esp_inb.c
index 2b1df6a032a8..846fc0ea71a2 100644
--- a/lib/ipsec/esp_inb.c
+++ b/lib/ipsec/esp_inb.c
@@ -415,7 +415,7 @@  trs_process_check(struct rte_mbuf *mb, struct rte_mbuf **ml,
 
 /*
  * packet checks for tunnel mode:
- * - same as for trasnport mode
+ * - same as for transport mode
  * - esp tail next proto contains expected for that SA value
  */
 static inline int32_t
@@ -501,7 +501,7 @@  trs_process_step3(struct rte_mbuf *mb)
 static inline void
 tun_process_step3(struct rte_mbuf *mb, uint64_t txof_msk, uint64_t txof_val)
 {
-	/* reset mbuf metatdata: L2/L3 len, packet type */
+	/* reset mbuf metadata: L2/L3 len, packet type */
 	mb->packet_type = RTE_PTYPE_UNKNOWN;
 	mb->tx_offload = (mb->tx_offload & txof_msk) | txof_val;
 
diff --git a/lib/ipsec/esp_outb.c b/lib/ipsec/esp_outb.c
index 1e181cf2cee4..0bf3cd6bd4da 100644
--- a/lib/ipsec/esp_outb.c
+++ b/lib/ipsec/esp_outb.c
@@ -525,7 +525,7 @@  cpu_outb_trs_pkt_prepare(const struct rte_ipsec_session *ss,
 
 /*
  * process outbound packets for SA with ESN support,
- * for algorithms that require SQN.hibits to be implictly included
+ * for algorithms that require SQN.hibits to be implicitly included
  * into digest computation.
  * In that case we have to move ICV bytes back to their proper place.
  */
diff --git a/lib/ipsec/ipsec_sad.c b/lib/ipsec/ipsec_sad.c
index 3f9533c80a68..531e1e323cdc 100644
--- a/lib/ipsec/ipsec_sad.c
+++ b/lib/ipsec/ipsec_sad.c
@@ -62,7 +62,7 @@  EAL_REGISTER_TAILQ(rte_ipsec_sad_tailq)
  * Inserts a rule into an appropriate hash table,
  * updates the value for a given SPI in SPI_ONLY hash table
  * reflecting presence of more specific rule type in two LSBs.
- * Updates a counter that reflects the number of rules whith the same SPI.
+ * Updates a counter that reflects the number of rules with the same SPI.
  */
 static inline int
 add_specific(struct rte_ipsec_sad *sad, const void *key,
diff --git a/lib/ipsec/sa.c b/lib/ipsec/sa.c
index e59189d215b3..f49b3ec15d4f 100644
--- a/lib/ipsec/sa.c
+++ b/lib/ipsec/sa.c
@@ -126,7 +126,7 @@  ipsec_sa_size(uint64_t type, uint32_t *wnd_sz, uint32_t *nb_bucket)
 		/*
 		 * RFC 4303 recommends 64 as minimum window size.
 		 * there is no point to use ESN mode without SQN window,
-		 * so make sure we have at least 64 window when ESN is enalbed.
+		 * so make sure we have at least 64 window when ESN is enabled.
 		 */
 		wsz = ((type & RTE_IPSEC_SATP_ESN_MASK) ==
 			RTE_IPSEC_SATP_ESN_DISABLE) ?
diff --git a/lib/ipsec/sa.h b/lib/ipsec/sa.h
index 1bffe751f586..b8ce4e958119 100644
--- a/lib/ipsec/sa.h
+++ b/lib/ipsec/sa.h
@@ -116,7 +116,7 @@  struct rte_ipsec_sa {
 	 * In case of SA handled by multiple threads *sqn* cacheline
 	 * could be shared by multiple cores.
 	 * To minimise performance impact, we try to locate in a separate
-	 * place from other frequently accesed data.
+	 * place from other frequently accessed data.
 	 */
 	union {
 		uint64_t outb;