[v2,02/18] ipsec: fix spelling errors
Checks
Commit Message
Lots of typos in comments found by codespell
Signed-off-by: Stephen Hemminger <stephen@networkplumber.org>
---
lib/ipsec/esp_inb.c | 4 ++--
lib/ipsec/esp_outb.c | 2 +-
lib/ipsec/ipsec_sad.c | 2 +-
lib/ipsec/sa.c | 2 +-
lib/ipsec/sa.h | 2 +-
5 files changed, 6 insertions(+), 6 deletions(-)
Comments
> -----Original Message-----
> From: dev <dev-bounces@dpdk.org> On Behalf Of Stephen Hemminger
> Sent: Monday, September 13, 2021 5:10 PM
> To: dev@dpdk.org
> Cc: Stephen Hemminger <stephen@networkplumber.org>
> Subject: [dpdk-dev] [PATCH v2 02/18] ipsec: fix spelling errors
>
> Lots of typos in comments found by codespell
>
> Signed-off-by: Stephen Hemminger <stephen@networkplumber.org>
> ---
> lib/ipsec/esp_inb.c | 4 ++--
> lib/ipsec/esp_outb.c | 2 +-
> lib/ipsec/ipsec_sad.c | 2 +-
> lib/ipsec/sa.c | 2 +-
> lib/ipsec/sa.h | 2 +-
> 5 files changed, 6 insertions(+), 6 deletions(-)
>
> diff --git a/lib/ipsec/esp_inb.c b/lib/ipsec/esp_inb.c
> index 2b1df6a032a8..846fc0ea71a2 100644
> --- a/lib/ipsec/esp_inb.c
> +++ b/lib/ipsec/esp_inb.c
> @@ -415,7 +415,7 @@ trs_process_check(struct rte_mbuf *mb, struct rte_mbuf **ml,
>
> /*
> * packet checks for tunnel mode:
> - * - same as for trasnport mode
> + * - same as for transport mode
> * - esp tail next proto contains expected for that SA value
> */
> static inline int32_t
> @@ -501,7 +501,7 @@ trs_process_step3(struct rte_mbuf *mb)
> static inline void
> tun_process_step3(struct rte_mbuf *mb, uint64_t txof_msk, uint64_t txof_val)
> {
> - /* reset mbuf metatdata: L2/L3 len, packet type */
> + /* reset mbuf metadata: L2/L3 len, packet type */
> mb->packet_type = RTE_PTYPE_UNKNOWN;
> mb->tx_offload = (mb->tx_offload & txof_msk) | txof_val;
>
> diff --git a/lib/ipsec/esp_outb.c b/lib/ipsec/esp_outb.c
> index 1e181cf2cee4..0bf3cd6bd4da 100644
> --- a/lib/ipsec/esp_outb.c
> +++ b/lib/ipsec/esp_outb.c
> @@ -525,7 +525,7 @@ cpu_outb_trs_pkt_prepare(const struct rte_ipsec_session *ss,
>
> /*
> * process outbound packets for SA with ESN support,
> - * for algorithms that require SQN.hibits to be implictly included
> + * for algorithms that require SQN.hibits to be implicitly included
> * into digest computation.
> * In that case we have to move ICV bytes back to their proper place.
> */
> diff --git a/lib/ipsec/ipsec_sad.c b/lib/ipsec/ipsec_sad.c
> index 3f9533c80a68..531e1e323cdc 100644
> --- a/lib/ipsec/ipsec_sad.c
> +++ b/lib/ipsec/ipsec_sad.c
> @@ -62,7 +62,7 @@ EAL_REGISTER_TAILQ(rte_ipsec_sad_tailq)
> * Inserts a rule into an appropriate hash table,
> * updates the value for a given SPI in SPI_ONLY hash table
> * reflecting presence of more specific rule type in two LSBs.
> - * Updates a counter that reflects the number of rules whith the same SPI.
> + * Updates a counter that reflects the number of rules with the same SPI.
