aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorMilan Broz <gmazyland@gmail.com>2023-11-29 09:49:55 +0100
committerMilan Broz <gmazyland@gmail.com>2023-11-29 09:49:55 +0100
commite1ef5214e788134303c15764ee1ad25b6817c3df (patch)
tree9a0a643e54bf843bd5a7dd25bb56fc3a0500399c
parentb44c2ce071da669c8907f72f2bbff5081b686e9c (diff)
downloadcryptsetup-e1ef5214e788134303c15764ee1ad25b6817c3df.tar.gz
Fix some typos found by lintian.
-rw-r--r--lib/integrity/integrity.c2
-rw-r--r--lib/libcryptsetup.h6
-rw-r--r--lib/libdevmapper.c2
-rw-r--r--lib/luks2/luks2_token.c2
-rw-r--r--lib/setup.c2
-rw-r--r--lib/utils_dm.h2
-rw-r--r--man/common_options.adoc6
-rw-r--r--man/cryptsetup-luksChangeKey.8.adoc2
-rw-r--r--meson.build2
-rw-r--r--tests/api-test-2.c4
-rw-r--r--tests/api_test.h2
-rw-r--r--tests/fuzz/LUKS2.proto2
-rw-r--r--tests/fuzz/crypt2_load_fuzz.cc2
13 files changed, 18 insertions, 18 deletions
diff --git a/lib/integrity/integrity.c b/lib/integrity/integrity.c
index 100cc555..65595823 100644
--- a/lib/integrity/integrity.c
+++ b/lib/integrity/integrity.c
@@ -418,7 +418,7 @@ int INTEGRITY_format(struct crypt_device *cd,
return -EINVAL;
/*
- * Creates reduced dm-linear maping over data device starting at
+ * Creates reduced dm-linear mapping over data device starting at
* crypt_data_offset(cd) and backing_device_sectors in size.
*/
r = _create_reduced_device(cd, reduced_device_name,
diff --git a/lib/libcryptsetup.h b/lib/libcryptsetup.h
index 008ed726..20e8de99 100644
--- a/lib/libcryptsetup.h
+++ b/lib/libcryptsetup.h
@@ -1184,7 +1184,7 @@ int crypt_keyslot_add_by_volume_key(struct crypt_device *cd,
* @warning CRYPT_VOLUME_KEY_SET flag force updates volume key. It is @b not @b reencryption!
* By doing so you will most probably destroy your ciphertext data device. It's supposed
* to be used only in wrapped keys scheme for key refresh process where real (inner) volume
- * key stays untouched. It may be involed on active @e keyslot which makes the (previously
+ * key stays untouched. It may be involved on active @e keyslot which makes the (previously
* unbound) keyslot new regular keyslot.
*/
int crypt_keyslot_add_by_key(struct crypt_device *cd,
@@ -1429,7 +1429,7 @@ int crypt_keyslot_context_get_type(const struct crypt_keyslot_context *kc);
* @warning CRYPT_VOLUME_KEY_SET flag force updates volume key. It is @b not @b reencryption!
* By doing so you will most probably destroy your ciphertext data device. It's supposed
* to be used only in wrapped keys scheme for key refresh process where real (inner) volume
- * key stays untouched. It may be involed on active @e keyslot which makes the (previously
+ * key stays untouched. It may be involved on active @e keyslot which makes the (previously
* unbound) keyslot new regular keyslot.
*/
int crypt_keyslot_add_by_keyslot_context(struct crypt_device *cd,
@@ -2770,7 +2770,7 @@ const char *crypt_token_external_path(void);
/**
* Override configured external token handlers path for the library.
*
- * @param path Abosulte path (starts with '/') to new external token handlers directory or @e NULL.
+ * @param path Absolute path (starts with '/') to new external token handlers directory or @e NULL.
*
* @note if @e path is @e NULL the external token path is reset to default path.
