Fix up typos

Ran automated checker for common typos [1]. Most of these changes have
no functional change *except* for `./ci/sim_run.sh` where, previously
the `bootstrap` feature wasn't being selected properly.

I didn't touch anything in the `./ext/` folder as anything in there
should probably be fixed in the upstream repo.

[1] https://github.com/codespell-project/codespell

Signed-off-by: Sam Bristow <sam@bristow.nz>
This commit is contained in:
Sam Bristow 2019-10-30 20:51:35 +13:00 committed by Fabio Utzig
parent 441e997891
commit d0ca0ffc27
10 changed files with 11 additions and 11 deletions

View File

@ -310,7 +310,7 @@ boot_read_swap_state_by_id(int flash_area_id, struct boot_swap_state *state)
* This functions tries to locate the status area after an aborted swap,
* by looking for the magic in the possible locations.
*
* If the magic is sucessfully found, a flash_area * is returned and it
* If the magic is successfully found, a flash_area * is returned and it
* is the responsibility of the called to close it.
*
* @returns 0 on success, -1 on errors

View File

@ -191,7 +191,7 @@ bootutil_cmp_rsasig(mbedtls_rsa_context *ctx, uint8_t *hash, uint32_t hlen,
* The salt length is not known at this point.
*/
/* Step 4. If the rightmost octect of EM does have the value
/* Step 4. If the rightmost octet of EM does have the value
* 0xbc, output inconsistent and stop.
*/
if (em[PSS_EMLEN - 1] != 0xbc) {

View File

@ -383,7 +383,7 @@ boot_write_sz(struct boot_loader_state *state)
}
/*
* Slots are compatible when all sectors that store upto to size of the image
* Slots are compatible when all sectors that store up to to size of the image
* round up to sector size, in both slot's are able to fit in the scratch
* area, and have sizes that are a multiple of each other (powers of two
* presumably!).
@ -915,7 +915,7 @@ boot_check_header_erased(struct boot_loader_state *state, int slot)
* Check that there is a valid image in a slot
*
* @returns
* 0 if image was succesfully validated
* 0 if image was successfully validated
* 1 if no bootloable image was found
* -1 on any errors
*/

View File

@ -29,7 +29,7 @@
* @param type Type of TLV to look for
* @param prot true if TLV has to be stored in the protected area, false otherwise
*
* @returns 0 if the TLV iterator was succesfully started
* @returns 0 if the TLV iterator was successfully started
* -1 on errors
*/
int

View File

@ -127,7 +127,7 @@ config BOOT_UPGRADE_ONLY
uses a much simpler code path.
config BOOT_BOOTSTRAP
bool "Boostrap erased the primary slot from the secondary slot"
bool "Bootstrap erased the primary slot from the secondary slot"
default n
help
If y, enables bootstraping support. Bootstrapping allows an erased

View File

@ -77,7 +77,7 @@ int flash_area_id_to_multi_image_slot(int image_index, int area_id);
int flash_area_sector_from_off(off_t off, struct flash_sector *sector);
/*
* Returns the value expected to be read when accesing any erased
* Returns the value expected to be read when accessing any erased
* flash byte.
*/
uint8_t flash_area_erased_val(const struct flash_area *fap);

View File

@ -17,7 +17,7 @@ pushd sim
EXIT_CODE=0
if [[ ! -z $SINGLE_FEATURES ]]; then
all_features="sig-rsa sig-ecdsa overwrite-only validate-primary-slot enc-rsa enc-kw boostrap"
all_features="sig-rsa sig-ecdsa overwrite-only validate-primary-slot enc-rsa enc-kw bootstrap"
if [[ $SINGLE_FEATURES =~ "none" ]]; then
echo "Running cargo with no features"

View File

@ -42,7 +42,7 @@ It does not protect against the possibility of attaching a JTAG and
reading the internal flash memory, or using some attack vector that
enables dumping the internal flash in any way.
Since decrypting requires a private key (or secret if using symetric
Since decrypting requires a private key (or secret if using symmetric
crypto) to reside inside the device, it is the responsibility of the
device manufacturer to guarantee that this key is already in the device
and not possible to extract.

View File

@ -4,7 +4,7 @@ from imgtool import imgtool_version
setuptools.setup(
name="imgtool",
version=imgtool_version,
author="The MCUboot commiters",
author="The MCUboot committers",
author_email="dev-mcuboot@lists.runtime.co",
description=("MCUboot's image signing and key management"),
license="Apache Software License",

View File

@ -83,7 +83,7 @@ fn esimulatedwrite<T: AsRef<str>>(message: T) -> FlashError {
}
/// An emulated flash device. It is represented as a block of bytes, and a list of the sector
/// mapings.
/// mappings.
#[derive(Clone)]
pub struct SimFlash {
data: Vec<u8>,