From mboxrd@z Thu Jan  1 00:00:00 1970
Return-Path: <dev-bounces@dpdk.org>
Received: from dpdk.org (dpdk.org [92.243.14.124])
	by inbox.dpdk.org (Postfix) with ESMTP id CE4DCA0487
	for <public@inbox.dpdk.org>; Mon,  1 Jul 2019 20:26:52 +0200 (CEST)
Received: from [92.243.14.124] (localhost [127.0.0.1])
	by dpdk.org (Postfix) with ESMTP id A5A691B9CF;
	Mon,  1 Jul 2019 20:26:02 +0200 (CEST)
Received: from mail-pf1-f194.google.com (mail-pf1-f194.google.com
 [209.85.210.194]) by dpdk.org (Postfix) with ESMTP id B43B11B999
 for <dev@dpdk.org>; Mon,  1 Jul 2019 20:25:52 +0200 (CEST)
Received: by mail-pf1-f194.google.com with SMTP id j2so6967888pfe.6
 for <dev@dpdk.org>; Mon, 01 Jul 2019 11:25:52 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=networkplumber-org.20150623.gappssmtp.com; s=20150623;
 h=from:to:cc:subject:date:message-id:in-reply-to:references
 :mime-version:content-transfer-encoding;
 bh=H8h769siiEZ6ceLPayGxZ4iwFoC52ibw7V24RfcXAdc=;
 b=EHs+vTmLhzSMjc2G8lCTej96iSad5/QIpX9qH++cS2TxXdeudXUtCHwUR6t/q4t8ss
 W2AHVTP4CeGSUu0puvZzr/lQGpiFeRNu3ZIr4irWKf8lN+iGTuKE4Wcx6A1Vl0K2kHai
 6rFAsYSj3Qg7x3KkVf8YLMthSirYk4617CjOMiRL9LcQY4RzOT+4MbZHccnrsuZC/3tD
 bk5Wtl8nmVzIA2QEVFDN2kzFx6kVfSpFutP2NrMzDl6i6cmltOj6h/DZUdXOd1lG0cSy
 sTRUZxdnX+trDHGnFmsZv/XUtkOiqc7fdHe3+Ot3kd/5/ZcE+krxewJVwHl3+DiB2Grr
 T0tA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to
 :references:mime-version:content-transfer-encoding;
 bh=H8h769siiEZ6ceLPayGxZ4iwFoC52ibw7V24RfcXAdc=;
 b=ZmRPVjb5U2D4dmzQGMdXG+4h+dat3x9zLv+uutpp4iQa7TWv2LyVerJ4c4E522/sTY
 wRlu/MPHrB/WWZlFJRGhIPuUuNhgJtx2CpLo7xQaEcqoZgZmePyKmcW7/u+8YnK6I6tJ
 Wl7IBY95TMH03cJOcFZ4A4mJGdDKeez1dJcZdXoD/AvAa8pAEB7+MhsOJll5dOe6KvBA
 63gBn2k/thkIQgfEfGIgUh9a1uJigtv5oOY1SGe32UnQXwDjsQVct2s+8ag6tHRe74fx
 sqtVDIwktYHr84k9TqaLFDLOA+GyKDr/6CrhIgjq0Nbgqaqw7wB+6QE01+7Tybf47lSK
 Lc9g==
X-Gm-Message-State: APjAAAUw7q/97C000dF5GxVmNLvSfs7ZXpipSvxzqHJ5Rpv9u6CHh8Y/
 G5PSR2XhEkYV2KDSMK94Cs+rYjRQ
X-Google-Smtp-Source: APXvYqxJDvc9ucR8YdjuMP/sQiD15X56QA0ejPpa/MIxYu/bchBA2oHJBne4Oz2VtFl3rx1b535zfg==
X-Received: by 2002:a17:90a:730b:: with SMTP id
 m11mr675140pjk.89.1562005551632; 
 Mon, 01 Jul 2019 11:25:51 -0700 (PDT)
Received: from hermes.lan (204-195-22-127.wavecable.com. [204.195.22.127])
 by smtp.gmail.com with ESMTPSA id 12sm11397340pfi.60.2019.07.01.11.25.50
 (version=TLS1_3 cipher=AEAD-AES256-GCM-SHA384 bits=256/256);
 Mon, 01 Jul 2019 11:25:50 -0700 (PDT)
From: Stephen Hemminger <stephen@networkplumber.org>
To: dev@dpdk.org
Cc: Stephen Hemminger <stephen@networkplumber.org>
Date: Mon,  1 Jul 2019 11:25:13 -0700
Message-Id: <20190701182536.20110-8-stephen@networkplumber.org>
X-Mailer: git-send-email 2.20.1
In-Reply-To: <20190701182536.20110-1-stephen@networkplumber.org>
References: <20190701182536.20110-1-stephen@networkplumber.org>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Subject: [dpdk-dev] [PATCH 07/30] ipsec: fix spelling errors
X-BeenThere: dev@dpdk.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: DPDK patches and discussions <dev.dpdk.org>
List-Unsubscribe: <https://mails.dpdk.org/options/dev>,
 <mailto:dev-request@dpdk.org?subject=unsubscribe>
List-Archive: <http://mails.dpdk.org/archives/dev/>
List-Post: <mailto:dev@dpdk.org>
List-Help: <mailto:dev-request@dpdk.org?subject=help>
List-Subscribe: <https://mails.dpdk.org/listinfo/dev>,
 <mailto:dev-request@dpdk.org?subject=subscribe>
Errors-To: dev-bounces@dpdk.org
Sender: "dev" <dev-bounces@dpdk.org>

