Lots of typos in comments found by codespell Signed-off-by: Stephen Hemminger <step...@networkplumber.org> Acked-by: Konstantin Ananyev <konstantin.anan...@intel.com> --- lib/ipsec/esp_inb.c | 4 ++-- lib/ipsec/esp_outb.c | 2 +- lib/ipsec/ipsec_sad.c | 2 +- lib/ipsec/sa.c | 2 +- lib/ipsec/sa.h | 2 +- 5 files changed, 6 insertions(+), 6 deletions(-)
diff --git a/lib/ipsec/esp_inb.c b/lib/ipsec/esp_inb.c index 99e9c43f2f68..636c850fa6a9 100644 --- a/lib/ipsec/esp_inb.c +++ b/lib/ipsec/esp_inb.c @@ -475,7 +475,7 @@ trs_process_check(struct rte_mbuf *mb, struct rte_mbuf **ml, /* * packet checks for tunnel mode: - * - same as for trasnport mode + * - same as for transport mode * - esp tail next proto contains expected for that SA value */ static inline int32_t @@ -561,7 +561,7 @@ trs_process_step3(struct rte_mbuf *mb) static inline void tun_process_step3(struct rte_mbuf *mb, uint64_t txof_msk, uint64_t txof_val) { - /* reset mbuf metatdata: L2/L3 len, packet type */ + /* reset mbuf metadata: L2/L3 len, packet type */ mb->packet_type = RTE_PTYPE_UNKNOWN; mb->tx_offload = (mb->tx_offload & txof_msk) | txof_val; diff --git a/lib/ipsec/esp_outb.c b/lib/ipsec/esp_outb.c index b7a70fd00186..672e56aba084 100644 --- a/lib/ipsec/esp_outb.c +++ b/lib/ipsec/esp_outb.c @@ -614,7 +614,7 @@ cpu_outb_trs_pkt_prepare(const struct rte_ipsec_session *ss, /* * process outbound packets for SA with ESN support, - * for algorithms that require SQN.hibits to be implictly included + * for algorithms that require SQN.hibits to be implicitly included * into digest computation. * In that case we have to move ICV bytes back to their proper place. */ diff --git a/lib/ipsec/ipsec_sad.c b/lib/ipsec/ipsec_sad.c index 3f9533c80a68..531e1e323cdc 100644 --- a/lib/ipsec/ipsec_sad.c +++ b/lib/ipsec/ipsec_sad.c @@ -62,7 +62,7 @@ EAL_REGISTER_TAILQ(rte_ipsec_sad_tailq) * Inserts a rule into an appropriate hash table, * updates the value for a given SPI in SPI_ONLY hash table * reflecting presence of more specific rule type in two LSBs. - * Updates a counter that reflects the number of rules whith the same SPI. + * Updates a counter that reflects the number of rules with the same SPI. */ static inline int add_specific(struct rte_ipsec_sad *sad, const void *key, diff --git a/lib/ipsec/sa.c b/lib/ipsec/sa.c index a19819f9f179..1e51482c9242 100644 --- a/lib/ipsec/sa.c +++ b/lib/ipsec/sa.c @@ -136,7 +136,7 @@ ipsec_sa_size(uint64_t type, uint32_t *wnd_sz, uint32_t *nb_bucket) /* * RFC 4303 recommends 64 as minimum window size. * there is no point to use ESN mode without SQN window, - * so make sure we have at least 64 window when ESN is enalbed. + * so make sure we have at least 64 window when ESN is enabled. */ wsz = ((type & RTE_IPSEC_SATP_ESN_MASK) == RTE_IPSEC_SATP_ESN_DISABLE) ? diff --git a/lib/ipsec/sa.h b/lib/ipsec/sa.h index 6e59f18e1602..7503587b5004 100644 --- a/lib/ipsec/sa.h +++ b/lib/ipsec/sa.h @@ -122,7 +122,7 @@ struct rte_ipsec_sa { * In case of SA handled by multiple threads *sqn* cacheline * could be shared by multiple cores. * To minimise performance impact, we try to locate in a separate - * place from other frequently accesed data. + * place from other frequently accessed data. */ union { uint64_t outb; -- 2.30.2