From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from dpdk.org (dpdk.org [92.243.14.124]) by inbox.dpdk.org (Postfix) with ESMTP id CE4DCA0487 for ; Mon, 1 Jul 2019 20:26:52 +0200 (CEST) Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id A5A691B9CF; Mon, 1 Jul 2019 20:26:02 +0200 (CEST) Received: from mail-pf1-f194.google.com (mail-pf1-f194.google.com [209.85.210.194]) by dpdk.org (Postfix) with ESMTP id B43B11B999 for ; Mon, 1 Jul 2019 20:25:52 +0200 (CEST) Received: by mail-pf1-f194.google.com with SMTP id j2so6967888pfe.6 for ; Mon, 01 Jul 2019 11:25:52 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=networkplumber-org.20150623.gappssmtp.com; s=20150623; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=H8h769siiEZ6ceLPayGxZ4iwFoC52ibw7V24RfcXAdc=; b=EHs+vTmLhzSMjc2G8lCTej96iSad5/QIpX9qH++cS2TxXdeudXUtCHwUR6t/q4t8ss W2AHVTP4CeGSUu0puvZzr/lQGpiFeRNu3ZIr4irWKf8lN+iGTuKE4Wcx6A1Vl0K2kHai 6rFAsYSj3Qg7x3KkVf8YLMthSirYk4617CjOMiRL9LcQY4RzOT+4MbZHccnrsuZC/3tD bk5Wtl8nmVzIA2QEVFDN2kzFx6kVfSpFutP2NrMzDl6i6cmltOj6h/DZUdXOd1lG0cSy sTRUZxdnX+trDHGnFmsZv/XUtkOiqc7fdHe3+Ot3kd/5/ZcE+krxewJVwHl3+DiB2Grr T0tA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=H8h769siiEZ6ceLPayGxZ4iwFoC52ibw7V24RfcXAdc=; b=ZmRPVjb5U2D4dmzQGMdXG+4h+dat3x9zLv+uutpp4iQa7TWv2LyVerJ4c4E522/sTY wRlu/MPHrB/WWZlFJRGhIPuUuNhgJtx2CpLo7xQaEcqoZgZmePyKmcW7/u+8YnK6I6tJ Wl7IBY95TMH03cJOcFZ4A4mJGdDKeez1dJcZdXoD/AvAa8pAEB7+MhsOJll5dOe6KvBA 63gBn2k/thkIQgfEfGIgUh9a1uJigtv5oOY1SGe32UnQXwDjsQVct2s+8ag6tHRe74fx sqtVDIwktYHr84k9TqaLFDLOA+GyKDr/6CrhIgjq0Nbgqaqw7wB+6QE01+7Tybf47lSK Lc9g== X-Gm-Message-State: APjAAAUw7q/97C000dF5GxVmNLvSfs7ZXpipSvxzqHJ5Rpv9u6CHh8Y/ G5PSR2XhEkYV2KDSMK94Cs+rYjRQ X-Google-Smtp-Source: APXvYqxJDvc9ucR8YdjuMP/sQiD15X56QA0ejPpa/MIxYu/bchBA2oHJBne4Oz2VtFl3rx1b535zfg== X-Received: by 2002:a17:90a:730b:: with SMTP id m11mr675140pjk.89.1562005551632; Mon, 01 Jul 2019 11:25:51 -0700 (PDT) Received: from hermes.lan (204-195-22-127.wavecable.com. [204.195.22.127]) by smtp.gmail.com with ESMTPSA id 12sm11397340pfi.60.2019.07.01.11.25.50 (version=TLS1_3 cipher=AEAD-AES256-GCM-SHA384 bits=256/256); Mon, 01 Jul 2019 11:25:50 -0700 (PDT) From: Stephen Hemminger To: dev@dpdk.org Cc: Stephen Hemminger Date: Mon, 1 Jul 2019 11:25:13 -0700 Message-Id: <20190701182536.20110-8-stephen@networkplumber.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190701182536.20110-1-stephen@networkplumber.org> References: <20190701182536.20110-1-stephen@networkplumber.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Subject: [dpdk-dev] [PATCH 07/30] ipsec: fix spelling errors X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" Spelling error found by codespell Signed-off-by: Stephen Hemminger --- examples/ipsec-secgw/parser.c | 2 +- examples/ipsec-secgw/test/linux_test4.sh | 4 ++-- examples/ipsec-secgw/test/linux_test6.sh | 4 ++-- lib/librte_ipsec/esp_inb.c | 2 +- lib/librte_ipsec/sa.c | 2 +- lib/librte_ipsec/sa.h | 4 ++-- 6 files changed, 9 insertions(+), 9 deletions(-) diff --git a/examples/ipsec-secgw/parser.c b/examples/ipsec-secgw/parser.c index fc8c238fe5a5..6dd3081ffcf4 100644 --- a/examples/ipsec-secgw/parser.c +++ b/examples/ipsec-secgw/parser.c @@ -506,7 +506,7 @@ cfg_parse_neigh(void *parsed_result, __rte_unused struct cmdline *cl, rc = parse_mac(res->mac, &mac); APP_CHECK(rc == 0, st, "invalid ether addr:%s", res->mac); rc = add_dst_ethaddr(res->port, &mac); - APP_CHECK(rc == 0, st, "invalid port numer:%hu", res->port); + APP_CHECK(rc == 0, st, "invalid port number:%hu", res->port); if (st->status < 0) return; } diff --git a/examples/ipsec-secgw/test/linux_test4.sh b/examples/ipsec-secgw/test/linux_test4.sh index d636f560482d..01a2bea4050d 100644 --- a/examples/ipsec-secgw/test/linux_test4.sh +++ b/examples/ipsec-secgw/test/linux_test4.sh @@ -5,7 +5,7 @@ # ipsec-secgw (IPv4 mode) functional test script. # # Note that for most of them you required appropriate crypto PMD/device -# to be avaialble. +# to be available. # Also user has to setup properly the following environment variables: # SGW_PATH - path to the ipsec-secgw binary to test # REMOTE_HOST - ip/hostname of the DUT @@ -33,7 +33,7 @@ # I.E: # DUT OS(NIC1)--(ipsec)-->(NIC1)ipsec-secgw(TAP)--(plain)-->(TAP)SUT OS # SUT OS(TAP)--(plain)-->(TAP)psec-secgw(NIC1)--(ipsec)-->(NIC1)DUT OS -# Then tries to perorm some data transfer using the scheme decribed above. +# Then tries to perform some data transfer using the scheme described above. # DIR=`dirname $0` diff --git a/examples/ipsec-secgw/test/linux_test6.sh b/examples/ipsec-secgw/test/linux_test6.sh index e30f607d8c1b..66655006a336 100644 --- a/examples/ipsec-secgw/test/linux_test6.sh +++ b/examples/ipsec-secgw/test/linux_test6.sh @@ -5,7 +5,7 @@ # ipsec-secgw (IPv6 mode) functional test script. # # Note that for most of them you required appropriate crypto PMD/device -# to be avaialble. +# to be available. # Also user has to setup properly the following environment variables: # SGW_PATH - path to the ipsec-secgw binary to test # REMOTE_HOST - ip/hostname of the DUT @@ -34,7 +34,7 @@ # I.E: # DUT OS(NIC1)--(ipsec)-->(NIC1)ipsec-secgw(TAP)--(plain)-->(TAP)SUT OS # SUT OS(TAP)--(plain)-->(TAP)psec-secgw(NIC1)--(ipsec)-->(NIC1)DUT OS -# Then tries to perorm some data transfer using the scheme decribed above. +# Then tries to perform some data transfer using the scheme described above. # DIR=`dirname $0` diff --git a/lib/librte_ipsec/esp_inb.c b/lib/librte_ipsec/esp_inb.c index 3e12ca1030f0..7f296cd247dd 100644 --- a/lib/librte_ipsec/esp_inb.c +++ b/lib/librte_ipsec/esp_inb.c @@ -359,7 +359,7 @@ trs_process_step3(struct rte_mbuf *mb) static inline void tun_process_step3(struct rte_mbuf *mb, uint64_t txof_msk, uint64_t txof_val) { - /* reset mbuf metatdata: L2/L3 len, packet type */ + /* reset mbuf metadata: L2/L3 len, packet type */ mb->packet_type = RTE_PTYPE_UNKNOWN; mb->tx_offload = (mb->tx_offload & txof_msk) | txof_val; diff --git a/lib/librte_ipsec/sa.c b/lib/librte_ipsec/sa.c index 81e3437bb5e4..cede034bb8af 100644 --- a/lib/librte_ipsec/sa.c +++ b/lib/librte_ipsec/sa.c @@ -126,7 +126,7 @@ ipsec_sa_size(uint64_t type, uint32_t *wnd_sz, uint32_t *nb_bucket) /* * RFC 4303 recommends 64 as minimum window size. * there is no point to use ESN mode without SQN window, - * so make sure we have at least 64 window when ESN is enalbed. + * so make sure we have at least 64 window when ESN is enabled. */ wsz = ((type & RTE_IPSEC_SATP_ESN_MASK) == RTE_IPSEC_SATP_ESN_DISABLE) ? diff --git a/lib/librte_ipsec/sa.h b/lib/librte_ipsec/sa.h index ffb5fb4f8c32..b142e61d65a4 100644 --- a/lib/librte_ipsec/sa.h +++ b/lib/librte_ipsec/sa.h @@ -111,8 +111,8 @@ struct rte_ipsec_sa { * sqn and replay window * In case of SA handled by multiple threads *sqn* cacheline * could be shared by multiple cores. - * To minimise perfomance impact, we try to locate in a separate - * place from other frequently accesed data. + * To minimize performance impact, we try to locate in a separate + * place from other frequently accessed data. */ union { union { -- 2.20.1