Spelling error found by codespell

Signed-off-by: Stephen Hemminger <stephen@networkplumber.org>
---
 examples/ipsec-secgw/parser.c            | 2 +-
 examples/ipsec-secgw/test/linux_test4.sh | 4 ++--
 examples/ipsec-secgw/test/linux_test6.sh | 4 ++--
 lib/librte_ipsec/esp_inb.c               | 2 +-
 lib/librte_ipsec/sa.c                    | 2 +-
 lib/librte_ipsec/sa.h                    | 4 ++--
 6 files changed, 9 insertions(+), 9 deletions(-)

diff --git a/examples/ipsec-secgw/parser.c b/examples/ipsec-secgw/parser.c
index fc8c238fe5a5..6dd3081ffcf4 100644
--- a/examples/ipsec-secgw/parser.c
+++ b/examples/ipsec-secgw/parser.c
@@ -506,7 +506,7 @@ cfg_parse_neigh(void *parsed_result, __rte_unused struct cmdline *cl,
 	rc = parse_mac(res->mac, &mac);
 	APP_CHECK(rc == 0, st, "invalid ether addr:%s", res->mac);
 	rc = add_dst_ethaddr(res->port, &mac);
-	APP_CHECK(rc == 0, st, "invalid port numer:%hu", res->port);
+	APP_CHECK(rc == 0, st, "invalid port number:%hu", res->port);
 	if (st->status < 0)
 		return;
 }
diff --git a/examples/ipsec-secgw/test/linux_test4.sh b/examples/ipsec-secgw/test/linux_test4.sh
index d636f560482d..01a2bea4050d 100644
--- a/examples/ipsec-secgw/test/linux_test4.sh
+++ b/examples/ipsec-secgw/test/linux_test4.sh
@@ -5,7 +5,7 @@
 # ipsec-secgw (IPv4 mode) functional test script.
 #
 # Note that for most of them you required appropriate crypto PMD/device
-# to be avaialble.
+# to be available.
 # Also user has to setup properly the following environment variables:
 #  SGW_PATH - path to the ipsec-secgw binary to test
 #  REMOTE_HOST - ip/hostname of the DUT
@@ -33,7 +33,7 @@
 # I.E:
 # DUT OS(NIC1)--(ipsec)-->(NIC1)ipsec-secgw(TAP)--(plain)-->(TAP)SUT OS
 # SUT OS(TAP)--(plain)-->(TAP)psec-secgw(NIC1)--(ipsec)-->(NIC1)DUT OS
-# Then tries to perorm some data transfer using the scheme decribed above.
+# Then tries to perform some data transfer using the scheme described above.
 #
 
