Skip to content

Commit be037ca

Browse files
DimitriPapadopoulosdanielinux
authored andcommitted
Fix typos found by codespell
1 parent 4e20d5a commit be037ca

26 files changed

Lines changed: 50 additions & 50 deletions

IDE/IAR/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ Using the ST-LINK Utility, perform the following steps:
7676
*Erase the entire flash memory before uploading the binary files*
7777

7878

79-
2. Upload `wolfboot.bin` to addess 0x08000000
79+
2. Upload `wolfboot.bin` to address 0x08000000
8080

8181
![Upload bootloader](../../docs/png/windows_upload_1.png)
8282

IDE/Renesas/e2studio/RA6M4/Readme.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ securely updated to v2. Both versions behave the same except displaying its vers
77
They are compiled by e2Studio and running on the target board.
88

99
In this demo, you may download two versions of application binary file by Renesas Flash Programmer.
10-
You can download and excute wolfBoot by e2Studio debugger. Use a USB connection between PC and the
10+
You can download and execute wolfBoot by e2Studio debugger. Use a USB connection between PC and the
1111
board for the debugger and flash programmer.
1212

1313
Please see `Readme_wSCE.md` for Renesas SCE use case.
@@ -131,7 +131,7 @@ Project properties are preset for the demo.
131131
Need to set:
132132
#define BSP_FEATURE_FLASH_SUPPORTS_ACCESS_WINDOW (1)\
133133
134-
Code Origin and entry point is "0x00010200". app_RA.elf is gnerated under Debug.
134+
Code Origin and entry point is "0x00010200". app_RA.elf is generated under Debug.
135135
136136
### 4) Generate Signature for app V1
137137
You can derive bair binary file (app_RA.bin) by objcopy command as follows.
@@ -172,7 +172,7 @@ $ aarch64-none-elf-objcopy.exe -I binary -O srec --change-addresses=0x00010000 a
172172
```
173173
174174
175-
### 6) Execute inital boot
175+
### 6) Execute initial boot
176176
177177
Now, you can download and start wolfBoot program by e2Studio debugger.
178178
After starting the program, you can see the partition information as follows.

IDE/Renesas/e2studio/RA6M4/Readme_wSCE.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ securely updated to v2. Both versions behave the same except displaying its vers
77
They are compiled by e2Studio and running on the target board.
88

99
In this demo, you may download two versions of application binary file by Renesas Flash Programmer.
10-
You can download and excute wolfBoot by e2Studio debugger. Use a USB connection between PC and the
10+
You can download and execute wolfBoot by e2Studio debugger. Use a USB connection between PC and the
1111
board for the debugger and flash programmer.It is only available RSA with Renesas SCE now.
1212

1313
## 2. Components and Tools
@@ -95,7 +95,7 @@ Enabled `WOLFBOOT_RENESAS_SCEPROTECT` expects to use Renesas SCE.
9595

9696
### 3) Compile the sample application
9797

98-
Open project under IDE/Renesas/e2studio/RA6M4/app_RA with e2Studio. Open `script` folder and copy orignal `fsp.ld` to `fsp.ld.org`. Copy `fsp_wsce.ld` to `fsp.ld`, and then build the project.
98+
Open project under IDE/Renesas/e2studio/RA6M4/app_RA with e2Studio. Open `script` folder and copy original `fsp.ld` to `fsp.ld.org`. Copy `fsp_wsce.ld` to `fsp.ld`, and then build the project.
9999
Project properties are preset for the demo.
100100

101101
#### 3-1). Prepare SEGGER_RTT for logging
@@ -126,7 +126,7 @@ Project properties are preset for the demo.
126126
Need to set:
127127
#define BSP_FEATURE_FLASH_SUPPORTS_ACCESS_WINDOW (1)\
128128
129-
Code Origin and entry point is "0x00010200". app_RA.elf is gnerated under Debug.
129+
Code Origin and entry point is "0x00010200". app_RA.elf is generated under Debug.
130130
131131
### 4) Generate Wrapped Key for SCE
132132
@@ -188,7 +188,7 @@ $ aarch64-none-elf-objcopy.exe -I binary -O srec --change-addresses=0x00020000 a
188188
```
189189
190190
191-
### 6) Execute inital boot
191+
### 6) Execute initial boot
192192
193193
Now, you can download and start wolfBoot program by e2Studio debugger.
194194
After starting the program, you can see the partition information as follows.

