mirror of
https://github.com/torvalds/linux.git
synced 2026-04-18 06:44:00 -04:00
crypto: Fix several spelling mistakes in comments
Fix several typos in comments and messages. No functional change. Signed-off-by: Sun Chaobo <suncoding913@gmail.com> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
This commit is contained in:
@@ -1780,7 +1780,7 @@ static inline int __init drbg_healthcheck_sanity(void)
|
||||
max_addtllen = drbg_max_addtl(drbg);
|
||||
max_request_bytes = drbg_max_request_bytes(drbg);
|
||||
drbg_string_fill(&addtl, buf, max_addtllen + 1);
|
||||
/* overflow addtllen with additonal info string */
|
||||
/* overflow addtllen with additional info string */
|
||||
len = drbg_generate(drbg, buf, OUTBUFLEN, &addtl);
|
||||
BUG_ON(0 < len);
|
||||
/* overflow max_bits */
|
||||
|
||||
@@ -134,7 +134,7 @@ static int lrw_next_index(u32 *counter)
|
||||
/*
|
||||
* We compute the tweak masks twice (both before and after the ECB encryption or
|
||||
* decryption) to avoid having to allocate a temporary buffer and/or make
|
||||
* mutliple calls to the 'ecb(..)' instance, which usually would be slower than
|
||||
* multiple calls to the 'ecb(..)' instance, which usually would be slower than
|
||||
* just doing the lrw_next_index() calls again.
|
||||
*/
|
||||
static int lrw_xor_tweak(struct skcipher_request *req, bool second_pass)
|
||||
|
||||
@@ -2828,7 +2828,7 @@ static int __init tcrypt_mod_init(void)
|
||||
pr_debug("all tests passed\n");
|
||||
}
|
||||
|
||||
/* We intentionaly return -EAGAIN to prevent keeping the module,
|
||||
/* We intentionally return -EAGAIN to prevent keeping the module,
|
||||
* unless we're running in fips mode. It does all its work from
|
||||
* init() and doesn't offer any runtime functionality, but in
|
||||
* the fips case, checking for a successful load is helpful.
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
/*
|
||||
* Cryptographic API.
|
||||
*
|
||||
* TEA, XTEA, and XETA crypto alogrithms
|
||||
* TEA, XTEA, and XETA crypto algorithms
|
||||
*
|
||||
* The TEA and Xtended TEA algorithms were developed by David Wheeler
|
||||
* and Roger Needham at the Computer Laboratory of Cambridge University.
|
||||
|
||||
@@ -76,7 +76,7 @@ static int xts_setkey(struct crypto_skcipher *parent, const u8 *key,
|
||||
/*
|
||||
* We compute the tweak masks twice (both before and after the ECB encryption or
|
||||
* decryption) to avoid having to allocate a temporary buffer and/or make
|
||||
* mutliple calls to the 'ecb(..)' instance, which usually would be slower than
|
||||
* multiple calls to the 'ecb(..)' instance, which usually would be slower than
|
||||
* just doing the gf128mul_x_ble() calls again.
|
||||
*/
|
||||
static int xts_xor_tweak(struct skcipher_request *req, bool second_pass,
|
||||
|
||||
Reference in New Issue
Block a user