Commit 5e0ae34d24d742a32ce7baa2b8f20dcee66bdf93

Authored by dp111
Committed by GitHub
1 parent 0aad0470

Typos

Typo fixes from @dp111 (who obviously has too much time on his hands).
Readme.md
... ... @@ -190,7 +190,7 @@ must be 2048 bits.
190 190 ```
191 191 #### Hardware security modules
192 192 `rpi-eeprom-digest` is a shell script that wraps a call to `openssl dgst -sign`.
193   -If the private key is stored withing a hardware security module instead of
  193 +If the private key is stored within a hardware security module instead of
194 194 a .PEM file the `openssl` command will need to be replaced with the appropriate call to the HSM.
195 195  
196 196 `rpi-eeprom-digest` called by `update-pieeprom.sh` to sign the EEPROM config file.
... ...
debian/changelog
... ... @@ -125,7 +125,7 @@ rpiboot (20210714~083443) buster; urgency=medium
125 125 * Don't load bootcode from the overlay directory
126 126 * pieeprom-2021-01-16: Update to latest release for BCM2711 XHCI boot
127 127 * Update EEPROM image to latest CM4 manufacturing image + configuration
128   - * msd: CM4: Fix occasionaly USB errors
  128 + * msd: CM4: Fix occasional USB errors
129 129 * Add native Raspberry Pi Imager port - beta
130 130 * Update Raspberry Pi 4 EEPROM to pieeprom-2021-07-06
131 131  
... ...
recovery/README.md
... ... @@ -2,7 +2,7 @@ To update the SPI EEPROM bootloader on a Compute Module 4.
2 2  
3 3 * Modify the EEPROM configuration as desired
4 4 * Optionally, replace pieeprom.original.bin with a custom version. The default
5   - version here is the latest stable release recommeded for use on Compute Module 4.
  5 + version here is the latest stable release recommended for use on Compute Module 4.
6 6  
7 7 N.B The `bootcode4.bin` file in this directory is actually the `recovery.bin`
8 8 file used on Raspberry Pi 4 bootloader update cards.
... ...
secure-boot-recovery/README.md
... ... @@ -11,7 +11,7 @@ must be used to enable RPIBOOT if pulled low. The available GPIOs are 2,4,5,6,7,
11 11 since these are high by default.
12 12  
13 13 ### Step 1 - Erase the EEPROM
14   -In order to avoid this OTP configuration being accidently set on Pi 4B / Pi 400
  14 +In order to avoid this OTP configuration being accidentally set on Pi 4B / Pi 400
15 15 this option can only be set via RPIBOOT. To force RPIBOOT on a Pi 4B / Pi 400
16 16 erase the SPI EEPROM.
17 17  
... ...
tools/make-boot-image
... ... @@ -135,7 +135,7 @@ createstaging() {
135 135  
136 136 checkDependencies() {
137 137 if [ ! -f /sbin/mkfs.fat ]; then
138   - die "mkfs.fat is requried. Run this script on Linux"
  138 + die "mkfs.fat is required. Run this script on Linux"
139 139 fi
140 140 }
141 141  
... ...
tools/update-pieeprom.sh
... ... @@ -77,7 +77,7 @@ update_eeprom() {
77 77 fi
78 78 update_version=$(strings "${src_image}" | grep BUILD_TIMESTAMP | sed 's/.*=//g')
79 79 if [ "${BOOTLOADER_SECURE_BOOT_MIN_VERSION}" -gt "${update_version}" ]; then
80   - die "Source bootloader image ${src_image} does not support secure-boot. Please use a newer verison."
  80 + die "Source bootloader image ${src_image} does not support secure-boot. Please use a newer version."
81 81 fi
82 82  
83 83 TMP_CONFIG_SIG="$(mktemp)"
... ...