On 12/11/2021 01:02, Stephen Hemminger wrote:
Lots of typos in comments found by codespell

Signed-off-by: Stephen Hemminger <step...@networkplumber.org>
Acked-by: Konstantin Ananyev <konstantin.anan...@intel.com>
---
  lib/ipsec/esp_inb.c   | 4 ++--
  lib/ipsec/esp_outb.c  | 2 +-
  lib/ipsec/ipsec_sad.c | 2 +-
  lib/ipsec/sa.c        | 2 +-
  lib/ipsec/sa.h        | 2 +-
  5 files changed, 6 insertions(+), 6 deletions(-)

diff --git a/lib/ipsec/esp_inb.c b/lib/ipsec/esp_inb.c
index 99e9c43f2f68..636c850fa6a9 100644
--- a/lib/ipsec/esp_inb.c
+++ b/lib/ipsec/esp_inb.c
@@ -475,7 +475,7 @@ trs_process_check(struct rte_mbuf *mb, struct rte_mbuf **ml,
/*
   * packet checks for tunnel mode:
- * - same as for trasnport mode
+ * - same as for transport mode
   * - esp tail next proto contains expected for that SA value
   */
  static inline int32_t
@@ -561,7 +561,7 @@ trs_process_step3(struct rte_mbuf *mb)
  static inline void
  tun_process_step3(struct rte_mbuf *mb, uint64_t txof_msk, uint64_t txof_val)
  {
-       /* reset mbuf metatdata: L2/L3 len, packet type */
+       /* reset mbuf metadata: L2/L3 len, packet type */
        mb->packet_type = RTE_PTYPE_UNKNOWN;
        mb->tx_offload = (mb->tx_offload & txof_msk) | txof_val;
diff --git a/lib/ipsec/esp_outb.c b/lib/ipsec/esp_outb.c
index b7a70fd00186..672e56aba084 100644
--- a/lib/ipsec/esp_outb.c
+++ b/lib/ipsec/esp_outb.c
@@ -614,7 +614,7 @@ cpu_outb_trs_pkt_prepare(const struct rte_ipsec_session *ss,
/*
   * process outbound packets for SA with ESN support,
- * for algorithms that require SQN.hibits to be implictly included
+ * for algorithms that require SQN.hibits to be implicitly included
   * into digest computation.
   * In that case we have to move ICV bytes back to their proper place.
   */
diff --git a/lib/ipsec/ipsec_sad.c b/lib/ipsec/ipsec_sad.c
index 3f9533c80a68..531e1e323cdc 100644
--- a/lib/ipsec/ipsec_sad.c
+++ b/lib/ipsec/ipsec_sad.c
@@ -62,7 +62,7 @@ EAL_REGISTER_TAILQ(rte_ipsec_sad_tailq)
   * Inserts a rule into an appropriate hash table,
   * updates the value for a given SPI in SPI_ONLY hash table
   * reflecting presence of more specific rule type in two LSBs.
- * Updates a counter that reflects the number of rules whith the same SPI.
+ * Updates a counter that reflects the number of rules with the same SPI.
   */
  static inline int
  add_specific(struct rte_ipsec_sad *sad, const void *key,
diff --git a/lib/ipsec/sa.c b/lib/ipsec/sa.c
index a19819f9f179..1e51482c9242 100644
--- a/lib/ipsec/sa.c
+++ b/lib/ipsec/sa.c
@@ -136,7 +136,7 @@ ipsec_sa_size(uint64_t type, uint32_t *wnd_sz, uint32_t 
*nb_bucket)
                /*
                 * RFC 4303 recommends 64 as minimum window size.
                 * there is no point to use ESN mode without SQN window,
-                * so make sure we have at least 64 window when ESN is enalbed.
+                * so make sure we have at least 64 window when ESN is enabled.
                 */
                wsz = ((type & RTE_IPSEC_SATP_ESN_MASK) ==
                        RTE_IPSEC_SATP_ESN_DISABLE) ?
diff --git a/lib/ipsec/sa.h b/lib/ipsec/sa.h
index 6e59f18e1602..7503587b5004 100644
--- a/lib/ipsec/sa.h
+++ b/lib/ipsec/sa.h
@@ -122,7 +122,7 @@ struct rte_ipsec_sa {
         * In case of SA handled by multiple threads *sqn* cacheline
         * could be shared by multiple cores.
         * To minimise performance impact, we try to locate in a separate
-        * place from other frequently accesed data.
+        * place from other frequently accessed data.
         */
        union {
                uint64_t outb;


Acked-by: Vladimir Medvedkin <vladimir.medved...@intel.com>

--
Regards,
Vladimir

Reply via email to