IDE/Renesas/e2studio/RX72N/Readme.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ securely updated to v2. Both versions behave the same except displaying its vers
77
They are compiled by e2Studio and running on the target board.
88

99
In this demo, you may download two versions of application binary file by Renesas Flash Programmer.
10-
You can download and excute wolfBoot by e2Studio debugger. Use a USB connection between PC and the
10+
You can download and execute wolfBoot by e2Studio debugger. Use a USB connection between PC and the
1111
board for the debugger and flash programmer.
1212

1313
## 2. Components and Tools
@@ -63,7 +63,7 @@ cerurely updated to v2. Both versions behave the same except displaying its vers
6363
They are compiled by e2Studio and running on the target board.
6464

6565
In this demo, you may download two versions of application binary file by Renesas Flash Programmer.
66-
You can download and excute wolfBoot by e2Studio debugger. Use a USB connection between PC and the
66+
You can download and execute wolfBoot by e2Studio debugger. Use a USB connection between PC and the
6767
board for the debugger and flash programmer.
6868

6969

@@ -140,7 +140,7 @@ Pre-Include
140140
Code Origin and entry point (PResetPRG) is "0xffc10200" (See Section Viewer of Linker Section).
141141
```
142142

143-
app_RenesasRx01.x in ELF is gnerated under HardwareDebug. You can derive bair binary file
143+
app_RenesasRx01.x in ELF is generated under HardwareDebug. You can derive bair binary file
144144
(app_RenesasRx01.bin) by rx-elf-objcopy.exe command as follows. -R are for eliminate unnecessary
145145
secrions.
146146

@@ -184,7 +184,7 @@ $ rx-elf-objcopy.exe -I binary -O srec --change-addresses=0xffc10000 app_Renesas
184184
```
185185