*
diff --git a/lib/libdevmapper.c b/lib/libdevmapper.c
index a98f199c..28dd3242 100644
--- a/lib/libdevmapper.c
+++ b/lib/libdevmapper.c
@@ -1334,7 +1334,7 @@ static int _dm_create_device(struct crypt_device *cd, const char *name, const ch
r = -dm_task_get_errno(dmt);
if (r == -ENOKEY || r == -EKEYREVOKED || r == -EKEYEXPIRED) {
- /* propagate DM errors around key managament as such */
+ /* propagate DM errors around key management as such */
r = -ENOKEY;
goto out;
}
diff --git a/lib/luks2/luks2_token.c b/lib/luks2/luks2_token.c
index cf3be2be..cb06939c 100644
--- a/lib/luks2/luks2_token.c
+++ b/lib/luks2/luks2_token.c
@@ -678,7 +678,7 @@ static int LUKS2_keyslot_open_by_token(struct crypt_device *cd,
if (!jobj_token_keyslots)
return -EINVAL;
- /* with specific keyslot just ingore priorities and unlock */
+ /* with specific keyslot just ignore priorities and unlock */
if (keyslot != CRYPT_ANY_SLOT) {
log_dbg(cd, "Trying to open keyslot %u with token %d (type %s).",
keyslot, token, json_object_get_string(jobj_type));
diff --git a/lib/setup.c b/lib/setup.c
index 358fd956..b4455fe5 100644
--- a/lib/setup.c
+++ b/lib/setup.c
@@ -2295,7 +2295,7 @@ static int opal_topology_alignment(struct crypt_device *cd,
else
*ret_alignment_bytes = size_round_up(default_alignment_bytes, opal_block_bytes * opal_alignment_granularity_blocks);
- /* data offset is not set, calculate proper aligment */
+ /* data offset is not set, calculate proper alignment */
*ret_alignment_offset_bytes = (partition_offset_sectors * SECTOR_SIZE) % (opal_block_bytes * opal_alignment_granularity_blocks);
if (*ret_alignment_offset_bytes)
*ret_alignment_offset_bytes = opal_block_bytes * opal_alignment_granularity_blocks - *ret_alignment_offset_bytes;
diff --git a/lib/utils_dm.h b/lib/utils_dm.h
index d5eadbdd..5fbd74f5 100644
--- a/lib/utils_dm.h
+++ b/lib/utils_dm.h
@@ -72,7 +72,7 @@ static inline uint32_t act2dmflags(uint32_t act_flags)
#define DM_INTEGRITY_DISCARDS_SUPPORTED (1 << 23) /* dm-integrity discards/TRIM option is supported */
#define DM_INTEGRITY_RESIZE_SUPPORTED (1 << 23) /* dm-integrity resize of the integrity device supported (introduced in the same version as discards)*/
#define DM_VERITY_PANIC_CORRUPTION_SUPPORTED (1 << 24) /* dm-verity panic on corruption */
-#define DM_CRYPT_NO_WORKQUEUE_SUPPORTED (1 << 25) /* dm-crypt suppot for bypassing workqueues */
+#define DM_CRYPT_NO_WORKQUEUE_SUPPORTED (1 << 25) /* dm-crypt support for bypassing workqueues */
#define DM_INTEGRITY_FIX_HMAC_SUPPORTED (1 << 26) /* hmac covers also superblock */
#define DM_INTEGRITY_RESET_RECALC_SUPPORTED (1 << 27) /* dm-integrity automatic recalculation supported */
#define DM_VERITY_TASKLETS_SUPPORTED (1 << 28) /* dm-verity tasklets supported */
diff --git a/man/common_options.adoc b/man/common_options.adoc
index bc6fb57f..497d7fda 100644
--- a/man/common_options.adoc
+++ b/man/common_options.adoc
@@ -843,10 +843,10 @@ endif::[]
ifdef::ACTION_OPEN,ACTION_LUKSRESUME[]
*--link-vk-to-keyring* _<keyring_description>::<key_description>_::
Link volume key in a keyring with specified key name. The volume key is linked only
-if requested action is successfuly finished.
+if requested action is successfully finished.
+
_<keyring_description>_ string has to contain existing kernel keyring
-description. The keyring name may be optionaly prefixed with "%:" or "%keyring:" type descriptions.
+description. The keyring name may be optionally prefixed with "%:" or "%keyring:" type descriptions.
Or, the keyring may also be specified directly by numeric key id. Also special keyring notations
starting with "@" may be used to select existing predefined kernel keyrings.
+
@@ -871,7 +871,7 @@ endif::[]
ifdef::ACTION_OPEN,ACTION_RESIZE,ACTION_LUKSRESUME,ACTION_TOKEN,ACTION_LUKSADDKEY[]
*--token-id*::
ifndef::ACTION_TOKEN,ACTION_LUKSADDKEY[]
-Specify what token to use and allow token PIN prompt to take precedence over interative
+Specify what token to use and allow token PIN prompt to take precedence over interactive
keyslot passphrase prompt. If omitted, all available tokens (not protected by PIN)
will be checked before proceeding further with passphrase prompt.
endif::[]
diff --git a/man/cryptsetup-luksChangeKey.8.adoc b/man/cryptsetup-luksChangeKey.8.adoc
index f4123959..23376c0c 100644
--- a/man/cryptsetup-luksChangeKey.8.adoc
+++ b/man/cryptsetup-luksChangeKey.8.adoc
@@ -31,7 +31,7 @@ overwritten directly.
*WARNING:* If a key-slot is overwritten, a media failure during this
operation can cause the overwrite to fail after the old passphrase has
been wiped and make the LUKS container inaccessible. LUKS2 mitigates
-that by never overwritting existing keyslot area as long as there's
+that by never overwriting existing keyslot area as long as there's
a free space in keyslots area at least for one more LUKS2 keyslot.
