From patchwork Thu Oct 14 21:56:15 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Stephen Hemminger X-Patchwork-Id: 101694 X-Patchwork-Delegate: thomas@monjalon.net Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id A3843A0C43; Thu, 14 Oct 2021 23:56:47 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 308B041167; Thu, 14 Oct 2021 23:56:41 +0200 (CEST) Received: from mail-pf1-f172.google.com (mail-pf1-f172.google.com [209.85.210.172]) by mails.dpdk.org (Postfix) with ESMTP id 9946D4115A for ; Thu, 14 Oct 2021 23:56:39 +0200 (CEST) Received: by mail-pf1-f172.google.com with SMTP id o133so6640053pfg.7 for ; Thu, 14 Oct 2021 14:56:39 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=networkplumber-org.20210112.gappssmtp.com; s=20210112; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=68PqXronH5Ha32OU8EzqzS+FSe9lZsYsbh5J8RYm7ok=; b=lW8RhbwPihbLk5JBRzG3bAQUpGXO2iEDHaTGL43AyopH1u81V+ObBAdZuvt6IY1Tdx kD7vglBMuzS1JaLa9GoH5DU6aK29/TQUSQpLDyDGzOwZfH0t3YeA0neN+1IIh0+ktGeJ S5693DcTP3zzwcA4JmBo3XOX8OPG7kQhq3ic5jycrlp2/BK/WdLaTMf5yLpikez/RI4N lbt8OMjMTrkvk+9653XYw0ajDWHD4MNckXpXo5sOx+UhVJiJjtaam+eTuyD0qJLRQcbn ZNAjqgOHVieyBCf5yMC3uQA19GzhcCGBNoVfo8x90N34UNUJcDcuMcAw69IF7fdEEWf1 I46A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=68PqXronH5Ha32OU8EzqzS+FSe9lZsYsbh5J8RYm7ok=; b=gVpTJhHgI/uiSgqAXse0mZ2NwJDN3UCy/moc+N9rUqKqYHjui5O6ko5bK0Ev6eLFYI OM+Ivn5I2a3AgwPpZ5c0qbdwUkwYqlvkpSEYfgNMBB3tXu9xsI/YBglDrHcL7rD1YBWd Es0VSHspSmtU4ivubmJ0zPRCbGQlB9+q1DbMwvqxO06m5fHPkg5WOFUFBjskf7bKsKsy W9MzH5yNbDj3x+ZJvst1KvikLzev5UQnSOwz0TGvNvqrMmBY3ghmnEIZjbVgb4Txq8Ix fEglDPR537T4rl7TbI/sgNoFXYk5ScHk8QihJw/oISAEk5k5RBM8eX+3BRgu44AxpR96 Ij7A== X-Gm-Message-State: AOAM533BaUQayJ6GzbMgKggB9mUTbVuXtVDBzXizkeTW5NFpDPynD0CN vRuaYW4HwzCl9ojfQ8YrAgmsfw9RtoaEvw== X-Google-Smtp-Source: ABdhPJx3pI3Sah3jznwoH8uaqP85CEza/c5EtEOINksn/quIVt8ocgYec0PRiFOgfNUH0rH3SgcvEQ== X-Received: by 2002:a05:6a00:1707:b0:44d:47e1:9ffe with SMTP id h7-20020a056a00170700b0044d47e19ffemr7880968pfc.53.1634248598459; Thu, 14 Oct 2021 14:56:38 -0700 (PDT) Received: from hermes.local (204-195-33-123.wavecable.com. [204.195.33.123]) by smtp.gmail.com with ESMTPSA id h13sm3076741pgf.14.2021.10.14.14.56.37 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 14 Oct 2021 14:56:37 -0700 (PDT) From: Stephen Hemminger To: dev@dpdk.org Cc: Stephen Hemminger , Konstantin Ananyev , Bernard Iremonger , Vladimir Medvedkin Date: Thu, 14 Oct 2021 14:56:15 -0700 Message-Id: <20211014215631.181747-3-stephen@networkplumber.org> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20211014215631.181747-1-stephen@networkplumber.org> References: <20210909175648.174258-1-stephen@networkplumber.org> <20211014215631.181747-1-stephen@networkplumber.org> MIME-Version: 1.0 Subject: [dpdk-dev] [PATCH v3 02/18] ipsec: fix spelling errors X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" Lots of typos in comments found by codespell Signed-off-by: Stephen Hemminger Acked-by: Konstantin Ananyev --- lib/ipsec/esp_inb.c | 4 ++-- lib/ipsec/esp_outb.c | 2 +- lib/ipsec/ipsec_sad.c | 2 +- lib/ipsec/sa.c | 2 +- lib/ipsec/sa.h | 2 +- 5 files changed, 6 insertions(+), 6 deletions(-) diff --git a/lib/ipsec/esp_inb.c b/lib/ipsec/esp_inb.c index 2b1df6a032a8..846fc0ea71a2 100644 --- a/lib/ipsec/esp_inb.c +++ b/lib/ipsec/esp_inb.c @@ -415,7 +415,7 @@ trs_process_check(struct rte_mbuf *mb, struct rte_mbuf **ml, /* * packet checks for tunnel mode: - * - same as for trasnport mode + * - same as for transport mode * - esp tail next proto contains expected for that SA value */ static inline int32_t @@ -501,7 +501,7 @@ trs_process_step3(struct rte_mbuf *mb) static inline void tun_process_step3(struct rte_mbuf *mb, uint64_t txof_msk, uint64_t txof_val) { - /* reset mbuf metatdata: L2/L3 len, packet type */ + /* reset mbuf metadata: L2/L3 len, packet type */ mb->packet_type = RTE_PTYPE_UNKNOWN; mb->tx_offload = (mb->tx_offload & txof_msk) | txof_val; diff --git a/lib/ipsec/esp_outb.c b/lib/ipsec/esp_outb.c index 1e181cf2cee4..0bf3cd6bd4da 100644 --- a/lib/ipsec/esp_outb.c +++ b/lib/ipsec/esp_outb.c @@ -525,7 +525,7 @@ cpu_outb_trs_pkt_prepare(const struct rte_ipsec_session *ss, /* * process outbound packets for SA with ESN support, - * for algorithms that require SQN.hibits to be implictly included + * for algorithms that require SQN.hibits to be implicitly included * into digest computation. * In that case we have to move ICV bytes back to their proper place. */ diff --git a/lib/ipsec/ipsec_sad.c b/lib/ipsec/ipsec_sad.c index 3f9533c80a68..531e1e323cdc 100644 --- a/lib/ipsec/ipsec_sad.c +++ b/lib/ipsec/ipsec_sad.c @@ -62,7 +62,7 @@ EAL_REGISTER_TAILQ(rte_ipsec_sad_tailq) * Inserts a rule into an appropriate hash table, * updates the value for a given SPI in SPI_ONLY hash table * reflecting presence of more specific rule type in two LSBs. - * Updates a counter that reflects the number of rules whith the same SPI. + * Updates a counter that reflects the number of rules with the same SPI. */ static inline int add_specific(struct rte_ipsec_sad *sad, const void *key, diff --git a/lib/ipsec/sa.c b/lib/ipsec/sa.c index e59189d215b3..f49b3ec15d4f 100644 --- a/lib/ipsec/sa.c +++ b/lib/ipsec/sa.c @@ -126,7 +126,7 @@ ipsec_sa_size(uint64_t type, uint32_t *wnd_sz, uint32_t *nb_bucket) /* * RFC 4303 recommends 64 as minimum window size. * there is no point to use ESN mode without SQN window, - * so make sure we have at least 64 window when ESN is enalbed. + * so make sure we have at least 64 window when ESN is enabled. */ wsz = ((type & RTE_IPSEC_SATP_ESN_MASK) == RTE_IPSEC_SATP_ESN_DISABLE) ? diff --git a/lib/ipsec/sa.h b/lib/ipsec/sa.h index 1bffe751f586..b8ce4e958119 100644 --- a/lib/ipsec/sa.h +++ b/lib/ipsec/sa.h @@ -116,7 +116,7 @@ struct rte_ipsec_sa { * In case of SA handled by multiple threads *sqn* cacheline * could be shared by multiple cores. * To minimise performance impact, we try to locate in a separate - * place from other frequently accesed data. + * place from other frequently accessed data. */ union { uint64_t outb;