186186

187-
### 3-7 Execute inital boot
187+
### 3-7 Execute initial boot
188188

189189
Now, you can download and start wolfBoot program by e2Studio debugger.
190190
After starting the program, you can see the partition information as follows.
@@ -266,7 +266,7 @@ Firmware Update is triggered
266266
```
267267

268268
After you see the message, hit any key so that the application calls
269-
wolfBoot_update_trigger() whcih changes the partition status and triggers
269+
wolfBoot_update_trigger() which changes the partition status and triggers
270270
updating the firmware.
271271

272272
Since this is just a trigger, the application can continue the process.

IDE/Renesas/e2studio/RX72N/x2hex.sh

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ case $4 in
5959
5) SIGN_METHOD=${ECC256_SIGN} ;;
6060
6) SIGN_METHOD=${ECC384_SIGN} ;;
6161
7) SIGN_METHOD=${ECC512_SIGN} ;;
62-
*) echo "invalid signature mehtod $4. Please specifiy [0-8] for sign."
62+
*) echo "invalid signature method $4. Please specify [0-8] for sign."
6363
exit 1 ;;
6464
esac
6565

IDE/XilinxSDK/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ Xilinx uses a `bootgen` tool for generating a boot binary image that has Xilinx
5757
3. Import example project for programming eFuses:
5858
* New BSP project (program efuses , ZCU102_hw_platform, standalone, CPU: PSU_cortexa53_0)
5959
* Goto Xilinx Board Support Packet Settings.
60-
* Scroll down to Supported Libraries and Check the xiskey libray
60+
* Scroll down to Supported Libraries and Check the xiskey library
6161
* In the system.mss pane, scroll down to Libraries and click Import Examples.
6262
* Check the xilskey_esfuseps_zynqmp_example
6363
4. Edit `xilskey_efuseps_zynqmp_input.h`

config/examples/nxp-t2080-68ppc2.config

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ WOLFBOOT_SECTOR_SIZE=0x10000
3232

3333
# wolfBoot start address
3434
WOLFBOOT_ORIGIN=0xEFF40000
35-
# wolfBoot parition size (custom)
35+
# wolfBoot partition size (custom)
3636
BOOTLOADER_PARTITION_SIZE=0x20000
3737

3838
# Application Partition Size

docs/PubkeySealing.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
## NOTE: Currently only ecc256 keys are supported for policy sealing
44

55
The pubkey that wolfBoot uses to verify its images can be stored in the TPM and tied to the boot partition digest. The key will be set to only be unsealed if the image digest is untampered, and then when signature verification is done the untampered signature proves an untampered image.
6-
To use this feature you need to define `WOLFBOOT_TPM_KEYSTORE?=1` and set `WOLFBOOT_TPM_KEYSTORE_NV_INDEX` and `WOLFBOOT_TPM_POLICY_NV_INDEX` to the NVM indicies supported by your TPM. You can also override the default PCR index by defining `WOLFBOOT_TPM_PCR_INDEX`
6+
To use this feature you need to define `WOLFBOOT_TPM_KEYSTORE?=1` and set `WOLFBOOT_TPM_KEYSTORE_NV_INDEX` and `WOLFBOOT_TPM_POLICY_NV_INDEX` to the NVM indices supported by your TPM. You can also override the default PCR index by defining `WOLFBOOT_TPM_PCR_INDEX`
77
Then you need to generate two keys, our policy signing key and the regular image verification key. We also need to sign a Policy Signed signature from aHash, a TPM2 element. This can be done automatically with the tools/preseal/keygen command:
88

99
```
@@ -35,7 +35,7 @@ Next you need to create the image using the sign keytool with the --manual-sign
3535
tools/keytools/sign --ecc256 --sha256 --manual-sign --policy-signed MY_IMAGE policy-public-key.raw 1 image-signature.raw policy-signed.raw
3636
```
3737

38-
Lastly, the pubkey needs to be sealed to the TPM. Note that the previous commands could be run from a seperate system, this one must be run on a system connected to the TPM:
38+
Lastly, the pubkey needs to be sealed to the TPM. Note that the previous commands could be run from a separate system, this one must be run on a system connected to the TPM:
3939

4040
```
4141
tools/preseal/preseal public-key.raw policy-public-key.raw policy-signed.raw test-app/image_v1_digest.bin 25166336 25166337 16