> */
> static inline int
> add_specific(struct rte_ipsec_sad *sad, const void *key,
> diff --git a/lib/ipsec/sa.c b/lib/ipsec/sa.c
> index e59189d215b3..f49b3ec15d4f 100644
> --- a/lib/ipsec/sa.c
> +++ b/lib/ipsec/sa.c
> @@ -126,7 +126,7 @@ ipsec_sa_size(uint64_t type, uint32_t *wnd_sz, uint32_t *nb_bucket)
> /*
> * RFC 4303 recommends 64 as minimum window size.
> * there is no point to use ESN mode without SQN window,
> - * so make sure we have at least 64 window when ESN is enalbed.
> + * so make sure we have at least 64 window when ESN is enabled.
> */
> wsz = ((type & RTE_IPSEC_SATP_ESN_MASK) ==
> RTE_IPSEC_SATP_ESN_DISABLE) ?
> diff --git a/lib/ipsec/sa.h b/lib/ipsec/sa.h
> index 1bffe751f586..b8ce4e958119 100644
> --- a/lib/ipsec/sa.h
> +++ b/lib/ipsec/sa.h
> @@ -116,7 +116,7 @@ struct rte_ipsec_sa {
> * In case of SA handled by multiple threads *sqn* cacheline
> * could be shared by multiple cores.
> * To minimise performance impact, we try to locate in a separate
> - * place from other frequently accesed data.
> + * place from other frequently accessed data.
> */
> union {
> uint64_t outb;
> --
Acked-by: Konstantin Ananyev <konstantin.ananyev@intel.com>
> 2.30.2
@@ -415,7 +415,7 @@ trs_process_check(struct rte_mbuf *mb, struct rte_mbuf **ml,
/*
* packet checks for tunnel mode:
- * - same as for trasnport mode
+ * - same as for transport mode
* - esp tail next proto contains expected for that SA value
*/
static inline int32_t
@@ -501,7 +501,7 @@ trs_process_step3(struct rte_mbuf *mb)
static inline void
tun_process_step3(struct rte_mbuf *mb, uint64_t txof_msk, uint64_t txof_val)
{
- /* reset mbuf metatdata: L2/L3 len, packet type */
+ /* reset mbuf metadata: L2/L3 len, packet type */
mb->packet_type = RTE_PTYPE_UNKNOWN;
mb->tx_offload = (mb->tx_offload & txof_msk) | txof_val;
@@ -525,7 +525,7 @@ cpu_outb_trs_pkt_prepare(const struct rte_ipsec_session *ss,
/*
* process outbound packets for SA with ESN support,
- * for algorithms that require SQN.hibits to be implictly included
+ * for algorithms that require SQN.hibits to be implicitly included
* into digest computation.
* In that case we have to move ICV bytes back to their proper place.
*/
@@ -62,7 +62,7 @@ EAL_REGISTER_TAILQ(rte_ipsec_sad_tailq)
* Inserts a rule into an appropriate hash table,
* updates the value for a given SPI in SPI_ONLY hash table
* reflecting presence of more specific rule type in two LSBs.
- * Updates a counter that reflects the number of rules whith the same SPI.
+ * Updates a counter that reflects the number of rules with the same SPI.
*/
static inline int
add_specific(struct rte_ipsec_sad *sad, const void *key,
@@ -126,7 +126,7 @@ ipsec_sa_size(uint64_t type, uint32_t *wnd_sz, uint32_t *nb_bucket)
/*
* RFC 4303 recommends 64 as minimum window size.
* there is no point to use ESN mode without SQN window,
- * so make sure we have at least 64 window when ESN is enalbed.
+ * so make sure we have at least 64 window when ESN is enabled.
*/
wsz = ((type & RTE_IPSEC_SATP_ESN_MASK) ==
RTE_IPSEC_SATP_ESN_DISABLE) ?
@@ -116,7 +116,7 @@ struct rte_ipsec_sa {
* In case of SA handled by multiple threads *sqn* cacheline
* could be shared by multiple cores.
* To minimise performance impact, we try to locate in a separate
- * place from other frequently accesed data.
+ * place from other frequently accessed data.
*/
union {
uint64_t outb;