 DIR=`dirname $0`
diff --git a/examples/ipsec-secgw/test/linux_test6.sh b/examples/ipsec-secgw/test/linux_test6.sh
index e30f607d8c1b..66655006a336 100644
--- a/examples/ipsec-secgw/test/linux_test6.sh
+++ b/examples/ipsec-secgw/test/linux_test6.sh
@@ -5,7 +5,7 @@
 # ipsec-secgw (IPv6 mode) functional test script.
 #
 # Note that for most of them you required appropriate crypto PMD/device
-# to be avaialble.
+# to be available.
 # Also user has to setup properly the following environment variables:
 #  SGW_PATH - path to the ipsec-secgw binary to test
 #  REMOTE_HOST - ip/hostname of the DUT
@@ -34,7 +34,7 @@
 # I.E:
 # DUT OS(NIC1)--(ipsec)-->(NIC1)ipsec-secgw(TAP)--(plain)-->(TAP)SUT OS
 # SUT OS(TAP)--(plain)-->(TAP)psec-secgw(NIC1)--(ipsec)-->(NIC1)DUT OS
-# Then tries to perorm some data transfer using the scheme decribed above.
+# Then tries to perform some data transfer using the scheme described above.
 #
 
 DIR=`dirname $0`
diff --git a/lib/librte_ipsec/esp_inb.c b/lib/librte_ipsec/esp_inb.c
index 3e12ca1030f0..7f296cd247dd 100644
--- a/lib/librte_ipsec/esp_inb.c
+++ b/lib/librte_ipsec/esp_inb.c
@@ -359,7 +359,7 @@ trs_process_step3(struct rte_mbuf *mb)
 static inline void
 tun_process_step3(struct rte_mbuf *mb, uint64_t txof_msk, uint64_t txof_val)
 {
-	/* reset mbuf metatdata: L2/L3 len, packet type */
+	/* reset mbuf metadata: L2/L3 len, packet type */
 	mb->packet_type = RTE_PTYPE_UNKNOWN;
 	mb->tx_offload = (mb->tx_offload & txof_msk) | txof_val;
 
diff --git a/lib/librte_ipsec/sa.c b/lib/librte_ipsec/sa.c
index 81e3437bb5e4..cede034bb8af 100644
--- a/lib/librte_ipsec/sa.c
+++ b/lib/librte_ipsec/sa.c
@@ -126,7 +126,7 @@ ipsec_sa_size(uint64_t type, uint32_t *wnd_sz, uint32_t *nb_bucket)
 		/*
 		 * RFC 4303 recommends 64 as minimum window size.
 		 * there is no point to use ESN mode without SQN window,
-		 * so make sure we have at least 64 window when ESN is enalbed.
+		 * so make sure we have at least 64 window when ESN is enabled.
 		 */
 		wsz = ((type & RTE_IPSEC_SATP_ESN_MASK) ==
 			RTE_IPSEC_SATP_ESN_DISABLE) ?
diff --git a/lib/librte_ipsec/sa.h b/lib/librte_ipsec/sa.h
index ffb5fb4f8c32..b142e61d65a4 100644
--- a/lib/librte_ipsec/sa.h
+++ b/lib/librte_ipsec/sa.h
@@ -111,8 +111,8 @@ struct rte_ipsec_sa {
 	 * sqn and replay window
 	 * In case of SA handled by multiple threads *sqn* cacheline
 	 * could be shared by multiple cores.
-	 * To minimise perfomance impact, we try to locate in a separate
-	 * place from other frequently accesed data.
+	 * To minimize performance impact, we try to locate in a separate
+	 * place from other frequently accessed data.
 	 */
 	union {
 		union {
-- 
2.20.1