*NOTE:* some parameters are effective only if used with LUKS2 format
diff --git a/meson.build b/meson.build
index dce59ca1..f96d2d2f 100644
--- a/meson.build
+++ b/meson.build
@@ -85,7 +85,7 @@ if enable_static == true
if not sanitizer_enabled
link_args += '--static'
else
- warning('Turning off statically linked binaries as they are not compatible with sanitizer build. Will keep prefering static external dependencies.')
+ warning('Turning off statically linked binaries as they are not compatible with sanitizer build. Will keep preferring static external dependencies.')
endif
endif
diff --git a/tests/api-test-2.c b/tests/api-test-2.c
index a13a709f..32852da3 100644
--- a/tests/api-test-2.c
+++ b/tests/api-test-2.c
@@ -2311,7 +2311,7 @@ static void Tokens(void)
/* keyslots:
*
- * 0 ingore (token 0)
+ * 0 ignore (token 0)
* 1 normal (token 0)
* 2 prefer -
* 3 ignore -
@@ -5290,7 +5290,7 @@ static void KeyslotContextAndKeyringLink(void)
OK_(crypt_activate_by_passphrase(cd, CDEVICE_1, CRYPT_ANY_SLOT, PASSPHRASE, strlen(PASSPHRASE), 0));
/*
- * Otherwise will wil not be able to search the TEST_KEYRING_USER in current context (see request_key(2):
+ * Otherwise we will not be able to search the TEST_KEYRING_USER in current context (see request_key(2):
* "The keyrings are searched in the order: thread-specific keyring, process-specific keyring, and then session keyring."
*/
NOTFAIL_(keyctl_link(keyring_in_user_id, KEY_SPEC_THREAD_KEYRING), "Failed to link in thread keyring.");
diff --git a/tests/api_test.h b/tests/api_test.h
index 14efead6..49fc5b65 100644
--- a/tests/api_test.h
+++ b/tests/api_test.h
@@ -138,7 +138,7 @@ void xlog(const char *msg, const char *tst, const char *func, int line, const ch
#define T_DM_INTEGRITY_DISCARDS_SUPPORTED (1 << 23) /* dm-integrity discards/TRIM option is supported */
#define T_DM_INTEGRITY_RESIZE_SUPPORTED (1 << 23) /* dm-integrity resize of the integrity device supported (introduced in the same version as discards)*/
#define T_DM_VERITY_PANIC_CORRUPTION_SUPPORTED (1 << 24) /* dm-verity panic on corruption */
-#define T_DM_CRYPT_NO_WORKQUEUE_SUPPORTED (1 << 25) /* dm-crypt suppot for bypassing workqueues */
+#define T_DM_CRYPT_NO_WORKQUEUE_SUPPORTED (1 << 25) /* dm-crypt support for bypassing workqueues */
#define T_DM_INTEGRITY_FIX_HMAC_SUPPORTED (1 << 26) /* hmac covers also superblock */
#define T_DM_INTEGRITY_RESET_RECALC_SUPPORTED (1 << 27) /* dm-integrity automatic recalculation supported */
#define T_DM_VERITY_TASKLETS_SUPPORTED (1 << 28) /* dm-verity tasklets supported */
diff --git a/tests/fuzz/LUKS2.proto b/tests/fuzz/LUKS2.proto
index 3a0f2870..7293d918 100644
--- a/tests/fuzz/LUKS2.proto
+++ b/tests/fuzz/LUKS2.proto
@@ -229,7 +229,7 @@ enum keyslot_af_type {
KEYSLOT_AF_TYPE_LUKS1 = 1;
}
-// The af (anti-forensic splitter) object contains this madatory field:
+// The af (anti-forensic splitter) object contains this mandatory field:
// - type [string] the anti-forensic function type.
// AF type luks1 (compatible with LUKS1 [1]) contains these additional fields:
// - stripes [integer] the number of stripes, for historical reasons only the 4000 value is supported.
diff --git a/tests/fuzz/crypt2_load_fuzz.cc b/tests/fuzz/crypt2_load_fuzz.cc
index c923f4ba..acfff62e 100644
--- a/tests/fuzz/crypt2_load_fuzz.cc
+++ b/tests/fuzz/crypt2_load_fuzz.cc
@@ -95,7 +95,7 @@ int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size)
if (write_buffer(fd, data + modified_data_size, size - modified_data_size) != (ssize_t)size)
goto out;
- /* Actuall fuzzing */
+ /* Actual fuzzing */
if (crypt_init(&cd, name) == 0)
(void)crypt_load(cd, CRYPT_LUKS2, NULL);
crypt_free(cd);