Re: [PATCH 17/24] Documentation: security: correct spelling

From: Jarkko Sakkinen
Date: Thu Feb 09 2023 - 22:55:09 EST


On Wed, Feb 08, 2023 at 11:13:53PM -0800, Randy Dunlap wrote:
> Correct spelling problems for Documentation/security/ as reported
> by codespell.
>
> Signed-off-by: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
> Cc: David Howells <dhowells@xxxxxxxxxx>
> Cc: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
> Cc: keyrings@xxxxxxxxxxxxxxx
> Cc: Paul Moore <paul@xxxxxxxxxxxxxx>
> Cc: James Morris <jmorris@xxxxxxxxx>
> Cc: "Serge E. Hallyn" <serge@xxxxxxxxxx>
> Cc: linux-security-module@xxxxxxxxxxxxxxx
> Cc: Jonathan Corbet <corbet@xxxxxxx>
> Cc: linux-doc@xxxxxxxxxxxxxxx
> Reviewed-by: David Howells <dhowells@xxxxxxxxxx>
> ---
> Documentation/security/digsig.rst | 4 ++--
> Documentation/security/keys/core.rst | 2 +-
> Documentation/security/secrets/coco.rst | 2 +-
> 3 files changed, 4 insertions(+), 4 deletions(-)
>
> diff -- a/Documentation/security/digsig.rst b/Documentation/security/digsig.rst
> --- a/Documentation/security/digsig.rst
> +++ b/Documentation/security/digsig.rst
> @@ -62,7 +62,7 @@ API currently includes only 1 function::
> * digsig_verify() - digital signature verification with public key
> * @keyring: keyring to search key in
> * @sig: digital signature
> - * @sigen: length of the signature
> + * @siglen: length of the signature
> * @data: data
> * @datalen: length of the data
> * @return: 0 on success, -EINVAL otherwise
> @@ -82,7 +82,7 @@ The signing and key management utilities
> to generate signatures, to load keys into the kernel keyring.
> Keys can be in PEM or converted to the kernel format.
> When the key is added to the kernel keyring, the keyid defines the name
> -of the key: 5D2B05FC633EE3E8 in the example bellow.
> +of the key: 5D2B05FC633EE3E8 in the example below.
>
> Here is example output of the keyctl utility::
>
> diff -- a/Documentation/security/keys/core.rst b/Documentation/security/keys/core.rst
> --- a/Documentation/security/keys/core.rst
> +++ b/Documentation/security/keys/core.rst
> @@ -869,7 +869,7 @@ The keyctl syscall functions are:
>
> - ``char *hashname`` specifies the NUL terminated string identifying
> the hash used from the kernel crypto API and applied for the KDF
> - operation. The KDF implemenation complies with SP800-56A as well
> + operation. The KDF implementation complies with SP800-56A as well
> as with SP800-108 (the counter KDF).
>
> - ``char *otherinfo`` specifies the OtherInfo data as documented in
> diff -- a/Documentation/security/secrets/coco.rst b/Documentation/security/secrets/coco.rst
> --- a/Documentation/security/secrets/coco.rst
> +++ b/Documentation/security/secrets/coco.rst
> @@ -34,7 +34,7 @@ be use it for its own purposes.
>
> During the VM's launch, the virtual machine manager may inject a secret to that
> area. In AMD SEV and SEV-ES this is performed using the
> -``KVM_SEV_LAUNCH_SECRET`` command (see [sev]_). The strucutre of the injected
> +``KVM_SEV_LAUNCH_SECRET`` command (see [sev]_). The structure of the injected
> Guest Owner secret data should be a GUIDed table of secret values; the binary
> format is described in ``drivers/virt/coco/efi_secret/efi_secret.c`` under
> "Structure of the EFI secret area".

Acked-by: Jarkko Sakkinen <jarkko@xxxxxxxxxx>

BR, Jarkko