docs/Targets.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -743,7 +743,7 @@ The STM32H7 build can be built using:
743743
make TARGET=stm32h7 SIGN=ECC256
744744
```
745745

746-
The STM32H7 also supports using the QSPI for external flash. To enable use `QSPI_FLASH=1` in your configuration. The pins are defined in `hal/spi/spi_drv_stm32.h`. A built-in alternate pin configuration can be used with `QSPI_ALT_CONFIGURATION`. The flash and QSPI parameters are defined in `src/qspi_flash.c` and can be overrriden at build time.
746+
The STM32H7 also supports using the QSPI for external flash. To enable use `QSPI_FLASH=1` in your configuration. The pins are defined in `hal/spi/spi_drv_stm32.h`. A built-in alternate pin configuration can be used with `QSPI_ALT_CONFIGURATION`. The flash and QSPI parameters are defined in `src/qspi_flash.c` and can be overridden at build time.
747747

748748
### STM32H7 Programming
749749

@@ -840,7 +840,7 @@ arm-none-eabi-gdb wolfboot.elf -ex "target remote localhost:3333"
840840

841841
Tested using `https://github.com/raspberrypi/linux` on Ubuntu 20
842842

843-
Prerequsites: `sudo apt install gcc-aarch64-linux-gnu qemu-system-aarch64`
843+
Prerequisites: `sudo apt install gcc-aarch64-linux-gnu qemu-system-aarch64`
844844

845845
### Compiling the kernel
846846

@@ -1100,15 +1100,15 @@ Firmware can be directly uploaded to the target by copying `factory.bin` to the
11001100

11011101
Supports K64 and K82 with crypto hardware acceleration.
11021102

1103-
### Buld options
1103+
### Build options
11041104

11051105
See [/config/examples/kinetis-k82f.config](/config/examples/kinetis-k82f.config) for example configuration.
11061106

11071107
The TARGET is `kinetis`. For LTC PKA support set `PKA=`.
11081108

11091109
Set `MCUXPRESSO`, `MCUXPRESSO_CPU`, `MCUXPRESSO_DRIVERS` and `MCUXPRESSO_CMSIS` for MCUXpresso configuration.
11101110

1111-
### Example partioning for K82
1111+
### Example partitioning for K82
11121112

11131113
```
11141114
WOLFBOOT_PARTITION_SIZE?=0x7A000
@@ -1256,7 +1256,7 @@ Flash Layout (with files):
12561256
| ----------- | ---- | ------- |
12571257
| Reset Configuration Word (RCW) | `68PPC2_RCW_v0p7.bin` | `0xE8000000` |
12581258
| Frame Manager Microcode | `fsl_fman_ucode_t2080_r1.0.bin` | `0xE8020000` |
1259-
| Signed Aplication | `test-app/image_v1_signed.bin` | `0xE8080000` |
1259+
| Signed Application | `test-app/image_v1_signed.bin` | `0xE8080000` |
12601260
| wolfBoot | `wolfboot.bin` | `0xEFF40000` |
12611261
| Boot Entry Point (with offset jump to init code) | | `0xEFFFFFFC` |
12621262

@@ -1509,7 +1509,7 @@ optionally an external flash. The build will produce an executable ELF file
15091509
`wolfBoot.elf`. You can provide another executable ELF as firmware image and it
15101510
will be executed. The command-line arguments of `wolfBoot.elf` are forwarded to
15111511
the application. The example application `test-app\app_sim.c` uses the arguments
1512-
to interact with `libwolfboot.c` and automatize functional testing. You can
1512+
to interact with `libwolfboot.c` and automate functional testing. You can
15131513
find an example configuration in `config/examples/sim.config`.
15141514
15151515
An example of using the `test-app/sim.c` to test firmware update:
@@ -1537,7 +1537,7 @@ securely updated to v2. Both versions behave the same except displaying its vers
15371537
They are compiled by e2Studio and running on the target board.
15381538

15391539
In this demo, you may download two versions of application binary file by Renesas Flash Programmer.
1540-
You can download and excute wolfBoot by e2Studio debugger. Use a USB connection between PC and the
1540+
You can download and execute wolfBoot by e2Studio debugger. Use a USB connection between PC and the
15411541
board for the debugger and flash programmer.
15421542

15431543
Flash Allocation:
@@ -1567,7 +1567,7 @@ securely updated to v2. Both versions behave the same except displaying its vers
15671567
They are compiled by e2Studio and running on the target board.
15681568

15691569
In this demo, you may download two versions of application binary file by Renesas Flash Programmer.
1570-
You can download and excute wolfBoot by e2Studio debugger. Use a USB connection between PC and the
1570+
You can download and execute wolfBoot by e2Studio debugger. Use a USB connection between PC and the
15711571
board for the debugger and flash programmer.
15721572

15731573
Flash Allocation:

docs/compile.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ beginning of the external memory addressable space.
7272
- `WOLFBOOT_PARTITION_SWAP_ADDRESS`
7373

7474
The address for the swap spaced used by wolfBoot to swap the two firmware images in place,
75-
in order to perform a reversable update. The size of the SWAP partition is exactly one sector on the flash.
75+
in order to perform a reversible update. The size of the SWAP partition is exactly one sector on the flash.
7676
If an external memory is used, the variable contains the offset of the SWAP area from the beginning
7777
of its addressable space.
7878

0 commit comments

Comments
 (0)